You are on page 1of 162

PUBLIC SERVICE COLLEGE OF OROMIA

Department of
Business Management &Entrepreneurship

BME
DISTANCE LEARNING MODULE
Business Information Systems
BME- 311

1
TABLE OF CONTENTS
Course Introduction
Course Objectives

1. UNIT ONE: THE INFORMATION SYSTEM REVOLUTION: TRANSFORMING BUSINESS AND


MANAGEMENT
 Unit Introduction
 Unit Objectives
 Section Objectives
 Section Overview
1.1. Meaning and Definition of Business Information System: What is Business Information System?
1.2. Contemporary Approaches to Information Systems
1.3. The New Role of Information System in Organization
1.4. Learning to Use Information Systems: New Opportunities with Technology
1.5. Sub-systems of an Information System
1.6. Information System Resources
1.7. Different Schools of thought view toward the value of Information
 Unit Summary
 Feedback to Activities
 Answer Key for Self-Test Exercises

2. UNIT TWO: INFORMATION TECHNOLOGY AND ORGANIZATION


 Unit Introduction
 Unit Objectives
 Section Objectives
 Section Overview
2.1 Information Technology Trends
2.2 What is computer hardware system?
2.2.1 General overview
2.2.2 Computer generation and trend: Time and Size in the Computer
2.2.3 Mainframes, Minicomputers, Microcomputers
2.3 Internal Assessment and Internal Factor Evaluation Matrix (IFEM)
2.3.1 What is software?
2.3.2 System and Application software
2.3.3 Operating System
2.3.4 Managing Software Assets: New software tools and approaches
2.4 Managing Data Resources
2.4.1 Organizing Data in a Traditional File Environment
2.4.2 Database management
2.4.3 Designing Databases
2.5 Telecommunications and networks
2.5.1 The Telecommunication Revolution and Contemporary organization
2.5.2 Communications networks
2.5.3 Electronic Commerce and Electronic Business Technologies
 Unit Summary
 Feedback to Activities
 Answer Key for Self-Test Exercises

2
3. UNIT THREE: APPLICATION OF BIS IN ORGANIZATION
 Unit Introduction
 Unit Objectives
 Section Objectives
 Section Overview
3.1 Levels of Management
3.2 Information requirements at different levels
3.3 Information requirement at different functional areas of management
3.3.1 Human Resource management Information Systems
3.3.2 Financial Information Systems
3.3.3 Manufacturing and Production Information Systems
3.3.4 Marketing Information Systems
3.4 Information, Management, and Decision Making
3.4.1 Introduction to Decision Making
3.4.2 Levels of decision making
3.4.3 Individual models of Decision Making
3.4.4 Organizational models of decision making
3.4.5 IT and Management
 Unit Summary
 Feedback to Activities
 Answer Key for Self-Test Exercises

4. UNIT FOUR: STRATEGIC ADVANTAGE OF INFORMATION


 Unit Introduction
 Unit Objectives
 Section Objectives
 Section Overview
4.1 Strategic Role of information Systems
4.2 Information Systems and Business Strategy
4.3 Using Systems for Competitive Advantage: Management Issues
4.4 Maintaining a competitive Advantage
 Unit Summary
 Feedback to Activities
 Answer Key for Self-Test Exercises

5. UNIT FIVE: MANAGEMENT OF INFORMATION SYSTEM


 Unit Introduction
 Unit Objectives
 Section Objectives
 Section Overview
5.1 Developing BIS
5.1.1 Redesigning in the Organization with Information Systems
5.1.2 Systems Development and Organizational Change
5.1.3 Alternative System-Building Approaches
5.1.4 Overview of Systems Development
5.2 Managing Resources
 Unit Summary
 Feedback to Activities
 Answer Key for Self-Test Exercises
 Glossary
 References

3
BUSINESS INFORMATION SYSTEM

Course Introduction
Hello Dear Distant Learners!
How are you doing?
Nice to meet you through this teaching material!

This course material is designed, assuming that you have a basic knowledge of computers and
management and/or business concepts. It is intended to acquaint you with role of information
systems and technology strategies in the modern enterprise with a focus on helping users
apply technology to achieve and maintain competitive advantage. The course is useful to equip
you with the use of systems to support business decision making. The material provides a deep
understanding of computerized systems hardware and software, networks,
telecommunications and e-business basics. The course will also provide hands-on
introduction to basic database software applications using MS Access.

Generally speaking, this study material is intended to cater to the needs of the learners in
understanding the essential concepts and knowhow of applying the ever growing Information
and Communication Technology in businesses. The course is to be delivered in one module,
which is divided into five units and different sections under each unit. The first unit deals with
the information system revolution and explains the transformation of business and
management to the technology arena. Thesecond unit is about information technology and
organization. In the third unit we will learn about application of Business Information Systems in
organizations. Strategic advantage of information will be seen in the fourth unit. The final unit is
designed to teach you about management of information systems.

Within each unit, there are main sections designed in a chronological and logical order of
presentation. Each section within every unit consists of different subsections whenever
necessary. You will find activities and self-assessment questions those intended to evaluate the
understanding and rehearsing level of the learners. The answers and feedbacks to each activities
and self-assessment questions are provided at the end of the modules. I advise you to attempt all
questions by yourself before you resort to find the answers. The modules also contain
assignments for sub-missions. You have to allocate sufficient time for each part of the units.
Furthermore, I strongly recommend you to read the units and sections in their order of

4
appearance as it eases up your understanding about the subject matter. Similarly it is wise to take
notes during your study of the module and always try to answer by yourself all the activities and
self-assessment questions before referring to the answer or feedback. Have a pleasant
comprehension!

Course Objectives

This distance teaching material is envisioned to enable the learners to understand the
meaning and significance of Business Information Systems. It helps to comprehend apply the
various advanced technologies that assist in automating business operations and perform
decisions. The course is designed to teach you computer based information systems that assist
you in modernizing your business and there by boost the productivity and competitiveness of
the organization or unit that your mange.

The main objective of this material is to acquaint you dear learners with the design,
development, implementation, operation and maintenance of modern computer based business
information systems. It also provides the basic knowledge on transforming business organization
to exploit the various opportunities offered by Information and Communication Technology.

Moreover, the purpose of this module is to train the distance learners how an organization
enhances its productivity by exploiting the advance in computing hardware and software.
Similarly, this material is designed to teach the various applications of technology in boosting
the productivity of organizations. It also acquaints you the need to achieve strategic alignment
between business objectives and technology objectives to assure technology fit and support the
businesses strategy. Further, it also aims to teach you dear learners on the various techniques
applied in the management of information systems to enhance company’s investment in
technology and to minimize technology related risks.

 Thus, at the end of this course, you will be able to:


• Explain why information technology matters.
• Define digital information and explain why digital systems are so powerful and
useful.
• Explain why information systems are essential to business.

5
• Describe how computers process data into useful information for problem solving and
decision making.
• Identify the functions of different types of information systems in business.
• List major hardware components of computers and explain their functions.
• Classify computers into major categories, and identify their strengths and weaknesses.
• Identify the major media and devices used in telecommunications.
• List networking technologies and trends that is likely to have an impact on businesses
and information management in the near future.
• Identify the Information system activities and resources
• Explain the need to learn use of information systems
• Discuss the value of information

6
UNIT ONE

The Information System Revolution: Transforming Business


and Management

Unit Introduction

Dear learners, welcome to the first unit of this course! This part is designed to introduce you
to the basic concepts of Business Information System [BIS]. It is all about the preliminary
issues of the subject matter. The unit introduces the meaning of BIS and contemporary
approaches to design BIS. In addition, it will provide information on the new role of
Information System in organizations and on the need to learn on the use of Information
Technology [IT] to exploit the new opportunities presented by technology.

It is likely that you are carrying or using an information system. This is so if you have an
advanced mobile phone, a handheld electronic device, or a laptop computer.Information systems
pervade almost every aspect of our lives. Whether you are withdrawing money from a bank’s
automatic teller machine or surfing the Web on your cell phone, hardly a day goes by without
our feeding data into, or using information generated by, an information system. In business
especially, digital information systems generate most of the information we use. These systems
have become essential to successful business operations.

Accordingly the focus of this unit will be up on; meaning and definition of BIS and their sub-
systems, the contemporary approached to design and operate information systems and their new
role, learning to use information systems to exploit opportunities and to manage technology
posed threats, concepts of information system resources and the different schools of thought
view toward the value of information.

On the whole this unit will give you a basic conceptual foundation for understanding the unique
characteristics of Business Information Systems and their role in enhancing the productivity of
contemporary organizations. Each topic is followed by relevant activity to be solved before you
proceed to the next topic.

Unit Objectives
 After studying this unit, you should be able to:
 know meaning and definition of Business Information System
 Explain why information technology matters.

7
 Define digital information and explain why digital systems are so powerful
anduseful.
 Explain why information systems are essential to business.
 Describe how computers process data into useful information for problem
solving and decision making.
 Identify the functions of different types of information systems in business.
 Describe careers in information technology.
 Identify major ethical and societal concerns created by widespread use of
information technology.

UNIT ONE - SECTION ONE


1.1. Meaning and Definition of Business Information System
 Section Objectives
 At the end of this section you should be able to:
• explain what Business Information System is,
• distinguish between data and information
• identify the different types of information systems

Section Overview

Businesses use the conceptual resource i.e information to manage and control the physical
resources of their organizations using business information system. This is because it is difficult
for managers to control every activity of the organization by being physically present in the place
of work. Therefore, information resource is one of the main areas that need the attention of
management like that of human, financial and material resources. According to Raymond
(1995), in today’s information age, the manager’s interest for information is perceived from two
major perspectives. The first is business organizations have become more complexes, which
compelled managers of organizations to process large volume of external and internal
information to cope up with changes taking place in their environment. The second is the growth
of computers in processing speed and memory capacity have enabled managers to use and sort
large volume of data to make organizational decisions and to manage their organizations more
effectively and efficiently than the managers of the industrial age. As a result, management
devises information systems to collect, store and process data to produce information about their
business’s operation.

 Business Information System refers to the system that collect, store and process data to
produce information about the business useful for making various business decisions.

8
Business Information Systems can be manual or computerized Systems. The manual system is
made up of people that operate the system, procedures written to guide the people, the data
created by the businesses day to day operation, documents used to capture the data and physical
equipments used to perform data processing. Manual information systems are nowadays are not
able to cope up with the tremendous volumes of data created by the business. As a result,
companies are evolving their business information system towards computers. Computer based
business information systems are made of people, procedures, data and Information
Technologies.

 In general, Modern Business Information Systems are information systems made up of


people, procedures and Information and communication technologies that collect,
store and process data about the business to produce information useful for managers
to make decisions

1.1.1. Defining Data and Information

It is important to distinguish between data and Information. Data is a raw fact or figure and can
take a form of a number or a date. Data is often meaningless or it does not provide knowledge to
make a specific decision. Information is a knowledge or meaning derived from data. It is a
processed or transformed data that empowers decision makers to make a particular decision.

Data: - is defined as "groups of non- random symbols which represent quantities, actions,
objects, etc". Data are symbols that will never be a complete representation of, or the same with,
reality, but they describe objects, events & their relationships incompletely. Data consists of
figures and facts that can take different forms such as images, text, or voice. Simple figures and
facts are meaningless to the user unless they serve a purpose. For processing purposes data items
are organized into data structures, file structures and databases.

Information: - Information is defined as a valuable processed data that is meaningful to the


receiver to make organizational decisions, to take actions or to fulfill any legal obligations. The
difference between data and information is that data is more related to recording historical or
current facts, where as information is related to affecting the measures or actions to be taken
either currently or in the future.

 Information is a representation that is relevant, timely, consistent, reliable, objective


understandable.

In general, processing is changing the raw material i.e. data to finished product i.e. information.
Refer to Figure 1.1. It is a simplified information system model. Data is the input that can be

9
processed either manually or using a machine, such as a computer, to obtain information for
decision purpose. Figure 1.1.also illustrates that data can be stored for future use. For example, a
personnel section stores the data of employees in personal files to use the data in the future for
promotion, termination or any other purpose. The data can also be stored in a diskette in a
computer system as a soft copy or in a filing cabinet as hard copy.

Figure 1-1: Simple Information Systems Model

Data
Storag
e

Processing
Input (Data) (Information Processor) Output (Information)

Defining System

A System is a set of two or more interrelated components or sub-systems which interacts each
other to serve a common goal or purpose. A system is an array of components that work together
to achieve a common goal, or multiple goals, by accepting input, processing it, and producing
output in an organized manner. Often, a system consists of several subsystems— components of
a larger system—with subgoals, all contributing to meeting the main goal. Subsystems can
receive input from, and transfer output to, other systems or subsystems.

System is defined as” a group of interrelated components working together toward a common
goal by accepting inputs and producing outputs in an organized transformation process". The
general definition of a system is that it is a group of interrelated components performing different
functions in a coordinated way to serve the common purpose of the system. Therefore,
organizations as systems have different components such as administration, finance, production,
marketing etc. that are working together towards achieving the overall organizational objective.
Systems can exist in different forms. Some can be abstract systems, which can deal with ideas,
beliefs or ethical values of society. Some can be natural systems, which can deal with natural
relationship. Natural systems include living systems and non-living system. Some can be
artificial systems, which are man-made systems such as organizations, computer systems, factory
systems, etc.

10
1.1.2. Closed vs. Open Systems

Systems are closed or open, depending on the nature of the information flow in the system. A
closed system stands alone, with no connection to another system: nothing flows in from another
system; nothing flows out to another system. An open system interfaces and interacts with other
systems. The systems that we discuss here are open systems. Interactions between open systems
take place through exchange of information, material, personnel, finance and energy. All
business organizations are open systems but all systems are not organization.

 An open system is a system that interacts with other systems in its environment.

1.1.2.1. Characteristics of open systems

The application of the concept of system’s theory to business began around the year 1948 by
Norbert Wiener, and later got depth in 1966 by a biologist Ludwig von Bartalanffy. According to
the systems’ concept, all business and government organizations are open systems with the
following major characteristics discussed henceforth.

Environment: A system exists and functions in an environment. The environment in this context
is all the economic, political, social, and technological situations within which any open system
operates.

Subsystems and Supera System: A system has different components (parts) called subsystems.
A system can be a part of a larger system, which can be called a supera-system. The distinction
between system and sub-system is a matter of perspectives

Boundaries: Systems have Boundaries that allow us to differentiate one system from other
systems and allow us to separate from its environment to determine the scope of the system. The
boundaries of some systems can be clearly shown or defined. But for many systems, it is
difficult to draw clear lines to show the boundary of a system. Boundaries of systems are drawn
in abstract way based on their goals, objectives, functions and activities.

Interface: The other basic characteristic of an open system is that it interacts with other systems
in its environment. This is called interfaces. Interfaces occur at the boundary of a system
through the form of taking in inputs from, and giving out outputs to, the environment.

Inputs: A system has flows of information, material, personnel that enter the system from the
environment as inputs.

11
Processing:- the inputs undergo transformational processes within the system. Any open system
has components (subsystems) that transform the input resources into the output resources.

Output: - the processing component of a system combines and transforms the varieties of inputs
that entered the system to produce a new type of output with the higher value than the values of
the combined inputs. This output should be transferred to the other systems.

Synergy: Another characteristic of a system is the synergy of activities of its different


subsystems. Synergy is the coordination of the activities of the subsystems of a system to create
value greater than the value of the inputs used by the system. Usually, the phrase the “Whole is
greater than the sum of its parts” is used to emphasize the importance of synergy.

Feedback and Control: A complete system should have a feedback and control mechanism.
Feedback means getting internal and external information on one’s performance. An open
system without a feedback and control mechanism is like a person whose nervous system does
not properly function. Such systems do not stay long. An open system with feedback mechanism
has sensors that capture information on its performance and behavior from internal and external
sources. The controlling mechanism of the system measures the direction, intensity and the
extent of the feedback and compares it with established standards. The result of the comparison
can be either negative feedback or positive feedback. If it is positive feedback, the system
maintains and further improves its performance. If it is negative feedback, the system control
takes corrective actions and sends the appropriate instruction to the concerned subsystem to
reverse the entropy.

Entropy is defined as the deterioration of the performance of a system through time. Based on
the instruction from the control subsystem, the subsystem adjusts its action in line with the
systems expectation.

1.1.3. Business Information Systems

With an understanding of the terms “information” and “system,” the definition of business
information system is almost intuitive: an information system (IS) consists of all the components
that work together to process data and produce information. Almost all business information
systems consist of many subsystems with sub-goals, all contributing to the organization’s main
goal.

 Business Information System is “a comprehensive and coordinated set of


information subsystems which are rationally integrated and which transform data

12
into information in a variety of ways to support operations, management, and
decision-making functions in a business organization” .

An information system (IS) can be any organized combination of people, hardware, software,
communications networks, data resources, and policies and procedures that stores, retrieves,
transforms, and disseminates information in an organization. People rely on modern information
systems to communicate with one another using a variety of physical devices (hardware) ,
information processing instructions and procedures (software) , communications channels
(networks) , and stored data (data resources). Information system can be defined as “a set of
people, procedure, and resources that collects, transforms and disseminates information in an
organization”. Organizations can depend on manual information systems such as using paper &
pencil or informal (word-of mouth) or computer based information systems such as using
computer hardware, software & people resources to transform data resources into information
products that can serve the need of the information user.

Activity 1
1 Mr. Alex produced 200 units of material X in ABC factory during May 2015. Does Mr. Alex’s
performance good or bad?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Mr. Alex produced 200 units of material x in ABC factory during May. The budgeted units of output for
Mr. X is 250 units for May. Does Mr. Alex’s performance good or bad?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Re-considering the first and the second questions and your answer. Which one do you think
represent data and which one represent information?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT ONE - SECTION TWO


1.2. Contemporary Approaches to Information Systems

13
 Section Objectives
 After studying this section you will be in a position to;
 Know the approaches that contribute to the problems, issues, and solutions in the
study of information systems.
 Distinguish the contemporary approaches used in the design of information
systems
 Appreciate the contributions of each approaches towards the contemporary
information systems

Section Overview

This section attempts to introduce the contemporary approaches that contribute towards the
existing information systems.

In this section we will examine the defining attributes of approaches that shape the contemporary
information systems applied in organizations. The study of information systems is a
multidisciplinary field. No single theory or perspective dominates. Therefore, there is a need to
take wider perspectives of disciplines that contribute to the problems, issues and solution in the
study of information systems.

Information systems are socio-technical systems. Though they are composedof machines,
devices, and “hard” physical technology, they require substantialsocial, organizational, and
intellectual investments to make them workproperly. Therefore, this sections aims to introduce
the various approaches that shape modern day information systems.

 Information Systems are socio-technical systems where by humans, technologies and


organizations interact resulting in a complex phenomenon created through their
interaction. As a result, no single approach would suffice to model information systems

1.2.1. Information System Approaches

In general, the contemporary approaches towards the study of information system can be divided
into technical and behavioral approaches.

1.2.1.1. Technical Approach

The technical approach to information systems emphasizes mathematically based models to


study information systems, as well as the physical technology and formal capabilities of these
systems. The disciplines that contribute to the technical approach are computer science,
management science, and operations research.

14
Computer science is concerned with establishing theories of computability,methods of
computation, and methods of efficient data storage and access.

Management science emphasizes the development of models for decision-makingand


management practices.

Operations research focuses on mathematicaltechniques for optimizing selected parameters of


organizations, such as transportation,inventory control, and transaction costs.

1.2.1.2. Behavioral Approach


An important part of the information systems field is concerned with behavioralissues that arise
in the development and long-term maintenance of informationsystems. Issues such as strategic
business integration, design, implementation,utilization, and management cannot be explored
usefully with the models usedin the technical approach. Other behavioral disciplines contribute
importantconcepts and methods.

For instance, sociologists study information systems with an eye toward how groups and
organizations shape the development of systems and also how systems affect individuals, groups,
and organizations. Psychologists study information systems with an interest in how human
decision makers perceive and use formal information. Economists study information systems
with an interest in understanding the production of digital goods, the dynamics of digital
markets, and how new information systems change the control and cost structures within the
firm.

The behavioral approach does not ignore technology. Indeed, information systems technology is
often the stimulus for a behavioral problem or issue. But the focus of this approach is generally
not on technical solutions. Instead, it concentrates on changes in attitudes, management and
organizational policy, and behavior.

Activity 2
1 What are the approaches toward the study of information systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 What is the emphasis of the technical approach?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

15
3 Does the behavioral approach ignore technology of business information systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT ONE - SECTION THREE


1.3.    The New Roles of Information Systems in Organizations
 Section Objectives
Once you successfully complete the study of this section, you can;
• Describe the evolution of information systems in organizations,
• Explain the new roles of information Systems

Section Overview

Contemporary businesses make an extensive use of modern business information systems.


Nowadays, information system is not only providing information for decision making but they
are also able to perform structured decisions.

Until the 1960s, the role of most information systems was simple: transaction processing, record
keeping, accounting, and other electronic data processing (EDP) applications.Then another role
was added, namely, the processing of all these data into useful, informative reports. Thus, the
concept of management information systems (MIS) was born. This new role focused on
developing business applications that provided managerial end users with predefined
management reports that would give managers the information they needed for decision-making
purposes.By the 1970s, it was evident that the prespecified information products produced by
such management information systems were not adequately meeting the decisionmakingneeds of
management, so the concept of decision support systems (DSS) wasborn. The new role for
information systems was to provide managerial end users withad hoc, interactive support of their
decision-making processes. This support would betailored to the unique decisions and decision-
making styles of managers as they confrontedspecific types of problems in the real world.In the
1980s, several new roles for information systems appeared. First, the rapiddevelopment of
microcomputer processing power, application software packages, andtelecommunications
networks gave birth to the phenomenon of end-user computing. The development and the use of
Internets have brought a drastic change in the use of information systems for global strategy and
has revolutionised our information age from parochial thinking of organisations and nations to
global thinking of the “world as a small village”.

16
Businesses have seen much to achieve the current level of sophisticated use in business
information system. This section will introduce the evolution of business information systems in
organizations and identify the new roles of information systems.

 Business Information Systems evolve from business transaction processing system to


management reporting systems, then to decision support systems and office automation
then to expert systems and strategic management information systems

1.3.1. Evolution of Business Information Systems

Computers began after the 2nd world war and they were largely used to solve complicated
mathematical and scientific problems. During the early 1950s, managers were using manually
processed information to make decisions. The then manual information processing was
characterised by producing reports or getting information using typewriting, handwriting, word-
of-mouth, etc. The manual data processing was changed to machine-assisted data processing
such as using adding machines, calculators, etc. However, after the first commercial computer
was developed in 1951, electronic data processing replaced the machine-assisted data processing.
The first generation of computers was largely used for accounting applications such as order
processing, inventory data and customer accounts. Accounting tasks are routine and repetitive.
Hence, it was the accounting function of business where Computer Based Information System
was first applied.

Business grew in their sizes and activities, and data processing systems were not much helpful to
convert large volumes of accounting data to information. The Accounting Information System
was not a system to provide management with information for analysis, planning and decision
making activities. During that time, managers were overwhelmed with too much data and were
wasting much of their time in searching several pages of lists and tables to find relevant
information they need for decision.

To overcome the limitations of AIS, information specialists attempted to design information


systems useful for analysis, planning and decision-making activities. Particularly, the
improvement in the speed and memory capacity of computers in the early 1960s led information
specialists to assume the possibility of creating an integrated information system that could serve
all the functions of an organisation. However, there was misunderstanding between managers
and information specialists. On one hand, managers knew their jobs and the methods of solving
managerial problems without knowing how to use computers. On the other hand, information

17
specialists knew how to operate computers but they did not have the knowledge and the skill to
identify the information needs of managers.

Even if information specialists developed information systems believing their systems could
serve the purposes of management, managers could not accept the works of these information
specialists because the information systems were not designed based on the information needs of
managers. Later, managers started to explain their information needs to information specialists,
and the information specialists in turn started to learn “ the basics of management and how to
work with managers in designing information systems”. Eventually, Managers started to use
computer application for processing managerial information for decision-making. The new
system enabled managers to produce summary reports in a tabular form and to select data
relevant to the problem at hand. As the result, data processing, which is currently called
Transaction Processing System (TPS), grew to be the foundation of data preparation and
provision for MIS and other managerial information systems.

Today, the concept of BIS is a federation of subsystems developed and implemented as needed,
but conforming to the overall plan, standards, and procedures for the development of Information
Systems for organisational use.

The development of computers, particularly the introduction of PBX communication technology,


completely changed the nature of office works through the process known as office automation.
Office automation changed the nature of jobs of clerks, typists, secretaries and other
professionals. For example, electric typewriters, telephone, etc. became more useful to exchange
information between different offices.

In the mid 1960s, Database Management Systems (DBMS) software was developed to manage
large volume of data in an organisation. Later, around early 1970’s, Decision Support Systems
started and combined the reporting function of MIS, graphic displays & the problem solving
capabilities of management Science. In the 1980s, the introduction of personal computers
brought the realisation of Executive Information System (EIS), by which executives (Top level
Managers) can use computers to graphically display information needed for strategic decisions.
Around the mid 1980s, the Expert System (ES) started. Since then, Expert System has been used
to solve business problems. Expert system is the result of the rapidly growing field of computer
technology called artificial intelligence.

18
The development and the use of Internets in the 1990s have brought a drastic change in the use of
information systems for global strategy and has revolutionised our information age from
parochial thinking of organisations and nations to global thinking of the “world as a small
village”. The following diagram summarises the correlation of the evolution of the development
of information systems with the trend of increase in the capacity and power of computers.

Trend of power of computers in relation to time

Internet Technology: For Strategic Management Information System


Power and capacity of Computers

Expert Systems (Knowledge Base Systems), Executive Support Systems, etc.

DBMS, Decision Support Systems and Office Automation

Management Reporting Systems

Business Transaction Processing System

1950 1960 1970 1980 1990 2000 2010

1st Generation 2nd Generation


3rd Generation 4th Generation

Figure 1-2: Evolution of Computer Based Information System

1.3.2. The new roles of Business Information Systems in Organizations


Information systems perform three vital roles in business firms. These new roles are discussed
here under.

1.3.2.1. Operational and Decision Support

19
Business applications of IS support an organization’s business processes and operations, business
decision making, and strategic competitive advantage. Major application categories of
information systems include operations support systems, such as transaction processing systems,
process control systems, and enterprise collaboration systems; and management support systems,
such as management information systems, decision support systems, and executive information
systems. Other major categories are expert systems, knowledge management systems, strategic
information systems, and functional business systems. However, in the real world, most
application categories are combined into cross-functional information systems that provide
information and support for decision making and also performing operational information
processing activities.

1.3.2.2. Strategy Support


The major role of information systems applications in business is to provide effective support of
a company’s strategies for gaining competitive advantage. This strategic role of information
systems involves using information technology to develop products, services, and capabilities
that give a company major advantages over the competitive forces it faces in the global
marketplace. This role is accomplished through strategic information architecture: the collection
of strategic information systems that supports or shapes the competitive position and strategies of
a business enterprise. So a strategic information system can be any kind of information system
(e.g., TPS, MIS, and DSS) that uses information technology to help an organization gain a
competitive advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives. What has changed, however, is that we now enjoy a much higher level of integration
of system functions across applications, greater connectivity across both similar and dissimilar
system components, and the ability to reallocate critical computing tasks such as data storage,
processing, and presentation to take maximum advantage of business and strategic opportunities.
Because of these increased capabilities, the systems of tomorrow will be focused on increasing
both the speed and reach of our systems to provide even tighter integration, combined with
greater flexibility.

1.3.2.3. E-business Support


The Internet and related technologies and applications have changed the ways businesses operate
and people work, as well as how information systems support business processes, decision
making, and competitive advantage. Thus, many businesses today are using Internet technologies
to Web-enable their business processes and create innovative e-business applications.

20
E-business is a generic-term that refers to all uses of advances in information technologies such
as Internet technologies to work and empower business processes, e-commerce, and enterprise
collaboration within a companyand with its customers, suppliers, and other business
stakeholders. While e-commerce is a narrower term that refers to an electronic execution of a
business transaction.

In essence,e-business can be more generally considered an online exchange of value. Any online
exchangeof information, money, resources, services, or any combination thereof falls underthe e-
business umbrella. The Internet and Internet-like networks—those inside theenterprise (intranet)
and between an enterprise and its trading partners (extranet) —have become the primary
information technology infrastructure that supports thee-business applications of many
companies. These companies rely on e-business applications to (1) reengineer internal business
processes, (2) implement e-commerce systems with their customers and suppliers, and (3)
promote enterprise collaboration among business teams and workgroups.

 Business Information System’s new roles include providing operational support, providing
strategy support and enabling e-business

Activity 3
1 What were the most common business uses of first generation computers?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 The World is now as a Small Village. What initiates the concept? How does it revolutionize our thinking
of organizations?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 What are the new roles of business information systems in organizations?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

21
UNIT ONE - SECTION FOUR
1.4.    Learning to Use Information Systems: New Opportunities with Technology
 Section Objectives
Once you successfully complete the study of this section, you can;
• Identify the opportunities of advances in Information Technology [IT]
• Explain the need to learn to use information systems.

Section Overview
Dear learners, nowadays the advance in information technology has presented an ever increasing
opportunity for those companies that moves early to exploit it. However, it is also presenting a
threat for those companies which lags behind in identifying the new opportunities of information
technology and exploit them. As a result, you as a business professional need to appreciate and
learn the use of Information Systems to exploit new opportunities. Accordingly, in this section
we will discuss the need to learn to use information systems.

IT is no longer the sole domain ofIT professionals. Business professionals can no longer count
solely on IT specialists to makedecisions on development, purchasing, and deployment of
information systems. Today’s businessprofessionals are expected to know how to develop and
use IT significantly more than justa few years ago. Regardless of their major field of expertise,
those who have the proper ITknowledge and skills stand a better chance of receiving more
lucrative job offers and fasterpromotions.
We are accustomed to using 10 digits to represent quantities. We call it the decimal
countingsystem. However, we could also use a system consisting of only two digits, zero and
one, torepresent quantities. This is the binary counting system. Because computers and related
devicesuse the binary system—a system that uses two digits—they are referred to as digital
systems.
However, digital systems are not used only to represent information that contains numbers,
orquantities. They can also represent any information as combinations of zeroes and ones, or,
moreaccurately, the two states that represent zeroes and ones.
Digital information consists of zeroes and ones representing two states. When you have
amechanism that can represent two states, such as electrically charged and uncharged
elements,magnetized and nonmagnetized areas, light and no light, you have a way to represent
the zeroesand ones. Based on such signals, information can be represented, stored,
communicated, andprocessed digitally.

1.4.1. Purpose of Information Systems

22
Inbusiness, people and organizations seek and use information mainly to make sounddecisions
and to solve problems—two closely related practices that form the foundation of everysuccessful
company.
What is a problem? A problem is any undesirable situation. When you are stuck in the middleof
nowhere with a flat tire, you have a problem. If you know that some customers do not paytheir
debts on time, but you don’t know who or how much they owe, you have a problem. Youcan
solve both problems with the aid of information. In the first case, you can call a towingcompany,
which might use a computerized tracking system to send the tow truck closest to yourlocation; in
the second case, simple accounting software can help.

An organization or individual that identifies more than one way to solve a problem or adilemma
must make a decision. The problem “2 + 2 = ?” does not require decision making becauseit has
only one solution. However, as a manager, you might face a dilemma such as “Which isthe best
way to promote the company’s new car?” There are many potential ways to promote thenew car
—television advertising, radio advertising, newspaper advertising, Web advertising, autoshows,
direct mail, or any combination of these methods. This dilemma calls for decisionmaking.
Both problem solving and decision making require information. Gathering the right
informationefficiently, storing it so that it can be used and manipulated as necessary, and using it
tohelp an organization achieve its business goals—all topics covered in this book—are the keys
tosuccess in business today. The purpose of information systems is to support these activities.
Inaddition to solving problems and making decisions, businesses use information systems
tosupport daily operations, such as electronic commerce, making airline reservations, and
manyother activities. As a professional, you need to understand and apply information
fundamentalsto succeed.

1.4.2. The need to learn Information Systems


You might be surprised at how much information technology (IT) knowledge your prospective
employer will expect ofyou when you interview for your next job, even if the position you seek
is not in the IT area. Today’s corporationslook for IT-savvy professionals, and with good reason.
Information is the lifeblood of any organization, commercial ornonprofit; it is essential to sound
problem solving and decision making, upon which business success is built. In fact,the main
factor limiting the services and information that computers can provide within an organization is
the budget.Because of rapid changes in technology, information systems, unlike many other
business components, are quicklychanging in form and content. A computer considered fast and
powerful today will be an outdated machine in 18–24months. In 12–24 months, a better program
will surpass one that is considered innovative right now. The dynamicnature of information
technology is like a moving target. A professional who does not stay informed is of
diminishingvalue to an organization. All knowledge workers—professionals, scientists,
managers, and others who create newinformation and knowledge in their work—must be
23
familiar with IT. Moreover, they must know which IT is relevant fortheir work and what
information they can obtain with a certain technology or networked resource.
Professionals must at all times maintain a clear picture of their organizations and the outside
businessenvironment. They must know what resources are available to them and to their
competitors. Information technologyprovides excellent tools for collecting, storing, and
presenting facts. But to be truly effective, those facts must bemanipulated into useful information
that indicates the best allocation of various resources, including personnel, time,money,
equipment, and other assets. Regardless of the operations being managed, information systems
(ISs) areimportant tools. Successful professionals must know which ISs are available to their
organizations and what systemsmight be developed in the future.

Activity 4
1 Why do we refer computers and related devices as digital systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Business use information to make sound decisions and to solve problems. What is problem? What kind
of problems requires individuals to make decisions?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Why do companies look for IT-Savvy professionals?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT ONE - SECTION FIVE


1.5.    Subsystems of an Information System
 Section Objectives
Once you successfully complete the study of this section, you can;
• Identify the sub-systems of an information system
• Explain the purpose of each of the sub-systems of information systems

Section Overview

24
Dear learners, different types of information systems serve different functions—for particular
types of organizations, functions within organizations, business needs, and management levels of
anorganization. Business enterprises differ in their objectives, structure, interests, and
approaches.

However, ISs can be generally categorized based on the level of a system’s complexity and
thetype of functions it serves. ISs in business range from the basic transaction processing system
thatrecords events such as sales to sophisticated expert systems, which provide advice and reduce
theneed for the expensive services of a human expert. In recent years the capabilities of
manyapplications have been combined and merged. It is less likely that you will find any of
thefollowing applications as stand-alone systems with a single capability. Managers and
otherprofessionals plan, control, and make decisions. As long as a system supports one or more
ofthese activities, it may be referred to as a management information system (MIS) and the
individual systems performing a specific activity its subsystems. In this section we cover the
basic sub systems of business information systems.

1.5.1. Transaction Processing Systems


Transaction processing systems (TPSs) are the most widely used informationsystems. The
predominant function of TPSs is to record data collected at theboundaries of organizations, in
other words, at the point where the organizationtransacts business with other parties. They also
record many of thetransactions that take place inside an organization. For example, they
recordthe movement of parts from one phase of manufacturing to another, fromraw materials to
finished products. TPSs include POS machines, whichrecord sales; automatic teller machines,
which record cash withdrawals,deposits, and transfers; and purchase order systems, which record
purchases.
After these data elements are collected, theIS can automatically process the data immediately and
store it for lateraccess on demand. Transaction processing systems provide most of the datain
organizations for further processing by other ISs. The most typical transaction system is
accounting information system.

1.5.2. Supply Chain Management Systems


The term “supply chain” refers to the sequence of activities involved in producing and selling
aproduct or service. In industries that produce goods, the activities include marketing,
purchasingraw materials, manufacturing and assembly, packing and shipping, billing, collection,
andafter-the-sale services. In service industries, the sequence might include marketing,
documentmanagement, and monitoring customer portfolios. An information system that supports
theseactivities and is linked to become one large IS providing information on any stage of a
businessprocess is called supply chain management (SCM) systems.

25
Often, such systems are called enterprise resource planning (ERP) systems, becausethe
information they provide supports the planning of shipping resources such as personnel,funds,
raw materials, and vehicles. However, ERP is a misnomer for the systems, because theymainly
serve managers in monitoring and modifying business processes as they occur, and notonly for
planning. The term “supply chain,” too, is somewhat misleading. Business processes donot
always take the form of a sequence; some processes take place in parallel. This is true
inmanufacturing, where two or three teams work on different parts of a product, and in
services,where two or three different people peruse a document online and add their input to it
withina certain period of time rather than sequentially. In the production of goods and services,
somemodules of SCM systems provide support to the major processes. These components
includehuman resources (HR) information systems and cost accounting systems.

ERP is an integrated enterprise application because the systems that support each business
process areconnected to each other to form one large IS. Technically, anyone with access to the
system canknow the status of every part of an order received by the business: whether the raw
materialshave been purchased, which subassemblies are ready, how many units of the finished
producthave been shipped, and how much money has been billed or collected for the order.
HRmanagers can tell which workers are involved in any of the processes of the order.
Accountantscan use their module of the system to know how much money has been spent on the
order andwhat the breakdown of the cost is in labor, materials, and overhead expenditures.

1.5.3. Customer Relationship Management Systems


Customer relationship management (CRM) systems help manage an organization’s
relationshipswith its customers. The term refers to a large variety of information systems,
fromsimple ones that help maintain customer records to sophisticated systems that
dynamicallyanalyze and detect buying patterns and predict when a specific customer is about to
switch to acompetitor.
The main goals of CRM systems are to increase thequality of customer service, reduce the
amount of labor involved in serving customers, and learnas much as possible about the buying
habits and service preferences of individual customers.
CRM systems are often linked to Web applications that track online shopping and processonline
transactions. Using sophisticated applications, a company can learn what makes acustomer balk
just before submitting an online order, or what a customer prefers to see displayedon Web pages.

1.5.4. Business Intelligence Systems


ISs whose purpose is to glean from raw data relationships and trends thatmight help
organizations compete better are called business intelligence(BI) systems. Usually, these
applications consist of sophisticated statisticalmodels, sometimes general and sometimes tailored
for an industry or an organization. Theapplications access large pools of data, usually
transactional records stored in large databasescalled data warehouses. With proper analysis
26
models, BI systems might discover particularbuying patterns of consumers, such as combinations
of products purchased by a certaindemographic group or on certain days; products that are sold
at faster cycles than others; reasonsfor customer’s churns, that is, customers leaving a service
provider for a competitor; and othervaluable business intelligence that helps managers quickly
decide on changing a strategy.

1.5.5. Decision Support and Expert Systems


Professionals often need to select one course of action from many alternatives. Because they
haveneither the time nor the resources to study and absorb long, detailed reports of data
andinformation, organizations often build information systems specifically designed to help
makedecisions. These systems are called decision support systems (DSSs). While DSSs rely
onmodels and formulas to produce concise tables or a single number that determines a
decision,expert systems (ESs) rely on artificial intelligence techniques to support knowledge-
intensivedecision-making processes.

Decision support systems help find the optimal course of action and answer “What if?”questions.
“What if we purchase raw materials overseas? What if we merge our warehouses?What if we
double our shifts and cut our staff?” These questions seek answers like, “This is howthis action
will impact our revenue, or our market share, or our costs.” DSSs are programmed toprocess raw
data, make comparisons, and generate information to help professionals glean thebest
alternatives for financial investment, marketing strategy, credit approval, and the like.
However, it is important to understand that a DSS is only a decision aid, not an
absolutealternative to human decision making.

Using ESs preserves the knowledge of retiring experts and saves a company the high cost
ofemploying human experts. After gathering expertise from experts and building a program,
theprogram can be distributed and used repeatedly. The expertise resides in the program in the
formof a knowledge base consisting of facts and relationships among the facts.

1.5.6. Geographic Information Systems


In some cases, the information decision makers need is related to a map or floor plan. In
suchcases, special ISs called geographic information systems ( GISs ) can be used to tie data
tophysical locations. A GIS application accesses a database that contains data about a
building,neighbourhood, city, county, state, country, or even the entire world. By representing
data on amap in different graphical forms, a user is able to understand promptly a situation
taking placein that part of the world and act upon it.

Activity 5
1 Which sub-systems of business information systems deals with recording data collected at the

27
boundaries of organization?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Supply chain management systems are also called ERP Systems. What is an ERP system? Do you agree
the naming Supply Chain and ERPs express the potentials of such systems? ( Why? or Why not?)
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Distinguish Decision Support Systems from Expert Systems?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT ONE - SECTION SIX


1.6.    Information System Resources
 Section Objectives
Once you successfully complete the study of this section, you can;
• Identify the different activities performed by an information system
• Explain the resources needed to perform such activities

Section Overview
Dear learners, information systems basically organizations to perform five activities and to
perform such activities they require four resources. The activities of information systems and the
resources needed to perform them are discussed here under.

1.6.1. Information System Activities


A typical Information System will enable organizations to perform the following 5 major
activities. These are
1. Input of data resources – capturing & preparing of events for processing activities of
recording & editing.
2. Processing of data into information- this is the calculation, comparison, sorting, classifying
& summarising of data to prepare reports for management.
3. Output of information products – information products are video displays, paper with
messages, forms, reports, listings, graphics, etc.

28
4. Storage – Storage is retaining data & information in an organized manner for later use.
Stored data is commonly organized into fields, records, files & databases.
5. Control of system’s performance: inputs, processing output and storage activities an
information system are needed to be monitored & evaluated to determine the sequences of
operations or if the system meets established performance standards. Information security is
one aspect of the controlling activity that allows the organisation to control and protect its
database/information base. The Chief Information Officer (CIO) is responsible to decide the
access of information such as who should get what information.

1.6.2. Information System Resources


A typical Information System will enable organizations to perform the above 5 major activities
using the following 4 resources. These are

1. Hardware resources – includes all physical devices and materials used in information
processing. It includes not only machines, such as computers and calculators, but also all data
media – that is, all tangible objects on which data is recorded- from sheets of paper to
magnetic disks, filing cabinets and paper trays are one form of hardware for manual data
storage.
2. Software resources – includes all sets of information processing instructions. Software
resources include Programs, which are the sets of operating instruction that direct,&
control computer hardware, and procedures which are the sets of information processing
instruction needed by people. This includes manuals that explain how to operate a computer
system or how to use an application software package. In manual information processing
there are instructions how to fill an application form or a material requisition form.
3. People resources – people resources refer to specialists & end users of information systems.
Specialists are people like system analysts, programmers and computer operators that
develop and operate information systems. End users are people like managers, accountants,
salespersons, engineers, clerks, customers that use the products of information systems.
4. Data Resources – managers & information systems professionals realise that data &
information constitute valuable organisational resources. For example, students name, region,
sex, entrance examination results, grades, etc are data resources that need to be stored in any
form for making different kinds of decisions on the performance of a student in his college
life.

Activity 6
1 Discuss the 5 major activities of a typical information system?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

29
2 Among the different business functions constituted in a company, which business function is
responsible to decide access to information?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Information systems require different resources. Identify the typical resources required by
information systems to perform their basic activities.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT ONE - SECTION SEVEN


1.7. Different Schools of thought view toward the value of information
 Section Objectives
Once you successfully complete the study of this section, you can;
• Identify the different views in identifying the values of information
• Explain the various dimensions used in measuring the value of information

Section Overview
Dear learners, the values of Information can be measured in terms of quality or in terms of
quantity. Quality measures the subjective assessment and interpretation of specific information
an individual uses. However, in most cases it is difficult to measure information quantitatively
because, in reality, managers make decisions by dealing with many uncertain events, which are
difficult for accurate prediction, in the environment. In general, qualitative measure of
information relies on the level of satisfaction that a decision maker has on the information. In
this part we discuss what factors improve the quality of information from the perspective of the
decision maker.

1.7.1. Quality of Information


Quality of information depends on the subjective assessment of the individual who is using the
information. Since it is difficult to define what quality means, it is important to indicate some
aspects of quality of information in terms of the perception of the decision-maker. The decision
maker views quality of information in terms of utility, satisfaction created, and the extent of error
and bias inherent in the content of the information. The value of information decreases or

30
information becomes unimportant if it is outdated, inaccurate or difficult to understand. For a
manager, to attach a value of high quality, the information used should satisfy the following
qualities.
 Timeliness: Information should be available for problem solving, before crisis situations get
out of hand or opportunities are lost. It is not enough to provide management with historical
or (backward looking) information and analysis. Though historical data are useful for
controlling purposes, forward information that indicates trends developing inside and outside
organisation must also be provided. To satisfy the quality of timeliness, information should
be up-to-date (current).
 Accessibility: Information should be available at the time of need, and should be provided as
often as needed (frequency). Therefore, an information system can be designed to provide
information whenever a manager wants it (demand reporting), whenever specified conditions
occur (exception reporting) or at regular intervals (periodic reporting).
 Security: Information of an organisation should be protected from unauthorised intruders,
from viruses designed to damage or distort the data resource of the organisation. Hence,
information systems should be designed with facilities, such as passwords, crucial to
maintain security of data and information resources of the organisation.
 Accuracy: Ideally all information should be accurate or free of errors or bias. It is true
thatmost information obtained from the operational level of the organisation or information
obtained from activities involving money such as payroll, billing, and accounts receivable
can be 100% accurate. However, it is difficult to have 100% accurate information to make
strategic and tactical decisions. At the time of decision-making, managers allow a certain
margin of errors when they use long-range economic forecasts and statistical reports as
information.
 Economical: the degree of accuracy of information increases as the organisation spends
more to obtain additional information. Therefore, managers need to balance between the cost
of obtaining information and the level of accuracy needed.
 Relevancy- Information is relevant when it pertains to the problem at hand or to a specific
situation. The manager should obtain the needed information without searching a large
volume of information. One has to avoid unnecessary information, and the information
should be concise and to the point as much as possible.
 Completeness: The manager should be able to obtain information that presents a complete
picture of a problem or a solution. Any information when presented should be clear and easy
to understand. Thus systems should not be designed that drown a manager in a sea of
information. The term information overload hints the problem created as a result of too much
information. The manager should be able to determine the amount of detail needed whenever
s/he deals with problems.

Activity 7

31
1 There are different approaches towards measuring the value of information. How do managers
ascertain the value of information? Which measure is easy to apply? (Why?)
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Identify the factors that improve the quality of information from the perspective of a decision maker.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 What is information overload? What is its problem in decision making?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

 UNIT SUMMARY
Businesses use the conceptual resource i.e information to manage and control the physical
resources of their organizations using business information system.

 Business Information System refers to the system that collect, store and process data to
produce information about the business useful for making various business decisions.

Business Information Systems can be manual or computerized Systems. In general, Modern


Business Information Systems are information systems made up of people, procedures and
Information and communication technologies that collect, store and process data about the
business to produce information useful for managers to make decisions.

Data is a raw fact or figure and can take a form of a number or a date. Data is often meaningless
or it does not provide knowledge to make a specific decision. Information is a knowledge or
meaning derived from data.

 Information is a representation that is relevant, timely, consistent, reliable, objective


understandable.

A System is a set of two or more interrelated components or sub-systems which interacts each
other to serve a common goal or purpose.

32
 An open system is a system that interacts with other systems in its environment.

Business Information System is “a comprehensive and co-ordinated set of information


subsystems which are rationally integrated and which transform data into information in a
variety of ways to support operations, management, and decision-making functions in a business
organization”

Information Systems are socio-technical systems where by humans, technologies and


organizations interact resulting in a complex phenomenon created through their interaction. As a
result, no single approach would suffice to model information systems. Hence, technical and
behavioral approaches are used in the study of information systems.

Business Information Systems evolve from business transaction processing system to


management reporting systems, then to decision support systems and office automation then to
expert systems and strategic management information systems

Business Information System’s new roles include providing operational support, providing
strategy support and enabling e-business

A typical Information System will enable organizations to perform the 5 major activities i.einput,
process, storage, output and control activities using the 4 resources i.e., Hardware, Software,
People and Data.

The values of Information can be measured in terms of quality or in terms of quantity.

Checklist
Now that you have completed the first unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Ca Know the meaning and definition of Business Information Systems
n Identify the features of manual and computerized Business Information Systems
Yo Differentiate between data and information
u Know the approaches that contribute to the problems, issues, and solution in the
study of information systems.
Distinguish contemporary approaches used in the design of information systems
Describe the evolution of information systems in organizations
Explain the new roles of information systems

33
Identify the opportunities of advances in IT
Explain the need to learn to use ISs
Identify the sub-system of an Information System
Explain the purpose of each of the sub-systems of information systems
Identify the different activities performed by an information system
Identify the Information system resources,
Identify the different vies in identifying the values of information
Explain the various dimensions used in measuring the value of information

Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!

 SELF-TEST EXERCISE (SELF-ASSESSMENT QUESTIONS)

Part I: Multiple Choices

Direction: Choose the best answer from the given alternatives

1. Which one of the following best describes the system that collect, store, and process data
to produce information about the business useful for making various business
decisions?
A.
B. Transaction Processing D. organization,
System, E. Information System,
C. Business Information System, F. None of the above.
2. Identify the incorrect component of a modern business information system?
A. People, D. Document,
B. Procedure, E. None of the above.
C. Data,
3. A system that interacts with other systems in the environment is best described as,
A. Open system, D. Supera System,
B. Closed system, E. None of the above.
C. Subsystem,
4. Which one of the following approach in the study of information system emphasize
mathematical based models to study information systems?
A. Technical, D. Socio-technical,
B. Behavioral, E. None of the above.
C. Contemporary,
5. In evolution of BIS, which of the following identifies its latest stage?;
A. Transaction Processing System,

34
B. Expert System,
C. Decision Support System,
D. Strategic Management Information System,
E. None of the above.
6. Which one of the following is not BIS’s new role?

A. Operation Support, D. E-Business,


B. Strategy Support, E. None of the above.
C. Decision Support,
7. Identify the enterprise software application that integrates the various business function
to one large Information system
A. TPS, D. BIS,
B. ERP, E. None of the above.
C. CRM,
8. Which one of the following IS activities are used to capture and prepare transactions or
events for processing?
A. Process D. Storage
B. Output E. None of the above.
C. Input
9. Identify the IS resources that includes all physical devices and materials used in
information processing;
A. Software D. Data
B. People. E. All of the above.
C. Procedure
10. Which one of the following quality of information requires information to be up-to-date
(Current)?
A. Accessibility
B. Security
C. Accuracy
D. Timeliness,
E. None of the above.
Part II: Matching

Direction: Choose the best answer from the given alternatives

Column One Column Two


1 A conceptual business resource used to manage and control physical A Entropy
resources
2 Groups of non-random symbols that represent quantities, actions… B CRM
3 Set-of two or more interrelated components with common goal. C Strategy Support
4 The coordination of the activities of the sub-systems of a system to D CIO
create value greater than the value of the inputs
5 The deterioration of the performance of a system through time E Information

35
6 BIS role that support competitive advantage F BIS
7 The sequence of activities involved in producing and selling a G Supply Chain
product or service.
8 System helps manage an organization’s relationship with customers H Synergy
9 A manager responsible for information System I GIS
10 An information quality to protect information from hackers J Data
K E-Commerce
L System
M Security
N Computer
O None of the
forgoing

Part III: True or False

Direction: Say true or false for the following statements.

1. Quantitative value of information depends on the subjective assessment of the individual


who is using the information.
2. Hardware, Software, People and Data are the valuable information system activities of a
business.
3. A GIS application accesses a database that contains data about a building,neighbourhood,
city, county, state, country, or even the entire world.
4. Expert Systems preserve the knowledge of retiring experts and save a company the high
cost ofemploying human experts.
5. Business Intelligence systems might discover particularbuying patterns of consumers.
6. Supply chain does not imply business processes always take the form of a sequence.
7. The problem “2 + 2 = ?” does not require decision making becauseit has only one
solution.
8. e-business is an online exchange of value
9. Intranet is a network that connects the internal networks of two different companies
where as extranet is an international network.
10. E-business is a generic term where as e-commerce is a narrower term.

36
FEED BACK/ANSWER KEY
For Activities and
Self-Test Exercise (Self-Assessment Questions)

Answer Key for UNIT ONE

A. Answer for Activities

Feed Back/Answer for Activity 1


1. We cannot tell. The fact is inadequate to conclude on his performance. It is meaningless
to reach the required decision. We did not know whether his performance is good or bad.
2. He has performed badly. The expected output was 250 units but he actually produced
only 200 units. As a result his performance is not good. It is under performance.
3. The fact presented in the first question was data because it is meaningless. It provides us a piece
of fact, which as such does not provide answer for the problem. However, the fact in the second
question illustrated information. This is because it gives us meaning/knowledge and enabled us to
make the decision. Information is a processed data or a data placed within its own context.

Feed Back/Answer for Activity 2

1. The approaches towards the study of information system are two. The first one is the
technical approach that emphasizes on mathematical based models where as the second
one is the behavioral approach that emphasizes on behavioral issues that arise in the
development and long-term maintenance of information systems.
2. The emphasis of the technical approach is on mathematical based models derived from
computer science, management science and operations research.
3. The behavioral approach does not ignore technology. Instead it takes technology as the
stimulus for behavioral problem. But the focus of this approach is generally not on
technical solutions.

37
Feed Back/Answer for Activity 3
1. The first generation computers were largely used for accounting applications.
2. The development of internet have brought a drastic change to the use of information
system for global strategy and has revolutionized our information age for parochial
thinking of organizations and nations to global thinking of the “world as a small village”
3. The new roles of business information systems are operational and decision support,
Strategy support, and e-business support.
Feed Back/Answer for Activity 4
1. Computers and related devices are referred as digital systems because they use the
binary system of counting that uses only two symbols. These are 0 and 1.
2. A problem is any undesirable situation. Problems that involve more than one way of
solving or dilemma among alternatives require decision.
3. Companies look for IT-Savvy professionals because nowadays information is the
lifeblood of any organization as it is essential to sound decision making. Besides,
there is a rapid change in technology. A professional who does not stay informed is of
diminishing value to the organization.
Feed Back/Answer for Activity 5
1. Transaction Processing Systems [TPSs] deals with recording data collected at the
boundaries of organization.
2. ERP stands for Enterprise resource planning and it refers to enterprise application
solution that integrates most of the business functions of a company in to a large
system. No the terms supply chain and ERP has limitations.
 Supply chain refers to series of business activities. However, business process
does not always take a form of sequence. It could be parallel.
 ERP is not only a planning system. It helps managers in monitoring and
modifying business processes.
3. Decision Support Systems [DSS] rely on models and formulas to produce concise
tables or a single number that determines a decision where as Enterprise Systems
[ES] rely on artificial intelligence techniques to support knowledge intensive decision
making.
Feed Back/Answer for Activity 6
1. Information systems perform the following 5 typical activities. They let us to capture
and enter data as an input. They let us to store the data captured as an input. They
assist us to retrieve and process the data into information. They let us to display the
information as an output. Finally they enable us to provide adequate control regarding
data and information of the business.
2. Nowadays, a new business function called information system headed by Chief
Information Officer [CIO] is surfacing in business structure to deal with system
administration, computer operations, program development and maintenance. This

38
function is responsible to decide who shall have access to the computer system, to do
what and on which resources.
3. The typical resources required by information systems to perform their basic
activities are hardware, software, people and data.
Feed Back/Answer for Activity 7
1. The value of information can be assessed using qualitative aspects and quantitative
aspects. Qualitative aspects measure some attributes of the information like its
accuracy, timeliness, predictive value, relevance, verifiability, objectivity and so on.
However, quantitative measures aim to assign quantitative figures or monetary values
to the information.
2. The factors that improve the quality of information from the perspective of decision
makers include timeliness, accessibility, security, accuracy, relevance, and
completeness.
3. Information overload is the situation that arises when a decision maker is provided
with too much information. Information overload is as detrimental as providing too
few information. This is because when the decision maker tries to absorb the
information it will be tied up and reduces quality of decision.

Answer for Self-Test Exercise (Self-Assessment Questions


 Part I: Multiple Choices
1 B 3 A 5 D 7 B 9 E
2 D 4 A 6 C 8 C 10 D
 Part II: Matching
1 E 3 L 5 A 7 G 9 D
2 J 4 H 6 C 8 B 10 M
 Part III: True or False
1 F 3 T 5 T 7 T 9 F
2 F 4 T 6 F 8 T 10 T

39
UNIT TWO

Information Technology (IT) and Organizations

Unit Introduction

Dear learners, welcome to the second unit of this course! This part is designed to acquaint
you to the development of Information Technology [IT] and its use in organizations. This
unit is about the constituents of modern computer systems: Hardware, Software and
Information and Communication Technologies. Dear students, as a management major, you
may not need to know the detailed history of the development of computer technology. In this
unit, you are going to read how computers perform the basic information processing activities.

Information Technology and organizations influence one another. Informationsystems are built
by managers to serve the interests of the business firm.At the same time, the organization must
be aware of and open to theinfluences of information systems to benefit from new technologies.

The interaction between information technology and organizations iscomplex and is influenced
by many mediating factors, including the organization’s structure, business processes, politics,
culture, surrounding environment, and management decisions. You will need to understand
howinformation systems can change social and work life in your firm. You willnot be able to
design new systems successfully or understand existing systemswithout understanding your own
business organization.

Every computer system, either main frame computer or microcomputer' consists the hardware
and the software parts. Computer hardware is defined as “a system of interrelated components
that supports the basic system functions of input, processing, output storage & control" to
provide "end users with a powerful information processing tool”. Computer software is
sequences of instructions that direct the operations of the computer hardware to perform the
basic system functions. No computer system exists with having hardware but not software or
vice versa. An advanced computer system needs both computer and communication hardware
and software to effectively serve its purpose.

This chapter has five sections. Section one introduces the major trends in information
technology. Section two describes the major features of computer hardware, data representation,
classification and generations of computers. In addition, it discusses the major components of
computer hardware system in relation to the five major activities of information systems. Section
three discusses the two major types of software, which are the system software and the

40
application software. Section four introduces the management of data emphasizing on the file
based and database systems. Section five describes the communication network and discusses the
mechanisms of communication and the different types of topologies of computer networks.

Unit Objectives
 After studying this unit, you should be able to:

 explain the basics of computer system,

 know how data is represented in a computer system,

 describe the subsystems of a computer hardware system,

 describe the generations and the classification of computers,

 describe the types of computers' software,

 Identify file storage and management approaches

 Describe database designing procedures

 Define the terminologies of Computer Networks and Internet

 explain how the telecommunication technology is used in data transmission


between computers

 Distinguish between Local Area Networks and Wide Area Networks

UNIT TWO - SECTION ONE


2.1. Information Technology Trends
 Section Objectives
 At the end of this section you should be able to:
• distinguish between the Information Technology, Information and
Communication Technology and Information Systems
• Understand the different views of organizations
• Relate organizations and Information Technologies
• describe the trends in Information Technology

41
Section Overview

We are living in revolutionary times, a revolution brought on by dramatic advancesin


information technology. If the steam engine, a new form of power, andmechanization created an
Industrial Revolution over 150 years ago, computers and communications equipment have
produced a Technology Revolution in thelast half of the twentieth century.

In the Technology Revolution we have seen the rapid adoption of many innovations including
mainframe computers, minicomputers, personal computers, networks, the Internetand World
Wide Web, assembly language, higher level languages, fourth generationlanguages, spreadsheet
programs, word processors, packaged programs,and Web browsers. In the Technology
Revolution, companies use IT as a newsource of energy for processing and accessing
information. This technology helpsthe organization collect, store, retrieve, and apply knowledge
to solve problems;IT converts the raw material of information into useable knowledge. The
TechnologyRevolution, like the Industrial Revolution, has changed the economy, creatingnew
industries and ways of doing business.

The computer has been called "the machine that changed the world." We believethat information
technology has and will continue to revolutionize management.

To name a few contributions, IT


• Provides new ways to design organizations and new organizational structures.
• Creates new relationships between customers and suppliers who electronically
link themselves together.
• Presents the opportunity for electronic commerce, which reduces purchasing cycle
times, increases the exposure of suppliers to customers, and creates
greaterconvenience for buyers.

 Information technology refers to all forms of technology applied to processing, storing,


and transmitting information in electronic form. The physical equipment used for this
purpose includes computers, communications equipment and networks, fax machines,
and even electronic pocket organizers. Information systemsexecute organized
procedures that process and/or communicate information.

2.1.1. Defining Information Technology and Organizations

Information Technology [IT], Information Systems [IS] and Information and Communication
Technology [ICT] are often used interchangeably in practice. Though their difference is subtle it
will be wise to distinguish among the three.

42
2.1.1.1. What is IT, ICT and IS?

IT is often used to describe a stand-alone computer hardware and software.

 A computer is an electronic device, operating under the control of instructions stored


in its own memory, that can accept data, process the data according to specified rules,
produce results, and stores the results for future use.

Computers process data (input) intoinformation (output). Computers carry outprocesses using
instructions, which are the stepsthat tell the computer hardware how to perform a
particulartask.A computer contains many electric, electronic,and mechanical components known
as hardware.These components include input devices, outputdevices, a system unit, storage
devices, and communicationsdevices.

 A collection of related instructionsorganized for a common purpose is referred toas


software.

A computer often holds data, information,and instructions in storage for futureuse. Some people
refer to the series of input,process, output, and storage activities as theinformation processing
cycle.

ICT, in contrast is used to describe a group of computers that operate together via
communication hardware and software. Most computers today communicate withother
computers. As a result, communicationsalso has become an essential element of theinformation
processing cycle. IT and ICTs are now a day’s used interchangeably. Information System [IS]
often used to describe an IT or ICT that is particularly applied in the day to day operations of
businesses or other forms of organizations.

2.1.1.2. What is an Organization?

An organization is a stable, formal social structure that takes resourcesfrom the environment and
processes them to produce outputs. This technicaldefinition focuses on three elements of an
organization. Capital and laborare primary production factors provided by the environment. The
organization(the firm) transforms these inputs into products and services in a productionfunction.
The products and services are consumed by environments in return for supply inputs.

Organizations are formal legal entities with internal rules and proceduresthat must abide by laws.
Organizations are also social structures becausethey are a collection of social elements, much as
a machine has a structure—aparticular arrangement of valves, cams, shafts, and other parts.

This definition of organizations is powerful and simple, but it is not verydescriptive or even
predictive of real-world organizations. A more realisticbehavioral definition of an organization is

43
a collection of rights, privileges, obligations,and responsibilities delicately balanced over a
period of time throughconflict and conflict resolution.

In this behavioral view of the firm, people who work in organizations developcustomary ways of
working; they gain attachments to existing relationships;and they make arrangements with
subordinates and superiors about how workwill be done, the amount of work that will be done,
and under what conditionswork will be done. Most of these arrangements and feelings are not
discussedin any formal rulebook.

2.1.1.3. Organizations and Information Technology

How do these definitions of organizations relate to information systemstechnology? A technical


view of organizations encourages us to focus onhow inputs are combined to create outputs when
technology changes areintroduced into the company. The firm is seen as infinitely malleable,
withcapital and labor substituting for each other quite easily. But the more realisticbehavioral
definition of an organization suggests that building newinformation systems, or rebuilding old
ones, involves much more than atechnical rearrangement of machines or workers—that some
informationsystems change the organizational balance of rights, privileges,
obligations,responsibilities, and feelings that have been established over a long periodof time.

Changing these elements can take a long time, be very disruptive, andrequires more resources to
support training and learning. For instance,the length of time required to implement a new
information system effectivelyis much longer than usually anticipated simply because there is
alag between implementing a technical system and teaching employees andmanagers how to use
the system.

Technological change requires changes in who owns and controlsinformation, who has the right
to access and update that information, andwho makes decisions about whom, when, and how.
This more complex viewforces us to look at the way work is designed and the procedures used
toachieve outputs.

2.1.1.4. Information Technology Trends

There are major trends that have drastically altered the way organizationsuse technology. These
trends make it imperative that a manager become familiarwith both the use of technology and
how to control it in the organization.These trends are summarized as follows:

1. The use of technology to transform the organization.

44
The cumulative effectof what all the technology firms are installing is to transform the
organizationand allow new types of organizational structures.
In other cases the firm is totally different after the application of technology.This ability of
information technology to transform organizations is one ofthe most powerful tools available
to a manager today.
2. The use of information processing technology as a part of corporate strategy.
Firms are implementing information systems that give theman edge on the competition.
Firms that prosper in the coming years will be managedby individuals who are able to
develop creative, strategic applications of thetechnology.
3. Technology as a pervasive part of the work environment.
From the largestcorporations to the smallest business, we find technology is used to
reducelabor, improve quality, provide better customer service, or change the waythe firm
operates.
4. The use of technology to support knowledge workers.
The personal computerhas tremendous appeal. It is easy to use and has a variety of powerful
softwareprograms available that can dramatically increase the user's productivity.When
connected to a network within the organization and to the Internet, it isa tremendous tool for
knowledge workers.
5. The evolution of the computer from a computational device to a medium forcommunications.
Computers first replaced punched card equipment andwere used for purely computational
tasks. From the large centralized computers,the technology evolved into desktop, personal
computers. Whenusers wanted access to information stored in different locations,
companiesdeveloped networks to link terminals and computers to other computers.
6. The growth of the Internet and World Wide Web.
The Internet offers a tremendousamount of information on-line, information that you can
search fromyour computer. Networks link people and organizationstogether, greatly speeding
up the process of communications. The Internetmakes expertise available regardless of time
and distance, and provides accessto information at any location connected to the Internet.
Companies canexpand their geographic scope electronically without having to open
branchoffices. The Internet leads naturally to electronic commerce-creating newways to
market, contract for, and complete transactions.

Activity 1
1 What contribution does the machine that changed the world has for business organizations and their
management?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Define IT, ICT and IS. Try to differentiate the three.

45
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Identify and list the major trends of Information Technology that have drastically altered the
way organizations use technology.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT TWO - SECTION TWO


2.2. What is Computer Hardware system?
 Section Objectives
 At the end of this section you should be able to:
• List major hardware components of computers and explain their functions.
• Classify computers into major categories, and identify their strengths and
weaknesses.
• Identify and evaluate key criteria for deciding what computers or related
devicesto purchase.

Section Overview

At the core of any modern information system stands at least one computer. Few machines have
changed human life as radically as the computer, and few such complex machines have become
so affordable to so many businesses and individuals in such a short time. Because computers are
central to information systems and to business, to successfully implement ISs, you need to
understand them. Businesses have many hardware choices, ranging from types of computers and
memory devices to input and output devices. Understanding the capabilities of hardware and the
options available can save companies millions of dollars. This section provides you with the
knowledge to make intelligent decisions about computer hardware in your professional career.

 A computer hardware is defined as “a system of interrelated components that supports


the basic system functions of input, processing, output storage & control" to provide
"end users with a powerful information processing tool”.

46
2.2.1. General Overview

Dear students, do you know that computer hardware understand only electronic signals of binary
digits of 1 and 0 (“On” and “Off”)? Before you read the hardware parts, it is essential to grasp
some idea how data is represented in computer hardware.

2.2.1.1. Data Representation in a computer system

In general, “Data is processed and stored in a computer system through the presence or absence
of electronic or magnetic signals in the computer circuitry or in the media it uses. The smallest
possible electronic data is a bit [binary digit] and it is represented by ‘on’ or ‘off’ in the
electronic system of the computer. This is called a binary or two-sate representation of data. The
‘on’ is symbolized by 1 and the ‘off’ is symbolized by 0. Each symbol in a binary number (one
or zero) is called a binary digit. The way to represent many different characters using only binary
digits is to take sets of 0s & 1s and establish a code such that a certain pattern of 0s & 1s
represent A, another pattern of 0s and 1s represent B, etc. In addition, a computer stores picture
by creating a grid overlay of the picture and it measures the light or colour in each box or cell
called pixel (picture element).

In this regard, we discuss two standard coding schemes that combine bits in definite patterns to
represent different characters.

1. ASCII (American Standard Code for Information Interchange).

American National Standard Institute (ANSI) developed this coding scheme. ASCII is a 7-
bit code allowing 27 or 128 different code combinations. Practically all computers use a set
of 8 bits to encode a character. ASCII itself, by adding an extra meaningless bit, fills the 7-
bits to an 8-bits space. ASCII coding scheme is used in almost all microcomputers and many
minicomputers.

2. EBCDIC (Extended Binary Coded Decimal Interchange Code):

IBM developed this coding system. EBCDIC is an 8- bit coding schemes used on many
minicomputers and almost all mainframe computers. Eight bits allows 28 or 256 possible
code combinations.

In both coding systems, we simply add a binary number one to the binary code of the previous
letter to get the code of the next letter or number. For example, to find the letter D in EBCDIC
binary code, simply add 1 to 11000011 (binary code of C) to find 11000100 (Binary code of D).
The following table shows the examples of the two coding systems to represent some of the
capital and small letters and some of the numbers.
Characters ASCII Coding EBCDIC coding
A 01000001 11000001

47
B 01000010 11000010
C 01000011 11000011

a 01100001 10000001
b 01100010 10000010

0 00110000 11110000
1 00110001 11110001
2 00110010 11110010
9 00111001 11111001

2.2.1.2. Memory Capacity of a Computer

The memory capacity of a computer's primary storage and its secondary storage devices is
usually expressed in terms of bytes.

 A byte is collection of related bits. A byte is made of approximately 8 bits. A byte


represents characters, letters, symbols that are meaningful to humans.

For example, if we read 1.44 MB on a floppy disk it is to mean that the floppy disk has a space
of one million and forty four thousand bytes or it can store one million forty four thousand
characters. In summary, 8 bits = 1 byte = 1 character. The relationship between bit, byte,
kilobyte, megabyte, gigabyte and terabyte is shown as follows.

8 bits = 1 Byte

210 byte = 1000 bytes1 = Kilobytes (KB)

220 bytes  1 million bytes = Megabyte (MB)

230  1 Billion bytes = Gigabyte (GB)

240  1 Trillion bytes = Terabyte (TB)

Dear students, when we buy a computer,one of the spec (meaning specification) to look for is the
computers hard disk storage capacity and Random Access Memory (RAM) capacity. Both of
these crucial specs is measured in terms of bytes. For example, a Laptop with a good spec may
have a Hard disk capacity of 1TB and a RAM memory of 8 GB

1
The memory capacity measured in KBis approximated to 1000 Bytes, in MB is one million Bytes, GB is one
Billion bytes and TB is one Trillion bytes respectively.

48
2.2.1.3. Speed of a Computer

Speed of a computer is measured by its ability to read millions of instructions per second. The
hardware measures machine cycle times in milliseconds, microsecond, etc. Machine cycle is a
series of operations that a computer performs to process a single instruction. The machine cycle
times have the following relationships.
1 1
Milli sec ond  Second Micro sec ond Second
1000 ; 10000000
1 1
Nano sec ond Second Pi cos econd Second
1billion 1Trillion

For example, if a computer reads 200 millions of instructions per second (200 MIPS), then this
1
Second
means that the computer takes some 200 millions or 15 nanoseconds to read one
instruction.

2.2.2. Computer Generation and Trend: Time and Size in the Computer

The computers that we use today have not reached this stage at once. Due to the incessant effort
of computer and information system specialists, the processing speed and memory capacity of
information technology have improved through time to pass three distinct stages of computer
development and to attain the present stage of fourth generation computers.

2.2.3. Computer Generations


Computers have evolved overtime to reach into their current level. The stages of evolution is
captured in the computer’s generations as summarized in the table below:
Generation Operational Hardware used for Function Size Primary Speed Price Failure
Years processing and Memory rate
storage data capacity

1st Late 1940s to Vacuum tube, To solve Very large class Very Small Very slow Very High,
early 1950s rotating magnetic, complex room size 2KB RAM (up to 100 expensive generates
punched cards mathematical instructions great deal
and per second of heat
engineering
problems

2nd 1957-1963 Transistors, Used for Smaller than 1st 32KB Ram between Expensiv Medium,
magnetic core scientific and generation 200,000 to e generated
memory used for 300,000 (cheaper less heat
business instructions than the

49
purposes per second first)

3rd 1964-1979 Large Integrated Equally used Smaller than 2nd 2MB RAM Affordabl Failure rate
Circuits, Magnetic for scientific Generation e for significantl
core and magnetic and business governme y
tape for memory purpose nt and decreased,
business have their
organisati own
ons ventilation
system

4th 1980- Very Large Equally used Smaller than 3rd Gigabytes Gigahertz Affordabl Failure rate
Integrated Circuits, for scientific generation e for once in a
Ultra large scale and business governme year, have
integration, purpose nt, their own
semiconductor business ventilation
memory. and system
individual
s

In general, the trends of computers show that computers have continued to become smaller in
size, faster in processing speed, more reliable, larger in their primary and secondary memory
capacity, cheaper in price and more users friendly.

2.2.4. Classification of Computers


Computers may differ in their processing speed and memory capacity as well as in the number
and capabilities of peripheral devices they can support for input, output and secondary storage.
Peripheral devices are separate from but can be directly connected to and controlled by the CPU.
There are four main classifications of computers the first three of them in business use. They are
the microcomputers, minicomputers, mainframe computers and super computers.
a. Microcomputers – These are the smallest types of computers often called personal
computers (PC). As technology is advancing from time to time they are becoming more
and more powerful than the mainframe computers of the previous generations. These
types of computers started to be used during the fourth generation of computers
particularly during the early 1980s. Their primary storage capacity ranges from 256
kilobytes and currently passes 8GBs of semiconductor storage. They are in the form of
desktop and laptop computers. Processing speed is usually measured in Giga Hertz
(GHz) or Billions of Instructions per Second (BIPS). One gigahertz is equal to one billion
cycles per second. Around the year 2000, the processing speed of microcomputers ranged
between 133 MHz and 466MHz. Currently, the processing speed is in the range of
1000MHz and 3000 MHz. The microcomputers are common in Ethiopia and they are
largely used in many government offices and business organisations. Even today many
individuals in Ethiopia have their own microcomputers, price ranging between Birr 8,000
and Birr 12,000.

50
Micro computers include all Personal Computers that serve a single user at a time.Micro
computers include desktops, laptops and palmtops. Workstations are computers
considered as desktop but they are a little bit larger in size and have larger memory
capacity and faster processing speed. They are designed to process scientific, engineering
and design work that require powerful graphic and computational capability.

b. Minicomputers – These are larger and more powerful than microcomputers.


Minicomputers are about a size of refrigerators and serve approximately 16 to 100s of
users simultaneously. They serve as systems in universities, factories, or laboratories to
process business and scientific applications. Minicomputers also serve as servers to
manage internal networks and websites of an organisation. Because of the continuous
increase in the power of microcomputers, their importance in business application is
being faded continuously and from time to time.

c. Mainframe computers – They are larger and more powerful than minis and
microcomputers. They usually have one or more central processors with faster
processing units. Mainframe computers can handle many peripheral devices such as
terminals and printers at the same time. For this reason, they can handle large number of
users that need simultaneous access to the central databases or users that need to use the
libraries of applications programs in time-sharing network. The processing speed of
mainframe computer ranges has passed tens of Giga Hertz of instructions per second.
Their prices are very expensive. They are largely used by major corporations and
government organisations, which have enormous and complex data processing
assignments.

 A mainframe is a large, expensive, powerful computer that can handle hundreds or


thousands of connected users simultaneously

d. Supercomputer is the largest computer with an extra ordinary computing power, which
is designed for high-speed numeric computations. A supercomputer is the fastest, most
powerful computer and the most expensive. Applications requiring complex,
sophisticated mathematical calculations use supercomputers. Large-scale simulations and
applications in medicine, aerospace, automotive design, online banking, weather
forecasting, nuclear energy research, and petroleum exploration use a supercomputer.

2.2.5. The Components of a Computer Hardware

51
Any computer hardware system has five major components that perform the five activities of
information system. A computer contains many electric, electronic, and mechanical components
known as hardware. These components include input devices, output devices, a system unit,
storage devices, and communications devices.

2.2.5.1. Input Devices


An input device is any hardware componentthat allows you to enter data and instructionsinto a
computer. Five widely used input devicesare the keyboard, mouse, microphone, scanner,and
Web cam.

A computer keyboard contains keys you pressto enter data into the computer.

A mouse is a small handheld device. With themouse, you control movement of a small symbolon
the screen, called the pointer, and you makeselections from the screen.

A microphone allows you to speak into thecomputer. A scanner converts printed material(such as
text and pictures) into a form thecomputer can use.

A Web cam is a digital video camera thatallows you to create movies or take picturesand store
them on the computer instead of ontape or film.

2.2.5.2. Storage Devices


Storage holds data, instructions, andinformation for future use. For example, computerscan store
hundreds or millions of customernames and addresses. Storage holds theseitems permanently.

52
A computer keeps data, instructions, and informationon storage media. Examples of
storagemedia are USB flash drives, hard disks, opticaldiscs, and memory cards.

 A storage device records(writes) and/or retrieves (reads) items to and fromstorage media.

Drives and readers/writers, whichare types of storage devices, accept a specific kind of
storagemedia. For example, a DVD drive (storage device)accepts a DVD (storage media).
Storage devicesoften function as a source of input because theytransfer items from storage to
memory.

A USB flash drive is a portable storagedevice that is small and lightweight enough tobe
transported on a keychain or in a pocket. The average USB flash drive canhold about 4 billion
characters. You plug a USBflash drive in a special, easily accessible openingon the computer.

A hard disk provides much greater storagecapacity than a USB flash drive. The averagehard disk
can hold more than 320 billion characters.Hard disks are enclosed in an airtight,sealed case.
Although some are portable, mostare housed inside the system unit.

Portable hard disks are either external orremovable. An external hard disk is a separate,
freestanding unit, whereas you insert and remove a removable hard disk from the computer or a
device connected to the computer.

An optical disc is a flat, round, portable metal disc with a plastic coating. CDs, DVDs, and Blu-
ray Discs are three types of optical discs. A CD can hold from 650 million to 1 billion characters.
Some DVDs can store two full-length movies or 17 billion characters (Figure 1-5). Blu-ray Discs
can store about 46 hours of standard video, or 100 billion characters.

Some mobile devices, such as digital cameras, use memory cards as the storage media. You
canuse a card reader/writer to transfer the stored items, such as digital photos, fromthe memory
card to a computer or printer.

There are two major types of storage devices in a computer system. The first type is the primary
storage usually called main memory, which is found near the central processing unit with
control unit and arithmetic and logic unit. The second type is the secondary storage, which
supplements the primary memory by storing end users' data or instructions permanently.

53
2.2.5.3. The Primary Storage

Primary storage has dual purposes. First, it is a place where data or instructions (programs) are
stored temporarily between processing steps or after processing is completed. Second, it is the
place where permanent computer operational instructions, written during the manufacturing of
the computer, are stored. The primary storage, often called main memory, is made up of
semiconductor chips (Circuits). The storage capacities of integrated circuits are measured in
megabytes (MB) or million bits of data. There are two parts of primary storage.

Random Access Memory(RAM): In this part of primary storage each memory position can be
sensed (read) and changed (written). However, RAM is a volatile memory because the data that
we write on it is not stored permanently; and if electric power is interrupted while we enter data
to the computer all the contents will be lost. This is why computer users are advised to save their
works frequently when they work on their data using a computer. In short RAM is useful to
store data and instructions (programs) temporarily during processing.

Read only Memory(ROM): In this part of memory we can read instructions and data that have
been stored at the time of manufacturing the computer. We cannot change these instructions and
data by writing over them. ROM is non-volatile because it contains permanent instructions and
data that cannot be erasable when the power is turned off. These permanent instructions are
part of the operating system that help the user to create, edit & copy files and others more
specialised activities. In general, the capacity of primary storage is continually increasing from
generation to generation of computer. The RAM capacity of the first generation of mainframe
computer was measured in kilobytes, but the RAM capacities of today’s microcomputers are
measured in Gigabytes.

2.2.5.4. Secondary Storage (Memory) Devices


In our previous discussion, we have discussed that secondary memory supplements the primary
storage. Secondary storage devices are important because the end user can read, write and store
data permanently. They provide also permanent storage space for keeping the data for future
processing activity. Secondary memories are cheaper in price than primary memory. However, it
takes longer time to access, read and update data in the secondary storage devices than data in
main memory because processing takes place after the contents in the secondary memory are
first brought to the primary memory. Secondary memory devices can be in the form of enabling
us to access data directly or sequentially.

54
In Direct Access Storage Devices data or instruction can be directly stored & retrieved by
selecting and using any of the location on the storage media. This is because each storage
position (1) has a unique address, and (2) can be individually accessed in approximately the same
time without having to search through other storage positions. For example, the primary storage,
RAM and ROM, is a direct access storage device. Other examples of secondary storage devices
are magnetic disk and optical disk storage. Magnetic disk storage is most common form of
secondary storage that can provide fast access and storage capacity at a reasonable cost.
Magnetic disk can be in the form of hard disk or floppy disk, or flash disk. Hard disks can be
removable or non-removable (fixed disks). Optical disk storage: –one of the example of optical
disk is CD ROM. CD-ROM (Compact Disk Read Only Memory) can store from 500 to 700
megabytes of data. The problem with optical disk storage devices is once data are recorded, it is
not possible for the end user to erase and alter the data. Another example is the DVDs (Digital
Video Disks), which have high capacity (minimum 4.7 GB) and useful to store high quality
motion pictures.

Sequential Access Storage Devices are devices in which data and instructions are stored or
retrieved sequentially or serially because they don’t have unique addresses. Hence they cannot be
individually accessed in approximately the same time like that of direct access storage devices.
An example of sequential access storage device is the magnetic tape. Magnetic tape storages are
large tape reels and cartridges used in mainframe & mini computers, and small cassettes or
cartridges used in microcomputers. The advantage of magnetic tapes is they can provide high
storage capacity, from 100 MB for microcomputers to billion of bytes for mainframe computers.
They are the cheapest storage devices of all magnetic disks. Though magnetic tapes are the
outdated storage devices due to the improvement made on other storage medias, they provide
back-up capabilities and they can be used to store data, which are not frequently used.

2.2.6. System Unit


The system unit is a case that contains the electronic components of the computer that are used to
process data. The circuitry of the system unit usually is part of or is connected to a circuit board
called the motherboard. Two main components on the motherboard are the processor and
memory. The processor, also called a CPU (central processing unit), is the electronic component
that interprets and carries out the basic instructions that operate the computer. Memory consists
of electronic components that store instructions waiting to be executed and data needed by those
instructions.Although some forms of memory are permanent, most memory keeps data and
instructions temporarily, which means its contents are erased when the computer is shut off.

55
2.2.7. Central Processing Unit (CPU)
The CPU is the most important unit of a computer system. There are three parts of the CPU- the
control unit, the arithmetic and logic unit and the register. The primary storage unit is located
near the CPU. The control unit and the arithmetic and logic unit of the CPU perform the
controlling function and the processing function respectively. The control unit obtains
instructions from those stored in the primary storage units, interprets them, and transmits
directions to other components of computer systems to perform the desired activities. Thus, the
control unit co-ordinates the works of all the components of the computer system and controls
the program and data flow in the computer system.

The arithmetic & logic unit, on the other hand, is the one, which performs the required
arithmetic and logical comparison of the system by using a register. A register is a special area
in the ALU or control unit where data is temporarily stored to be processed after the control unit
transfers data from primary storage. These two units of the CPU together are called processors
because they process the contents of the primary storage. For example, when one writes 2+3,
then the control unit directs the arithmetic and logic unit to make the additions and to write the
result five. The processing powers of computers depend on the speed and performance of their
microprocessors.

Dear learners, the CPU is one of the specs that must be critically evaluated when you buy a PC.
The CPU’s spec is its speed measured by Giga Hertz (GHz). A typical computer may have a
processing speed measured by 2.4 GHz and is Core i 3. This means the CPU can run 2.4 billion
circulation per second with three processors.

2.2.8. Outputs Devices

An output device is any hardware component that conveys information to one or more people.
Three commonly used output devices are a printer, a monitor, and speakers

A printer produces text and graphics on a physical medium such as paper.

A monitor displays text, graphics, and videos on a screen. A monitor is also a spec. So when you
buy a computer you need to inspect whether it has an LCD or CRT monitor and what inch. An
LCD monitor is a one with flat screen where as a CRT monitor is a one with box feature.

Speakers allow you to hear music, voice, and other audio (sounds).

56
Activity 2
1 Define hardware and identify the components of a computer hardware?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Explain how data is represented in a computer system.


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Identify and discuss the different classes of computers.


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT TWO - SECTION THREE


2.3. Information System Software
 Section Objectives
 At the end of this section you should be able to:
• Explain what a software is
• Explain the difference between application software and system software.
• Describe the functions of operating system
• Elaborate the software management approaches and tools

Section Overview
Hardware, as powerful as it might be, is useless without software. Software consists of
instructions that tell the computer and its peripheral devices what to do and how to do it. These
instructions are called programs or applications. Many IT professionals refer to computer
programs as “systems” because they are composed of components working to achieve a common
goal. As a professional, you must be able to make educated decisions regarding software
selection. To do so, you need to understand the factors involved in developing, selecting, and
using software. This section introduces to you what a software is, and distinguishes the
difference between application and system software. Further it describes the functions of the
operating system. Finally it elaborates approaches to manage software assets.

57
 Software is a series of instructions to a computer to execute any and all processes, such
as displaying text, mathematically manipulating numbers, or copying or deleting
documents.

2.3.1. What is Software?


Software is an instruction that directs the computer hardware to perform a certain sequences of
tasks. Computers only understand instructions made up of electrical signals alternating between
two states, which eventually close or open tiny electrical circuits. Different sequences of signals
represent different instructions to the computer.

Like computers hardware systems, software systems have passed four generations of
developments. The improvement in the memory and speed of computers has enabled information
system specialists to modify and add new features of software. The development of software has
made computers to become more users’ friendly. Hence, the subsequent generations of languages
are the results of adding new instructions and features to immediately preceding generations of
languages with the purpose of making computers comfortable, fast, cheap and simple to use. The
two major categories of software are application software and system software.

2.3.2. System and Application Software


There are two major types of software. They are the system software and the application
software.

2.3.2.1. System Software


The system software – This software manages the fundamental tasks of the hardware. These
programs serve as interfaces between the computer hardware systems and the application
programs that the user uses to process data. System software is usually produced by the
manufacturer of the computer hardware or by a firm that is specialized in producing system
software. There are three types of system software.

1. Operating system: Operating system manages the operation of the CPU, controls the
input/output and storage devices of a computer system. In this it performs three activities.
The first is allocation and assignment of resources to the jobs in the queue, the second is
scheduling tasks based on their arrival and users’ priorities and the third is monitoring the
jobs, the individuals using the system (what program is run by whom) and protecting the
information system from being accessed by any unauthorised person.

58
2. Utility programs – Utility programs are programs that perform certain routine tasks
needed by the user. Utilities enable the user to copy, create, sort or delete files. For example,
sort program performs sorting operation; load programs loads programs, save program
records the contents of primary storage on the secondary memory devices.

3 Language Software: There are two types of languages software. The first is Language
translators – translate programs written in the high level languages into machine languages.
Program written by the programmer is called source program and the machine language is
called the object program. Therefore, the system software that translates the source program
to machine program is called translator. Compilers translate high level programmes to
machine languages. Interpreters translate Basic Languages to machine language.

The second type of language software is called program language. There are different
programming languages that help to develop application software. These are C++, Visual
Basic, Java, etc.

2.3.2.2. The application software

The application software is the software, which is the interface between the system software and
the end user. The application software makes the end user to use the computer. General purpose
and application specific Software. Application software is a program that assists the
application of computers to meet the information processing needs of the end user. Application
software can be acquired in two ways. The first is through custom programming and the second
through the purchase of prewritten programs.

In custom programming firms use their own information specialists to design computer-based
systems that can meet the unique needs of the firm. Prewritten packages are programs that are
produced by software producing firms and available in the market to be purchased and used by
end-user organisations. Examples of such types of packages are like Microsoft word, Microsoft
Excel, Access etc. Prewritten packages can be classified into general-purpose programmes and
application specific programmes.

59
General-purpose programs – These are programs that perform common information processing
tasks for end users. Some of the programs under this category are word processing programs,
electronic spread sheet programs like Lotus 1,2,3 and excel, and graphic packages that convert
numeric data into graphic displays.

 Access is used for Database Management application such as electronic record keeping,
inquiry and report generation.

Application specific programs – These are packages that are created to satisfy specific
information processing need of a particular end user. Business application programs are
programs used to process business related information such as accounting, sales analysis, cash
budgeting, materials requirement planning, etc. These programs assist business decision-making.
The scientific application programs are useful for information processing tasks of physical,
mathematical, engineering, social and other activities.

2.3.3. Operating System

The operating system (OS) is the single most important program that runs on a computer andthe
most important type of system software. The operating systems performs basic tasks, such as
recognizing input from the keyboard and mouse, sending output to thecomputer display, keeping
track of files and directories (groups of files) on disks, and sendingdocuments to the printer.
Without an operating system, no application can run on a computer.

The OS is sometimes called the “traffic cop” or the “boss” of computer resources. Indeed, itis
charged with control functions such as optimally allocating memory locations for anapplication
program, copying the application from an external storage medium into memory,passing control
to the CPU for execution of program instructions, and sending processing resultsto output
devices. Operating systems are also often referred to as “platforms,” because they arethe
platform on which all other applications “ride” when interacting with the hardware.

2.3.3.1. Operating System Functions


Operating systems provide several services, the most important of which is system management.
1. System management refers to the efficient allocation of hardware resources to
applications and includes tasks such as prompting the user for certain actions, allocating
RAM locations for software and data, instructing the CPU to run or stop, allocating CPU
time to different programs running at the same time, and instructing co-processors and
peripheral equipment.

2. User Interface
60
An important part of the OS is the user interface. A graphical user interface (GUI)makes
the use of the computer intuitive and easier to learn. The interface takes the form ofeasy-
to-understand frames, icons, and menus. Users find it helpful to have most of the
interfacefeatures identical regardless of the application they use, unless the application
requires aninterface element for a unique feature.
3. Memory Allocation One of the most important functions of an operating system is
memory management, especially RAM—the memory where data and program code must
reside before being executed. Ideally, an entire application and all the data it processes
reside in RAM until processing ends. However, when many applications are open
concurrently, or when applications and data pools exceed the computer’s RAM capacity,
the operating system may use virtual memory. Virtual memory lets the user proceed as if
significantly more RAM were available than really exists. Virtual memory uses the hard
disk as an extension of RAM.
4. Plug and Play
A good operating system should also facilitate fairly simple changes to hardware
configuration. When a new device, such as an external hard disk, DVD burner, external
communication device, or joystick, is attached to a computer, the operating system’s job
is to recognize the new attachment and its function. If the OS can do so (without your
intervention) immediately after you attach the device, it is a plug-and-play (PnP) OS, and
the device, too, is referred to as a plug-and-play device. To do so, the operating system
must have access to the attached device’s driver.
A driver is the software that enables the OS to control a device, either one installed inside
the computer box (such as a second video card) or an external device such as a flash
memory drive.

2.3.4. Managing software Assets: New software tools and approaches


Software is assets like any other productive assets acquired investing multiple-million of birr. As
a result we need to specifically manage our software assets to safeguard them and to secure value
from them.

2.3.4.1. Proprietary vs Open source software


The software currently in use by organization are either licensed proprietary software or open
source software.

2.3.4.1.1. Proprietary Software


The great majority of business and individual software is proprietary, that is, software that
isdeveloped and sold for profit. The developers of proprietary software do not make the
sourcecode of their software public. The developer retains the rights to the software. In most

61
cases youdo not actually own the copies of applications that you purchase; you only purchase
licenses touse those applications.

2.3.4.1.2. Open source Software


In contrast to proprietary software, some programmers freely contributeto the development of a
growing number of computer programs not for profit. The developersof open source software
can obtain the source code free of charge, usually on the Web.

Anyone who can contribute features or fix bugs is invited to do so. Anyone who wishes
todownload the latest version can do so free of charge. An open source program can be
developedby a random group of programmers, rather than by a single company. Programmers
share anapplication’s basic code, find its weaknesses, debug it, and contribute new pieces.
Open source software includes hundreds of useful applications, suchas the popular Web browser
Mozilla Firefox, the relational database management system MySQL.Linux is the best known
open source operating system. Forty-two percent of Argentine companies useLinux. The
governments of Brazil, Peru, and Chile mandated that all public administrationagencies use only
open source software when available. The Brazilian government switched morethan 300,000 of
its computers from Windows to Linux

Dear students, do you know that when you “purchase” software, you do not own the software
you have just obtained. As noted earlier,most of the software that organizations and individuals
obtain is not purchased; it is licensed. You receive a software license, limited permission to use
the software, either indefinitelyor for a set time. When the use is time-limited, the client pays
annual license fees.

2.3.4.1.3. Managing Software Assets: New Software tools and Approaches


Software Asset Management (SAM) is a business practice that involves managing and
optimizing the purchase, deployment, maintenance, utilization and disposal of software
applications within an organization. SAM is defined as “…all of the infrastructure and processes
necessary for the effective management of, control, and protection of the software assets…
throughout all stages of their lifecycle…” SAM aims to balance the number of software licenses
purchased with the number of actual licenses consumed or used. It also aims to minimize
liabilities associated with software piracy by ensuring software are used in line with terms and
conditions of software vendor. SAM involves conducting detail software inventories on a
periodic basis to determine the exact number of software consumption and establishing controls
to ensure that proper licensing practices are maintained on an ongoing basis.
More broadly defined, the strategic goals of SAM often include the following

62
 Reduce software and support costs by negotiating volume contract agreements and
eliminating or reallocating underutilized software licenses
 Enforce compliance with corporate security policies and desktop/server standards
 Improve worker productivity by deploying the right kinds of technology more quickly
and reliably
 Limit overhead associated with managing and supporting software by streamlining and/or
automating IT processes (such as inventory tracking, software deployment, issue
tracking, patch management)
 Establish ongoing policies and procedures surrounding the acquisition, documentation,
deployment, usage and retirement of software in an effort to recognize long-term benefits
of SAM
2.3.4.1.3.1. New SAM software tools and Approaches
A number of technologies are available to support key SAM processes:
 Software inventory tools intelligently “discover” software installed across computer
networks, and collect software file information such as title, Product ID, Size, date, Path,
and version.
 License Manager solution provide an intelligent repository for license entitlements which
can then be reconciled against data provided by software inventory tools to provide the
organization with an ‘Effective License Position’ or view of where the organization is
under-licensed (at risk of a compliance audit) or over-licensed (wasting money on
unnecessary software purchases)
 Software metering tools monitor the utilization of software applications across network.
They can also provide real-time enforcement of compliance for applications licenses
based on usage.
 Application control tools restrict what and by whom particular software can be run on a
computer as a means of avoiding security and other risks.
 Software deployment tools automate and regulate the deployment of new software.

Activity 3
1 What is software? Discuss the major types of computer software.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Discuss how a PnP OS performs


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Differentiate between a proprietary and open source software

63
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT TWO - SECTION FOUR


2.4. Managing Data Resources
 Section Objectives
 At the end of this section you should be able to:
• Explain the difference between traditional file organization and the database approach to
managing digital data.
• Explain database Management
• Explain how relational and object-oriented database management systems are used to
construct databases, populate them with data, and manipulate the data to produce
information.

Section Overview
As a professional, you will use databases and likely help design them. Understandinghow to
organize and use data is a way to gain responsibility and authority in a workenvironment. Data is
usually collected in a way that does not make it immediately usefulto professionals. Imagine
building a model palace from a pile of building blocks. Youhave a good idea of what you want to
build, but first you have to organize the blocks so it is easy for you to find and select only the
blocks you need. Then you can combinethem into substructures that eventually are integrated
into your model. Similarly, datacollected by organizations must be organized and stored so that
useful information canbe extracted from it in a flexible manner.

You use your Web browser to go to your favorite online electronics store to search forhigh-
definition flat screen television sets. You enter a price range and screen size. Within a
fewseconds, the screen is filled with details on available models complete with product photos
andspecifications. Where did this rich, well-organized information come from? It came from
adatabase. A database management system responded almost instantly to your request.

 The manner in which data is organized and arranged in a computer system from the
smallest bit to the largest database is termed data hierarchy: The smallest possible
electronic data is called a bit. A bit is a binary digit of either a 0 (off) or 1 (on). A bit
cannot represent a human letter. When related bits come together they form a byte. A
byte is made of 8 bits. A byte represents a human letter. For example, Abebe is made of
approximately 5 bytes and 40 bits.A collection of related bytes is called a field or
attribute. An attribute is a characteristic of interest regarding the entity. Entity is anything
about which we would like to capture and store data. For example, Abebe is an attribute,

64
which is made of 5 bytes and it could represent name of a customer. The set of related
attributes will form a record. A record captures data from particular occurrence of an
entity. For example, when Abebe buys goods from our business, we capture his name,
items sold, sales person and the cash received from him. These attributes make a record.
When records come together they form file. The records of all customers like Abebe
make a file. A set of interrelated and centrally coordinated files is called a database.

Businesses collect and dissect data for a multitude of purposes. Digital data can be stored ina
variety of ways on different types of media. They can be stored inwhat can be called the
traditional file format, in which the different pieces of information are notlabeled and
categorized, but are stored as continuous strings of bytes. The chief advantage ofthis format is
the efficient use of space, but the data is nonetheless difficult to locate andmanipulate. By
contrast, the database format, in which each piece of data is labeled orcategorized, provides a
much more powerful information management tool. Data in this formatcan be easily accessed
and manipulated in almost any way desired to create useful informationfor decision making.

The impact of database technology on business cannot be overstated. Not only has it changedthe
way almost every industry conducts business, but it has also created an information industrywith
far-reaching effects on both our business and personal lives. Databases are behind thesuccessful
use of automatic teller machines, increased efficiency in retail stores, almost everymarketing
effort, and the numerous online search engines and Web-based businesses. Combinedwith
interactive Web pages on the Internet, databases have made an immense contribution
tocommerce.
Without them, there would be no online banking, consumer catalogs, search engines,stock
brokerages, or chat rooms.
In virtually every type of business today, you must understand the power of databases.
Theapproaches to organizing and manipulating data presented in this section will help you gain
thisimportant knowledge.

2.4.1. Organizing Data in a Traditional File Environment

Data can be maintained in one of two ways: the traditional file approach—which has
nomechanism for tagging, retrieving, and manipulating data—and the database approach,which
does have this mechanism. To appreciate the benefits of the database approach, you mustkeep in
mind the inconvenience involved in accessing and manipulating data in the traditionalfile
approach: program-data dependency, high data redundancy, and low data integrity.

There is aninterdependency of programs and data of the traditionalfile approach. Other


challenges with traditional file storage are high data redundancy and low dataintegrity, because

65
in older file systems files were built, and are still maintained, for the use ofspecific
organizational units. If your last and first name, as well as address and other details,appear in the
files of the department where you work as well as in the payroll file of the HumanResource
department, data can be duplicated. This data redundancy wastes storage space
(and,consequently, money) and is inefficient. When corrections or modifications need to be
performed,every change has to be made as many times as the number of locations where the
dataappears, which takes time and might introduce errors. If the same data was entered correctly
inone place but incorrectly in another, your record is not only inaccurate, but might appear
torepresent a different person in each place. Inaccuracies hurt data integrity—the
characteristicthat the data represents what it is supposed to represent and that it is complete and
correct.
Often, the traditional file approach to storing data leads to low data integrity. It is difficult
toensure that data is correct in all locations when there are myriads of places to insert data in
files,as in the traditional approach.

2.4.2. Database Management


To design an effective and efficient management information system, an information specialist
needs to undertake two major consecutive tasks of system analysis and design. They are analysis
of information requirement of an organisation and the design of the database. It is difficult to
have a detail discussion of the two tasks in this section. In other words to discuss the two tasks is
beyond the scope of this section. However, in this part we focus on some features of database
management, which are filing systems and database management systems.

To begin with, the development of automating information activities can be divided in to pre-
database and database periods. The pre-database was the time when the traditional file
processing system was the only system used for data collection, storage, processing and
producing reports. As the traditional filing system was having many problems, it gave way to the
advanced computerised data processing system, which is called the database system. This
doesn’t mean that filing system is no more useful in computerised data processing; rather, the
database system has integrated many separate filing systems that increased the flexibility and
efficiency of processing data. This section discusses on the structure of data, the difference
between the traditional filing system and database system.

Some of the functions of Information system management are choosing the type of data to be
collected, designing the formats for capturing data from internal and external business activities,
deciding the way these data are stored and processed within the system and designing the
formats for producing ad hoc and periodic reports for managerial decision making. An

66
information system specialist needs to consider the following five main criteria in his effort of
designing workable system.

1) efficient utilisation of the computer memories and office spaces,


2) speed of accessing information in the system
3) the flexibility in using the information system
4) the simplicity of using the information system.
5) The security of the system facilitates the use and access of the information base of the
organisation

2.4.2.1. Logical Data Concepts


To achieve the above basic assumptions, an information system designer is expected to
understand the basic logical concepts of files and databases. These are entity, attribute, and
relationships.
1) Entity- Entity is any type of thing about which we are interested to collect data. Entity can be
an object, person, an abstract concept, or event. For example, vehicle is an object entity,
student and lecturer are person entities, religion is an abstract concept entity and registration
is an event entity.
2) Attributes: - attributes are characteristics of interest that we want to use to describe an entity.
The values of the attributes describe a particular entity. For example, some of the attributes
of student entity are student ID, name, sex. address and major.
3) Relationship: Relationship is the association between entities. Two entities may not relate to
each other. For example, a student grade performance associates a student with a course.
Assume that there are two entities. Entity A and entity B can be related to each other in one
of the following three ways.
a) One-to-one relationship: - If one element of entity A can be directly related to only one
element of entity B, and one element of entity B is directly related with one element of
entity B. For example, in monogamy cultural system a man can marry only one woman
and a woman can marry only one man.
b) One-to-many relationship: when one element of entity A can be related to one or more
elements of entity B, but one element of entity B can be related to only one element of
entity A. For example, the relationship between a biological father/mother and his/her
children. (A biological father/mother can have one or more children but a child has only
one biological father/mother.
c) Many-to-many relationship: - Two entities may have many-to-many relationship when
one element of entity A can be related to one or more elements of entity B, and when
one element of entity B can be related to one or more elements of entity A. For example,
the relationship between entity student and entity course is many-to-many. This is
because one student can take one or more courses; and one course can be taken by one or
more students.

67
2.4.2.1.1. Structures of Data
Data structure: The smallest data is a bit. A bit is an electronic signal either ‘on’ or ‘off’. 0 and
1 are the binary digits representing the electronic signals of ‘off’ and ‘on’ respectively. The next
higher data element is a byte. A byte is a group of 8 bits, which can be represented with a
combination of ones and zeros. Then a group of bytes are combined together to give data items.
We discuss the higher levels starting from the level of data items.

Fields: They are sometimes referred as data items. Data items can represent one of the many
attributes, and are usually grouped together to describe a specific entity. For example, Almaz
could be a data item to represent the attribute student name in the occurrence of an entity student.

Records- Records are formed when related data items (fields) are grouped together. A record
represents a collection of data items that describe each instance of an entity. For example, if
Alemu is a student then the data items that contain his name, student ID, sex, date of birth,
major, address, etc, together form a record of Alemu. See the table below for the difference
between field, record and file.

Relationship between fields, records and files


Field

in the row are a record ofNo.


Almaz Student Name Fathers name Date of Birth Qualification Level of
Education

Employee File
1 Almaz Kebede 5/06/1980 Accounting BA
2 Ayele Alemu 25/09/1978 Engineering BSc

100 Zegeye Deribe 22/07/1981 Management BA


File: - Files are formed when related records are grouped together. For example, in payroll file
there are many records of employees consisting of their names, Employee ID, salary, amount of
tax deductions and net pay. And all the records in payroll are grouped together to form a payroll
file.

2.4.2.1.2. Classification of Files


The important aspect of information processing is the creation and the maintenance of stored
data. Prior to creation of database technology the emphasis was on files and the relationship
among files. The major concepts and terminology of files still exists. In manual filing system
records are written on white paper using pencil, pen or typewriter and are stored in a filing
cabinet whereas in a computerised filing system records are written to, and stored in a computer
primary and secondary memory. Files are classified in to three major types of files. They are
master file, transaction file, and report file.

68
a) Master files are used to store permanent data and information about entities. It contains
historical and statistical data, which is used as a source of reference data. Master file holds
accumulated data based on transaction data.
b) Transaction file contains records of all transactions occurring during a period & is developed
as a result of transaction processing and preparing transaction documents. Transaction
processing occurs at the time of sales order, purchase order, work order and hiring of
employees. These files are also used to update the master file, such as adding new record or
deleting records in the master file
c) Report file is created when a report is produced by extracting data from the master file. For
example, a registrar office may be required to prepare reports of students by region, GPA,
sex, etc. every semester. There is report generator software that provides easy handling of
special management requests.

2.4.2.1.2.1. Advantages of file based system


The ownership responsibility of separate files by each separate unit in an organisation provides a
useful organizational control on the quality and use of data in that specific unit. This is because it
is easier for each separate unit to maintain the data under its control. For example, a personnel
department is responsible to enter and correct data about an employee where as the accounting
section is responsible to maintain customers’ data in the accounts receivable file. The other
advantage of filing system is it is possible for each unit to process few files of its own, which
makes files easy to use, inexpensive to buy or to make.

2.4.2.1.2.2. Disadvantages of file based systems


The following are the major disadvantages of physically separate files under separate owners.
The problems were the major weaknesses of the traditional file system data processing.

 Duplications of data (data redundancy): Since each unit maintains its own data the same
data can be repeatedly recorded and stored in different files in different departments of the
same organisation. This is costly in terms of money required to collect, process and update
the data for computer storage. In addition, duplicated data occupies much of computer
memory and increases inefficiency in updating and retrieving data from files.
 Lack of data integrity. When the same information is stored in multiple files throughout the
organisation, any change in one file must follow changes in all other files. However, this is
difficult to do. For example, once the Accounting Department updates its own data, it may
forget to pass the new information to other departments. As a result, incorrect data in only
one file could cause severe problem for the user of this data. In filing system. there is no any
standard how to use and process data within the organisation (Raymond, 1995). As a result, it

69
was difficult for systems with such weaknesses were having problems in delivering
consistent and reliable information to users.
 Lack of data compatibility. There was program and data dependency in traditional filing
systems. This results when different departments in an organisation collect process and store
information using different software. When one department’s files are incompatible with
another department’s files, combining the information from the two files becomes extremely
difficult.
 Lack of Data security: Since each unit of an organisation controls its own data, the
organisation doesn’t have the power to control the access and dissemination of information.

2.4.3. Database Systems


Database- A database is an integrated collection of all related records or files. The problems
explained about filing system- data redundancy, data dependency and inability to share data
among different users led the information specialists to look for solutions. This has given way for
the starting of the database concept. Database has the following major advantages:-

 Consistency and uniformity of data because records can be immediately maintained


throughout the organization and users can get the same information with the same quality.
 Data redundancy is avoided because once a specific data is updated, it can be used by all
units in the system with in the same period of time.
 Data-program compatibility: in a database system, there are two major factors that make
database system different from filing system. Firstly, organisational data is administered
centrally which makes all units of the organisation to use standardised software and hardware
in processing organisational data. Secondly, data can be stored and processed independent
of the software type because the data structure is designed in such a way that any type of
software available in the organisation can process the data.

2.4.3.1. Components of Database Systems


The database system has two major components. They are the database administration and the
Database Management Systems (DBMS)

a. Database administration is a special organizational unit, which has an authority over


the management of a database in an organisation. A database administrator is the person
who has the authority and responsibility over definition and use of the database of the
organisation.
b. Database Management System (DBMS) - DBMS is a software system that manages the
creation and use of databases. DBMS can perform four primary tasks.

a) Database creation-in database creation the DBMS defines and organizes the content
relationships, and structure of the data needed to build a database.

70
b) Database Interrogation – this involves the access of data in a database to support various
information processing assignments. This typically involves information retrieval & report
generation.
c) Database Maintenance- the DBMS is used to add new records, delete old records, change
any data in the record, and protect the data in a database.
d) Customised micro processing development- DBMS can be used to develop prototypes of
data entry screens, queries, forms, reports, labels for a proposed system. An organization can
create its own customised mini software using the micro facilities available in Access,
Pardox or Dbase IV that can serve specific purpose of the organisation.

2.4.3.2. DBMS Languages/Elements


Any Database Management System consists of three important elements in performing the four
primary tasks. They are:
1) Data definition language (DDL): Programmers use this to describe and define entities,
attributes and their relationships in the database.
2) Data Manipulation Language (DML): DDL allows users to manipulate or process data in the
database system. Manipulation refers to sorting, extracting, copying and calculation of data
in the system.
3) Data Query Language(DQL): DQL allows users to interrogate the database without worrying
where and how the data is actually, physically stored.
4) Data dictionary: A catalogue for storing or organising the definitions and relation of data in
the database system.

2.4.3.3. Types of database Systems


DBMS is designed to use specific structure to provide end users with quick, easy to access
information stored in databases. There are three fundamental database structures.

2.4.3.3.1. Hierarchical structure


In hierarchical data model the relationships between records form a hierarchy or tree like
structure. A record may have multiple records subordinate to it, the multiple subordinate records
in turn may have their own multiple records subordinate to them. A record that has multiple
records subordinate to it is called parent records and all records which are under the parent
record are called children. There is natural relationship between the parent and its children
because a parent can have multiple children where as a child can have only one parent.

2.4.3.3.2. Network structure


Network data modelling started around the beginning of 1970s. The reason for starting network
modelling was the inadequacy of the hierarchical data modelling to solve the many-to-many
relationships existing between entities. Network modelling can represent more complex
relationships that can allow many- to-many relationships among records. In this data modelling
71
linking nodes are used to relate records with many-to-many relationships. Unlike hierarchical
data model, a network model allows a lower level element to be linked to multiple upper level
elements, and also allows entry into a database at multiple points. The main problem of network
data model is the complexity of handling records by individuals because it requires the
knowledge of all record names, field names and linking nodes.

2.4.3.3.3. Relational database


Relational data modelling started in the early 1970s by Edgar F.Codd in response to the
weaknesses of hierarchical and network data modelling. Most recently manufactured database
software systems are based on relational database modelling. Relational database allows all data
elements of an entity or a group of entities to be viewed as being stored in the form of simple
tables or flat files. Each table has columns and rows. The columns contain the attributes of an
entity and each row contains the data items of a record corresponding to the attributes when an
instance of an entity occurs. Entities can have identifier attribute, which is called a primary key
that uniquely identifies a record from other records in the same table or flat files. A data item
under the primary key cannot be repeated in any of the rows where as it is possible to repeat any
data items under any of the non-primary attributes. For example, two students cannot have the
same Student ID where as they can have the same first name. This has simplified the
representation of relationships among data elements in large database.

Advantages and Disadvantages of the Database Systems


Types of a Processing Flexibility End User Program
Database Efficiency Friendliness Complexity

Hierarchical High Low Low High

Network Medium to Low-Medium Low-Medium High


high

Relational Lower but High High Low


improving

2.4.3.4. Object Oriented Database Modeling


The recent development in data base design is the object oriented database-designing model. An
object is a software module containing information that describes an entity class together with
the procedure that can process the information of the same entity class. There is no much
difference between relational database and object-oriented database in the use of entity and
describing the attributes of that entity. The main difference is that the entity in the object-
oriented model has its own procedures to process its information.

2.4.4. Designing Databases


72
Databases must be carefully planned and designed to meet business goals. How they are
designedenables or limits flexibility in use. Analyzing an organization’s data and identifying the
relationshipsamong the data is called data modeling.

 A data model is an abstract representation of the contents of a database. For example: the
relational database represents as if everything in the database being stored in a form of
table (relation)

Data modeling should first be done to decide whichdata should be collected and how it should be
organized. Thus, data modeling should beproactive. Creating data models periodically is a good
practice; it provides decision makers a clearpicture of what data is available for reports, and what
data the organization might need to startcollecting for improved decision making. Managers can
then ask experts to change the relationshipsand design new reports or applications that generate
desired reports with a few keystrokes.

Effective data modeling and design of each database involves the creation of a
conceptualblueprint of the database. Such a blueprint is called an entity relationship diagram
(ERD).
An ERD is a graphical representation of all entity relationshipsand they are often consulted to
determine a problem with a query or to implementchanges. ERDs are a main tool for
communication not only among professional DB designers,but also among users and between
users and designers. Therefore it is important that professionalsin all of these fields know how to
create and read them.

In an ERD, boxes are used to identify entities. Lines are used to indicate a relationshipbetween
entities. When lines shaped like crow’s-feet are pointing to an object, there might bemany
instances of that object. When a link with a crow’s-foot also includes a crossbar, then
allinstances of the object on the side of the crow’s-foot are linked with a single instance of

73
theobject on the side of the crossbar. A second crossbar would denote “mandatory,” which
meansthat the relationship must occur, such as between a book title and author: a book title must
havean author with which it is associated. A circle close to the box denotes “optional.”

A diagram such as the above figure provides an initial ERD. The designers must also detail the
fieldsof each object, which determines the fields for each record of that object. The attributes are
listed in each object box, and the primary key attribute is underlined. Usually, the primary key
fieldappears at the top of the field list in the box.

The table below summarizes an example of possible attributes ofa Professor entity. Database
designers can use different notations; therefore, before you review anER diagram, be sure you
understand what each symbol means.

Activity 4
1 What is data hierarchy? Discuss each stages in the data hierarchy.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Distinguish between the traditional file based system and database system of data storage. What are
the major components of database management [DBMS] system?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 What is a relational database? In such databases what is the purpose of primary key, foreign
key and non-key attributes.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

74
UNIT TWO - SECTION FIVE
2.5. Telecommunication and Networks
 Section Objectives
 At the end of this section you should be able to:
• Describe business and home applications of digital telecommunications.
• Identify the major media and devices used in telecommunications.
• Explain the concept of network protocols.
• Compare and contrast various networking and Internet services.
• List networking technologies and trends that is likely to have an impact on
businesses and information management in the near future.
• Discuss the pros and cons of telecommuting.

Section Overview
Hardware, as powerful as it might be, is useless without software. Software consists of
instructions that tell the computer and its peripheral devices what to do and how to do it. These
instructions are called programs or applications. Many IT professionals refer to computer
programs as “systems” because they are composed of components working to achieve a common
goal. As a professional, you must be able

Modern telecommunications technology allows businesses to send and receiveinformation in


seconds. Except when a physical transfer of goods or performance ofa local service is involved,
geographical distances are becoming insignificant inbusiness transactions. When using
computers and other digital devices, people cannow work together as if they were sitting next to
each other, even when they arethousands of miles apart. Financial transactions and information
retrieval takeseconds, and wireless technology enables us to perform these activities fromalmost
anywhere and while on the go. Understanding the technology underlyingtelecommunications—
its strengths, weaknesses, and available options—is essentialin any professional career. This
section introduces the telecommunication revolution, communication and networks, and e-
commerce and e-business technologies

2.5.1. The Telecommunications Revolution and Contemporary organization

Telecommunications is the transmittal of data and information from one point to another. The
Greek word tele,which means “distance,” is part of such words as “telephone,” “teleconference,”
and otherwords referring to technologies that allow communications over a distance. Thus,
telecommunicationsis communications over a distance. Telephone, e-mail, the World Wide Web
—none ofthese essential business services would be available without fast, reliable
telecommunications.

75
2.5.2. Communications Networks

Computer Network is the connection of two or more computers to enable users to share data,
information, software and computer hardware resources. Understanding the telecommunication
technology is very important because it has changed the nature of making business by enabling
computers to communicate with each other. Therefore, telecommunication is sending
information in any form (voice, text, image, data) from one place to another using electronic or
light emitting media.

The other important terminology in computer network is data communication, which is the
transmitting and receiving of data over communication links between two or more computer
systems and a variety of inputs & output terminal. "Teleprocessing refers to the accessing of
computer power &computerized data files from a distance, generally using terminals &
telecommunication facilities."
Three conditions should be satisfied to have an effective communication. The first is, at least
two people - one sender and one receiver - must be involved. The second is there must be
information or message to be sent to the receiver, and the third is there must be a channel or
media to transmit the information.

2.5.2.1. Telecommunication Technology: Analogue versus Digital


Data in any form (voice, text and image) follows two format of transmission through a media.
They can be analogue or digital signals.

Analogue signals are represented by waves of varying frequency or amplitude (Loudness).


When you are talking with your friend, your voice creates waves in the air until it reaches your
friend. This is an analogue transmission. Both radio & television transmissions are analogue
transmissions. Digital Signals are sent as a series of off and on electrical signals or negative and
positive voltages. Before being entered to the telecommunications lines, data is “modulated”,
that is, converted to analogue form by a modem; when transmission is complete, the data must
be converted back to digital form, or “demodulated”, also by a modem (Scott, 1987). Therefore,
Modems are devices to convert data from electronic signal of the computer equipment to the
electronic signal of the telephone circuit and vice versa. For example, a fax message will have
the following data communication model.

2.5.2.2. Communication (Telecommunication) Media

76
Telecommunication (communication) channels- are the means by which data and other forms
of communication are transmitted between the sending and receiving devices in a
telecommunication network. A telecommunication channel makes use of a variety of
Telecommunication Media. The following are some of the examples of telecommunication
media.

a) Twisted- Pair Wire - ordinary telephone wires consisting of copper wire twisted together into
pairs to form a cable. This is the oldest mode of media used for data transmission. The
media is low cost and very low speed in transmitting data up to a speed of 100 Millions of
bits per second. Twisted wire is largely used for local networks and telephone systems.
b) Coaxial Cable, which is copper or aluminium wire wrapped with insulators to minimise
interference from outside or distortion. It is more expensive, transmits data faster and less
outside interference than twisted wires. The speed of data transmission for Coaxial Cable is
up to 200Mbps (Megabits per second)
c) Fiber-optic cables: conduct light pulses generated by lasers at transmission rates as high as 2
billion bits per second. It is the fastest, lighter and more durable than twisted wires and
coaxial cables.

2.5.2.3. Computer Networking


2.5.2.3.1. Network
A network is the structural connectivity among the components of a data communication system.
For example, When a sending device [server] is connected a communication interface device
[modem], which is connected to a communication channel [Fiber optic cable] then to a modem
of receiving device (client), which are integrated through communication software (TCP/IP).
Then we have a Data Communication System. The components of the system are connected
through a network. So network is connectivity.

2.5.2.3.2. Network Topology


The physical arrangement of the components of a network is called network topology. There are
five basic types of network topologies

1.A star network: In a star network dependent computers are connected to a central host
computer, which controls all the data resources and data communication between computers.
Any communication between two dependent computers in the system takes place through the
host computer. If the host computer fails then all computers connected to the host computer will
not perform any kind of work.

2.A ring network is a circle of connection between computers. Communication between two
computers goes around the ring. If one computer in the ring goes down, the system will not fail
and other computers continue their work. The ring network has the advantages of being less
expensive than the star network because of the possibility of pooling the powers of small
computers to allow the users to share data, software and hardware resources. The major

77
disadvantage of the ring network is it is more complicated because ring connection must involve
the linking of each computer on the ring.

3. Bus network - All the computers are connected to the same communication channel or bus.
Usually the same wire or fibber optic cable is used as a medium of transmission. In Bus network
there is no any central computer on which the other computers are dependent. Any computer can
communicate with any other computer in the system if it has the software that can signal the
right computer to receive the message. The main advantage of bus network is that there is no
need of relaying message because the message can be sent directly to the destined computer
without affecting the works of other connected computers to the same channel.

4. Hierarchical Network –A network whereby group of computers are connected to sub-servers


and where the sub-servers are connected to main servers in a form of hierarchy is called a
hierarchical network. A hierarchical network used to facilitate the share of classified data based
on custom level access.

5. Hybrid Network Topology: A network in practice mixes the topologies discussed above and is
called a hybrid network topology

2.5.2.3.3. Basic Types of Computer Networking


There are two basic types of computer networks. These are Local Area Networks (LAN) and
Wide Area Networks (WAN).

1. Local Area networks (LAN)

LANs connect information-processing devices within a limited physical area, such as an office
building, manufacturing plant, within a compound of a university. LAN has become a major
type of telecommunication network since the time microcomputers were introduced into offices,
departments,

2. Wide area network (WAN)

WAN communication network covers a large geographical area. They are used by
manufacturing firms, banks, government agencies, Universities, etc. to transmit & receive
information across cities, regions, countries or the world. As the connection of computers in a
compound creates LAN, the connections of LAN Creates the WAN.

Network Protocols:Different types of data are transmitted through communication channel in a


computer network. If two computers are communicating two other computers respectively then
the traffic of data passing through the same line of communication media is controlled by
network protocol. Network protocol is a standard set of rules and procedures for the control of
data communication in a network.

78
The Internet is simply an international network of networks by which organizations/individuals
share external and internal information. The Internet technology started in the US Department of
Defense with the intention of allowing professionals, academicians and scientists throughout the
world to share information, to analyze problems and to share research results.

An internet is an international network of independently owned computers that operate as a giant


seamless computing power. Internet is not owned or controlled by a single entity. Sites like Google are
search engines that bring data from web sites of different companies. Companies like ethio-telecom are
local internet service providers.

2.5.3. Electronic Commerce and Electronic Business Technologies


The advances in the data communication systems enable organizations to revolutionize their
business processes and automate their products and services, as well as their internal business
processes to exploit the ever present opportunity created by such technology advancements.

Electronic-business [E-Business] is a generic term that describes all uses of advances in


information and communication technology to improve a business products and services and to
improve the efficiency and effectiveness of operations. E-Business often used to describe the
use of wired communication technology to improve business where as M(Mobile)-business
describes the use of wireless technology.

E-Commerce is a narrower term that describes an electronic execution of a business transaction.


For example, e-payment using Dashen Bank or CBEs POS terminals are an e-commerce. E-
commerce and m-commerce are aspects of e-business. As a result, e-commerce describes a
business activity that is electronically executed between parties using wired communication,
such as between two businesses or between a business and a consumer. M-commerce describes
Mobile commerce, enabled by advances in technology for mobile communications devices.

2.5.4. E-Business Models


There are two major categories of e-business models.

2.5.4.1. B2C Model [Business to Consumer Model]


B2C Model refers to a technology enabled business interaction between a business and its
consumers. It is characterized by an infrequent or one time transaction. It often involves a very
small monetary value. Hence, it is not as such risky as no credit or large monetary amount is not
involved.

2.5.4.2. A B2BModel [Business to Business Model]


B2B Model refers to a technology enabled business interaction between a business and other
organizations. B2B can be classified into Business to Business [b2b], Business to Government
[B2G] and Business to Education [B2E]. It is characterized by frequent or ongoing business

79
transactions. It often involves a very large monetary value. Hence it is risky. The risk will add
up as it involves credit. As a result the following e-business success factors must be achieved.

2.5.5. E-Business Success Factors


There are two factors that must be considered to reap success out of e-business investment.
These are:

1) The manner in which e-business fit and support a company’s business strategy
2) The degree to which e-business assures the achievement of the three key characteristics
of any business transaction. These are:
a. Validity refers to the authenticity of the legality of the transacting parties at the
two ends of the data communication system. In manual systems, signatures and
stamps used to ensure validity. In e-business, digital signatures and digital
certificates must be present to secure validity.
b. Integrity refers to the un-alteredness of any message exchanged among
transacting parties while transferred. In manual systems to ensure integrity we
sign across sealed envelopes or use courier delivery. In e-business we use
message digest to check whether the message was tampered during transmission
or not.
c. Privacy refers to the confidentiality of any information exchanges while
transacting. In manual systems, privacy is attained through signing across sealed
envelopes and personal delivery. In e-business, we use encryption to secure the
privacy of the message. Encryption is the process of converting a message in a
plain text to a secret code, which is done using either Single Key System or
public key infrastructure.

Activity 5
1 List and Discuss the improvements in business processes offered by telecommunications technology.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 What is a network topology? Identify the different types of network topology?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 What is a e-business? Discuss the e-business success factors?


______________________________________________________________________________________

80
______________________________________________________________________________________
_______________________________________________________________________________

 UNIT SUMMARY

Information Technology and organizations influence one another. Information systems are built
by managers to serve the interests of the business firm.At the same time, the organization must
be aware of and open to theinfluences of information systems to benefit from new technologies.

Every computer system, either main frame computer or microcomputer' consists the hardware and the
software parts. Computer hardware is defined as “a system of interrelated components that supports the
basic system functions of input, processing, output storage & control" to provide "end users with a
powerful information processing tool”. Computer software is sequences of instructions that direct the
operations of the computer hardware to perform the basic system functions. Data is a raw fact or figure
and can take a form of a number or a date. Data is often meaningless or it does not provide
knowledge to make a specific decision. Information is a knowledge or meaning derived from
data.

 The computer has been called "the machine that changed the world." We believe that
information technology has and will continue to revolutionize management.

 Information technology refers to all forms of technology applied to processing, storing,


and transmitting information in electronic form. Information systemsexecute organized
procedures that process and/or communicate information.

An organization is a stable, formal social structure that takes resourcesfrom the environment and
processes them to produce outputs. Organizations are formal legal entities with internal rules and
proceduresthat must abide by laws.An organization is a collection of rights, privileges,
obligations,and responsibilities delicately balanced over a period of time throughconflict and
conflict resolution. The later definition suggest that an organization suggests that building
newinformation systems, or rebuilding old ones, involves much more than atechnical
rearrangement of machines or workers—that some informationsystems change the organizational
balance of rights, privileges, obligations,responsibilities, and feelings that have been established
over a long periodof time

There are major trends that have drastically altered the way organizationsuse technology. These
trends make it imperative that a manager become familiarwith both the use of technology and
how to control it in the organization.

At the core of any modern information system stands at least one computer. Few machines have changed
human life as radically as the computer.

81
Businesses have many hardware choices, ranging from types of computers and memory devices to input
and output devices. Understanding the capabilities of hardware and the options available can save
companies millions of dollars.

In general, “Data is processed and stored in a computer system through the presence or absence of
electronic or magnetic signals in the computer circuitry or in the media it uses.

The memory capacity of a computer's primary storage and its secondary storage devices is
usually expressed in terms of bytes.
Speed of a computer is measured by its ability to read millions of instructions per second.

Software Asset Management (SAM) is a business practice that involves managing and
optimizing the purchase, deployment, maintenance, utilization and disposal of software
applications within an organization.

Checklist
Now that you have completed the second unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Ca Understand the basics of computer system
n Know how data is represented in a computer system
Yo Describe the subsystems of a computer hardware system
u Describe the generations and classification of computes.
Describe the types of computers Software
Identify the file storage and management approaches
Describe database designing procedures
Describe terminologies of computer networks and internet
Explain how telecommunication technology is used in data transmission between
computers
Distinguish between local area and wide area networks
Distinguish between IT, ICT and IS
Understand the different views of organizations
Relate organizations and information technologies
Describe the trends in IT
Identify and evaluate key criteria or spec (specification) for deciding what
computer or related devices to purchase.

Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!

82
 SELF-TEST EXERCISE (SELF-ASSESSMENT QUESTIONS)

Part I: Multiple Choices

Direction: Choose the best answer from the given alternatives

1. The smallest possible electronic data is:


A. Byte, D. Record,
B. Bit, E. None of the above.
C. field,

83
2. The memory capacity of a computer’s primary and secondary storage is expressed in
terms of?
A. Bit, D. Record,
B. Byte, E. None of the above.
C. Field,
3. The smallest possible type of computer is best described by:
A. Micro, D. Super,
B. Mini, E. None of the above.
C. Mainframe,
4. A computer hardware that allows you to enter data and instructions into a computer:
A. Hard disk, D. Mouse,
B. CPU, E. None of the above
C. RAM,
5. A volatile memory that losses data when eclectic power is interrupted?;
A. Hard Disk, D. Magnetic Tape,
B. Compact Disk, E. None of the above
C. RAM,
6. Which software manages the operation of the CPU, controls the input/output and
storage devices of a computer system?
A. Language Software, D. Application Software,
B. Utility programs, E. None of the above
C. System Software,
7. The manner in which data is organized and arranged in a computer system from the
smallest bit to the largest database is termed
A. Bit, D. Data hierarchy,
B. File based system, E. None of the above.
C. Database system,
8. A data storage mechanism in which there is no mechanism for tagging, retrieving and
manipulating data is best described by:
A. Bit, D. Data hierarchy,
B. File based system, E. None of the above
C. Database system,
9. Anything about which we would like to collect and store data;
A. Attributes D. Database
B. Relationship E. All of the above.
C. Entity
10. A data base management system langue used to create the data base is:
A. DML D. DDL,
B. DQL E. None of the above.
C. Data dictionary
Part II: Matching

Direction: Choose the best answer from the given alternatives


84
Column One Column Two
1 An abstract representation of the contents of a data base A Data
Communication
2 A graphical representation of all entity relationships B B2B
3 The transmittal of data and information from one point to another C E-Commerce
4 The connectivity between two or more computers. D ERD
5 The transmitting and receiving of data over communication links E B2C
6 A signal represented by waves of varying frequency or amplitude F Protocol
(Loudness)
7 Devices used to convert digital signal to analog signal G Data model
8 The physical arrangement in the components of a network H Analog
9 The standard set of rules for the control of data communication I Modem
10 A technology enabled interaction between a business and its J Network Topology
consumers
K Telecommunication
L Digital
M Network
N Reuter
O None of the above

Part III: True or False

Direction: Say true or false for the following statements.

1. Technically defined an organization is a stable, formal social structure that takes


resourcesfrom the environment and processes them to produce outputs.
2. Computer stores data by creating a grid overlay of the picture and it measures the light or
color in each box or cell called pixel (picture element).
3. ASCII coding scheme is used in almost all microcomputers and many minicomputers.
4. A byte represents characters, letters, symbols that are meaningful to humans.
5. Speed of a computer is measured by its ability to read millions of instructions per second
6. A mouse contains keys you pressto enter data into the computer.
7. Hard disc is a flat, round, portable metal disc with a plastic coating.
8. Tapes are sequential access storage devices.
9. ALU is a storage device.
10. Application software is a one that manages and controls the computer hardware.

FEED BACK/ANSWER KEY


For Activities and
Self-Test Exercise (Self-Assessment Questions)

85
Answer Key for UNIT TWO

B. Answer for Activities

Feed Back/Answer for Activity 1


1. IT Provides new ways to design organizations and new organizational structures.
Technology creates new relationships between customers and suppliers who electron ically
link themselves together and it presents the opportunity for electronic commerce, which
reduces purchasing cycle times, increases the exposure of suppliers to customers, and
creates greater convenience for buyers.
2. IT is often used to describe stand-alone computer hardware and software. ICT, in contrast
is used to describe a group of computers that operate together via communication
hardware and software. While, Information System [IS] often used to describe an IT or
ICT that is particularly applied in the day to day operations of businesses or other forms
of organizations.
3. The use of technology to transform the organization
The use of information processing technology as a part of corporate strategy.
The use of technology to support knowledge workers.
The growth of the Internet and World Wide Web.

Feed Back/Answer for Activity 2


1. A hardware is the physical or tangible components of a computer system. A hardware is
composed of input, storage, processing, communication and output sub-systems of a
system.
2. In general, “Data is processed and stored in a computer system through the presence or
absence of electronic or magnetic signals in the computer circuitry or in the media it uses.
The smallest possible electronic data is a bit [binary digit] and it is represented by ‘on’ or
‘off’ in the electronic system of the computer. This is called a binary or two-sate
representation of data. The ‘on’ is symbolized by 1 and the ‘off’ is symbolized by 0. Each
symbol in a binary number (one or zero) is called a binary digit.
3. Microcomputers – These are the smallest types of computers often called personal
computers (PC) Minicomputers – These are larger and more powerful than
microcomputers. Mainframe computers – They are larger and more powerful than
minis and microcomputers. Supercomputer is the largest computer with an extra
ordinary computing power, which is designed for high-speed numeric computations.

Feed Back/Answer for Activity 3

86
1. Software is an instruction that directs the computer hardware to perform a certain
sequences of tasks. The two major categories of software are application software and
system software. The system software – This software manages the fundamental tasks of
the hardware. The application software is the software, which is the interface between the
system software and the end user
2. If the OS can do so (without your intervention) immediately after you attach the device, it
is a plug-and-play (PnP) OS, and the device, too, is referred to as a plug-and-play device.
3. When developers of software do not make the source code of their software public it is
called proprietary software. Whereas when the developers of software provide the source
code free of charge, usually on the Web it is called open source software.

Feed Back/Answer for Activity 4


1. The manner in which data is organized and arranged in a computer system from the
smallest bit to the largest database is termed data hierarchy: The smallest possible
electronic data is called a bit. A bit is a binary digit of either a 0 (off) or 1 (on). A bit
cannot represent a human letter. When related bits come together they form a byte. A
byte is made of 8 bits. A byte represents a human letter. A collection of related bytes is
called a field or attribute. An attribute is a characteristic of interest regarding the entity.
Entity is anything about which we would like to capture and store data. The set of related
attributes will form a record. A record captures data from particular occurrence of an
entity. When records come together they form file. A set of interrelated and centrally
coordinated files is called a database.
2. A file based data storage is the traditional file format, in which the different pieces of
information are not labeled and categorized, but are stored as continuous strings of bytes.
Where as in the database system, each piece of data is labeled or categorized, provides a
much more powerful information management tool. Any Database Management System
consists of three important elements in performing the four primary tasks. They are: Data
definition language (DDL): Programmers use this to describe and define entities,
attributes and their relationships in the database. Data Manipulation Language (DML):
DDL allows users to manipulate or process data in the database system. Manipulation
refers to sorting, extracting, copying and calculation of data in the system. Data Query
Language(DQL): DQL allows users to interrogate the database without worrying where
and how the data is actually, physically stored. Data dictionary: A catalogue for storing
or organising the definitions and relation of data in the database system.
3. Relational database is a database developed based on the relational data model. The
relational data model is an abstract representation of the contents of a data base and it
represents as if everything in the database as being stored in a form of table (also called
relation). The table has columns(representing fields or Attributes) and rows (representing
a tuple or record). Each attribute may be assigned as a primary key, foreign key or non-
key attribute. A primary key is an attribute that uniquely identifies a specific row in a
table. For example, Customer ID, Vendor ID…A foreign key is an attribute in one table

87
which is a primary key in another table. Its used to relate the table in which it exists with
the table in which it is a primary key. It is used to implement one to one and one to many
relationships. Non-key attribute is an attribute which is neither primary nor foreign key.
A non-key attribute is used to interrelate its table with the other table.

Feed Back/Answer for Activity 5


1. Telecommunications has brought several improvements to business processes. This
includes Better business communication, Greater efficiency, and Better distribution of
data, Instant transactions, Flexible and mobile workforce and offers Alternative channels
2. Network topology refers to the physical arrangement of the component of a network.
There are 5 types of network topology. These are Star, ring, bus, hybrid, and hierarchal.
3. Electronic-business [E-Business] is a generic term that describes all uses of advances in
information and communication technology to improve a business products and services
and to improve the efficiency and effectiveness of operations. There are two factors that
must be considered to reap success out of e-business investment. These are:
a. The manner in which e-business fit and support a company’s business strategy
b. The degree to which e-business assures the achievement of the three key
characteristics of any business transaction.

Answer for Self-Test Exercise (Self-Assessment Questions


 Part I: Multiple Choices
1 B 3 A 5 C 7 D 9 C
2 B 4 D 6 C 8 B 10 D
 Part II: Matching
1 G 3 K 5 A 7 I 9 F
2 D 4 M 6 H 8 J 10 E
 Part III: True or False
1 T 3 T 5 T 7 F 9 F
2 F 4 T 6 F 8 T 10 F

88
UNIT THREE
Application of Business Information System in Organizations

Unit Introduction

Dear learners, welcome to the third unit of this course! This part aims to acquaint you with
applications of Business Information System in organizations. The unit begins by identifying
the levels of management and the associated information requirements by levels of
management. Then it examines Information, Management and Decision making to
distinguish the different decision rules. Finally, it elaborates the individual and organization
decision models.

To succeed in business today, companies need information systems that can support the diverse
information and decision-making needs of their managers and businessprofessionals. In this unit,
we will explore in more detail how this is accomplishedby several types of management

89
information, decision support, and other informationsystems. We concentrate our attention on
how the Internet, intranets, and otherWeb-enabled information technologies have significantly
strengthened the role thatinformation systems play in supporting the decision-making activities
of every managerand knowledge worker in business.

Unit Objectives
 After studying this unit, you should be able to:
 Identify the levels of decision making and their information requirements
 Discuss the various applications of BIS in organizations
 Explain the interaction between information, decision making and management
 Identify the levels of management
 Discuss the nature of decision made under each level based on their scope,
structure and time horizon
 Identify the information requirements at different levels of management
 Discuss features of information need at each of these managerial levels
 Identify the various business functions and the role of ISs in these functions
 Distinguish the information requirements of the different managerial functions
 Explain how ISs in the basic business functions relate to each other
 Explain what decision making is and what it involves.
 Distinguish among decision making models
 Relate IT and Management

UNIT THREE - SECTION ONE


3.1. Levels of Management
 Section Objectives
 At the end of this section you should be able to:
• Identify the levels of management
• Discuss the nature of decision made under each level based on their scope,
structure and time horizon

Section Overview

The type of information required by decision makers in a company is directly related to the level
of management decision making and the amount of structure in the decision situations they face.

 Decision making involves making decisions now about what will happen in the future.

90
Obviously, decisions can turn out badly, or actual results can prove to be very different from the
estimates on which the original decision was made.

Ideally the decision maker would know with certainty what the futureconsequences will be for
each choice facing him. However, not all decision makers enjoy knowing their decisions
expected consequences and the real world is notnormally so helpful.

It is important to understand that the framework of the classic managerial pyramid applies even
in today’s downsized organizations and flattened or nonhierarchical organizational structures.

Levels of management decision making still exist, but their size, shape, and participants continue
to change as today’s fluid organizational structures evolve. Thus, the levels of managerial
decision making that must be supported by information technology in a successful organization
are:

3.1.1. Strategic Management


Typically, a board of directors and an executive committee of the CEO and top executives
develop overall organizational goals, strategies, policies, and objectives as part of a strategic
planning process. They also monitor the strategic performance of the organization and its overall
direction in the political, economic, and competitive business environment.

 The top management makes strategic planning decisions that are too unstructured and
that have wider scope and covers longer time horizon. BIS provides information to
reduce the uncertainty of top management

 Strategic planning is the process of deciding on objectives for the organization, on


changes in these objectives, on the resources to attain these objectives, and on the
policies that are to govern the acquisition, use and disposition of these resources.

3.1.2. Tactical Management


Increasingly, business professionals in self-directed teams as well as business unit managers
develop short- and medium-range plans, schedules, and budgets and specify the policies,
procedures, and business objectives for their subunits of the company. They also allocate
resources and monitor the performance of their organizational subunits, including departments,
divisions, process teams, project teams, and other workgroups.

 Middle level management engages in managerial control level decisions that are semi-
structured, and that have medium scope and covers medium time horizon. BIS assist

91
middle level management by providing information and in making structured
decisions.

 Management control is the process by which managers assure that resources are
obtained and used effectively and efficiently in the accomplishment of the
organization’s objectives. It is sometimes called tactics or tactical planning.

3.1.3. Operational Management.


The members of self-directed teams or operating managers develop short-range plans such as
weekly production schedules. They direct the use of resources and the performance of tasks
according to procedures and within budgets and schedules they establish for the teams and other
workgroups of the organization.

 Lower or supervisory levels management makes too structured decisions, and that have
short-term effect and covers shorter time horizon. BIS can make automated structured
decisions beyond provision of information to support decisions.

 Operational control (or operational planning) is the process of assuring that specific
tasks are carried out effectively and efficiently.

Activity 1
1 List and Discuss the levels of management.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Which managerial levels are associated with making too structured decisions?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Which managerial level makes decisions that cover longer time horizon
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

92
UNIT THREE - SECTION TWO
3.2. Information requirements at different levels
 Section Objectives
 At the end of this section you should be able to:
• Identify the information requirements at different levels of management
• Discuss features of information need at each of these managerial levels

Section Overview
Within, and at all levels of the organization, information is continually flowing back and forth,
being usedby people to formulate plans and take decisions, and to draw attention to the need for
control action,when the plans and decisions don't work as intended. In this section, we will look
at the information needs at all levels of theorganisation.

The features of BIS the functional subsystems that we discussed in unit one and the later
developments of managerial application of computers for managerial activities had led to the
chronological identification of information requirements and the development of the following
information systems to serve the different levels of managerial activities, which are operational,
middle and top management

As it is obvious from the above table, different level of management face different decision
structure and that requires different information with the identified characteristics.

93
The information used at different management levels for planning, control anddecision making
are classified into three tiers: strategic planning, management control and operational control.

3.2.1. Information for strategic planning, control and decision making


Dear learners, let us now identify the information requirements for strategic planning, control
anddecision making.

3.2.1.1. Future uncertainty


Much strategic planning is uncertain. Inevitably, management accounting information for
strategic planning will be based on incomplete data and will use forecasts and estimates.

3.2.1.2. External and competitor orientation


Strategic planning and control decisions involve environmental considerations. A strategy is
pursued in relation to competitors.

 The important fact, which distinguishes strategic management information from other
management information, is its external orientation, towards customers and
competitors, suppliers andperhaps other stakeholders.

3.2.1.3. Goal congruence


Business strategy involves the activities of many different functions, including marketing,
production andhuman resource management. The strategic management information system will
require inputs frommany areas of the business.

 Goal congruence is achieved when individuals or groups in an organization take


actions which are in their self-interest and also in the best interest of the organization
as a whole. Goal conflict or dysfunctional decision making is when units achieve their
own objective contradicting with the overall objective of the organization.

3.2.2. Information for management control


Management control is at the level below strategic planning and is concerned with decisions
about the efficient and effective use of resources to achieve objectives. The following are
features of management control information
(a) Primarily generated internally (but may have a limited external component)
(b) Embraces the entire organization
(c) Summarized at a relatively low level
(d) Routinely collected and disseminated
(e) Relevant to the short and medium terms

94
(f) Often quantitative (labor hours, volumes of sales and production)
(g) Collected in a standard manner
(h) Commonly expressed in money terms

3.2.3. Information for operational control

Operational control is concerned with assuring that specific tasks are carried out effectively and
efficiently. Just as 'management control' plans are set within the guidelines of strategic plans, so
too are 'operational control' plans set within the guidelines of both strategic planning and
management control.Operational control decisions are therefore much more narrowly focused
and have a shorter time framethan tactical or strategic decisions.
The following are features of management control information
(a) Operational information is information which is needed for the conduct of day-to-
dayimplementation of plans.
(b) It will include much 'transaction data' such as data about customer orders, purchase orders,
cashreceipts and payments and is likely to have an endogenous source.
(c) Operating information must usually be consolidated into totals in management reports before
itcan be used to prepare management control information.
(d) The amount of detail provided in information is likely to vary with the purpose for which it
isneeded, and operational information is likely to go into much more detail than tactical
information,which in turn will be more detailed than strategic information.
(e) Whereas tactical information for management control is often expressed in money
terms,operational information, although quantitative, is more often expressed in terms of units,
hours,quantities of material and so on.

Activity 2
1 Differentiate between goal congruence and goal conflict.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 What distinguishes strategic management information from other management orientation?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 List the characteristics of operational management information


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

95
UNIT THREE - SECTION THREE
3.3. Information requirements at different functional areas of management
 Section Objectives
 At the end of this section you should be able to:
• Identify the various businessfunctions and the role of ISs in these functions
• Distinguish the information requirements of the different managerial functions
• Explain how ISs in the basic business functions relate to each other.

Section Overview
In an economy that produces and consumes so much information, professionalsmust know how
to use information systems in virtually every business activity.Managers must have an overall
understanding of all elements of a system, so thatthey know what options are available to control
quality, costs, and resources.Modern information systems encompass entire business cycles,
often called supplychains.

Dear learner, you as today’s professional is expected to be knowledgeable not only in your
specific line of work but also in other areas.And since practically every business process
involves information technology, you are expected to know, orquickly learn, how to use the
proper ISs in your respective position. Many employers look for generalists rather thanspecialists
and focus on the techno-manager, a manager well-versed in information technology.

Because many ISs serve multiple functions and interface with other systems, it is extremely
important for a professionalto be familiar with the way ISs facilitate work in areas outside his or
her expertise. If you work for a commercialorganization, you are bound to be part of a supply
chain or work for a unit that supports a supply chain.

Knowledge of systems in different business areas helps you cooperate with your peers and
coordinate efforts thatcross departmental boundaries. Because professionals often have
opportunities to be promoted to positions in otherdisciplines, the more you know, the better your
chances of being “cross-promoted.”

 Business functions of a typical organization might include but not limited to


marketing, production (manufacturing), human resource management and financial
management functions.

96
Any functional manager performs the managerial activities of strategic planning, tactical control
and operational control depending on the level of management he is in the hierarchy of the
organisation.

The following diagram shows how activities of management are intertwined with different
managerial functions

Activities of Management

Strategic Planning and Control

Tactical planning and control

Operational Planning and Control

Finance
Manufacturing

Marketing

Human
Resource

Functions of Management

Figure 1-8: Division by activities and functions of management

Information system for each business function will constitute sub-system of business information
system.

3.3.1. Human Resource Management Information Systems

The Human Resource Management Information Subsystem provides management with


information on labour, personal data for recruitment and selection, job placement, performance
appraisal, employee benefit analysis, training and development; and health safety and security of
employees. The Human Resource Information Subsystems include the staffing subsystem, the

97
work force planning subsystem, training and development subsystem and the compensation
subsystem.

3.3.1.1. The Human Resource Operational Information Subsystems


The Accounting Information System, specifically the payroll system provides information on
salaries and wages paid to employees in an organisation. At the operational level of the human
resource management function, the personnel record keeping deals with maintaining personnel
data, background, skill, experience, pay rate changes, hours worked, pay checks, benefits,
termination notices, etc. The personnel database has employee skills inventory system that helps
human resource managers to locate employees with the skill needed for specific assignments and
projects. Middle level human resource managers need employee performance reports from
operational managers in addition to the information they require on the type of skill and
profession available in the labour market, the type of education provided by universities and
colleges. In addition, computers help human resource managers to analyse the payment structure
for different jobs and professions in order to decide on the appropriate levels of compensation.
The strategic human resource managers assess the environmental influence that affect the human
resource flow in the labour market.

In strategic planning,HRMIS assists human resource managers in evaluating alternative


strategies for recruiting, salary and benefits, training and development of staff, etc. The strategic
information required includes analyses of changing patterns of employment, education and wage
rates by area of the country (or world).

In general, human Resource Information subsystems assist organisation to anticipate future


human resource needs, to conduct internal searches, to identify current employees who should be
considered for job openings, and to appraise employees’ motivation.

3.3.2. Financial Management Information Systems


Financial Management is one of the areas of management that deals with solving problems
related to investment decisions, the method of financing new investments and/or existing
operations and dividend decisions. Computer based financial information systems assist
management in solving these areas of financial management problems. In general, financial
management information system is a subsystem of MIS that support management in financial
planning, preparing recurrent budget, cash and securities management, and capital acquisition
and capital budgeting decisions.

98
The financial management subsystem gathers data and information from internal sources and
external sources that are relevant to make financial decisions. The major internal sources of data
for financial decision making are income statements and the balance sheets. Production plans
from the manufacturing information system, and sales forecast from marketing information
system. Financial intelligence subsystem gathers external data and information; such as
inflation, interest rates, economic growth, etc.; from the environment that influences the financial
flow of the organisation. The major sources of external information are the financial community,
shareholders (owners) and government organisations.

The financial management information subsystem produces financial forecasts- forecasts that
cover the coming five to ten years to provide a basis for strategic financial planning.

 Major financial management information systems categories are cash and securities
management, capital budgeting systems and financial planning and budgeting systems.

3.3.3. Manufacturing Information System

Production (manufacturing) function includes product engineering, production planning, and


operation of production facilities, employment and training of production personnel, and quality
control and inspections. In manufacturing functions, computers have dual purposes. As a part of
physical system, computers serve to transform physical inputs into finished products. As a part of
conceptual system, computers are used in scheduling production, in controlling inventory such as
raw material, work in progress and finished goods inventories, in reporting production quality
and cost, in filling job orders, etc.

Software like CAD (Computer Aided Design) assist in product design, and computers with the
software CAM (Computer Aided Manufacturing) assists in assembling parts. Therefore, the MIS
is related to the conceptual system that is the manufacturing information system. The
manufacturing Information System is a subsystem of MIS that provides information on the
manufacturing process of an organisation; and it does not include the physical application of
computers such as CAD or CAM. Computers can facilitate the management of production at all
levels of manufacturing management.

At operational control level, computers assist in preparing weekly production schedules,


detailed reports comparing actual performance to the production schedule, and highlighting areas

99
where bottlenecks occur in a specific production process. There are inventory control systems
that support the proper management of raw material, work in process and finished goods
inventories, and materials requirement planning software that assist production managers in
planning and scheduling of inputs for the production process. At managerial (tactical) Control
level, computers assist middle level production managers to prepare summary reports, to
compare overall planned and standard performance of production to actual performance in terms
of material and labour applied. At Strategic level, modern computers are so powerful to assist
strategic production managers in providing external information on current model of productions
and technologies. In addition, computers can assist production managers when they make
strategic decisions regarding plant location and facility layout. The development in information
technology has assisted managers to browse the Internet to obtain information on technological
changes and new developments in the method of production from around the world. This assists
top managers to consider alternative manufacturing and automation approaches for
manufacturing specific products in their organisations.

3.3.4. Marketing information System

Marketing information subsystem provides information to solve different marketing problems.


The marketing function includes all activities related to the “four Ps”, which are product
decisions, pricing decisions, promotion decisions and distribution (place) decisions.

Much of the input information for operational marketing decision-making is obtained from the
transaction processing systems, specifically accounting information system and manufacturing
information systems.The marketing information subsystems produce sales analysis reports,
sales forecasts, customer analysis and other managerial reports related to products, prices,
distributions and market conditions.The operational control activity of marketing management
produces the day to day scheduling of sales and promotion efforts, and periodic reports of sales
volumes by region, product, customer, etc. The marketing tactical management group is
responsible to make comparison of marketing overall performance against the marketing plan of
the organisation and produce sales analysis reports. The Strategic Planning & Control activity
is mainly considering how to establish new markets, and new marketing strategies. Information
requirement for this group of marketing management includes customer analyses, competitor’s
analyses, consumer survey information, income projection, and demographic projection and
technology projections.

100
Activity 3
1 Identify typical business function of an organization.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 What is the information provided by human resource management information sub system of a BIS?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 List the major categories of financial management information systems.


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT THREE - SECTION FOUR


3.4. Information, Management, and Decision Making
 Section Objectives
 At the end of this section you should be able to:
• Explain what decision making is and what it involves.
• Identify the levels of decision making
• Distinguish among decision making models
• Relate IT and Management

Section Overview
Managers often are referred to as decision makers, and every organization grows, prospers,or
fails as a result of decisions by its managers. Many manager decisions arestrategic, such as
whether to build a new factory, move into a new line of business,or sell off a division. Yet
managers also make decisions about every other aspectof an organization, including structure,
control systems, responses to the environment,and human resources. Managers scout for
problems, make decisions for solvingthem, and monitor the consequences to see whether
additional decisions arerequired. Good decision making is a vital part of good management
because decisionsdetermine how the organization solves its problems, allocates resources,
andaccomplishes its goals.

 A choice made from available alternatives is decision while the process of identifying
problems and opportunities and then resolving them is decision making

101
3.4.1. Introduction to Decision Making

A decision is a choice made from available alternatives. Many people assume that making a
choice is the major part of decision making, but it is only a part.Decision making is the process
of identifying problems and opportunities and then resolving them. Decision making involves
effort both before and after the actual choice.
There are Six Steps in the ManagerialDecision-Making Process summarized in the diagram
below:

Individual managers facing identical scenario may not reach into a same decision. This may be
due to individual differences of managers. Some managers tend to be risk averse, some are
neutral and some could be risk takers, with big appetite to risk. This concept can be elaborated
by identifying the three types of decision rules used by managers with in organizations.

 The 'play it safe' basis for decision making is referred to as the maximin basis. This is
short for 'maximise the minimum achievable profit'. A basis for making decisions by
looking for the best outcome is known as the maximax basis, short for 'maximise the
maximum achievable profit'.The ‘opportunity loss’ basis for decision making is known
as minimax regret.

There are otherrules such as the expected value (EV) rule that basis decision on probability
estimates and that a decision-maker may prefer to use.

3.4.1.1. Types of Decision Rules


Individual managers facing identical scenario may decide differently due to the particular
decision rule they use. These are

3.4.1.1.1. Maximin decision rule

102
The maximin decision rule is that a decision maker should select the alternative that offers the
leastunattractive worst outcome. This would mean choosing the alternative that maximisesthe
minimumprofits.
Suppose a businessman is trying to decide which of three mutually exclusive projects to
undertake. Sincethey are mutually exclusive, only one of the projects can be selected. Each of the
projects could lead tovarying net profit under three possible scenarios or outcomes.

Scenario/ Outcome Project and Profit


Situation
D E F
1 $100,000 $80,000 $60,000
2 90,000 120,000 85,000
3 (20,000) 10,000 85,000

The maximin decision rule is to select the option that offers the best minimum profit – the best
‘worstpossible result' that could happen.In this example, the worst possible is a loss of $20,000
with Project D, a profit of $10,000 with Project Eand a profit of $60,000 with Project F. The best
worst outcome is 60,000 and project F would therefore beselected (because this is a better 'worst
possible' than either D or E).

3.4.1.1.1.1. Criticisms of the maximin rule


(a) It is defensive and conservative, being a safety first principle of avoiding the worst
outcomeswithout taking into account opportunities for maximising profits.
(b) It ignores the probability of each different outcome taking place.

3.4.1.1.2. Maximax decision rule


The maximax criterion looks at the best possible results. Maximax means 'maximise the
maximumprofit'. The decision with this rule is to choose the option that could provide the
maximum possible profit.

Using the above example, the maximum profit for Project D is $100,000; for Project E it
is$120,000; and for Project F it is $85,000.
Project E would be chosen if the maximax rule is followed, because it offers the prospect of the
biggestprofit.

3.4.1.1.2.1. Criticisms of the maximax rule


(a) It ignores the probabilities of different outcomes.
(b) It ignores the outcomes that are less than the best possible. For some decision options, the
worstpossible may be more than the organisation can afford. It is a decision rule for the risk-
seeker.

103
3.4.1.1.3. Minimax regret rule
The minimax regret rule aims to minimise the regret from making the wrong decision.

 Regret is theopportunity lost through making the wrong decision.


The ‘minimax regret’ decision rule is another possible decision rule for choosing between
differentdecision options. It is a bit more complicated than the maximin rule or the maximax
rule.
With this decision rule, for each of the possible outcome situations, we compare the different
values ofprofit (or cost) for each of the decision options.

For each outcome situation, we measure the amount of the ‘regret’ for each decision option.

Regret for the decisionoption


= Profit from the best decisionoption, given the outcomecircumstances or situation
– Profit from the decisionoption, given theoutcome circumstancesor situation
For the decision option with the best outcome, given the circumstances or situation, the regret =
$0. Forthe other decision options, the regret always has a positive value. It is the amount by
which the profit isworse than if the best decision option had been taken, in view of the outcome
circumstances.
The regret is calculated for all the decision options in each of the possible outcome
circumstances, andthese are recorded in a pay-off table.
The decision rule is to select the decision option that has the lowest value of regret (= the
minimumregret).
The minimax regret decision rule is that the decision option selected should be the one which
minimizes the maximum potential regret for any of the possible outcomes.

This may seem complicated, but an example should help to clarify the rule.
Using the above example in, a table of regrets can be compiled as follows.

The regret for each decision option in each outcome situation is shown in the Regret table below.
Senario/ Project and Profit
Outcome
D E F
Situation
1 0*($100,000-100,000) 20,000 (100,000-$80,000) 40,000 (100,000-$60,000)
2 30,000 (120,000-90,000) **0(120,000-120,000) 35,000(120,000-85,000)
3 105,000 (85,000-(20,000)) 75,000 (85,000-10,000) ***0(85,000-85,000)

* With outcome situation 1, the best possible result is obtained from Project D, so the regret with
Project Dis $0. The result with Option E would be 20,000 worse and the result from Option F

104
would be 40,000 worse. So 20,000and 40,000 are the amounts of the regret for Options D and F
respectively.
** With outcome situation 2, the best possible result is obtained from Project E, so the regret
with ProjectE is $0. The result with Option D would be 30,000 worse and the result from Option
F would be 35,000 worse. So30,000 and 35,000 are the amounts of the regret for Options D and
F respectively.
*** With outcome situation 3, the best possible result is obtained from Project F, so the regret
withProject F is $0. The result with Option D would be 105,000 worse and the result from
Option E would be 75,000worse. So 105,000 and 75,000 are the amounts of the regret for
Options D and E respectively.
As a result under each project the Maximum regret will be 105,000, 75,000 and 40,000
The lowest of maximum regrets is 40,000 with project Option F so Option F would be selected,
if the minimaxregret rule is used as the basis for making the decision.

3.4.2. Levels of Decision Making


Management decisions typically fall into one of two categories: programmed and
nonprogrammed.

Programmed decisions involve situations that have occurred often enough to enable decision
rules to be developed and applied in the future.Programmed decisions are made in response to
recurring organizational problems.The decision to reorder paper and other office supplies when
inventories drop toa certain level is a programmed decision. Other programmed decisions
concernthe types of skills required to fill certain jobs, the reorder point for
manufacturinginventory, exception reporting for expenditures ten percent or more over
budget,and selection of freight routes for product deliveries. Once managers formulatedecision
rules, subordinates and others can make the decision, freeing managersfor other tasks.

Nonprogrammed decisions are made in response to situations that are unique, are poorly defined
and largely unstructured, and have important consequences. Many nonprogrammed
decisionsinvolve strategic planning because uncertainty isgreat and decisions are complex.
Decisions to build anew factory, develop a new product or service, entera new geographical
market, or relocate headquartersto another city are all nonprogrammed decisions.

 Programmed decision is adecision made in response toa situation that has


occurredoften enough to enable decisionrules to be developed andapplied in the
future.nonprogrammed decision is a decision made in responseto a situation that is
unique,is poorly defined and largelyunstructured, and has importantconsequences for
theorganization.

105
One primary difference between programmed and nonprogrammeddecisions relates to the degree
of certaintyor uncertainty that managers deal with in making thedecision. In a perfect world,
managers would have all theinformation necessary for making decisions. In reality,however,
some things are unknowable; thus, some decisionswill fail to solve the problem or attain the
desiredoutcome. Managers try to obtain information aboutdecision alternatives that will reduce
decision uncertainty.

Every decision situation can be organized on ascale according to the availability of information
and thepossibility of failure. The four positions on the scale arecertainty, risk, uncertainty, and
ambiguity

3.4.3. Organizational Decision-Making Models


The approach managers use to make decisions usually fallsinto one of three types—the classical
model, the administrativemodel, or the political model. The choice of modeldepends on the
manager’s personal preference, whetherthe decision is programmed or nonprogrammed, and
thedegree of uncertainty associated with the decision.

3.4.3.1. The Ideal, Rational Modela.k.a The Classical Model


The classical model of decision making is based on rationaleconomic assumptions and manager
beliefs about whatideal decision making should be. This model has arisenwithin the management
literature because managers are expected to make decisionsthat are economically sensible and in
the organization’s best economic interests. Thefour assumptions underlying this model are as
follows:
1. The decision maker operates to accomplish goals that are known and agreed on.Problems are
precisely formulated and defined.
2. The decision maker strives for conditions of certainty, gathering complete information.All
alternatives and the potential results of each are calculated.
3. Criteria for evaluating alternatives are known. The decision maker selects thealternative that
will maximize the economic return to the organization.
4. The decision maker is rational and uses logic to assign values, order preferences,evaluate
alternatives, and make the decision that will maximize the attainment oforganizational goals.

The classical model of decision making is considered to be normative, whichmeans it defines


how a decision maker should make decisions. It does not describehow managers actually make
decisions so much as it provides guidelines on how toreach an ideal outcome for the
organization. The ideal, rational approach of the classicalmodel is often unattainable by real
people in real organizations, but the modehas value because it helps decision makers be more
rational and not rely entirely onpersonal preference in making decisions.

106
The classical model is most useful when applied to programmed decisions and todecisions
characterized by certainty or risk because relevant information is availableand probabilities can
be calculated. For example, new analytical software programsautomate many programmed
decisions, such as freezing the account of a customerwho has failed to make payments,
determining the cell phone service plan that is mostappropriate for a particular customer, or
sorting insurance claims so that cases arehandled most efficiently.

Airlines use automated systems to optimize seat pricing,flight scheduling, and crew assignment
decisions. Retailers use software programs to analyze sales data and decide when, where,
andhow much to mark down prices. Many companies use systems that capture informationabout
customers to help managers evaluate risks and make credit decisions.

The growth of quantitative decision techniques that use computers has expandedthe use of the
classical approach. Quantitative techniques include such things as decisiontrees, payoff matrices,
break-even analysis, linear programming, forecasting,and operations research models.

3.4.3.2. The administrative model


The administrative model of decision making is consideredto be descriptive, meaning that it
describes how managers actually make decisionsin complex situations rather than dictating how
they should make decisionsaccording to a theoretical ideal. The administrative model recognizes
the human andenvironmental limitations that affect the degree to which managers can pursue
arational decision-making process. In difficult situations, such as those characterizedby
nonprogrammed decisions, uncertainty, and ambiguity, managers are typicallyunable to make
economically rational decisions even if they want to.

 The administrative model of decisionmaking is based on bounded rationality and


satisficing. Bounded rationality means that people have limits, or boundaries,on how
rational they can be.

The organization is incredibly complex, and managershave the time and ability to process only a
limited amount of information with which to make decisions. Because managers do not have the
time or cognitiveability to process complete information about complex decisions, they must
satisfice.

 Satisficing means that decision makers choose the first solution alternativethat
satisfies minimal decision criteria.

107
Rather than pursuing all alternativesto identify the single solution that will maximize economic
returns, managers will opt for the first solution that appears to solve the problem, even if better
solutionsare presumed to exist. The decision maker cannot justify the time and expense
ofobtaining complete information

Managers sometimes generate alternatives for complex problems only until theyfind one they
believe will work. The administrative model relies on assumptions different from those of the
classicalmodel and focuses on organizational factors that influence individual decisions.
According to the administrative model:
1. Decision goals often are vague, conflicting, and lack consensus among managers.
Managers often are unaware of problems or opportunities that exist in theorganization.
2. Rational procedures are not always used, and, when they are, they are confinedto a simplistic
view of the problem that does not capture the complexity of realorganizational events.
3. Managers’ searches for alternatives are limited because of human, information,and resource
constraints.
4. Most managers settle for a satisficing rather than a maximizing solution, partlybecause they
have limited information and partly because they have only vaguecriteria for what constitutes a
maximizing solution.

Another aspect of administrative decision making is intuition. Intuitionrepresents a quick


apprehension of a decision situation based on past experience butwithout conscious thought.
Intuitive decisionmaking is not arbitrary or irrationalbecause it is based on years of practice
andhands-on experience that enable managersto quickly identify solutions without goingthrough
painstaking computations. Intoday’s fast-paced business environment,intuition plays an
increasingly importantrole in decision making.

 Good intuitivedecision making is based on an abilityto recognize patterns at lightning


speed.

When people have a depth of experienceand knowledge in a particular area, theright decision
often comes quickly andeffortlessly as recognition of informationthat has been largely forgotten
by the decision maker.

3.4.3.3. Political Model


The third model of decision making is useful for making nonprogrammed decisionswhen
conditions are uncertain, information is limited, and there are manager conflictsabout what goals
to pursue or what course of action to take. Most organizational decisionsinvolve many managers
who are pursuing different goals, and they have to talkwith one another to share information and

108
reach an agreement. Managers often engagein coalition building for making complex
organizational decisions.

 A coalition is an informalalliance among managers who support a specific goal.

Coalition building is the processof forming alliances among managers. In other words, a
manager who supports a specificalternative, such as increasing the corporation’s growth by
acquiring another company,talks informally to other executives and tries to persuade them to
support the decision.

Without a coalition, a powerful individual or group could derail the decision-makingprocess.


Coalition building gives several managers an opportunity to contribute to decisionmaking,
enhancing their commitment to the alternative that is ultimately adopted.

The political model closely resembles the real environment in which most managersand decision
makers operate. Decisions are complex and involve many people, information is
oftenambiguous, and disagreement and conflictict over problems and solutions are normal.
The political model begins with four basic assumptions:
1. Organizations are made up of groups with diverse interests, goals, and values.
Managers disagree about problem priorities and may not understand or share thegoals and
interests of other managers.
2. Information is ambiguous and incomplete. The attempt to be rational is limitedby the
complexity of many problems as well as personal and organizationalconstraints.
3. Managers do not have the time, resources, or mental capacity to identify all dimensionsof the
problem and process all relevant information. Managers talk to eachother and exchange
viewpoints to gather information and reduce ambiguity.
4. Managers engage in the push and pull of debate to decide goals and discuss alternatives.
Decisions are the result of bargaining and discussion among coalitionmembers.

3.4.4. Individual Decision-Making Rules


Imagine you were a manager at Ethiopian Airlines, or at Matti-Multiplex, or the ethiotelecom.
How would you go about making important decisionsthat might shape the future of your
department or company? So far we have discusseda number of factors that affect how managers
make decisions. For example,decisions may be programmed or nonprogrammed, situations are
characterized byvarious levels of uncertainty, and managers may use the classical,
administrative, orpolitical model of decision making. In addition, the decision-making process
followssix recognized steps.

109
However, not all managers go about making decisions in the same way. In fact, significant
differences distinguish the ways in which individual managers mayapproach problems and make
decisions concerning them. These differences can beexplained by the concept of individual
decision styles.

 Personal decision style refers todistinctions among people with respect to how they
evaluate problems, generatealternatives, and make choices.

Research has identified four major decision styles:directive, analytical, conceptual, and
behavioral.
1. The directive style is used by people who prefer simple, clear-cut solutions to problems.
Managers who use this style often make decisions quickly because they donot like to deal with a
lot of information and may consider only one or two alternatives.

People who prefer the directive style generally are efficient and rationaland prefer to rely on
existing rules or procedures for making decisions.
2. Managers with an analytical style like to consider complex solutions based on asmuch data as
they can gather. These individuals carefully consider alternativesand often base their decisions
on objective, rational data from management controlsystems and other sources. They search for
the best possible decision based onthe information available.
3. People who tend toward a conceptual style also like to consider a broad amount ofinformation.
However, they are more socially oriented than those with an analyticalstyle and like to talk to
others about the problem and possible alternatives forsolving it. Managers using a conceptual
style consider many broad alternatives,rely on information from both people and systems, and
like to solve problemscreatively.
4. The behavioral style is often the style adopted by managers having a deep concernfor others as
individuals.
Managers using this style like to talk to people one-on-oneand understand their feelings about the
problem and the effect of decision on them. People with a behavioral style usually are concerned
with thepersonal development of others and may make decisions that help others achievetheir
goals.

3.4.5. Management and Technology


A goal for many of today’s operations managers is to find the right combination of technology
and management to most efficiently produce goods and services. Let’slook at three advances in
manufacturing and service operations.

1. Radio-Frequency Identification (RFID)

110
Radio-frequency identification (RFID) uses electronic tags that can identify and trackindividual
items such as books, jugs of laundry detergent, automobiles, or even people. RFID tags emit
radio signals that can be read remotelyby electronic readers and provideprecise, real-time
informationabout the location of specific items.

2. Flexible Manufacturing Systems


Advanced technology has also revolutionized manufacturing. The use of automatedproduction
lines that can be quickly adapted to produce more than one kind of productis called a flexible
manufacturing system. The machinery uses sophisticatedcomputer technology to coordinate and
integrate the machines. Automated functionsinclude loading, unloading, storing parts, changing
tools, and machining. Thecomputer can instruct the machines to change parts, machining, and
tools when anew product must be produced. Human operators make adjustments to the
computer,not the production machinery itself, dramatically cutting the time and expenseof
making changes.

3. Lean Manufacturing
Lean manufacturing, sometimes called lean production, combinesadvanced technology with
innovative managementmethods, using highly trained employees who take a
painstakingapproach to problem solving at every stage of theproduction process to cut waste and
improve quality andproductivity.

3.4.6. Technologyhas Transformed Management


Advanced information technology makes just-in-time inventory management workseamlessly,
but it has also transformed management in many other ways. An organization’sinformation
technology (IT) has positive implications for the practice of management.
Time, distance, and other boundaries between individuals, departments, andorganizations are
irrelevant in today’s business world. Collaboration is what it’s allabout. Information technology
can connect people around the world for the sharingand exchange of information and ideas.
Information technology plays a key role in managers’ efforts to support and
leverageorganizational knowledge.

 Knowledge management refers to the efforts to systematically gather knowledge,


organize it, make it widely available throughout the organization, and foster a culture
of continuous learning and knowledge sharing.

 Knowledge goes a step further from information and two steps from data; it is a
conclusion drawn from the information after it is linked to other information and
compared to what is already known. Knowledge, as opposed to information and data,

111
always has a human factor. Books can contain information, but the information
becomes knowledge only when a person absorbs it and puts it to use

IT systems facilitate knowledge management by enabling organizations to collect and store


tremendous amounts of data; analyze that data so it can be transformed into information and
knowledge, and share knowledge all across the enterprise. An IT application for knowledge
management is the use of businessintelligence software that analyzes data and extracts useful
insights, patterns, andrelationships that might be significant.

3.4.7. Management Information Systems


A management information system (MIS) is a computer-based system that providesinformation
and support for effective managerial decision making.MISs typically supports strategic decision-
making needs of mid-level and top management.

Management information systems typically include decision support systems,executive


information systems, and groupware.

3.4.7.1. Decision Support Systems


Decision support systems (DSSs) are interactive, computer-based informationsystems that rely
on decision models and specialized databases to support decisionmakers. With electronic
spreadsheets and other decision support software, users canpose a series of what-if questions to
test alternatives they are considering. Based onthe assumptions used in the software or specified
by the user, managers can explorevarious alternatives and receive tentative information to help
them choose the alternativewith the best outcome.

3.4.7.2. Executive Information Systems


Executive information systems (EISs) are management information systems to facilitatestrategic
decision making at the highest level of management. These systems aretypically based on
software that provides easy access to large amounts of complex dataand can analyze and present
information in a timely fashion. EISs provide top managementwith quick access to relevant
internal and external information and, if designedproperly, can help them diagnose problems as
well as develop solutions.

3.4.7.3. Groupware
Groupware is software that workson a computer network or via the Internet to link people
orworkgroups across a room or around the globe. The softwareenables managers or team
members to communicate, shareinformation, and work simultaneously on the same
document,chart, or diagram and see changes and comments asthey are made by others.
112
Sometimes called collaborative worksystems, groupware systems allow people to interact
withone another in an electronic meeting space and at the sametime take advantage of computer-
based support data.

3.4.8. Enterprise Resource Planning Systems


Enterprise resource planning (ERP) systems integrate and optimize all the various business
processes across the entire firm. An enterprise resource planning system can become the
backbone of an organization’s operations. It collects, processes, and provides information about
an organization’sentire enterprise, including orders, product design, production, purchasing,
inventory,distribution, human resources, receipt of payments, and forecasting of future demand.

Activity 4
1 What is a decision and what is decision making.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Explain the maximin, maximax and minimax regret decision rules?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 What is the difference between programmed and non-programed decesions.


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

 UNIT SUMMARY
To succeed in business today, companies need information systems that can support the diverse
information and decision-making needs

The type of information required by decision makers in a company is directly related to the level of
management decision making and the amount of structure in the decision situations they face.

 Decision making involves making decisions now about what will happen in the future.

113
The top management makes strategic planning decisions that are too unstructured and that have wider
scope and covers longer time horizon. BIS provides information to reduce the uncertainty of top
management

Strategic planning is the process of deciding on objectives for the organization, on changes in these
objectives, on the resources to attain these objectives, and on the policies that are to govern the
acquisition, use and disposition of these resources.

Middle level management engages in managerial control level decisions that are semi-structured, and that
have medium scope and covers medium time horizon. BIS assist middle level management by providing
information and in making structured decisions.

Management control is the process by which managers assure that resources are obtained and used
effectively and efficiently in the accomplishment of the organization’s objectives. It is sometimes called
tactics or tactical planning.

Lower or supervisory levels management makes too structured decisions, and that have short-term effect
and covers shorter time horizon. BIS can make automated structured decisions beyond provision of
information to support decisions.

Operational control (or operational planning) is the process of assuring that specific tasks are carried out
effectively and efficiently.

114
The 'play it safe' basis for decision making is referred to as the maximin basis. This is short for 'maximise
the minimum achievable profit'. A basis for making decisions by looking for the best outcome is known
as the maximax basis, short for 'maximise the maximum achievable profit'.The ‘opportunity loss’ basis
for decision making is known as minimax regret.

The classical model of decision making is based on rationaleconomic assumptions and manager
beliefs about whatideal decision making should be.

The administrative model of decision making is consideredto be descriptive, meaning that it


describes how managers actually make decisionsin complex situations rather than dictating how
they should make decisionsaccording to a theoretical ideal.

 Satisficing means that decision makers choose the first solution alternative that satisfies
minimal decision criteria.
The political model of decision making is useful for making nonprogrammed decisionswhen
conditions are uncertain, information is limited, and there are manager conflictsabout what goals
to pursue or what course of action to take.

Checklist
Now that you have completed the third unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Ca Understand levels of decision making
n Know the information requirements of various decision making
Yo Explain the interaction between information, decision making and management
u Identify the levels of management
Discuss the nature of decision made under each level based on their scope,
structure and time horizon
Identify the information requirements at different levels of management
Discuss the features of information need at each managerial levels
Identify the various business functions and the role of ISs in these functions
Distinguish the information requirements of the different managerial functions
Explain how ISs in the basic business functions relate to each other
Explain what decision making is and what it involves
Distinguish among decision making rules
Distinguish among decision making models
Describe the personal traits of decision makers
Relate IT and Management

Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above

115
requirements! If not, go back and get done the unfulfilled part!

 SELF-TEST EXERCISE (SELF-ASSESSMENT QUESTIONS)

Part I: Multiple Choices

Direction: Choose the best answer from the given alternatives

1. A decision made by top management that are unstructured and that have wider scope
and covers longer time horizon are best described:
A. Tactical planning, D. Operational control,
B. Strategic Planning, E. None of the above.
C. Management controls,
2. The process of assuring that specific tasks are being carried out effectively and
efficiently is ?
A. Tactical planning, D. Operational control,
B. Strategic Planning, E. None of the above.
C. Management controls,
3. Which one of the following is not a characteristic of strategic management information?
A. Ad-hoc, D. External,
B. Infrequent, E. None of the above
C. Detailed,
4. Which business function involve product engineering, production planning and
operation of production facilities?
A. Marketing, D. Manufacturing,
B. Human Resource, E. None of the above.
C. Financial Management,
5. Which one of the following is not one of the steps in decision making?
A. Evaluation and Feedback, D. Selection of desired
B. Recognition of decision alternative,
requirement, E. None of the above
C. Development of alternatives,
6. The play it safe basis for decision making is best described by:
A. maximin, D. Expected value,
B. maximax, E. None of the above
C. minimax regret,
7. Decisions that involve situations that have occurred often enough to enable decision
rules to be developed and applied in the future are best described by:
A. Strategic, D. nonprogrammed,
B. Tactical, E. None of the above
C. programmed,
8. Which one of the following refers to distinctions among people with respect to how they
evaluate problems, generate alternatives and make choice?

116
A. Analytical style, D. Conceptual Style,
B. Directive style, E. None of the above.
C. Personal decision style,
9. Which one of the following decision model is referred to as the classical model of
decision making?
A. Ideal-Rational Model D. Programmed Model
B. Administrative Model E. None of the above.
C. Political Model
10. A production that combines advanced technology with innovative management methods
through highly trained employees to cut waste and improve quality and productivity is
best described by
A. RFID D. Decision support systems,
B. Lean Manufacturing E. None of the above.
C. Knowledge Management
Part II: Matching

Direction: Choose the best answer from the given alternatives

Column One Column Two


1 Computer-based informationsystem that rely on decision models A MIS
and specialized databases to support decisionmakers
2 An IS that facilitatestrategic decision making at the highest level of B ERP
management.
3 A software that workson a computer network or via the Internet to C Behavioral Style
link people orworkgroups across a room or around the globe
4 A system that integrates and optimize all the various business D Conceptual Style
processes across the entire firm
5 A computer-based system that providesinformation and support for E DSS
effective managerial decision making
6 A managerial style adopted by managers having a deep concern for F Analytical Style
others as individuals
7 A decision making based on an ability to recognize patterns at G Directive Style
lightning speed
8 When a decision maker choose he first solution alternative that H Intuitive Decision
satisfied minimal decision criteria
9 People limits on how rational they can be I EIS
10 A normative decision making J Maximin
K Satisficing
L Groupware
M Bounded
rationality
N Classical model
O None of the above

117
Part III: True or False

Direction: Say true or false for the following statements.

1. A difference between programmed and nonprogrammeddecisions relates to the degree of


certaintyor uncertainty that managers deal with in making thedecision.
2. Programmed decisions are made in response to situations that are unique, are poorly
defined and largely unstructured, and have important consequences.
3. The minimax regret decision rule is that the decision option selected should be the one
which minimizes the maximum potential regret for any of the possible outcomes
4. Regret is the opportunity lost through making the right decision.
5. A choice made from available alternatives is decision while the process of identifying
problems and opportunities and then resolving them is decision making
6. The marketing tactical management group is responsible to make comparison of
marketing overall performance against the marketing plan of the organisation and
produce sales analysis reports.
7. Major Manufacturing information systems categories are cash and securities
management, capital budgeting systems and financial planning and budgeting systems.
8. All functional managers perform the managerial activities of strategic planning, tactical
control and operational control.
9. Business functions are groups of similar business activities like marketing, production...
10. The Human Resource Information Subsystems include the staffing subsystem, the work
force planning subsystem, training and development subsystem and the compensation
subsystem.

FEED BACK/ANSWER KEY


For Activities and
Self-Test Exercise (Self-Assessment Questions)

Answer Key for UNIT THREE

Answer for Activities

Feed Back/Answer for Activity 1

118
1. The levels of management are top, middle and lower levels associated with strategic
management, tactical management and operational management. The top management
makes strategic planning decisions that are too unstructured and that have wider scope
and covers longer time horizon. Middle level management engages in managerial control
level decisions that are semi-structured, and that have medium scope and covers medium
time horizon. Lower or supervisory levels management makes too structured decisions,
and that have short-term effect and covers shorter time horizon.
2. The managerial level associated with too structured decisions is lower level management.
3. The managerial level associated with decisions of longer horizon is top level management

Feed Back/Answer for Activity 2


1. Goal congruence is achieved when individuals or groups in an organization take actions
which are in their self-interest and also in the best interest of the organization as a whole.
Goal conflict or dysfunctional decision making is when units achieve their own objective
contradicting with the overall objective of the organization.
2. The important fact, which distinguishes strategic management information from other
management information, is its external orientation, towards customers and competitors,
suppliers and perhaps other stakeholders.
3. The characteristics of operational management information include: structured, pre-
specified, detailed, frequent, historical, internal, and narrow focused.

Feed Back/Answer for Activity 3


1. Business functions of a typical organization might include but not limited to marketing,
production (manufacturing), human resource management and financial management
functions.
2. The Human Resource Management Information Subsystem provides management with
information on labour, personal data for recruitment and selection, job placement,
performance appraisal, employee benefit analysis, training and development; and health
safety and security of employees.
3. Major financial management information systems categories are cash and securities
management, capital budgeting systems and financial planning and budgeting systems.

Feed Back/Answer for Activity 4


4. A choice made from available alternatives is decision while the process of identifying
problems and opportunities and then resolving them is decision making
5. The 'play it safe' basis for decision making is referred to as the maximin basis. This is
short for 'maximise the minimum achievable profit'. A basis for making decisions by
looking for the best outcome is known as the maximax basis, short for 'maximise the
maximum achievable profit'.The ‘opportunity loss’ basis for decision making is known as
minimax regret.

119
6. Programmed decision is a decision made in response to a situation that has occurred often
enough to enable decision rules to be developed and applied in the future.
nonprogrammed decision is a decision made in response to a situation that is unique, is
poorly defined and largely unstructured, and has important consequences for the
organization. One primary difference between programmed and nonprogrammed
decisions relates to the degree of certainty or uncertainty that managers deal with in
making the decision.

Answer for Self-Test Exercise (Self-Assessment Questions


 Part I: Multiple Choices
1 B 3 C 5 E 7 D 9 A
2 D 4 D 6 A 8 C 10 B
 Part II: Matching
1 E 3 L 5 A 7 H 9 M
2 I 4 B 6 C 8 K 10 N
 Part III: True or False
1 T 3 T 5 T 7 F 9 T
2 F 4 F 6 T 8 F 10 T

UNIT FOUR
Strategic Advantage of Information

Unit Introduction

Dear learners, welcome to the fourth unit of this course! This unit enables you to perceive
technology as the actual cause and driver of business strategy than an afterthought. The unit

120
begins by explaining strategic role of information systems, and it proceeds by relating
information systems and business strategy. It will discuss how systems must be used to attain
competitive advantage. Finally, it will explain how you as business managers can maintain
the competitive advantage secured through technology.

This unit will show you that it is important to view information systems asmore than a set of
technologies that support efficient business operations, workgroupand enterprise collaboration,
or effective business decision making.

 Information technology can change the way businesses compete.

You should also view informationsystems strategically, that is, as vital competitive networks, as
a means of organizationalrenewal, and as a necessary investment in technologies; such
technologies helpa company adopt strategies and business processes that enable it to reengineer
or reinventitself to survive and succeed in today’s dynamic business environment.

Accordingly in this unit, you will be introduced with fundamental competitive strategy concepts
thatunderlie the strategic use of information systems and with the several majorstrategic
applications of information technology used by many companies today.

Unit Objectives
 After studying this unit, you should be able to:
 Identify several basic competitive strategies
 Explain how they competitive strategies use information technologies to
confront the competitive forces faced by a business.
 Identify several strategic uses of information technologies
 Explain how technologies can help a business gain competitive advantages.
 Identify the business value of using Information technologies to become an
agile competitor or form a virtual company.
 Explain how knowledge management systems can help a business gain strategic
advantages.
 Discuss the basic concepts that define the role of competitive strategy as it
applies to information systems.
 Identify the strategic roles of Information systems
 Explain how companies develop competitive strategies using information
systems
 Discuss how information systems help businesses use synergies, core
competencies, and network-based strategies to achieve competitive advantage.
 Explain how companies use information systems for competitive advantage

121
 Discuss how information systems help businesses to sustain their competitive
advantage.

UNIT FOUR - SECTION ONE


4.1. Strategic Role of Information Systems
 Section Objectives
 At the end of this section you should be able to:
• Discuss the basic concepts that define the role of competitive strategy as it applies
to information systems.
• Identify the strategic roles of Information systems

Section Overview
A major role of information systems applications in business is to provide effective support of a
company’s strategies for gaining competitive advantage. This strategic role of information
systems involves using information technology to develop products, services, and capabilities
that give a company majoradvantages over the competitive forces it faces in the global
marketplace.

This role is accomplished through strategic information architecture: the collectionof strategic
information systems that supports or shapes the competitive positionand strategies of a business
enterprise.

 A strategic information system can be any kind of information system (e.g., TPS, MIS,
and DSS) that uses information technology to help an organization gain a competitive
advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives.

The figure below illustrates the various competitive forces a business might encounter, aswell as
the competitive strategies that can be adopted to counteract such forces. It isimportant to note
that the figure suggests that any of the major strategies may bedeemed useful against any of the
common competitive forces. Although it is rare andunlikely that a single firm would use all
strategies simultaneously, each has value incertain circumstances. For now, it is only important

122
that you become familiar with theavailable strategic approaches. Let us look at several basic
concepts that define the roleof competitive strategy as it applies to information systems.

Businesses can developcompetitive strategies tocounter the actions ofthe competitive forces
theyconfront in the marketplace.

4.1.1. Competitive Forces and Strategies


How should a business professional think about competitive strategies? How can abusiness use
information systems to apply competitive strategies?

The figure above illustratesan important conceptual framework for understanding forces of
competition and thevarious competitive strategies employed to balance them.

A company can survive and succeed in the long run only if it successfully developsstrategies to
confront five competitive forces that shape the structure of competitionin its industry. In Michael
Porter’s classic model of competition, any businessthat wants to survive and succeed must
effectively develop and implement strategiesto counter (1) the rivalry of competitors within its
industry, (2) the threat of new entrantsinto an industry and its markets, (3) the threat posed by
substitute products that mightcapture market share, (4) the bargaining power of customers, and
(5) the bargaining powerof suppliers.

Competition is a positive characteristic in business, and competitors share a natural,and often


healthy, rivalry. This rivalry encourages and sometimes requires a constanteffort to gain
competitive advantage in the marketplace.

123
This ever-present competitiveforce requires significant resources on the part of a firm.Guarding
against the threat of new entrants also requires the expenditure of significantorganizational
resources. Not only do firms need to compete with other firms in themarketplace, but they must
also work to create significant barriers to the entry of newcompetition. This competitive force
has always been difficult to manage, but it is evenmore so today. The Internet has created many
ways to enter the marketplace quickly andwith relatively low cost.

 In the Internet world, a firm’s biggest potential competitor may be one that is not yet in
the marketplace but could emerge almost overnight.

The threat of substitutes is another competitive force that confronts a business.The effect of this
force is apparent almost daily in a wide variety of industries, often atits strongest during periods
of rising costs or inflation.
For example, when airline prices get toohigh, people substitute car travel. When the cost of
mutton gets toohigh, people eat more beef or chicken. Most products or services have some
sortof substitute available to the consumer.

Finally, a business must guard against the often opposing forces of customer andsupplier
bargaining powers. If customers’ bargaining power gets too strong, they candrive prices to
unmanageably low levels or just refuse to buy the product or service. Ifa key supplier’s
bargaining power gets too strong, it can force the price of goods andservices to unmanageably
high levels or just starve a business by controlling the flowof parts or raw materials essential to
the manufacture of a product.

Businesses can counter the threats of competitive forcesthat they face by implementing one or
more of the five basic competitive strategies.
1. Cost Leadership Strategy.
Cost leadership strategy involve becoming a low-cost producer of products and services
in the industry or finding ways to help suppliers or customers reduce their costs or
increase the costs of competitors.
2. Differentiation Strategy.
Differentiation strategy involves developing ways to differentiate a firm’s products
andservices from those of its competitors or reduce the differentiation advantages
ofcompetitors. This strategy may allow a firm to focus its products or services togive it an
advantage in particular segments or niches of a market.
3. Innovation Strategy.
Innovation strategy involves finding new ways of doing business. This strategy mayinvolve
developing unique products and services or entering unique markets ormarket niches. It may
also involve making radical changes to the business processesfor producing or distributing

124
products and services that are so differentfrom the way a business has been conducted that
they alter the fundamentalstructure of an industry.
4. Growth Strategies.
Growth strategies involve significantly expanding a company’s capacity to producegoods and
services, expanding into global markets, diversifying into new productsand services, or
integrating into related products and services.
5. Alliance Strategies.
Alliance strategies involve establishing new business linkages and alliances with
customers,suppliers, competitors, consultants, and other companies. These linkagesmay
include mergers, acquisitions, joint ventures, formation of virtual companies,or other
marketing, manufacturing, or distribution agreements between a businessand its trading
partners.

One additional point regarding these strategies is that they are not mutually exclusive. The role
of Information Systemsin implementing the five basic competitive strategies is summarized
below:
Basic Strategies in the Business Use of Information Technology
1. Lower Costs
•.Use IT to substantially reduce the cost of business processes
• Use IT to lower the costs of customers or suppliers.
2. Differentiate
• Develop new IT features to differentiate products and services.
• Use IT features to reduce the differentiation advantages of competitors.
• Use IT features to focus products and services at selected market niches.
3. Innovate
• Create new products and services that include IT components.
• Develop unique new markets or market niches with the help of IT.
• Make radical changes to business processes with IT that dramatically cut costs; improve
quality, efficiency, or customer service; or shorten time to market.
4. Promote Growth
• Use IT to manage regional and global business expansion.
• Use IT to diversify and integrate into other products and services.
5. Develop Alliances
• Use IT to create virtual organizations of business partners.
• Develop internet enterprise information systems linked by the Internet and extranets that
support strategic business relationships with customers, suppliers, subcontractors, and others.

UNIT FOUR - SECTION TWO


4.2. Information Systems and Business Strategy
 Section Objectives

125
 At the end of this section you should be able to:
• Explain how companies develop competitive strategies using information systems
• How do information systems help businesses use synergies, core competencies,
and network-based strategies to achieve competitive advantage?

Section Overview
How can business managers use investments in information technology to support afirm’s
competitive strategies? There are many ways that information technology can help a business
implement the five basiccompetitive strategies, which were already discussed in the previous
section. However, there are many strategic initiatives available to a firm in addition to the five
basicstrategies of cost leadership, differentiation, innovation, growth, and alliance. In this section
we will have a look at several key strategies that can also be implemented with information
technology.

These key strategies include locking in customers or suppliers, building switching costs,
raisingbarriers to entry, and leveraging investment in information technology.
Investments in information technology can allow a business to lock in customersand suppliers
(and lock out competitors) by building valuable new relationships withthem. These business
relationships can become so valuable to customers or suppliersthat they deter them from
abandoning a company for its competitors or intimidatethem into accepting less profitable
business arrangements. Early attempts to use informationsystems technology in these
relationships focused on significantly improvingthe quality of service to customers and suppliers
in a firm’s distribution, marketing,sales, and service activities. More recent projects characterize
a move toward moreinnovative uses of information technology.
A major emphasis in strategic information systems has been to find ways to createswitching
costs in the relationships between a firm and its customers or suppliers. Inother words,
investments in information systems technology can make customers or suppliers dependent on
the continueduse of innovative, mutually beneficial inter-enterprise information systems. They
thenbecome reluctant to pay the costs in time, money, effort, and inconvenience that itwould take
to switch to a company’s competitors.

By making investments in information technology to improve its operations orpromote


innovation, a firm could also raise barriers to entry that would discourage ordelay other
companies from entering a market. Typically, these barriers increase theamount of investment or
the complexity of the technology required to compete in anindustry or a market segment. Such
actions tend to discourage firms already in theindustry and deter external firms from entering the
industry.

Investing in information technology enables a firm to build strategic IT capabilitiesso that they
can take advantage of opportunities when they arise. In many cases,this happens when a
126
company invests in advanced computer-based information systemsto improve the efficiency of
its own business processes. Then, armed with thisstrategic technology platform, the firm can
leverage investment in IT by developingnew products and services that would not be possible
without a strong IT capability.

An important current example is the development of corporate intranets and extranetsby many
companies, which enables them to leverage their previous investments inInternet browsers, PCs,
servers, and client/server networks.

4.2.1. The Value Chain and Strategic IS

Let’s look at another important concept that can help you identify opportunities forstrategic
information systems. The value chain concept, developed by Michael Porter,views a firm as a
series, chain, or network of basic activitiesthat add value to its products and services and thus
add a margin of value to boththe firm and its customers. In the value chain conceptual
framework, some businessactivities are primary processes; others are support processes. Primary
processes arethose business activities that are directly related to the manufacture of products or
thedelivery of services to the customer. In contrast, support processes are those businessactivities
that help support the day-to-day operation of the business and that indirectlycontribute to the
products or services of the organization.

127
This framework can highlightwhere competitive strategies can best be applied in a business. So
managers andbusiness professionals should try to develop a variety of strategic uses of the
Internetand other technologies for those basic processes that add the most value to a
company’sproducts or services and thus to the overall business value of the company.

The above figure provides examples of how and where information technologies can be
appliedto basic business processes using the value chain framework. Thus, the value chain
concept can help you identify where and how to apply thestrategic capabilities of information
technology. It shows how various types of informationtechnologies might be applied to specific
business processes to help firm gain competitive advantages in the marketplace.

Activity 1
1 Information system has to be viewed strategically. Explain.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 What is a strategic Information Architecture?


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

128
3 What are the five competitive forces that shape the structure of competition in the industry?
Identify the strategies that could be used to counter the competitive forces.
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

UNIT FOUR - SECTION THREE


4.3. Using Systems for Competitive Advantage: Management Issues
 Section Objectives
 At the end of this section you should be able to:
• Explain how companies use information systems for competitive advantage

Section Overview

Strategic information systems often change the organization as well as itsproducts, services, and
operating procedures, driving the organization intonew behavioral patterns. Successfully using
information systems to achievea competitive advantage is challenging and requires precise
coordination oftechnology, organizations, and management. In this section, we will have a look
at how businesses can use information systems to achieve competitive advantage and how to
sustain it.

Organizations may view and use information technology in many ways. For example,companies
may choose to use information systems strategically, or they may becontent to use IT to support
efficient everyday operations. If a company emphasizedstrategic business uses of information
technology, its management would viewIT as a major competitive differentiator. They would
then devise business strategiesthat use IT to develop products, services, and capabilities that give
the companymajor advantages in the markets in which it competes.

4.3.1. Business Process Re-engineering


One of the most important implementations of competitive strategies is business
processreengineering (BPR), often simply called reengineering. Reengineering is a
fundamentalrethinking and radical redesign of business processes to achieve
dramaticimprovements in cost, quality, speed, and service. BPR combines a strategy of

129
promotingbusiness innovation with a strategy of making major improvements to
businessprocesses so that a company can become a much stronger and more successful
competitorin the marketplace.

However, making radical changes to business processes to dramatically improveefficiency and


effectiveness is not an easy task. For example, many companies haveused cross-functional
enterprise resource planning (ERP) software to reengineer, automate,and integrate their
manufacturing, distribution, finance, and human resourcebusiness processes. Although many
companies have reported impressive gains withsuch ERP reengineering projects, many others
either have experienced dramatic failuresor did not achieve the improvements they sought.

Information technology plays a major role in reengineering most business processes.The speed,
information-processing capabilities, and connectivity of computers andInternet technologies can
substantially increase the efficiency of business processes, aswell as communications and
collaboration among the people responsible for their operationand management.

4.3.2. Becoming an Agile Company


The other important implementation of information systems is in creating an agile company.

 An agile company is a company that able to move quickly and with suppleness, skill,
and control.

We are changing from a competitive environment in which mass-market products and


serviceswere standardized, long-lived, information-poor, and exchanged in one-time
transactions, toan environment in which companies compete globally with niche market products
and servicesthat are individualized, short-lived, information-rich, and exchanged on an ongoing
basiswith customers .

To be an agile company, a business must use four basic strategies. First, thebusiness must ensure
that customers perceive the products or services of an agile companyas solutions to their
individual problems. Thus, it can price products on the basisof their value as solutions, rather
than their cost to produce. Second, an agile companycooperates with customers, suppliers, other
companies, and even with its competitors.

This cooperation allows a business to bring products to market as rapidly andcost-effectively as


possible, no matter where resources are located or who owns them.

Third, an agile company organizes so that it thrives on change and uncertainty. It usesflexible
organizational structures keyed to the requirements of different and constantlychanging customer

130
opportunities. Fourth, an agile company leverages the impact ofits people and the knowledge
they possess. By nurturing an entrepreneurial spirit, anagile company provides powerful
incentives for employee responsibility, adaptability,and innovation.

Information technologies enable a companyto partner with its suppliers, distributors, contract
manufacturers, and others via collaborativeportals and other Web-based supply chain systems
that significantly improveits agility in exploiting innovative business opportunities.

4.3.3. Creating a Virtual Company


In today’s dynamic global business environment, forming a virtual company can beone of the
most important strategic uses of information technology.

 A virtual company (also called a virtual corporation or virtual organization) is an


organization that uses information technology to link people, organizations, assets,
and ideas.

Virtual companies typically form virtual workgroupsand alliances with business partners that are
interlinked by the Internet, intranets, andextranets. Notice that this company has organized
internally into clusters of processand cross-functional teams linked by intranets. It has also
developed alliances andextranet links that form inter-enterprise information systems with
suppliers, customers,subcontractors, and competitors. Thus, virtual companies create flexible
andadaptable virtual workgroups and alliances keyed to exploit fast-changing
businessopportunities.

You may ask why do people form virtual companies? This is because virtual companies are one
of the best ways to implement key businessstrategies and alliances that promise to ensure success
in today’s turbulent businessclimate. Several major reasons for virtual companies stand out.
For example, a business may not have the time or resources to develop the
necessarymanufacturing and distribution infrastructure, personnel competencies, and
informationtechnologies to take full advantage of a new market opportunity in a timelymanner. It
can assemble the components it needs to provide a world-class solution forcustomers and capture
the market opportunity only by quickly forming a virtual companythrough a strategic alliance of
all-star partners. Today, of course, the Internet,intranets, extranets, and a variety of other Internet
technologies are vital componentsin creating such successful solutions.

4.3.4. Building a Knowledge-Creating Company


In an economy where the only certainty is uncertainty, the one sure source of lasting
competitiveadvantage is knowledge. When markets shift, technologies proliferate,
competitorsmultiply, and products become obsolete almost overnight, successful companies are

131
thosethat consistently create new knowledge, disseminate it widely throughout the
organization,and quickly embody it in new technologies and products. These activities define
the“knowledge-creating” company, whose sole business is continuous innovation.

Many companies today can only realize lasting competitive advantage if theybecome
knowledge-creating companies or learning organizations. That means consistentlycreating new
business knowledge, disseminating it widely throughout thecompany, and quickly building the
new knowledge into their products and services.
Knowledge-creating companies exploit two kinds of knowledge. One is explicitknowledge,
which is the data, documents, and things written down or stored on computers.The other kind is
tacit knowledge, or the “how-tos” of knowledge, which residesin workers.

 Explicit knowledge is a one captured as data on documents, and things written down
or stored on computers where as tacit knowledge is a one that resides in workers. For
example, a chef may prepare a guide to make a burger. This guide is an explicit
knowledge. However, the burger prepared by him and someone else based on the guide
may not have same taste. The variant is tacit knowledge which is difficult if not
impossible to codify and transfer it like the explicit knowledge.

Tacit knowledge can often represent some of the most important informationwithin an
organization. Long-time employees of a company often “know” manythings about how to
manufacture a product, deliver the service, deal with a particularvendor, or operate an essential
piece of equipment. This tacit knowledge is not recordedor codified anywhere because it has
evolved in the employee’s mind throughyears of experience. Furthermore, much of this tacit
knowledge is never shared withanyone who might be in a position to record it in a more formal
way because there isoften little incentive to do so or simply, “Nobody ever asked.”

Successful knowledge management creates techniques,technologies, systems, and rewards for


getting employees to share what theyknow and make better use of accumulated workplace and
enterprise knowledge. Inthat way, employees of a company are leveraging knowledge as they do
their jobs.

4.3.4.1. Knowledge Management Systems


Making personal knowledge available to others is the central activity of the
knowledgecreatingcompany. It takes place continuously and at all levels of the organization.
Knowledge management has thus become one of the major strategic uses of
informationtechnology. Many companies are building knowledge management systems(KMS) to
manage organizational learning and business know-how. The goal of suchsystems is to help
knowledge workers create, organize, and make available importantbusiness knowledge,

132
wherever and whenever it’s needed in an organization. Thisinformation includes processes,
procedures, patents, reference works, formulas, bestKnowledge managementcan be viewed as
three levelsof techniques, technologies,and systems that promotethe collection,
organization,access, sharing, and use ofworkplace and enterpriseknowledge as summarized in
the figure below:

Internet and intranet Websites, groupware, data mining, knowledge bases, and online discussion
groups aresome of the key technologies that may be used by a KMS.
Knowledge management systems also facilitate organizational learning andknowledge creation.
They are designed to provide rapid feedback to knowledgeworkers, encourage behavior changes
by employees, and significantly improve businessperformance. As the organizational learning
process continues and its knowledgebase expands, the knowledge-creating company works to
integrate its knowledge intoits business processes, products, and services. This integration helps
the companybecome a more innovative and agile provider of high-quality products and
customerservices, as well as a formidable competitor in the marketplace.

UNIT FOUR - SECTION FOUR


4.4. Sustaining Competitive advantage
 Section Objectives

133
 At the end of this section you should be able to:
• Explain how information systems help businesses to sustain their competitive
advantage

Section Overview

The competitive advantages that strategic systems confer do not necessarily lastlong enough to
ensure long-term profitability. Because competitors can retaliateand copy strategic systems,
competitive advantage is not always sustainable. In this section we will look at how business use
information systems to sustain their competitive advantage.

Markets, customer expectations, and technology change; globalization hasmade these changes
even more rapid and unpredictable. The Internet can makecompetitive advantage disappear very
quickly because virtually all companiescan use this technology. Classic strategic systems, such
as Airlines’ computerized reservation system, bank’s ATM system, and post offices package
tracking system, benefited by being the first in their industries. Thenrival systems emerged.
Information systems alone cannotprovide an enduring business advantage. Systems originally
intended to bestrategic frequently become tools for survival, required by every firm to stay
inbusiness, or they may inhibit organizations from making the strategic changesessential for
future success.
In order to sustain the competitive advantage firms consciously engage in such activities as
strategic alignment and managing their strategic transitions. Each of which are discussed below
as follows:

4.4.1. Aligning IT with business


The research on IT and business performance has found that (a) the moresuccessfully a firm can
align information technology with its business goals, themore profitable it will be, and (b) only
one-quarter of firms achieve alignmentof IT with the business. About half of a business firm’s
profits can be explainedby alignment of IT with business.

Most businesses get it wrong: Information technology takes on a life of its ownand does not
serve management and shareholder interests very well. Instead ofbusiness people taking an
active role in shaping IT to the enterprise, they ignoreit, claim not to understand IT, and tolerate
failure in the IT area as just a nuisanceto work around. Such firms pay a hefty price in poor
performance. Successfulfirms and managers understand what IT can do and how it works, take
an activerole in shaping its use, and measure its impact on revenues and profits.

4.4.2. Managing Strategic Transitions


Adopting the kinds of strategic systems described in this chapter generallyrequires changes in
business goals, relationships with customers and suppliers,and business processes. These socio-
134
technical changes, affecting both socialand technical elements of the organization, can be
considered strategic transitions- a movement between levels of socio-technical systems.
Such changes often entail blurring of organizational boundaries, both externaland internal.
Suppliers and customers must become intimately linked and mayshare each other’s
responsibilities. Managers will need to devise new businessprocesses for coordinating their
firms’ activities with those of customers, suppliers,and other organizations. The organizational
change requirements surroundingnew information systems are so important.

Activity 2
1 What is Business Process Re-engineering?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

2 Information System can be used to create an agile company. What is an agile company?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 Differentiate between Explicit and Tacit knowledge.


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

 UNIT SUMMARY
A major role of information systems applications in business is to provide effective support of a
company’s strategies for gaining competitive advantage.

 A strategic information system can be any kind of information system (e.g., TPS, MIS,
and DSS) that uses information technology to help an organization gain a competitive

135
advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives.

Competition is a positive characteristic in business, and competitors share a natural, and often
healthy, rivalry. This rivalry encourages and sometimes requires a constant effort to gain
competitive advantage in the marketplace.

There are 5 competitive forces (1) the rivalry of competitors within its industry, (2) the threat of
new entrants into an industry and its markets, (3) the threat posed by substitute products that
might capture market share, (4) the bargaining power of customers, and (5) the bargaining power
of suppliers.

They can be countered though 5 strategies (1) Cost Leadership Strategy, (2) Differentiation
Strategy, (3) Innovation Strategy, (4) Growth Strategies and (5) Alliance Strategies.

There are many ways that information technology can help a business implement the five
basiccompetitive strategies

Strategic information systems often change the organization as well as its products, services, and
operating procedures, driving the organization into new behavioral patterns.

 An agile company is a company that able to move quickly and with suppleness, skill,
and control.

A virtual company (also called a virtual corporation or virtual organization) is an organization that uses
information technology to link people, organizations, assets, and ideas.

Explicit knowledge is a one captured as data on documents, and things written down or stored on
computers where as tacit knowledge is a one that resides in workers. For example, a chef may prepare a
guide to make a burger. This guide is an explicit knowledge. However, the burger prepared by him and
someone else based on the guide may not have same taste. The variant is tacit knowledge which is
difficult if not impossible to codify and transfer it like the explicit knowledge.

The competitive advantages that strategic systems confer do not necessarily lastlong enough to
ensure long-term profitability. Because competitors can retaliateand copy strategic systems,
competitive advantage is not always sustainable

Checklist
Now that you have completed the fourth unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No

136
Ca Understand the competitive forces of market place
n Know the several basic competitive strategies
Yo Explain how they competitive strategies use information technologies to confront
u the competitive forces faced by a business.
Identify several strategic uses of information technologies
Explain how technologies can help a business gain competitive advantages
Identify the business value of using Information technologies to become an agile
competitor or form a virtual company.
Explain how knowledge management systems can help a business gain strategic
advantages
Discuss the basic concepts that define the role of competitive strategy as it
applies to information systems
Identify the strategic roles of Information systems
Explain how companies develop competitive strategies using information
systems
Discuss how information systems help businesses use synergies, core
competencies, and network-based strategies to achieve competitive advantage.
Explain how companies use information systems for competitive advantage
Discuss how information systems help businesses to sustain their competitive
advantage.

Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!

 SELF-TEST EXERCISE (SELF-ASSESSMENT QUESTIONS)

Part I: Multiple Choices

Direction: Choose the best answer from the given alternatives

1. The collection of strategic information systems that support the competitive position of
a business is best described by:
A. Transaction Processing System, D. Strategic Information
B. Management Information Architecture,
System, E. None of the above.
C. Decision Support System,
2. Which one of the following competitive forces explain the arrival of new internet based
business that offer similar services?
A. Rivalry of competitors , D. Customers power,
B. Entrant threat, E. None of the above.
C. Substitute threat,

137
3. A strategy that involves developing ways to make a firm’s products unique from
competitors:
A. Cost leadership, D. Growth,
B. Innovation, E. None of the above.
C. Differentiation,
4. Which competitive strategy is supported by information systems if a business uses IT to
create virtual organizations of business partners?
A. Alliance, D. Differentiation,
B. Growth, E. None of the above.
C. Innovation,
5. The concept that views the firm as a series, chain, or network of basic activities that add
value to its products and thus add a margin of value is best described by:
A. Strategy Architecture, D. Virtuality,
B. Value Chain, E. None of the above.
C. Agility,
6. Activities performed a business to manufacture, promote and sell its products is best
described by:
A. Value chain activities, D. Inbound logistics,
B. Primary activities, E. None of the above.
C. Support activities,
7. A fundamental rethinking and radical redesign of business processes to achieve
dramatic improvements in cost, quality, speed and service is best described by:
A. Agile Company, D. Virtual company,
B. Business Strategy, E. None of the above.
C. BPR,
8. Which one of the following refers to knowledge captured as data on documents and
things written down or stored on computers?
A. Knowledge creation, D. Explicit knowledge,
B. Tacit knowledge, E. None of the above.
C. Knowledge management,
9. The techniques, technologies, and systems that promote the collection, organization,
access, sharing, and use of workplace and enterprise knowledgeis best described by:
A. Knowledge creation, D. Explicit knowledge,
B. Tacit knowledge, E. None of the above.
C. Knowledge management,
10. An attempt to make IT not take a life of its own and does not fail to serve management
interests is best described by:
A. Strategy Sustainability D. Strategic alignment,
B. Strategic Transitions E. None of the above.
C. ERP
Part II: Matching

Direction: Choose the best answer from the given alternatives


138
Column One Column Two
1 Systems used to manage organizational learning and business know- A Tacit Knowledge
how
2 The knowledge such as the data, documents, and things written B Agile company
down or stored on computers
3 The “how-tos” of knowledge, which residesin workers C Virtual
organizations
4 Companies that consistentlycreating new business knowledge, D Lower cost
disseminating it widely throughout thecompany, and quickly strategy
building the new knowledge into their products and services
5 Companies that uses information technology to link people, E Knowledge
organizations, assets, and ideas. management
6 Companies that able to move quickly and with suppleness, skill, and F Support activities
control
7 Activities performed to make primary activities efficient and G Differentiation
effective Strategy
8 Use IT to substantially reduce the cost of business processes H Explicit
Knowledge
9 Use IT features to reduce the differentiation advantages of I Innovative
competitors Strategy
10 Develop unique new markets or market niches with the help of IT J Growth Strategy
K Learning
Organizations
L Alliances strategy
M New entrant
N Value chain
O None of the above

Part III: True or False

Direction: Say true or false for the following statements.

1. Growth strategies involve establishing new business linkages and alliances with
customers,suppliers, competitors, consultants, and other companies..
2. Innovation strategy involves finding new ways of doing business.
3. If customers’ bargaining power gets too strong, they candrive prices to unmanageably
low levels or just refuse to buy the product or service is a threat.
4. In the Internet world, a firm’s biggest potential competitor may be one that is not yet in
the marketplace but could emerge almost overnight.
5. Use of IT features to focus products and services at selected market niches are a low cost
strategy application.

139
6. Use of IT to manage regional and global business expansion is a growth strategy
application
7. Key strategies that could be implemented using IT include locking in customers or
suppliers, building switching costs, raisingbarriers to entry, and leveraging investment in
information technology
8. Primary value chain processes are those businessactivities that help support the day-to-
day operation of the business and that indirectlycontribute to the products or services of
the organization.
9. Reengineering is a fundamentalrethinking and radical redesign of business processes to
achieve dramaticimprovements in cost, quality, speed, and service
10. An agile company is a company that able to move quickly and with suppleness, skill, and
control.

FEED BACK/ANSWER KEY


For Activities and
Self-Test Exercise (Self-Assessment Questions)

Answer Key for UNIT FOUR

Answer for Activities

Feed Back/Answer for Activity 1


1. Information systems has to be viewed as vital competitive networks, as a means of
organizational renewal, and as a necessary investment in technologies; such technologies
help a company adopt strategies and business processes that enable it to reengineer or
reinvent itself to survive and succeed in today’s dynamic business environment.
2. A strategic information architecture: the collection of strategic information systems that
supports or shapes the competitive position and strategies of a business enterprise. A
strategic information system can be any kind of information system (e.g., TPS, MIS, and
DSS) that uses information technology to help an organization gain a competitive
advantage, reduce a competitive disadvantage, or meet other strategic enterprise
objectives.
3. The 5 competitive forces are (1) the rivalry of competitors within its industry, (2) the
threat of new entrants into an industry and its markets, (3) the threat posed by substitute
products that might capture market share, (4) the bargaining power of customers, and (5)

140
the bargaining power of suppliers. They can be countered though (1) Cost Leadership
Strategy, (2) Differentiation Strategy, (3) Innovation Strategy, (4) Growth Strategies and
(5) Alliance Strategies.

Feed Back/Answer for Activity 2


1. Business Process Reengineering is a fundamental rethinking and radical redesign of
business processes to achieve dramatic improvements in cost, quality, speed, and service.
BPR combines a strategy of promoting business innovation with a strategy of making
major improvements to business processes so that a company can become a much
stronger and more successful competitor in the marketplace.
2. An agile company is a company that able to move quickly and with suppleness, skill, and
control.
3. Explicit knowledge is a one captured as data on documents, and things written down or
stored on computers where as tacit knowledge is a one that resides in workers. For
example, a chef may prepare a guide to make a burger. This guide is an explicit
knowledge. However, the burger prepared by him and someone else based on the guide
may not have same taste. The variant is tacit knowledge which is difficult if not
impossible to codify and transfer it like the explicit knowledge.

Answer for Self-Test Exercise (Self-Assessment Questions


 Part I: Multiple Choices
1 D 3 C 5 B 7 C 9 C
2 B 4 A 6 B 8 D 10 D
 Part II: Matching
1 E 3 A 5 C 7 F 9 G
2 H 4 K 6 B 8 D 10 I
 Part III: True or False
1 F 3 T 5 F 7 T 9 T
2 T 4 T 6 T 8 F 10 T

141
UNIT FIVE
Management of Information Systems

Unit Introduction

Dear learners, welcome to the last unit of this course! This part focuses on building and
managing systems in organizations. This partanswers questions such as: What activities are
required to build a new informationsystem? What alternative approaches are available for
building system solutions?How should information systems projects be managed to ensure
that new systemsprovide genuine business benefits and work successfully in the organization?
Whatissues must be addressed when building and managing global systems?

Unit Objectives
 After studying this unit, you should be able to:
 Explain how building new systems produce organizational change.
 Identify the core activities in the systems development process.
 Discuss the principal methodologies for modeling and designing systems.
 Elaborate the alternative methods for building information systems.
 Understand the concept of system resource management

UNIT FIVE - SECTION ONE


5.1. Developing Business Information System
 Section Objectives
 At the end of this section you should be able to:
• Identify the organizational changes that accompany the development of information
System
• Identify the core activities in the systems development process.
• Discuss the principal methodologies for modelling and designing systems.
• Elaborate the alternative methods for building information systems.

Section Overview

Building a new information system is one kind of planned organizationalchange. The


introduction of a new information system involvesmuch more than new hardware and software.
It also includes changesin jobs, skills, management, and organization. When we design a
newinformation system, we are redesigning the organization. System buildersmust understand
how a system will affect specific business processes and theorganization as a whole.

142
Information technology can promote various degrees of organizational change,ranging from
incremental to far-reaching. There are four kinds ofstructural organizational change that are
enabled by information technology:(1) automation, (2) rationalization, (3) business process
redesign, and (4)paradigm shifts. Each carries different risks and rewards.

The most common form of IT-enabled organizational change is automation.The first applications
of information technology involved assisting employeeswith performing their tasks more
efficiently and effectively. Calculatingpaychecks and payroll registers, giving bank tellers instant
access to customerdeposit records, and developing a nationwide reservation network for
airlineticket agents are all examples of early automation.

 The most common forms of organizational change are automation and rationalization.
These relatively slow-moving and slow-changing strategies present modest returns but
little risk. Faster and more comprehensive change—such as redesign and paradigm
shifts—carries high rewards but offers substantial chances of failure.

A deeper form of organizational change—one that follows quickly fromearly automation—is


rationalization of procedures. Automation frequentlyreveals new bottlenecks in production and
makes the existing arrangementof procedures and structures painfully cumbersome.
Rationalization ofprocedures is the streamlining of standard operating procedures.

Rationalization of procedures is often found in programs for making a seriesof continuous


quality improvements in products, services, and operations, suchas total quality management
(TQM) and six sigma. Total quality management(TQM) makes achieving quality an end in itself
and the responsibilityof all people and functions within an organization.

Six sigma is a specific measureof quality, representing 3.4 defects per million opportunities.
Most companiescannot achieve this level of quality, but use six sigma as a goal for
drivingongoing quality improvement programs.

A more powerful type of organizational change is business processredesign, in which business


processes are analyzed, simplified, and redesigned.

Business process redesign reorganizes workflows, combining steps to cut wasteand eliminate
repetitive, paper-intensive tasks. (Sometimes the new designeliminates jobs as well.) It is much
more ambitious than rationalization ofprocedures, requiring a new vision of how the process is to
be organized.

Rationalizing procedures and redesigning business processes are limited tospecific parts of a
business. New information systems can ultimately affect thedesign of the entire organization by
transforming how the organization carriesout its business or even the nature of the business. This

143
more radical form of businesschange is called a paradigm shift. A paradigm shift involves
rethinking thenature of the business and the nature of the organization.

Paradigm shifts and reengineering often fail because extensive organizationalchange is so


difficult to orchestrate. Why, then,do so many corporations contemplate such radical change?
Because the rewards are equally high. In many instances, firms seekingparadigm shifts and
pursuing reengineering strategies achieve stunning,order-of- magnitude increases in their returns
on investment (or productivity).

5.1.1. Redesigning the Organization with Information System

Many businesses todayare trying to use information technology to improve their business
processes.Some of these systems entail incremental process change, but others requiremore far-
reaching redesign of business processes. To deal with these changes,organizations are turning to
business process management. Business processmanagement provides a variety of tools and
methodologies to analyze existingprocesses, design new processes, and optimize those processes.
BPM is neverconcluded because process improvement requires continual change.
Companiespracticing business process management go through the following steps:

1. Identify processes for change: One of the most important strategicdecisions that a firm can
make is not deciding how to use computers toimprove business processes, but understanding
what business processesneed improvement. When systems are used to strengthen the
wrongbusiness model or business processes, the business can become moreefficient at doing
what it should not do. As a result, the firm becomesvulnerable to competitors who may have
discovered the right businessmodel. Considerable time and cost may also be spent improving
businessprocesses that have little impact on overall firm performance and revenue.

Managers need to determine what business processes are the most importantand how improving
these processes will help business performance.

2. Analyze existing processes: Existing business processes should bemodeled and documented,
noting inputs, outputs, resources, and thesequence of activities. The process design team
identifies redundant steps,paper-intensive tasks, bottlenecks, and other inefficiencies.

3. Design the new process: Once the existing process is mapped andmeasured in terms of time
and cost, the process design team will try toimprove the process by designing a new one. A new
streamlined “to-be” processwill be documented and modeled for comparison with the old
process.

4. Implement the new process: Once the new process has been thoroughlymodeled and analyzed,
it must be translated into a new set of proceduresand work rules. New information systems or
enhancements to existingsystems may have to be implemented to support the redesigned process.

144
The new process and supporting systems are rolled out into the businessorganization. As the
business starts using this process, problems are uncoveredand addressed. Employees working
with the process may recommendimprovements.

5. Continuous measurement: Once a process has been implementedand optimized, it needs to be


continually measured. Why? Processes maydeteriorate over time as employees fall back on old
methods, or they maylose their effectiveness if the business experiences other changes.

Although many business process improvements are incremental andongoing, there are occasions
when more radical change must take place.

When properly implemented, business process redesign producesdramatic gains in productivity


and efficiency, and may even change the waythe business is run. In some instances, it drives a
“paradigm shift” thattransforms the nature of the business itself.

BPM poses challenges. Executives report that the largest single barrier tosuccessful business
process change is organizational culture. Employees do notlike unfamiliar routines and often try
to resist change. This is especially true ofprojects where organizational changes are very
ambitious and far-reaching.

Managing change is neither simple nor intuitive, and companies committed toextensive process
improvement need a good change management strategy

5.1.2. Systems Development and Organizational Change

New information systems are an outgrowth of a process of organizationalproblem solving. A


new information system is built as a solution to sometype of problem or set of problems the
organization perceives it is facing.The problem may be one in which managers and employees
realize that theorganization is not performing as well as expected, or that the organizationshould
take advantage of new opportunities to perform more successfully.

The activities that go into producing an information system solution toan organizational problem
or opportunity are called systems development.Systems development is a structured kind of
problem solved with distinctactivities.

5.1.2.1. System Modeling Approaches

There are alternative methodologies for modeling and designing systems.Structured


methodologies and object-oriented development are the mostprominent.

145
5.1.2.2. Structured Methodologies

Structured methodologies have been used to document, analyze, and designinformation systems
since the 1970s. Structured refers to the fact thatthe techniques are step by step, with each step
building on the previousone. Structured methodologies are top-down, progressing from the
highest,most abstract level to the lowest level of detail—from the general to the specific.

Structured development methods are process-oriented, focusing primarilyon modeling the


processes, or actions that capture, store, manipulate, and distributedata as the data flow through a
system. These methods separate datafrom processes. A separate programming procedure must be
written every timesomeone wants to take an action on a particular piece of data. The
proceduresact on data that the program passes to them.

The primary tool for representing a system’s component processes and theflow of data between
them is the data flow diagram (DFD). The data flow diagramoffers a logical graphic model of
information flow, partitioning a systeminto modules that show manageable levels of detail. It
rigorously specifies theprocesses or transformations that occur within each module and the
interfacesthat exist between them.

DFD uses 4 symbols each representing the data elements represented by DFD.
1. Data sources and destinations
– Appear as squares
– Represent organizations or individuals that send or receive data used or
produced by the system
– An item can be both a source and a destination

2. Data flows
– Appear as arrows
– Represent the flow of data between sources and destinations, processes, and data
stores
3. Processes
– Appear as circles
– Represent the transformation of data
4. Data stores
– Appear as two horizontal lines
– Represent a temporary or permanent repository of data

146
The Figure below illustrates a data flow diagram prepared for payment process.

The diagrams can be used to depict higher-level processes as well as lowerleveldetails. Through
leveled data flow diagrams, a complex process can bebroken down into successive levels of
detail. An entire system can be dividedinto subsystems with a high-level data flow diagram. Each
subsystem, in turn,can be divided into additional subsystems with second-level data flow
diagrams,and the lower-level subsystems can be broken down again until the lowest levelof
detail has been reached.

Another tool for structured analysis is a data dictionary, which containsinformation about
individual pieces of data and data groupings within a system. The data dictionary defines the
contents of data flows and datastores so that systems builders understand exactly what pieces of
data they contain.

Process specifications describe the transformation occurring within thelowest level of the data
flow diagrams. They express the logic for each process.

In structured methodology, software design is modeled using hierarchicalstructure charts. The


structure chart is a top-down chart, showing each levelof design, its relationship to other levels,
and its place in the overall designstructure. The design first considers the main function of a
program or system,then breaks this function into sub-functions, and decomposes each sub-
functionuntil the lowest level of detail has been reached.. If a design has too many levels to fit
ontoone structure chart, it can be broken down further on more detailed structurecharts. A
structure chart may document one program, one system (a set of programs),or part of one
program.

5.1.2.3. Object-Oriented Development

147
Structured methods are useful for modeling processes, but do not handle themodeling of data
well. They also treat data and processes as logically separateentities, whereas in the real world
such separation seems unnatural. Differentmodeling conventions are used for analysis (the data
flow diagram) and fordesign (the structure chart).
Object-oriented development addresses these issues. Object-orienteddevelopment uses the object
as the basic unit of systems analysis and design.

An object combines data and the specific processes that operate on those data.
Data encapsulated in an object can be accessed and modified only by theoperations, or methods,
associated with that object. Instead of passing data toprocedures, programs send a message for an
object to perform an operation thatis already embedded in it. The system is modeled as a
collection of objects andthe relationships among them. Because processing logic resides within
objectsrather than in separate software programs, objects must collaborate with eachother to
make the system work.
Object-oriented modeling is based on the concepts of class and inheritance.Objects belonging to
a certain class, or general categories of similar objects,have the features of that class. Classes of
objects in turn can inherit all thestructure and behaviors of a more general class and then add
variables andbehaviors unique to each object.

Object-oriented development is more iterative and incremental than traditional structured


development. During analysis, systems builders documentthe functional requirements of the
system, specifying its most importantproperties and what the proposed system must do.
Interactions between thesystem and its users are analyzed to identify objects, which include both
dataand processes. The object-oriented design phase describes how the objects willbehave and
how they will interact with one other. Similar objects are groupedtogether to form a class, and
classes are grouped into hierarchies in which asubclass inherits the attributes and methods from
its superclass.

5.1.3. Alternative Systems-Building Approaches


Systems differ in terms of their size and technological complexity and in termsof the
organizational problems they are meant to solve. A number of systemsbuildingapproaches have
been developed to deal with these differences.
This section describes these alternative methods: the traditional systems lifecycle, prototyping,
application software packages, end-user development, andoutsourcing.

5.1.3.1. Traditional Systems Life Cycle


The systems life cycle is the oldest method for building information systems.The life cycle
methodology is a phased approach to building a system, dividingsystems development into
formal stages. Systemsdevelopment specialists have different opinions on how to partition

148
thesystems-building stages, but they roughly correspond to the stages of systemsdevelopment we
have just described.

The systems life cycle methodology maintains a formal division of laborbetween end users and
information systems specialists. Technical specialists,such as systems analysts and programmers,
are responsible for much of thesystems analysis, design, and implementation work; end users are
limited toproviding information requirements and reviewing the technical staff’s work.The life
cycle also emphasizes formal specifications and paperwork; so manydocuments are generated
during the course of a systems project.
The systems life cycle is still used for building large complex systems that require a rigorous and
formal requirements analysis, predefined specifications, and tight controls over the system
building process. However, the systems life cycle approach can be costly, time-consuming, and
inflexible. Although systems builders can go back and forth among stages in thelife cycle, the
systems life cycle is predominantly a “waterfall” approachin which tasks in one stage are
completed before work for the next stagebegins.
The figure below shows the Traditional System Development Life Cycle (The waterfall
approach)

5.1.3.2. Prototyping
Prototyping consists of building an experimental system rapidly and inexpensivelyfor end users
to evaluate. By interacting with the prototype, users can geta better idea of their information
requirements. The prototype endorsed by theusers can be used as a template to create the final
system.
The prototype is a working version of an information system or part of thesystem, but it is meant
to be only a preliminary model. Once operational, theprototype will be further refined until it
conforms precisely to users’ requirements.
Once the design has been finalized, the prototype can be converted to apolished production
system.
The process of building a preliminary design, trying it out, refining it, andtrying again has been
called an iterative process of systems developmentbecause the steps required to build a system

149
can be repeated over and overagain. Prototyping is more explicitly iterative than the conventional
life cycle,and it actively promotes system design changes. It has been said that
prototypingreplaces unplanned rework with planned iteration, with each version moreaccurately
reflecting users’ requirements.

5.1.3.3. Steps in Prototyping


There are four-stepsin the prototyping process, which consistsof the following:
Step 1: Identify the user’s basic requirements. The systems designer (usually aninformation
systems specialist) works with the user only long enough tocapture the user’s basic information
needs.
Step 2: Develop an initial prototype. The systems designer creates a workingprototype quickly,
using tools for rapidly generating software.
Step 3: Use the prototype. The user is encouraged to work with the system todetermine how well
the prototype meets his or her needs and to makesuggestions for improving the prototype.
Step 4: Revise and enhance the prototype. The system builder notes all changes theuser requests
and refines the prototype accordingly. After the prototypehas been revised, the cycle returns to
Step 3. Steps 3 and 4 are repeateduntil the user is satisfied.
When no more iterations are required, the approved prototype then becomesan operational
prototype that furnishes the final specifications for the application.
Sometimes the prototype is adopted as the production version of the system.

5.1.4. Overview of System Development

The series of activities to develop a new system is called system development life cycle (SDLC).
These activities consist of systems analysis, systems design, programming,testing, conversion,
and production and maintenance.

5.1.4.1. System Analysis

Systems analysis is the analysis of a problem that a firm tries to solve with aninformation
system. It consists of defining the problem, identifying its causes,specifying the solution, and
identifying the information requirements thatmust be met by a system solution.

The systems analyst creates a road map of the existing organization andsystems, identifying the
primary owners and users of data along with existinghardware and software. The systems analyst
then details the problems ofexisting systems. By examining documents, work papers, and
procedures,observing system operations, and interviewing key users of the systems, theanalyst
can identify the problem areas and objectives a solution would achieve.

Often, the solution requires building a new information system or improvingan existing one.

150
The systems analysis also includes a feasibility study to determine whetherthat solution is
feasible, or achievable, from a financial, technical, and organizationalstandpoint. The feasibility
study determines whether the proposedsystem is expected to be a good investment, whether the
technology needed forthe system is available and can be handled by the firm’s information
systems specialists, and whether the organization can handle the changes introduced bythe
system.

Normally, the systems analysis process identifies several alternativesolutions that the
organization can pursue and assess the feasibility of each.

A written systems proposal report describes the costs and benefits, and theadvantages and
disadvantages, of each alternative. It is up to management todetermine which mix of costs,
benefits, technical features, and organizationalimpacts represents the most desirable alternative.

5.1.4.2. Systems Design

Systems analysis describes what a system should do to meet informationrequirements, and


systems design shows how the system will fulfill thisobjective. The design of an information
system is the overall plan or modelfor that system. Like the blueprint of a building or house, it
consists of all thespecifications that give the system its form and structure.

The systems designer details the system specifications that will deliverthe functions identified
during systems analysis. These specifications shouldaddress all of the managerial,
organizational, and technological components ofthe system solution.

Like houses or buildings, information systems may have many possibledesigns. Each design
represents a unique blend of all technical and organizationalcomponents. What makes one design
superior to others is the easeand efficiency with which it fulfills user requirements within a
specific set oftechnical, organizational, financial, and time constraints.

5.1.4.3. Programming

During the programming stage, system specifications that were preparedduring the design stage
are translated into software program code. Today, manyorganizations no longer do their own
programming for new systems. Instead,they purchase the software that meets the requirements
for a new system fromexternal sources such as software packages from a commercial software
vendor,software services from an application service provider, or outsourcing firmsthat develop
custom application software for their clients.

5.1.4.4. Testing

Exhaustive and thorough testing must be conducted to ascertain whether thesystem produces the
right results. Testing answers the question, “Will the systemproduce the desired results under

151
known conditions?” The amount of time needed to answer this question has been
traditionallyunderrated in systems project planning. Testing is time-consuming:

Testing an information system can be broken down into three types of activities:unit testing,
system testing, and acceptance testing. Unit testing, or programtesting, consists of testing each
program separately in the system. It is widelybelieved that the purpose of such testing is to
guarantee that programs are errorfree,but this goal is realistically impossible. Testing should be
viewed instead as ameans of locating errors in programs, focusing on finding all the ways to
make aprogram fail. Once they are pinpointed, problems can be corrected.

System testing tests the functioning of the information system as a whole. Ittries to determine
whether discrete modules will function together as plannedand whether discrepancies exist
between the way the system actually worksand the way it was conceived. Among the areas
examined are performancetime, capacity for file storage and handling peak loads, recovery and
restartcapabilities, and manual procedures.

Acceptance testing provides the final certification that the system is readyto be used in a
production setting. Systems tests are evaluated by users andreviewed by management. When all
parties are satisfied that the new systemmeets their standards, the system is formally accepted for
installation.

The systems development team works with users to devise a systematic testplan. The test plan
includes all of the preparations for the series of tests wehave just described.

Conversion is the process of changing from the old system to the newsystem. Four main
conversion strategies can be employed: the parallel strategy, the direct cutover strategy, the pilot
study strategy, and the phased approach strategy.

In a parallel strategy, both the old system and its potential replacement are run together for a time
until everyone is assured that the new one functions correctly. This is the safest conversion
approach because, in the event of errors or processing disruptions, the old system can still be
used as a backup.

The pilot study strategy introduces the new system to only a limited area of the organization,
such as a single department or operating unit. When this pilot version is complete and working
smoothly, it is installed throughout the rest of the organization, either simultaneously or in
stages.

The phased approach strategy introduces the new system in stages, eitherby functions or by
organizational units. If, for example, the system is introducedby function, a new payroll system
might begin with hourly workers who arepaid weekly, followed six months later by adding
salaried employees (who arepaid monthly) to the system. If the system is introduced by

152
organizational unit,corporate headquarters might be converted first, followed by outlying
operatingunits four months later.

Moving from an old system to a new one requires that end users be trained touse the new system.
Detailed documentation showing how the system worksfrom both a technical and end-user
standpoint is finalized during conversiontime for use in training and everyday operations. Lack
of proper training anddocumentation contributes to system failure, so this portion of the
systemsdevelopment process is very important.

5.1.4.5. Production and Maintenance

After the new system is installed and conversion is complete, the system issaid to be in
production. During this stage, the system will be reviewed byboth users and technical specialists
to determine how well it has met its originalobjectives and to decide whether any revisions or
modifications are inorder. In some instances, a formal post-implementation audit document
isprepared. After the system has been fine-tuned, it must be maintained whileit is in production
to correct errors, meet requirements, or improve processingefficiency. Changes in hardware,
software, documentation, or proceduresto a production system to correct errors, meet new
requirements, or improveprocessing efficiency are termed maintenance.

UNIT FIVE - SECTION TWO


5.2. Managing Resources
 Section Objectives
 At the end of this section you should be able to:
• Understand the concept of system resource management

Section Overview
Today, it is widely accepted that managing the information resource is very often equally
important.

Information Systems Resource Management is the application of information technology to


support the major functions and activities of either a private sector business or public sector
institution. In the past, organizations recognized the importance of managing resources such as
labor, capital, and raw materials. Today, it is widely accepted that managing the information
resource is very often equally important.

 Resource management supports the process of collection, manipulation, storage,


distribution and utilization of an organization's information resources.

153
The Information Systems resource management focuses on the fusion of information systems,
technology, and business management for two purposes: the use of information systems to solve
business problems and the management of technology, which includes new product development
and enterprise management.

The vast majority of information systems are developed for and used by people in functional
areas (e.g., manufacturing, human resources, accounting, finance and marketing). To develop
information systems that address the needs of the organization, resource managers must possess
a solid mix of business and technical knowledge. They must understand organizational
structures, objectives, operations (including processes and the flows of data between processes)
and the financial implications related to these factors. Only by understanding these factors can a
resource manager communicate effectively with users and then design systems that support their
needs.

System resource managers must stay up-to-date with evolving information technologies and have
a solid foundation of technical skills to select appropriate technologies and to implement
computer-based information systems. Thus, information system managers must be well versed in
topics such as systems development tools and techniques, information architecture, network
configurations, databases, and systems integration.

All the previous chapters believed to boost your know how on system resources other system
development processes. In this section a primer is provided on system resource management.

5.2.1. Managing Information Resources


During the early 1950s, Information Systems Department (ISD) managed ALL of the only
computing resource, the mainframe. Today, computing resources are located through the
organization and almost all employees use computers in their work.This system is known as end
user computing.

The major categories of information resources are hardware, software, databases, networks,
procedures, security facilities and physical buildings.

5.2.2. The Role of the IS Department [ISD]


The ISD is responsible for corporate-level and shared resources and for using IT to solve end
users’ business problems.End users are responsible for their own computing resources and
departmental resources.ISD and end users work together as partners to manage the IT resources.
ISD has changed from a purely technical support role to a more managerial and strategic

154
one.Director of ISD has changed from a technical manager to a senior executive called the chief
information officer (CIO).

5.2.3. IS Functions
The major IS functions include: Managing systems development and systems project
management &computer operations, including the computer center, Staffing, training and
developing IS skills; provide technical services and Infrastructure planning, development and
control, Initiating and designing specific strategic IS, Incorporating the Internet and e-commerce
into the business, managing system integration including the Internet, intranets and extranets,
Educating the non-IS managers about IT, Educating the IS staff about the business, Supporting
end user computing, partnering with the executives, managing outsourcing, Proactively using
business and technical knowledge to “seed” innovative ideas about IT, creating business
alliances with vendors and IS departments in other organizations and so forth.

Activity 1
1 List and discuss the four kinds of structural organizational change that are enabled by information
technology
______________________________________________________________________________________
______________________________________________________________________________________
_____________________________________________________________________________________

2 What are the alternative methodologies for modeling and designing systems?
______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

3 List the alternative systems building approaches.


______________________________________________________________________________________
______________________________________________________________________________________
_______________________________________________________________________________

 UNIT SUMMARY
Building a new information system is one kind of planned organizational change.

Information technology can promote various degrees of organizational change,ranging from incremental
to far-reaching.

The most common form of IT-enabled organizational change is automation.

155
 The most common forms of organizational change are automation and rationalization.
These relatively slow-moving and slow-changing strategies present modest returns but
little risk. Faster and more comprehensive change—such as redesign and paradigm
shifts—carries high rewards but offers substantial chances of failure.

Many businesses todayare trying to use information technology to improve their business processes.

When properly implemented, business process redesign producesdramatic gains in productivity


and efficiency, and may even change the waythe business is run. In some instances, it drives a
“paradigm shift” thattransforms the nature of the business itself.
New information systems are an outgrowth of a process of organizationalproblem solving.

There are alternative methodologies for modeling and designing systems.Structured


methodologies and object-oriented development are the mostprominent.

The primary tool for representing a system’s component processes and theflow of data between them is
the data flow diagram (DFD).

Another tool for structured analysis is a data dictionary, which containsinformation about individual
pieces of data and data groupings within a system.

Systems differ in terms of their size and technological complexity and in termsof the
organizational problems they are meant to solve. A number of systemsbuildingapproaches have
been developed to deal with these differences. These include: the traditional systems lifecycle,
prototyping, application software packages, end-user development, andoutsourcing.

The series of activities to develop a new system is called system development life cycle. These
activities consist of systems analysis, systems design, programming,testing, conversion, and
production and maintenance.

 Resource management supports the process of collection, manipulation, storage,


distribution and utilization of an organization's information resources.

The Information Systems resource management focuses on the fusion of information systems,
technology, and business management for two purposes: the use of information systems to solve
business problems and the management of technology, which includes new product development
and enterprise management

156
Checklist
Now that you have completed the last unit, you need to check whether you have grasped the
concepts discussed in this unit. If your answer to the questions below is No, then you have to go
back and read the relevant sub-section again.
Accomplishments Yes/No
Ca Explain how building new systems produce organizational change.
n Identify the core activities in the systems development process.
Yo Discuss the principal methodologies for modeling and designing systems.
u Elaborate the alternative methods for building information systems.
Understand the concept of system resource management

Commandment!
So as to pass through this step, at least you have to accomplish or perform 90% of the above
requirements! If not, go back and get done the unfulfilled part!

 SELF-TEST EXERCISE (SELF-ASSESSMENT QUESTIONS)

Part I: Multiple Choices

Direction: Choose the best answer from the given alternatives

1. Which IT enabled organizational change is relatively slow moving and slow changing
strategies with modest return but little risk:
A. BPR, D. Paradigm Shift,
B. Rationalization, E. None of the above.
C. Redesign,
2. Which one of the following IT enabled change is found in programs for making a series
of continues improvement such as TQM and six-sigma?
A. Rationalization, D. Paradigm Shift,
B. Redesign, E. None of the above.
C. BPR,
3. A more powerful type of organizational change is business process redesign, in which
business processes are analyzed, simplified, and redesigned:
A. Rationalization, D. Paradigm Shift,
B. Redesign, E. None of the above
C. BPR,
4. Which concept provides a variety of tools and methodologies to analyze existing
processes, design new processes, and optimize those processes.
A. BPR, D. Rationalization,
B. BPM, E. None of the above.
C. Paradigm shift,

157
5. A logical graphical documentation technique that is used to represent the logical flow of
data is:
A. DFD, D. Document flow chart,
B. ERD, E. None of the above.
C. Program flow chart,
6. Which system development methodology is iterative and incremental?

A. Peripheral, D. Structured,
B. Hap-hazard, E. None of the above.
C. Object-oriented,
7. In a data flow diagram processes are represented as:
A. Arrow, D. Circle,
B. Parallel lines, E. None of the above.
C. Square,
8. A system development approach that involves sequential stages called waterfall is best
described by:
A. Continuous, D. Life cycle,
B. Agile, E. None of the above.
C. Prototyping,
9. Which system development approach is used for building an experimental system
rapidly and inexpensively for end users to evaluate?
A. Continuous, D. Life cycle,
B. Agile, E. None of the above.
C. Prototyping,
10. The stage in which initial investigation is done to analyze problem that a firm tries to
solve with an information system:
A. System Analysis D. Testing,
B. System Design E. None of the above.
C. Programming

Part II: Matching

Direction: Choose the best answer from the given alternatives

Column One Column Two


1 Conversion in which both the old system and its potential replacementare A Unit/program
run together for a time until everyone is assured that the new one testing
functionscorrectly
2 A strategy were the new system to only a limited areaof the organization B Conversion
3 A strategy that introduces the new system in stages, eitherby functions or C Programming
by organizational units.
4 The process of collection, manipulation, storage, distribution and D Pilot
utilization of an organization's information resources

158
5 System testing that consists of testing each program separately in the E Prototype
system
6 System testing provides the final certification that the system is readyto be F Acceptance
used in a production setting Testing
7 The process of changing from an old system to a new system G Conceptual
design
8 A system development stage in which system specifications that were H Parallel
preparedduring the design stage are translated into software program code
9 The series of activities performed to develop a system I SDLC
10 A working version of an information system that serve as a J Resource
preliminary model Management
K Phased
L DFD
M ERD
N Data Input
O None of the above

Part III: True or False

Direction: Say true or false for the following statements.

1. The prototype is a working version of an information system or part of the system, but it
is meant to be only a preliminary model
2. Technical specialists, such as systems analysts and programmers, are responsible for
much of the systems analysis, design, and implementation work
3. The design of an information system is the overall plan or model for that system.
4. Process or circle represent a temporary or permanent repository of data
5. Data sources and destination represent organizations or individuals that send or receive
data used or produced by the system and depicted as circle.
6. New information systems are an outgrowth of a process of organizationalproblem solving.
7. Employees do notlike unfamiliar routines and often try to resist change.
8. Paradigm shifts and reengineering often fail because extensive organizationalchange is so
difficult to orchestrate
9. Business process redesign reorganizes workflows, combining steps to cut wasteand eliminate
repetitive, paper-intensive tasks
10. A deeper form of organizational change—one that follows quickly fromearly automation—is
rationalization of procedures.

159
FEED BACK/ANSWER KEY
For Activities and
Self-Test Exercise (Self-Assessment Questions)

Answer Key for UNIT FIVE

Answer for Activities

Feed Back/Answer for Activity 1


1. The four kinds of structural organizational change that are enabled by information technology
are: (1) automation, (2) rationalization, (3) business process redesign, and (4) paradigm shifts.
Each carries different risks and rewards. The most common forms of organizational change are
automation and rationalization. These relatively slow-moving and slow-changing strategies
present modest returns but little risk. Faster and more comprehensive change—such as redesign
and paradigm shifts—carries high rewards but offers substantial chances of failure.
2. The alternative methodologies for modeling and designing systems are structured methodologies
and object-oriented development. Structured methodology refers to the step by step techniques,
with each step building on the previousone. Structured methodologies are top-down, progressing
from the highest,most abstract level to the lowest level of detail—from the general to the specific.
Object-oriented development uses the object as the basic unit of systems analysis and design.
3. The traditional alternative methods of system design: the traditional systems lifecycle,
prototyping, application software packages, end-user development, andoutsourcing.

160
Answer for Self-Test Exercise (Self-Assessment Questions
 Part I: Multiple Choices
1 B 3 B 5 A 7 D 9 C
2 A 4 B 6 C 8 D 10 C
 Part II: Matching
1 H 3 K 5 A 7 B 9 I
2 D 4 J 6 F 8 C 10 E
 Part III: True or False
1 T 3 T 5 F 7 T 9 T
2 T 4 F 6 T 8 T 10 T

Reference:

1. Barney, Jay B., and Griffin, Rick, 1992. The Management Of Organizations. Houghton
Mifflin Co.
2. Davis, Gordon B. and Olson, Margareth H., 1985. Management Information system:
Conceptual Foundations, Structure & Development. 2nd ed.
3. Effy OZ, 2009. Management Information Systems, 6th ed. Course Technology, a division
of Cengage Learning, Inc.
4. Haag, Stephen; Maeve, Cummings & Dawkins, James, 1998. Management Information
Systems for the Information Age. Irwin McGraw – Hill.
5. Kenneth C. Laudon and Jane P. Laudon, 2014, Management Information System:
Managing the Digital Firm, 13th Golobal ed. , Pearson Education Limited
6. Laudon, Kenneth C. &Laudon, Jane P., 1999. Management Information Systems:
Organisation and Technology. 4th ed.
7. Lawler, Computer Information System.
8. McKeown, G. Patrick and Leitch, Robert, 1993. Management Information System:
Managing With Computers.
9. Mintzberg, Henry, 1971. Managerial Work Analysis From Observation, Management
Science No. 18,
10. O'Brien, James A, &George M. Marakus, 2011. Management Information System: A
managerial end user Perspective. 10th edition.
11. Raymond, Mcleod, Jr, 1995. Management Information Systems. 6th Ed., Prentice Hall
International, Inc.

161
12. Scott, George M. Principles Management Information System, McGraw Hill Book
Company, 1986.

162

You might also like