Professional Documents
Culture Documents
Print - MIS FULL Note
Print - MIS FULL Note
ØMIS provides accurate and timely information necessary to facilitate the decision- • Giving an overall picture of the company and acting as a communication and
planning tool.
making process and enable the organizations planning, control, and operational
functions to be carried out effectively.
• The availability of the customer data and feedback can help the company to align
Ø
their business processes according to the needs of the customers. The effective
ØManagement Information System (MIS) is basically concerned with processing management of customer data can help the company to perform direct marketing
data into information and is then communicated to the various Departments in an and promotion activities.
organization for appropriate decision-making.
• Information is considered to be an important asset for any company in the modern
ØMIS facilitates the decision making process and enable the organizational competitive world. The consumer buying trends and behaviors can be predicted by
planning, control, and operational functions to be carried out effectively the analysis of sales and revenue reports from each operating region of the
https://bit-papers.blogspot.com/ 1 company. ©17171R
$sagarMalla CITE 2016 Batch 19171R
MANAGEMENT INFORMATION MANAGEMENT INFORMATION
SYSTEM SYSTEM
Information Systems Vs Information Technology Computer Literacy Vs Information Literacy
vMany organization depend on information to keep business running smoothly.
•System is a functional unit, which involves set of procedures/functions to vFor example information about past revenue and expenditure are needed for an
produce certain outputs by processing data/information given as input. organization for making future strategic planning .
vInformation chart shows the importance of information for an organization.
•Information System is computer based system that create, process, store and
disseminate information through the organization. Information systems can
be formal or informal.
vInformation Literacy is the ability to crate and use information systems to find
•Information technology(IT) are tools and techniques that support the design
solutions to business problems.
and development of information systems. vIt includes business intelligence, understanding the organizational mission, knowledge of
information technologies, computer literacy and problem-solving skills.
vComputer literacy is small part of information literacy.
•They include hardware, software, databases, telecommunications and client-
servers.
vIn summary computer literacy is knowledge of how computers function and
information literacy is the ability to use computers in innovative and meaningful
•Information systems and information technologies go hand in had. ways to solve business problems.
https://bit-papers.blogspot.com/ 2 ©17171R
$sagarMalla CITE 2016 Batch
MANAGEMENT INFORMATION MANAGEMENT INFORMATION 19171R
SYSTEM SYSTEM
Data Vs Information Characteristics of Information
All good information has the following characteristics:
Data Information
Raw facts Processed facts ØSubjectivity: The value and usefulness of information are highly subjective
Dead stored facts Live presented facts because what is information for one person many not be for another.
Inactive (only exists in the backend) Active (being processed data for knowledge
base) ØRelevance: Information is good only if it is relevant- i.e. applicable and
Technology oriented Business oriented meaningful to the decision maker.
vData are facts, events, and transactions which have been recorded. They are ØTimeliness: Information must be delivered at the right time and the right place to
basically the raw inputs which further get processed to become information. the right person. E.g. If manager gets any information about the project a year after
requesting is not timely and hence not useful.
vWhen we process data and convert it into a form that is useful and meaningful to
decision maker , it become information. ØAccuracy: Information must be free of errors, because erroneous information can
result in poor decisions and decrease the confidence of users.
https://bit-papers.blogspot.com/ 3 ©17171R
$sagarMalla CITE 2016 Batch 19171R
MANAGEMENT INFORMATION MANAGEMENT INFORMATION
SYSTEM SYSTEM
Process of Converting Data into Information
Steps in conversion of data into information: Need of MIS for Organization
Ø Management Information Systems (MINS) is the study of how technology can be
qCollection : first step is to collect data through surveys, interviews, sensors, used to solve business problems and create new business opportunities.
documents, newspapers or any other appropriable means. It can be tedious, time Ø So today any medium or larged sized companies can survive without computers
consuming and labor-intensive process. and information system
Ø Meeting global Challenges
qClassification: Second step classification of collected data based on some criteria Ø Capturing Opportunities in the marketplace
Ø Supporting Corporate Strategy
qSorting, adding , merging and so on: Next data is sorted to arrange it in a Ø Linking Departments whose functions are different
meaningful form. Some additional task may be included in this process like adding Ø Enhancing work productivity
values, merging files and many others. Ø Increasing the quality of goods and Services
https://bit-papers.blogspot.com/ 4 ©17171R
$sagarMalla CITE 2016 Batch 19171R
INFORMATION SYSTEM FOR MANAGERIAL INFORMATION SYSTEM FOR MANAGERIAL
DECISIONN-MAKING DECISIONN-MAKING
• Transaction Processing System Transaction Processing System
– A computerized system that performs and records the daily routine transaction • TPS supports these tasks by imposing a set of rules and guidelines that specify how to
necessary to conduct the business. record, process and store a given transaction.
• Some more example of TPS in everyday lives – when we make a purchase at a retail
• Management Information System
store, deposit or withdraw money at a bank or register for classes at a university-have a
– The MIS is defined as an integrated system of man and machine for providing manual or automated TPS.
the information to support the operations, the management and the decision
making function in the organization.
• TPS is the data lifeline for a company/organization because it is the source of data for
other information system like MIS and DSS.
• Intelligent Support System
– ISS are systems that facilitate decisions requiring the use of knowledge, • TPS is the main link between organization and external entities like customers,
intuition, experience and expertise . System that fall in this category are: suppliers, distributors and regulatory agencies.
DSS,EIS ,AI and ES
• TPS exist for the various functional areas in an organization, like finance,
accounting,manufacturing,production,human resources and other department.
• Office Automation System(OAS) • Real world example of TPS are ATM , any online ticketing system.
– Also referred to as office information systems whose primary goal is to
facilitate communication.
INFORMATION SYSTEM FOR MANAGERIAL
DECISIONN-MAKING
INFORMATION SYSTEM FOR
MANAGERIAL DECISIONN-MAKING
Transaction Processing System
• A transaction process system (TPS) is an information processing system for
Characteristics of TPS
business transactions involving the collection, modification and retrieval of all The four important characteristics of a TPS are:
transaction data. • RAPID RESPONSE- Fast performance with a rapid response is critical. Input
must become output in seconds so customers don’t wait.
• TPS is an information system that records company transactions.
• These system were among the earliest computerized systems. • RELIABILITY- Organizations rely heavily on their TPS with failure possibly
stopping business. Back-up and recovery procedures must be quick and
accurate.
• Their primary purpose is to record, process , validate and store transactions
that take place in the various functional areas of business for future retrieval
and use. • INFLEXIBILITY- A TPS wants every transaction processed in the same way
regardless of user or time. If it were flexible there would be too many
opportunities for non-standard operations.
• For example when an company places an order with a supplier, a transaction
occurs and the transaction system records relevant information like supplier’s
name , address ,the kind and quantity of items purchased and the invoice • CONTROLLED PROCESSING- The processing must support an
amount. organization's operations.
• https://bit-papers.blogspot.com/ 5 ©17171R
$sagarMalla CITE 2016 Batch 19171R
INFORMATION SYSTEM FOR MANAGERIAL INFORMATION SYSTEM FOR MANAGERIAL
DECISIONN-MAKING DECISIONN-MAKING
Steps in Processing a Transaction Data Validation
The steps in processing a transaction are: • It is essential step in transaction processing.
1. Data Entry
• It ensure the accuracy and reliability of data by comparing actual data with
2. Data validation
predetermined standards or known results.
3. Processing and revalidation
4. Storage • There are two steps in validation:
– Error Detection and
5. Output Generation
– Error Correction
6. Query Support
• Error Detection are performed for detecting the errors in transaction data.
• Some commonly used error detection procedures are checking the data for
appropriate format (text, numbers, etc),checking for aberrations (values that are
very low or too high) and checking for missing data, invalid data and inconsistent
data.
• Error Correction technique depends upon the type of errors and the nature of
application.
https://bit-papers.blogspot.com/ 6 ©17171R
$sagarMalla CITE 2016 Batch 19171R
INFORMATION SYSTEM FOR INFORMATION SYSTEM FOR
MANAGERIAL DECISIONN-MAKING MANAGERIAL DECISIONN-MAKING
• Some error correction measures include allowing only authorized person to correct • Regardless of the type of processing used, once it is complete, the output should
errors, maintaining a log of revised (corrected data) values and establishing a paper be validated for accuracy and reliability.
trail showing the nature and the source of each error . • So validation must be done both before the data is processed (to check input
validity) and after the data is processed (to check output validity)
Data Processing and Revalidation
• Once the accuracy and reliability of the data are validated, the data are ready for Data Storage
processing. There are two ways to process the data:
– Online
• Processed data must be carefully and properly stored for future use.
– Batch mode • Data storage is very critical as value and usefulness of data diminish if data are
not properly stored.
Online Transaction Processing System(OLTP) : is the instantaneous processing of
data. Output Generation
– In this system data input device is directly linked to the TPS and therefore the data
• Once data has been input, validated, processed , revalidated and stored, the output
are processed as soon as it is entered into the system. Input device may be at the
can be communicated to decision maker in two ways-
remote location and be linked to the system by networks or by telecommunication
– Documents and paper
systems.
– Forms: screens or panels
– The information in such type of system is always current as there is no gap
between data creation and data processing.
• They provide managers with vital information necessary to make tactical decisions and • System that fall into this category are
to assess the impact of daily operations on the long-range of the company/organization. – Decision support system(DSS)
– Executive Information System(EIS)
• Input to MIS comes primarily from the TPS and other sources within the company. The – Artificial Intelligence (AI) and Expert System(ES)
output of an MIS takes the form of summary reports and exception reports.
• Such system support the knowledge-intensive activities of managers, which require
• Summary Report accumulates data from several transaction and presents the result in the application of theoretical knowledge like principal, thermos and practical
condensed form. E.g. sales manager may get a summary report giving the number of experience like intuition, experience, and judgment.
units of each product sold in the preceding month.
• Exception Report is a report that outlines any deviations from expected output.
Purpose of this type of report is to draw the attention of middle manager to any
significant differences between actual performance and expected performances.
• DSS allows manager to perform goal-seeking that specifies the actions a manager should • EIS does not generate alternative for a given problem as it is to integrate data
take in order to accomplish a certain goal. from different sources and present it in a useful format to the decision maker.
• E.g. if goal of company is to increase sales of product A by 10% then DSS can help • EIS is user-friendly and intuitive to use; it has excellent menus and graphic
manager decide on the course of action to take regarding operation cost, product pricing,
advertising and other related issues to achieve the goal. capabilities.
• EIS has drill-down capability which is the ability of the system to provide
information at any level of detail desired by the decision maker.
• E.g. the CEO of a company may want the monthly sales of product X for the
entire company. Next CEO may want a breakdown of sales figures on a regional
basis or on a store –wide basis.
INFORMATION SYSTEM FOR INFORMATION SYSTEM FOR MANAGERIAL DECISIONN-
MANAGERIAL DECISIONN-MAKING MAKING
Artificial Intelligence and Expert System
• Example of DSS in hospital : • Another type of IIS is Artificial Intelligence (AI) is branch of computer science
whose goal is to design and develop computer systems that emulate human
• hospital use DSS to prepare contract bids for its services. Preparing contact is intelligence.
semistructued tasks that involves some structured routine activates (assessing a cost of
certain service) and some unstructured activities (assessing a competitor’s strategy). Also
• AI attempts to endow(provide) machines with capabilities and characteristics
require several data like cost and profit figures, manpower requirements and overhead
costs, state and federal taxes, regulatory requirements and so on. that would indicate intelligence, found in a human being.
• The system then integrate these data with different decision models like financial and Expert System
accounting model ,manpower planning model, business intelligence model to arrive at a • ES are a branch of AI.
solution. • These system incorporate knowledge and problem-solving skill of human
expert like physician, scientist or an automotive engineer.
https://bit-papers.blogspot.com/ 9 ©17171R
$sagarMalla SYSTEM FOR MANAGERIAL DECISIONN-
INFORMATION CITE 2016 Batch 19171R
MAKING
Decision Support System
• ES has three main components : Decision Support System
– A knowledge base •Decision support system assist management decision making by combining data,
– An Interface Engine sophisticated analytical tools and user friendly software into single powerful system that can
– A user Interface support structured, unstructured and semi structured decision making.
• A knowledge Base: it serve as a store house of knowledge and experience •A structured decision can be pre planned or pre-specified and are repetitive, routine and
gathered from experts in a given field, including facts, theorems and principles have a definite procedure for handling them. This can be expressed as steps to follow, a
flowchart, a decision table, Mathematical analysis and simulation. For example calculating
related to a given area of knowledge or field of study.
the compound interest on a loan.
•The unstructured decision cannot be pre planned and are non-repetitive, non-routine and
does not have a definite procedure for handling them. They depend upon judgment and
experience of the decision maker. For example developing strategy to remain competitive in
an ever-changing marketplace .
•Semi structured decision are those where part of a problem are routine and can be
approached with standard problem-solving procedures; others require intuition and judgment
.
•For example-selecting a college where parts of this decision rely on facts and figures like
tuition fees, ranking ;other parts rely on judgment.
2. Another application of DSS is forecasting, demand management and supplier 4. Other application of DSS include corporate planning, developing effective
evaluation. advertising strategies and pricing policies, determining an optimal product mix, and
DSS can merge data from different sources to forecast demand , determine the handling investment portfolios.
appropriate quantity and mix of resources necessary to meet the demand. For example
a stockbroker may use data about the financial performance of a company in a DSS used by India to develop regional health care plans . Such planning requires
forecasting model to predict future company performance. A teacher may use each large volume of internal and external data, combined with many complex models.
subject marks acquired by students in a model that calculates overall course grade. DSS has number of models that generate alternative scenarios for different
Different problems require different models. socioeconomic and environmental conditions so decision makers can evaluate the
DSS implemented in a company which produces and market some 2,000 effects of various development plan in achieving regional development goals.
products ,use DSS for sales forecasting, pricing analysis, tracking of promotion DSS allows managers to determine the types of health care facilities that are
results, and new product analysis. suitable for a given region and the number of facilities of each type that must be
opened during a given period to meet overall goals of government.
https://bit-papers.blogspot.com/ 11 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Decision Support System Decision Support System
Component of DSS
•Support Tool
•Model Management System •Third component of DSS consists of support tools, like pull-down menus, online
•Second component is Model Management System help, user interfaces, graphical analysis and error-correction mechanisms which
all facilities user’s interaction with the system.
•It stores and accesses models that managers use to make decisions.
•It builds models , select models , manipulates models, updates models and
maintain models.
Production Model: are used on the shop floor to make manufacturing related decisions.
They can estimate the number of machines to be operated, calculating the amount of
material required to meet demand, scheduling .
Marketing Model: help marketing managers make a wide variety of decisions like
product pricing, store location and advertising strategies . Similarly it include product
design and forecasting .
https://bit-papers.blogspot.com/ 12 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Decision Support System Decision Support System
What-If Analysis
Risk Analysis
• Is the process of assessing the impact of changes made to model variables, to
their values and interrelationships or to any combination of these. • DSS can help manager calculate the risks associated with various alternatives
through the use of probabilities and other statistical techniques.
• For Example Manager might ask “what would be the impact of a 12% increase in
the cost of raw materials on future demand?” “By how much will demand • Decision are of low-risk, medium risk and high-risk .
increase if we give a discount of 25% during the festival season”
• DSS are mostly useful in making medium and high risk environment.
• Similarly Bank manager might ask “what would be impact of an increase in
interest rates on loan approvals”.
• Thus what-if function helps managers to assess the impact of different scenarios
on the bottom line.
• Many popular spreadsheet packages like Excel and Lotus 1-2-3 have “what-if
“capabilities.
• Allows decision makers to identify the course of action to take in order to • Is the display of data in an easy-to understand format, using graphs, charts ,
achieve a certain goal. tables and figures.
• It can be view as opposite of “what-if” analysis . • It helps manager to quickly digest large volumes of data and visualize the impact
of various course of action.
• The system addresses the question “what should the values of the input variables
be if a certain goal or objective is to be achieved”?. • For example manager might look at graph to study the sales growth of Product A.
•
• For example suppose the goal of a TV company that make 15 different TV • Microsoft Excel gives the user a wide choice of graphs and charts in many colors
models in 10 manufacturing facilities in seven countries, is to achieve gross profit and patterns.
of $100 million from its TV division in the coming year. The question here is
“How should the products be priced to achieve this goal?
https://bit-papers.blogspot.com/ 13 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Decision Support System Decision Support System
Group Decision Support System Types of GDSS
•Single-Computer Systems
• Decision in an organization frequently require the input and participation of more •Keypad response system
than one individual , they require group thinking. •Full-keyboard workstation systems
• Electronic questionnaires- questionnaires that people can respond to using •Is type of GDSS in which group members use hand-held keypad to
a computer communicate with each other .
•In this group members are linked by a network of PCs that are usually
located in a single room, known as decision room.
• Electronic Brainstorming tool – tools that allow people to express , share
and analyze ideas anonymously •A projector screen at the front of the room displays the inputs of different
group members and each member uses his or her keypad to communicate
and coordinate ideas with other members of the group.
• Idea Organizer- tools that facilitate the coordination, compilation and
•Keypad provide wide variety of response like predefined rating scales (yes,
prioritization of ideas.
no), multiple choice and customized rating scales .
•The computer receives the input of group member from each keypad,
• Voting tools- tools that allow people to indicate their preference for an idea processes, analyzes and ranks the input and display the output in graphical
form or text form to the group.
• MeetingSphere is one of the GSSS software. •These system analyze and summarize the input of group almost
instantaneously.
https://bit-papers.blogspot.com/ 14 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Decision Support System Executive Information System
Executive Information System
•A reporting tool (software)
• Allows you to turn your organization's data into useful summarize reports
• These reports are generally used by executive level managers for quick access
to reports coming from all company levels and departments
•EIS is a software that allow user to transform enterprise data into quickly
accessible and executive-level reports. It enhances decision making for
executives.
https://bit-papers.blogspot.com/ 15 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Executive Information System Executive Information System
Features of Executive Information System Critical Success Factors for DSS/EIS
For successful adaption of DSS and EIS technology there are some critical
success factors (CSFs) that significantly increase the chances of successfully
using and implementing these technologies.
https://bit-papers.blogspot.com/ 16 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Executive Information System Executive Information System
Commitment from Top Management Availability of Accurate and Reliable Data
•a critical factor in the successful adoption of any technology is commitment •As DSS/EIS are data-driven , the quality of the decision made using system can only
from top management. be high or effective only if the data input to system is accurate and reliable
•Since DSS/EIS primarily target the middle and top level management they are •If data are not readily available , accessible, or reliable for making decision, user
very important for an organization. may be unwilling to use the system and eventually technology fails
•Without the support of management these technology cannot survive in an Careful Problem Selection
organization •Problem to be solved should be are carefully selected .
•For too difficult and complex problems it may be too difficult and time consuming to
develop the system that increase organizational cost.
•Since DSS/EIS primarily target the middle and top level management they are •It help to ensure the free flow of information.
very important for an organization.
•Without integration it is difficult to achieve the full potential of systems and to
•Without the support of management these technology cannot survive in an deliver the full power of technology.
organization
Costs Versus Benefit
https://bit-papers.blogspot.com/ 17 ©17171R
$sagarMalla CITE 2016 Batch 19171R
ES & NEURAL NETWORK ES & NEURAL NETWORK
ARTIFICIAL INTELLIGENCE Appropriate Areas for an Expert System
• AI is a branch of computer science concerned with designing intelligent computer •Although expert system is versatile, not all problems should be addressed by expert
systems; that is, system that exhibits the characteristics we associate with intelligence system.
in human behavior – i.e. understanding language, learning, reasoning, solving
problems and so on. •There are some issues that must be addressed before selecting the set of problems
and solutions that is to be modeled using expert system technology
•The field of AI includes the design and development of machines capable of
performing tasks that require human intelligence . ØIs Domain expertise rare and expensive?
ØIs the knowledge likely to be inconsistent and incomplete?
•Expert Systems – branch of AI that is designed to emulate the knowledge and ØDoes problem solving process involve judgment, heuristics and rules of thumb?
expertise of human beings in a specialized area.
ØIs it possible to state precisely what the system should do?
ØIs common sense required to solve the problems?
•An expert system stores the knowledge of an expert in a specific area of study, such
ØCan significant benefits be derived by capturing and disseminating this
as internal medicine, genetic engineering and production engineering.
knowledge?
ØIs top management committed to solving this problem?
https://bit-papers.blogspot.com/ 18 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Es & NEURAL NETWORK Es & NEURAL NETWORK
Components of an Expert System Knowledge Base
•An expert system has main five components •Is the repository of knowledge that human experts might apply to solve problem sin
subject area like medicine, engineering, finance.
•Knowledge Base
•Knowledge include facts, theorems, principles , rules , heuristics and rules of thumb
•Inference Engine that experts use to solve a problem
•User Interface
•Heuristics are based on experience, intuition and judgment and hence vary from one
expert to another.
•Knowledge may also be acquired through study, and observation, formal and
informal interviews, questionnaires, prototypes and face-to face contact.
https://bit-papers.blogspot.com/ 19 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Es & NEURAL NETWORK Es & NEURAL NETWORK
Inference Engine User Interface
•Second component of an expert system is the inference engine • A user interface is software that helps a user to interact with the computer by
accepting input from the user and displaying different kinds of output.
•Is a piece of software that determines what knowledge to apply and when and how to
apply it, to solve a given problem •Physical components of user interface are input devices like keyboards, mice, sound
cards and voice recognition systems and output devices like terminals and printers
•It controls and guides the problem-solving process and arrives at conclusions by
applying reasoning to the knowledge In the knowledge base. •Software component includes pull-down menus, graphs , charts , icons ,touch
screens and natural language interfaces.
•Is a program that has the ability to reason and draw inferences .
•IF-THEN RULE : Computer that are modeled like neurons of brain that make compute smarter can
•One of the ways of representing the Object, Attribute and Value in an expert perform like human brain.
system is the use of IF-THEN rules.
The idea of modeling the computer as concept of neurons are called neural
•IT works as follows: IF a certain condition (also called antecedent ) is true networks
,THEN perform the following action, or consequent
It is branch of Artificial Intelligence, where computer system is modeled like
•Rules are also called production rules, so systems that use IF-THEN rules are neurons of human brain.
called production system or rule based system.
A computer system modelled on the human brain and nervous system.
•IF-THEN rules are also used in other systems like TPS, MIS and DSS to
represent different kinds of knowledge. Neural networks are programs that model the interconnections of human brain
cells.
•If antecedents are linked by OR if at least one of the antecedents in the rule is •NNs are generally used for application that require
true the THEN part of the rule will be executed. • pattern matching
•Performing multiple operations simultaneously
Examples: •Making associations
IF a students overall grade is greater than 89% AND the student has actively participated in class •Making generalization
THEN overall class grade is A
•Addressing situation that require learning from experience.
IF the car lights were left on AND the car does not start
THEN the battery is dead
https://bit-papers.blogspot.com/ 21 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Es & NEURAL NETWORK OFFICE AUTOMATION
Neural Network
Office Automation
Another popular application of neural
•Office automation refers to the varied computer machinery and software used to digitally
nets include
create, collect, store, manipulate, and relay office information needed for accomplishing
fraud detection basic tasks.
financial analysis
character recognition • The basic activities of an office automation system are:
text retreval •Raw data storage,
• electronic transfer,
How Neural Network Works •and the management of electronic business information comprise
•A neural networks is made up of interconnected processing elements(PEs), whch are
• Office automation helps in optimizing or automating existing office procedures.
self-adjusting units that are tightly connected with PEs in the system.
Advantages are:
•A PEs receives inputs from the user; Each input has a certain weight assigned to it •Office automation can get many tasks accomplished faster.
•It eliminates the need for a large staff.
•The weight influence the way the input is processed by the PE, and the PE is capable •Less storage is required to store data.
of autonomously and automatically adjusting the weights of the inputs base upon its •Multiple people can update data simultaneously in the event of changes in schedule [
past experiences.
Es & NEURAL NETWORK OFFICE AUTOMATION
Neural Network
•Each PE process the input and generates a signal output signal to other PEs in the Office Automation System(OAS):
network. •Also referred to as the office information system;
•The system observe the overall pattern of output generated t the PEs, which becomes •OAS is system whose primary goal is to facilitate communications.
the basis for information analysis and retrieval .
•Such system is a set of tools that gather, process ,
store, retrieve and disseminate information
between individual workers, team of workers
and business entities, both inside and outside
the organization.
•The primary purpose of OAS is to enhance
communication which involves inputting, processing,
outputting , storing , retrieving and disseminating data and information.
https://bit-papers.blogspot.com/ 22 ©17171R
$sagarMalla CITE 2016 Batch 19171R
OFFICE AUTOMATION OFFICE AUTOMATION
Different kinds of office automation tools Virtual Corporation
•Fax:(written type of data) uses telephone line to transmit documents. •For many years office communication was considered to be a clerical function.
Technology used: Fax machine, telephone
•Nowadays today systems support workplace communications that has made possible of
•Multimedia:( written , audio, visual)a computer based tool that uses a graphical and imagination of virtual corporation.
interactive interface and combines media types like text , graphics, animation , audio and
video . Technology used: multimedia computer and printer •The electronic office of today looks dramatically different from the mechanized office of just
few yeas ago where typewriters, mechanical devices and the postal service were the primary
means of communication
•Word processing:(written)programs that make it easy to create and alter documents.
Technology used: Computer, Printer •Virtual corporation provides people the ability of work from anyplace without being confined
by physical boundaries.
•Desktop publishing:(written)programs with extensive word processing and graphic
capabilities. Technology used: High resolution computer, printer •VC is a group of employers and employees who are not bound by physical work environment,
but instead use technology to come together temporarily and communicate to achieve a shared
business goal.
•E-mail:(written) programs that allow individuals who are linked through a network to
electronically communicate with each other, any time anywhere in the world.
•In VC employees don’t come to a place to work; instead , they can work from anywhere, at
Technology used: computer, network any time; thus businesses need not invest in office space , furniture and other amenities.
•Voice mail: (oral)the sender’s voice message is processed by modem and stored in as Electronic Publishing and Processing System
server at the receiver’s end. When receiver is ready to receive the message , the digitized Word Processing
message is retrieved from the server and reconverted into analog signals Desktop Publishing
Technology used: Telephone, server, network Document Management System:
Multimedia
Imaging
•Groupware : (oral, written, visual) a broad term given to communication tools like Communication Systems:
E-mail, voice, data and videoconferencing that foster group decision making. Email
Technology used: the nature of tools depends nature of application Fax
Voice Mail
Electronic Meeting System
•Video Conferencing : (oral, visual)a type of electronic meeting system that uses Audio Conferencing
telephone, television, computers and communication links to allow geographically apart
Video Conferencing
decision maker to hear and see each other.
GroupWare
https://bit-papers.blogspot.com/
•Technology used: telephone, television, network 23 ©17171R
$sagarMalla CITE 2016 Batch 19171R
OFFICE AUTOMATION OFFICE AUTOMATION
Importance of OAS in an organization: Help increase volume of work and reduce cost of operation
Office automation is the process of applying modern machines and technology to improve •Lastly, another importance of office automation systems is that they help reduce
information management as well as the overall performance of an organization
individual’s involvement in everyday clerical tasks such as creating reports and
organizing customer data.
•Help improve communication within an enterprise and between enterprises:
•office automation is extremely important because it help facilitate flow of information
• Automation platforms spreadsheets help store bulky customer data; thus help reduce
within an organization.
of paper works, as information is compiled once and stored for future referencing.
•For instance, through teleconferencing, different individuals from different departments
or branches can communicate easily without travelling long distances for meetings, • This help not only help improve volume of work, but also help make office orderly
•Automation systems such videoconferencing help improve communication within or •Besides, automation processes enables only a few workers to perform the duties or
between organizations by reducing the cost and time of meeting because participants task of many. For instance, a single employee can use one machine choose, pack, and
can converge at any time when issues arise without worrying about distance or cost. label products for transportation or shipping.
•In turn, this helps improve the performance of organization because individuals have •This, therefore, help reduce cost of operation because the organization will not spend
enough time to focus on other core activities within the organization
more money in hiring more labor to perform different tasks.
compose message rapidly and send to them to the recipients instantly.
Email:
•Email is a system that allows a person or a group to electronically communicate with each
•For instance, office automation platforms such as E-mail permits other through a network.
sending of messages to large numbers of recipients located in
•E-mail is software that allows users, via their computer keyboards, to create, send, and
different regions across the globe receive messages and files to or from anywhere in the world.
•Most e-mail systems let the user do other sophisticated tasks such as filter, prioritize, or file
•Office automation systems such as Emails, therefore, are important
messages; forward copies of messages to other users; create and save drafts of messages;
because they help improve flow of information within an send "carbon copies"; and request automatic confirmation of the delivery of a message.
organization. •E-mail is very popular because it is easy to use, offers fast delivery, and is inexpensive.
•Examples of e-mail software are Eudora, Lotus Notes, and Microsoft Outlook.
https://bit-papers.blogspot.com/ 24 ©17171R
$sagarMalla CITE 2016 Batch 19171R
OFFICE AUTOMATION OFFICE AUTOMATION
E-mail system comprises of the following three components:
Mailer
Voice Mail
Mail Server
•Voice mail facilitates oral communication.
Mailbox •Voice mail is a sophisticated telephone answering machine.
Mailer
It is also called mail program, mail application or mail client. It allows us to • It digitizes incoming voice messages and stores them on disk.
manage, read and compose e-mail.
•Fax uses telephones, modems , and scanners to transmit text and graphics to
individuals and organizational all over the world who have access to telephone.
•Computer system is not required to send a FAX. BUSINESS INFORMATION SYSTEM
•A facsimile or facsimile transmission machine (FAX) scans a document containing
both text and graphics and sends it as electronic signals over ordinary telephone
lines to a receiving fax machine.
•This receiving fax recreates the image on paper. A fax can also scan and send a
document to a fax modem (circuit board) inside a remote computer.
•The fax can then be displayed on the computer screen and stored or printed out by
the computer's printer.
•These can also be integrated with applications such as word
processors so that faxes can be edited without being rekeyed into
computter.
https://bit-papers.blogspot.com/ 26 ©17171R
$sagarMalla CITE 2016 Batch 19171R
BUSINESS INFORMATION SYSTEM BUSINESS INFORMATION SYSTEM
MARKETING INFORMATION SYSTEM
Objectives of BIS
•The use of information systems facilitates better decision making in •A marketing information system (MIS) is a management information system designed to
the company. support marketing decision making.
•MKIS means to collect , analyze and apply information to the marketing managers.
• Management is able to review all the present practices and norms
and formulate new ones for the future. •Marketing managers use this system to take marketing decisions.
•Marketing information are collected from internal and external sources –customers,
•Information systems are used across all realms and functions of the suppliers, company sales man, government agencies and all.
business.
•The marketing function of a business is responsible for selling goods and services.
•Management is able to better control its people and processes and •Marketing information systems assist in marketing function.
attain organizational goals.
•Billing and inventory control are also sometimes considered marketing inform systems.
Considered marketing inform system
•Information System for Accounts and Finance (FAIS-Financial and Accounting •Such system capture valuable customer information and hence can improve productivity
Information System) , enhance customer service and create better sales and marketing strategies .
•Information System for Production & Manufacturing( Manufacturing Information System) •Such system helps the company closely monitor and quickly respond to marketing
information like stock on hand, merchandising opportunities , effectiveness of latest
promotion, advertising strategies and so on
https://bit-papers.blogspot.com/ 27 ©17171R
$sagarMalla CITE 2016 Batch 19171R
BUSINESS INFORMATION SYSTEM BUSINESS INFORMATION SYSTEM
Manufacturing Information System
•The manufacturing function is concerned with the production of goods that the business sells.
The purpose of this system is to determine what parts and materials will be needed during the
manufacturing process and when they will be needed.
Robotics::
This system uses computer-controlled robots in the manufacturing process
•These system focus on customer-oriented data and gather , access , analyze and •A computer-based system that works in conjunction with other functional
disseminate up-to-minute , customer-related information. information conjunction with other functional information systems to support the
• firm's management in systems to support the firm's management in solving problems
that relate to manufacturing solving problems that relate to manufacturing the firm's
•MIS thus gives marketing manager the ability to be flexible and responsive to products the firm's products.
evolving market forces.
•Manufacturing information system covers all act ivies related to manufacturing and
services.
https://bit-papers.blogspot.com/ 28 ©17171R
$sagarMalla CITE 2016 Batch 19171R
BUSINESS INFORMATION SYSTEM BUSINESS INFORMATION SYSTEM
Quality Information System Financial and Accounting Information System
•Quality Information System are standalone system or embedded systems that helps an •FAIS is the system that provides information related to the accounting and financial
organization to achieve its quality goals.
activities in and organization.
•QIS can promote quality and privide tools and techniques to help the company achieve
its quality goals. •FAIS includes number of subsystems, such as budgeting, cash and asset
management, capital budgeting, portfolio analysis , general ledger, accounts
•It help companies achieve quality certification. receivable, inventory control and payroll systems.
•QIS mainly play role in four different areas with in organization.
•Partial system repair •Financial institutions like banks use specialized FAIS like commercial loan
•Full systems repair analyzers, credit approval systems, commercial accounting system, credit application
•Training
•Oversight systems , automated teller control.
•In partial systems existing system are partially repaired in order to update them and
make them more responsive to the changing needs of decision makers. It may include
providing users with better interfaces, better end-user support or better integration of •Types of FAIS systems
existing system. •General ledger system
•Asset Management system
•E.g. Company developed interface to link its corporate information system with its •Order Entry System
manufacturing information system in order to reduce inventory, enhance customer •Account receivable and payable
support, and increase overall productivity. •Payroll system
https://bit-papers.blogspot.com/ 29 ©17171R
$sagarMalla CITE 2016 Batch 19171R
•If Information system is used in creative ways to achieve the goals and fulfill the
mission of the organization; it can be viewed as an SIS, whether it is TPS or DSS or
any other type of system.
https://bit-papers.blogspot.com/ 30 ©17171R
$sagarMalla CITE 2016 Batch 19171R
•Some information Service SIS are: •Reliance on a number of vendors for providing information technologies
•Financial Planning Systems : systems with mathematical models to aid
financial planning. •Corporation among a number of organization
•Executive Information Systems: system that allow top management to retrieve
internal and external data and information directly from the computer.
Telecommunication :
•Logistics: vehicle routing, freight rate management, shipment tracing,
•Telecommunications are often a vital part of an SIS; the most successful SIS are those
performance measurement.
that go beyond traditional organizational boundaries and eliminate the barriers of
•Electronic Data Interchange (EDI):electronically sending bills, payments , or
time and space through the use of telecommunication.
orders to suppliers and customers
•Expert System : Computerized “consultant” systems for specialized situations
•Telecommunication is extremely used by organization to deliver information within
organization or outside the organization.
https://bit-papers.blogspot.com/ 31 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Strategic Information System Strategic Information System
Multiple Vendors Strategies for Developing an SIS
• SIS often require the integration of complex technologies , in many cases several •Strategic systems are most difficult to develop.
vendors are needed to develop an SIS .
•Before investing on strategic systems an organization must find answer for two
•For example building Cash Management Account (CMA) system company called questions :
Merril Lynch had link more than 600 brokerage firms all over the world . •Is the project financially feasible?
•Is the project technically feasible?
•Telecommunications equipment for this system was acquired from 30 different
vendors. Is the project financially feasible?
• Strategic systems require more resources over an extended period of time, often
•So most SIS should have ability to identify, coordinate and manage transactions with with little or no guarantee of success.
number of vendors and effectively bring together diverse technologies to achieve a •So before developing the SIS organization must analyze whether the cost of SIS
goal. is feasible or not as SIS can be success or failure where lot of investment is made.
•SIS support inter-organizational and bring together a diverse group of assets and
•Once a company determines that the project is both financially and technically
talents, like ventures enhancing productivity, reducing operating costs, increase
market share and create new partnerships specially that conduct business feasible, it must take five important guidelines to ensure the success of SIS .
transactions in global markets. 1. Technology decisions should be grounded in a clear understanding of the
processes that drive the technology.
•As trends toward globalization continues to accelerate, managers are under pressure 2. Strategic systems should be driven by strategic alliances between trading
partners
to quickly access and disseminate large volumes of information across national and
international boundaries., where it often requires the corporation of diverse business 3. Continuous improvement and investment in strategic systems are essential
units. In such situation SIS as inter-organizational system help to solve such problem for their long-term success.
4. The organizational culture should encourage some risk taking.
•Also multinational companies that rely on the free flow of information between 5. Users must be fully trained if the full potential of the strategic system is to
business units and head office , SIS can help . be achieved.
https://bit-papers.blogspot.com/ 32 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Maintenance
•Step third , strategic system can be successful over the long run only if the company is
willing to invest in updating and maintaining it. •Companies that overcome the first two barriers types are often stumped by the
complexity of maintain these system so that they can sustain the advantages derived
•Fourth, the organizational culture should encourage top mangers to be “champions” and from them.
“passionate sponsors” who are willing to take key role in development and implementation of •Strategic system are often expensive to maintain and can be an enormous drain on
the system and encourage its use and acceptance by employees and customers the corporate budget.
•Lastly, the organization should have talented people with excelent technical skills and a good •Companies with limited financial resources, technological sophistication and
understanding of the business organizational flexibility are likely to face one or more of these barriers
•Proper technology management lay foundation for building open systems which
allow the free exchange of files, programs and databases among multivendor
hardware platforms or between different types of computers lke mainframe ,
microcomputer.
•Data may be in electronic or document form ; data can be manually or automatically. Telecommunicatio Telecommunicatio
ns Business Unit ns
1
•Data are valuable resources for an organization so they must be actively managed, carefully
protected and efficiently unitized.
•Distributed systems are systems in different locations that are linked through a network. Business Unit
https://bit-papers.blogspot.com/ 36 ©17171R
Business Unit
3
$sagarMalla CITE 2016 Batch 19171R
Managing Information Resources Managing Information Resources
Functional Management End-User Management
•Functional management is the task of integrating the information flows among the •End-User also play important role in developing and managing information system,
various functional units in a business. so end-user management is also task of management function.
•Building cross functional customer-oreinted information system is the only way to •If end-user are not properly managed, the results can include ad hoc development of
gain a total and uniform view of the customer in modern trends. information system , lack of system standardization, data redundancy , poor system
maintenance and security violations
•In early days number of systems were built as compartmentalized units ;today the
goal is to understand and manage the different functions and integrate them into a •IRM polices must ensure that end-users are equipped with the hardware and
unified whole. software necessary to effectively perform their job functions ,keep them abreast of
new technologies and provide necessary job training and education on issues like
•So IRM help in managing the cross-functional system in effective way. system maintainance, system security and system integration.
•It is just like impossible to eliminate all security violations because crackers always
•Network Vulnerabilities: Networks have become increasingly complex and difficult
appear to be one step ahead of security experts.
to manage.
https://bit-papers.blogspot.com/ 38 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Computer Security Computer Security
Input Controls:
•Input controls are designed to prevent users from entering incomplete, erroneous, Process Control:
unauthorized or inappropriate data. •Process Control are policies and procedures that ensure that data are meaningful
•There are four kinds of input controls : and reliable .
•Access Privileges •It ensure that data are processed using proper procedures and methods.
•Input Authorization •These are designed to catch any errors that may have slipped through the input
•Data validation controls .
•Data Format •They ensure that the right file or the recent updated file is being processed and
that the results of data of file processing is accurate , reliable and timely.
•Example of process control are :
Access Privileges:
•Process control that organization can implement to protect itself from virus are :1) educate
•Some of the access privileges within an organization are: Unique user IDs, users about their effects and how to prevent them 2) restrict the movement of diskettes from one
Aging Passwords, smart cards, access control lists and regular auditing and system to another
monitoring of potential security violations.
•Other process controls include frequent backups of important files which is a effective way to
protect files against accidental deletion, misplacement and natural or man-made disaster.
•Access privileges should be highly selective, closely guarded and determined on
a user-by-user basis or on a function-by-function basis .
•Data Validation: •The number and rigor (strictness) of the output controls depend on the criticality of the
application.
•Data should be validated before it is processed.
•This can be done by two employees who compare data, or automatically by
•For critical and proprietary application ,output controls are likely to be more strict and
a computer comparing the input data with existing master file. rigid than for non critical application.
•Data values are compared with pre-established values(eg. Phone nos)
•If the output is confidential (like nuclear facility designs or medical research findings),
•Data Format: control measures must be taken to secure the output from unauthorized parties.
•Input Control should also check the format of the data, ensuring that there
are no missing values and that data are in right format (eg. Integer values , •Other output controls include periodic review of system output by authorized
decimal values,), right size and right type (e.g. telephone not in alphabet ). individuals who checks the timeliness, accuracy and format of the output, identify any
exceptions and make sure that no unauthorized programs were accessed during
processing.
https://bit-papers.blogspot.com/ 39 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Computer Security Computer Security
Storage Controls •Documentation
•Storage controls ensure that the storage devices on which data and programs are •Proper system documentation is one way to control the quality of the
stored are safe, secure and well protected from natural and man-made disasters. development process and consists of detailed record keeping about the system,
logical and physical functions , its features , its interfaces and any other elements
•Storage control mechanism prevents unauthorized access to storage devices as well that are essential to its smooth functioning and maintenance.
as accidental or intentional deletion or manipulation of file.
•Clear and well-written documentation should be developed for the entire system,
•Some storage control mechanism are passwords and access privileges, backing up for the various programs in the system, and for specific system operations.
files.
•Data Security and Reliability
•Data security and reliability are another development control mechanism that prevents unauthorized
access to data.
•Some measure to secure data are preventing virus, establishing access privileges, securing physical
facilities, and implementation user ids and passwords.
https://bit-papers.blogspot.com/ 40 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Computer Security Computer Security
Physical Facilities Control Disaster Recovery Plan
•The primary goal of physical facilities control is to protect the physical facilities • Disaster Recovery Plan(DRP) is well-thought and comprehensive plan that
that house the computer and other related assets from theft, unauthorized access, specifies how a company will maintain information system and services when a
natural disasters, and vandalism. disaster strikes.
•Thse protection can be achieved through measures such as posting security
personnel, installing firm alarms, security alarms and hidden cameras and •Company must prepare itself to face natural, infrastructure or operational
requiring users to wear bandages or use smart cards to gain access to the disaster so that company will maintain information systems and services when a
building. disaster strikes.
Personnel Controls •Plan should clearly list and specify the specific situations that warrant then
•Many security breaches are cuased by employees within the company, either declaration of a disaster and should identify the specific cources of action that
because they lack knowledge about system security or bechause they have employees must take when a disaster strikes.
criminal intentions.
•Two personnel controls are :
•Training system users and
•Communicating security polices
•Establish and Communicate Security Policies and Procedures 3. Test Recovery Plan
•Establishing the security policy for a company is the first and most Sell Plan to
important step. 4. Sell Plan to Management Management
•These securities polices must be communicated among the employees of an
organization and address them in very specific terms ,to protect system 5. Implement and Update Plan
Any
hardware and software. Changes
https://bit-papers.blogspot.com/ 41 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Computer Security Computer Security
•Step 1: Perform Business Impact Analysis •Step 4: Sell Plan to Management
•First step is to conduct a thorough analysis of the impact of a disaster on the •Success of DRP requires the commitment of top management and the
business, called a business impact analysis or business resumption plan. cooperation of every department in the company.
•More detailed the business impact analysis is, the smaller is the chance of •Once the DRP recovery plan is drawn up , it is presented to top management
overlooking(fail to notice) critical elements during a disaster. for approval for implementation.
•Business impact analysis should clearly identify the situations that qualify •Here management may ask different alternatives for DRP.
as disasters.
•Among the different alternative , management will approve on the DRP plan
•Also it should clearly specify name individuals who have the right and the that will be implemented as long-term commitment from management.
responsibility to declare a disaster , identify the specific process by which a
disaster will be declared and identify and prioritize the critical processes, •Long-term commitment from management on DRP ensure to keep the assets
functions and resources of the organization. of organization secure and protected for long time.
https://bit-papers.blogspot.com/ 42 ©17171R
$sagarMalla CITE 2016 Batch 19171R
•Electronic commerce focuses on the use of ICT to enable the external activities and
relationships of the business with individuals, groups and other businesses or
• e business refers to business with help of internet i.e. doing business with the help of
internet network.
•The term "e-business" was coined by IBM's marketing and Internet team in 1996
https://bit-papers.blogspot.com/ 43 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Recent Technologies in MIS Recent Technologies in MIS
• The delivery of a learning, training or education program by electronic means. E-governance :
• Electronic governance or e-governance is the application of information and
• E-learning involves the use of a computer or electronic device (e.g. a mobile communication technology (ICT) for delivering government services, exchange
phone) in some way to provide training, educational or learning material. of information, communication transactions, integration of various stand-alone
systems and services between government-to-customer (G2C), government-to-
business (G2B), government-to-government (G2G) as well as back
• E-learning can involve a greater variety of equipment than online training or office processes and interactions within the entire government framework.
education, for as the name implies, "online" involves using the Internet or an
Intranet. • Through e-governance, government services will be made available to citizens in
a convenient, efficient and transparent manner.
• CD-ROM and DVD can be used to provide learning materials.
• Generally four basic models are available – government-to-citizen (customer),
• Distance education provided the base for e-learning's development. government-to-employees, government-to-government and government-to-
business
• Computer-centered technology delivered over the Internet or corporate intranet • Two-way communication allows citizens to instant message directly with public
administrators, and cast remote electronic votes (electronic voting) and instant
opinion voting.
Studies indicate that distance learning can be as effective as the traditional format • Transactions such as payment of services, such as city utilities, can be
when the methods are appropriate to the teaching tasks, there is student-teacher completed online or over the phone.
interaction, and the teachers provide students with appropriate and timely
feedback. • Mundane services such as name or address changes, applying for services or grants,
or transferring existing services are more convenient and no longer have to be
completed face to face
https://bit-papers.blogspot.com/ 44 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Recent Technologies in MIS Recent Technologies in MIS
Government to employees Government to government
• E-Governance to Employee partnership (G2E) Is one of four main primary • It is the relationship between online tools, sources, and articles that help
interactions in the delivery model of E-Governance. government offices and department maintain communication with the
government and with their co-offices.
• It is the relationship between online tools, sources, and articles that help
employees maintain communication with the government and their own
companies. • The purpose to include e-governance to government is to means more efficient
in various aspects.
• E-Governance relationship with Employees allows new learning technology in
one simple place as the computer. Documents can now be stored and shared with • Whether it means to reduce cost by reducing paper clutter, staffing cost, or
other colleagues online. communicating with private citizens or public government.
• E-governance makes it possible for employees to become paperless and makes it • E-government brings many advantages into play such as facilitating information
easy for employees to send important documents back and forth to colleagues all delivery, application process/renewal between both business and private citizen,
over the world instead of having to print out these records or fax
and participation with constituency.
• G2E services also include software for maintaining personal information and
records of employees.
https://bit-papers.blogspot.com/ 45 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Recent Technologies in MIS Recent Technologies in MIS
E-Medicines
https://bit-papers.blogspot.com/ 46 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Recent Technologies in MIS Recent Technologies in MIS
• Components of Internet • Telnet - Creation of a dumb terminal session to a host computer in order to run
• The Internet components most Internet users are familiar with are e-mail, the software applications on the host system.
web, and web access
• Usenet - Newsgroups for receiving news and sending out announcements.
• The most common components of the Internet.
• World Wide Web - This is largest, fastest growing, part of the Internet, the part
• Access - To interact directly with the Internet requires some form of access or for which Internet browsers like Netscape’s Navigator and Microsoft’s Explorer
connectivity to the Internet. were designed. Business is the leading factor fueling the rapid growth of the
Web making information, advertising, and product ordering readily available to
everyone with Web access.
• Chat - IRC (Internet Relay Chat) is used for live discussions on the Internet.
• Mailing Lists - E-mail messages forwarded to everyone on a special interest list. Cyber Law of Nepal (Electronic Transaction Act-2063)
•The Government of Nepal had approved the Electronic Transaction Act-2063 (ETA
• Search Engines - These tools are really a part of the World Wide Web and are 2063) on 8th December 2006.
often used when looking for information because the Web has grown so large
and is without any inherent organizational structure.
•This document is a Cyber Law of Nepal and it has provisions document for
authentication and regularization of the recognition, validity, integrity and reliability
of generation, production, processing, storage, communication and transmission
system of electronic records by making the transactions to be carried out by means of
electronic data exchange or by any other means of electronic communications, reliable
and secured.
https://bit-papers.blogspot.com/ 47 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Cyber Law Cyber Law
•The law does not only legalize all sort of electronic transactions and digital Cyber Crime
signatures, it has undoubtedly implied the ways to run several computer-based Definition
mechanisms and penalize cybercrime.
•Cybercrime, or computer crime, is crime that involves a computer and a network
• It has 12 sections (chapters) and 80 clauses, the chapters describes the provisions
related to electronic records and digital signature, dispatch, receipt and
acknowledgement of electronic records, controller and certifying authority, digital •The computer may have been used in the commission of a crime, or it may be the
signature and certificates, functions, duties and rights of subscriber, electronic record target
and government use of digital signature, network service , information technology
appellate tribunal and offence relating to computer. •Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or
•Cyber law is connected to our day to day life and is the significant area of human mental harm, or loss, to the victim directly or indirectly, using modern
life. telecommunication networks such as Internet (Chat rooms, emails, notice boards and
groups) and mobile phones (SMS/MMS) is called Cyber crime.
•Cybercrime, also called computer crime, is any illegal activity that involves a
computer or network-connected device, such as a mobile phone.
• According to Cyber Law in Nepal if an individual is found in such cyber crime like
hacking the intellectual property of others he or she will be punished for minimum 6
months to 3 years in prison and has to pay minimum 50 thousand to max 3 lakhs.
https://bit-papers.blogspot.com/ 48 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Cyber Law Cyber Law
Type of Cyber Crime Cyber terrorism
Computer crime encompasses a broad range of activities.
•Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of
deliberate, large-scale disruption of computer networks, especially of personal
•Fraud and financial crimes computers attached to the Internet, by the means of tools such as computer viruses.
•Altering in an unauthorized way. This requires little technical expertise and is •Simple-Unstructured: The capability to conduct basic hacks against individual
common form of theft by employees altering the data before entry or entering false
data, or by entering unauthorized instructions or using unauthorized processes; systems using tools created by someone else. The organization possesses little target
analysis, command and control, or learning capability.
•Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions. This is difficult to detect; Advanced-Structured: The capability to conduct more sophisticated attacks against
multiple systems or networks and possibly, to modify or create basic hacking tools.
•Altering or deleting stored data; The organization possesses an elementary target analysis, command and control, and
learning capability.
•Other forms of fraud may be facilitated using computer systems, including bank
fraud, carding, identity theft, extortion, and theft of classified information.
Complex-Coordinated: The capability for a coordinated attack capable of causing
•A variety of internet scams, many based on phishing and social engineering, target mass-disruption against integrated, heterogeneous defenses (including cryptography).
consumers and businesses. Ability to create sophisticated hacking tools. Highly capable target analysis, command
and control, and organization learning capability.
https://bit-papers.blogspot.com/ 49 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Cyber Law Cyber Law
Cyberextortion Computer as a target
•These crimes are committed by a selected group of criminals.
•Cyberextortion occurs when a website, e-mail server, or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. •Unlike crimes using the computer as a tool, these crimes require the technical
knowledge of the perpetrators.
•These hackers demand money in return for promising to stop the attacks and
to offer "protection". • These crimes are relatively new, having been in existence for only as long as
computers have—which explains how unprepared society and the world in general is
• According to the Federal Bureau of Investigation, cyberextortionists are towards combating these crimes.
increasingly attacking corporate websites and networks, crippling their ability
to operate and demanding payments to restore their service.
•There are numerous crimes of this nature committed daily on the internet:
•More than 20 cases are reported each month to the FBI and many go
unreported in order to keep the victim's name out of the public domain. •Crimes that primarily target computer networks or devices include:
Computer viruses
•Perpetrators typically use a distributed denial-of-service attack. Denial-of-service attacks
An example of cyberextortion was the attack on Sony Pictures of 2014 Malware (malicious code)
Music, videos and Use the internet to learn Don’t use the internet to
copyright about music, video and download or share
games. copyrighted material.
For Parents Encourage your children to use Don't leave your children
the Internet. The Internet has a unsupervised. Make sure you
lot good things to offer know what sites your children
children. visit when they're on the
internet, and with whom
they're communicating. Look
over their shoulder. Keep track
of the websites they visit.
https://bit-papers.blogspot.com/ 51 ©17171R
$sagarMalla CITE 2016 Batch 19171R
Cyber Law
Rules of Cyber
•Don’t be a bully on the Internet. Do not call people names, lie about them, send
embarrassing pictures of them, or do anything else to try to hurt them.
•Do not copy information from the Internet and claim it as yours. That is called
plagiarism.
•Do not attempt to infect or in any way try to make someone else’s computer unusable.
https://bit-papers.blogspot.com/ 52 ©17171R