Professional Documents
Culture Documents
Biniyam Yibarek MIS Assignment 2
Biniyam Yibarek MIS Assignment 2
Ciro, Ethiopia
October, 2022
ACKNOWLEDGMENT
ABSTRACT
The main purpose of this paper is to prepare and present portfolio on Strategic
roles of Information System (IS) and Management Information System (MIS)
Chapters on different topics. the portfolio prepared in this paper organized by
defining the terminology and explaining with brief note on each topics.
The new information system should identify the factors that drive the customers to prefer their
competitors’ services and create a method that shift their attention and demands to purchase their
supplies. Information system assists the organization both in the decision-making and in solving
managerial problem. For example, a management information system (MIS) would enable the
entire management hierarchy to decide on the best methods on how they should relate and
improves their business operations with an objective of outshining their competitors in the market
share (McLeod 2009).
An organization with an information system makes the institution attain a competitive advantage
in the sense that it reduces on the cost production and that of operations. The organization would
have the opportunity and mechanisms to differentiate their goods from those supplied by the
competitors. An information system comes along with a high level of innovation making the
organization to major mostly on a selected segment of the market share. This system should
encompass the features that would enable the organization to engage in e-commerce hence
providing more and reliable approaches for competitive business (McLeod 2009).
On the contra to the positive impacts, it brings to the organization the system also disadvantages
the human labor. The human work force gets eliminated by implementation of the system because
most of the activities would be conducted using simplified mechanism. Most of the new system,
require s for trained personnel meaning that it is more costly during it installation and absorption
into the management. The data and information offered by the system may not be timely all time
thus making unnecessary inconvenience (Sarngadharan, 2010).
Most common ethical problems are as a result of the failure of the information system. That the
information system may mislead the entire management leading them to reach an agreement on a
decision based on unreliable facts. For instance, the management may decide to invest in a certain
business expecting to earn more superiority than their competitor only to realize a loss. During the
organization endeavor to winner their competitors customers’ loyalty they should disregard
whether the customer is a business entity or an individual but instead should utilize on both types
of customer in order to ensure that the exhaustively takes over the market. This therefore gives it
the power the customers in the market (Ross, 2004).
The Management Information System does not only include the software
systems but the entire set of business operations and the required resources that are
used to gather information from the functional systems. The acquired information is
then presented in such a manner that is user friendly and at the required time so that
the managers can use it make correct actions for the business. The entire system is
set up in such a way so that the organization will achieve its aims and strategic goals
(Laundon 164).
The main function of the Management Information System is to aid the manager to
take correct actions and make right decisions. The primary function is to achieve the
organization’s goals and maximize profits. At the end of a financial period if the
target is not met, the manager and the entire group will review their past actions and
take correct measures in order to increase the sales and meet goals.
Before starting any MIS project, businesses must review the transactional systems,
the organization operations and the actual needs of management within the business.
Many managers believe that, for the project to be successful, all information from
all systems must be put together. Only the valuable data from different systems is
brought so as to help the managers manage even if it means ignoring most of the
information provided the ultimate goal of the organization is met (Laundon 246).
Unit Iv: Strategic roles of IS
Breaking Business Barriers
When starting a new business, or bringing a new product to market, there's no shortage
or factors that affect the odds of potential success. By understanding barriers to entry
and how they impact the competitive landscape, new firms can put themselves in a
stronger position to compete with existing firms in a given industry.
New entrants in a market will always have an uphill battle to climb especially in the case
of high start up costs. Fortunately, for many ecommerce businesses, the natural barriers
that often keep new entrants from seeing growth compared to their competition is not a
major factor.
In this section, we'll cover the basics of barrier to entry and explore how each of the
barriers to entry impact business success.
Barrier to entry is the high cost or other type of barrier that prevents a business startup
from entering a market and competing with other businesses. Barriers to entry are
frequently discussed in the context of economics and general market research.
Barriers to entry can include government regulations, the need for licenses, and having
to compete with a large corporation as a small business startup.
While there is no universally accepted list of barriers to entry, generally barriers to entry
fall under three categories.
Artificial barriers to entry; Artificial barriers to entry refers to barriers that are the
direct result of existing firms actions. Frequently this involves barriers centered around
pricing, brand, switching costs, and customer loyalty.
Natural barriers to entry; This includes barriers such as network effects, economics of
scale, and other natural barriers that are the direct results of a new entrants new position
in the market place.
Depending on the market, barriers to entry can include barriers in a mix of these three
category buckets. Barriers to entry are
Other firms who have already developed marketshare of a certain industry are almost
always at a signifiant advantage compared to new firms. New entrants face high start up
costs in addition to the challenges of growing their business. Existing firms on the other
hand, enjoy cost advantages and have already established market share.
Barriers to entry can have a negative effect on prices since the playing field is not level
and competition is restricted. It’s not really an ideal situation for anyone except the large
company that holds the monopoly.
However, barriers to entry are not always completely prohibitive. In fact, many business
startups encounter some sort of barrier to entry that they must overcome, whether that’s
initial investments, acquiring licenses, or obtaining a patent – it’s just part of doing
business.
Switching costs: This refers to one-time costs the buyer must incur for making
the switch to a different product. Your product may technically be the better solution,
but if the cost to switch is too high, customers will often remain with the solutions
existing firms provide.
Access to distribution channels: does one business control all of them, or are
they open? Shipping, logistics and more are a powerful barrier to entry, incumbent firms
use to their advantage.
Government policy: controls the government has placed on the market, such as
licensing requirements and other required documentation needed to start and grow a
business.
Some businesses want there to be high barriers to entry in their market because they
want to limit competition or hold on to their place at the top. Therefore, they will try to
maintain their competitive advantage any way they can, which can make entry even
more difficult for new businesses.
High start up costs, government regulations, and even predatory pricing are all
challenges new entrants will likely face over the course of growing their business. But
despite the disadvantages new companies may have, there's no shortage of stories of
incumbent firms finally being dethroned—a classic tale of "David vs Goliath" in the
world of business.
While BPI is an incremental setup that focuses on tinkering with the existing processes to
improve them, BPR looks at the broader picture. BPI doesn’t go against the grain. It
identifies the process bottlenecks and recommends changes in specific functionalities. The
process framework principally remains the same when BPI is in play. BPR, on the other
hand, rejects the existing rules and often takes an unconventional route to redo processes
from a high-level management perspective.
BPI is like upgrading the exhaust system on your project car. Business Process
Reengineering, BPR is about rethinking the entire way the exhaust is handled.
Five steps of business process reengineering (BPR)
To keep business process reengineering fair, transparent, and efficient, stakeholders need
to get a better understanding of the key steps involved in it. Although the process can differ
from one organization to another, these steps listed below succinctly summarize the process:
The telecom giant reviewed the situation and concluded that it needed drastic measures to
simplify things–a one-stop solution for all customer queries. It decided to merge the various
departments into one, let go of employees to minimize multiple handoffs and form a nerve
center of customer support to handle all issues.
A few months later, they set up a customer care center in Atlanta and started training their
repair clerks as ‘frontend technical experts’ to do the new, comprehensive job. The company
equipped the team with new software that allowed the support team to instantly access the
customer database and handle almost all kinds of requests.
Now, if a customer called for billing query, they could also have that erratic dial tone fixed or
have a new service request confirmed without having to call another number. While they
were still on the phone, they could also make use of the push-button phone menu to connect
directly with another department to make a query or input feedback about the call quality.
The redefined customer-contact process enabled the company to achieve new goals.
Put simply, quality improvement (QI) refers to methods to improve the production
process. It requires getting rid of or changing parts of the process that do not function
optimally.
In manufacturing, for example, the term nearly always refers to the production
process. However, management can target any part of a company or organization for
QI.
There are several different methods for quality improvement. They cover people-
based improvement, process improvement, and product improvement.
Quality improvement – common in healthcare
QI exists in all industries. However, we read about it more in the healthcare sector. If
you search ‘quality improvement’ in Google, you will notice that the first two pages
consist almost entirely of healthcare organizations.
In a 2007 BMJ article, Paul B Batalden and Frank Davidoff had the following
definition of quality improvement in healthcare:
There are several different quality improvement methods. Many people say it is
best to combine some of them.
Part of quality management
QI is part of quality management. It exists alongside quality control, quality assurance, and quality
planning. Below is an explanation of the four parts that make up quality management:
Quality control
Quality control or QC is a system in manufacturing for maintaining standards. Inspectors examine the
final product to make sure it meets standards and specifications. When the company provides a service,
the inspector checks the end results.
Quality assurance
Quality assurance or QA is a program for the systematic monitoring of different aspects of production.
We also use QA for projects and services. QC occurs after the finished product is completed, while QA
happens before.
Quality improvement
Quality improvement or QI focuses on improving the production process. However, the target could be
any part of an organization.
One vital ingredient in successful and sustained improvement is how changes are introduced and
implemented. “Taking a consistent approach is key,” says the Health Foundation.
The Health Foundation adds that it is important to adopt a combination of approaches to ensure
improvements. This is especially the case in healthcare.
Quality planning
Quality planning or QP refers to the process of identifying which quality standards to focus on and then
determine what to do.
According to MyPmps.net:
“Quality planning means planning how to fulfill process and product (deliverable) quality requirements.
Quality is the degree to which a set of inherent characteristics fulfill requirements.”
Because of the minimal overhead costs, virtual businesses are popular among startups
and small businesses that are run from home.
Example of virtual company
Fire Engine RED
Who says that team-building is impossible with distributed companies? Fire Engine RED, a
software provider in the education sector, proves otherwise. A virtual walking club and virtual
book club keep team members connected, while biweekly all-hands meetings, conducted via
conference call, ensure everyone is on the same page. “By not spending money on office
space,” Director of Communications Chuck Vadun explains, “we’re able to invest more in
serving our clients better.”
The company encourages employees to save also, as evidenced by the company’s “REDuce
Your Bills” event. “Our CEO put together a tip sheet,” Vadun explains, “then gave our team the
entire day off to call our cable providers, cell phone companies, insurance agents, and others to
get better deals.” Together, Fire Engine RED employees saved an extra 25,000 dollars each
year. It’s clear that this 100% virtual company has made cost-effectiveness part of its culture, to
the benefit of clients and team members alike.
It is more than designing web strategy as it uses internet as an opportunity to design business
strategy. It is like a map basically how and when to use internet to expand overall business and to
implement such strategies overall.
The elements included in internet strategy will be business strategy, web design strategy, search
engine optimization, website design and maintenance, website hosting and management .It
includes overall business strategy which can make internet to incorporate in overall business. It
includes all tactical aspects to improve customer relations, communication between employees
and customers, to gain competitive advantage and increase marketing efficiencies.
To improve sales there should be proper internet marketing strategies otherwise they will be of no
use. Internet strategy is designed by high skilled business professionals and web strategist. They
are hired to design internet strategy because they know latest online trends, businesses, users
experience and principles of technology. There is continuous need to made and implement
necessary changes in the internet strategies according to business maturity.
Example of Internet Strategy
Alibaba
In 2018, the net global spend on digital transformation was approximately $1 trillion.
This year, this number is expected to increase to more than double that.7
While AI has become an increasingly popular solution for businesses, many leaders
are still evaluating effective implementation methods for their organizations. One
successful example of this is Alibaba. The Chinese e-commerce giant is making
huge gains in AI thanks to the support, investment, and commitment of the Chinese
government. With hopes to build a $1 trillion AI industry by 2030, China is on a path
to overtake the United States as the world’s leader in technology.8
Alibaba’s application of AI and machine learning in its ‘smart’ warehouse was born
out of necessity. Having reported revenue of $31,147 million in September 2021 (an
increase of 29 percent year-on-year), the sheer volume of products it needs to move
makes it practically impossible for employees to keep up.9 This willingness to
commit to new technologies has allowed Alibaba to stay competitive by packaging
and shipping out more products, more efficiently.
Nonaka says that the knowledge-creating company “is as much about ideals as it is
about ideas.” He describes it as a company where the activity of knowledge
creation is nothing that is only limited to a small group of people (like the R&D
department). In the knowledge-creating company creating knowledge “is a way of
behaving, indeed a way of being, in which everyone is a knowledge worker […].”
When your work is more about using your mental rather than your physical
capacities you are either part of a knowledge-creating company or a company that
should be a knowledge-creating company. To understand how every company can
benefit from knowledge-creation we need to examine what knowledge is and the
different types of knowledge.
Types of Knowledge: Explicit and Tacit Knowledge
There are more than two types of knowledge but within knowledge management
you can break it down into explicit and tacit knowledge.
Everything that you can read (manuals, documents, how-to videos) is explicit
knowledge. It is accessible and can be easily transmitted to or shared with others
because it was codified. The opposite of explicit knowledge is tacit
knowledge. Tacit knowledge is hard to codify because it contains ideas,
experiences and skills. Thus, tacit knowledge is gained by observation and practice
rather than by reading. It is based on intuition and creativity rather than facts. All
knowledge is rooted in tacit knowledge and needs to be codified to become explicit
knowledge.
“Making personal knowledge available to others is the central activity of the
knowledge-creating company.”
Four Ways of Transferring Knowledge
Since we only consider two types of knowledge there are four ways of transferring
knowledge.
Socialization: From tacit to tacit
This is mostly happening when you work closely together with another person. One
person can learn from another person through observation, imitation and practice.
Example: When a junior developer works together with a senior developer he gets
to know how the senior developer uses different tools to solve certain problems.
Over time the junior developer recognizes patterns that he can adapt in his
workflow.
Combination: From explicit to explicit
This is a combination of existing knowledge into a new form.
Example: When you write a company newsletter you use information from different
places and combine it into a new, more digestible form.
Articulation: From tacit to explicit
This is the most difficult part of knowledge transfer. Tacit knowledge becomes
explicit when you codify it. Codifying knowledge happens when you write things
down (e.g. in a manual or wiki) or when creating a product.
Examples:
1.) A designer chooses colors because of his taste and experience (tacit knowledge)
but when creating a mobile app colors need to be codified into color codes (explicit
knowledge).
2.) A QA Tester who is testing a new mobile app discovers a bug. This bug needs to
be transferred into a bug report. That is, the QA Tester needs to describe the bug as
his observation during the test.
Internalization: From explicit to tacit
After transferring tacit knowledge into explicit knowledge, the explicit knowledge
can be shared throughout the organization. Others can consume and understand
(internalize) the knowledge. Afterwards, they can combine it with other explicit
knowledge, their own experiences and creativity (tacit knowledge). This is how they
create new tacit knowledge about a topic.
Redundancy—Good or Bad?
At first glance, redundancy might seem as something to avoid. When programming,
it is generally good practice to not duplicate code as fixes and improvements for one
instance of duplication might not reach the other. Whereas in a knowledge-creating
company redundancy is something to aim for in terms of knowledge distribution. It
is a state where everyone in the organization has the same knowledge.
“The fundamental principle of organizational design at the Japanese companies I
have studied is redundancy — the conscious overlapping of company information,
business activities, and managerial responsibilities.”
Since it is not possible that everybody has the same knowledge internalized they
should at least have access to all the explicit knowledge within an organization. This
will foster the internalization of that (explicit) knowledge which leads to new (tacit)
knowledge as described in the spiral of knowledge.
You can achieve redundancy through Socialization. This is why nowadays
companies are keen on topics like mentoring, collaboration, social gatherings,
strategic rotation of positions, and so on. Another way to achieve redundancy is free
access to company information. To achieve the latter you need to encourage the
articulation of knowledge and make sure that it can be shared and accessed by
everyone in your organization. This happens when you write down your processes
and company information and make it accessible to everyone.
Managers are responsible to challenge their teams to share their knowledge. They
can do so by asking questions like “What are we trying to learn?”, “What do we
need to know?”, “Where should we be going?”. Nevertheless, when it comes to
knowledge management everybody is responsible to create, codify and share their
knowledge as well as finding ways to do so.
What are the challenges posed by strategic information systems, and how
should they be addressed?
Strategic information systems often change the organization as well as its products, services, and
operating procedures, driving the organization into new behavioral patterns. Successfully using
information systems to achieve a competitive advantage is challenging and requires precise
coordination of technology, organizations, and management.
Classic strategic systems, such as American Airlines’s SABRE computerized reservation system,
Citibank’s ATM system, and FedEx’s package tracking system, benefited by being the first in their
industries. Then rival systems emerged. Amazon was an e-commerce leader but now faces
competition from eBay, Walmart, and Google. Information systems alone cannot provide an
enduring business advantage. Systems originally intended to be strategic frequently become tools
for survival, required by every firm to stay in business, or they may inhibit organizations from
making the strategic changes essential for future success.
Most businesses get it wrong: Information technology takes on a life of its own and does not serve
management and shareholder interests very well. Instead of businesspeople taking an active role in
shaping IT to the enterprise, they ignore it, claim not to understand IT, and tolerate failure in the IT
area as just a nuisance to work around. Such firms pay a hefty price in poor performance.
Successful firms and managers understand what IT can do and how it works, take an active role in
shaping its use, and measure its impact on revenues and profits.
Management Checklist: Performing a Strategic Systems Analysis
To align IT with the business and use information systems effectively for competitive advantage,
managers need to perform a strategic systems analysis. To identify the types of systems that provide
a strategic advantage to their firms, managers should ask the following questions:
2. What are the business, firm, and industry value chains for this particular firm?
How is the company creating value for the customer-through lower prices
and transaction costs or higher quality? Are there any places in the value
chain where the business could create more value for the customer and
additional profit for the company?
Does the firm understand and manage its business processes using the best
practices available? Is it taking maximum advantage of supply chain
management, customer relationship management, and enterprise systems?
Does the firm leverage its core competencies?
Is the industry supply chain and customer base changing in ways that
benefit or harm the firm?
Can the firm benefit from strategic partnerships, value webs, ecosystems, or
platforms?
Where in the value chain will information systems provide the greatest
value to the firm?
Such changes often entail blurring of organizational boundaries, both external and internal.
Suppliers and customers must become intimately linked and may share each other’s responsibilities.
Managers will need to devise new business processes for coordinating their firms’ activities with
those of customers, suppliers, and other organizations. The organizational change requirements
surrounding new information systems are so important that they merit attention throughout this text.
For example, enterprise resource planning supports the entire sales process that includes pre-sales
activities, sales orders, inventory sourcing, deliveries, billing and customer payments. Enterprise
resource planning, supply chain management and customer relationship management systems are
each examples of enterprise systems.
Other attributes of the CRM system include integration with other systems and accessibility via
mobile devices, allowing employees to update and compare data and to access information from
any client site or other location. Equally importantly, CRM supports mass e-mail communications
and automates the sales process workflow to improve employee productivity.
Supply Chain Management
A supply chain is the collection of people, tasks, equipment, data and other resources required to
produce and move products from a vendor to a customer. Supply chain management refers to the
management of supply chain activities in an effective and efficient way to provide a company
with a strategic advantage.
These activities may include product development, material sourcing, production and logistics as
well as the information systems that coordinate these activities. Information flows allow supply
chain partners to coordinate their strategic and operational plans as well as the day-to-day flow of
goods and materials through the supply chain. The physical flows include the manufacture,
transport and storage of goods or materials.
Web-based or Client-Server?
If you have decided that an enterprise-wide system is appropriate, the next question
to consider is whether it should be web-based or client-server. With systems that are
deployed via a Web browser, there is little or no software that needs to be installed or
updated on each user's computer. This characteristic is understandably attractive to
many IT departments! If a web-based system can deliver the desired functionality,
usability and performance then it may be preferred over a client-server approach,
which requires software to be installed and updated for each user.
The technology available for developing web-based systems has been improving and
continues to improve all the time. However, for many types of tasks, users continue
to expect a higher level of usability and performance than can currently be achieved
in a web-based interface. In those cases, your organization will need to carefully
weigh the advantages and disadvantages of the relative convenience of the web-based
system versus the superior performance and usability of the client-server option… or
consider a terminal server approach, as described next.
Consider a Terminal Server Approach
If you have decided that your organization does not want to install a client
application on each individual user's computer but you would prefer the usability and
performance of a client-server solution, then you may consider some sort of terminal
server implementation (such as Microsoft's Terminal Services® or Citrix®) as a
viable alternative to a truly web-based system. With this approach, the application
software will be installed on one or more server computers but the individual users
will employ a "thin client" to remotely connect to the server and operate the software
on the server, instead of on the user's own computer (depending on the
implementation, this could be a Web browser or a small utility such as Microsoft's
Remote Desktop®). With this type of implementation, the application software needs
to be updated on the server computer(s) only but each individual user enjoys the full
functionality, usability and performance of a Windows-based graphical user interface.
There is some IT setup required, of course, but it is comparable to (or even less than)
the effort required to host and support a web-based system.
IBM was one of the first companies to use the term e-business in October 1997, when
it launched a thematic campaign to address the confusion many consumers had about
internet-based businesses. The company spent approximately $500 million on an
advertising and marketing campaign to show the value of the e-business model and to
demonstrate that IBM had the "talent, the services and the products to help customers
capture the benefits of this new way of doing business," according to the company's
website. By 2000, IBM's e-business revenue had grown to more than $88 billion
from $64 billion in 1994, and net income had nearly tripled.
Examples of e-business
Amazon, the world's largest online retailer and marketplace, has used its e-
business model to disrupt and expand into numerous well-established industries,
including publishing and supermarkets.
Uber and Lyft, both of which built businesses that match drivers with people
needing rides, disrupted the taxi and livery services industries. And in 2014, Uber
went one step further and expanded its e-business with the launch of a food
ordering and delivery platform, Uber Eats.
Travel sites like Expedia, Travelocity and TripAdvisor enable consumers to
research, plan and book all or pieces of their trips based on personalized criteria,
such as price, consumer ratings and location.
Schindler Group, a multinational elevator and escalator company founded in
1874, is a legacy company that incorporated e-business by using IoT and other
technologies to add internet and mobility services to its product offerings.
Advantages of e-business
Electronic invoicing, automated billing and digital payment systems lower the
amount of time workers devote to these tasks, many of which were handled manually
just a few decades ago. That kind of time savings allows businesses to decrease
department head count or shift workers onto higher-value tasks. Digital systems also
streamline workflows, reducing the time between invoicing and payment and
improving cash flow for the business.
Digital systems that power e-business can also extend an organization's reach beyond
its brick-and-mortar walls. Cloud-based business applications enable remote and
hybrid workers to perform their jobs in the office, from their home and other
locations. Similarly, cloud-based apps and the internet allow business transactions
24/7 so even solo practitioners and small businesses can conduct business globally.
Advanced technologies like big data, AI, machine learning, the cloud, automation
and IoT have improved the ease, speed and effectiveness of numerous e-business
tasks. These tasks include archiving information, deriving data insights, recording
financial transactions and personalizing interactions with customers.
Different states have stringent regulatory measures that organizations must apply and
comply with. If not, an organization risks harsh penalties and fines. Using an EMS
enables you to keep quality records that you may use in the future whenever a regulatory
body wants to prove the performance of your business. This could be information about
your company’s assets, inventory management, and properties. EMS collects data
automatically, thus, enabling you to meet regulatory requirements for inventory and
asset management.
Improved Coordination
Teams need to remain coordinated to have a seamless experience when managing tasks.
Since EMS contains data, teams can quickly access the data and share it within different
departments in real-time. This minimizes communication delays or breakdowns, thus,
promoting coordination whether the teams work remotely or not.
From the above information, it is clear that investing in enterprise systems can help you
achieve your goals in real-time. You will experience a regular flow of operations which
elevates efficiency and productivity.
Prior to upgrading to full-featured ERP, the North Carolina-based business tracked its
inventory in a spreadsheet and its financial data in desktop accounting software, Sage
Live. When the company began doubling sales year-over-year, leadership felt its
current processes weren’t keeping up. Spreadsheets couldn’t account for changing
inventory costs, and the accounting software didn’t have the workflows necessary to
record the cost of goods sold (COGS), an important financial metric.
As a result, the Fulton & Roark team did double data entry — manually.
Stop working with external accountants, growing both unit and dollar volumes
significantly with no extra headcount.
Increase sales roughly 50% year-over-year without increasing headcount.
Get a more accurate picture of margins and inventory, which helped grow its
ecommerce operation.
Key Takeaways
ERP implementations don’t have to drag on — Fulton & Roark’s team was up and
working in about 20 days.
The company’s story also emphasizes a major success factor: Getting management
committed to an ERP project. In this case, the co-founders initiated the project, which
consultants say often spurs employee adoption.
IRM provides an integrated view for managing the entire life-cycle of information,
from generation, to dissemination, to archiving and/or destruction, for maximising
the overall usefulness of information, and improving service delivery and program
management. IRM views information and Information Technology as an integrating
factor in the organisation, that is, the various organisational positions that manage
information are coordinated and work together toward common ends. Further, IRM
looks for ways in which the management of information and the management of
Information Technology are interrelated, and fosters that interrelationship and
organisational integration. IRM includes the management of
(1) the broad range of information resources, e.g., printed materials, electronic
information, and microforms,
(2) the various technologies and equipment that manipulate these resources, and
(3) the people who generate, organise, and disseminate those resources. Overall the
intent of IRM is to increase the usefulness of government information both to the
government and to the public.[3]
• Planning
• Organizing
• Monitoring
• Evaluating
• Implementing and
• Staffing with the end goal of strategically moving their company forward.
While the Delphi method is qualitative, many quantitative methods that are very
mathematical in nature exist.
Forecasting methods as a whole can be categorized as extrapolative or normative the
former relying on present data and the latter historical precedent.
Related reading: IT Outsourcing: A Complete Guide To Outsourcing Software
Engineers
3. Technology Roadmap
Technology road-mapping concerns itself with mapping the different ways in which
technology can be used.
This concept puts planning at the center of technology management. Both technology
strategy and technology road-mapping can play a role in technology road-mapping.
For instance, a company whose technology strategy is to build upon existing
technology will need to start mapping short and/or long-term goals for such technology.
Technology roadmap will be necessary for identifying the distinct technologies that can
be of use.
What companies map will vary widely depending on market needs.
Roadmapping is primarily applied in the case of new product development,
particularly the fuzzy front-end of development – an epithet reserved for the
conceptualization stage of new technologies.
4. Technology Project Portfolio
A technology project portfolio encompasses all the technology projects that a business
has in development along with all the technologies currently in use.
Besides merely starting a portfolio, your business needs to analyze and consider its
outcomes.
Technology management’s function in building a portfolio includes recognizing its
strengths and weaknesses, figuring out what takes priority, and designating resources
amongst other functions.
Businesses use technology project portfolios to invest smartly and capitalize on returns.
• Marketing
• Cloud computing
• Global outreach
• Security and
• Mobile management.
These can easily be interpreted as benefits themselves. However, the true advantages of
technology management extend even beyond that.
Product Development
Many of the key concepts of technology management contribute directly to product
development. At the front-end of development is where ideas are formed.
New product development (NPD) comes in five stages:
• Idea generation
• Screening
• Concept development
• Product development
• Rollout
Idea generation results in a batch of interesting project proposals for your company.
Technology road-mapping begins to happen at this point.
Following that, screening takes previous knowledge and relevant research related to
these ideas into account. Seeking opinions from consumers and business associates
alike, technology forecasting proves to be critical to successful screening.
Concept development begins with a SWOT analysis, pinpointing strengths, weaknesses,
opportunities, and threats, in regards to the new product.
This operation is aligned with technology project portfolios, and endeavors to have an
understanding of potential profits and losses.
Product development and rollout are unambiguous stages of NPD. Your businesses’
own expertise where NPD is concerned will be a determining factor of how durable
your product is in an ever-changing market.
All the same, technology has the capacity for effective advertising as well.
Ease of Manufacturing
The United States manufacturing industry is estimated to be worth up to $530
billion by the year 2025. Technology management should take the credit for this
infamy.
Cost-effective emerging technologies like computer numerical control (CNC) and
additive manufacturing are leveling the playing field for small and medium-sized
businesses.
For context, CNC machines automate tools using software while additive
manufacturing is the equivalent of 3D printing.
Collaborative robots, dubbed cobots, are also dramatically changing how
manufacturing looks like, working next to humans in factory spaces.
Some factories are exclusively dependent on technology. Lights-out factories, for
instance, are entirely comprised of self-regulated robots. One company in Japan has
been operating in this fashion since 2001.
Augmented Functionality
Technology management can give businesses cloud conveniences to optimize speed
and efficiency.
Communications platform as a service (CPaaS), as an illustration, will ease the
exchange of information for both customers and coworkers.
Comparatively, a variety of industries can use software as a service (SaaS) to manage
important functions without the necessity of having a team of software developers.
The overt popularity of Google Apps in business affairs, for one, should come as no
surprise.
Market Expansion
Technology management has a hand in observing markets; building products based on
those observations; marketing those products worldwide; and of course, shipping those
products globally.
The Internet has unquestionably expanded the market for an abundance of businesses.
On the consumer side, the Internet’s reach has affected more than only young people.
People have found and developed interests based solely on the World Wide Web.
Strategic Information Systems Planning (SISP)
Meaning and Importance
The concept of CSFs (also known as Key Results Areas or KRAs) was first developed
by management consultant D. Ronald Daniel, in his article, "Management Information
Crisis." [1]
John F. Rockart, of MIT's Sloan School of Management, built on and popularized the
concept almost two decades later. He defined CSFs as: "The limited number of areas in
which results, if they are satisfactory, will ensure successful competitive performance
for the organization. They are the few key areas where things must go right for the
business to flourish. If results in these areas are not adequate, the organization's efforts
for the period will be less than desired."
Rockart also concluded that CSFs are "areas of activity that should receive constant and
careful attention from management." [2]
1. Industry factors result from the specific characteristics of your industry. These
are the things that you must do to remain competitive within your market. For
example, a tech start-up might identify innovation as a CSF.
2. Environmental factors result from macro-environmental influences on your
organization. For example, the business climate, the economy, your competitors, and
technological advancements. A PEST Analysis can help you to understand your
environmental factors better.
3. Strategic factors result from your organization's specific competitive strategy.
They might include the way your organization chooses to position and market itself.
For example, whether it's a high-volume, low-cost producer; or a low-volume, high-
cost one.
4. Temporal factors result from your organization's internal changes and
development, and are usually short-lived. Specific barriers, challenges and influences
will determine these CSFs. For example, a rapidly expanding business might have a
CSF of increasing its international sales.
Critical success factors are derived from your organization's mission and objectives.
They set out what you need to do to be successful and tend to be universal across
organizations. For example, they might include things like:
Increasing profits.
KPIs provide the data that enable a business to decide whether CSFs have been met, and
if goals have been achieved. KPIs can also be used at different levels of a business –
they can be used to clarify strategic, business-wide targets, or even to drill down into
team and personal objectives.
KPIs are typically more detailed and quantitative than CSFs. For example, the CSF
"Increase sales in Asian markets" could generate the KPI "Increase sales revenue in
Asian markets by 12 percent year-on-year."
Five Steps to Identify and Develop Your CSFs
To identify and develop CSFs for your organization, follow these five steps:
As you work through each candidate CSF, you may see that some are linked or are
interdependent. For example, if have two CSFs – "to increase your share of the market"
and "to attract new customers," the latter would take priority, as it is only by attracting
new customers that you will likely increase your market share.
Prioritizing your candidate CSFs in this way will enable you to really focus in on the
areas that your business must succeed in. You may find that some candidate CSFs are
not a priority at all, in which you case you can cross them off your list.
Once you've done this, communicate your key CSFs to the relevant people. Make sure
that everyone is clear on what they are, why you need to achieve them and how you
hope to succeed. Get feedback from these key stakeholders, too – they are often best
placed to identify any roadblocks or issues that may need to be overcome to achieve
success. They may also be able to offer some great ideas of their own about how to meet
your CSFs.
One way to effectively monitor and measure your progress is by setting a number of
different KPIs against each of your Critical Success Factors. For example, if one of your
CSFs is to reduce your carbon emissions, you might create a KPI to fill in some detail,
such as "Reduce carbon emissions by 30 percent by 2035."
It's also a good idea to put in place monitoring systems to keep track of your progress.
This might mean assigning accountability for this task to a specific person or department.
This person will be responsible for gathering data and regularly monitoring the
organization's progress toward specific CSFs and KPIs.
So, you would need to think about how this person would gather data on your
organization's carbon emissions going forward, where they should store that data, and
how regularly they would need to update it.
Let's look at the example of a theoretical company, Freshest Farm Produce. Their
mission is "to become the No. 1 produce store in Main Street, by selling the highest
quality, freshest farm produce to our customers."
The company's strategic objectives are to:
Have enough space to house the range of products that customers want.
Using these objectives, Freshest Farm can begin to brainstorm some candidate CSFs,
as shown in the table below.
Keep the "farm to customer in 24 hours for Maintain and develop successful
75 percent of products" promise. relationships with local suppliers.
Extend store space to accommodate new Manage building work and any
products and customers. disruption to the business.
Once Fresh Farms has a list of its candidate CSFs, it can start to consider which ones are
the most essential to its success.
The first candidate CSF that Freshest Farm identifies from the list above is to attract new
customers. Without new customers, the store will be unable to increase its market share.
The second candidate is to maintain and develop relationships with local suppliers. This
is vital to ensure freshness and to source new products.
And the third candidate is to secure financing for expansion. The store cannot meet its
objectives without the funds to invest in expanding its store space.
The other factors, such as retaining and training staff, are important, but don't have the
same immediate and crucial impact, so they're not critical success factors.
The requirements for a company's information systems can only be integrated into a
plan when it is clear where the company wants to go and how it plans to get there.
A strategic plan lays out the company goals and the strategies it intends to
implement to achieve them. In small businesses, such strategies often focus on
financial goals and corresponding marketing plans. These business plans are the
initial input for the information systems plan and influence the types of systems that
the company will consider.
Corporate Processes
Once the overall orientation of the information system is clear from the strategic
plan, the business systems planning process has to look at what the company does.
If the company has manufacturing, the information system has to include
production planning. If it is service oriented, the software has to have hourly billing
and cost assignment features. The key corporate processes are a second step in
defining the requirements for the proposed information systems. Sometimes the
processes themselves require re-engineering to let them work with information
systems.
Corporate Data
A key question for the planning of information systems is the nature of the
company's data processing requirements. Large volumes of complex data need
different systems than flat, simple databases or mailing lists. A company's data is a
valuable asset and its nature can't easily be changed. As a result, the data has a
major influence on the kind of information systems that are required.
Constraints
1. The strategies, company processes and data represent the major inputs to the
planning of the information systems, but the systems themselves are subject to
constraints. The most important limitation, especially for small businesses, is the
cost. Other constraints may include technical, space, time and operational factors.
The information system planning process has to consider that the ideal system may
not be a realistic possibility, and alternatives must be situated within the constraints.
End-user Input
1. Once the planning process has established the overall concept and
requirements for the information systems, it is important to involve the end users in
the design for the interface. The people who carry out the work have the best
knowledge of what is required to do their job. Not supplying what is required is a
frequent planning failure, and getting end user input at this stage is vital to the
success of the business systems plan.
Implementation
The final step for an information system is to plan for implementation. At this stage
the plan becomes a project and the planners have to assign responsibilities and
resources, ensure that the project plan matches the strategic and business plans and
set completion, budget and performance targets. At this stage the business can
expect to have functioning information systems at the project completion date,
fulfilling the identified needs.
Understand the interactions between the part, manufacturing, quality, and cost.
Systematically produce accurate and consistent process plans.
Reduce the cost and lead time of process planning.
Skill requirements of process planners are reduced.
Increased productivity of process planner.
Easily interface with other application programs for further analysis.
Part description:
Manufacturing databases:
Decision trees.
Expert Systems: AI-based approaches.
2. Variant CAPP:
A process plan for a new part is created by recalling, identifying and retrieving the
existing plan for a similar part and making necessary modifications for the new part.
In this article, I am going to discuss Advantages and limitations of VARIANT CAPP
(VCAPP) in a detailed manner.
3. Retrieval CAPP:
People as part of the information system components can also be exploited using
social engineering techniques. The goal of social engineering is to gain the trust of
the users of the system.
Let’s now look at some of the threats that information system face and what can be
done to eliminate or minimize the damage if the threat were to materialize.
Computer viruses – these are malicious programs as described in the above section.
The threats posed by viruses can be eliminated or the impact minimized by using
Anti-Virus software and following laid down security best practices of an
organization.
If the company does not have enough resources to implement extra security like
Google, they can use other techniques. These techniques can include asking
questions to users during signup such as what town they grew up in, the name of their
first pet, etc. If the person provides accurate answers to these question, access is
granted into the system.
Data loss – if the data center caught fire or was flooded, the hardware with the data
can be damaged, and the data on it will be lost. As a standard security best practice,
most organizations keep backups of the data at remote places. The backups are made
periodically and are usually put in more than one remote area.
Biometric Identification – this is now becoming very common especially with mobile
devices such as smartphones. The phone can record the user fingerprint and use it for
authentication purposes. This makes it harder for attackers to gain unauthorized
access to the mobile device. Such technology can also be used to stop unauthorized
people from getting access to your devices.
In a nutshell, a code of ethics makes individuals acting on their free will responsible
and accountable for their actions. An example of a Code of Ethics for MIS
professionals can be found on the British Computer Society (BCS) website.
Processing Control
Input and processing data are so interrelated that we can take them as first line of
defense. Once data is fed into the computer, controls are embedded in various
computer programs to help, detect not only input errors but also processing errors.
Processing – controls are included to check arithmetic calculations and logical
operations. They are also used to ensure that data are not lost or do not go
unprocessed. Processing control is further divided into hardware and software control.
Output Control
These are developed to ensure that processed information is correct, complete and is
transmitted to authorized user in a timely manner. The output control are mostly of
same kind as input control e.g. Output documents and reports are thoroughly and
visually verified by computer personnel and they are properly logged and identified
with rout slips
Storage Control
Control responsibility of files of computer programs and databases is given to
librarian or database administrator. They are responsible for maintaining and
controlling access to the information. The databases and files are protected from
unauthorized users as accidental users. This can be achieved with the help of security
monitor. The method includes assigning the account code, password and other
identification codes. A list of authorized users is provided to computer system with
details such as type of information they are authorized to retrieve or receive from it.
Procedural Control
These methods provide maximum security to operation of the information
system. Standard procedures are developed and maintained manually and built in
software help display so that every one knows what to do. It promotes uniformity and
minimize the chance of error and fraud. It should be kept up-to-date so that correct
processing of each activity is made possible.
Types of cyber-crime
Identity theft
Once the information has been acquired by the cyber-criminal, it can be used to make
purchases online while impersonating himself to be someone else. One of the ways
that cyber-criminals use to obtain such personal details is phishing. Phishing
involves creating fake websites that look like legitimate business websites or
emails.
For example, an email that appears to come from YAHOO may ask the user to
confirm their personal details including contact numbers and email password. If the
user falls for the trick and updates the details and provides the password, the attacker
will have access to personal details and the email of the victim.
If the victim uses services such as PayPal, then the attacker can use the account to
make purchases online or transfer funds.
Other phishing techniques involve the use of fake Wi-Fi hotspots that look like
legitimate ones. This is common in public places such as restaurants and airports. If
an unsuspecting user logons into the network, then cyber-crimes may try to gain
access to sensitive information such as usernames, passwords, credit card numbers,
etc.
Copyright infringement
Piracy is one of the biggest problems with digital products. Websites such as the
pirate bay are used to distribute copyrighted materials such as audio, video, software,
etc. Copyright infringement refers to the unauthorized use of copyrighted materials.
Fast internet access and reducing costs of storage have also contributed to the growth
of copyright infringement crimes.
Click fraud
Advertising companies such as Google AdSense offer pay per click advertising
services. Click fraud occurs when a person clicks such a link with no intention of
knowing more about the click but to make more money. This can also be
accomplished by using automated software that makes the clicks.
An email is sent to the target victim that promises them a lot of money in favor of
helping them to claim their inheritance money.
In such cases, the criminal usually pretends to be a close relative of a very rich well-
known person who died. He/she claims to have inherited the wealth of the late rich
person and needs help to claim the inheritance. He/she will ask for financial
assistance and promise to reward later. If the victim sends the money to the scammer,
the scammer vanishes and the victim loses the money.
Hacking
Install programs that allow the attackers to spy on the user or control their
system remotely
Deface websites
Steal sensitive information. This can be done using techniques such
as SQL Injection, exploiting vulnerabilities in the database software to gain
access, social engineering techniques that trick users into submitting ids and
passwords, etc.
Computer virus
Viruses are unauthorized programs that can annoy users, steal sensitive data or be
used to control equipment that is controlled by computers.
Roughly speaking, data protection spans three broad categories, namely, traditional
data protection (such as backup and restore copies), data security, and data privacy as
shown in the Figure below. Ensuring the privacy of sensitive and personal data can
be considered an outcome of best practice in data protection and security with the
overall goal of achieving the continual availability and immutability of critical
business data.
Security becomes an important element in protecting the data from external and
internal threats but also when determining what digitally stored data can be shared
and with whom. In a practical sense, data privacy deals with aspects of the control
process around sharing data with third parties, how and where that data is stored, and
the specific regulations that apply to those processes.
Almost all countries in the world have introduced some form of legislation
concerning data privacy in response to the needs of a particular industry or section of
the population.
Data Sovereignty
Data sovereignty refers to digital data that is subject to the laws of the country in
which it is located.
The increasing adoption of cloud data services and a perceived lack of security has
led many countries to introduce new legislation that requires data to be kept within
the country in which the customer resides.
None of the most prevalent regulations (GDPR, CCPA, HIPAA etc) define precisely
what is meant by data privacy and it is left to businesses to determine what they
consider best practice in their own industry. The legislation often refers to what is
considered ‘reasonable’ which may differ between laws, along with the respective
fines.
In practice, this means that companies who work with sensitive and personal data
should consider exceeding the legal parameters to ensure that their data practices are
well above those outlined in the legislation.
References
Barca, V. and Chirchir, R. (2014) De-mystifying data and information
management concepts, Department for Foreign Affairs and Trade (DFAT): Canberra,
Australia.
Chirchir, R., and Kidd, S. (2011) Good Practice in the Development of
Management Information System for Social Protection: Pensions Watch, Briefing 5.
HelpAge International, London.
ISO. (2013). ISO/IEC 27001 - Information security management. [online]
Available at: http://www.iso.org/iso/home/standards/management-
standards/iso27001.htm [Accessed 31 May 2016].
Nonaka & Takeuchi Knowledge-Creating Company commentary by Lassi A.
Liikkanen, 2010
Ashby, W.R. (1956) An Introduction to cybernetics. Chapman& Hall
Buchenau, M., & Suri, J.F. (2000). Experience prototyping. Paper presented at
3rd conference on Designing interactive systems: processes, practices,
methods, and techniques, New York City, New York, United States.
March, J.G. & Simon, H. (1958) Organizations. John Wiley & Sons
Polanyi, M. (1958) Personal knowledge: towards a post‐critical philosophy.
University of Chicago Press
Polanyi, M. (1967) The Tacit dimension. University of Chicago press
Simon, H. (1945) Administrative behavior. Macmillan
Schön, D.A. (1983). The reflective practitioner : how professionals think in
action. Aldershot: Arena.
http.www.google.com internet website