Professional Documents
Culture Documents
Structure of MIS
Its structure may be understood by looking at the physical components of the IS in an
organization. The physical components of an organizational IS may be hardware, software,
database, manual procedures and operating persons. A brief description of the components is
as follows:
1. Hardware: Refers to the physical data processing equipment and peripheral devices.
2. Software: Is a broad term given to the instructions or programs that direct the operating
of the hardware. The types of software include; system and application.
3. Database: Consists of all data utilized by application software. Data is stored in files.
4. Procedure: Formal operating procedures which are required to operate a system such as
manuals are also regarded as physical elements.
5. Operating Personnel: Personnel like computer operators, computer programmers,
system analysts and system managers.
6. Input and Output: Various physical inputs and outputs from the IS existing in forms like
printout, reports.
Classification of DSS
1. Text Oriented DSS.
2. Database Oriented DSS.
3. Spreadsheet Oriented DSS.
4. Solver Oriented DSS.
5. Rules Oriented DSS.
6. Compound DSS.
Types of DSS
1. Status Inquiry System.
2. Data Analysis System.
3. Information Analysis System.
4. Accounting System.
5. Model Based System.
Knowledge Management System (KMS)
It comprises a range of practices used in an organization to identify, create, represent,
distribute and enable adoption to insight and experience.
Purpose of KMS
1. Improved performance
2. Competitive advantage
3. Continuous improvement
4. Integration
5. Sharing of knowledge
Stage Model of IS planning
1. Strategic planning;
a. Derivation from the organizational plan.
b. Strategic fit with organizational culture.
c. Strategy set transformation.
2. Information requirement analysis;
a. Define underlying organizational requirements.
b. Develop sub-system matrix.
c. Define and evaluate information requirements.
3. Resource allocation;
a. Return on investment.
b. Charge out.
c. Steering committees
4. Project planning;
a. Milestones
b. Critical path method
Types of MIS
1. Top-down Approach
2. Bottom-Up Approach
3. Integrative Approach
Joint Application Development (JAD)
Is a new technique developed by IBM which brings owners, users, analysts, designers and
builders to define and design the system using organized and intensive workshops.
Advantages of JAD
1. Saves time and cost by replacing months of traditional interviews and follow-up
meetings.
2. It’s useful in organizational culture which supports joint problem solving.
3. Fosters formal relationships among multiple levels of employees.
4. It can lead to development of design creatively.
Feasibility Study
Can be considered as preliminary investigation that helps the management to take decisions
about whether study of system should be feasible for development or not.
1. It identifies the possibility of improving on existing system, developing a new system.
2. Used to obtain outline of problem and decide whether feasibility.
3. The main objective of a feasibility study is to acquire problem scope instead of solving
the problem.
Steps involved in Feasibility
1. Form a project team and appoint a project leader.
2. Develop system flowcharts.
3. Identify the deficiencies of current system and set goals.
4. Enumerate the alternative solutions or potential candidate system to meet goals.
5. Determine the feasibility of each alternative such as technical feasibility.
6. Weight the performance and cost effectiveness of each candidate system.
7. Rank the other alternatives and select the best candidate system.
8. Prepare a system proposal of final project directive to management for approval.
Types of Feasibility
1.Economic Feasibility
a. It’s evaluating effectiveness of candidate system by using cost method.
b. It demonstrates the net benefit from the candidate system in terms of benefits
and costs to organizations.
c. Main aim of Economic Feasibility Analysis is to estimate the economic
requirements of candidate system before investment funds.
2.Technical Feasibility
a. It investigates technical feasibility of each implementation alternative.
b. It analyses and determines whether the solution can be supported by existing
technology.
3.Operational Feasibility
a. Determines whether system is operating effectively once it is developed and
implemented.
b. It ensures that the management should support the proposed system.
4.Behavioral Feasibility
a. Evaluates and estimates the user attitude.
b. Helps determining if the system requires special effort to educate, retain and
changes in employees job status.
5.Schedule Feasibility
a. It ensures that the project should be completed within given time.
b. It also verifies and validate whether the deadlines of project are reasonable or
not.
Systems Design
The objective of system design is to produce the design specifications for the system
that will satisfy the requirements defined during the systems. The design process is
usually broken down into two parts;
1.Logic design- produces the general specification of the resources that will make up the
system.
2.Physical design- produces a complete, detailed specification of the named program
components, called modules, which are to be programmed and of the databases to
be maintained by the system.
The following system aspects have to be determined and described in the appropriate
documentation during the system design:
1. Hardware and system software platforms for the application.
2. Programs that will constitute the application and the modules that will make up the
program.
3. Specification of individual software modules.
4. Design of the database.
5. Design of user interfaces.
6. Procedures for system use.
The structured system is based on two basic principles:
1. Modular structure- programs must be constructed of modules. A module is a named
program routine that is handled as a unit which is evoked by their names during
program execution. Its characteristics include;
a. A module ought to perform completely a well-defined function in the overall
system.
b. A module should be short enough so that its logic is relatively easy to understand.
2. Hierarchical design- program modules are identified top-down; thus, a hierarchical
program structure emerges. Characteristics include;
a. Start with the single top module that provides the overall control.
b. Break down its function into lower-level functions and so identify the modules it
must call.
Programming
At this stage its development, the system is coded, tested and debugged in a process called
programming. Programming is writing instructions for computer execution and testing the
written code to ensure that it performs according to specifications. Programming tasks
includes;
a. Coding the software module specifications produced during the system design into
statements in a programming language.
b. Testing at several levels, beginning with testing individual modules as they are
programmed and culminating.
Debugging- problems discovered during testing are tracked down to their source in the code
and removed.
To ensure quality of the product, the discipline of structured programming is essential. Coding
the program by relying on a small number of simple programming structure for organizing its
logic.
Software project teams
Most software projects, in both development and maintenance, are carried out by teams.
Teams composition varies depending on the development phase. It is generally recognized that
teams should be small since the development of a complex product such as an information
system calls for intense communication among team members.
Two organizational structures for a team, representing opposite extremes are the;
1. Chief programmer team:
a.Is built around an outstanding software developer, the chief programmer, who
personally defines the requirements specifications and design for the system.
b.The chief programmer team is more applicable to large project involving a known set
of technologies.
2. Democratic team:
a.All the team members bear equal responsibility for the project and the relationships
between them are informal.
b.The democratic teams lends itself better when new technologies are applied in
smaller, exploratory projects.
Cyber Crime
It refers broadly to any criminal activities that pertains to or is committed through the use of
the internet. A wide variety of conduct fits within this capacious definition.
Hacking; simply put, hacking is the permission of an intruder. Hackers are basically computer
programmers, who have advanced knowledge about computers and usually misuse this
knowledge for wrong reasons.
Virus diffusion; viruses are computer programs that attach themselves to systems or files and
infect them, and tend to spread to other computers on the network. They disrupt computer
operations and affect stored data either by modification or deletion altogether.
Logic bomb; a logic bomb, also known as a ” slag code” is a piece of malicious code that is
intentionally inserted into software to perform malicious actions when triggered by a specific
event. It is not a virus.
Phishing; this is a technique to extract confidential information, such as credit card numbers
and username passwords, under the guise of a legitimate enterprise.
Email Spamming and Bombing; Email bombing is characterized by a victim’s email account or
mail server crashing as a result of a large number of emails being sent to the target address by a
prohibited user.
Web Jacking; here, the hacker fraudulently takes control of the website. It may change the
content of the original site or redirect its controlled user to another fake similar page.
Cyber Stalking; is a new form of internet crime in our society when a person is being pursued or
followed online.
Data Diddling; data dissection is the process of unauthorized exchange of data before or during
access to a computer and back after the process is complete.