Management of Information Systems
Management of Information Systems
Editorial Board
Dr. Deepali Bajaj, Dr. Kamal Kundra,
Ms. Urmil Bharti
Content Writers
Ms. Ritika Tehelramani, Ms. Asha Yadav,
Ms. Neha Gandhi, Ms. Monika, Ms. Tulika Kumari,
Ms. Renu Singh, Ms. Tina Sachdeva, Ms. Anshika Singh,
Ms. Seema, Ms. Shikha Singh
Academic Coordinator
Deekshant Awasthi
Published by:
Department of Distance and Continuing Education
Campus of Open Learning, School of Open Learning,
University of Delhi, Delhi-110007
Printed by:
School of Open Learning, University of Delhi
Disclaimer
MANAGEMENT OF INFORMATION SYSTEMS
Reviewer
Dr. Reema Thareja
Disclaimer
This Study Material is duly recommended in the meeting of Standing
Committee held on 08/05/2023 and approved in Academic Council meeting
held on 26/05/2023 Vide item no. 1014 and subsequently Executive Council
Meeting held on 09/06/2023 vide item no. 14 {14-1(14-1-11)}
Printed at: Taxmann Publications Pvt. Ltd., 21/35, West Punjabi Bagh,
New Delhi - 110026 (2900 Copies, 2025)
PAGE
Lesson 1: Introduction to Management Information System 1–20
Lesson 7: Structured System Analysis and System Development Life Cycle 154–186
Lesson 8: Enhancing Business Efficiency with ERP, CRM and SCM 187–214
Glossary 261–266
PAGE i
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
1
Introduction to
Management
Information System
Ritika Tehelramani
Assistant Professor
Shyama Prasad Mukherji College for Women
University of Delhi
Email-Id: [email protected]
STRUCTURE
1.1 Learning Objectives
1.2 Introduction
1.3 Role, Objectives, Characteristics and Dimensions of MIS
1.4 Limitations of MIS
1.5 Aspects of MIS
1.6 Summary
1.7 Answers to In-Text Questions
1.8 Self-Assessment Questions
1.9 References
1.10 Suggested Readings
PAGE 1
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
1.2 Introduction
Concepts: The word “MIS” comprises three basic elements that can be
broken down into the following categories:
Management: Includes the planning, directing, and supervising of
an organization’s operations. Top management oversees planning,
middle management is focused on controlling, and bottom manage-
ment oversees actual administration.
Information: In MIS, information is the processed data that aids
management in planning, controlling, and operational procedures. All
the information obtained from a business’s operations is referred to as
data. Recording, summarizing, comparing, and finally providing the
MIS report to management are all parts of the data processing process.
System: Data are transformed into information via a system. To give
the management reliable information so that it can do its obligations,
a system’s input variables include input data, preparation, output,
and responses or regulations.
Management Information System Definition
A management information system, or MIS, is a system that is intended
to collect, distribute, and store data in the form of information needed
to carry out management duties.
The MIS can be understood and defined in a variety of ways. Information
systems, decision systems, and computer-based information systems are
further names for it.
Examples of MIS definitions include:
1. A system that provides information help for organizational decision-
making is what the MIS is referred to be.
2. MIS is an integrated system of people and technology that offers data to
support management, operations, and decision-making within organizations.
2 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Strategic Information
Strategic information aids senior management in creating the internal
business strategies that must be implemented. Strategic information is
essential for organizational decision-making and typically utilized for
long-term planning. Consider, for instance, to plan for the adoption of
new technologies to boost production, an organization’s top management
needs strategic knowledge.
PAGE 3
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
4 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 5
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
1.3 Role, Objectives, Characteristics and Dimensions of
MIS
Role
The function of an organization’s MIS is comparable to its heart. MIS is
the heart, and information is the blood. Pure blood is delivered to every
part of the body, including the brain, via the heart. The heart pumps
more blood as quickly as needed. The brought-in impure blood is moni-
tored and managed, processed, and sent in the necessary quantity to the
location. It provides the human body with regular and emergency blood
supply needs.
The MIS does the same task for the company. The system ensures that
the correct information is acquired from various sources, created, and dis-
tributed to all locations that require it. The system must be able to satisfy
the information needs of one person, a group of people, and managerial
functionaries such as senior management and executives.
The MIS uses a variety of systems, including query systems, analytical
systems, modelling systems, and decision support systems, to address a
wide range of demands. Strategic planning, managerial control, opera-
tional control, and transaction processing are all made easier by the MIS.
6 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 7
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
8 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Characteristics Notes
PAGE 9
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
10 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
The ultimate flexibility in data storage and retrieval should be the Notes
goal.
It should provide well-organized and appropriate information for
tactical, operational, and all other levels of management.
Dimensions
Next, let’s examine the three crucial aspects of information systems:
Organizations
Information systems are essential to the operation of organisations. In fact,
some organisations, like credit reporting bureaus, would cease to exist
without an information system. People, structure, business procedures,
politics, and culture make up a company’s core elements.
Important Functions of Business
Functions Purpose
Marketing and Sales Promoting and selling the organizations produce
Production Manufacturing and producing the goods and
services
Human Resources Recruiting, retaining, and developing the or-
ganization’s workforce, as well as keeping
employee records
Accounts and Finance Managing the organization’s financial assets
and keeping accurate financial records
PAGE 11
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
12 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Yet, managers must do more than just oversee what is currently in place. Notes
In addition, they must re-create the organisation and develop new ser-
vices and goods. A sizeable chunk of managerial duties involve creative
labour motivated by fresh knowledge and information. By reorienting
and rebuilding an organisation, information technology has the power to
change it. In-depth discussions of managerial actions and decision-making
will be covered in later chapters.
It is important to keep in mind that managerial decisions and abilities
change depending on the stage a business is in. Top executives decide
which services and goods to manufacture in the long term. Plans and
initiatives from upper management are presented by middle managers. The
task of overseeing the company’s everyday operations falls to operational
managers. Leadership at all levels is expected to develop ground-breaking
approaches to a variety of problems. Different information needs and
technical requirements apply at each level of management.
Technology
Information technology is one of several tools used by managers to deal
with change. The physical components utilized for input, processing, and
output in an information system are referred to as hardware. A computer
processing system, various input, output, and storage systems, as well as
physical media to connect these devices, make up this system.
The precise, pre-programmed instructions that manage and coordinate
the hardware components of an information system are referred to as
computer software. Data is transferred between physical locations using
communications technology, which consists of both hardware and software
components. Computers and communications devices may share voice,
data, images, audio, and even video clips thanks to networks. A system
that connects multiple computers and allows them to share resources like
printers and information.
The Internet is the largest and most used network in the world. A global
network of both private and public channels makes up the Internet. More
than 200 countries’ worth of networks are connected by the Internet. In
the fields of research, education, government, and business, more than
800 million people utilize the Internet to communicate with one another
and transact business.
PAGE 13
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
IN-TEXT QUESTIONS
4. The MIS assists the__________ staff in processing transactions.
5. Making __________ with data is considered __________data.
6. Properly curated __________ should be able to gather, arrange,
manage and update raw data.
14 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 15
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes internal controls or operating procedures. The MIS will need to undergo
considerable adjustments because of significant business developments,
which will increase expenses and disrupt information reporting.
Flaws in Information: The goal of the MIS is to give management the
data they need to make wise business choices. The fact that a MIS gives
management inaccurate or insufficient information is its most critical
drawback. This problem costs the business time and money because it
requires a new evaluation of the MIS to fix the data problems.
Information economics, as well as information cost and quality, are un- Notes
doubtedly impacted by IT. Information technology can lower transaction
costs, or the fees incurred when a company buys something it can’t
produce itself, which helps businesses minimise their size.
According to the transaction cost theory, businesses and consumers prefer
to reduce transaction costs over production costs. The use of markets
is expensive (Coase, 1937; Williamson, 1985) because of a variety of
expenses, such as the cost of finding and contacting relevant sources,
monitoring compliance with standards, purchasing insurance, getting
product information, and so forth. In the past, businesses have sought to
reduce transaction costs by growing in size, hiring more personnel, and
acquiring their own suppliers and distributors.
Information technology, especially network utilisation, can help businesses
cut the price of market performance (transaction costs), making it more
profitable for businesses to hire external suppliers rather than internal ones.
By employing computer connectivity to external suppliers, the Chrysler
Corporation, for instance, can save money by sourcing more than 70%
of its parts from other businesses. Information systems allow businesses
like Cisco Systems and Dell Computer to outsource production to contract
manufacturers like Flextronics rather than producing their own goods.
Basic math must be used to calculate the information’s true value. The
genuine worth of the information must be subtracted from the cost in-
curred to obtain it.
Business Aspect
Determining the usefulness of information at different management levels
is aided by the business dimension of information. Top-level management’s
business dimension of information is entirely different from lower-level
management’s business dimension of information. The varying levels and
types of work performed at the various levels of management account
for the disparities in business dimensions.
Data Management in Business
Entrepreneurs must be aware of the main duties and responsibilities as
well as the overall business operations. The sales manager must react if
the president calls and inquires about the percentage rise in sales over
the last four years. You can get important information from management
PAGE 17
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes information systems regarding both the company and your department.
An excellent source of reference data for a bid or for regulatory purposes
is management information systems.
Making Business Decisions More Informed
The quality of a decision depends on the information it is based on. By
giving you information that is accurate, timely, relevant, and complete,
management information systems assist you in making better decisions.
IT specialists build management information systems with self-checking
and cross-checking tools to present a complete picture of a scenario or to
emphasise that some information is lacking in order to minimise errors.
All managers must use the same data set and base their judgements on
the same data, which is ensured through management information systems.
Technical Aspect
The technical aspect of information comprises its technological compo-
nents, such as the kind of database being utilised and the volume of data
that will be stored there. Information storage is aided by the database
type. The database’s storage capacity and the time it takes to retrieve
data are included in the technical dimension.
IN-TEXT QUESTIONS
7. In which regard the management is given information about?
8. What does business dimension of information determine?
1.6 Summary
Data that has been turned into a form that is meaningful to the
recipient and has actual or perceived value in present-day or upcoming
actions or decisions is referred to as information.
In order to manage the environment and activities of a corporate
organisation, information systems are often utilised to process data.
By increasing the effectiveness and fluidity of information flow, an
information system allows the business flexibility in implementing
new procedures and technologies.
The primary goal of MIS is to improve organisational management,
and to accomplish this, accurate and timely data regarding a number
18 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 19
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
1.9 References
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. Management information systems.
Bishop, A. (1993). The National Information Infrastructure: Policy
Trends and Issues. ERIC. Clearinghouse on Information and Technology.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
Post, G., & Anderson, D. (2006). Management information systems.
Boston, Mass.: McGraw-Hill/Irwin.
What Is MIS? Characteristics, Objectives, Role, Component. Retrieved
from https://www.geektonight.com/what-is-mis/
20 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
2
Business Processes and
Decision Making
Ritika Tehelramani
Assistant Professor
Shyama Prasad Mukherji College for Women
University of Delhi
Email-Id: [email protected]
STRUCTURE
2.1 Learning Objectives
2.2 Introduction
2.3 What are Business Processes?
2.4 Evolution of IT and Problem Solving
2.5 Factors Affecting the Cost and Value of the Information
2.6 Summary
2.7 Self-Assessment Questions
2.8 References
2.9 Suggested Readings
PAGE 21
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
2.2 Introduction
Most information systems up until the 1960s were used for straightforward
transaction processing, record keeping, accounting, and other electronic data
processing applications. Later, as the idea of management information sys-
tems emerged, a new position was established (MIS). By the 1970s, many
of the management’s needs for making decisions were not being sufficiently
met by the specialized information products that such MIS created. As a
result, the idea of a Decision Support System (DSS) was created. Several
new information system roles emerged in the 1980s. The phenomena of
end-user computing were first made possible by the quick microcomputer
processing power, application software packages, and telecommunication
networks, which are all being developed. Instead of relying on the indirect
support of corporate information services, end users can now support their
job requirements with their own computing resources.
Second, Executing Information Systems made an effort to provide top
executives with a simple method of obtaining critical information when
they needed it in the formats they preferred.
Third, a new role for information systems was created by the application
of Artificial Intelligence (AI) techniques to Expert Systems (ES), business
information systems, and other knowledge-based systems.
Last but not least, the 1990s saw a rapid expansion of the internet,
intranet, extranet, and other global networks that were interconnected.
Business information systems, E-business and e-commerce are intertwined
in a networked enterprise.
22 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 23
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes 1. People: Users/People are those who utilize the system to record
daily business transactions. The users have frequently educated
professionals like accountants and human resource managers. The
ICT department often houses the support staff who ensure the system
is operating properly.
2. Business Procedures: Business procedures are best practices that
have been established to guide users and every other component
in how to function efficiently. Business procedures are developed
by users, consultants, and other parties.
3. Data: These are the regular commercial dealings that were recorded.
Banks collect data through transactions like withdrawals and deposits.
4. Hardware: Hardware includes things like computers, printers,
networking gear, and other things. The hardware offers the capacity
to process data. Furthermore, networking and printing options are
available. The hardware accelerates the transformation of data into
information.
5. Software: Applications that are run on hardware are referred to as
software. The two basic categories of software are system software
and applications software. System software refers to the operating
system, such as Windows, Mac OS, and Ubuntu. Applications
software is specialized software used to run business operations,
including point-of-sale, banking, and payroll software.
Information System Types
There are two different categories in which information systems can be
categorized:
1. Operation Support System
2. Management Support System
Operation Support System
A system of information that gathers, processes, and stores data produced
by an organization’s operational systems and creates data and information
for input into management information systems or the administration of
operational systems. For both internal and external use, these systems
provide a variety of information products. Operation Support Systems play
several important roles in business organizations, including controlling
24 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 25
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
26 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
we call workflow. The use of computer and communication technology for Notes
administrative tasks is known as office automation. Office automation sys-
tems are intended to increase the productivity of managers at various levels
of management by providing secretarial support and improved communica-
tion facilities. Office automation systems are a combination of hardware,
software, and human resources in information systems that process office
transactions and assist administrative tasks at all organizational levels. Word
processing, electronic filing, email, message switching, data storage, voice
and data connection, and other support tools are included in these systems.
Business Expert System
A business expert system is a knowledge-based information system that
acts as an expert by applying its knowledge of a specific, difficult ap-
plication area. This is one of the knowledge-based information systems.
Managers can use an expert system to get advice from a subject-matter
expert. Expert systems are used in many different fields, such as medi-
cine, engineering, and business.
PAGE 27
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
28 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 29
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
30 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 31
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
32 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 33
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
ACTIVITY
1. Identify and state a real-world example of Simon’s Model of
Decision making.
2. Write a short note on Systems’ method of problem-solving.
34 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
They can support a wide range of styles, skills, and knowledge Notes
while also keeping track of numerous alternatives and consequences.
PAGE 35
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Systems Development Costs: These depend on the systems that are
in place, the level of integration that has been tried, the system’s
sophistication, and the calibre of the management and system staff.
Any major change from current practices will require further systems
analysis, synthesis, and instructional effort.
Installation and Change-over Costs: These types of costs depend
on the same elements that affect system development costs. They
cover expenses for running multiple processes simultaneously
and retraining any employees whose jobs have changed. The risk
of failure also entails expenses, such as the opportunity costs of
advantages lost or the costs of demoralizing employees and running
an ineffective system.
Recurrent Costs: These are the obvious ones, such as maintenance
of systems and programming, staff and stationery, and equipment.
The Value Aspect of Information
As we’ve seen, the value of information comes from the decisions made as
a result of it and how those decisions affect the system’s goals. The easiest
of these to investigate is timeliness, which results from the availability
of information and its accuracy, timeliness, and categorization. Additional
effects of information being presented more quickly are observed in a
variety of contexts; the value of this information gain depends on the
organizational structure and the sensitivity of the measure of effectiveness
to predictions of erratic and biased organizational improvement behavior.
The decision theory proposes methods for resolving decision-making
problems under conditions of certainty, risk, and uncertainty. A deci-
sion-making situation is certain when the decision-maker is fully aware of
the alternatives and their outcomes. When perfect information is available,
this is possible. As a result, the information is perceived to be valuable
in terms of decision-making. When additional information is received in
the case of a decision made under uncertainty or risk, the decision maker
feels more secure. If the information eliminates uncertainty or risk, it is
referred to as perfect information. Perfect information, on the other hand,
is a popular misconception.
The concept of information value is used in MIS to determine the benefit
of perfect information, and if the value is significantly high, the system
36 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
2.6 Summary
A business process is the method by which work is planned,
synchronized, and concentrated in order to produce a valuable good
or service.
New technology has the potential to alter the way information is
shared and accessed, allowing for the simultaneous completion of
several activities in place of sequential ones and the elimination of
decision-making delays.
There is major two information system types - Operation Support
System and Management Support System.
Management Information System subsystems include transaction
processing systems, management reporting systems, decision support
systems, office information systems, and business export systems.
With the aid of contemporary software programs like spreadsheets,
word processing, Database Management Systems (DBMS), etc.,
the direct usage of information bases developed the possibility for
“What-if” analysis.
The Systems Method of Problem Solving considers a broad problem,
including context. In an appropriate systems analysis, the problem
environment, including all stakeholders, is always taken into account.
According to Simon’s Decision Making Model, there are three main
stages of decision-making - Intelligence, Decision and Choice.
The new systems come with two different types of costs: non-recurring
(such as those for data processing equipment, analysis, basic design
and development, and programming time), and recurring (in staff
and equipment for running and normal developments).
PAGE 37
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
2.8 References
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. Management information systems.
Bishop, A. (1993). The National Information Infrastructure: Policy
Trends and Issues. ERIC. Clearing house on Information and
Technology.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
Post, G., & Anderson, D. (2006). Management information systems.
Boston, Mass.: McGraw Hill/Irwin.
What Is MIS? Characteristics, Objectives, Role, Component. Retrieved
from https://www.geektonight.com/what-is-mis/
38 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
2.9 Suggested Readings
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. Management information systems.
PAGE 39
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3
Information Systems:
An Overview
Asha Yadav
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
STRUCTURE
3.1 Learning Objectives
3.2 Introduction
3.3 Data vs Information
3.4 Information System
3.5 Approaches of IS Development
3.6 Constraints of IS
3.7 Advantages of IS
3.8 Disadvantages of IS
3.9 Role of IS in Business Development
3.10 Limitations of IS
3.11 Summary
3.12 Answers to In-Text Questions
3.13 Self-Assessment Questions
3.14 References
3.15 Suggested Readings
40 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3.2 Introduction
Every area of our lives is being affected by computers, including enter-
tainment, shopping, work, and even how we interact with friends and
family. Computers have become vital part of almost all organizations and
generate data daily. This data could be processed to obtain information
and used to learn crucial facts about the organisation. Information is now
understood to be a vital corporate resource that enables greater insights
of other key resources, including people, machines, resources, money,
and procedures. Relevant information must be available at the right time
and place, to fully exploit available resources and for decision making.
Information is live because it must constantly be updated and renewed.
Due to the exponential growth of information, it is necessary to collect,
store, and retrieve information in a variety of fields as needed.
For better management and rational decision-making, people have long
employed Information Systems (IS) as an established management tool.
IS is a software system that focuses on the administration of information
to deliver efficient, effective, and strategic decisions. IS is employed in
the academic study of businesses and has ties to various fields, including
informatics, e-commerce, and computer science.
“Information System is a system that collects, organises, handles,
and disseminates information pertinent to a company (or to a
community) in a way that makes it usable and accessible to
management, employees, customers, and citizens.”
Information System is an accumulation of two different terms as ex-
plained below:
Information: The term “information” refers to data that has been pro-
cessed or, more technically, data that can be transformed into a form
that is meaningful and helpful for a particular user. Any business that
PAGE 41
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes generates or captures data has the potential to have information retrieved
from it, which can aid in decision-making.
System: A set of components, activities, processes, and people that are
interconnected and work together towards a common objective by taking
input and generating output in the context of an organised transformation
process is called system.
Some examples of IS include Airline reservations, bank operations and
logistics management.
42 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 43
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
44 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
IN-TEXT QUESTIONS
1. __________ is the raw facts and figures with no meaning.
2. Can we make decisions by raw data? (True/False)
3. Student test score is __________ whereas average score of a
class refers to __________.
PAGE 45
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
46 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
PAGE 47
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Operational excellence
Customer and supplier relationship
New products, services, and business models
Competitive advantage
Improved decision making
Market Survival
48 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 49
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Information
Department Strategic Tactical Operational
Marketing Find new markets Analysing the Analysis of sales
Management and marketing ap- effects of adver- by region, customer
proaches. Exam- tising strategies. type, and salesper-
ining the tactics Interviews about son. Target versus
of competitors. consumer prefer- actual sales. Trends
Predictions on ences, relationship in market share,
technology, de- between prices and seasonal changes,
mographics, and sales. Targets for impact of model
product changes. the sales force’s modifications, per-
deployment. Look- formance of retail
ing for alternative locations, campaign
marketing ave- expenses and ben-
nues. efits.
Material Identifying suppli- D e f i n i n g m e t- List of received
Management ers for essential rics for vendor surplus and inad-
items Choosing performance and equate goods. List
the ideal invento- deciding on the of things that were
ry levels, calculat- best reorder levels. rejected. Import-
ing the amount of Balancing shop is- ant goods arrived.
material required, sues with standard transporting and
lowering the vari- requirements for inspecting stores
ety of stock. items. Managing Value of the current
expensive inven- inventory. Receiv-
tories, evaluat- ing, rejecting, and
ing the effects of issuing of goods.
new designs and
modifications to
procurement on
material costs.
50 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Information Notes
Department Strategic Tactical Operational
Finance Financing options, Credit and pay- Financial accounts
Management pricing principles, ment history, out- report, status of the
and tax preparation. standing payments budget to all func-
and invoices, and tional managers,
budget discrepan- tax returns, share
cies, price hikes transactions, a profit
and inflation, the and loss statement
effect of taxes on transfers and re-
pricing. ceipts, payroll, and
retirement accounts.
Human Long-term needs Evaluation of per- Routine inspection,
Resource for human resourc- formance, promo- Skill sets invento-
Management es at different lev- tion of production, ry, recoveries, and
els, guidelines on reduction of ab- advances, leave re-
personnel welfare senteeism, leave cord track.
and facilities, poli- and overtime rules,
cies on developing and regulations of
human resources personnel deploy-
and training. ment.
IN-TEXT QUESTIONS
6. Long term decisions are taken by __________.
7. Data and reports about consumer preferences and buying pattern
is a __________ information for marketing team.
8. Leave records managed by the HR Department is an example
of __________.
9. Accessing data from a central system with multiple end user
system over a network is __________ approach.
PAGE 51
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
52 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
and safeguard software development; Identify, inspect, and safeguard the Notes
hardware; and put the systems into action.
3.6 Constraints of IS
Businesses invest tens of thousands of dollars in computer hardware and
software, only to discover that most of this technology is never used.
Typically, this is because they did not pay sufficient attention to the
comprehensive incorporation of technology into the company. It is not
very productive to simply purchase the technology without taking advan-
tage of the new possibilities it presents for conducting business in a way
that is both more efficient and effective. Think carefully about what you
do and figure out how you might improve it by thinking about it again
and again. The only constant is change, and in order to keep up with it,
information needs to be managed like any other resource.
The following are the restrictions that must be faced when designing an
efficient IS:
1. There is no pre-existing management structure to build upon.
2. There is no precise articulation of the aim and purpose.
3. There are no goals set for the company.
4. A breakdown in communication.
5. An absence of participation from management.
6. Less knowledge of Information Architecture of the Organisation.
7. Budget constraints for investing in IS.
8. Lack of strategic knowledge to gain value from investments in
information technology.
3.7 Advantages of IS
1. IS are far more efficient than people at doing mathematical computations
and sorting through paperwork.
2. The use of IS can assist businesses in gaining a better understanding
of the purchasing habits and preferences of their clients.
3. IS enables new efficiencies to be realised through the provision of
services such as Automated Teller Machines (ATMs), telephone
networks, or computer-controlled aeroplanes and air terminals.
PAGE 53
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3.8 Disadvantages of IS
1. New technologies, especially for automation, make certain workers’
skills obsolete. Automobile, steel, insurance, and banking industries
have experienced enormous layoffs due to automation. Computerization
can raise operational efficiency and revenues, but it can also reduce
the workforce.
2. Excessive information might overwhelm managers who must digitise
it and make judgments.
3. Employees fear computers may replace them. Unless their employment
is safe, individuals may be sceptical of IS.
4. Increasing competition is pushing small and medium-sized businesses
out of the market.
5. Many organisations cannot evaluate the IS and technology for their
ROI (Return on Investment).
6. When companies implement new and sophisticated technologies,
they must find new ways to secure assets against theft, pilferage,
and security breaches.
54 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3.10 Limitations of IS
1. The use of IS cannot take the role of managerial discretion in
decision-making. It is nothing more than a useful instrument for
managers in the process of decision-making and problem resolution.
2. An IS has less of an impact on the success of a business when
information is not shared with other employees.
3. IS is unable to supply individualised information packages upon
request. Before deciding, it is necessary to do an analysis of the
information that is currently available.
4. The quality of the IS’s output is directly proportional to the quality
of the processes and inputs it receives.
5. The IS solely considers quantitative aspects of the situation.
PAGE 55
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
CASE STUDY
“Jack Eatery” is a fast-food restaurant that has recently expanded its
business in the city by opening five new joints. Primarily, Jack Eatery
used to maintain its operations like order taking, menu, bill, and revenue
information manually. Due to expansion manual operation management
and record keeping have become difficult. It has planned to implement
a new online information system and a mobile-based application for its
business. The main server is required to be on the cloud that holds the
sales and accounting software for managing the chain of restaurants. The
manager can use a computer in any of the branches and the waiters use
handheld devices (mobile/tablet) that connect to the server via wi-fi. As
soon as the order is taken, it is printed into the kitchen and updated in
the accounting information system.
When a table is cleared, the bill can be printed instantaneously for
the customer. Customers can also download the Jack Eatery app for
services like pre-orders, and online bills, and earn points by eating at
any store of Jack Eatery. With this new system, customers are better
served because their orders are delivered faster and there is a lower
chance of mistakes when the bill is made. Also, frequent customers
get discounts and become loyal. The detailed report of employees,
sales, inventory, raw material requirements and customer visits across
all branches can be printed by the manager whenever required.
Questions
1. Which IS development strategy will be best suited for Jack
Eatery?
56 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3.11 Summary
In this Chapter, we have gone over several fundamental ideas that are
pertinent to Information Systems, such as the fundamental difference
between data and information, concepts, and importance of IS, types
of information in organisations, and examples of IS. An IS is a way
of evaluating, analysing, and processing the data of an organisation to
produce information that is meaningful and useful to the management
of the organisation so that they can make decisions that will ensure the
organization’s continued growth and development in the future.
In the next lesson, we will talk about the various kinds of computer-based
information systems that exist, as well as how they help the various levels
of management in a company.
PAGE 57
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3.14 References
Lucas, Henry C (Jr.). 1986. Information Systems for Management
(3rd Ed.), McGraw Hill Book.
McNurlin, B. C., & Sprague, R. H. (2005). Information systems
management in practice. Prentice-Hall, Inc.
Baltzan, P., & Phillips, A. (2014). Ebook: Business Driven Information
Systems. McGraw Hill.
Stair, R., & Reynolds, G. (2017). Fundamentals of information
systems. Cengage Learning.
58 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 59
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
4
Computer-Based
Information Systems
Ms. Neha Gandhi
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
Ms. Tulika Kumari
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
Ms. Monika
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
STRUCTURE
4.1 Learning Objectives
4.2 Introduction
4.3 Office Automation System (OAS)
4.4 Transaction Processing System (TPS)
4.5 Management Information System (MIS)
4.6 Decision Support System (DSS)
4.7 Group Decision Support System (GDSS)
4.8 Executive Information System (EIS)
4.9 Artificial Intelligence and Expert Systems
4.10 Understanding End-User Computing
4.11 Types of EUC
60 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
4.2 Introduction
The advent of computers and information technology has revolutionized
the working of almost every section of society. Today, computer systems
and technologies are playing a widespread role in major activities such
as administration and management of a workplace. Information is a vital
component at almost all levels in an organization. Due to changing roles
along the organization hierarchy, the nature and forms of information vary
significantly at different levels in the organization. A set of methods used
in any business to collect, process, store, and distribute information in
PAGE 61
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
62 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4.3 Office Automation System (OAS)
With the application of computers over the past few decades, the funda-
mental nature of office tasks (administrative or management) has changed
substantially. Earlier, tasks such as document preparation, distribution,
processing, and employee communication were not technology-assisted.
Today, with the application of computers and related technologies like
networking, the overhead in performing these operational tasks in offices
has alleviated to a greater extent. This information system is responsible
for automating the common operations in the organization.
What is Automation?
Automation refers to the method of employing machines to perform tasks
to enhance productivity.
What is an Office Automation System?
Office automation system (OAS) refers to the employment of computers
and related technologies in performing operational tasks, and smooth
communication in the organization thereby enhancing work productivity.
PAGE 63
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
64 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 65
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
66 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
requests are executed together. The result of each transaction is not Notes
readily available.
Example: Processing payroll of employees in organization on
monthly basis. Other examples include credit card bill generation.
Real-time/Online Processing: In this type of TPS, the transaction
processing happens in real-time, and the result of every transaction
becomes readily available. This aids in avoiding any time delays.
Example: Bank ATMs, inventory control, etc.
PAGE 67
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
68 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
TPS also processes online queries like what is the account status for this Notes
customer? A TPS system is so crucial to any organization that even a
failure for a few hours can stop organization’s operations.
PAGE 69
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4.5 Management Information System (MIS)
MIS consists of tools that assist middle-level management in generating
scheduled reports from the data extracted by the underlying TPS. This
category of information system possesses limited analytical capabilities
and basically serves management in planning, controlling and routine
decision-making. Management personnel can monitor and control per-
formance of the organization by relying on the reports created by the
MIS in contrast to TPS, which majorly deals with the operational needs
of the business.
Example: Data collected by a POS system can be used to examine trends
in the sale of products, and thus future inventory orders can be placed
based on these findings.
70 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
PAGE 71
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
72 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
option among the available options in order to resolve a given situation. Notes
It is broadly classified as structured, semi-structured and unstructured
decisions as described below.
Structured Decision: Decisions which are repetitive and accustomed
in nature. Such decisions can be solved using well-defined and
standard solutions. In a structured decision, identifying the problem,
determining potential options, and making a choice are performed
in a specific sequence. Also, the process of obtaining the potential
solution is known. Decisions such as tax calculation of an individual
and student results in an examination are some of its examples.
Semi-structured Decision: These are decisions having only some
of the decision-making phases as structured. Such decisions utilize
both standard solution procedures as well as human judgments to
arrive at a decision. Decisions regarding departmental budget, and
buying and selling of a company’s stock are some examples of
semi-structured decisions.
Unstructured Decision: Decisions intended to tackle complex
problems for which there are no standard solutions, are referred to
as unstructured decisions. There is no well-known standard solution
for arriving at a decision and such decisions usually rely largely on
human intuition and judgment. Deciding long-term objectives for a
company, and choosing a policy for a new technology for the near
future are some examples of unstructured decisions.
To understand how information systems help managers of any organization
in decisional roles, you must first understand the decision-making process.
4.6.1 Decision-making
Decision-making is a fundamental activity in any organization. Deci-
sion-makers in any organization often strive to make efficient and ef-
fective decisions using various kinds of intellectual assets such as data,
information, business intelligence, experience, and expertise.
The three distinct phases of decision-making proposed by Herbert Simon
(1960) are as follows:
Intelligence Phase: It involves identifying the problem and collecting
facts, beliefs, and ideas related to it.
PAGE 73
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Design Phase: Decision makers identify all the potential strategies
for solving the problem in this phase.
Choice Phase: Decision makers select the most promising strategy
in the choice phase.
After the choice phase, the selected strategy is implemented. These phases
of the decision-making process can also be non-linear. Sometimes, you
might find it beneficial to backtrack to a previous phase for efficient
decision-making. For example, when selecting a strategy in the choice
phase, you may come across another possible strategy which might look
more promising. This can cause you to go back to the design phase in
order to add this newly observed strategy. Afterwards, you will revisit
the choice phase and compare the new strategy with the other strategies
you have generated. Figure 4.5 illustrates decision-making process and
its phases.
74 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
selected to solve the problem. Lastly, this solution is implemented. The Notes
proposed solution is deemed to be successful if it can solve the problem.
However, the process goes back to the earlier phases in case the solution
fails to solve the problem.
Computer-based information systems can aid the decision-making for
an organization, especially when a large amount of information and lots
of processing are required while decision-making. A Decision Support
System (DSS) is one such CBIS that attempts to aid decision-makers of
an organization by selecting one of the potential solutions to a problem.
DSS provides assistance to the decision-maker with an aim of improving
managerial decision-making.
76 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4.7 Group Decision Support System (GDSS)
Group Decision Support System (GDSS) is one of the computer-based
information systems that aids the exchange of ideas and information
among users to arrive at a decision as a group. Such systems are often
referred to as collaborative systems, group systems or group intelligence
systems. The primary objective of GDSS is to enable ideation, exchange
of ideas, and selection of likely solutions.
Decision-making in GDSS usually begins by clearly defining the problem
that must be solved. This is followed by the exchange of ideas in an
open and collaborative environment. Ideas contributed by the participating
group members are evaluated and ranked with the help of some means of
voting. The proposed decision is then given to the final decision maker
or the decision at the top-most rank is adopted, in case the group has
the authority to make the decision.
4.7.1 Components of GDSS
The main components of GDSS are Hardware, Software, and People.
Hardware: It includes electronic devices such as computers, network
equipment, display boards, and audio, or visual equipment. It can
also include conference facilities and physical set-ups such as rooms
to aid group discussion and team collaboration.
Software: Tools and techniques such as questionnaires, idea organizers,
electronic tools for conceptualizing, policy formation tools, etc.,
which provide support to the group decision-makers for planning,
organising ideas, and documenting the meeting proceedings.
People: It refers to the group members involved in decision-making
and sometimes a trained facilitator who directs the group members
through the decision-making process.
I N
IN-TEXT QUESTIONS
5. __________ decision is the one which usually relies largely on
human intuition and judgment.
6. __________ is a computer-based information system which
supports decision-making in an organization.
PAGE 77
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 79
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes to the rapid growth in pace, magnitude, and variety of data businesses
are now gathering. It allows businesses to gain more insight into the
data with tasks such as finding the underlying patterns in the data more
proficiently than people. From a business perspective, AI refers to pre-
vailing tools and practices and using them to solve business problems.
A variety of AI systems have been developed that businesses use in the
present age. In this section, we will discuss expert systems, which is one
of the earliest and most prevalent AI technologies.
80 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 81
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
82 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4.11 Types of EUC
There are many types of EUC. Some of the user-facing resources along
with the tools used in that domain are mentioned below in Table 4.1.
IN-TEXT QUESTIONS
16. End-user computing can be ________ when faced with fast
changing regulations.
17. End-user computing encompasses a wide variety of _____________.
Notes Advantages
Computing is made easy now as anyone can use software, tools,
and applications without getting into the complexity of backend.
The tools are so responsive that they can be accessed from any type
of digital devices such as desktops, laptops, smartphones, digital
watches, tablets, or any other technical device.
The connectivity is so high that the end-user tools and applications
can be accessed from anywhere across the globe.
EUC helps in increasing the awareness of the end-user and at the
same time enabling the creative use of Management Information
Systems (MIS).
Disadvantages
Redundancy of data is a common problem in EUC.
EUC can lead to distractions ultimately taking user away from
their real jobs which can become a threat to the organisation in
the long run.
Lack of attention towards the algorithms that play a key role in the
background of EUC can lead to major problems in the Management
Information System (MIS).
Sometimes EUC may be complex for one to understand and learn.
IN-TEXT QUESTIONS
18. End-user tools and applications can be accessed from ____________.
19. ____________ is a common problem in End-User Computing.
20. Mobile, web and Cloud applications are __________.
84 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
EUC solutions help in the automation of most of the steps involved Notes
in computing and delivering resources. These services can increase
efficiency and reduce staff workload, allowing them to devote more
time towards other innovative projects.
At the enterprise level, there are hundreds of thousands of physical
computers, and managing them all is an administrative nightmare. This
problem can be solved by EUC. Centralised control for installing updates,
applications, patches, and operating systems, is now relatively simple.
Many businesses nowadays choose a BYOD (Bring Your Own Device)
policy. This strategy helps in the reduction of multiple IT expenses.
Once these devices are supplied as virtual desktops via the cloud,
we must rely on EUC systems to provide the optimal technology
infrastructure.
CASE STUDY
TN PVT. LTD., an Indian electronics retail chain, has implemented a
new information system to improve its primary business activities. The
system comprises a main server that holds the management application
for sales and accounting, and a back-office computer utilized by the
manager. Sales executives are equipped with handheld devices that
connect to the server via Wi-Fi technology. Sales executives use these
devices, which are equipped with point-of-sale software and touch
screens, to take orders quickly and accurately. The orders are then
printed at the cashier counter and recorded in the accounting system.
The system also enables the automatic printing of invoices on one
of the three printers in the shop, thereby enhancing customer service
by reducing errors and shortening the order and invoice process. At
the end of the day, the manager can produce a detailed report of all
invoices, including information on items ordered, revenue collected,
and items to be procured based on sales.
Questions
1. In this case, what type of information system is used?
2. What technology components are utilized in this case?
Answers
1. Transaction Processing System (TPS) as it handles the daily
and routine activities at the operational level of management.
Decision-making at this level is highly structured. The system
is used to record daily activities (invoices) and manage internal
data at the operational level only.
2. Server, back-office computer, handled device, POS system,
application for accounting and sales, printers.
86 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4.15 Summary
Computer-based Information Systems (CBIS) predominate in various
aspects of our lives. They have become vital, especially in business and
management, due to their ability to ease the task of solving a problem
and arriving at a decision. CBIS use computer technologies to execute
various tasks. These systems usually access data in its raw form and then
process the data to generate potentially useful information as the output.
There are several types of computer-based information systems, namely,
Office Automation System (OAS), Transaction Processing System (TPS),
Management Information System (MIS), Decision Support System (DSS),
Executive Information System (EIS) and artificial intelligence-based sys-
tems such as Expert System (ES).
OAS provides assistance to the clerical workforce and knowledge workers
for creating documents, scheduling resources, and enhancing communi-
cation in the workplace. TPS is responsible for collecting, monitoring,
and managing data obtained from business transactions that happen in
an organization. MIS is concerned with tasks which involve planning,
managing, and using information technology tools to assist people in an
organization. DSS refers to a class of systems which provides assistance
for decision-making. EIS provides help to executives or managers in
analysing and summarising large volumes of data. ES is used to solve
complex tasks with the help of knowledge, reasoning capabilities, and
expertise in a specific domain.
End-user computing is a way to easily learn and use applications, tools,
or software by anyone, from anywhere to multiply work productivity in
an organisation. These tools are made by programmers, from which any
non-technical person can benefit and use in day-to-day life. We, as an
individual or as an organisation can immensely benefit from EUC by
strong Connectivity, High Security, Cost-Cutting, and Cross Organisa-
tional Collaboration.
PAGE 87
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4.16 Answers to In-Text Questions
1. Transaction Processing System
2. Office automation system
3. Batch processing
4. Management
5. Unstructured
6. Decision support system
7. Group decision support system
8. User interface
9. Executive information system
10. Executive information system
11. (d) All of the above
12. True
13. Expert system
14. Knowledge base
15. Inference engine
16. Beneficial
17. User-Facing Resources
18. Anywhere across the globe
19. Redundancy of Data
20. User-Facing Resources
21. Cross-organisational collaboration
22. Centrally Managed System
88 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
3. What are the characteristics of MIS? How does MIS differ from Notes
TPS?
4. Explain what is a model in DSS. Give an example.
5. What is an expert system? What are the major challenges encountered
while building it?
6. Discuss the differences among TPS, MIS, DSS, and EIS.
7. Explain EIS and its elements.
8. What is a computer-based information system? Discuss different
categories of computer-based information system.
9. Differentiate structured and unstructured decision-making.
10. Describe Simon’s model of decision-making along with the diagram.
Also, state the outcomes of each phase.
4.18 References
Rainer, R. K., & Prince, B. (2015). Management Information Systems:
Moving Business Forward. John Wiley & Sons.
Effy, O. Z. (2013). Management information systems (7th ed.).
USA: Cengage Learning.
Laudon, K. C., & Laudon, J. P. (1988). Management information
systems: a contemporary perspective. Macmillian Publishing Company.
PAGE 89
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
5
IT and Strategic
Advantage
Renu Singh
Assistant Professor (Guest)
College of Vocational Studies
University of Delhi
Email-Id: [email protected]
STRUCTURE
5.1 Learning Objectives
5.2 Introduction
5.3 Using IT for Competitive Advantage
5.4 Role of Internet and Emerging Technologies
5.5 IT-Enabled Services
5.6 Seamless Organisations
5.7 Virtual Corporations
5.8 Web-Enabled Computing as a Strategic Tool
5.9 Outsourcing as a Strategic Alternative
5.10 Summary
5.11 Answers to In-Text Questions
5.12 Self-Assessment Questions
5.13 References
5.14 Suggested Readings
90 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
5.2 Introduction
IT has become a part and parcel of the business. IT provides so much
help to the business, In the 21st century you cannot imagine any business
without IT being involved in the business. Nowadays, organisations are
able to use IT to gain competitive advantage. Utilizing information tech-
nology to create goods, services, and capabilities that give a business a
significant competitive advantage over its rivals in the global market is
the strategic role of information systems.
Only if a business successfully creates strategies to deal with the five
competitive forces that determine how the competition in its industry
is structured can it survive and thrive over the long term. According to
Michael Porter’s traditional model of competition, a company must suc-
cessfully create and implement strategies to counter:
(1) The rivalry of competitors within its industry,
(2) The threat of new entrants into an industry and its markets,
(3) The danger presented by competing products that might take market
share,
(4) The bargaining power of customers, and
(5) The bargaining power of suppliers.
In business, competition is a good thing, and there is often healthy rivalry
between rivals. This competition motivates and perhaps necessitates a con-
tinuous attempt to establish a competitive edge in the marketplace. This con-
stant force of competition demands enormous resources from a corporation.
Cost-leadership Approach: Being a low-cost provider of goods
and services in the sector, or figuring out how to assist suppliers
or clients in cutting prices or raising competitors’ expenses.
PAGE 91
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
92 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 93
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
94 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 95
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes bank and financial business mergers, such as those involving Bank of
America and Countrywide Financial Corporation and JPMorgan Chase
and Bank of New York, happened specifically for this reason.
Information technology can be used in these synergy scenarios to coor-
dinate the operations of several corporate units so that they can function
as one. For instance, by purchasing Countrywide Financial, Bank of
America was able to expand its mortgage lending division and reach a
sizable new client base that would be interested in its consumer banking,
credit card, and other financial services. Information technology would
assist the combined businesses in streamlining operations, reducing retail
expenses, and boosting cross-selling of financial products.
Network-Based Strategies
Strategies that profit from businesses’ capacity to build networks or net-
work with one another were inspired by the availability of the Internet
and networking technology. A virtual firm model, business ecosystems,
and network economics are all examples of network-based tactics.
96 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 97
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
98 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 99
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes managers let their staff members to accomplish both the organisational
and individual goals.
By increasing the quantity of information available to all employees,
information systems can assist managers and employees in working
more productively and efficiently in this new environment. With mod-
ern technologies, communication is quicker and more extensive, allow-
ing for closer teamwork and collaboration between managers and staff,
modernised information systems. Additionally, notes make it possible for
geographically separated teams and groups to collaborate to achieve both
individual and group objectives.
100 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
102 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 103
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
104 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 105
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
106 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 107
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
108 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 109
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 111
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
112 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
by all businesses in the virtual corporation and be formatted in the same Notes
way. These applications should be taught to all staff.
Business integration is the third stage, where organisations coordinate
their efforts into one supply chain while employing their specialisations
to reach the highest levels of quality and efficiency. At this point, or-
ganisations collaborate to develop improved strategies for selling their
services or disseminating their products, inventing fresh procedures in
the process. Although there are no written agreements between the virtual
organization’s partners, this phase does bind the businesses together and
reduces the likelihood that they will split apart.
PAGE 113
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
1. Public Cloud: Users can easily access systems and services thanks Notes
to the public cloud. Public clouds may be less secure because they
are more easily accessed.
2. Private Cloud: Within an enterprise, systems and services can be
accessed using the private cloud. Because of its private character,
it is more secure.
3. Community Cloud: A lot of organisations can access systems and
services thanks to the community cloud.
4. Hybrid Cloud: The vital operations are performed in the private
cloud, while the non-critical functions are performed in the public
cloud, to create a hybrid cloud.
Service Models
Three different service categories make up cloud computing:
1. Cloud Infrastructure as a Service (IaaS): Customers employ cloud
service providers’ processing, storage, networking, and other computer
capabilities to power their information systems. For instance, Amazon
offers a broadly based cloud environment where IT infrastructure
services are sold by utilising the extra capacity of its IT infrastructure.
These include its Elastic Compute Cloud (EC2) service for running
its apps and its Simple Storage Service (S3) for storing the data of
customers. Users only pay for the storage and computational power
they really utilise.
This is the most basic type, where cloud servers or storage is
present. Typically, IT organisations choose this setup because they
don’t want the trouble of setting up or maintaining the facility but
still want access to their materials as needed.
2. Cloud Platform as a Service (PaaS): Using the infrastructure and
programming tools provided by the cloud service provider, customers
develop their own apps. For software development and testing on
the IBM Cloud, for instance, IBM provides a service called Smart
Business Application Development and Test. Another illustration is
Force.com by Salesforce.com, which enables programmers to create
apps that are hosted as a service on its servers.
Employees can use this platform to write code, create applications,
and integrate with their current resources. With installed technologies
PAGE 115
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes like .NET, Java, Ruby on Rails, Python, and others that may prepare
code and then host it for sharing, the environment is favourable for
development.
3. Cloud Software as a Service (SaaS): Customers utilise software that
is network-distributed and hosted on the vendor’s cloud infrastructure
by the vendor. Leading examples include Salesforce.com, which also
rents out customer relationship management and related software
services online, and Google Apps, which offers basic business
applications online. Both have an annual subscription price, though
Google Apps also offers a condensed version for free. The data and
software for these applications are kept on the remote servers of
the providers, and users access them through a Web browser.
This is the cloud service that is the most developed and consists of apps
that use a virtual database rather than a physical one. CRM The first
company to do this was Salesforce.com, which offers all analytics and
customer relationship data on the cloud rather than on hard drives.
Benefits of Cloud Computing
1. Through the Internet, one can access apps used as utilities.
2. The applications can be modified and set up at any moment online.
3. There is no software to download in order to use or access cloud
applications.
4. Through the PaaS model, cloud computing provides online tools
for development and deployment as well as a runtime environment
for programmes.
5. Cloud resources are accessible across the network in a way that gives
any kind of client platform-independent access.
6. Self-service is available on demand using cloud computing. Without
interacting with the cloud service provider, the resources can be
used.
7. Due to its great efficiency and optimal use, cloud computing is very
cost-effective. All that is needed is an Internet connection.
8. Load balancing is a feature of cloud computing that increases its
dependability.
116 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 117
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes 12. Measurable Service: With this service, the cloud provider manages
and keeps an eye on every facet of the cloud service. It is necessary
for things like resource efficiency, billing, and capacity planning.
Drawbacks of Cloud Computing
The supplier is in charge of data storage and control unless users make
provisions for storing their data locally. Some businesses are concerned
about the security concerns associated with handing over their vital in-
formation and systems to a third-party vendor. Businesses expect their
systems to be operational around the clock and do not want to lose any
business capabilities due to faulty cloud infrastructures. Users’ dependence
on the cloud computing provider is another drawback of the technology,
and as the case study at the end of the chapter shows, this dependence
isn’t always ideal. In spite of this, businesses are increasingly moving
more of their computer processing and storage to a cloud infrastructure.
Small and medium-sized firms who lack the capacity to buy and own
their own gear and software will find cloud computing more immedi-
ately appealing. Large firms, however, make significant expenditures in
sophisticated proprietary systems that support special business procedures,
some of which give them competitive advantages. For large businesses
with existing IT infrastructures, it can be difficult to calculate the cost
savings from migrating to cloud services. Corporate data centres often
operate on an IT budget that includes a combination of construction and
operations costs. Pricing for cloud services is frequently determined by
an hourly rate or other per-use fee. A business must consider how much
of its network management, storage management, system administration,
electricity, and real estate costs should be devoted to a single on-premises
IT service even if it can roughly estimate the costs of the hardware and
software required to run a particular computing task on-site. It’s possi-
ble that an information systems department lacks the necessary data to
examine such factors on a service-by-service basis. Large businesses are
more likely to use a hybrid cloud computing strategy where they utilise
their own infrastructure for their most crucial core functions and public
cloud computing for less critical systems or extra processing power during
busy business seasons. With the use of cloud computing, businesses will
progressively transition from having a set infrastructure capacity to one
118 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
that is more flexible and partially owned by the company and partially Notes
rented from massive data centres run by computer hardware providers.
PAGE 119
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
5.9 Outsourcing as a Strategic Alternative
Using an outsourced strategy to manage the organization’s IS and IT op-
erations is becoming more and more common. In a broad sense, outsourc-
ing refers to the acquisition of goods or services from external partners
that were previously supplied domestically. A wide range of information
technology operations that are selectively contracted to an external service
provider are collectively referred to as outsourcing.
The creation of software applications is a typical outsourcing of IS tasks.
The contracting (or subcontracting) of activities and/or resources that
support the software development life cycle as well as the development
of full or partial software products or projects as well as the procurement
of packaged or customised software products are all included in this
process. The functions that are commonly outsourced, the justifications
for the decision to outsource, and a number of factors that contribute to
effective vendor selection and outsourcing efforts are listed in Figure 4.8.
There are five key reasons why businesses opt to outsource, even though
they can, theoretically, do so for any organisational function.
Save Money-Achieve Greater Return on Investment (ROI): One clever
way to stretch tight funds is to outsource IS/IT functions to qualified
service providers. A well-managed outsourcing strategy can result in cost
reductions of up to 40–80 percent for businesses.
Focus on Core Competencies: An organisation and its personnel can
concentrate on the business they are in rather than one they are not, thanks
to outsourced professionals. An enterprise can direct its IS specialists
to pinpointing and resolving business problems as opposed to designing
and prototyping new applications by employing an outsourced strategy
for application development.
Achieve Flexible Staffing Levels: Strategic use of an outsourcing strategy
for IS/IT functions can boost revenue without raising costs. For specialised,
specialty, or overflow projects, outsourcing offers a reservoir of skilled
experts. Outsourcing can help a business acquire the specialised knowl-
edge it needs if it is difficult to locate or expensive to keep in-house.
Gain Access to Global Resources: According to The Outsourcing In-
stitute, the criteria for expanding a company successfully have changed:
120 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
“Success is now dependent on the resources and skills you can access, Notes
rather than what you own or build.” By utilising global expertise, a com-
pany can take advantage of competent workers, wherever it may be, and
considerably improve the quality of its output. As a result, outsourcing
can provide smaller organisations access to possibilities that they might
not otherwise have owing to financial or geographic limitations.
Decrease Time to Market: The conventional advantages of flexibility
and responsiveness for small businesses are extended by outsourcing,
enabling smaller businesses to successfully compete with larger ones.
The addition of offshore support to a current workforce could enable
productivity throughout the day. A significant competitive advantage
can be gained by having access to resources that can work on important
projects even when local employees are sleeping.
IN-TEXT QUESTIONS
1. Information technology helps firms contract in size, because it
can reduce __________ costs.
2. A firm is said to have a __________ when the firm produces
greater Return On Investment (ROI) than its industry’s average
return.
3. __________ position is recognized by observing competitive
indicators.
4. Information systems can help managers and employees work more
efficiently and effectively in this new environment by increasing
the amount of __________ available to all employees.
5.10 Summary
In this lesson, you have studied that numerous competitive strategies
can be supported by information technologies. They can aid a company
in reducing costs, differentiating and innovating its goods and services,
fostering growth, forging alliances, securing long-term relationships
with clients and suppliers, putting up barriers to entry, raising switching
costs, and maximising its investment in IT resources. Therefore, infor-
mation technology can aid a company in gaining a competitive edge in
PAGE 121
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes its interactions with clients, partners, suppliers, rivals, newcomers, and
manufacturers of replacement goods.
Building a business that strategically prioritises customer value while
it develops its business value is a fundamental strategic application of
Internet technologies. Customers’ preferences are tracked by custom-
er-focused businesses using Internet, intranet, and extranet e-commerce
Websites and services, which also enable them to give goods, services,
and information to them wherever they are and whenever they need it.
Creating virtual corporations has emerged as a crucial competitive tactic
in today’s fast-paced international markets. The provision of computer
and telecommunications resources to enable the required communications,
coordination, and information flows relies heavily on the Internet and
other information technologies. In order to take advantage of opportunities
in the market that are changing quickly, managers of virtual companies
rely on IT to assist them in managing a network of people, expertise,
financial, and physical resources given by several business partners.
5. What factors should you take into account when deciding if the Notes
Internet might give your company a competitive advantage?
6. How outsourcing can be used as a strategic alternative?
7. What is cloud computing? What are its benefits? What are the
working models of cloud computing?
8. How do IT-enabled services assist businesses in growth?
9. Discuss the role of the Internet and emerging technologies in business.
10. How IT can be used to gain competitive advantage in business?
5.13 References
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. (2014). Management information systems.
Pearson Education Limited.
Bishop, A. (1993). The National Information Infrastructure: Policy
Trends and Issues. ERIC Clearinghouse on Information and Technology.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
Post, G., & Anderson, D. (2006). Management information systems.
Boston, Mass.: McGraw Hill/Irwin.
Burn, Janice, Peter Marshall, and Martin Barnett. E-Business
Strategies for Virtual Organizations. Butterworth-Heinemann, 2001.
Zemlianksy, Pavel, and Kirk St. Amant. Handbook on Research of
Virtual Workplaces and the New Nature of Business. Idea Group
Inc, 2008.
https://www.investopedia.com/terms/b/business-process-outsourcing.asp
https://www.hcmworks.com/blog/5-different-types-of-business-process-
outsourcing
https://cio-wiki.org/wiki/Information_Technology_Enabled_Services_
(ITeS)
https://www.encyclopedia.com/management/encyclopedias-almanacs-
transcripts-and-maps/virtual-corporations
https://www.zdnet.com/article/defining-the-ideal-it-organization/
PAGE 123
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
5.14 Suggested Readings
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. (2014). Management information systems.
Pearson Education Limited.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
124 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
6
Inter-Organisational and
International Information
System
Renu Singh
Assistant Professor (Guest)
College of Vocational Studies
University of Delhi
Email-Id: [email protected]
STRUCTURE
6.1 Learning Objectives
6.2 Introduction
6.3 International Information System
6.4 Inter-Organizational Information System
6.5 Summary
6.6 Answers to In-Text Questions
6.7 Self-Assessment Questions
6.8 References
6.9 Suggested Readings
PAGE 125
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
6.2 Introduction
In the previous chapter, we have discussed about the IT and its impact on
business management and How IT is used to gain competitive advantage
in the 21st century. Numerous competitive strategies can be supported
by information technologies. They can aid a company in reducing costs,
differentiating and innovating its goods and services, fostering growth,
forging alliances, securing long-term relationships with clients and suppli-
ers, putting up barriers to entry, raising switching costs, and maximising
its investment in IT resources. Therefore, information technology can aid
a company in gaining a competitive edge in its interactions with clients,
partners, suppliers, rivals, newcomers, and manufacturers of replacement
goods.
This chapter explains how to create a global information systems archi-
tecture that works with your global strategy. The fundamental information
systems needed by organisations to organise international trade and other
operations make up an international information systems architecture.
Information systems design and business strategy are related. Interna-
tional businesses must create networked system topologies that allow for
significant decentralisation of operations and development.
A strategy for deployment of a worldwide system must take into account
both business design and technological platforms. Systems integration
and connectivity are the key hardware and telecoms issues. Either a
proprietary architecture or open systems technology can be used for
integration. Global networks are exceedingly challenging to design and
run. Companies can either develop their own worldwide networks or
networks based on the Internet (intranets or virtual private networks).
Building interfaces to current systems and choosing applications that can
operate with various cultural, linguistic, and organisational frameworks
are the key software concerns.
126 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
6.3 International Information System
The fundamental information systems needed by organisations to organise
international trade and other operations make up an international infor-
mation system architecture. Understanding the worldwide environment in
which your company operates is the fundamental plan of action to take
while constructing an international system. This entails being aware of
the general market factors, or business drivers, pushing your sector into
international competition. A business driver is an external force to which
firms must adapt and which affects the course of the business. Similarly,
pay close attention to the barriers or unfavourable conditions that result
in management difficulties—factors that could thwart the growth of a
global business. You must think about a corporate strategy for competing
in that environment after examining the worldwide environment. How will
your company react? You may disregard the global market and concen-
trate primarily on domestic rivalry, sell internationally from a domestic
foundation, or arrange worldwide manufacturing and distribution. There
are other options in between.
PAGE 127
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes After you have created a strategy, you need to think about how to organise
your company to implement the strategy. How are you going to divide
up the work in a global setting? Where will the operations for market-
ing, accounting, production, and administration be located? Who will be
in charge of the system operation? The management problems involved
in putting your strategy into practice and bringing the organisation’s
design to life must then be taken into account. The design of business
procedures will be crucial in this case. How can user requirements be
identified and managed? How can local units be persuaded to adapt so
that they comply with global standards? How can system development
be coordinated, and how can global reengineering be accomplished? The
technology platform should be the last thing you think about. Although
evolving technology is a major component influencing the development of
global markets, you need a corporate strategy and organisational structure
before you can make an informed choice regarding technology. After you
have finished this line of thinking, you will be well on your way to a
suitable international information systems portfolio that can help your
company achieve its objectives.
128 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
The knowledge base is now much more democratic and broadly spread Notes
thanks to the development of strong educational, industrial, and scientific
hubs in Latin America, China, India, southern Asia, and Eastern Europe.
These overarching cultural variables that encourage globalisation produce
specific business globalisation factors that have an impact on the majority
of industries. Global markets—consumers around the world interested in
buying similar items that are socially acceptable—are made possible by
the development of potent communications technologies and the creation
of world cultures.
Marketing via the Internet involves reaching out to people and social
networks all around the world. The localization of corporate activity
according to comparative advantage is now possible for the first time in
history thanks to these unprecedented degrees of global coordination. The
best place for design, as well as for marketing, production, and finance,
should be chosen. Finally, the circumstances for strong, long-lasting
global economies of scale are created by global markets, production,
and administration. Global demand for goods and services allows for the
concentration of production where it can be carried out most effectively,
the distribution of fixed resources over longer production runs, and the
more accurate estimation and efficient scheduling of production runs
in larger plants. Wherever they appear, lower-cost production elements
can be taken advantage of. The outcome is a significant competitive
advantage for businesses that can organise internationally. These broad
and narrow commercial forces have significantly increased global trade
and commerce. Not all industries are influenced by these changes in the
same way. Clearly, manufacturing has been more negatively impacted
than domestic and extremely inefficient services. However, in the areas
of telecommunications, entertainment, transportation, banking, law, and
general business, the localism of services is disintegrating. Clearly, the
productivity and stability of those companies within an industry that can
comprehend the internationalisation of the business and adapt appropri-
ately will increase significantly.
Business Challenges
Although there are huge opportunities for economic success as a result
of globalisation, there are basic forces at work that aim to stifle a glob-
al economy and disrupt global trade. On a cultural level, particularism,
PAGE 129
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes which involves making decisions and taking action based on specific or
individual characteristics, is rejected in all of its manifestations (religious,
nationalistic, ethnic, regionalism, geopolitical position). It also rejects the
invasion of domestic markets by foreign goods and services. Different
cultures result in different social norms, political systems, and eventually
legal systems. Customers in some nations, including the United States,
expect local name-brand products to be manufactured domestically. When
they discover that many things they believed to be made domestically are
actually manufactured elsewhere, they are unhappy. Diverse political sys-
tems result from different cultures. Different regulations apply in various
nations regarding the transfer of information, citizen privacy, the origins
of software and hardware in systems, and radio and satellite telecom-
munications. Even business hours and trading terms differ significantly
between political cultures. The complexity of various legal systems must
be taken into account while developing global systems. The accounting
procedures are closely related to the tax laws, corporate philosophies,
and legal systems of every nation. For major international corporations
with units in many countries, these divergent accounting practices make
it challenging to assess their performance. Language still poses a serious
obstacle. Although English has essentially become the de facto business
language, this is more prevalent at the upper levels of organisations than
it is at the middle and lower levels. A new information system may need
to be created with local language interfaces before it can be successfully
implemented. Planning models and estimates can be severely impacted
by currency fluctuations. A product that seems successful in Mexico or
Japan can really turn into a loss due to fluctuations in the value of the
local currency. These impediments must be taken into account while
creating and constructing global systems for your company. Companies
attempting to deploy “lean production” methods across national borders,
for instance, frequently underestimate the time, cost, and logistical chal-
lenges of ensuring that items and information flow freely across borders.
130 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
and domestic exporter. Each of these tactics is carried out using a certain Notes
type of corporate organisational structure. For ease of explanation, we
divide organisational structure or governance into three categories:
Centralised (inside the home country),
Decentralised (to local foreign entities), and
Coordinated (all units participate as equals).
In particular companies, other governance patterns can be seen (e.g.,
authoritarian dominance by one unit, a confederacy of equals, a federal
structure balancing power among strategic units, and so forth). The primary
characteristic of the local exporter strategy is the intense centralization
of corporate operations within the country of origin. This is how almost
all multinational corporations start, while some later adopt other struc-
tures. To maximise resources in the home country, production, finance/
accounting, sales/marketing, human resources, and strategic management
are set up. Although agency contracts or subsidiaries are occasionally used
to distribute international sales, global marketing nevertheless draws its
marketing themes and tactics from its domestic home base. This type of
company includes Caterpillar Corporation and other large capital equip-
ment producers.
The multinational strategy decentralises production, sales, and marketing
operations to units in other nations while concentrating financial man-
agement and control out of a central home base. The goods and services
offered for sale in various nations are customised to the demands of the
local market. The company expands into a global network of manufactur-
ing and marketing operations spread over numerous nations. This pattern
is shared by a large number of financial service companies and a large
number of manufacturers, including General Motors, Chrysler, and Intel.
Franchisers are a fascinating blend of the old and the new. On the one
hand, the product is developed, funded, and first manufactured in the home
nation, but for product-specific reasons, further production, marketing,
and human resources must heavily rely on foreign employees. Franchisers
of food like KFC, Mrs Fields Cookies, and McDonald’s suit this trend.
McDonald’s invented a brand-new type of fast-food business in the US
and still heavily draws its ideas for new items, strategic management, and
funding from here. However, as the product must be manufactured locally
PAGE 131
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
132 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
We use the term “systems” to refer to the entire range of information Notes
system development and management tasks, including system conception
and alignment with the strategic business strategy, system development,
continuous operation, and system maintenance. We focus on four dif-
ferent system configuration types to keep things simple. Systems that
are completely developed and operated domestically are referred to as
centralised systems. Systems that are duplicated are ones in which de-
velopment takes place at the home base but operations are delegated to
autonomous entities abroad. When a system is decentralised, each exter-
nal unit creates its own special solutions and systems. Systems that are
networked have operations and system development that are integrated
and coordinated across all components. Domestic exporters frequently
have highly centralised systems, where a single domestic systems devel-
opment team creates global applications. A clear and startling contrast is
provided by multinationals: Foreign units create their own system solu-
tions based on local requirements here, sharing little to no applications
with headquarters (the exceptions being financial reporting and some
telecommunications applications). Franchisers have the most straightfor-
ward systems: Franchisers create a single system, typically at their home
base, and then duplicate it all over the world, much like the things they
sell. No matter where it is, every unit has the same applications. Last
but not least, multinational corporations use the most ambitious system
development approach: Systems that are networked provide a stable,
unified global environment for system development and operation. This
often assumes a strong communications foundation, a shared application
development culture, and a shared management culture that transcends
cultural boundaries. In financial services, where the homogeneity of the
product—money and money instruments—seems to overcome cultural
barriers, the networked system’s structure is most apparent.
PAGE 133
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes amount of local variation is both possible and preferred for such systems.
One further set of systems is purely local, truly provincial, and required
to meet local needs. Describe the essential business procedures.
Define the Core Business Processes
Establishing a concise list of crucial core business processes is the first
step. Business processes, in a nutshell, are groups of logically connected
operations that together achieve particular business outputs, like sending
consumers the right orders or bringing new products to market. Each
business process often incorporates a wide range of functional areas
that communicate and collaborate on projects to share knowledge and
information.
A business process analysis is the best method for locating these funda-
mental business procedures. What happens to customer orders after they
are received, who fulfils the orders, and how are they transported to the
customers? What about the vendors? Do they have access to MRP sys-
tems so that supply comes in automatically? You should be able to list
the top 10 business procedures for the company from a short list of 20
and assign priorities to each one. When it comes to these procedures, can
you name any centres of excellence? Are American, German, and Asian
human resources superior? Are American, German, and Asian manufac-
turing process control superior? For some business lines, you should be
able to pinpoint specific parts of the firm where a division or unit excels
at performing one or more business tasks. You can rank them once you
comprehend a company’s business procedures. After that, you can choose
which operations should be local and regional and which should be core
applications that are globally coordinated, created, and deployed. Addition-
ally, by identifying the most crucial business processes, you have made
significant progress in defining the future you should be striving toward.
Determine the Core Systems for Centralized Coordination
You can start to see prospects for international systems by determining the
essential core business processes. Conquering the key systems and defining
them as really international is the second strategic step. The definition
and implementation of global systems come at a very high cost, both
financially and politically. So, keep the list as short as possible, leaning
toward minimalism and letting experience be your guide. You can divide
opposition to a multinational plan by designating a small subset of systems
134 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 135
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes “global marketing” and “global customers.” Globally, fixed costs can
be spread out over a much wider client base. Production facilities will
benefit from additional economies of scale as a result. Last but not least,
global systems allow for the efficient utilisation of business finances over
a much broader capital base. This implies, for example, that capital in a
surplus zone can be moved efficiently to increase output in a place where
capital is scarce; it also implies that cash can be managed and used more
effectively within the organisation. Global systems won’t be produced by
these tactics alone. You’ll need to put your strategy into action.
136 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 137
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
138 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
other technical standards that sites must adhere to must be established by Notes
a central authority inside the company. Technical accounting terms, such
as the start and end of the fiscal year, as well as the acceptable interfaces
between systems, communication speeds, and architectures, and network
software, for instance, must be standardised (review the earlier discussion
of the cultural challenges to building global businesses).
Connectivity
Connectivity, or the capacity to connect the systems and personnel of a
global company into a single integrated network that can transmit voice,
data, and images, is a prerequisite for truly integrated global systems.
The Internet has created an incredibly strong platform for connecting
the scattered parts of international corporations. But there are still many
of problems. There is no service level guarantee on the public internet
(even in the United States). Few large organisations trust the security of
the Internet; instead, they typically exchange sensitive information over
private networks and use Internet Virtual Private Networks (VPNs) for
less secure conversations. Not all nations support even the most basic
form of Internet access, which calls for securing dependable circuits,
coordinating efforts between various carriers and the local telecommu-
nications authority, and securing agreements that are uniform in terms
of the quality of telecommunications service offered. The Internet serves
as the main foundation for international corporate networks when lesser
security and service levels are acceptable, despite the fact that private
networks have assured service levels and higher security than the Inter-
net. Extranets and global intranets can be developed by businesses to
facilitate faster information exchange with supply chain partners. They
can use VPNs from Internet service providers, which offer many features
of a private network using the public Internet, to use it to create global
networks. However, VPNs might not be able to serve a significant num-
ber of remote users, and they might not be as speedy and dependable as
private networks, especially when Internet traffic is particularly heavy
at certain times of the day. Many poor countries have limited access to
Internet connectivity due to the expensive cost of PCs and low wages.
When Internet infrastructure does exist in less developed nations, it
frequently has insufficient bandwidth capacity and is unreliable in part
because of problems with the power system. Access to Internet services
PAGE 139
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
140 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
programmes are the most crucial? Basic transaction and management Notes
reporting systems are the main emphasis of many international systems.
Supply chain management and enterprise resource planning systems are
becoming more and more popular among businesses as a means of stan-
dardising their business procedures globally and establishing coordinated
worldwide supply chains and workforces (see the Interactive Session on
Management). However, these cross-functional systems aren’t necessarily
compatible with other countries’ diverse linguistic, cultural, and busi-
ness traditions. Trying to manage the technical complexity of enterprise
systems can be challenging for business units in less technologically
advanced nations. Manufacturing and distribution companies frequently
utilise supply chain management and Electronic Data Interchange (EDI)
technologies to communicate with global suppliers. For knowledge- and
data-based businesses like advertising agencies, research-based compa-
nies in medical and engineering, and graphics and publishing businesses,
collaboration platforms, e-mail, and videoconferencing are particularly
crucial global collaboration tools. Internet-based tools will be used for
these things more and more.
PAGE 141
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
With EDI, thousands of common business transaction papers can be sent Notes
automatically. Purchase orders, invoices, shipping updates, customs
data, inventory records, and payment confirmations are a few typical
examples.
Benefits of EDI
B2B procedures depend on EDI transactions, which are still the primary
method for exchanging Time and Money: Through the automation of
a procedure that was previously manually documented and conducting
transactions between small and large firms.
1. Saves carried out with paper documents, EDI technology helps save
time and money.
2. Improve Efficiency and Productivity: EDI solutions boost productivity
and efficiency because more business documents are shared and
processed in less time and with higher accuracy.
3. Reduces Errors: Due to strict standardization, which ensures that
information and data are appropriately prepared before entering
business processes or applications, EDI data transfer helps to
decrease errors.
4. Improves Traceability and Reporting: EDI integration improves
traceability and reporting since it enables the integration of electronic
documents with a range of IT systems to allow data gathering,
visibility, and analysis.
5. Supports Positive Customer Experience: Through the facilitation
of effective transaction execution and quick, dependable goods and
service delivery, EDI automation enhances pleasant client experiences.
6.4.2 Extranets
Extranets are networks that connect business partners via the Internet by
giving them access to certain sections of one another’s corporate intranets.
An extranet is a restricted private network that gives authorized custom-
ers, vendors, and partners access to a portion of the information available
on an organization’s intranet. An extranet is similar to a DMZ in that it
gives authorized parties access to necessary services without giving them
access to a company’s full network.
PAGE 143
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes In the past, the phrase was occasionally also used to refer to two firms
utilizing a virtual private network to share their internal networks (VPN).
Types of Extranets
1. Project Extranets: An extranet can be a beneficial and effective
project management tool when numerous parties are involved in a
forthcoming endeavor. Private information should only be in the
hands that need it, thanks to privacy and authorization settings that
may be customized. The foundation of many industries, including
healthcare, architecture, retail, and e-commerce, is cross-organizational
cooperation. Extranets are a simple approach to guarantee that each
contributor remains responsible for their fair portion of the work
and guard against certain project elements sliding through the gaps.
2. Logistic Extranets: Extranets might be very important for businesses
in the e-commerce industry. When an exchange or modification is
required, these systems may connect suppliers with distributors,
couriers, and customers and maintain these channels open. By
guaranteeing that customers can easily obtain real-time updates on
their products and services, logistic extranets can assist businesses
in enhancing the customer experience.
3. Integration Extranets: An integrating extranet keeps track of
inventory and changes it instantly, which is another game-changing
technology for businesses that sell things online. This information
can be used to do an inventory and make sure that all parties who
need it have easy access to it. Integration extranets can be created
on top of an organization’s intranet or hosted on a totally different
system.
4. Employee Information Hub: Extranets can be a helpful tool for
conveying employee information to franchisees and other businesses
with sizable frontline personnel. The platform can hold timesheets
for employees and other employee-specific data in addition to
acting as a direct route to a company’s corporate office. Employee
suggestions and complaints can be submitted anonymously using
this kind of extranet. Employee extranets can be a useful tool for
communicating with front-line employees, a crucial group of the
workforce who are notoriously difficult to engage.
144 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
5. Financial Data Extranet: Extranets are among the safest and most Notes
secure ways to exchange private information, which is crucial when
working with sensitive topics like finances. Accounting firms using
extranets during tax season is one example of how they might be
used in a financial sector. Enterprises must immediately exchange
highly sensitive facts and figures in this high-stakes situation without
sacrificing confidentiality. Extranets can assist partners in effectively
exchanging updates and guaranteeing that only the right users have
access to crucial metrics.
6. Customer Platform: A consumer information platform may boost
productivity, enhance accuracy, and place the client in the driver’s
seat. Businesses that allow users to self-report various data and
metrics via an extranet effectively automate this step of the job
process while introducing self-serve capabilities.
Benefits of Extranet
1. Maximize Knowledge Sharing: The outside expertise and distinctive
viewpoint that third-party contributors bring to the table is one of
their greatest advantages. An extranet allows an organization to
fully utilize the knowledge and suggestions of all collaborators.
External partners are provided with a strong platform to exchange
best practices, comment on hot-button issues, and offer insightful
input to fix problems for upcoming interactions. An extranet promotes
participation from all users and improves information flow between
all parties.
2. Maintain Data Security and Confidentiality: Stakeholders in various
cross-organizational relationships need to make sure that third-party
users have access to the data they need to interact without revealing
private information. With extranets’ flexible permissions choices and
a variety of authentication mechanisms, administrators can easily
manage who can read what. External platforms are recognized as
one of the safest ways to transmit documents and data due to their
extensive variety of privacy and authorization controls.
3. Receive Real-time Updates Seamlessly: Customers today demand
as many details as they can get. Consumers anticipate being able to
follow the progress of the things they’ve ordered, much as clients
PAGE 145
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
6.4.3 XML
XML: An emerging B2B standard, promoted as a companion or even a
replacement for EDI systems.
Utilizing XML, data descriptions are created (Extensible Markup Lan-
guage). A flexible method for creating information formats and electroni-
cally distributing structured data across both private and public networks
in enterprises is the XML standard.
The main purpose of XML is to produce data formats that are used to
encapsulate data for records in databases, transactions, and many other
sorts of data. By developing various types of content—such as web, print,
and mobile content—that are based on XML data, numerous content types
can be created using XML data.
Unlike HTML, which describes the format of Web pages, XML (Exten-
sible Markup Language) does not. Instead, by assigning identifying tags
146 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
or contextual labels to the data in Web documents, XML specifies the Notes
contents of Web pages (including business documents created for use on
the Web). For instance, to categorize each airline flight time on a travel
agency Web page containing airline names and flight timings, hidden XML
tags such as “airline name” and “flight time” might be used. Another
option is to categorize the product inventory information that is accessi-
ble on a website with terms like “brand,” “price,” and “size.” This kind
of data classification allows XML to greatly improve the searchability,
portability, and analytical capabilities of website content.
For instance, if the product information on the website had been marked
up with distinguishing XML tags, XML-capable search tools would have
no trouble finding the precise product you specified. An XML-based
website may also more readily track the characteristics of the web pages
its visitors utilize and the products they are interested in. By allowing
the automatic electronic interchange of business data between businesses
and their consumers, suppliers, and other business partners, XML there-
fore promises to make electronic business and commerce processes much
simpler and more effective.
Features of XML
Information and data are described in XML.
The appearance of the data is not specified by XML.
Complex communications containing several files can be sent using
XML.
XML and HTML differ from one another.
The XML language is adaptable.
XML is simple to read and comprehend.
Less specialist knowledge is needed for XML.
PAGE 147
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Web services are computer program elements that electronically connect
the applications of various users and computing platforms. They are based
on a foundation of Web and object-oriented standards and technologies for
using the Web. Web services can thus connect crucial business processes
for the real-time interchange of data within Web-based applications that a
company may share with its clients, suppliers, and other business partners.
Web services, for instance, would allow a business’s purchasing applica-
tion to use the Internet to check a supplier’s inventory before placing a
sizable order, while the supplier’s sales application could use Web services
to automatically check the business’s credit rating with a credit-reporting
agency before approving the purchase. Web services are so frequently used
to refer to the Web-based business and computing operations or services
carried out by Web services software technologies and standards among
both IT and business professionals.
One of the major technologies that enables Web services to make programs
run across many computing systems is the XML language. Also crucial
are SOAP (Simple Object Access Protocol), an XML-based protocol with
standards for connecting applications to the data they require, and UDDI
(Universal Description, Discovery, and Integration), the “yellow pages”
directory of all Web services and how to identify and utilize them.
The main software technology for automating data access and application
operations between a firm and its trading partners is predicted to be web
services. Web services will be crucial for the creation of the simple and
effective e-business and e-commerce applications that will be needed as
businesses transfer more and more of their operations online. In today’s
dynamic global business world, ties between a corporation and its busi-
ness partners frequently change quickly. To deal with these interactions,
Web services must be flexible and interoperable.
A web service is any piece of software that uses a standardized XML
messaging system and makes itself accessible via the Internet. All com-
munications to a web service are encoded in XML. As an illustration, a
client might submit an XML message to invoke a web service, and then
wait for an XML answer. Because XML is used for all communication,
web services are not limited to any one operating system or programming
language. Java may communicate with Perl, and Windows applications
can communicate with Unix applications.
148 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Web services are dynamic, distributed, self-contained modules that can Notes
be described, published, located, or used in a supply chain across a net-
work. These programmes can be distributed, local, or web-based. Web
services are developed on top of open standards such as TCP/IP, HTTP,
Java, HTML, and XML.
Web services are XML-based platforms for information exchange that allow
for direct application-to-application communication via the Internet. These
systems may consist of documents, objects, messages, or programmes.
A web service is a group of open standards and protocols used to transfer
data between apps or other systems. Web services enable data exchange
over computer networks like the Internet in a fashion that is akin to
inter-process communication on a single computer. Web services enable
software applications operating on a range of platforms and written in
a number of programming languages. This interoperability, for instance
between Java and Python or Windows and Linux programmes, is made
possible through the use of open standards.
In conclusion, a full web service is any service that:
is accessible via private (intranet) networks or the Internet
use an established XML communications system
not dependent on a particular operating system or programming
language
self-descriptive using a standard XML syntax
is easily findable using a find method.
IN-TEXT QUESTIONS
1. The purchase of goods or services from third-party partners that
were previously provided internally is known as __________.
2. Rapidly changing technological developments must be anticipated,
identified, and implemented in __________.
3. A business depends heavily on its information systems and
Internet technologies to help it integrate its global business
activities is called __________.
4. Global customers, products, operations, resources, and collaboration
are examples of ____________.
PAGE 149
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
6.5 Summary
A global culture with consistent expectations or norms has been developed
as a result of the expansion of affordable international communication
and transportation. World culture also benefits from political stability
and an expanding body of widely disseminated knowledge on a global
scale. Global markets, global manufacturing, coordination, distribution,
and economies of scale are made possible by these broad factors.
Domestic exporter, multinational, franchiser, and transnational are the
four fundamental types of international strategies. All production factors
are coordinated globally as part of a transnational strategy. The kind of
business and product, though, affect the approach chosen.
Information systems design and business strategy are related. International
businesses must create networked system topologies that allow for signif-
icant decentralization of operations and development. Franchisers usually
always use centralized financial controls and reproduce their systems
across numerous nations. The majority of the time, multinationals rely
on the dispersed independence of their international subsidiaries with a
slight tendency toward network expansion. With some decentralized ac-
tivities allowed, domestic exporters are typically centralized at domestic
headquarters.
Global information systems provide difficulties because linguistic, polit-
ical, and cultural diversity highlights organizational culture and business
process disparities and promotes the growth of disjointed local information
systems that are challenging to integrate. International systems typically
150 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 151
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
6.8 References
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. (2018). Management information systems.
Pearson Education Limited.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
Post, G., & Anderson, D. (2006). Management information systems.
Boston, Mass.: McGraw Hill/Irwin.
152 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 153
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
7
Structured System Analysis
and System Development
Life Cycle
Tina Sachdeva
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
Anshika Singh
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
STRUCTURE
7.1 Learning Objectives
7.2 Introduction
7.3 Structured System Analysis
7.4 Structured System Analysis Tools
7.5 System Design
7.6 Introduction to System Development
7.7 System Development Life Cycle
7.8 SDL Models
7.9 Summary
7.10 Answers to In-Text Questions
7.11 Self-Assessment Questions
7.12 References
154 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
7.1 Learning Objectives
After completing this chapter, the readers will be able to:
Understand Structured System Analysis and application of different
Structured. System Analysis tools to understand the system requirements
thoroughly, which will further help develop a System with better
quality.
Understand and define System Development Life Cycle (SDLC)
and its needs.
Define different phases of SDLC and relation between them.
Understand different SDLC models and compare and contrast them.
7.2 Introduction
Structured System Analysis and Design (SSAD) is the methodology that
helps to develop quality systems and better procedures for the business.
SSAD methodology analyses the existing systems and defines problems
and system specifications to design a new or updated version of the
proposed system. Several Structured system analysis tools are used to
understand the system better.
SSAD was produced for the Central Computer and Telecommunications
Agency (which intends to provide computer and telecommunication sup-
port to UK government departments) for use from 1980 onwards.
Notes data flow etc. It ensures that the developed information system is easy to
understand by the user. The Report must explain the following aspects:
working of the existing system, its problem areas and requirements, and
recommendations on how to proceed with building a new system.
IN-TEXT QUESTIONS
1. __________ is a method of analysis that applies a set of graphical
tools.
2. __________ analyses the problem and existing systems to design
an information system with high quality meeting the user
requirements.
PAGE 157
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes cess represented in the current level DFD is expanded into its constituent
processes in the next level DFD:
1. DFD Level 0, also known as Context Diagram, displays the complete
system as a single process. Context level diagram of an Information
system is given in Figure 7.3. For example, Context level Diagram
for School Convocation gown and cap ordering system represents the
orders entering the system and receipt to the student, given in the
Figure 7.3.
2. DFD Level 1; display a more detailed system than Level 0, illustrated
in Figure 7.4. For example, DFD Level 1 for School Convocation
gown and cap ordering system representing different processes
involved in the system like Process 1: Place order, Process 2:
Receive order etc., data flows like order, order information etc. and
data stores like Students, Inventory to link them together, given in
the Figure 7.4.
3. DFD Level 2; displays a more detailed system than Level 1, illustrated
in Figure 7.5.
4. DFD Level 3; displays a more detailed system than Level 2, illustrated
in Figure 7.6.
Further progressing to 4, 5, and so on, depending on the added details.
Designers and developers use detailed DFDs to write pseudocodes or
even the code.
Rules for constructing DFD:
1. Assign a unique name, number and description to each Process.
2. Each process and data store should have at least one input data flow
and one output data flow.
3. Output data flows and input data flows usually have different names
as the process transforms the input into a different output.
4. Each data flow, data store and entity should be given a unique name
and a description.
5. Each data flow should be connected to at least one process.
158 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 159
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
160 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
PAGE 161
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes 3. DFD of the current logical system; displaying what functions of data
processing are performed by the current system.
4. DFD of the new logical system; display flow of data, structure and
functional requirements of the new system.
5. Detailed description of each component in DFDs.
162 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 163
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
164 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
PAGE 165
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
168 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
170 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
PAGE 171
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
172 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes It is a vital step in the SDLC and ensures that the entire process moves
smoothly and the end system is of good quality. A well-planned project
ensures timely delivery, fewer errors, and decreased costs. Every system
under consideration, however small or big must be planned well. Also,
in this phase, the scope of the existing system (if any) is discussed along
with its shortcomings. Other important aspects such as constraints, secu-
rity, and integration w.r.t. the new system is also discussed.
Analysis
During this phase, the detailed requirements of the customer are gathered
i.e., what is the system supposed to do? This information is further an-
alysed and validated. Various alternatives are discussed and prioritized.
Business requirements are tried to convert into system functionalities. This
phase does not talk about the specific technology required. A broad-level
process diagram is drawn. A feasibility report popularly called the re-
quirements specification document is prepared.
Design
In this phase, the technical requirements that were specified during the
analysis phase take physical or technical form. The focus of the IT spe-
cialists here is to build a technical prototype of the system. This con-
siders the technical infrastructure i.e., hardware and software required.
One important difference between the analysis and design phases is that
in the former requirements are specified majorly in a theoretical form
whereas the latter considers specifically all technical and infrastructural
support that will be required when the requirements take the shape of
a working model. Out of many, the two important activities performed
during the design phase are specifying technical aspects that would be
required and designing the system model.
Development
In this phase, the logical model of the previous steps now starts coming
into existence i.e., a physical one. This physical model tries to address
all documented requirements. IT specialists devote a lot of time to this
phase as they do implementation, develop database programs, etc. The
blueprint of the underlying technology required is also prepared. The
organization purchases and installs this technology to create a sound base
for the project to be used further. This phase may take a few months or
maybe years for a realistic high-end system.
174 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Testing Notes
The testing phase of the Software Development Life Cycle checks whether
the system developed caters to and fulfils all the requirements that were
outlined in the analysis phase or not. Testing is a critical and crucial step.
Major activity that one performs during this step is developing the test
conditions to carry out an intensive test. Test inputs or conditions are
the broad inputs that are stated usually in the form of a table along with
the expected outputs. The tester then runs this testing set and ensures
that generated results match the actual results. If this happens, then one
can say that the system functions correctly. If the generated result does
not match the expected result, it implies that a bug exists in the system
developed. The developer or specialist who had developed the concerned
module is informed to correct it.
Test conditions are usually developed in a way that takes into account
all extreme possible values for inputs. Such out of range, borderline
inputs and wrong inputs are the ones that actually determine the robust-
ness of any system. There are a huge variety of test conditions possible
and equally important is to ensure correctness of the system at different
points. These two constraints are a little conflicting, and thus the selec-
tion of best or promising test cases is a vital step. Further, depending on
whether part or whole of the system is checked, testing is being called
by various names. First is unit testing in which the smallest individual
parts of a system that are capable of being tested are taken up. In this
their independent operation is checked for. Next is Integration testing—
which verifies how well the separate units or individual components can
work together when tested in groups. Further, we have system testing in
which one ensures that the independent components or units developed
for a system function fine or not when combined into the total system.
Last is the User Acceptance Testing (UAT) which tells us if the sys-
tem satisfies all the requirements and enables end-users to perform the
required tasks correctly or not.
Implementation
During this, the first tested version of the system is handed over to ac-
tual end users. They start with the usage of their respective components
and report issues or difficulties, if any, experienced by them. Two main
activities performed during this phase are writing of user documentation
PAGE 175
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes and the provision of training. The end users usually find the user manual
or documentation extremely useful as it provides a smooth transition from
the old system (if it exists) to the new one. End users are accustomed
to the old systems and the transition to a new one is difficult and thus
initial training provides a much-needed uplift to them. Training can be
conducted in the form of online sessions or workshops.
Maintenance
It is the last and final phase of the System Development Life Cycle.
During this phase, the service provider supports and monitors the work-
ing of the system to ensure that it meets all business goals. The system
must be flexible enough, i.e., it must be able to adapt to the changing
business requirements. Regularly monitoring and supporting the new
system implies bringing out simple upgrades like generation of reports
or summary summaries in an updated format. It could also imply re-
trieval of information by applying different conditions or formulae for
decision-making and reviewing the system to ensure that it constantly
moves the organization towards its end goals.
One important activity that we perform during the maintenance phase is
setting up a help desk for providing support to end users of the system.
A popular way is setting up a dedicated help desk that consists of a team
of telecallers that answer users’ questions. To avail of this service, users
call up the customer support numbers provided to them. They expect any
issues or questions raised by them to be addressed in a time-bound man-
ner. Existence of such a help desk facility which answers user questions
is a time-tested way of providing comprehensive support for users using
new systems.
IN-TEXT QUESTIONS
10. Generally during which phase the technical aspects of a system
are catered to or start taking form?
(a) Analysis (b) Design
(c) Development (d) Testing
11. __________ testing ensures that a system fulfils all business
requirements and performs all operations required by users.
12. Goals and broad objectives of a system are discussed during
which phase of SDLC?
176 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
13. What types of test conditions are necessary to ensure robustness Notes
of system developed?
14. What is the importance of requirements specification document
in SDLC?
15. What activities or tasks are performed during maintenance
phase?
Notes SDLC phases are executed one after the other with no or minimal overlap
between any two. Because of this rigid structure, it demands that a com-
plete set of system requirements be finalized or closed at the beginning
of the project. Only after this, the design and development stages begin.
It is difficult to go back to a previous phase to make any updates there.
Once development is complete, the product is tested against the initial
requirements and in case of any non-compliance, all re-working needs
to be done. Companies typically need more flexibility than what the
waterfall methodology offers, but it is still a preferred methodology for
certain types of projects where requirements are well-defined and free
of any ambiguities. It is also suitable in scenarios wherein a system al-
ready exists in an organization and the new one is an improvement or
up gradation of the existing one. Figure 7.24 shows the linear Waterfall
Model along with individual phases. Observe how strict completion of
previous phase is required before moving to next.
1. (http://www.tutorialspoint.com/sdlc/sdlc_waterfall_model.htm)
178 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
2. (http://www.tutorialspoint.com/sdlc/sdlc_waterfall_model.htm)
PAGE 179
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes fully functional units of code. Now the developed or re-used software
units are integrated and tested as a complete fully functional system.
Providing support and maintenance to the client company is also crucial
at the end. The end-user involvement and the development of software
prototypes speed up the entire process by a huge factor. Re-usability is
another important factor in speeding up the timelines.
3. (http://www.geeksforgeeks.org/software-engineering-rapid-application-development-model-
rad/)
180 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
4. (http://en.wikipedia.org/wiki/Extreme_programming)
PAGE 181
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes 17. Which of the following models has advantages of both Waterfall
and Iterative Model?
(a) Agile Methodology
(b) Spiral Model
(c) Xtreme Programming
(d) Rapid Application Development Model
18. Waterfall Model mandates that the system requirements be
___________ in the beginning.
19. Which models rely heavily on reusing existing software components?
20. What kind of projects are best suited using Agile methodology?
Give a hypothetical example.
21. Define system prototype. State its importance.
7.9 Summary
Structured System analysis is an approach which defines what a system
should perform before deciding how it can be accomplished. It under-
stands and analyses the requirements of the proposed system or existing
systems and uses modelling tools to explain different aspects of the system
or project and formulate a report. Structured System analysis involves a
graphical representation of the functions or processes that capture, ma-
nipulate, store, and distribute data between components of a system and
their environment. Understanding system operations will be aided by data
flow or sequence flow diagrams, which are high-level depictions of the
flow of data or events in the system.
Structured System analysis helps in controlling project management, esti-
mating team size, allocation of work considering expertise and analysing
the risk. It ensures the project is completed within the proposed deadline
and budget. Using DFD, we can visualise the following aspects: how
the system will operate, its goal and how it will be implemented. Data
Dictionary prevents ambiguity and synchronises the work while using the
same object reference at multiple places. A decision tree defines complex
relationships between each condition and its allowed actions. The Deci-
sion Table specifies all possible conditions with their respective actions.
Structured English is used to specify the logical information which the
182 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 183
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
12. Planning phase
13. Both valid and invalid test conditions. Even for invalid inputs, the
system must not get stuck and display appropriate error messages and
suggestions. Boundary value inputs are equally important to check.
14. System requirements specification is a set of documents that describes
the broad working or features and behaviour of a system. It tells
us what the system is expected to do. It serves as an agreement
between the client company and the developer company and also
among different teams of the developer company.
15. Providing help desk, error correction, training support, etc.
16. Disadvantage of waterfall model is that the requirements need to
be frozen in the beginning. No, because requirements fluctuate in
such cases.
17. (b) Spiral Model
18. Fixed or freeze
19. XP methodology and RAD
20. Systems that are small, have fewer features or functionalities, and
fast development required. Billing system of a small-scale shop.
21. A system prototype is a mini working replication of the actual
product. It gives a rough idea to the end users of how the final
system will work. By working with prototypes, end-users can give
their important feedback.
7.12 References
Laudon, K. C., & Laudon, J. P. (1988). Management information
systems: a contemporary perspective. Macmillan.
Gupta, P. (2008). System Analysis and Design. India: Laxmi
Publications Pvt Limited.
Hoffer, J. A., George, J. F., Valacich J. S. (2004). Modern systems
analysis and design. Prentice Hall.
Dennis, A., Wixom, B., Roth, R. M. Systems Analysis and Design.
United Kingdom: Wiley.
PAGE 185
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
186 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
8
Enhancing Business
Efficiency with
ERP, CRM and SCM
Seema
Assistant Professor
Shaheed Rajguru College of Applied Sciences for Women
University of Delhi
Email-Id: [email protected]
STRUCTURE
8.1 Learning Objectives
8.2 Enterprise Resource Planning (ERP)
8.3 Customer Relationship Management (CRM)
8.4 Supply Chain Management (SCM)
8.5 Difference between SCM, ERP, CRM
8.6 Summary
8.7 Answers to In-Text Questions
8.8 Self-Assessment Questions
8.9 References
PAGE 187
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
188 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 189
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Before an ERP system, each department maintained its own database.
Employees in one department were unaware of what happened in the other
departments. After the ERP system, databases from various departments
are maintained by an ERP system. It maintains a log of every database
in the system. Employees from one department in this situation know
information about employees from the other departments. Some vendors
of ERP are Baan, JD Edwards, Oracle, PeopleSoft, SAP, Net Suite, Sage
300, In for etc.
5. (https://www.geeksforgeeks.org/introduction-to-erp/)
190 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
IN-TEXT QUESTIONS
1. __________ is an integrated tool for financial and cost accounting,
sales and distribution, materials management, human resource
management, and production planning with computers integrated.
2. The material requirement plan includes data on all of the
following, with the exception of:
(a) Breakdown of all sub assemblies’ quantities and due dates
(b) The final product’s quantities and necessary delivery dates
(c) Available inventory for each finished good
(d) The capacity needs to provide the anticipated output rate
3. __________ The departments are its subsystems, and the entire
organisation is seen as a system.
PAGE 191
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
192 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 193
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 195
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Improving operations since the needs of the business are continually
changing. The way a company handles the addition of new clients,
services, or technology will define its success.
Training of people is an important component of ERP success.
Improve the system to enhance the system’s functionality for ERP
solutions effectiveness.
Analysing the metrics of the equipment to see whether there has
been a decline in performance.
ERP CASE STUDY
Fulton & Roark
Men’s grooming retailer Fulton & Roark implemented ERP successfully.
North Carolina’s business tracked inventory in a spreadsheet and
financial data in Sage Live before switching to ERP. When revenues
doubled year over year, the company’s operations couldn’t keep
up. Spreadsheets couldn’t account for shifting inventory costs, and
accounting software lacked the workflows needed to record Cost of
Goods Sold (COGS). Fulton & Roark double-entered data manually.
The company’s co-founders installed NetSuite ERP to consolidate
work. Fulton & Roark’s ERP deployment took 20 days. After a
three-week rollout, team members noticed rapid changes. Fulton &
Roark finally:
Correct inventory bookkeeping errors.
Stop using external accountants and boost unit and dollar
volumes without adding staff.
Increase sales 50% without adding staff.
Accurate margins and inventories helped expand e-commerce.
196 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
8.3.1 Introduction
CRM is a key concept or strategy to improve customer connections while
reducing expenses, boosting productivity, and boosting profitability. CRM
encompasses a vast array of practices and instruments for managing
interactions with clients, customers, and business partners in marketing,
sales, and service, regardless of the communication channel. CRM puts
an emphasis on attracting, keeping, and growing a clientele. CRM is an
automated procedure for business transformation that centers everything
it does on the customer. By understanding the preferences, tastes, and
habits of their consumers, businesses may use technology to raise the
level of service for long-lasting connections in the future.
CRM combines software and operational procedures. It works to achieve
a specific set of objectives, which are frequently focused on boosting top-
line revenues. To turn clients into devoted and dependable customers, it is
important to have a continuous customer history. Customer Relationship
Management is a strategy that is tailored by an organisation to effective-
ly manage and administrate its clients and suppliers in order to achieve
commercial excellence. Companies that are becoming adept in Customer
Relationship Management (CRM) concentrate their efforts on building pro-
grammes to recruit and retain the proper customers as well as satisfying
the particular requirements of valued customers. The term “customer value”
refers to the aggregate of a customer’s perceived tangible and intangible
benefits, as well as the associated costs. Some popular CRM software are
SAP CRM, Salesforce, Oracle NetSuite, Salesforce, Fresh sales, Zoho CRM,
and HubSpot.
PAGE 197
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
198 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
with them through recurrent contacts. In order to meet their needs for Notes
production, delivery, and customer service, marketers could gather infor-
mation about their customers. CRM is the fusion of the emergence of
database technology with the core marketing principles of client loyalty
and retention. CRM can assist in attaining the following objectives by
recognising consumer requirements:
Improving lines of communication.
Collect essential data, such as client information and order history.
Create extensive consumer profiles that include preferences.
Providing immediate, enterprise-wide access to client histories.
Recognizing new sales opportunities.
CRM is increasingly used to identify, entice, and retain a business’s most
valuable customers, hence sustaining sustainable growth. Designing products
or services that meet or exceed customer expectations begins with a solid
CRM. As businesses establish one-to-one client relationships online, the
rapid development of internet-based technology has a significant impact on
the management of customer interactions. Some advantages of CRM are:
CRM gives all business members convenient data access. This helps
the company’s employees communicate and market to clients.
Having detailed information about each customer, such as their
order history, correspondence, survey replies, and marketing emails,
improves customer care and increases customer satisfaction.
A CRM system can be used to determine which groups to target in a
marketing effort. A customer’s past purchases can predict his next buy.
CRM increases profitability through more effective customer care,
successful marketing, and happier customers.
Having automated CRM systems saves time by decreasing redundant
work and giving more time for analysing new consumers. A computer
database can speed up the retrieval of important data.
Strong CRM can help in lead generation. Many CRMs can interact
with website and social media campaigns to give leads to sales/
marketing users.
PAGE 199
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
200 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 201
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
202 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 203
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
8.4.1 Introduction
The idea of Supply Chain Management provides a framework for coor-
dinating a company’s information, assets, and finances from suppliers
to customers. Supply chain and supply management demonstrate how
suppliers, producers, distributors, and customers of goods and services
coordinate material, informational, and monetary flows. In accordance
with one definition, the supply chain is “A network of autonomous and
semi-autonomous business participants engaged through upstream and
downstream connection in various processes and activities that produce
value in the form of tangible goods and services in the hands of ultimate
customers.” Supply chain Management is the web of companies that
204 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
connects suppliers and end users. It provides a route for raw materials to Notes
be turned into finished products and reach consumers. The movement of
commodities from suppliers via manufacturing and distribution channels
to the final consumers is referred to as supply chain management. The
main objective of supply chain management is to oversee and coordinate
the production, distribution, and shipment of commodities. From the point
of origin to the point of consumption, all businesses or organisations
that the focal company interacts with directly or indirectly through its
suppliers or customers are considered to be members of the supply chain.
The planning and administration of all activities related to sourcing, pro-
curement, conversion, and logistics management are included in supply
chain management, according to the Council of Supply Chain Management
Professionals (CSCMP). Additionally, it includes the essential elements
of coordination and collaboration among channel partners, including cus-
tomers, suppliers, intermediaries, and third-party service providers. Supply
chain management essentially unifies supply and demand control within
and among businesses. The top SCM software vendors include NetSuite
(ERP), Oracle SCM Cloud, Epicor, SAP SCM.
In today’s globalised market, firms fight to offer customers high-quality
goods and meet all of their needs. SCM network design models strive
to provide the highest possible level of customer satisfaction. Businesses
need effective supply chain management. Some important advantages of
Supply chain management are:
SCM boosts efficiency and business operations and helps in
establishment of faster delivery mechanisms for in-demand goods
and services.
Reduces storage and transportation costs.
Helps in delivering the right stuff on schedule.
Enhances inventory control, allowing just-in-time stock models.
Helps firms adapt to globalisation, economic change, expanding
consumer demands, and inequities.
Reduces waste, cuts costs, and boosts supply chain efficiency.
Develops plans for obtaining and maintaining all inventory. Supply
chain management prevents under- and overstocking.
Supplier-customer information sharing enhances channel efficiency,
reduces manufacturing costs and inventory levels.
PAGE 205
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
IN-TEXT QUESTIONS
9. SCM network models maximise __________.
10. SCM encompasses the following:
(a) Transportation (b) Material Handling
(c) Storage (d) All of the above
11. __________ Contributes significantly to supply chain management.
(a) Finance (b) Marketing
(c) Information system (d) None of the above
PAGE 207
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
208 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 209
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
210 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
8.6 Summary
Enterprise Resource Planning (ERP) is a platform used by businesses to
coordinate and manage the key elements of their operations. Numerous
ERP software programmes are essential to businesses because they enable
resource planning by integrating all the operations required to manage their
operations into a single system. A software system for Enterprise Resource
Planning (ERP) can also incorporate planning, inventory buying, sales,
marketing, finance, and other functions. With the ERP system, Different
departments of an organisation can interact with each other and are aware
about any changes in the information and structure of the ERP system.
PAGE 211
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
212 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
5. (b), (c), (d), (a), (c)
6. Efficient Customer Feedback technique
7. (c) Creating a program to attract and retain the right clients and
meet the needs of valued customers
8. True
9. Customer Satisfaction
10. (d) All of the above
11. (c) Information system
12. (a) Supply Chain Management
13. (b) Customers
8.9 References
Caserio, C., & Trucco, S. (2018). Enterprise Resource Planning
and Business Intelligence Systems for Information Quality. Cham,
Switzerland: Springer.
PAGE 213
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
214 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
9
Information Infrastructure
Shikha Singh
Research Scholar
IMSAR
Maharshi Dayanand University
Email-Id: [email protected]
STRUCTURE
9.1 Learning Objectives
9.2 Introduction
9.3 Planning Building IT Architecture
9.4 Information Infrastructure
9.5 Legal Issues and National Information Infrastructure
9.6 Summary
9.7 Answers to In-Text Questions
9.8 Self-Assessment Questions
9.9 References
9.10 Suggested Readings
PAGE 215
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
9.2 Introduction
An organization-wide, centrally controlled IT infrastructure consists of
technological elements (such as communication technologies and data) that
experts in their fields can employ to provide common, shared services.
Then, in accordance with the standards set forth in the IT architecture,
these services are offered for common and standard, company-wide, and
business-specific applications at the needed service levels. The strategic
and operational significance of information technology in a corporation is
now beyond question. As the twenty-first century progresses, numerous
businesses throughout the world are determined to transform themselves
into powerful international corporations by making significant investments
in international e-business, e-commerce, and other IT efforts. Therefore, it
is imperative that business managers and other professionals comprehend
how to oversee this crucial organizational task. The term “IT infrastruc-
ture” is used to describe the network of interconnected computer systems
that provides the backbone for various types of corporate information
systems. A firm’s entire business units or the entire company may invest
in hardware, software, and services including consulting, training, and
education as part of its IT infrastructure. The foundation of a company’s
management of internal business operations, interactions with vendors,
and customer service is its IT infrastructure.
Information technology has aided in the advancement of materials
through lower costs, quicker delivery, greater product quality, features,
and functions, as well as a wider range of consumer product selections.
Therefore, the question of whether it is moral to utilize IT so passion-
ately and accept its bad effects arises. The challenge, then, is how to
ethically handle societal concerns while weighing the positive effects of
IT against its negative effects.
216 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
Figure 9.1
Server: This level typically has hardware and is positioned in the center
of the organization, providing the fundamental computing power.
Middleware: The infrastructure needed to keep the hardware functioning
and the information flowing is provided by this level, which is typically
software and resides atop the server level.
Client: This level, which brings together hardware and software, gives
users access to the capabilities and lets them access the information that
a firm has available.
PAGE 217
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
IN-TEXT QUESTIONS
1. The usage of IT to support the strategic business priorities of
the company, under the direction of the CEO (chief executive
officer) and CTO (chief technology officer). (True/False)
2. Client level combines hardware and software that gives users
access to the capabilities and lets them access the information
that a firm has available. (True/False)
3. The task of overseeing the work of IT experts, who are often
grouped into various project teams and other organizational
subunits, is shared by the CIO and IT managers. (True/False)
218 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 219
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
9.4 Information Infrastructure
Companies and enterprises are beginning to appreciate the significance of
IT infrastructure more and more. The academic literature is replete with
research and studies on IT infrastructure, adding to the growing interest
in the topic among practitioners. The value and return that businesses
may obtain from investing in and utilizing IT infrastructure will improve
and increase the earlier they do so.
9.4.1 Definition of Information Infrastructure
The IT infrastructure is made up of the various hardware and software
programs needed to run the complete business. However, a group of
corporate-wide services is also a part of an IT infrastructure that man-
ages budgets and that includes both technical and human resources. The
following are some of these services:
Computing services that connect employees, clients, and suppliers
into a unified digital environment are provided via computing
platforms such as large mainframes, midrange computers, desktop
and laptop computers, mobile handheld devices, and remote cloud
computing services.
Telecommunications services that use data, audio, and video to link
employees, customers, and suppliers.
Application software services, such as online software services, that
provide enterprise-wide functionality including customer relationship
management, supply chain management, enterprise resource planning,
and knowledge management systems that are shared by all business
divisions, services for managing, storing, and offering the ability
to analyze company data.
Services for the development and operation of physical installations
needed for computing, telecommunications, and data management.
IT management services that include infrastructure planning and
development, business unit coordination for IT services, accounting
management for IT expenditure, and project management services.
IT standards services that give the company and its business units
guidelines on how, when, and with which information technology
will be employed.
220 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 221
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
222 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
shared data, stores it, and provides host websites. The term “server” can Notes
apply to either the software itself or the physical machine that runs the
program that makes up the network. The server might be a mainframe,
but in current times, server computers are typically more efficient versions
of personal computers constructed on inexpensive chips and frequently
employing multiple processors in a single computer unit or server racks.
In the simplest client/server network, in a client-server setup, work is split
between the client computer and the server computer. This is a two-tier
client/server design. Small businesses often use straightforward client/
server networks, but most large corporations use more intricate, multitiered
(commonly referred to as N-tier, see Figure 9.2) client/server architectures
in which the workload of the network as a whole is distributed across
various levels of servers according to the type of service sought.
PAGE 223
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes In order to enable seamless information exchange within the business and
between the company and other organizations, the resulting IT infrastructure
connects various pieces of computer hardware, as well as smaller networks
to a larger enterprise network. It is capable of establishing connections
between numerous types of computing equipment, including mainframes,
servers, desktops, and digital phones, as well as with public infrastruc-
tures like the phone network, the Internet, and public communications
networks. Software, such as enterprise apps and Web services, is also
needed for the enterprise infrastructure to connect disparate applications
and allow data to freely move across various business areas.
The Era of Mobile and Cloud Computing (2000 to Present)
The client/server approach has been advanced toward the “Model for
Cloud Computing” as a result of the Internet’s expanding bandwidth
power. A computing model known as “cloud computing” gives users on-
line access to a shared pool of computer resources, including computers,
storage, software, and services. These “clouds” of computer resources are
accessible from any connected device and place as needed.
As personal and business computing progressively shifts to mobile plat-
forms, dozens or perhaps tens of millions of computers are housed in
cloud data centres that may be accessed by desktop, laptop, tablet, en-
tertainment center, smartphone, and other client machines connected to
the Internet. Large-scale cloud computing facilities are run by IBM, HP,
Amazon, and Dell. These facilities offer high-speed Internet connections,
computing capacity, and data storage to businesses that want to oversee
their IT systems remotely. Software is sold as a service that is offered
through the Internet by companies like Google, Microsoft, Amazon, SAP,
Oracle, and Salesforce.com.
224 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 225
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
226 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 227
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Users of information systems have been searching for novel approaches
and state-of-the-art technology to deal with the serious repercussions of
the problems they face. Individuals who use computer systems must take
precautions to keep themselves safe in addition to using new methods and
technology to solve these issues. Individuals who use computer systems
can safeguard themselves against all current issues with a few specific
methods. Information systems’ future is uncertain because it’s up to the
users to decide. The users will encounter numerous unforeseen issues on
account of this unexpectedness.
The term “information system security” refers to the safeguards put in
place to prevent the system from being hacked or otherwise compromised
in any way, even by accidental or malicious use.
Information systems’ security primarily consists of two components:
Use of Security in Information Technology: This involves protecting
the system from malicious cyber-attacks that aim to obtain sensitive
private information or take over internal systems.
Data Security: Protecting the integrity of data in the event of
emergencies such as natural catastrophes, computer/server problems,
physical theft, etc. For such issues, data backups are typically kept
off-site.
228 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 229
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
230 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 231
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes The following summarizes the essential requirements that the NII
must meet:
(1) Every town in the nation with a population of more than five lakh
people should be connected by a computer network called the NII.
This network will be known as IndiaNET.
(2) Users should be charged for access to the network regardless of the
physical location of the destinations they reach over the network.
(3) IndiaNET should supply “leased lines” to retail users, who should
be charged a fixed monthly fee rather than a cost per unit of
consumption for the connection.
(4) No limitations should be placed on how these lines are used, i.e.,
on the applications users discover for this computer connectivity.
The pricing strategies chosen will determine if the NII is successful in
having considerable influence on the nation. Due to exorbitant costs and
usage limitations, several telecom initiatives in the nation have failed
[Shah 1997]. A clear departure from conventional beliefs in India’s
telecom sector is required as it relates to price if the NII is to have its
full economic impact. Delivering networking to Indian residents and
businesses at costs that are competitive with global best practices should
be IndiaNET’s primary goal. The above-suggested rate of Rs. 35,000 per
month for 2 Mb/s is standard practice around the world.
This kind of pricing for a “pure data conduit,” with no limitations on how
that pipe is utilized, will mark a significant advancement for the Indian
telecom industry. A large portion of India’s economy will find long-haul
computer networking to be a feasible alternative thanks to these prices.
Only the most telecom-hungry segment of India’s corporate sector can yet
afford the high-capacity telecommunications infrastructure there. We may
anticipate that institutions like schools, libraries, co-ops, governments,
municipalities, non-profit organizations, etc. will all be able to take ad-
vantage of the network for sharing and consuming information as well
as communicating with one another for pricing like Rs. 35,000 for each
month for 2 Mb/s. Many of these enterprises might not require 2 Mb/s
in its entirety and instead buy portions of it from resellers.
232 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
ACTIVITY 2 Notes
9.6 Summary
Although IT infrastructure is described in a variety of ways, the
key components always remain the same.
Components of IT infrastructure include Web-based platforms,
Hardware platforms for computers, Platform Operating Systems,
Business Software Programs, Network/Telecommunications, Consultants
and System Integrators, and Storage and Management of Data.
Information Technology Architecture within an organization has an
impact on three levels, including the server, middleware, and client.
The design concept or layout for the IT architecture produced by
the corporate strategy planning phase consists of a Platform for
technology, Data Resources, and the architecture of applications.
Human IT infrastructure relies on technology components as its
base to deliver the necessary IT services for business requirements.
Today’s IT infrastructure in businesses is the result of almost fifty
years of advancements in computer platforms. There are five stages
to this evolution, each of which represents a distinct arrangement
of the computer resources and infrastructure.
Malware is simply defined as malicious software, which might
include intrusive computer code or anything else created with the
intention of damaging a system.
Malware can be categorized into two groups: Infection Techniques
and Malware Behavior.
The High-Performance Computing Act of 1991 gave rise to the National
Information Infrastructure (NII). It was a phrase in communications
policy that Vice President Al Gore helped popularize during the
Clinton Presidency.
PAGE 233
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
9.7 Answers to In-Text Questions
1. False
2. True
3. True
4. Automated
5. Mainframe
9.9 References
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. (2014). Management information systems.
Pearson Education Limited.
Bishop, A. (1993). The National Information Infrastructure: Policy
Trends and Issues. ERIC Clearinghouse on Information and Technology.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
234 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 235
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
10
Strategic Information
System and Technology
Shikha Singh
Research Scholar
IMSAR
Maharshi Dayanand University
Email-Id: [email protected]
STRUCTURE
10.1 Learning Objectives
10.2 Introduction
10.3 IT Leadership
10.4 IS Strategy Planning
10.5 IS Strategy and Effect of IT on Competition
10.6 Re-Engineering Work Processes for IT Application
10.7 Case on the Strategic Use of IT in Different Industries
10.8 Summary
10.9 Answers to In-Text Questions
10.10 Self-Assessment Questions
10.11 References
10.12 Suggested Readings
236 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
10.2 Introduction
Every organization needs strong IT leadership. Companies gain from
having a senior leader who can use technological advancements in the
sector and inspire employees both inside and outside the IT department.
A company’s core competency must be technology, and the CIO needs to
sit on the board with a voice as powerful as any other executive. More
IT executives are ascending to the top of the company nowadays. A wise
CIO would connect with the rest of the business and take the initiative
to lead the corporation into a technology-equipped future rather than
accepting the position due to internal concerns. This chapter will discuss
the significance of IT leadership.
This chapter will show that information systems are more than just a
collection of technologies. These systems help companies make good
decisions, work well together, and run their businesses efficiently. The
way businesses compete may alter as a result of information technology.
Numerous competitive strategies can be supported by information tech-
nologies. They can aid a company in reducing costs, differentiating and
innovating its goods and services, fostering growth, forging alliances,
securing long-term relationships with clients and suppliers, putting up
barriers to entry, raising switching costs, and maximizing its investment
in IT resources. Therefore, information technology can aid a company
in gaining a competitive edge in its interactions with clients, partners,
suppliers, rivals, newcomers, and manufacturers of replacement goods.
Business Process Reengineering (BPR) is often referred to as “core pro-
cess redesign,” “new industrial engineering,” or “working smarter.” All of
them suggest the same idea, which centers on merging business process
redesign with the use of Information Technologies (IT) to support the
reengineering activity.
Before initiating a reengineering project, businesses must fulfil certain
prerequisites to ensure its thoroughness and effectiveness. Initially, the
PAGE 237
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
10.3 IT Leadership
Your ability to adapt to an ambiguous and dynamic digital environment
will be a key factor in determining how successful your firm is in the
digital age. It will also entail utilizing the chances for organizational
development given by technological advancements and digital trends. To
put it another way, outstanding IT (information technology) leadership
will be essential for your success.
The value of having knowledgeable and creative IT leadership is becoming
more and more apparent as businesses and industries continue to change
as a result of adjusting to technology breakthroughs and the trends that
result from them.
No matter how big or small your business is, if you make and use a
successful digital transformation strategy, your chances of success will
probably go up.
238 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 239
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Information Seeker: It’s not an option to keep up with the most
recent technological advancements. Change is inevitable, and when it
does, you must adjust, just as with the weather. Given that company
executives cannot keep up with everything, trend spotting has become
a crucial part of IT leadership. IT leadership needs to stay on top of
emerging trends and technologies that give them a clear competitive
edge. When combined with distinctive business methods, such an
advantage could result in a high return on investment and support
brand innovation. Current dangers and vulnerabilities that can utterly
disrupt company strategy and profitability must be constantly kept
at the forefront of IT leadership’s mind. Every company’s worst
nightmare is fraud and lost data as a result of cyber-attacks.
Conciliator and Negotiator: Technology-related decisions need to
be made frequently in today’s world. These can include decisions
on security, data storage, choosing a vendor, etc. The negotiation,
acquisition, and execution of each of these elements are required.
Another important aspect of IT leadership is finding a way to balance
competing business needs with the demands of technology. Leadership
in IT is often involved in budget and spending negotiations.
Information Manager: Every new invention and piece of technology
has unique data components that need to be recorded and handled.
It is crucial for IT leaders to keep up with the latest developments
and innovations. Knowing what data is internal to the firm and
what data is external might help reduce risk.
Powerful Leader: Being knowledgeable about infrastructure’s
technical components is only one piece of the puzzle. The IT
professional needs to be able to take charge. IT can experience the
negative effects of weak leadership, just like business operations.
To establish and maintain a comfortable workplace while ensuring
that the company is aware of all elements of IT, personnel must
possess excellent leadership abilities. The business must be well-
understood by IT leaders as well.
Some other responsibilities of IT leadership are:
Creating a thorough organizational transformation plan.
Managing and supervising the tasks essential for the strategy’s
effective execution.
240 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 241
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
242 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 243
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
244 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 245
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
IN-TEXT QUESTIONS
6. Developing strategies to differentiate a company’s products
and services from those of its competitors or lessening the
__________ advantages of competitors.
7. __________ strategies aid in establishing new business relationships
and connections with customers, suppliers, competitors, consultants,
and other companies.
PAGE 247
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
248 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 249
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
There are yet more ways that information technology can be applied
to the implementation of competitive strategy
Create inter-enterprise information systems that are efficient and
convenient, preventing customers or suppliers from switching.
Invest heavily in cutting-edge IT programs that create barriers to
entry for outsiders or competitors in the business.
Include IT components in goods and services to make it more
challenging for customers to switch to alternatives.
Turn operational investments in IS personnel, equipment, software,
databases, and networks into strategic applications.
250 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
processes have two crucial qualities: (i) They have clients, either internal Notes
or external; and (ii) they have cross-organizational borders, i.e., they take
place across or between organizational subunits. The value chain method
suggested by Porter and Millar is one method for identifying business
processes in an organization (1985).
The beginning and end points, interfaces, and organizational units involved
in a process—particularly the customer unit—are typically identified.
Process owners ought to be assigned to high-impact processes.
PAGE 251
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Along with the use of IT, many businesses have discovered that organiza-
tional redesign methodologies are a key enabler of reengineering. Utilizing
self-directed cross-functional or multidisciplinary process teams is one
typical strategy, for instance. During the product development process,
a team of workers from several departments or specialties, such as engi-
neering, marketing, customer support, and manufacturing, may collaborate.
252 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
reengineering this process using ERP software and Web-enabled e-busi- Notes
ness and e-commerce platforms.
Figure 10.3 shows the order management process consists of several busi-
ness processes and crosses the boundaries of traditional business functions.
CASE STUDY 1
LG Electronics
LG makes TVs, PCs, laptops, CD drives, DVD players, microwaves,
refrigerators, and cosmetics. In the early 1950s, we were a chemical
company that made unbreakable cosmetic caps. In 1958, a Korean
firm called Goldstar was founded and manufactured Korea’s first
radio in 1959. After this, we became consumer electronics majors.
PAGE 253
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
254 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 255
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Strategic use of IT and the Internet has made PWL an E-company
where IT and the Internet are business drivers and enablers. Manage-
ment says E-Enterprise solutions are key to the company’s success.
PWL’s weekly business, operating, and client meetings now have
online MIS support.
Questions:
1. What prompted PWL to deploy SAP-ERP?
2. What new initiatives are available for PWL thanks to E-Enterprise?
3. Explain how SAP-ERP improved PWL’s efficiency.
4. Explain how IT-enabled E-Enterprise has benefited PWL.
5. Describe PWL’s MIS role. Identify each level’s PWL information
system.
6. Who uses MIS in E-business? Determine user information needs.
10.8 Summary
IT leadership is the management of an organization’s IT infrastructure,
software, applications, and resources by an individual or group of
individuals in senior roles. This serves as the framework for the
organization’s business technology strategy and goals.
IT leadership needs to possess: excellent technical abilities and
knowledge of market trends and best practices to provide continuous
service delivery and operational stability.
The role of IT leadership includes Information Seeker, Conciliator
and negotiator, Information manager, and Powerful leader for the
successful transformation of Businesses.
A Strategic Information System (SIS) is a system that aids organizations
in changing or otherwise modifying their corporate structure and/
or business strategy.
By enhancing the quantity of information that is available to all
employees, information systems can assist managers and employees in
working more productively and efficiently in this new environment.
256 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
More and more often, decisions are made at every level of an Notes
organization. Managers may make more tactical decisions about
how their particular department may contribute most effectively to
the overall business objectives while the Board of Directors may
make the big strategic decisions regarding investments and the
direction of future growth.
According to Michael Porter’s classic model of competition, any
company that wants to succeed and survive must develop and
implement strategies to combat five different threats: (1) rivalry
among competitors within the same industry, (2) new entrants
into an industry and its markets, (3) substitute products that might
capture market share, (4) customer bargaining power, and (5) supplier
bargaining power.
Five key competitive strategies are cost leadership, differentiation,
innovation, growth, and alliance.
Information technology can help a corporation implement the five key
competitive strategies by lowering costs, differentiating, Innovating,
Encourage Growth, and Create Alliances.
Reengineering is fundamentally rethinking and completely redesigning
business processes in order to achieve significant gains in crucial,
modern performance metrics like cost, quality, service, and speed.
With the use of information technology, the bulk of business
processes has been re-engineered.
PAGE 257
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes
10.10 Self-Assessment Questions
1. How can Porter’s model of competitive forces assist businesses in
creating competitive information systems?
2. How can information systems help organizations gain a competitive
edge by using synergies, core strengths, and network-based strategies?
3. Describe how the Internet has changed competitive forces and
competitive advantage.
4. Explain why aligning IT with business objectives is essential for the
strategic use of systems.
5. Give examples to illustrate how each of these competitive strategies
can be supported by information systems.
6. It has been said that the management of cutting-edge merchants like
Dell and Walmart gives them an advantage over their rivals rather
than technology. In your opinion? Whether or not.
7. Discuss the role of IT Leadership.
8. What are the recent trends in IT Leadership that help in transforming
businesses?
9. Describe BPR and its implications.
10. What strategic role can information play in business process
reengineering?
10.11 References
O’Brien, J., & O’Brien, J. (1994). Introduction to information
systems. Burr Ridge, Ill.: Irwin.
Laudon, K., & Laudon, J. (2014). Management information systems.
Pearson Education Limited.
Jawadekar, W. (2015). Management information systems. New Delhi:
McGraw Hill Education (India).
Post, G., & Anderson, D. (2006). Management information systems.
Boston, Mass.: McGraw Hill/Irwin.
Blokdyk, G. (2022). Information and Technology Leadership A
Complete Guide (p. 319). 5STARCooks. (2022). Retrieved from
258 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
https://study.com/academy/lesson/the-role-of-it-leadership-in-modern- Notes
organizations.html
What is IT leadership (information technology leadership)? - Definition
from WhatIs.com. (2022). Retrieved from https://www.techtarget.com/
searchcio/definition/IT-leadership-information-technology-leadership
What is IT Leadership? Roles, Trends, and Transforming Culture.
(2022). Retrieved from https://www.liquidweb.com/blog/it-leadership/
PAGE 259
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 261
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Competitive Forces Model: This model provides a general view of the
firm, its competitors, and the firm’s environment.
Competitive Forces: Shape the structure of competition in its industry.
Competitive Strategies: It is a long-term action plan of a company that
is directed to gain a competitive advantage over its rivals.
Conciliator: A person who acts as a mediator between two disputing
people or groups.
Core Competency: Activity at which a firm excels as a world-class leader.
Cost: The value of money that has been used up to produce something
or deliver a service, & hence is not available for use anymore.
CRM: CRM comprises practices and tools for managing client, customer,
and business partner interactions in marketing, sales, and service, regard-
less of communication channel. CRM emphasises customer acquisition,
retention, and growth.
Database Maintenance: The process of updating a database by adding,
modifying, or deleting data.
Database Management Approach: A technique for storing and data
processing in which individual files are merged into a shared pool, or
database, of information accessible to diverse application programs and
users of the product for processing and data extraction.
Database Management System (DBMS): A set of computer programs
that controls the creation, maintenance, and utilization of the databases
of an organization.
Database: Database refers to an organized collection of data used by
application software in an information system. Examples of databases
include Access, MySQL, etc.
Decision Support Systems (DSS): DSS are information systems that
help organizations make decisions. DSS is also used in organizational
planning and error handling.
Documentation: Descriptions of how an information system works from
either a technical or end-user standpoint.
Electronic Data Interchange (EDI): The direct computer to computer
exchange between two organizations of standard business transactions,
such as orders, shipment instructions, or payments.
262 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 263
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
Notes Hybrid Cloud: Computing model where firms use both their own IT
infrastructure and also public cloud computing services.
Information System: (I) A collection of people, methods, and resources
within an organization that collects, transforms, and disseminates infor-
mation. (II) A computer program takes as its input various types of data
and outputs some form of useful knowledge.
Information Technology (IT): Computer-based information systems uti-
lize hardware, application, telecommunications, data analytics, and more
information processing technologies.
Information Technology Architecture: An abstract plan detailing the
IT department’s structure, data resources, application architecture, and
other related aspects.
Inter-Enterprise Information Systems: Organized internally into clusters
of process and cross-functional teams linked by intranets.
Inter-organizational Information Systems: Information systems that
link one organization to another, such as a company and its clients and
vendors.
ITeS: Range of activities that make use of information technology to
boost an organization’s productivity.
Leadership: The ability to inspire a team to achieve a certain goal.
Ledger: A physical book or electronic document that contains a record
of all business transactions. Financial statement of a company is prepared
using summary total in ledgers.
Management: The act of overseeing something, often known as the di-
rection or supervision of something (like business).
Methodology: A well-defined method of doing a task or developing some
product. It lays down the set of steps to be followed.
Multi-Factor Authentication: A level of security that must be passed to
get inside any system for accessing data.
Network: A network is a specific kind of relationship joining a particular
group of people, objects, or events.
Operational Information: It refers to day-to-day activities and is ben-
eficial for controlling repetitious operations.
264 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
PAGE 265
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi
266 PAGE
© Department of Distance & Continuing Education, Campus of Open Learning,
School of Open Learning, University of Delhi