Documentos de Académico
Documentos de Profesional
Documentos de Cultura
CBMS4303
Management
Information System
INTRODUCTION
CBMS4303 Management Information System is one of the courses offered by the
Faculty of Science and Technology at Open University Malaysia. This course is
worth 3 credit hours and should be covered over 8 to 14 weeks.
COURSE AUDIENCE
This course is offered to all learners taking the Bachelor of Information
Technology, Bachelor of Business and selected Science and Technology
programmes. The course provides learners with a firm foundation in analysing a
wide range of management information systems. This course guides learners
systematically in acquiring the analytical and design skills required in grasping
fundamental concepts of management information systems.
As an open and distance learner, you should be able to learn independently and
optimise the learning modes and environment available to you. Before you begin
this course, please ensure that you have the right course materials and
understand the course requirements as well as how the course is conducted.
STUDY SCHEDULE
It is a standard OUM practice that learners accumulate 40 study hours for every
credit hour. As such, for a three-credit hour course, you are expected to spend
120 study hours. Table 1 gives an estimation of how the 120 study hours can be
accumulated.
Study
Study Activities
Hours
Briefly go through the course content and participate in initial
3
discussions
Study the module 60
Attend 3 to 5 tutorial sessions 10
Online participation 12
Revision 15
Assignment(s), test(s) and examination(s) 20
TOTAL STUDY HOURS 120
COURSE OUTCOMES
By the end of this course, you should be able to:
COURSE SYNOPSIS
This course is divided into 10 topics. The synopsis for each topic is presented
below:
Topic 2 introduces types of models and system elements, such as the system
standard. Generally, the system standard is the performance level achieved by
the system output. Managers will ensure the system standard is fulfilled by
comparing the output system and the system standard. You will also be
introduced to two management strategies known as management through
exception and critical success factors (CSF). The system approach will also be
introduced at the end of the topic.
Topic 5 introduces you to the Decision Support System (DSS). In this topic, we
will discuss the decision-making process and how DSS helps managers make
effective decisions. You will recognise DSS as a system that provides
communication facilities which include information in helping consumers solve
problems. You will also learn the format or structured information that results
from DSS such as special reports and periodic report formats.
anticipation about the status and environment of the company in supporting the
administrative tasks and decision-making process of executives. You will learn
how an EIS helps managers in their work and the decision-making process.
Topic 7 addresses one of the branches of artificial intelligence, the expert system.
The expert system is also known as the knowledge-based system. An expert
system can be used to solve many problems that occur in an organisation such as
complex decision making. The expert system comprises many types of expert
systems based on rules, frames or bases on fuzzy sets. In this topic, you will be
exposed to the most popular expert system which is based on rules.
Learning Outcomes: This section refers to what you should achieve after you
have completely covered a topic. As you go through each topic, you should
frequently refer to these learning outcomes. By doing this, you can continuously
gauge your understanding of the topic.
component, try to reflect on what you have already learnt thus far. By attempting
to answer the question, you should be able to gauge how well you have
understood the sub-section(s). Most of the time, the answers to the questions can
be found directly from the module itself.
Summary: You will find this component at the end of each topic. This component
helps you to recap the whole topic. By going through the summary, you should
be able to gauge your knowledge retention level. Should you find points in the
summary that you do not fully understand, it would be a good idea for you to
revisit the details in the module.
Key Terms: This component can be found at the end of each topic. You should go
through this component to remind yourself of important terms or jargon used
throughout the module. Should you find terms here that you are not able to
explain, you should look for the terms in the module.
PRIOR KNOWLEDGE
No prior knowledge is needed for this course.
ASSESSMENT METHOD
Please refer to myINSPIRE.
REFERENCES
Boddy, D., Boonstra, A., & Kennedy, G. (2005). Managing information systems:
An organisational perspective (2nd ed.). Harlow: Pearson.
Kotter, J. (1982). What effective general managers really do. Harvard Business
Review, 60 (2), 157-169.
McLeod, R., & Schell, G. (2007). Management information systems (10th ed.).
New Jersey: Prentice Hall.
Turban, E., Sharda, R., & Delen, D. (2010). Decision support systems and business
intelligence systems (9th ed.). New Jersey: Prentice Hall.
INTRODUCTION
Before we start, let us look at the following situation:
Can you think of a way to make your work easier? How can you compile all the
information provided by these shops? This is where information system comes
into the picture. Since you have all the information you need (such as sales
figures in an Excel sheet), all you need is a system to process these information
instead of you processing it manually. This system is what we call information
system.
In this topic, we will discuss the the differences between data and information
and knowledge, and the meaning of information technology and information
system. This topic will also elaborate on the importance of information
management, the types of users and their respective management and the
emerging trends in information system. Let us get started!
Data and information are used together in any field. However, both have
different meanings.
Data is the basic fact or raw fact which consists of texts, diagrams, graphics,
images, and audio and video clips which are meaningless.
One example of data is the students' list which consists of name, matrix number,
sex, course and address. Can you name a few examples of data?
In simpler words, information is simply the data which has been processed in
order to be meaningful to the users. Process here means the operation to change
the type and content of the data. Data in the studentsÊ list can be processed to be
generated as a report or graph that shows the percentage of female students as
compared to male students who are registered in the university; or the
percentage of students according to the courses offered by the university.
Other data processing operations are arithmetic operations, data summary, time
scheduling and so on. The information processor can be the computer
components, non-computer components or a combination of both, which can
convert data into information.
Now that you are clear about data and information, let us shift our discussion to
knowledge. What is knowledge? Look at the definition given in the following:
Let us look at Figure 1.1, which shows the relationship between data, information
and knowledge.
SELF-CHECK 1.1
1. In your own words, define data, information and knowledge.
2. Explain the relationship between data, information and knowledge
based on Figure 1.1.
We have seen the meaning of system. What about information system? Well, here
it is:
Besides that, information system may also support managers and staff to analyse
problems, visualise complex subjects and new products and services.
In this age, the success of a business depends on the information system. Many
organisations today use information systems to offer services with greater
satisfaction to customers, to access a wider range of information, to handle
business changes at a greater speed and to increase the productivity of workers.
Based on a number of research, an effective information system should be able to
exceed customer expectations and fulfil business needs.
interconnected? Look at Figure 1.4, which illustrates the main activities that take
part in an information system. Can you name the three main activities?
(a) Input
Input gathers or captures raw and unprocessed data from within the
organisation or from its external sources.
(b) Processing
Processing converts this raw input into a meaningful form.
(c) Output
Output transfers the processed information to the organisationÊs managers
and staff who will use it or to the functions for which it is used.
However, you must remember that an information system does not only contain
data and information. There are also other elements inside the system, which are
related and in support of one another. The presence of these related elements
makes information more useful whereby it can be made available, processed,
distributed, manipulated, saved and so on. This combination gives rise to a
system, which is orderly and thus called an "Information System".
ACTIVITY 1.1
Search the Internet, in order to find out how management information
system is related to an organisationÊs business. You may use the
keywords such as „MIS‰ AND „business‰ or „information system‰ AND
„business operations‰. Discuss your findings with your coursemates.
SELF-CHECK 1.2
1. Give the definition of information system.
2. What are the components of an information system?
3. How does information system help businesses? Give two
examples.
Resources are owned and prepared, so they can be used when needed. Normally,
the preparation processes involve the transformation of raw materials into usable
materials, for example, assembling a computer and training the workers. After
this process, managers will try to optimise the usage of the resources. They can
reduce the rest time of the resources to a minimum level as well as ensure the
resources are utilised at the most efficient level. Subsequently, the managers will
change the resources at a suitable time before they become obsolete or inefficient.
SELF-CHECK 1.3
Users come from many categories and designations. They can either be from
inside or outside a firm. When the information system was first introduced, the
users were mainly clerks in accounts departments whereby a computer was used
only for accounting applications such as payroll, inventory and billing.
Information generated by the accounting applications was then used by the
firm's manager.
SELF-CHECK 1.4
Table 1.1: Example of Job Scope for Various Management Levels of a Firm
Management
Job Scope Designation
Level
Top To prepare long-term plans (5-10-20 years). CEO,
President,
Vice President
Middle To prepare mid-term plans (1 month ă 1 year). Branch
To plan actions for the long term and to Manager,
ensure the firmÊs objectives are achieved. Director,
Division
Leader
Bottom To ensure the planning done by top and Head of
middle management levels are implemented. Department,
Supervisor,
Coordinator,
Project Leader
SELF-CHECK 1.5
ACTIVITY 1.2
SELF-CHECK 1.6
Look at Figure 1.5 again. Briefly explain what you understand about
the needs of information in every level of management in decision
making?
Look at Figure 1.7, which shows the influence of the respective level of
management towards the focus on implementing management functions;
management functions can provide guidance in developing an information
system.
Figure 1.7: The influence of the management levels towards the focus on implementing
management functions
Interpersonal The manager is seen as the leader and mediator of the workers.
Role The manager is the role model for the workers.
The manager monitors the activities and work done by the
workers and organisation, distributes the tasks and resources, as
well as is the spokesperson for the workers with external
Informational parties.
Role
For example, the manager will provide feedback from the upper
management or customers regarding the customer friendly
service that is provided by the workers.
The manager puts in a lot of effort, handles problems,
Decision-
distributes resources, as well as holds negotiations for the
making Role
workers and external parties.
Managers who intend to solve a problem must first go through the relevant
processes. These processes involve decision making. Decision making refers
to the selection of solution alternatives, which would have been identified
earlier. A decision is taken after the alternatives have been evaluated.
Usually, the solution alternatives for every problem are identified in order
to get a better solution.
ACTIVITY 1.3
ACTIVITY 1.4
Computer and information literacy do not depend on each other even though
they are related and complement each other. Some managers are information
literate yet lack computer literacy. However, it would be ideal if managers
acquire both skills.
TOTAL 22,172,900
individual can handle all tasks related to the information system while in a huge
firm, there might be many units in the IS department and many employees to
execute specific work for every unit. Figure 1.9 shows the general organisational
chart for an IS department.
SELF-CHECK 1.7
Basically, there are five categories of information experts, namely, the system
analyst, database administrator, network administrator, programmer and
operator.
(a) System analysts (SA) develop a new system or upgrade the current system.
System analysts will define a problem, document the analysis, create the
system design and develop the recommended system. Interaction and
cooperation from the user and the management is needed in developing a
system which fulfils the user's needs.
(b) Database administrators develop and maintain the database, which consists
of the required data for producing information for users.
(c) Network administrators develop and maintain data communication which
connects and allows the sharing of computer resources. Internet
development has created new experts in this field, known as Web masters
or Web designers.
(d) Programmers write the programming codes in the programming language
based on the design documentation, earlier written by the system analysts.
The programmers also test the written program to ensure it is bug-free from
any syntaxes and logical errors.
(e) Computer operators operate large-scale computers such as the main
framework and mini computer. They operate the routine jobs, operate the
printers' data storage and help users troubleshoot.
ACTIVITY 1.5
Are there any organisations that do not have any of the information
experts mentioned in Subtopic 1.5.1? List the effects or disadvantages of
such a situation.
(b) Used with network and Internet technology, especially in the process of
obtaining external sources or information
For example, in strategic planning, the organisation can obtain information
about its competitors that is on the Internet. The organisation can also look
at the reports and government mission.
(c) Allow the use of multimedia elements like text, graphics, audio, video and
animation. Furthermore, the addition of artificial intelligence elements can
expedite and facilitate mankindÊs tasks
For example, in the car design and production industry, the information
system is combined with multimedia technology and artificial intelligence
ACTIVITY 1.6
SELF-CHECK 1.8
Data is a raw fact which is meaningless while information is the data that has
been processed into meaningful form. Knowledge is derived from
information in the same way information is derived from data.
Information technology and information system are major enabling tools for
organisations to develop new products and services, as well as creating new
business models.
The unit in a firm responsible for developing and maintaining the system is
known as the information system department. The department has
information experts, namely, the system analyst, database administrator,
network administrator, programmer and computer operator.
INTRODUCTION
In this topic, you will be introduced to system concept, which is important for
modelling and problem solving. This topic will introduce models which can
assist managers in solving problems, namely, physical, narrative, graphic and
mathematical models. You will see more details of the general system model
elements which include the physical system and conceptual system. You will also
be introduced to another system element called standard. Generally, standard is
the performance level achieved by the system output. Managers ensure the
system standard is fulfilled by comparing the output system and standard.
Actions can be taken if the output is more or less than the standard.
overall system or part of the system in detail, and its relationship with other parts
of the system. New systems are developed to solve problems which exist in the
current system. Let us look at the system concept in the context of the
management information systems.
To understand this better, let us look at a few examples. The human body has
several systems which possess control mechanisms. Note how our respiratory
systems make us sweat in the hot weather so that our skin becomes cooler, while
our hair rises to trap more heat in the cold weather. Have you ever experienced
food poisoning before? If yes, you will remember how frequently you had to go
to the toilet, or how you vomitted all day as your digestive system flushed out
the toxins in the body. The reaction occurs because the control mechanism in our
body system changes the normal transformation process.
Now, look back at Figure 2.1. In a system, the control mechanism is connected by
a feedback loop (in the arrow flow). The control mechanism monitors the
system's performance by comparing the feedback signal with the systemÊs
objective. If the system output achieves the objective, then the system will be in a
stable condition. In the unlikely event that the system output does not meet the
system's objective, a signal is sent to the system input so that necessary action can
be taken to change the system operations.
Now that you understand what a system is and also the elements that make up
the system, let us look at the two types of system.
The closed-loop system has three control components, namely, the control
mechanism, feedback loop and objective, as illustrated in Figure 2.1. An
example of this system is the budgetary control system in an organisation
in which during the budget presentation, the issues are communicated
through the feedback system and each expenditure is compared with the
objectives through the control mechanism.
Most of the systems that exist are open systems. An example is the election
voting system which counts voting input from voters around the country
and declares the results back to them.
Copyright © Open University Malaysia (OUM)
TOPIC 2 MANAGERS AND SYSTEM CONCEPT 31
(c) Subsystem
A system has many stages. For instance, the human body has many systems
such as the respiratory system and the digestive system, which, in turn,
have many subsystems that can be further divided up to a single cell. For
example, a system in a clinic has many subsystems, which can be divided
into the simplest form. A system in a clinic may have the registration,
appointment and medical treatment subsystems. Figure 2.3 shows a system
that has many subsystems.
SELF-CHECK 2.1
In your opinion, what is the relationship between management and
the management information system?
2.2 MODEL
A model is a representation of things; like an object, a concept or real activity known
as entity. The model is used to represent problems, which need to be solved in a
form that is easily understood. Types of models and their usages are as follows:
ACTIVITY 2.1
Visit the website http://en.wikipedia.org/wiki/Entity-relationship_model
and http://en.wikipedia.org/wiki/Data_flow_diagram. Based on the
website, discuss the details on how the Data Flow Diagram (DFD) and
Entity Relationship Diagram (ERD) are developed for an information
system.
ACTIVITY 2.2
Based on the four types of models, develop a diagram which links all
the models. Compare the diagram with your coursemates.
SELF-CHECK 2.2
On top of this material flow, there are other types of flow such as personnel flow,
machinery flow and financial flow.
There are personnel who work until retirement while others may resign
earlier. In both cases, the personnel will then return to their environment.
ACTIVITY 2.3
How can a control mechanism be linked to the flow of resources to
enable progress monitoring and system development? Discuss.
(b) Standards
Every system has at least one objective. Objectives are stated in general and
something more specific must be determined to measure whether the
system's objectives can be achieved.
SELF-CHECK 2.3
2.3.3 Environment
In the general system model, resource flows into the firm from the environment
and will return to the environment after the transformation process. The
environment completes the general system model, as shown in Figure 2.9.
Physical resources enter the physical process and conceptual resources
(information and data) enter the information processor to be stored or used by
the manager. It can also flow to or from the environment.
Term Explanation
An undesirable or complex situation which will lead to negative
Problem
consequences.
Problem A process or an activity that is performed to overcome a problem or to
Solving grab an opportunity so that the negative consequences can be avoided.
An outcome that has been agreed upon to plan the next step and
Decision
action.
Trouble or Sign The source of problems.
SELF-CHECK 2.4
A problem will occur when the actual performance is either higher or lower
than the standard. Therefore, a problem can give an advantage or
disadvantage to the firm. It may be better to give a higher standard so as to
maintain good performance. On the other hand, if the firmÊs performance
cannot achieve the standard, we need to investigate the reasons why the
problem occurs.
For example, a doctor will study the symptoms to know the cause of a
disease. In the same vein, managers must study the symptom of any
circumstance such as reduction in sales; the actual problem is why sales
have decreased.
For example, the equation „profit = sale-cost‰ can explain why the firm's
profits increase or decrease.
Some problems are not understood by the manager and they are known as
non-structured problems. The problem of human behaviour is an example
of this type of problem.
Problem solving is not the task of a manager alone. It is the responsibility of all
parties, especially individuals who are experts in the field related to a problem.
SELF-CHECK 2.5
ACTIVITY 2.4
When the manager views his firm as a system that comprises several subsystems,
he or she has understood the systemÊs concept and achieved the objectives of the
phase. At this stage, the manager is ready to use the system approach in solving
problems.
This phase consists of two main steps, which include continuing from the system
level to subsystem and analysis of parts of the system according to certain
sequences.
Firstly, the manager studies the status of the firm in the perspective of its
relationship with the environment. Among the questions studied are:
(i) Whether the firm has a balanced relationship with its environment;
(ii) Whether the flow to and from the firmÊs environment occurs as it
should; and
(iii) Whether the system achieves its objective in producing products and
services for its environment.
Then, the manager analyses the system from the aspect of the subsystem.
Every subsystem will be studied to see whether it functions together with
other subsystems to achieve the systemÊs objective.
Briefly, this step aims to identify subsystems that are problematic so that
the problem can be addressed.
SELF-CHECK 2.6
The solution phase is the last phase in the approach of a system. In
your opinion, what action can be taken if the solution is not found?
SELF-CHECK 2.7
There are four types of models, namely, physical, narrative, graphic and
mathematical.
The model has a standard which determines the systemÊs performance that
needs to be achieved and information processor which produces information
for the actual performance of the firm.
Problems exist when there are differences between information from the
standard and information processor. The manager solves the problem, which
affects the firm either in a positive or negative manner.
The system approach can be used by the manager when solving problems.
The system approach consists of three phases, namely, the preparation,
definition and solution phases. Every phase has certain steps that can be used
as guidance.
INTRODUCTION
The development of information technology facilities is closely related to the
business objectives of an organisation. This is evident from research on the
requirements of information for enhancing organisational results. Therefore,
In this topic, you will also be exposed to the business strategy concepts such as
strategic management, the Porter value chain model, supply chain management,
industrial level strategy and how these concepts are related to information
system.
Look at Figure 3.1 carefully. Can you see, in general, the effects from this
relationship on the approach for constructing information architecture and the
usage of information technology in the organisation? Information technology
planning and information technology usage begin from the top. The use of
technology must begin with an analysis of the organisational needs in the context
of the business the organisation is in. It must also support the organisationÊs
business planning and objectives. Therefore, the process of designing
information technology involves current and future users, as well as the
management and planning personnel in the organisation. It is not the work of
technologists alone.
Only at the end of the process of designing information architecture would the
technology be chosen to support operational processes.
ACTIVITY 3.1
An organisation usually has a single head office that is the location for policy
making, strategic planning and company performance analysis. Going down
another level, this company may be divided into divisions that may be located in
different sites.
These divisions will then be divided further into units. In an organisation that
does not have many branches in many different places, the division may be
based on function, that is, a division or unit represents a certain function.
The smallest unit that performs the main functions of the organisation is called a
department. Normally, an organisation is divided into the following departments
(there could possibly be more departments):
(a) Accounts;
(b) Finance;
(c) Sales and marketing;
(d) Production and operation management;
(e) Human resource management; and
(f) Information systems.
SELF-CHECK 3.1
List the types of organisational structures and compare them from the
perspective of the most appropriate structure at a given time.
Level Characteristic
Departmental Level Collaboration of small programs developed by each
department to support other departmental functions. This
covers the human resource management information system
and accounts information system.
Plant Level Collaboration among departmental information systems. This
generally enables a connection among departments to be
performed to enable employees to work together using a
computer system.
Divisional Level Collaboration of plant information systems.
Enterprise Level Collaboration of divisional information systems.
Organisational Level An information system that is larger and more complex that
can provide a connection of information systems among
organisations. This system enables the same information to be
used among different organisations.
(b) Ensuring that technology can be adapted according to changes that occur
Change is inevitable for advancement. Hardware technology and computer
software change relatively quickly. This change will create problems for the
user if proper management and planning are not performed. The question
that arises here is how can a person manage the information technology
requirements according to the changes? The answer is that all changes in
technology need to be anticipated and planned for even earlier.
Copyright © Open University Malaysia (OUM)
TOPIC 3 INFORMATION TECHNOLOGY SUPPORT AND 63
STRATEGY IN THE ORGANISATION
(c) Privatisation
Privatisation of information technology support services wholly to external
companies known as system integrators. These companies offer services in
several forms such as:
(iii) Internet service provider (ISP), that is, a company that provides a
service to connect the customers to the Internet and related services.
(iv) Wholesale service provider (WSP), which provides grouped
application packages that are distributed through the Internet.
In the next subtopic, we will discuss the aspects of how information technology
can be used to support the organisationÊs business strategy.
SELF-CHECK 3.2
1. What are two main objectives of information technology
management?
2. Discuss three important aspects in information technology
management.
3. Explain four functions of information technology organisation.
4. Differentiate between the following private information
technology support services:
(a) ASP (c) ISP
(b) BSP (d) WSP
We will now continue our discussion on the strategic management concept, the
Porter value chain model, supply chain management, industrial level strategy
and information system which cover the competitive and network economy. You
must know that each information system discussed in this module is integrated
within one another. The information systems can solve organisational problems.
Effective strategic planning can integrate information systems in an organisation.
Strategic information system changes the way a firm handles a business and
transaction in depth and in detail. Generally, there is no complete strategic
system. What is available is a few systems operating at different strategic levels
whether at the business, firm or industry levels, and these systems combine to
become what is known as strategic information systems.
SELF-CHECK 3.3
ACTIVITY 3.2
In your opinion, how can support staff contribute ideas and expertise to
make the organisation competitive in the market?
The value chain model can assist in increasing competitive forces by identifying
the focus point of the critical and specific influence where information
technology can be used effectively to reinforce the position in the competition.
Now, can you get the main idea of the Porter value chain? By looking at
Figure 3.7, you may find that the activities can actually be categorised as:
Businesses can develop new scopes for their markets by differentiating the focus,
that is, by identifying specific targets for each product and service so that both
can deliver the best service. A firm can offer better products and services to a
Data can be gathered from a huge group of information resources such as credit
card transactions, purchasing data from points of sale, and demographic data
from websites. Companies can collect data internally or purchase the data from
other organisations. Through pattern assessment of customer purchasing,
companies can define a detailed image on purchasing interest, develop a
relationship with customers and prepare specific products and services.
This partnership enables firms to get new customers, open new opportunities for
cross-selling and product targets, as depicted in Figure 3.9.
ACTIVITY 3.3
Do you think countries need partnership blocks such as the European
Union or East Asia Economic Cooperation? Discuss.
The use of the Internet in business has helped form millions of new businesses
that operate at a minimal capital cost but encompass the whole world. It also
helps the organisation to save cost on internal and external communication. How
can this happen? It is done through several forms of creative and productive
Internet use. Figure 3.10 shows briefly the use of the Internet in businesses.
remaining number of leave that has been taken or apply for leave. The
company could also join the intranet with the Internet and this would make
it easier for workers or the management to obtain information about their
company wherever they may be.
The need for information technology architecture has become the supporting
structure or platform for the implementation of an information system.
Suppliers and customers need to closely communicate and perhaps share the
responsibility to fulfil demands.
INTRODUCTION
In order to achieve success, an organisation needs a detailed and effective
planning process. The management plays a very important role in this process.
Failure to formulate an effective strategic plan will cause the organisation to lag
behind its competitors in the market.
You will also learn about two important and popular information systems used
in organisations, namely, Management Information System (MIS) and
Transaction Processing System (TPS).
Before the planning of an information system can be done, several matters need
to be given attention, especially by the upper management. Some of them are:
(a) The upper management must accept information technology as an
important resource for overall organisational activities.
(b) The use of an information system in the organisation must be planned like
how other complex resources are planned. An information system
comprises not only computers, but also hardware, software,
telecommunications, people, procedures and data.
Copyright © Open University Malaysia (OUM)
TOPIC 4 INFORMATION SYSTEMS INTEGRATION IN THE ORGANISATION 79
Once the management understands these points and agrees to the use of an
information system for the overall activities of the organisation, the planning of
the system development can commence.
There are several steps to ensure the success of the information system planning
process. Figure 4.1 shows the steps necessary in the planning of an information
system.
(g) Budget
Organisational activity planning that suits the financial resource.
SELF-CHECK 4.1
If this goal is not achieved, and the use of the information system adds to the
organisational burden, the management should perhaps think it over.
SELF-CHECK 4.2
ACTIVITY 4.1
Refer to the book:
Laudon, K. C., & Laudon, J. P. (2013). Management information systems ă
managing the digital firm (13th ed.). Prentice Hall.
Read Chapter 3 (Information Systems, Organizations, and Strategy), and
identify the changes that information systems can bring to an organisation.
Level of
Category Example
Management
Strategic SIS ă Strategic Information System
Strategic
Management
Management EIS ă Executive Information (Support) System
System
Tactical MIS ă Management Information System
Mid-level Management
DSS ă Decision Support System
Management Support
System OAS ă Office Automation System
ACTIVITY 4.2
Examples of the information systems that are involved are the Transaction
Processing System and Process Control System.
It gives focus to the preparation of information and the support for managers
to make effective decisions. It assists in decision making at the highest level
of management, middle (tactical) and also at the operations levels.
information and is reported to gain a competitive edge when faced with the
organisationÊs rivals in the global market arena.
The aim of MIS is to develop a viable system to maximise the effective use of
latest data approaches to management practices. It is also aimed at assisting
higher management and managers of organisations, to construct timely and
accurate information not only to decide current and future operations, but also to
identify potential problems that need to be rectified.
With MIS, organisations save valuable time for their workforce and ultimately
save operational costs. Where in the past, business information had to be
manually processed for filing and analysis, it can now be entered immediately
and easily into a computer by a data processor, enabling faster decision making
and quicker reflexes for the organisation as a whole. This had pretty much
helped decisions made in organisations, as effective decision making demands
accurate, timely and relevant information. MIS cannot create business strategies
by themselves but they can assist management in understanding the effects of
their strategies and help enable effective decision making. MIS systems can be
used to convert data into information useful for decision making.
ACTIVITY 4.3
Can you think of a system that you are using in your learning
institution (registration system, learner management system, etc)?
Can the system that you have identified be categorised as an MIS?
Discuss with your coursemates.
The input for MIS is information produced from internal data, which is obtained
from the results of the Transaction Processing System (TPS) and external data.
The output is a collection of reports that are distributed to the managers. These
reports are divided into three main categories, which are:
The system gathers all the departmental transactions into several batches,
prepares them for processing and then processes them at the end of each
operation day.
For instance, when you make a booking through a tax free channel, your
booking will be taken and entered into a computer. Even though the
booking has been entered into the computer, it may only be processed after
office hours or the following day.
ACTIVITY 4.4
State other examples of the three processing methods mentioned
earlier.
ACTIVITY 4.5
After learning about the characteristics and activities of the TPS in
general, can you think of examples of the TPS that are usually
performed?
Table 4.2: Some Subsystems that Support the Order Processing System, Purchasing
System and Accounting System
SELF-CHECK 4.3
Ć The organisational changes may occur with the use of information systems
and this change is normally divided into four parts, which are automation,
rationale procedure, business process restructuring and paradigm shift.
INTRODUCTION
You have just learned several information system concepts such as the use of IT
in strategic planning and system concepts. The system is developed according to
information obtained from the end user. However, do you know that the
information obtained is insufficient to make decisions in solving certain specific
problems, especially problems encountered by strategic management? In this
topic, we are going to discuss the decision-making process and how the Decision
Support System (DSS) helps managers make effective decisions.
You will recognise DSS as a system that provides communication facilities which
include information in helping consumers solve problems. We will also learn
about the format or structured information that results from DSS such as special
reports and periodic report formats. These reports are generated from
managerial science and mathematical models.
5.1 DECISION-MAKING
ACTIVITY 5.1
Everyone has to make decisions. Compare making decisions to
solving problems. What makes them different?
Before discussing the decision support system, let us learn about the decision-
making process. Decisions are made to prevent problems. As a learner, decision
making is vital. You need to decide on, for example, the courses that you need to
take this semester. From the moment you try to solve any problem, you will
encounter multiple decisions. How do you define decisions and decision making?
Decisions are forms of actions taken to avoid or to reduce the negative effect,
or to take advantage of the situation.
Decision making is the process of making a decision that is accurate and clear
in solving a problem or doing something new.
need additional thinking processes that are unique and different in order to reach
a decision.
Figure 5.1 shows the pyramid structure for decision making for each of the three
levels of management:
SELF-CHECK 5.1
ACTIVITY 5.2
How can a manager prepare a report from all forms of reports, analyse
them and make a decision? Discuss.
DSS that you have learnt about is one of the components in the Management
Support System.
DSS is a system based on computer interactivity. DSS helps decision makers use
data and models to solve structured, semi-structured and unstructured
problems. Why do we need to know DSS? We need to do so because in decision
making, the person responsible for making the decision needs correct, precise
and the most recent information in order to make a quality and effective decision.
Apart from that, DSS can be defined as a system that enables managers to solve
semi-structured and unstructured problems.
DSS interactivity helps decision makers use data and models to solve semi-
structured and unstructured problems.
DSS can help management analyse information from the level of lower
management onwards, including outside the organisation. It is used to manage
unstructured decisions such as "What will happen if⁄?". It can also use a
Database Management System (DBMS), question language, monetary model,
electronic spread sheets, statistical analysis, report generator or graphic software
to provide information.
The three objectives above are related to the three basic concepts of DSS: problem
structure, support decision and the effectiveness of decision. Actually, it is
difficult to find completely structured or unstructured problems because most
problems are semi-structured.
The second objective of the DSS clearly shows that a computerised system cannot
in many ways replace humans in decision making. From this objective, we
understand that the DSS only helps decision makers handle part of the structured
problems but some parts of unstructured problems still require human intuition
and consideration for solutions.
The third objective states that efficiency and the speed of data and information
processing are not the main objectives of a DSS. The main advantage of using a
DSS is to utilise its ability to help users make good quality and effective
decisions. According to McLeod (2001), managers must not find the solutions to
their problems using output from a DSS only because finding the solution or the
decision making can be done using mathematical models. On the other hand,
managers have their intuition and judgement to fall back on in selecting the
solutions for their problems.
SELF-CHECK 5.2
If, for instance, you are given a choice of going to Phuket Island or
Tioman Island for a holiday, what are the criteria that would help you
make your decision? In your opinion, does DSS help you if all the
data needed is entered into the system?
(e) All four phases of decision making are supported by DSS: intelligence,
design, decision and justification.
(f) All types of processes and styles of development of decisions are supported
by DSS.
(g) DSS is very adaptive, so it will always be relevant to current demand.
(h) DSS has an interesting graphical user interface.
(i) The effectiveness of the user in decision making (quality, accuracy, etc)
compared to efficiency (decision-making cost).
(j) The decision maker has full control over DSS. The DSS objective is to
support users, not to replace them.
(k) The end user can modify DSS easily.
(l) DSS will usually use models to analyse a problem. This ability to apply
models to problems helps the user to test a few different strategies in
different situations.
(m) DSS allows the user to obtain data from a database.
(n) DSS is web-based.
ACTIVITY 5.3
Observe point (g) of the DSS characteristics. Explain briefly this
characteristic by providing suitable examples. Compare your answer
with that of your friendsÊ.
SELF-CHECK 5.3
Now, look at Figure 5.4. Based on Figure 5.4, the lowest support level in DSS type
1 is to enable managers to obtain specific information elements. One example is
getting the total sales of one department in Perak only. If the system helps to
analyse all the files, it is DSS type 2. A manager who wants to create a special
report using data from the entire inventory file is one example. The example only
involves one type of file which is the inventory file
Often, you have to obtain data and information from multiple sources, and all
kinds of files and from multiple departments. In these cases, the degree of
complexity and support in problem solution is higher. Preparing reports from
multiple types of files is an example of DSS type 3. You should already be clear
about the need for taxonomy in understanding the DSS concept at this level.
The three types of DSS discussed earlier provide support in forming special
reports resulting from the query or questioning of a database. The other three
DSS types involve the use of a mathematical model or scientific management
model in supporting a manager in making decisions.
An example given by Alter (1976) for DSS type 4 is the DSS model used to
estimate the effect of a solution. For example, a manager wants to know the effect
of increasing or decreasing the price of products on the monthly and yearly
profits of the company. The manager will input DSS, for example, RM25 per unit.
DSS will show the manager if the product is priced at RM25 per unit; this will
lead the organisation to obtain a profit of RM5,000 monthly.
However, you must understand that the model is not capable of explaining
whether the price of RM25 is the best option for the manager to choose. The
system can only explain what will happen to the profit if that decision is taken. In
order to provide additional support, you can add some DSS models that can
analyse risks, which can be used by the manager through estimation of analytical
probabilities.
The DSS type 5 suggests decisions. It gives more support to the decision maker
but the degree of complexity of the DSS increases, such as the DSS that uses the
linear algorithm model. A manager can input data about the structure of a
factory and its equipment into this DSS model. This will enable the manager to
produce the most effective decision.
The DSS type 6, offers the most support to its user although it is difficult and
complex to develop the solution to his problem. An example of use of DSS type 6
is when an insurance company sets insurance premiums. Many company
managers let this DSS make decisions for them because they are very confident
with its capability to make good decisions.
SELF-CHECK 5.4
Although they have the same structure but the characteristics, concepts and
objectives of the three information systems are different form one another. As
indicated by Figure 5.5, data and information from the environment are input
into the database. A DSS database might also receive similar data and
information from the Financial Information System and other systems and
subsystems. The content of the database will then be utilised by four subsystem
software consisting of:
(i) Report writing software;
(ii) Mathematical model;
(iii) Scientific management model; and
(iv) Groupware.
Innovations in ICT have developed a new DSS concept, that is, the Group
Decision Support System (GDSS). A team who cooperates to achieve a common
objective can use GDSS to improve communication between group members.
GDSS provides an environment conducive to and which supports the decision-
making process using a type of software called groupware.
You will agree that information and communication technology (ICT) has made
the world smaller because it helps us to communicate better, even though our
friends are thousands of miles away. For example, specialist surgeons in Europe
need not be in Malaysia to perform surgery as it can be done without moving
them here. Thus, the basic theory of the development of GDSS is to communicate
well to produce better decisions.
Figure 5.6: Group size and location that characterise the GDSS environment
For each type of GDSS environment, group members can meet at the same time
or at different times. If group members meet and discuss at the same time, as in a
meeting, this is called synchronous exchange. On the other hand, meetings can
also be held at different times, such as in communicating through the e-mail. This
is called asynchronous exchange.
When you look at Figure 5.6, you must be wondering what is meant by decision
room, local decision network and so on. Now, let us see what are they.
`The facilitator must make sure that the discussion stays on track. Have you
chatted on the Internet using Skype or Yahoo Messenger? If your answer is
yes, this communication takes place in a decision room, which is almost the
same except that the text that is typed is displayed on the big screen. Other
than that, any reference material for discussion can be displayed using
video, colour slides and transparencies.
There are two unique characteristics of GDSS in the decision room which
are parallel communication and anonymity.
(i) Parallel communication occurs when all participants making
statements use the computer at the same time.
(ii) Anonymity means that no participant knows who is making each
statement. Anonymity helps participants voice ideas and statements
without fear of being criticised by other participants. Thus, all ideas
and suggestions are evaluated based on meritocracy and not on who
suggests it.
However, you must realise that not all group software packages are suitable to be
used in a working group. Refer to the outline of time or place in Figure 5.7 and
you will see the technological differences in supporting a working group
according to time and place.
Other than that, every group software package will use different technology,
based on one package that supports the purpose of the working group, such as
the type of group assignments.
Working software must have at least one of the abilities or components listed:
electronic advisor, conference or an electronic meeting room, group timetable,
calendar, planning, conflict resolution, model development, video conference,
document sharing (such as screen, whiteboard and live board), voting, etc.
Actually, there are thousands of group software packages that contain elements
of Web conferencing software and you can look for information on the Web
using a search engine.
ACTIVITY 5.4
Explain what a group software or groupware is? In your opinion, who
would need this kind of software and why? Discuss.
SELF-CHECK 5.5
1. Give four phases in making decisions as stated by Simon.
2. Give the definition of Decision Support System.
3. What is the objective of DSS?
4. Give four analysis models needed by a DSS.
5. Give the definition of GDSS.
6. What is a legislative session?
The impetus for a Decision Support System (DSS) is to support the manager
in making decisions effectively. DSS provides the facilities to communicate
which include information that helps them to solve problems.
There are three main objectives in developing a DSS. The first objective is to
help and provide support to the manager in the decision-making process to
solve semi-structured or unstructured problems. The second objective is to
support the manager in the process of making decisions and the last objective
is to improve the effectiveness of the decision-making process.
There are four types of basic analytical modelling activities usually needed in
a DSS. These activities are the what-if analysis, awareness analysis,
information searching analysis and optimisation analysis.
GDSS supports a group of individuals that work together to achieve one aim
by providing an interface to reach and use the shared environment.
Decision rooms provide characteristics that are very different from normal
meeting rooms because they help the members communicate via technology,
and room design including its equipment. Decision rooms provide
anonymity; participants do not know who is making each statement.
DSS and GDSS are a part of the Management Support System technology that
helps the manager make good quality decisions, but does not replace them in
making any decisions. This is because in the decision-making phase, humans
still rely on intuition or experience to come up with good ones.
DSS and GDSS are very useful and are helpful to companies in making right
decisions. Techno-savvy lifestyles like using laptops or handheld computers
make DSS and GDSS important as computer mobility enables humans to use
computers anywhere to help them make decisions.
INTRODUCTION
In your opinion, what differentiates a manager of a department from a chief
executive officer (CEO) of an organisation? You might think about the aspects of
their income, personality or maybe social status. However, Martineau's (1968)
experiment discovered otherwise. He found that the biggest differences between
the two were from the working perspective and how work was executed. Even
the type of information system a departmental manager used is different from
that used by a CEO.
A Senior Executive Officer usually uses the Executive Information System (EIS).
EIS is a system that provides the latest information, history and some
anticipation about the status and environment of the company to support
administration tasks and the process of decision making of executives. An EIS
usually uses qualitative graphic techniques, communication technology and the
latest processing, all types of input and output mechanisms, which include
storage media, to provide the facilities. EIS is also known as the Executive
Support System (ESS).
Copyright © Open University Malaysia (OUM)
120 TOPIC 6 EXECUTIVE INFORMATION SYSTEM
In this topic, you will learn how an EIS helps in the managerÊs work and in
making decisions.
Now by saying executives, we are not focusing on lower level executives such as
sales executives or IT support executives who execute tasks given by the
supervisors, although their contributions are very much important to an
organisation. Our focus here is higher level executives who are involved in
decision making such as chief executive officer, chief financial officer and chief
information officer.
Other than that, executives are different from lower-level managers in terms of
attitude. Executives are organisation-oriented, while managers are unit- or
department-oriented. Let us take for example the Vice Chancellor of a university and
the dean of a faculty. The Vice Chancellor administrates and leads a university that
may contain 10 faculties, four centres, and six support units whilst a dean focuses
more on their tasks of leading and planning the strategy for the faculty. We will
learn about the roles of an executive after learning about the three studies done by
experts in management science ă Henri Fayol, Henry Mintzberg and John Kotter.
The studies done by The Centre for Information System Research (CISR) at MIT
found that the main users of EIS are the Chief Executive Officer (CEO), Chief
Financial Officer (CFO) and Chief Operating Officer (COO).
SELF-CHECK 6.1
SELF-CHECK 6.2
If EIS is not in place, then the CBIS (Computer-based Information System) will
look as shown in Figure 6.1. Figure 6.1 shows that executives receive all
information from the subsystem functions like the Financial Information System
and Monetary Information System which needs to be processed. Executives still
need to analyse and change the data into more meaningful information. EIS, as
shown in Figure 6.2, helps executives analyse and change the data into
meaningful information. EIS will accept all data and information from the
subsystem function and its environment, then process and present it with a good
interface to the executives.
(a) Agendas
These are the objectives of the company that need to be achieved. There are
two types of agendas: long-term and short-term. For example, the long-
term agenda is the type, quantity and design of Proton cars that need to be
produced within five, ten or twenty years. The short-term agenda deals
with the size of passenger car market in Malaysia that needs to be
conquered by the new product, Proton Preve 1.6 CFE.
(b) Networking
Executives must build a network. This is not the same as computer
networking. Kotter thinks that executives need to build networks or
relationships between individuals inside and outside the organisation
which can or will help in achieving the objectives above.
(c) Surroundings
Executives need to design a good surrounding or environment. The
surrounding is actually the emphasis on good moral values that can help
networking members cooperate with each other to achieve the agendas.
Researchers like Professor Daniel J. Isenberg (1984) from Harvard stated that
executives generally think about two classes of problems:
(a) First class: how to solve work problems.
(b) Second class: how to manage big issues or general aims of an organisation.
With regard to the first class, executives concentrate more on issues concerning
the organisation and subordinate individuals to solve problems rather than think
about ways to solve them.
IsenbergÊs observation shows that executives do not always follow the correct
steps in making decisions. For example, in handling a problem, executives
usually head straight for the execution of the solution and then backtrack to the
evaluation of alternatives, which is the step prior to execution. Executives make
rational decisions but the decisions made do not mean that decisions coming
through are correct.
Isenberg believes that executives use their intuition in every aspect of the
decision-making process. Intuition plays a very important part in helping
executives make decisions. This is due to the nature of humans, where problems
endured by executives are unstructured, and this includes the executivesÊ
experience. This strongly affects the process of decision making by executives.
ACTIVITY 6.1
Search for articles related to high-level executivesÊ roles in leading a
company. In your opinion, why do we need to learn and understand
how executives work?
What you must observe here is that MintzbergÊs research has become the basis of
modern design information systems based on computers in the context of EIS.
This role is important in mixing virtual office applications for an executive. In
simpler terms, when you want to develop EIS, you have to create the Mintzberg
research to finalise the types of related applications to be integrated in EIS. This
is because it will be used by executives with the information who need
characteristics that are unique compared to other end users.
SELF-CHECK 6.3
If this research was not available, could you identify the information
needs of executives based on your observation?
(d) What are the Types of Media Used by Executives to Exchange Information
and to Communicate?
(i) Written medium: computer reports, memos, mails, journals and
others constitute 61% of the transactions received.
(ii) 2% of the received information is during a function.
(iii) 21% is from using the telephone.
(iv) 5% is from scheduled meetings.
(v) 6% is from unscheduled meetings.
So, what does the information above mean? How is EIS related to all this? What
is the importance of the researches? There are three main findings that we need
to know:
(a) Most of the information received comes from the organisation's
environment but a companyÊs internal information has higher value.
(b) Most of the information received by executives is in written form but those
with the highest value are received orally.
(c) Executives receive little information from the computer.
SELF-CHECK 6.4
You have been introduced to the research done by Jones and McLeod.
What was the conclusion of their research? Discuss.
6.3.1 Definition
According to McLeod and Schell (2001), EIS is a system that provides
information to executives concerning the organisation's progress as a whole. In
general, EIS is defined as:
ACTIVITY 6.2
Read the definition given in the book and compare with the definition
given in this module.
The system is also equipped with an e-mail application which includes preparing
facilities for the executive to download data or information from the
supercomputer or certain servers. There are also EIS variations that provide
explanations on current information, competitors, or social and economic
information, both internally and externally.
There are many EIS software and applications available in the market, provided
by commercial software vendors. Usually this software comprises office
automation, e-mail, information management, information connection, and
information analysis.
The EIS data needed for input depends on the executive's needs as an end user.
Whatever information needed to make decisions, as well as information deemed
necessary by the executive, should be included in EIS. However, sorting the data
and the types of information that need to be processed by an EIS is difficult. This
is due to the development of EIS which starts with several features that the
executives are interested in. Then, it is expanded according to the information
needed by the managers using it. Subsequently, the format and type of
information in EIS will become outdated and divert from strategic planning.
SELF-CHECK 6.5
Give examples of other systems that produce output yet become the
input of EIS.
(e) Has a future-time orientation because the decision made is for the long
term and can be used in the next few years.
(f) It is connected to the process of value added business which is then
connected to the DSS to increase the effectiveness and capabilities of the
system to make better decisions.
SELF-CHECK 6.6
Research shows that the information needs for executives are more
organisation-oriented.
EIS is capable of creating a new information source that can help the
company improve its performance and at the same time provide excellent
services to its employees and customers.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Describe what an Expert System is and its applications;
2. Explain the steps involved in producing rules and information
gathering;
3. Explain Expert System architecture and development;
4. List the main characteristics of an Expert System; and
5. Explain the advantages and disadvantages of Expert System.
INTRODUCTION
In this topic, you will learn about one of the branches of artificial intelligence,
which is the Expert System. The Expert System is also known as the knowledge-
based system. The Expert System comprises many types of systems based on
rules, frames and fuzzy sets. In this topic, you will also be exposed to the most
popular Expert System, the system based on rules. Ready? Let us get going.
An expert is a person that has the expertise and knowledge of his specialised
field.
According to Efraim Turban (2001), the Expert System comes from the
Knowledge-based Expert System terminology. A good ES is a system that can
copy the process of reasoning in a human.
SELF-CHECK 7.1
Some of the reasons for the need of an Expert System to replace an expert are:
(a) To enable the use of expertise after working hours or at different locations;
(b) To automate a routine task that requires human expertise all the time
unattended, thus reducing operational costs;
(c) To replace a retiring or a leaving employee who is an expert; and
(d) To hire an expert is costly.
ACTIVITY 7.1
Has your car ever broken down? Think about how an Expert System
can help a car owner. Discuss this with your coursemates.
(ii) An Expert System that helps identify threats that may put security at
risk.
(iii) An Expert System that helps to form and produce small mechanical
items.
Problem-
solving Example of Expert System Application
Paradigm
Control Controlling the behaviour of the system according to specification.
Design Aligning objects following limits.
Diagnosis Providing reasons for system malfunction based on observation.
Instruction Diagnosing and improving behaviour of students.
Translation Providing reasons for situations based on data given.
Assessment Comparing observation data with expectations.
Planning Designing a plan of action.
Prediction Providing reasons on the cause and effect of a certain decision based
on situation.
Selection Identifying the best selection from all alternatives and probabilities.
Prescription Suggesting solution to improve a malfunction system.
SELF-CHECK 7.2
Differentiate between human expertise and the Expert System. You may
use the following table:
being an IT expert does not mean that the person is an expert in all IT
domains but she may be an expert in intelligence systems or an expert in
only the development of an intelligence agent.
SELF-CHECK 7.3
SELF-CHECK 7.4
From Figure 7.3, you may see the basic components of an Expert System, which are:
(a) Knowledge acquisition facility;
(b) Knowledge base;
(c) Inference engine; and
(d) Explanation facility.
The expert information that has been acquired will be used to develop and
expand the base knowledge. The source of knowledge stated here includes
experts, journals, the Internet, online databases or research reports and
experiments.
Rules Creation
Rules are divided into two operators:
(a) IF, called before (a premise or condition); and
(b) THEN, it is called effect (conclusions or actions).
In general, rules can have a few conditions by relating each condition to the
keywords AND, OR or a combination (AND and OR). On the contrary, it is
better to avoid combining both in one rule.
See the following example that shows how a few conditions are related to AND.
IF<condition 1>
AND<condition 2>
AND<condition n>
THEN<action>
The next example shows how a few conditions are related to AND and OR.
IF<condition 1>
AND<condition 2>
OR<condition 3>
THEN <action>
Representation Rules
Relationship IF ÂtankÊ is empty
THEN car cannot start
Suggestions IF monsoon season
AND cloudy sky
AND weather station predicted rain
THEN you are advised to bring an umbrella
Instructions IF car cannot start
AND ÂtankÊ is empty
THEN put petrol in the tank
Strategy IF car cannot start
AND ÂtankÊ is empty
THEN put petrol in the tank
Step 1 is done
IF Step 1 is done
AND tank is full
THEN check the car battery
Step 2 is done
Heuristics IF fluid spills
AND pH of the spill < 6
AND smells acidic or sour
THEN the spills is an acetic acid
There are two strategies used by the inference engine when making decisions or
conclusions. These strategies are forward and backward chaining.
The strategy of forward chaining can obtain a decision and produce more
information with fewer questions compared to backward chaining. Thus, it is
always used for large scale and complex ES. However, the weakness in this
approach is the long duration taken for processing. Certain ES developed
Copyright © Open University Malaysia (OUM)
144 TOPIC 7 EXPERT SYSTEM
ACTIVITY 7.2
Search for a few resources (either printed or online) for explanation
regarding the use of strategic forward and backward chaining. In your
opinion, which strategy is more frequently used? You may post your
answer in the online discussion forum.
SELF-CHECK 7.5
Is the inference engine reasoning process the same as your reasoning
process? Which will you use to solve a problem? Can both processes
be used? Discuss.
For example,
An expert will act based on what he or she can conclude from the answers,
whereas ES responds to the question of WHY by displaying the rules it is
executing.
As an example:
User of ES : HOW?
The ES responds by stepping back to the rules that the system uses to
achieve the decision. Stepping back to the rules is how the Expert System
does the reasoning.
SELF-CHECK 7.6
SELF-CHECK 7.7
(f) Flexible
Due to the large amount of knowledge possessed by an ES, it is important
for the ES to have an efficient mechanism to administer the compilation of
the existing knowledge in it.
For example,
Table 7.4 shows the difference between the conventional system and ES.
Table 7.4: The Differences between the Conventional System and the Expert System
SELF-CHECK 7.8
Even though an Expert System usually models the expertise of either one or
more experts, an ES also models expertise based on other alternative
sources such as printed material (books, manuals, journals and others). The
prerequisites to be a domain expert are that he must:
(i) Be knowledgeable in a particular field;
(ii) Have skills in solving problems;
(iii) Be competent in presenting knowledge;
(iv) Have time management skills; and
(v) Be cooperative.
(c) User
The user is one who uses the Expert System when it has been fully
developed. He or she will help during the knowledge acquiring process by
explaining the problems to the knowledge engineer.
(ii) PROLOG
The ongoing research of artificial intelligence has given birth to the
programming language PROLOG. PROLOG is the acronym for
„Programming in Logic‰. A program using PROLOG can be assumed
to be a knowledge database that stores facts and rules.
SELF-CHECK 7.9
(a) Consistency
One of the advantages of an ES is that the results given are consistent. This
might be due to the fact that there are no elements such as exhaustion and
emotions as experienced by humans.
SELF-CHECK 7.10
The Expert System also has weaknesses and flaws. In your opinion, do
these weaknesses influence the quality of an Expert System?
SELF-CHECK 7.11
An Expert System (ES) is a system that mimics the human capability to think
and reason for decision making.
INTRODUCTION
In the beginning, Functional Information Systems were developed specially for
carrying out specific functions such as a system for the accounts, marketing and
finance departments. These systems were not related to one another. Thus,
information management was not effective in some cases that required a solution
from several system functions.
Characteristics of Functional
Examples
Information System
It consists of several subsystems of An attendance system can store and trace
an information system that support attendance records and working hours of
specific functions or activities. workers.
Even though this system focuses on
An accounting information system can be
certain activities, it can be integrated
integrated with the marketing information
with other functional information
system to facilitate transactions and the tasks
systems to form a single system that
between those two departments.
is useful for the organisation.
Functional information systems can
Attendance records, overtime claim records and
interface with others to form a
salary records from different subsystems can be
complete information system for the
integrated to calculate the amount to be paid to
organisation. This is the result of the
employees for the previous month.
integration of the subsystems.
The marketing information system can obtain
This information system can also feedback from the user or the client through
interface with the surroundings. online feedback facilities (like feedback forms in
websites).
A clear picture about the examples of functional information systems can be seen
in Figure 8.1.
As can be seen from Figure 8.1, there are five core functions, namely, finance,
accounting, marketing, manufacturing (production) and human resource in an
organisation. Some of the finance and accounting functions have already been
discussed in Transaction Processing System (TPS) earlier; as such, this topic will
focus on marketing, manufacturing and human resource related information
system.
Sales managers must plan, monitor and help increase the performance of sales
staff who market the organisation's products. That is why most organisations
have computer-based Accounting Information System to generate sales analysis
reports that analyse sales by products, customers, types of customers, sales
person, sales area and others. These reports help the marketing manager monitor
the sales performance of products and sales staff. At the same time, it helps
marketing managers prepare programs that would improve sales for the
organisation.
SELF-CHECK 8.1
In 1966, Professor Philip Kotler (Mcleod, 1998) identified three types of marketing
information related to the collection and processing of marketing information. The
three types of marketing information are displayed in Figure 8.2.
The output subsystem will use the stored data to produce information related to
product marketing, promotion, venue and product pricing. The output
subsystem consists of the product subsystem, venue subsystem, promotional
subsystem, pricing subsystem and mixed-integration subsystem. All these
subsystems will be discussed in the following sections. Data stored in the
database can be shared by other functional fields and is not limited to the
ACTIVITY 8.1
Using all four marketing elements (product, promotion, venue and
price), sketch a graph showing the relationship between each element.
(a) The Production Scheduling System needs four files to prepare the Master
Production Schedule ă the CustomerÊs Order File, Sales Forecast File,
Finished Product Inventory File, and Production Capacity File. The main
production schedule plans the future production by considering the lead-
time factor and the production time.
Material Inventory File. The things that need to be done are obtaining the
gross requirements and the net requirements of the materials.
Net requirements are the items that need to be purchased to achieve the
main production schedule. The following are the formulas:
(d) Order Production System uses the order schedule that has been planned as
input and prints the order production report of which a copy is given to the
procurement department and the shop floor manager.
ACTIVITY 8.2
Do you think that Material Requirement Planning is a proactive
strategy? Discuss.
The components or items are pulled back to the next production process as soon
as it is ready. The raw material inventory arrives just-in-time to be used by the
factory, whereas the process inventory is completed by a process as soon as it
needs to be used by the next process.
This approach has less or no stored stocks. The JIT system minimises the
inventory cost by producing items in small quantities. The suitable lot size for a
JIT system is 1. This lot size is the number of items to be produced at one time. It
needs good time planning and cooperation from the suppliers.
In forwarding one item to the next production process, when a worker is ready to
receive the next item, he will signal the worker before him to send the item.
Kanban (in Japanese) is like a card or light. The JIT approach does not stress on
the use of computers.
SELF-CHECK 8.2
The main activity of the human resource management is shown in Figure 8.7,
which describes staff resource flow in an organisation.
SELF-CHECK 8.3
The database for the Human Resource Information System consists of staff data
and non-staff data. Staff data refers to the storing of data on the organisation's
staff. Non-staff data is the storage of data obtained from the organisation's
environment such as the government, labour union, recruitment agencies and
others.
ACTIVITY 8.3
If you are an employee in an organisation, have you ever wondered why
all your personal information is needed by the organisation? Is the
information stored based on a model that you have learnt about or the
organisation is using a model of its own? Discuss.
SELF-CHECK 8.4
SELF-CHECK 8.5
SELF-CHECK 8.6
ACTIVITY 8.4
Read articles related to workforce planning. List the consequences of
not managing workforce planning properly.
ACTIVITY 8.5
If you are an employee in an organisation, you might have heard
about employees being given compensation due to certain matters.
Have you ever wondered how such compensation is evaluated and
what is the justification for giving that compensation? Discuss.
SELF-CHECK 8.7
INTRODUCTION
Computer systems play a critical role in businesses, government functions and
daily life. Information system can be used for business progress but like other
technologies, it can also be abused to do harm or commit crimes upon
individuals and organisations. Therefore, organisations need to consider special
steps to protect their information systems.
This topic will explain how far information systems can be controlled and
protected so that they can perform tasks accordingly. We will also look at the
social impact and ethical issues that result from the implementation of
information system.
Organisations that depend heavily on computers will suffer great financial losses
or business malfunctions when their computer systems crash or fail to perform
required tasks. The longer the systems are inoperable, the worse the damage.
There are also some businesses which would fail if the computer system cannot
be used for a few days.
What are the resources that need to be controlled or managed from the
perspective of their safety? The resources that need to be protected include:
(a) Raw data;
(b) Information;
(c) Computer hardware;
(d) Peripheral devices that are connected with computer technology;
(e) The information technology used; and
(f) Support software that is used in the information technology unit, like
operating technology.
Let us look at how we can manage information technology safety, firstly, from
the basic concepts and then from the steps that need to be performed practically
today that form the safety control of information technology.
In general, system safety management can be said to be the effort to control access to
technology to ensure the four important objectives are met, which are:
(a) Confidentiality
This is for ensuring that data or information is not exposed to others who are
not supposed to see it. Executive Information System, Company Accounting
System and Human Resource Management are among the systems that are
critical and need to be protected in this regard.
(b) Integrity
This is for ensuring that the information stored can be trusted and that the
data as well as the program that manages it is always accurate or functions
like it is supposed to. In other words, it represents the actual technology
capability for each time when access is made.
(c) Availability
This is for ensuring that technology, data and service in this system can be
accessed at all times that they are required by anyone who is allowed
access.
SELF-CHECK 9.1
A firewall is generally located between the internal LAN and WAN, and external
networks like the Internet. A firewall protects the organisation's internal network
access by acting as a gatekeeper which studies every user's qualification before
they can access the network. A firewall will identify the name, IP address,
application and other traffic features. It checks this information based on the
access regulations which have been programmed into the system by the network
administrator. As you can see in Figure 8.1, a firewall blocks illegal
communication into or out of the network, allowing the organisation to enforce
Copyright © Open University Malaysia (OUM)
TOPIC 9 SECURITY AND SOCIAL ISSUES RELATED TO INFORMATION SYSTEM 179
security policies on the traffic flow between the network and the Internet
(Opptiger, 1997).
(a) Proxy
Proxy stops data which starts from outside the organisation at the firewall,
checks the data and discontinues the proxy to other parts of the firewall. If
the external user wants to communicate with an internal user, the external
user will first „talk‰ to the application proxy and the application proxy will
communicate with the internal computers. The internal user will also talk
through proxy to the external computer. As the real order does not go
through the firewall, the proxy is considered to be safer than real checks.
However, they need to do a lot of work and can use a lot of system
resources which makes for unsatisfactory network access.
The Cisco system firewall product is an example of a firewall which can stop, but
cannot overall prevent network entrance from the outside, and should be seen as
one element in the overall security plan.
ACTIVITY 9.1
Find out other details on the functions and usage of a firewall. Discuss
your findings during tutorial.
To be readable, the order must be decrypted with a suitable key. There are
several encryption standards in existence, including Data Encryption Standard
(DES) which is used by the US government, RSA (Data Security RSA), SSL
(Secured Socket Layer) and S-HTTP (Secured- hypertext transportation protocol).
SSL and S-HTTP are used for traffic-based Web.
There are many alternatives for encryption; however, public key encryption is
popular. Public key encryption uses two different keys, one for public and
another one for private. The keys are related mathematically, so that data
encrypted with one key only can be decrypted with the other key. To send and
receive orders, the communicating parties must first prepare a pair of public and
private keys that are different.
The public key is kept in the directory and the private key is kept secretly. The
sender will encrypt the order with the public key of the receiver. When the order
is received, the recipient will use the private key to decrypt it.
Encryption is useful for protecting orders on the Internet and other public
networks which are less secure than private networks. Encryption helps to
protect sent payment data such as credit card details, enquiries which require
address verification and order integrity. Verification refers to the ability of one
party to know the other party present. In the non-electronic world, we use
signatures.
Banking through mail has prevented the use of signatures on cheques given to
customers through a protected private network, where the source requesting for
payment is recorded and can be proven. Order integrity is the capability to
ensure orders sent arrive without being copied or amended.
ACTIVITY 9.2
There are many online banking sites that use encryption or digital
certification. Discuss the difference between encryption and digital
certification.
(a) Viruses
A computer virus is a software code that can multiply and propagate itself.
A virus can spread into another computer via e-mail, through the
downloading of files from the Internet, or the opening of a contaminated
(b) Spyware
Spyware is a computer program that secretly gathers the userÊs personal
information and relays it to third parties, such as advertisers. Common
functionalities of spyware include monitoring keystrokes, scanning files,
snooping on other applications such as chat programs or word processors,
installing other spyware programs, reading cookies, changing the default
homepage on the Web browser, and consistently relaying information to the
spyware home base. Unknowing users often install spyware as the result of
visiting a website, clicking on a disguised pop-up window, or downloading a
file from the Internet.
(c) Adware
Adware is a program that can display advertisements such as pop-up
windows or advertising banners on Web pages. A growing number of
software developers offer free trials for their software until users pay to
register. Free-trial users view sponsored advertisements while the software
is being used. Some adware does more than just present advertisements,
however; it can report the usersÊ habits, preferences, or even personal
information to advertisers or other third parties, similar to spyware.
threats can be reduced. Some viruses can infect a computer through operating
system vulnerabilities. It is critical to install system security patches as soon as
they are available.
The following suggestions can help minimise the chance of theft when outside
the office:
(a) Never leave a notebook or PDA unattended, including in a car or hotel
room.
(b) Install a physical protection device such as a lock and cable or an alarm.
(c) Put the notebook in a nondescript bag or case.
(d) Install stealth-tracking software.
(e) If a notebook is stolen, automatic logins make it easy for a thief to access
sensitive information. Password protection does not deter a theft, but it
does make it more difficult for thieves to use the stored information.
Biometric security, such as the fingerprint readers, is even better.
(f) Back up data regularly, or install a desktop, notebook or PDA sync
program.
A massive DDoS attack can paralyse a network system and bring down giant
websites. Unfortunately, any computer system can be a hackerÊs target as long as
it is connected to the Internet. DoS attacks can result in significant server
downtime and financial loss for many organisations, but the controls to mitigate
the risk are very technical. Organisations should evaluate their potential
exposure to DoS attacks and determine the extent of control or protection they
can afford.
SELF-CHECK 9.2
Access privilege and data encryption are good preventive controls against data theft
by unauthorised employees who steal for personal gain. The access controls include
the traditional passwords, smart-card security, and more-sophisticated biometric
security devices. Organisations can implement some appropriate controls, including
limiting access to proprietary information to authorised employees, controlling
access where proprietary information is available, and conducting background
checks on employees who will have access to proprietary information. There will,
however, always be some risk that authorised employees will misuse data they have
access to in the course of their work. Organisations can also work with an
experienced intellectual property attorney, and require employees to sign non-
compete and nondisclosure agreements.
A user should never give out credit card numbers, PINs, or any personal
information in response to unsolicited e-mail. Instead of clicking a link in a
suspicious e-mail, call the office or use a URL that is legitimate to verify an e-mail
that claims to be from a bank or financial institution. When submitting sensitive
financial and personal information over the Internet, make sure the server uses
the Secure Sockets Layer protocol (the URL should be https:// instead of the
typical http://).
9.3.13 Sabotage
System security crimes are committed by insiders as much as by outsiders. Some
of the controls discussed above can provide protection against the sabotages
committed by outsiders, but no organisation is immune from an employee
abusing its trust. When it comes to security, organisations often pay attention
only to the parameter of the organisation, and not the inside. Sabotage by
insiders is often orchestrated when employees know their termination is coming.
In some cases, disgruntled employees are still able to gain access after being
terminated. Another potential threat of unauthorised use is when employees quit
or are terminated but there is no coordination between the personnel department
and the computer centre. In some cases, employees still have system access and
an e-mail account after they have left an organisation. It is also not unusual that
employees know the user IDs and passwords of their colleagues
Even though computer usage has reduced the number of jobs, it has also
contributed new positions related to the use of computer systems, such as chief
information officer and other related positions. In brief, it can be said that the
introduction of computers has removed the positions which entailed repetitious
tasks and added job titles that require more skills and intellect. These new
positions are filled by people known as knowledge workers.
Owing to todayÊs advanced technology, a user surfing the Internet and entering a
website may have his personal information captured without his consent. Private
user information that is stored in institutional computer systems like credit
information and family details face the threat of the information being exposed or
wrongly used. From another perspective, there are certain institutions that monitor
the use of computers by their workers without the workers being aware of it.
ACTIVITY 9.3
ACTIVITY 9.4
The financial loss from these security breaches can be significant. In addition,
system security breaches often taint a companyÊs image and may compromise
a companyÊs compliance with applicable laws and regulations.
The use of information technology also leads to the basic issue of the code of
information technology ethics that must be adhered to.
INTRODUCTION
Information technology is widely used in organisations, but does the use of
information technology guarantee higher returns? The answer depends on
whether the use of information technology has clear goals. This is because
comprehensive planning will guarantee positive results.
In this topic, we will look at the development of an information system using the
System Development Life Cycle (SDLC), which is very popular. We will also
discuss one of the main standards used in information system, which is the
Capability Maturity Model (CMM). The aim of using these standards is to ensure
the quality of the system developed, particularly so that the software complies
with software development requirements. In this topic, we will also look at the
important aspects in implementing information technology, starting with the
introduction to the problems that may arise, the sources of these problems, and
how to measure the success of the implementation. Then, we will discuss the
steps of the implementation of a planned information technology project to
ensure that maximum returns are achieved.
Let us now discuss each stage in the System Development Life Cycle.
10.1.1 Investigation
An important task in this phase is early studies to identify whether the system
that will be developed is actually suitable and can fulfil user requirements. They
will identify the resource needs, cost, benefits that will be obtained, and success
factors of the system to be developed.
10.1.2 Analysis
The analysis phase will only be performed after an agreement to develop a new
system is achieved in the investigation phase. In this phase, a study is conducted
to understand the business problems that the organisation plans to solve using
an information system.
SELF-CHECK 10.1
10.1.3 Design
Designing is the next step after the problem analysis. The main function of this
phase is to clarify how the system can carry out the task of solving the problem.
System design is divided into two parts, namely, the logical system design and
physical system design.
After the design specifications are agreed upon by all parties involved and an
agreement is signed, no further changes are permitted.
10.1.4 Programming
Once a suitable design has been identified, programming will be carried out to
translate the system design specification prepared by the system analyst into a
programming code. The selection of a suitable programming language is made
according to the requirements of the system.
SELF-CHECK 10.2
10.1.5 Testing
The testing phase is performed to identify if there are any mistakes (errors) in the
programming that has been developed. There are two types of errors, which are:
10.1.6 Implementation
If the testing phase occurs without problems, this means that the system is ready
to be used. The next step is to make the required preparation to deploy this new
system. In other words, this is the process of changing the old system to the new
system. Four strategies can be used for the changes:
(a) The old and new systems are used simultaneously, in parallel;
(b) The old system is completely replaced with the new system;
(c) The new system will only be used at several departments first for a period
(before expanding to other departments);
(d) The new system will be implemented in stages (for example, all
departments will have to use the new system for a specific function first, i.e.
budget, then expand to other functions like staff leave application, tasks
scheduling, etc).
10.1.7 Maintenance
This new system that is in operation will be studied again after a certain period.
This is to ensure that the user objectives are still being met. The process of
maintenance needs to be performed to ensure that there are no major problems
during the lifetime of that system. Maintenance is carried out by re-testing the
program and modifying the system so that it is in line with the changes that
occur in the organisation or business. This process is made without adding to the
functions of the system.
There are also maintenance procedures that have to be added to the system
functions. This process is performed by adding new features without disturbing
the operation of the system.
The CMM was developed by the Software Engineering Institute (SEI) University
of Carnegie Mellon in Pittsburgh. The model gave schematic pictorial
classification of software development based on the capability of the
organisations. The model comprises five maturity levels which differ from one
software development organisation to another.
The CMM has been the de facto standard in evaluating and rectifying software
development processes. The model helps in establishing a modelling method and
evaluating the maturity of software development processes in organisations.
The CMM has four intended functions to help organisations improve their
software process capabilities:
(a) Identify improvements;
(b) Identify risks in selecting contractors;
(c) Implement a process improvement program; and
(d) Guide the definition and development of the software process.
The model describes the principles and practices contained within and which
serves to help organisations strengthen the maturity of software development
processes from start until completion.
Each maturity level provides a layer in the foundation for continuous process
improvement. Each key process area comprises a set of goals that, when satisfied,
stabilise an important component of the software process. Achieving each level
of the maturity model institutionalises a different component in the software
process, resulting in an overall increase in the process capability of the
organisation.
ACTIVITY 10.1
Search for online resources related to the CMM and find more details
regarding each level of CMM. Compile your answer and compare it
with your coursemates.
There are situations where already developed systems are not used as planned.
How do these happen? They occur because the system produced is not user-
friendly or the data obtained is not reliable.
A system also fails when problems are related to the data received by the system
as input crop up. If the data is inaccurate or inconsistent, wrong, ambiguous, or
cannot be accessed, then we can conclude that the system has failed. In some
situations, the profit gained from using the system does not justify the high cost
that has been invested in it. Besides that, system failure can surface as a result of
operational problems, such as the system always breaks down and does not run
smoothly, causes delays in producing an output, and generates slow feedback.
ACTIVITY 10.2
Which of the system failure problems mentioned earlier is the most
serious? Justify your answer.
SELF-CHECK 10.3
Not all information systems built are successful in achieving their goals. Research
has shown that many developed information systems do not fulfil the needs of
an organisation. The point to learn from this is that the development and
management of the system must be made with a clear understanding and based
on the consideration of the experience of previous implementations.
Figure 10.4: Factors that affect the success of information system implementation
Nevertheless, the views of the end user still have to be clarified with regard
to the scope because the end user has only limited knowledge about the
whole organisation. He may know about the processes that are closely
related to his work, but is less familiar with the overall problems faced by
the organisation. Another advantage of involving the end user is his
readiness in accepting change. If he is involved from the early stages, at
least he will be aware of the changes that will take place and will be able to
take steps to prepare for these changes.
Sometimes the project being implemented is very big and takes a long time to
complete. The continuous involvement of users would affect their daily work.
ACTIVITY 10.3
What may happen if the user is not involved at the early stage in the
system development process? In your view, is this a serious problem?
What are the factors that can determine the level of risk and complexity of
an information system development project? According to researchers in
this field there are three main dimensions that influence the level of risk of
an information system development project. They are:
(a) Project size;
Mistakes often occur in estimating the level and size of projects because of
the lack of experience or incomplete studies done on the matter.
ACTIVITY 10.4
SELF-CHECK 10.4
Some of the strategies include the use of the correct project management
techniques adapted according to the project to be implemented. In general, we
can categorise these project management techniques into three types as indicated
in Figure 10.5.
One important strategy is to ensure that there is a high level of user acceptance of
the system. Many studies have been conducted on the attitudes of people in
general towards accepting any changes. The management should not be tight
fisted in paying the estimated cost to address this issue. Activities like training
for the user, user education, improving the quality of the user interface, and
encouraging the involvement of the user can all be undertaken to ÂtameÊ the user.
It will be more beneficial if the designers can produce an information system that
can integrate the technical expertise while considering the needs of the
organisation and those of the workers.
The System Development Life Cycle (SDLC) is divided into seven main
phases, namely, investigation, analysis, design, programming, testing,
implementation and maintenance.
At the end of each phase, the result that is obtained will help in the following
phase. The SDLC will continue to turn in line with the lifetime of a system.
The Capability Maturity Model (CMM), which consists of five levels ă Initial,
Repeatable, Defined, Managed and Optimising ă is used to evaluate the
maturity of the software development process in organisations.
The system is successful when there is high level of usage; the users are
satisfied with the system; there is positive attitude towards the functions of
the system; the achievement of the system objectives; and the financial
returns that are obtained as a result of using the system.
The success and failure of information systems depend on the role of the user
in the implementation process, the support and commitment from the
management, the level of complexity and project risks, and the quality of
management in implementation process.
Each phase in the process of developing the information system has its own
list of mistakes. Thus, there is a need to reduce or eliminate these mistakes,
by using the project management techniques.
OR
Thank you.