Software, Hardware Telecommunication Networks Gather, Create, Distribute Useful Data
Software, Hardware Telecommunication Networks Gather, Create, Distribute Useful Data
Ans:
Modern technology can significantly boost your company's performance and productivity.
Information systems are no exception.
➢ Organizations worldwide rely on them to research and develop new ways to generate
revenue, engage customers and streamline time-consuming tasks.
➢ With an information system, businesses can save time and money while making smarter
decisions.
➢ A company's internal departments, such as marketing and sales, can communicate better
and share information more easily.
➢ Since this technology is automated and uses complex algorithms, it reduces human error.
Furthermore, employees can focus on the core aspects of a business rather than spending
hours collecting data, filling out paperwork and doing manual analysis.
➢ Thanks to modern information systems, team members can access massive amounts of data
from one platform.
➢ For example, they can gather and process information from different sources, such as
vendors, customers, warehouses and sales agents, with a few mouse clicks.
● Email: The email application also covers file attachments such as audio, video,
and documents.
● Voice Mail: This application records and stores phone messages into the
system’s memory and can be retrieved anytime.
● Word Processing: Word processing covers the creation of documents,
including memos, reports, letters, and anything else that’s printable
electronically. The created text can be copied, edited, and stored via word
processing commands, and checked for grammar and spelling, line and word
counting, and headers and footers.
● Knowledge Work System (KWS)
The KWS is a specialized system that expedites knowledge creation and ensures that
the business's technical skills and knowledge are correctly applied. The Knowledge
Work System aids workers in creating and disseminating new information using
graphics, communication, and document management tools. Here are some examples
of KWS:
Middle managers handle much of the administrative chores for day-to-day routines and
performance monitoring, ensuring that all the work is aligned with the organization's
needs. That's why MIS is such a valuable tool. Management Information Systems are
specially designed to help middle managers and supervisors make decisions, plan, and
control the workflow. The MIS pulls transactional data from various Transactional
Processing Systems, compiles the information, and presents it in reports and displays.
Additionally, these reports can be produced monthly, quarterly, or annually, although MIS
can have more immediate reports (e.g., hourly, daily).
Decision Support Systems use different decision models to analyze or summarize large
pieces of data into an easy-to-use form that makes it easier for managers to compare
and analyze information. Often, these summaries come in the form of charts and tables.
The ESS provides greater telecommunication, better computing capabilities, and more
efficient display options than the DSS. Executives use ESS to make effective decisions
through summarized internal data taken from DSS and MIS and external sources. In
addition, executive support systems help monitor performances, track competitors, spot
opportunities, and forecast future trends.
1. System approach:
MIS follows the system approach, which implies a step by step approach to the
study of a system and its performance in the light of the objective for which it has
been constituted. It means taking an inclusive view at sub-systems to operate
within an organization.
2. Management-oriented:
The management-oriented characteristic of MIS implies that top-down approach
needs to be followed for designing MIS. A top-down method says the initiation of
system development determines management requirements as well as business
goals. MIS implies the management dynamically to the system development
towards the completion of management decisions.
3. As per requirements:
The design and development of MIS should be as per the information required by
the managers. The required design and development information is at different
levels, viz., strategic planning, management control and operational control. It
means MIS should cater to the specific needs of managers in the hierarchy of an
organization.
4. Future-oriented:
The design and development of MIS should also be a future purpose so that the
system is not restricted to provide only the past information.
5. Integrated:
A complete MIS is a combination of its multiple sub-components to provide the
relevant information to take out a useful decision. An integrated system, which
blends information from several operational areas, is a necessary characteristic
of MIS.
6. Common data flows:
This concept supports numerous basic views of system analysis such as
avoiding duplication, combining similar functions and simplifying operations. The
expansion of common data flow is a cost-effectively and logical concept.
7. Long-term planning:
MIS should always develop as a long term planning because it involves logical
planning to get success in an organization. While developing MIS, the analyst
should keep future oriented analysis and needs of the company in mind.
8. Relevant connection of sub-system planning:
The MIS development should be decomposed into its related subsystems. These
subsystems must be meaningful with proper planning.
9. Central database:
It contains data in tabular form. The database is responsible for operations like
insertion, deletion, updation of records. This database covers information related
to inventory, personnel, vendors, customers, etc. the data stored in the database.
1. System Software
2. Application Software
3. Procedures
3. Databases:
Data are the raw facts and figures that are unorganized that are later processed
to generate information. Softwares are used for organizing and serving data to
the user, managing physical storage of media and virtual resources. As the
hardware can’t work without software the same as software needs data for
processing. Data are managed using Database management system.
Database software is used for efficient access for required data, and to manage
knowledge bases.
4. Network:
5. Human Resources:
It is associated with the manpower required to run and manage the system.
People are the end user of the information system, end-user use information
produced for their own purpose, the main purpose of the information system is to
benefit the end user. The end user can be accountants, engineers, salespersons,
customers, clerks, or managers etc. People are also responsible to develop and
operate information systems. They include systems analysts, computer
operators, programmers, and other clerical IS personnel, and managerial
techniques.
2) Reduction in jobs
As tasks are completed quickly and efficiently using an information system so employees get more
time. So, to operate fully companies are trying to combine jobs in order to reduce the number of
employees. In some cases, machines are replacing human labor and eliminating jobs.
3) Security breaches
Electronic information is highly prone to security breaches. Hackers are constantly updating and
upgrading themselves along with the technology. So, companies should keep a security specialist
employed all the time to prevent any threat to the security of their vital information. This interrupts
the smooth functioning of the system, causing customer dissatisfaction and other problems for the
company.
Q6.Explain the role of IS in framing organizational strategy & bringing competitive advantage?
reactive
A strategic plan allows organizations to foresee their future and to prepare accordingly. Through
strategic planning, companies can anticipate certain unfavourable scenarios before they happen
and take necessary precautions to avoid them. With a strong strategic plan, organizations can
be proactive rather than merely reacting to situations as they arise. Being proactive allows
organizations to keep up with the ever-changing trends in the market and always stay one step
A strategic plan helps to define the direction in which an organization must travel, and aids in
establishing realistic objectives and goals that are in line with the vision and mission charted out
for it. A strategic plan offers a much-needed foundation from which an organization can grow,
evaluate its success, compensate its employees and establish boundaries for efficient
decision-making.
A strategic plan provides management the roadmap to align the organization’s functional
activities to achieve set goals. It guides management discussions and decision making in
determining resource and budget requirements to accomplish set objectives — thus increasing
operational efficiency.
Through a dedicated strategic plan, organizations can get valuable insights on market trends,
consumer segments, as well as product and service offerings which may affect their success.
An approach that is targeted and well-strategized to turn all sales and marketing efforts into the
best possible outcomes can help to increase profitability and market share.
Business is a tumultuous concept. A business may be booming one year and in debt the next.
With constantly changing industries and world markets, organizations that lack a strong
foundation, focus and foresight will have trouble riding the next wave. According to reports, one
of every three companies that are leaders in their industry might not be there in the next five
years… but the odds are in favour of those that have a strong strategic plan!
If you’re considering adopting a strategic plan at your organization, or are looking for a way to
align your staff and daily operations on your existing one, then Envisio may just be the solution
you’ve been looking for. Envisio’s cloud-based strategic plan management software helps
organizations manage their strategic and operating plans, track performance, and report to
stakeholders.
Q7. What are the challenges faced by knowledge management in diff business scenarios?
Some of major challenges faced by knowledge management function are as follows −
● Security − Accommodating the right level of security for knowledge
users, while allowing easy access to those with the proper credentials.
colleagues, persuade them to share their knowledge base for the benefit
of the organization.
● Keeping Accurate Data − It is also the basic function to keep basic data
2. Load Manager –
● The Load Manager performs all operations associated with the
extraction of loading data in the data warehouse.
● These tasks include the simple transformation of data to prepare data
for entry into the warehouse.
3. Warehouse Manage –
● The warehouse manager is responsible for the warehouse
management process.
● The operations performed by the warehouse manager are the analysis,
aggregation, backup and collection of data, de-normalization of the
data.
4. Query Manager –
● Query Manager performs all the tasks associated with the management
of user queries.
● The complexity of the query manager is determined by the end-user
access operations tool and the features provided by the database.
5. Detailed Data –
● It is used to store all the detailed data in the database schema.
● Detailed data is loaded into the data warehouse to complement the data
collected.
6. Summarized Data –
● Summarized Data is a part of the data warehouse that stores
predefined aggregations
● These aggregations are generated by the warehouse manager.
8. Metadata –
● Metadata is basically data stored above data.
● It is used for extraction and loading process, warehouse, management
process, and query management process.
Q9. Explain the significance of knowledge for a business firm and differentiate between
knowledge and information.
Tacit knowledge - personal know-how or skills rooted in experience or practice (eg aesthetic
sense or intuition). Tacit knowledge is difficult to write down, visualise or transfer.
Explicit knowledge - articulated knowledge recorded in documents, memos, databases, etc.
Explicit knowledge is easy to store, distribute and communicate.
Embedded knowledge - skills and understanding locked in processes, products, rules or
organisational culture (eg informal routines, codes of conduct, organisational ethics).
Knowledge can belong to individuals or groups within your business, or exist at the
organisational level. You can also share it with different organisations.
Information vs knowledge table
Basis of
compari Information Knowledge
son
Knowledge is experience
Oriented Information is theory oriented. oriented as it is derived through
experiences.
Knowledge is combination of
Combina Information is combination of
information, experience and
tion of data and context
intuition.
Data Mart:
Data mart is a logical subset of the complete data warehouse and prepared for a
single business process in an organization. When they come together, an integrated enterprise
data warehouse is formed. Data marts must be built from shared dimensions and fact. By this
way they can be combined and used together.
The database approach is an improvement on the shared file solution as the use of a
database management system (DBMS) provides facilities for querying,data security
and integrity, and allows simultaneous access to data by several different users.
❖ Database: A database is a collection of related data.
❖ The Database is a shared collection of logically related data, designed to meet the
information needs of an organization.
❖ A database is a computer-based record keeping system whose over all purpose is to
record and maintains information.
❖ The database is a single, large repository of data, which can be used simultaneously
by many departments and users. Instead of disconnected files with redundant data,
all data items are integrated with a minimum amount of duplication.
Building blocks of a Database
The following three componentsform the building blocks of a database. They storethe
data
that we want to save in our database.
i. Columns. Columns are like fields, that is, individual items of data that we wish to
store. A Student' Roll Number, Name, Address etc. are all examplesof columns.
They are also like the columns found in spreadsheets (the A, B,C etc. along the
top).
ii. Rows. Rows are like records as they contain data of multiple columns (like the 1,
2, 3 etc. in a spreadsheet). A row can be made up of as many or as few columns as
you want. This makes reading data much more efficient - you fetch what you want.
iii. Tables. A table is a logical group of columns. For example, you may have atable
that stores details of customers' names and addresses. Another table would be
used to store details of parts and yet another would be used for supplier's names
and addresses.
There are five basic analytical operations that can be performed on an OLAP
cube:
6.
7. Slice: It selects a single dimension from the OLAP cube which results
in a new sub-cube creation. In the cube given in the overview section,
Slice is performed on the dimension Time = “Q1”.
Q15. What are the measures to improve cyber security with eg.
Use strong passwords
Strong passwords are vital to good online security. Make your password difficult to guess by:
Make sure that individuals can only access data and services for which they are authorised. For
example, you can:
Put up a firewall
Firewalls are effectively gatekeepers between your computer and the internet. They act as a barrier
to prevent the spread of cyber threats such as viruses and malware. It's important to set up firewall
devices properly and check them regularly to ensure their software/firmware is up to date, or they
may not be fully effective. Read more about firewalls in server security.
You should use security software, such as anti-spyware, anti-malware and anti-virus programs, to
help detect and remove malicious code if it slips into your network. See out detailed guidance to help
you detect spam, malware and virus attacks.
Updates contain vital security upgrades that help protect against known bugs and vulnerabilities.
Make sure that you keep your software and devices up-to-date to avoid falling prey to criminals.
You can use intrusion detectors to monitor systems and unusual network activity. If a detection
system suspects a potential security breach, it can generate an alarm, such as an email alert, based
upon the type of activity it has identified. See more on cyber security breach detection.
1. Personal Privacy:
It is an important aspect of ethical issues in information technology. IT facilitates the
users having their own hardware, operating system and software tools to access the
servers that are connected to each other and to the users by a network. Due to the
distribution of the network on a large scale, data or information transfer in a big
amount takes place which leads to the hidden chances of disclosing information and
violating the privacy of any individuals or a group. It is a major challenge for IT
society and organizations to maintain the privacy and integrity of data. Accidental
disclosure to inappropriate individuals and provisions to protect the accuracy of data
also comes in the privacy issue.
2.
Access Right:
The second aspect of ethical issues in information technology is access right. Access
right becomes a high priority issue for the IT and cyberspace with the great
advancement in technology. E-commerce and Electronic payment systems evolution
on the internet heightened this issue for various corporate organizations and
government agencies. Network on the internet cannot be made secure from
unauthorized access. Generally, the intrusion detection system are used to
determine whether the user is an intruder or an appropriate user.
3.
Harmful Actions:
Harmful actions in the computer ethics refers to the damage or negative
consequences to the IT such as loss of important information, loss of property, loss
of ownership, destruction of property and undesirable substantial impacts. This
principle of ethical conduct restricts any outsiders from the use of information
technology in manner which leads to any loss to any of the users, employees,
employers and the general public. Typically, these actions comprises of the
intentional destruction or alteration of files and program which drives a serious loss
of resources. To recover from the harmful actions extra time and efforts are required
to remove the viruses from the computer systems.
4.
Patents:
It is more difficult to deal with these types of ethical issues. A patent can preserve the
unique and secret aspect of an idea. Obtaining a patent is very difficult as compared
with obtaining a copyright. A thorough disclosure is required with the software. The
patent holder has to reveal the full details of a program to a proficient programmer for
building a program.
5.
Copyright:
The information security specialists are to be familiar with necessary concept of the
copyright law. Copyright law works as a very powerful legal tool in protecting
computer software, both before a security breach and surely after a security breach.
This type of breach could be the mishandling and misuse of data, computer
programs, documentation and similar material. In many countries, copyright
legislation is amended or revised to provide explicit laws to protect computer
programs.
6.
Trade Secrets:
Trade secrets is also a significant ethical issue in information technology. A trade
secret secures something of value and usefulness. This law protects the private
aspects of ideas which is known only to the discover or his confidants. Once
disclosed, trade secret is lost as such and is only protected by the law for trade
secrets. The application of trade secret law is very broad in the computer range,
where even a slight head start in the advancement of software or hardware can
provide a significant competitive influence.
7.
Liability:
One should be aware of the liability issue in making ethical decisions. Software
developer makes promises and assertions to the user about the nature and quality of
the product that can be restricted as an express warranty. Programmers or retailers
possess the legitimate to determine the express warranties. Thus they have to be
practical when they define any claims and predictions about the capacities, quality
and nature of their software or hardware. Every word they say about their product
may be as legally valid as stated in written. All agreements should be in writing to
protect against liability. A disclaimer of express warranties can free a supplier from
being held responsible of informal, speculative statements or forecasting made
during the agreement stages.
8.
Piracy:
Piracy is an activity in which the creation of illegal copy of the software is made. It is
entirely up to the owner of the software as to whether or not users can make backup
copies of their software. As laws made for copyright protection are evolving, also
legislation that would stop unauthorized duplication of software is in consideration.
The software industry is prepared to do encounter against software piracy. The
courts are dealing with an increasing number of actions concerning the protection of
software.
Q17.What are the major security threats to the IS & discuss the measures taken to control
Information Security.
Information Security threats can be many like Software attacks, theft of
intellectual property, identity theft, theft of equipment or information, sabotage,
and information extortion.
Threat can be anything that can take advantage of a vulnerability to breach
security and negatively alter, erase, harm object or objects of interest.
Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many
users believe that malware, virus, worms, bots are all same things. But they are
not same, only similarity is that they all are malicious software that behaves
differently.
Malware is a combination of 2 terms- Malicious and Software. So Malware
basically means malicious software that can be an intrusive program code or
anything that is designed to perform malicious operations on system. Malware
can be divided in 2 categories:
1. Infection Methods
2. Malware Actions
1. Virus – They have the ability to replicate themselves by hooking them to the
program on the host computer like songs, videos etc and then they travel all over the
Internet. The Creeper Virus was first detected on ARPANET. Examples include File
Virus, Macro Virus, Boot Sector Virus, Stealth Virus etc.
2. Worms – Worms are also self-replicating in nature but they don’t hook themselves to
the program on host computer. Biggest difference between virus and worms is that
worms are network-aware. They can easily travel from one computer to another if
network is available and on the target machine they will not do much harm, they will,
for example, consume hard disk space thus slowing down the computer.
3. Trojan – The Concept of Trojan is completely different from the viruses and worms.
The name Trojan is derived from the ‘Trojan Horse’ tale in Greek mythology, which
explains how the Greeks were able to enter the fortified city of Troy by hiding their
soldiers in a big wooden horse given to the Trojans as a gift. The Trojans were very
fond of horses and trusted the gift blindly. In the night, the soldiers emerged and
attacked the city from the inside.
Their purpose is to conceal themselves inside the software that seem legitimate and
when that software is executed they will do their task of either stealing information or
any other purpose for which they are designed.
They often provide backdoor gateway for malicious programs or malevolent users to
enter your system and steal your valuable data without your knowledge and
permission. Examples include FTP Trojans, Proxy Trojans, Remote Access Trojans
etc.
4. Bots –: can be seen as advanced form of worms. They are automated processes
that are designed to interact over the internet without the need for human interaction.
They can be good or bad. Malicious bot can infect one host and after infecting will
create connection to the central server which will provide commands to all infected
hosts attached to that network called Botnet.
5. Adware – Adware is not exactly malicious but they do breach privacy of the users.
They display ads on a computer’s desktop or inside individual programs. They
come attached with free-to-use software, thus main source of revenue for such
developers. They monitor your interests and display relevant ads. An attacker can
embed malicious code inside the software and adware can monitor your system
activities and can even compromise your machine.
6. Spyware – It is a program or we can say software that monitors your activities on
computer and reveal collected information to an interested party. Spyware are
generally dropped by Trojans, viruses or worms. Once dropped they install
themselves and sits silently to avoid detection.
One of the most common example of spyware is KEYLOGGER. The basic job of
keylogger is to record user keystrokes with timestamp. Thus capturing interesting
information like username, passwords, credit card details etc.
7. Ransomware – It is type of malware that will either encrypt your files or will lock
your computer making it inaccessible either partially or wholly. Then a screen will
Data loss – if the data center caught fire or was flooded, the hardware
with the data can be damaged, and the data on it will be lost. As a
standard security best practice, most organizations keep backups of the
data at remote places. The backups are made periodically and are
usually put in more than one remote area.
1. Personal responsibility
Each person who works for a business, whether on the executive level or the
entry-level, will be expected to show personal responsibility.
2. Corporate responsibility
3. Loyalty
Both businesses and their employees are expected to show loyalty. Employees
should be loyal to their co-workers, managers, and the company. This might
involve speaking positively about the business in public and only addressing
personnel or corporate issues in private.
4. Respect
Respect is an important business ethic, both in the way the business treats its
clients, customers and employees, and also in the way its employees treat one
another.
5. Trustworthiness
6. Fairness
When a business exercises fairness and integrity, it applies the same standards
for all employees regardless of rank.
Not only will businesses act ethically toward their clients, customers and
employees, but also with regard to the community and the environment.
1. Data Protection
Businesses often collect information about their customers. This may only be an
email address, but it could also be their physical address, or health or financial
information, depending on the nature of the business. Companies that collect
customer data normally promise to secure that information and not share it
without the customer's permission. The same applies to employee information.
Business ethics usually protect employees' personnel records and allow access
only to those with a valid need to know.
2. Customer Prioritization
One way a business shows respect for its customers is by prioritizing the
customer's needs, even at the expense of the company. For example, if a
customer purchases goods or services that turn out to be unsatisfactory, the
business will do what it must to recompense the customer. If it is a faulty product,
the business will offer a replacement or a refund. If the customer experienced
bad service, the company will usually apologize and offer a discount or some
other form of compensation.
3. Workplace Diversity
4. Whistleblower Protection
5. Corporate Transparency
Malware