Professional Documents
Culture Documents
Decision Type
Strategic Decision
Information Type
Unstructured Information Semi Structured Information Structured Information
Tactical Decision
Operation Decision
Level Of Management
Low level Management
2. Desktop Publishing
Desktop publishing (DTP) enables you to produce welldesigned pages that combine charts and graphics with text and headlines in a variety off typefaces, it lets you to do all this at your desk, without a ruler, pen or paste. Desktop publishing is software which involve using a microcomputer, mouse, scanner, laser or Ink Jet printer, for mixing text,, and graphics to produce high quality output for commercial printing.
Teleconferencing Systems
1. 2. 3. 4. Audio Conferencing Video Conferencing Computer Conferencing Telecommuting
Batch Schematic
Input (batched)
Output
On-line Schematic
Output
Terminal
Terminal Terminal
Types of TPS
Batch Processing: Batch processing is a resource-saving transaction type that stores data for processing at pre-defined times. Batch processing is useful for enterprises that need to process large amounts of data using limited resources. Real Time Processing: A system whereby each transaction is processed immediately, without the delay of accumulating transactions into a batch. Its primary factor is speed.
Processing
Internally generated transactions: shipped orders purchase orders employee time cards Externally generated transactions: customer orders vendor invoices customer payments Database update: customer orders inventory purchase orders customers suppliers Database
Documents: pick list cheques to vendors receiving notices paycheques Operational reports: finished product inventory status raw materials; packing materials; spare parts; inventory status
Data correction
Data manipulation
Data storage Document production
Components of MIS
1. 2. 3. Hardware Input and output devices constitute the hardware components of MIS Software The programs and applications that convert data into machinereadable language are known as software Procedures Procedures are sets of rules or guidelines, which an organization establishes for the use of a computer-based information system Personnel The computer experts, managers, users, analysts, programmers, database managers, and many other computer professionals who utilize the computer-based information systems are the personnel in a management information system
4.
Cont
Often hardcopy reports Usually require a formal run schedule Management Information system (MIS) generally aid in decision making using past and present data Management information system (MIS) rely on existing corporate data and data flows Usually consists of internal operational data rather then data about the external environment More concerned with data about the past than data relating to the future Often oriented to summary and exception reporting
Cont
c. Demand Reports: Demand reports are generated when someone with authority request information in response to an unscheduled demand. An executive asking for a financial report or director finance order a credit background report of an unknown customer who want to place a large order. d. Summary Reports: Summary reports show totals and trends. An example would be a report showing total sales by office, by product, by salesperson, of overall total sales.
Types of DSS
Communication-driven DSS Most communications-driven DSSs are targeted at internal teams, including partners. Its purpose are to help conduct a meeting, or for users to collaborate. The most common technology used to deploy the DSS is a web or client server. Examples: chats and instant messaging software, online collaboration and net-meeting systems. Data-driven DSS Most data-driven DSSs are targeted at managers, staff and also product/service suppliers. It is used to query a database or data warehouse to seek specific answers for specific purposes. It is deployed via a main frame system, client/server link, or via the web. Examples: computer-based databases that have a query system to check (including the incorporation of data to add value to existing databases).
Cont
Document-driven DSS Document-driven DSSs are more common, targeted at a broad base of user groups. The purpose of such a DSS is to search web pages and find documents on a specific set of keywords or search terms. The usual technology used to set up such DSSs are via the web or a client/server system. Knowledge-driven DSS: Knowledge-driven DSSs or 'knowledgebase' as they are known, are a catch-all category covering a broad range of systems covering users within the organization setting it up, but may also include others interacting with the organization - for example, consumers of a business. It is essentially used to provide management advice or to choose products/services. The typical deployment technology used to set up such systems could be client/server systems, the web, or software running on standalone PCs.
Cont
Model-driven DSS Model-driven DSSs are complex systems that help analyze decisions or choose between different options. These are used by managers and staff members of a business, or people who interact with the organization, for a number of purposes depending on how the model is set up - scheduling, decision analyses etc. These DSSs can be deployed via software/hardware in stand-alone PCs, client/server systems, or the web.
Components of DSS
Database Used for query and analysis Current or historical data from number of applications or groups May be small database or large data warehouse User interface Often a Web interface Software system With models, data mining, other analytical tools
Overview of DSS
Cont..
Model:
Abstract representation that illustrates components or relationships of phenomenon; may be physical, mathematical, or verbal model
1. Statistical model : A statistical model helps establish
relationships, such as relating product sales to differences in age, income or other factors.
2. Optimization models : Optimization models determine
optimal resource allocation to maximize or minimize specific variables such as cost and time.
Cont
3. Forecasting models: Forecasting models are used to forecast future conditions, such as sales, given a range of historical data. 4. Sensitivity analysis models: Sensitivity analysis models ask what if questions to determine the impact of changes in one or more factors.
Characteristics of DSS
They support unstructured decision making. DSS provide support for decisions and problems whose solutions can't be specified in advance. Support decision making at top levels of management. Provide fast response. Provide high degree of user control and interaction. Flexibility in specifying output requirements.
Cont
DSS offer users flexibility, adaptability, and quick response. They are flexible enough to respond to the changing needs of decision makers. DSS operate with little or no assistance from professional programmers. Ease of use and ease of development for non professionals.
With its capabilities for spatial analysis, GIS can reveal hidden patterns and relationships between data that arent readily apparent in spreadsheets or statistical packages. GIS is a data driven DSS Example of GIS Software: GRASS (Open source), AutoDesk & ESRI
Application of GIS
Earthquake Mapping Market Research Demographics, health research & census data
Cont..
Four configuration of group members are :
Group members in one room operating on network with common display screen to share the display for all members. GDSS process is transparent. Group members sit at their respective location and use their desktop and LAN to interact with other members. GDSS process is not as transparent as previous case.
Cont..
Group members are in different cities and they come together
Process of GDSS
A typical GDSS session includes four phases: 1. Idea Generation 2. Idea Consolidation 3. Idea Evaluation 4. Implementation Planning
Advantages of GDSS
Anonymity drive out fear leading to better decisions from a diverse hierarchy of decision makers Parallel Communication eliminate monopolizing providing increased participation, better decisions Automated record keeping no need to take notes, theyre automatically recorded Ability for virtual meetings only need hardware, software and people connected Portability - Can be set up to be portable laptop Global Potential - People can be connected across the world No need for a computer guru although some basic experience is a must
Disadvantages of GDSS
Cost infrastructure costs to provide the hardware software/room/network connectivity can be very expensive and Security especially true when companies rent the facilities for GDSS; also, the facilitator may be a lower-level employee who may leak information to peers Technical Failure power loss, loss of connectivity, relies heavily on bandwidth and LAN/WAN infrastructure properly setup system should minimize this risk Keyboarding Skills reduced participation may result due to frustration Training learning curve is present for users, varies by situation Perception of messages lack of verbal communication could lead to misinterpretation
Expert System
Expert System is an information system application that captures the knowledge or expertise of a specialist and then simulates the thinking of that expert for those with less or no expertise. Expert System are also called knowledge based systems or artificial intelligence based systems
At the center of any Expert System their is knowledge base, which contains specific facts about the expert area and rules that the Expert System will use to make decisions based on those facts.
b. Inference Engine:
The engine inference is the portion of the Expert System that performs reasoning by using the contents of the knowledge base in a particular sequence. During the consultation, the inference engine examines the rules of the knowledge base one at a time, and when rule condition is true the specified action is taken. In Expert Systems terminology, the rule is fixed when the action is taken.
Cont..
Two main methods have been devised for the inference engine to use in examining the rules: forward reasoning and reverse reasoning. 1. Forward Reasoning:
Forward reasoning is also called forward chaining; the rules are examined one after another in a certain order. The order might be the sequence in which the rules were entered into the rule set, or it might be some other sequence specified by the user. As each rule is examined, the Expert Systems attempt to evaluate whether the condition is true or false. For example, a medical expert system may be used to examine a patient's symptoms and provide a diagnosis. Based on these symptoms, the expert system might locate several diseases that the patient may have.
Cont..
2. Reverse Reasoning: Reverse reasoning is also called backward chaining; the inference engine selects a rule and regards it as a problem to be solved. Such procedures are often called goal driven inferential processes. For example, the expert system might be given the goal to "find the symptoms of this disease" and would work back from there, asking questions as necessary to. confirm. c. User Interface: Users often interact with the Expert Systems through a user interface. In most cases, the Expert Systems prompt (asks) the user to supply information about the problem and the user types in the requested data. The data entered are examined by the inference engine and compared to the facts, rules, and the relationships in the knowledge base. This examination and comparison process results in the system continuing to prompt the user for more information until the system has enough data about the current problem so that it can reach a conclusion.
Cont
Expert systems have been used to analyze geophysical data in our search for petroleum and metal deposits (e.g., PROSPECTOR). Used by the investments, banking, and telecommunications industries. They are essential in robotics, natural language processing, theorem proving, and the intelligent retrieval of information from databases.
Measures outcomes on four dimensions: Financial Business process Customer Learning & growth Key performance indicators (KPIs) measure each
dimension
In developing an ESS, first concern is for senior executives and consultants to develop scorecard and then to automate flow of information for each KPI
MIS
DSS
KWS/ OAS
TPS
55
56
Module 3
E-Commerce
The buying and selling of products or services over electronic systems.
The use of commerce in this way, draws innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems.
E-Business
The utilization of information and communication technologies (ICT) in
E-Business
Commerce constitutes the exchange of products and
business.
Electronic business focuses on the use of ICT to enable the
Enterprise Systems
Enterprise systems (also called enterprise wide systems) are systems or processes that involve the entire enterprise or major portions of it. Some Examples; SCM ERP CRM KM PRM DSS
Module IV
Unintentional Threats
Human errors can occur in the design of the hardware and/or information system. An error can also occur in programming, testing, data collection, data entry, authorization and procedures. Human error contribute to more than 50% of control and securityrelated problems in organizations.
Unintentional Threats
Environmental hazards include earthquakes, severe storms, floods, power failures or strong fluctuations, fires (most common hazard), explosions,
etc.
Computer system failures can occur as the result of poor manufacturing or
defective materials.
Intentional Threats
Typically, criminal in nature. Cybercrimes are fraudulent activities committed using computers and communications networks, particularly the Internet.
Intentional Threats
Hacker. An outside person who has penetrated a computer system, usually with no criminal intent.
Espionage or Trespass
The act of gaining access to the information an organization is trying to protect by an unauthorized individual. Industrial espionage occurs in areas where researching information about the competition goes beyond the legal limits. Governments practice industrial espionage against companies in various countries.
Shoulder surfing is looking at a computer monitor or ATM screen over another persons shoulder.
System Vulnerability
A universal vulnerability is a state in a computing system which either: allows an attacker to execute commands as another user; allows an attacker to access data that is contrary to the access restrictions for that data; allows an attacker to pose as another entity; or allows an attacker to
System Vulnerability
An exposure is a state in a computing system (or set of systems) which is not a universal vulnerability, but either: allows an attacker to conduct information gathering activities; allows an attacker to hide activities; includes a capability that behaves as expected, but can be easily compromised; is a primary point of entry that an attacker may attempt to use to gain access to the system or data; and is considered a problem according to some reasonable security policy.
Protecting Privacy
Privacy. The right to be left alone and to be free of unreasonable personal
intrusions.
Two rules have been followed fairly closely in past court decision in many countries:
Protecting Privacy
Information on Internet Bulletin Boards and Newsgroups. Electronic
Information Extortion
When an attacker or formerly trusted employee steal
information from a computer system and then demands
Sabotage or Vandalism
A popular type of online vandalism is hacktivist or cyberactivist activities. Hacktivist or cyberactivist use technology for high-tech civil disobedience to protest operations, policies, or actions of an individual, an organization, or a government agency. Cyber war. War in which a countrys information systems could be paralyzed from a massive attack by destructive software.
Theft is the illegal taking of property that belongs to another individual or organization.
Identity Theft
Crime in which someone uses the personal information of others, usually obtained from the Internet, to create a false identity and then commits fraud.
Controls
Controls evaluation. Identifies security deficiencies and calculates the
Controls (Continued)
Communications (networks) controls. To protect the movement of data across networks and include border security controls, authentication and authorization. Firewalls. System that enforces access-control policy between two networks. Encryption. Process of converting an original message into a
Controls (Continued)
All encryption systems use a key. Symmetric encryption. Sender and the recipient use the same key. Public-key encryption. Uses two different keys: a public key and a private key. Certificate authority. Asserts that each computer is identified
Controls (Continued)
Virtual Private Networking. Uses the Internet to carry information within a company and among business partners
IS Auditing
Information systems auditing. Independent or unbiased observers
IS Auditing Procedure
Auditing around the computer means verifying processing by
resource.
Risk management. To identify, control and minimize the impact of threats. Risk analysis. To assess the value of each asset being protected, estimate the probability it might be compromised,
occurring, and
(2) developing a means of recovery should the threat become a reality.
Managerial Issues
Learning Objectives
Identify the following aspects of customer relationship management (CRM), enterprise resource management (ERP), and supply chain (SCM) mgt systems:
Business processes supported Customer and business value provided Potential challenges and trends
100
102
103
104
105
106
Failures
Due to lack of understanding & preparation. CRM is not a silver bullet
107
108
110
111
Decreased Costs
Reductions in transaction processing costs and hardware, software, and IT support staff
112
Enterprise agility
Results in more flexible organizational structures, managerial responsibilities, and work roles
113
114
115
116
117
119
120
chain management tools enable managers to make informed business decisions about the operation of their supply chain
chain management tools facilitate planning and production scheduling based on known business constraints
121
Supply
Supply Chain Management Overview
-- OR --
122
Strategic Planning
Tactical Planning Warehouse Management Transportation Management Order Management Operational Planning Inventory Management Event Management
Supply Chain Planning services configure operations to best meet projected demand levels The planning horizon ranges from developing a long term strategic outlook to developing a short term tactical production schedule
Weeks / Months
Hours / Days
Quarters
Years
Source: BAH
Supply Chain Execution services monitor and control production operations They provide real time tracking and alert 123 notification
Network Design
Design where to place production facilities and optimize the end to end chain Construct alternate flow scenarios that incorporate associated constraints
Anticipate demand based on historical trends and current conditions Perform what if analysis - highlight the impact of changing demand drivers
Production Planning
Production Scheduling
Supply Planning Balances unconstrained demand against high level supply chain constraints Reflect order priority and due dates
Decompose the supply plan into sub assembly / production needs by site Balance production capacity across sites
Optimize processing flows, sequence, and timing Produce a finite capacity production schedule
Quarters
Weeks / Months
Hours / Days
124
Warehouse
Transportation
Order Management
Management
Management
Record customer orders and track status from receipt to final delivery Direct efficient response to orders with dynamic cost / benefit analysis of options
Streamline information movement and provide tight inventory control Inventories replenished using kanban, min-max, or reorder point
Event Management
Monitor and manage critical planning and event information Broadcast alert notification and present response alternatives based on pre determined business rules
125
Source: i2 Technologies
126
SCM vendors
Although each of the vendors claim to provide an end to end solution, they actually fall into two distinct camps
First are the ERP vendors who provide a strong solution for integrating the data environment and providing visibility Second are the SCM vendors who provide robust optimization solutions In combination, with an ERP vendor providing the data environment and a SCM vendor providing the optimization solution, you can achieve a very elegant solution
SCM Focused
i2 Manugistics Aspentech Logility
Source: Gartner
127
128
129
130
131
132
133
134
135