Understanding Management Information Systems
Understanding Management Information Systems
Definition:
It refers to the processing of information through computers and other intelligent devices
to manage and support managerial decisions within an organization.
MIS Importance:
Management Information System is formal method of collecting information in
summarized form. It is network established within an organization to provide information
to managers. It provides systematic and analytical information necessary to all level of
1
managers. It helps managers to take right decision at the right time. Importance of MIS is
described as follows:
1. Management Information System is always management oriented and keeps in view
every level of management and gets the desired information.
2. Integrated – refers to how different components (sub systems) are actually tied up
together. eg: different departments of organization linked together.
3. Useful for planning – as every organization makes log-term and short-term plans with
the help of information like sales & production, capital investments, stocks etc
management can easily plan..
4. Effective Management Information System helps the management to know deviations
of actual performance from pre-set targets and control things.
5. It‘s important for increasing efficiency.
6. MIS provides updated results of various departments to management.
7. MIS is highly computerized so it provides accurate results.
8. MIS adds to the intelligence, alertness, awareness of managers by providing them
information in the form of progress and review reports of an ongoing activity.
9. Helps managers in decision- making.
To gain the maximum benefits from your company's information system, you have to
exploit all its capacities. Information systems gain their importance by processing the data
from company inputs to generate information that is useful for managing your operations.
To increase the information system's effectiveness, you can either add more data to make
the information more accurate or use the information in new ways.
Management Information Systems (MIS) not only include software systems, but the entire
set of business processes and resources that are used to pull together information from
functional or tactical systems. Data is then presented in a user-friendly and timely manner
so that mid and upper-level managers can use it to take the right actions. The entire system
is designed so that the company will meet its strategic and tactical goals.
Nature and Scope of MIS:
The concept of MIS is interdisciplinary in nature, i.e. it has borrowed its concepts from a
large number of disciplines like Accounting, Computers, Organizations, Management,
Operations Research and Behavioural Sciences, etc .MIS is neither a pure science nor an
art; it is recognized as a combination of both. An information system is a logical system,
which is concerned with ‗how‘ something is being accomplished and thus may be
differentiated from physical system, which is the process itself and is concerned with the
content or ‗what‘ is going [Link] ,in fact encompasses both physical and information
systems. There has been a lot of debate on the issue whether MIS is more management –
2
oriented or computer –oriented. Though there are advocates of both sides, MIS should be
considered more of a management subject than of computers because of the simple logic
that computers are just tool in the hands of managers. Computers are used for their
characteristics like accuracy, speed and capacity to handle large amount of data.
Nowadays MIS finds application in all functional areas of every type of business
organizations at all levels. MIS caters to information needs of managers in an
organization, thus its scope lies in structured as well as unstructured type of information
which could be gathered from internal as well as external sources of the organization.
Further, with the advent of computers and communication technology, the scope of MIS
has increased manifold.
3
Procedures:
Formal operating procedures, which are required to operate a system, such as manuals, are
also regarded as physical elements.
Operating Personnel:
Personnel like Computer Operators, Computer Programmers, System Analysts, System
Managers, etc., are the operating people of the information systems.
Input and Output:
Various physical inputs and outputs from the information system, existing in forms like
printout, reports etc.
4
2. Classification by Application
In terms of applications, information can be categorized as:
Planning Information: These are the information needed for establishing standard
norms and specifications in an organization. This information is used in strategic,
tactical, and operation planning of any activity. Examples of such information are
time standards, design standards.
Control Information: This information is needed for establishing control over all
business activities through feedback mechanism. This information is used for
controlling attainment, nature and utilization of important processes in a system.
When such information reflects a deviation from the established standards, the
system should induce a decision or an action leading to control.
Knowledge Information: Knowledge is defined as "information about
information". Knowledge information is acquired through experience and learning,
and collected from archival data and research studies.
Organizational Information: Organizational information deals with an
organization’s environment, culture in the light of its objectives. Karl Weick's
Organizational Information Theory emphasizes that an organization reduces its
equivocality or uncertainty by collecting, managing and using these information
prudently. This information is used by everybody in the organization; examples of
such information are employee and payroll information.
Functional/Operational Information: This is operation specific information. For
example, daily schedules in a manufacturing plant that refers to the detailed
assignment of jobs to machines or machines to operators. In a service oriented
business, it would be the duty roster of various personnel. This information is
mostly internal to the organization.
Database Information: Database information construes large quantities of
information that has multiple usage and application. Such information is stored,
5
retrieved and managed to create databases. For example, material specification or
supplier information is stored for multiple users.
Information and Systems Concept:
An information system (IS) is an organized system for the collection, organization,
storage and communication of information. More specifically, it is the study of
complementary networks that people and organizations use to collect, filters, and
process, create and distribute data.
The concept that information is the message has different meanings in different
contexts. Thus the concept of information becomes closely related to notions of
constraint, communication, control, data, form, education, knowledge, meaning,
understanding, mental stimuli, pattern, perception,
representation, and entropy.
A typical organization is divided into operational, middle, and upper level. The
information requirements for users at each level differ. Towards that end, there are
number of informationsystems that support each level in an organization.
7
Tactical users make semi-structured decisions. The decisions are partly based on set
guidelines and judgmental calls. As an example, a tactical manager can check the
credit limit and payments history of a customer and decide to make an exception to
raise the credit limit for a particular customer. The decision is partly structured in the
sense that the tactical manager has to use existing information to identify a payments
history that benefits the organization and an allowed increase percentage.
11
Some other authors Urwiller and Florick (2008) noted that to create competitive
difference as a result of computerization first condition are innovations in information
technology, which today have become an integral part of organizational strategy and
planning processes. Information Technology is not only possible, but is streamlined
entity and the way to create competitive edge. To achieve competitive difference
information technology and its use in business processes results in a new way of doing
business (e-business) as well as providing products and services electronically. So
information technology plays a crucial role in supporting the business by creating
competitive advantage (Competitive Advantage), offering services and products so that
customers appreciate more than the competition. This technology is able to provide
operational excellence (Operational excellence), initiatives in key business branches
(Major Business Initiatives) then the decision (Decision Making) and organizational
transformation (Organizational Transformation). In what manner is information
technology provides operational perfection (Operational Excellence) being efficient in
what we do, using transaction-processing systems within the organization Transaction
processing system (TPS) using Customer self-service systems(CSS) to make their
offer customers their transaction processing etc.
12
UNIT-II
BUSINESS APPLICATIONS OF INFORMATION SYSTEMS
Business software or a business application is any software or set of computer programs
used by business users to perform various business functions. These business applications
are used to increase productivity, to measure productivity and to perform other business
functions accurately.
Technology has important effects on business operations. No matter the size of your
enterprise, technology has both tangible and intangible benefits that will help you make
money and produce the results your customers demand. Technological infrastructure
affects the culture, efficiency and relationships of a business.
For example, office software suites might include word processing, spreadsheet, database,
presentation, and email applications. Graphics suites such as Adobe Creative Suite include
applications for creating and editing images, while Sony Audio Master Suite is used for
audio production etc.
E-Commerce:
E-Commerce or Electronics Commerce is a methodology of modern business, which
addresses the requirements of business organizations. It can be broadly defined as the
process of buying or selling of goods or services using an electronic medium such as the
Internet.
Features of E-Commerce:
1. Non-Cash Payment − E-Commerce enables the use of credit cards, debit cards,
smart cards, electronic fund transfer via bank's website, and other modes of
electronics payment.
2. 24x7 Service availability − E-commerce automates the business of enterprises and
the way they provide services to their customers. It is available anytime, anywhere.
3. Advertising / Marketing − E-commerce increases the reach of advertising of
products and services of businesses. It helps in better marketing management of
products/services.
4. Improved Sales − Using e-commerce, orders for the products can be generated
anytime, anywhere without any human intervention. It gives a big boost to existing
sales volumes.
5. Support − E-commerce provides various ways to provide pre-sales and post-
13
sales assistance to provide better services to customers.
6. Inventory Management − E-commerce automates inventory management.
Reports get generated instantly when required. Product inventory management
becomes very efficientand easy to maintain.
7. Communication improvement − E-commerce provides ways for faster,
efficient, reliable communication with customers and partners.
E-commerce business models can generally be categorized into the following
categories.
Consumer - to - Consumer
A website following the C2C business model helps consumers to sell their assets like
residential property, cars, motorcycles, etc., or rent a room by publishing their
information on the website. Website may or may not charge the consumer for its
services. Another consumer may opt to buy the product of the first customer by
14
viewing the post/advertisement on the website.
Consumer - to - Business
In this model, a consumer approaches a website showing multiple business
organizations for a particular service. The consumer places an estimate of amount
he/she wants to spend for a particular service. For example, the comparison of interest
rates of personal loan/car loan provided by various banks via websites. A business
organization who fulfils the consumer's requirement within the specified budget,
approaches the customer and provides its services.
Business - to - Government
B2G model is a variant of B2B model. Such websites are used by governments to trade
and exchange information with various business organizations. Such websites are
accredited by the government and provide a medium to businesses to submit
application forms to the government.
Government - to – Business
Governments use B2G model websites to approach business organizations. Such
websites support auctions, tenders, and application submission functionalities.
15
Government - to - Citizen
Governments use G2C model websites to approach citizen in general. Such websites
support auctions of vehicles, machinery, or any other material. Such website also provides
services like registration for birth, marriage or death certificates. The main objective of
G2C websites is to reduce the average time for fulfilling citizen‘s requests for various
government services.
1. Advantages to Organizations
Using e-commerce, organizations can expand their market to national and international
markets with minimum capital investment. An organization can easily locate more
customers, best suppliers, and suitable business partners across the globe.
E-commerce helps organizations to reduce the cost to create process, distribute,
retrieve and manage the paper based information by digitizing the information.
E-commerce improves the brand image of the company.
E-commerce helps organization to provide better customer services.
E-commerce helps to simplify the business processes and makes them faster and
efficient.
E-commerce reduces the paper work.
E-commerce increases the productivity of organizations. It supports "pull" type
supply management. In "pull" type supply management, a business process starts
when a request comes from a customer and it uses just-in-time manufacturing
way.
[Link] to Customers
It provides 24x7 supports. Customers can enquire about a product or service
and place orders anytime, anywhere from any location.
E-commerce application provides users with more options and quicker delivery
of products.
E-commerce application provides users with more options to compare and
select the cheaper and better options.
16
A customer can put review comments about a product and can see what others
are buying, or see the review comments of other customers before making a
final purchase.
E-commerce provides options of virtual auctions.
It provides readily available information. A customer can see the relevant
detailed information within seconds, rather than waiting for days or weeks.
E-Commerce increases the competition among organizationsand as a
result, organizations provide substantial discounts to customers.
3. Advantages to Society
Customers need not travel to shop a product, thus less traffic on road and low air pollution.
E-commerce helps in reducing the cost of products, so less affluent people can
also afford the products.
E-commerce has enabled rural areas to access services and products, which are
otherwise not available to them.
E-commerce helps the government to deliver public services such as healthcare,
education, social services at a reduced cost and in an improved manner.
The disadvantages of e-commerce can be broadly classified into two major categories
−
1. Technical disadvantages
2. Non-Technical disadvantages
Technical Disadvantages
There can be lack of system security, reliability or standards owing to poor
implementation of e-commerce.
The software development industry is still evolving and keeps changing rapidly.
In many countries, network bandwidth might cause an issue.
Special types of web servers or other software might be required by the vendor,
setting the e-commerce environment apart from network servers.
Sometimes, it becomes difficult to integrate an e-commerce software or website
with existing applications or databases.
There could be software/hardware compatibility issues, as some e-commerce
software may be incompatible with some operating system or any other
component.
Non-Technical Disadvantages
Initial cost − The cost of creating/building an e-commerce application in-house
may be very high. There could be delays in launching an e-Commerce application
due to mistakes, and lack of experience.
User resistance − Users may not trust the site being an unknown faceless seller.
Such mistrust makes it difficult to convince traditional users to switch from
physical stores to online/virtual stores.
Security/ Privacy − It is difficult to ensure the security or privacy on online
transactions.
Lack of touch or feel of products during online shopping is a drawback.
E-commerce applications are still evolving and changing rapidly.
17
Internet access is still not cheaper and is inconvenient to use for many potential
customers, for example, those living in remote villages.
ERP SYSTEM:-
Enterprise Resource Planning (ERP) is a software that is built to organizations belonging
to different industrial sectors, regardless of their size and strength.
The ERP package is designed to support and integrate almost every functional area of a
business process such as procurement of goods and services, sale and distribution, finance,
accountings, human resource, manufacturing, production planning, logistics & warehouse
management.
Functional Areas
ERP is a business management software is usually a suite of integrated applications that a
company can use to collect, store, manage, and interpret data from many functional areas
including −
18
Supply Change Management − Deals with the movement of products, storing,
managing, and controlling supplies.
Business Intelligence − Analyzes data and converts the same to information.
Computers have become so complex and commonplace in organizations, it is much
easier to integrate all of the data and processing software modules and hardware into
one large unit that is easier to access and control. This is called Enterprise Resource
Planning, or ERP. Normally ERP systems use the same database throughout an entire
company to store various types of data for different computerized functions. When first
developed, ERP systems were used only for large manufacturing companies. Today,
they benefit all sizes of companies, even those that are quite small.
In the early stages, most of the ERP solutions were focused on automating back office
functions that were not directly affecting customers or general public. Later, front
office functions such as customer relationship management and e–business systems
were integrated.
What is ERP software?
ERP software has its roots in the Nineties manufacturing industry, where earlier forms
of the applications were used for manufacturing resource planning (MRP) and
computer integrated manufacturing (CIM).
However, ERP has grown to cover all core functions of a business, regardless of its
industry sector. As a result, both private and public sector organisations now use ERP
systems in some form or other.
ERP applications tend to be modular in nature, sharing vital business information
which is held on a central database repository, or repositories.
One major benefit of having a single modular ERP system is that it can unite and link
together multiple processes and parts of the business, making the business run more
efficiently.
By automating various functions, you can also benefit from having, for example, good order
tracking, from acceptance through to fulfilment. In terms of the revenue cycle, you can track
invoices through to cash receipts.
ERP systems also centralise the data in one place, which can eliminate the problem of
synchronising changes between multiple systems, and allows business managers to get a
more accurate view of the business‘s information.
Having a single data repository can also lower the risk of losing sensitive data, if you use
appropriate data security and authorisation.
20
7. Lawson Software
Characteristics of a DSS
Support for decision-makers in semi-structured and unstructured problems.
Support for managers at various managerial levels, ranging from top executive to
line managers.
Support for individuals and groups. Less structured problems often requires the
involvement of several individuals from different departments and organization
level.
Support for interdependent or sequential decisions.
Support for intelligence, design, choice, and implementation.
Support for variety of decision processes and styles.
DSSs are adaptive over time.
21
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as
follows:
Text Oriented DSS: It contains textually represented information that could have
a bearing on decision. It allows documents to be electronically created, revised
and viewed as needed.
Database Oriented DSS: Database plays a major role here; it contains organized
and highly structured data.
Spreadsheet Oriented DSS: It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to
execute self- contained instructions. The most popular tool is Excel and Lotus 1-
2-3.
Solver Oriented DSS: It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
Rules Oriented DSS: It follows certain procedures adopted as rules.
Rules Oriented DSS: Procedures are adopted in rules oriented DSS. Export
system is the example.
Compound DSS: It is built by using two or more of the five structures explained
above.
Types of DSS
Following are some typical DSS:
Status Inquiry System: It helps in taking operational, management level, or
middle level management decisions, for example daily schedules of jobs to
machines or machines to operators.
Data Analysis System: It needs comparative analysis and makes use of formula
or an algorithm, for example cash flow analysis, inventory analysis etc.
Information Analysis System: In this system data is analyzed and the
information report is generated. For example, sales analysis, accounts
receivable systems, market analysis etc.
Accounting System: It keeps track of accounting and finance related
information, for example, final account, accounts receivables, accounts
payables, etc. that keep track of the major aspects of the business.
Model Based System: Simulation models or optimization models used for
decision- making are used infrequently and creates general guidelines for
operation or management.
22
Model of Decision Support System:-
Characteristics of BIS
It is created by procuring data and information for use in decision-making.
It is a combination of skills, processes, technologies, applications and practices.
It contains background data along with the reporting tools.
It is a combination of a set of concepts and methods strengthened by fact-based
support systems.
It is an extension of Executive Support System or Executive Information System.
It collects, integrates, stores, analyzes, and provides access to business information
It is an environment in which business users get reliable, secure, consistent,
comprehensible, easily manipulated and timely information.
It provides business insights that lead to better, faster, more relevant decisions.
23
Benefits of BIS
Improved Management Processes.
Planning, controlling, measuring and/or applying changes that results in increased
revenues and reduced costs.
Improved business operations.
Fraud detection, order processing, purchasing that results in increased revenues and
reduced costs.
Intelligent prediction of future.
24
UNIT-III
MANAGEMENT OF INFORMATION RESOURCES
25
planning approach will be more successful. The other predicts that organizations using an
informal, incremental approach will be more successful in such an environment.
Stage model of Information System planning
1. Strategic planning:
a) Derivation from the organizational plan.
b) Strategic fit with organizational culture.
c) Strategy set transformation.
2. Information requirement analysis:
a) Define underlying organizational requirements.
b) Develop sub system matrix.
c) Define and evaluate information requirements for organizational sub-systems.
3. Resource allocation:
a) Return on investment
b) Charge out
c) Portfolio approach
d) Steering committees.
4. Project planning
a) Milestones
b) Critical path method
c) Gantt chart
26
The acquisition of information systems can either involve external sourcing or rely on
internal development or modification. With today's highly developed IT industry,
companies tend to acquire information systems and services from specialized vendors.
Information systems are a major corporate asset, with respect both to the benefits they
provide and to their high costs. Therefore, organizations have to plan for the long term
when acquiring information systems and services that will support business initiatives. At
the same time, firms have to be responsive to emerging opportunities. On the basis of
long-term corporate plans and the requirements of various individuals from data workers
to top management, essential applications are identified and project priorities are set. For
example, certain projects may have to be carried out immediately to satisfy a new
government reporting regulation or to interact with a new customer‘s information system.
Other projects may be given a higher priority because of their strategic role or greater
expected benefits.
Once the need for a specific information system has been established, the system has to be
acquired. This is generally done in the context of the already existing information systems
architecture of the firm. The acquisition of information systems can either involve external
sourcing or rely on internal development or modification. With today‘s highly developed
IT industry, companies tend to acquire information systems and services from specialized
vendors. The principal tasks of information systems specialists involve modifying the
applications for their employer‘s needs and integrating the applications to create coherent
systems architecture for the firm. Generally, only smaller applications are developed
internally. Certain applications of a more personal nature may be developed by the end
users themselves.
Once the design has been completed, there are four basic methods for implementing
the MIS.
These areas:
1. Install the system in a new operation or organization.
2. Cut off the old system and install the new
This produces a time gap during which no system is in operation. Practically,
installation requires one or two days for small companies or small systems.
3. Cut over by segments
This method is also referred as‖ phasing in‖ the new system. Small parts or
subsystems are substituted for the old. In the case of upgrading old systems, this
may be a very desirable method.
4. Operate in parallel and cut over.
The new system is installed and operated in parallel with the current system until it
has been checked out, then only the current system is cut out. This method is
expensive because of personal and related costs. Its big advantages are that the
system is fairly well debugged when it becomes the essential information system.
Implementation Tasks
Plan the implementation
The three main phases in implementation take place in series. These are
1. The initial installation
2. The test of the system as a whole
3. The evaluation, maintenance and control of the system.
28
Many implementation activities should be undertaken in parallel to reduce
implementation time. Training of personnel and preparation of software may be in
parallel with each other and with other implementation activities.
The first step in the implementation procedure is to plan the implementation. Some
analyst includes the planning of the implementation with the design of the system, the
planning and the action to implement the plan should be bound closely together.
Planning is the first step of management, not the last. The MIS design and the urgent
need for the system at the time the design is completed will weigh heavily on the plan
for implementation.
29
Cost Schedule to Tasks and Time
The cost for completing each task required to complete is established as part of the plan;
then the rate of expenditures should be budgeted.
Reporting and control of the work in progress may be obtained by weekly meetings. The
financial personnel must make certain that report formats allow them to show cost and
technical progress relationship as well as cost and time.
9. Designing forms
31
For controlling the marketing, a salesperson has to fill out the forms summarizing the day‘s
activities. The form ensures the right information to be supplied for computer storage.
Forms are required not just for input and output but also for transmitting data at intermediate
stages.
10. Testing the entire system
As the total system is installed, tests should be performed with the test specifications and
procedure. A test during installation stage consists of component tests, subsystem tests and
total system acceptance tests.
Components may be equipment (that can be new or old), new software programs, new data
collection methods, work procedures, reporting formats. Difficulties that occur during
component tests may lead t design changes.
As more components are installed, subsystems may be tested. There is a difference between
the testing of component and the testing of a system.
System tests require verification of multiple inputs, complex logic systems, and timing
aspects of many parts.
11. completing cutover to the new system
Cutover is a point at which the new component replaces the old component to the new
system replaces the old system. This involves old forms, old files and old equipment being
retried.
The debugging proves associated with the cutover to the new system may extend for several
months
12. Documenting the system
Documentation of the MIS means preparation of written descriptions of the scope, purpose,
information flow components, and operating procedures of the system.
Documentation is a necessity for troubleshooting, for replacement of subsystems, for
interfacing with other systems, for training new operating personnel and also for evaluating
and upgrading the system.
13. Evaluating the system
After the MIS has been operating smoothly for a short period of time, an evaluation of
each step in the design and of the final system performance should be made.
Evaluation should not be delayed beyond the time when the system‘s analysts have
completed most of the debugging. The longer the delay, the more difficult it will be for
designer to remember important details.
The evaluation should be made by the customer as well as by the designers.
32
14. Providing system maintenance
Control and maintenance of the system are the responsibilities of the line managers.
Control of the systems means the operation of the system as it was designed to operate.
Sometimes, well-intentioned people or operators may make unauthorized changes to
improve thesystem, changes that are not approved or documented.
Maintenance is closely related to control. Maintenance is that ongoing activity that
keeps theMIS at the highest levels of effectiveness and efficiency within cost constraints.
Maintenance is directed towards reducing errors due to design, reducing errors due to
environmental changes and improving the system‘s scope and services.
Evaluation of Information Systems:
Evaluation of MIS is an integral part of the management control process, in which the
organizations determine or appraise the quality or worth of their information systems. In
other words, evaluation of MIS is a process of measuring performance of organizational
information systems.
Evaluation Approaches:
There are different approaches to evaluate MIS in an organization. The MIS evaluation
approaches provide different means to measure accomplishments of system objectives.
Quality Assurance Review: Quality assurance review or technical review focus
on assessing the information system‘s technical quality.
Compliance Audits: Compliance audits or application control reviews assess the
adequacy and completeness of controls for the system inputs, outputs, processing,
security and access.
Budget Performance Review: Evaluation of MIS budget performance
concentrates on compliance with a predetermined budget expenditure level for the
MIS development or operations process.
MIS Personnel Productivity Measurements: The capability of MIS personnel
is typically determined in terms of productivity.
Computer Performance Evaluation: The production capability of the computer
hardware is typically evaluated in terms of performance efficiencies and
bottlenecks that limit production.
Service Level Monitoring: Service level monitoring focuses on assessing the
information and support provided to the user, based on the terms established
between the MIS user personnel.
33
Post-Installation Review: The focus of the post-installation review (PIR) is often
on estimating whether the system meets the requirements.
Cost Benefit Analysis: It is also known as economic evaluation. The analysis
quantifies the system‘s effect on organizational performance in terms of dollars.
Evaluation of Performance:
1. Effectiveness: This refers to the quality of the outputs from the systems.
Effectiveness means doing the right thing in the right manner so that desired result
may be achieved. Information system is said to be effective if its product (i.e.
output) is of quality, and the process of producing output is right (effective).
2. Efficiency: It is a measure of the amount of resources required to achieve the
output, i.e. the use of system resources to get results. Being efficient implies the
system is operating the right way.
Evaluation Models:
Having identified and categorised various costs and benefits, monetary value of each and
every cost as well as benefit is estimated. A system analyst/user manager may evaluate the
costs and benefits so estimated. For evaluation, there are several models, which are
available, namely:
i. Net Benefit Analysis
ii. Present Value Analysis
iii. Net Present Value
iv. Payback Method
v. Cash-flow Analysis
vi. Break-even Analysis etc.
35
updating user support. For the purpose of convenience, maintenance may be categorized
into three classes, namely:
i) Corrective Maintenance: This type of maintenance implies removing errors in a
program, which might have crept in the system due to faulty design or wrong
assumptions. Thus, in corrective maintenance, processing or performance failures are
repaired.
ii) Adaptive Maintenance: In adaptive maintenance, program functions are changed to
enable the information system to satisfy the information needs of the user. This type
of maintenance may become necessary because of organizational changes which may
include:
a) Change in the organizational procedures,
b) Change in organizational objectives, goals, policies, etc.
c) Change in forms,
d) Change in information needs of managers.
e) Change in system controls and security needs, etc.
UNIT – IV
Building of Information Systems
37
What is Information Systems Development?
As the name suggests, information system development or commonly known as SLC (Systems Life Cycle) or SLDC
(Software Development Life Cycle) is a process of making and changing the system and the model and methodology
used. In other words, an SDLC is the preparation of a new system to replace the old system, both in whole and only
partially.
Development of information systems is generally done because of problems that cannot be accommodated by the old
system. For example, the hospital where you work make an overhaul SIMRS (Sistem Informasi Manajemen Rumah
Sakit/Hospital Management Information System) because of applications that previously could not do bridging with
BPJS. Considering the fact that the government has required it, then inevitably the hospital must adjust the SIMRS
it already has.
As for carrying out an information system development, the related team will consist of several personnel, namely
the project coordinator, system analyst and design, network designer, programmer, technician (hardware),
administrator, software tester, graphic designer, and documentary.
38
Information System Development Stages
An information system development consists of six important stages, it is system survey, needs analysis, design,
implementation, testing, change and maintenance.
System survey
Needs Analysis
Design
Implementation
Testing
Change and Maintenance
1. System Survey
The SLDC phase also consists of three main points: system identification, selection, and system planning.
a. System Identification
This process is to identify the problems facing the company and the system it has. The team will look for any
opportunities that can be done to overcome this.
b. Selection
The selection phase will apply evaluation points to the development project to ensure the solutions are created
in accordance with the company’s expected targets.
c. System Planning
This step is the step of developing a formal plan to start working on and implementing the information system
development concept that has been chosen.
2. Needs Analysis
39
System requirements analysis is a technique for solving problems by decomposing the components of the system.
The aim is none other than to find out more about how each component works and the interaction between one
component with other components.
Some aspects that need to be targeted in the needs analysis in the development of information systems include
business users, job analysis, business processes, agreed rules, problems and solutions, business tools, and
business plans.
3. Design
The design or design of system development is intended to provide a complete blueprint as a guideline for the IT
team (especially programmers) in making applications. Thus the IT team no longer makes decisions or works in
a sporadic way.
4. Implementation
The stage of developing this information system is to work on a previously designed development.
5. Testing
A system needs to be tested to ensure that the development carried out is appropriate or not with the expected
results. Tests that are applied are various, such as performance, input efficiency, syntax (program logic), output,
and so on.
This information system development stage requires preparation of various supporting aspects. In addition to
applications, hardware readiness and several other related facilities also need to be prepared. As for
implementation, several activities carried out include data migration (conversion), training for users, and trials.
1. Top-down approach
2. Bottom-up approach
3. Integrative approach
40
1. Top-Down Approach:
In this method, the entire system is partitioned into a hierarchy of subsystems. The overall system is
divided into a number of subsystems, which are then divided into a number of other subsystems in a top-down
approach.
A behavioural classification is used in the top-down approach of MIS development. This approach also
defines the strategic and tactical decisions and the necessary decisions to operate the various key activities
of MIS development. Many of them, strategies, goals, and plans are recognized by top management
executives and conveyed to the administrative management levels.
The key objectives of the systems are established and ways to achieve them are decided in top-down
design. They're gradually pushed down the organizational hierarchy to be created and defined well.
2. Bottom-Up Approach
As its name implies, this approach mainly starts with the leaf-level or bottom-most management
and proceeds progressively to the upper management levels. After recognizing the primary
transactions, the needed file requirements and information processing programs are developed for
each life stream system which is then moved towards data integration that is stored in different
41
files of the information system. A bottom-up approach is functional to identify the various factors
and understand the difficult situations and formulate strategies to deal with them.
3. Integrative Approach
In the integrative approach subsystems of a system are integrated with each other in such a way so that the
objective of the system can be fulfilled.
Design a system that can be achieving the major objectives of the system using its subsystems.
Designing a system that combines the various functions performed by its subsystems.
Designing a system that is not very clear to the user but is concealed under the previously existing
subsystems.
Managers at all levels can control the design using an integrated approach. Top management determines
the structure and design of MIS that is appropriate for the business.
OBJECTIVES
Understand how to create a requirements definition
Become familiar with requirements-analysis techniques
Understand when to use each requirements-analysis technique
Understand how to gather requirements using interviews, JAD sessions, questionnaires, document
analysis, and observation
Understand the use of concept maps, story cards, and task lists as requirements-documentation
techniques
Understand when to use each requirements-gathering technique
Be able to begin creating a system proposal
42
Major Activities in requirement Determination
Requirements Anticipation
It predicts the characteristics of system based on previous experience which include certain
problems or features and requirements for a new system.
It can lead to analysis of areas that would otherwise go unnoticed by inexperienced analyst.
But if shortcuts are taken and bias is introduced in conducting the investigation, then
requirement Anticipation can be half-baked.
Requirements Investigation
It is studying the current system and documenting its features for further analysis.
It is at the heart of system analysis where analyst documenting and describing system
features using fact-finding techniques, prototyping, and computer assisted tools.
Requirements Specifications
It includes the analysis of data which determine the requirement specification, description of
features for new system, and specifying what information requirements will be provided.
It includes analysis of factual data, identification of essential requirements, and selection of
Requirement-fulfilment strategies.
Information Gathering Techniques
The main aim of fact finding techniques is to determine the information requirements of an organization
used by analysts to prepare a precise SRS understood by user.
Ideal SRS Document should −
43
Questionnaires
This method is used by analyst to gather information about various issues of system from large number of
persons.
There are two types of questionnaires −
Open-ended Questionnaires − It consists of questions that can be easily and correctly
interpreted. They can explore a problem and lead to a specific direction of answer.
Closed-ended Questionnaires − It consists of questions that are used when the systems
analyst effectively lists all possible responses, which are mutually exclusive.
Advantages of questionnaires
It is very effective in surveying interests, attitudes, feelings, and beliefs of users which are
not co-located.
It is useful in situation to know what proportion of a given group approves or disapproves of
a particular feature of the proposed system.
It is useful to determine the overall opinion before giving any specific direction to the system
project.
It is more reliable and provides high confidentiality of honest responses.
It is appropriate for electing factual information and for statistical data collection which can
be emailed and sent by post.
Review of Records, Procedures, and Forms
Review of existing records, procedures, and forms helps to seek insight into a system which describes the
current system capabilities, its operations, or activities.
Advantages
It helps user to gain some knowledge about the organization or operations by themselves
before they impose upon others.
It helps in documenting current operations within short span of time as the procedure
manuals and forms describe the format and functions of present system.
It can provide a clear understanding about the transactions that are handled in the
organization, identifying input for processing, and evaluating performance.
It can help an analyst to understand the system in terms of the operations that must be
supported.
It describes the problem, its affected parts, and the proposed solution.
Observation
This is a method of gathering information by noticing and observing the people, events, and objects. The
analyst visits the organization to observe the working of current system and understands the requirements
of the system.
Advantages
It is a direct method for gleaning information.
It is useful in situation where authenticity of data collected is in question or when complexity
of certain aspects of system prevents clear explanation by end-users.
It produces more accurate and reliable data.
It produces all the aspect of documentation that are incomplete and outdated.
Joint Application Development (JAD)
It is a new technique developed by IBM which brings owners, users, analysts, designers, and builders to
define and design the system using organized and intensive workshops. JAD trained analyst act as facilitator
for workshop who has some specialized skills.
44
Advantages of JAD
It saves time and cost by replacing months of traditional interviews and follow-up meetings.
It is useful in organizational culture which supports joint problem solving.
Fosters formal relationships among multiple levels of employees.
It can lead to development of design creatively.
It Allows rapid development and improves ownership of information system.
Secondary Research or Background Reading
This method is widely used for information gathering by accessing the gleaned information. It includes any
previously gathered information used by the marketer from any internal or external source.
Advantages
It is more openly accessed with the availability of internet.
It provides valuable information with low cost and time.
It acts as forerunner to primary research and aligns the focus of primary research.
It is used by the researcher to conclude if the research is worth it as it is available with
procedures used and issues in collecting them.
Feasibility Study
Feasibility Study can be considered as preliminary investigation that helps the management to take decision
about whether study of system should be feasible for development or not.
It identifies the possibility of improving an existing system, developing a new system, and
produce refined estimates for further development of system.
It is used to obtain the outline of the problem and decide whether feasible or appropriate
solution exists or not.
The main objective of a feasibility study is to acquire problem scope instead of solving the
problem.
The output of a feasibility study is a formal system proposal act as decision document which
includes the complete nature and scope of the proposed system.
Steps Involved in Feasibility Analysis
The following steps are to be followed while performing feasibility analysis −
Form a project team and appoint a project leader.
Develop system flowcharts.
Identify the deficiencies of current system and set goals.
Enumerate the alternative solution or potential candidate system to meet goals.
Determine the feasibility of each alternative such as technical feasibility, operational
feasibility, etc.
Weight the performance and cost effectiveness of each candidate system.
Rank the other alternatives and select the best candidate system.
45
Prepare a system proposal of final project directive to management for approval.
Types of Feasibilities
Economic Feasibility
It is evaluating the effectiveness of candidate system by using cost/benefit analysis method.
It demonstrates the net benefit from the candidate system in terms of benefits and costs to
the organization.
The main aim of Economic Feasibility Analysis (EFS) is to estimate the economic
requirements of candidate system before investments funds are committed to proposal.
It prefers the alternative which will maximize the net worth of organization by earliest and
highest return of funds along with lowest level of risk involved in developing the candidate
system.
Technical Feasibility
It investigates the technical feasibility of each implementation alternative.
It analyses and determines whether the solution can be supported by existing technology or
not.
The analyst determines whether current technical resources be upgraded or added it that fulfil
the new requirements.
It ensures that the candidate system provides appropriate responses to what extent it can
support the technical enhancement.
Operational Feasibility
It determines whether the system is operating effectively once it is developed and
implemented.
It ensures that the management should support the proposed system and its working feasible
in the current organizational environment.
It analyses whether the users will be affected and they accept the modified or new business
methods that affect the possible system benefits.
It also ensures that the computer resources and network architecture of candidate system are
workable.
Behavioural Feasibility
It evaluates and estimates the user attitude or behavior towards the development of new
system.
It helps in determining if the system requires special effort to educate, retrain, transfer, and
changes in employee’s job status on new ways of conducting business.
Schedule Feasibility
It ensures that the project should be completed within given time constraint or schedule.
It also verifies and validates whether the deadlines of project are reasonable or not.
46
(2) the Journal reference and IBM copyright notice are included on the first page. The title and abstract may be
used without further permission in computer-based and other information-service systems. Permission to republish
other excerpts should be obtained from the Editor.
There are three general approaches for getting information regarding the user’s requirements. They are
Asking
Getting information from the existing information system
Prototyping.
ASKING
This strategy obtains information from users by simply asking them about the requirements. It assumes a
stable system where users are well informed and can overcome biases in defining their problem. There are
three key asking methods.
1. Questions: Questions may be open-ended or closed. An open-ended question allows the respondent to
formulate a response. It is used when feelings or opinions are important. A closed question requests one
answer from a specific set of responses. It is used when factual responses are known.
2. Brainstorming: Brainstorming is a technique used for generating new ideas and obtaining general
information requirements. This method is appropriate for getting non-conventional solutions to problems. A
guided approach to brainstorming asks each participant to define ideal solutions and then select the best one. It
works well for users who have sound system knowledge but have the difficulty of accepting new ideas.
[Link] consensus: This method asks participants for their expectations regarding specific variables. Each
participant fills out a questionnaire. The results are summarized and given to participants along with a follow-
up questionnaire. Participants are invited to change their responses. The results are again summarized and
given back to the participants. This debate by questionnaire continues until participants responses have
converged enough. This method is advantageous than brainstorming because the participants are not subjected
to psychological pressure.
Determining information from an existing application is called the data analysis approach.
It simply asks the user what information is currently received and what other information is required.
It depends on the user for getting accurate information.
The analyst examines all reports, discusses each piece of information with the user, and determines
unfulfilled information needs by interviewing the user.
The analyst is primarily involved in improving the existing flow of data to the user.
The data analysis method is ideal for making structured decisions, although it requires that users articulate
their information requirements.
A major drawback is a lack of established rules for obtaining and validating information needs that are not
linked to organizational objectives.
47
2. Decision Analysis
This method breaks down a problem into parts, which allows the user to focus separately on the critical
issues.
It also determines policy and organizational objectives relevant to complete each major decision.
The analyst and the user then refine the decision process and the information requirements for a final
statement of information requirements.
In this method information needs are clearly linked to decision and organizational objectives.
It is useful for unstructured decisions and information tailored to the user’s decision-making style.
The major drawback is that information requirements may change when the user is promoted or replaced
PROTOTYPING
The third strategy for determining user information requirements is used when the user cannot establish
information needs accurately before the information system is built. The reason could be the lack of an
existing model on which to decide requirements or a difficulty in visualizing candidate system. In this case the
user need to consider real life systems from which adjustments can be made. This iterative approach first set
up the initial requirements and builds a system to meet these requirements. As users gain experience, they
request additional requirements or modifications and the process continues. Prototyping is suitable for
environments where it is difficult to formulate a concrete model for defining information requirements.
Prototyping strategy is appropriate for determining high uncertainty information requirement.
Analysts use various tools to understand and describe the information system. One of the ways is using
structured analysis.
48
What is Structured Analysis?
Structured Analysis is a development method that allows the analyst to understand the system and its
activities in a logical way.
It is a systematic approach, which uses graphical tools that analyze and refine the objectives of an existing
system and develop a new system specification which can be easily understandable by user.
It has following attributes −
It is graphic which specifies the presentation of application.
It divides the processes so that it gives a clear picture of system flow.
It is logical rather than physical i.e., the elements of system do not depend on vendor or
hardware.
It is an approach that works from high-level overviews to lower-level details.
Structured Analysis Tools
During Structured Analysis, various tools and techniques are used for system development. They are −
Types of DFD
DFDs are of two types: Physical DFD and Logical DFD. The following table lists the points that
differentiate a physical DFD from a logical DFD.
It provides low level details of It explains events of systems and data required by
hardware, software, files, and people. each event.
It depicts how the current system It shows how business operates; not how the system
operates and how a system will be can be implemented.
implemented.
50
Context Diagram
A context diagram helps in understanding the entire system by one DFD which gives the overview of a
system. It starts with mentioning major processes with little details and then goes onto giving more details
of the processes with the top-down approach.
The context diagram of mess management is shown below.
Data Dictionary
A data dictionary is a structured repository of data elements in the system. It stores the descriptions of all
DFD data elements that is, details and definitions of data flows, data stores, data stored in data stores, and
the processes.
A data dictionary improves the communication between the analyst and the user. It plays an important role
in building a database. Most DBMSs have a data dictionary as a standard feature. For example, refer the
following table −
2 TITLE title 60
51
Decision Trees
Decision trees are a method for defining complex relationships by describing decisions and avoiding the
problems in communication. A decision tree is a diagram that shows alternative actions and conditions
within horizontal tree framework. Thus, it depicts which conditions to consider first, second, and so on.
Decision trees depict the relationship of each condition and their permissible actions. A square node
indicates an action and a circle indicates a condition. It forces analysts to consider the sequence of decisions
and identifies the actual decision that must be made.
The major limitation of a decision tree is that it lacks information in its format to describe what other
combinations of conditions you can take for testing. It is a single representation of the relationships between
conditions and actions.
For example, refer the following decision tree −
Decision Tables
Decision tables are a method of describing the complex logical relationship in a precise manner which is
easily understandable.
It is useful in situations where the resulting actions depend on the occurrence of one or
several combinations of independent conditions.
It is a matrix containing row or columns for defining a problem and the actions.
52
Components of a Decision Table
Condition Stub − It is in the upper left quadrant which lists all the condition to be checked.
Action Stub − It is in the lower left quadrant which outlines all the action to be carried out
to meet such condition.
Condition Entry − It is in upper right quadrant which provides answers to questions asked
in condition stub quadrant.
Action Entry − It is in lower right quadrant which indicates the appropriate action resulting
from the answers to the conditions in the condition entry quadrant.
The entries in decision table are given by Decision Rules which define the relationships between
combinations of conditions and courses of action. In rules section,
Regular Customer - Y N -
ACTIONS
Give 5% discount X X - -
Give no discount - - X X
Structured English
Structure English is derived from structured programming language which gives more understandable and
precise description of process. It is based on procedural logic that uses construction and imperative
sentences designed to perform operation for action.
It is best used when sequences and loops in a program must be considered and the problem
needs sequences of actions with decisions.
53
It does not have strict syntax rule. It expresses all logic in terms of sequential decision
structures and iterations.
For example, see the following sequence of actions −
if customer pays advance
then
Give 5% Discount
else
if purchase amount >=10,000
then
if the customer is a regular customer
then Give 5% Discount
else No Discount
end if
else No Discount
end if
end if
Pseudocode
A pseudocode does not conform to any programming language and expresses logic in plain English.
It may specify the physical programming logic without actual coding during and after the
physical design.
It is used in conjunction with structured programming.
It replaces the flowcharts of a program.
Guidelines for Selecting Appropriate Tools
Use the following guidelines for selecting the most appropriate tool that would suit your requirements −
Use DFD at high- or low-level analysis for providing good system documentations.
Use data dictionary to simplify the structure for meeting the data requirement of the system.
Use structured English if there are many loops and actions are complex.
Use decision tables when there are a large number of conditions to check and logic is
complex.
Use decision trees when sequencing of conditions is important and if there are few conditions
to be tested.
54
by a consistent set of rules and definitions. The designs can be defined in graphical or textual modelling
languages.
Some of the examples of graphical modelling languages are
a. Unified Modelling Language (UML): To describe software both structurally and behaviourally
with graphical notation.
b. Flowchart: A schematic or stepwise representation of an algorithm.
c. Business Process Modelling Notation (BPMN): Used for Process Modelling language.
d. Systems Modelling Language (SysML): Used for systems engineering.
Design methods:
1) Architectural design: To describes the views, models, behaviour, and structure of the system.
2) Logical design: To represent the data flow, inputs and outputs of the system. Example: ER Diagrams
(Entity Relationship Diagrams).
3) Physical design: Defined as
a. How users add information to the system and how the system represents information back to the
user.
b. How the data is modelled and stored within the system.
c. How data moves through the system, how data is validated, secured and/or transformed as it flows
through and out of the system.
What is MIS?
MIS is an organized integration of hardware and software technologies, data, processes, and human
elements. It is a software system that focuses on the management of information technology to provide
efficient and effective strategic decision making.
What is MIS? MIS is the acronym for Management Information Systems. MIS is a set of procedures
which, when executed, provides information to support decision making.
55
Systems Design
The objective of systems design is to produce the design specifications for the system that will satisfy the
requirements defined during the systems analysis. These specifications should be detailed enough to
become inputs to the programming stage that follows the design. The design process is usually broken
down into two parts:
1. Logical design - produces the general specification of the resources that will make up the
system.
2. Physical design - produces a complete, detailed specification of the named program
components, called modules, which are to be programmed, and of the databases to be
maintained by the system.
The following system aspects have to be determined and described in the appropriate documentation
during the system design:
1. Hardware and systems software platforms for the application.
2. Programs that will constitute the application and the modules that will make up the programs.
3. Specification of individual software modules
4. Design of the database
5. Design of user interfaces
6. Procedures for system use.
Logical Design
During the logical design, the developers create the general specification for the information system's
resources, often taking the existing system as a point of departure. The developers will devise alternative
major solutions to the problem identified during the analysis phase and recommend one of these solutions
for implementation.
Activities included in the logical design include:
1. The components of the hardware and systems software environment for the system are
specified.
2. System outputs and the inputs needed to produce these outputs are identified.
3. The user interface (means whereby the user interacts with the system), is specified.
4. The logical design of the database is developed
5. The programs that will compose the system and the modules that will make up the programs
are designed.
6. The procedures to be employed in operating the system are specified
7. The controls that will be incorporated in the system are specified, with information systems
auditors participating in the process.
Physical Design
The objective of physical design is to produce a complete specification of all system modules and of
interfaces between them, and to perform physical design of the database. Structured design methodologies
help specify module logic during this stage.
When physical design is completed, the following aspects of the system will have been specified:
56
a. System outputs
b. System inputs
c. User-system interface
d. Platforms
e. Acquisition method
f. Modular design of the programs that will be developed for the application, interfaces
between the modules, and the specifications of the logic of individual modules.
g. Detailed test plan
h. Database
i. Controls
j. Documentation
k. Conversion plan
It is critical to sustain the processes of organizational change connected with system implementation. This
includes:
1. Reorganizing the affected units of the firm
2. Redesigning the jobs of people who will be affected by the system
3. Enhancing user motivation
4. Conducting user training.
Modular Structure
Programs must be constructed of modules. A module is a named program routine that is handled as a unit
which is evoked (called) by their names during program execution. Characteristics of a module include:
A module ought to perform completely a well-defined function in the overall system
A module should be short enough so that its logic is relatively easy to understand.
Modules are relatively independent from one another and thus, a modification of some of them
during maintenance will scarcely affect other modules.
57
Hierarchical Design
Program modules are identified top-down; thus, a hierarchical program structure emerges. Characteristics
of a hierarchical design include:
Start with the single top module that provides the overall control
Break down its function into lower-level functions and so identify the modules it must call.
Maintenance is made easier as the maintainer can understand the program structure by studying
the structure chart and relating it to the program code.
Programming
At this stage of its development, the system is coded, tested, and debugged in a process called
programming. Programming is writing instructions for computer execution and testing the written code to
ensure that it performs according to specifications. The objective of programming is thus to produce
reliable software based on appropriate design specifications.
Programming tasks include:
Coding the software module specifications produced during system design into statements in a
programming language.
Testing at several levels, beginning with testing individual modules as they are programmed and
culminating in acceptance or installation testing before the system is placed into operation.
Debugging - problems discovered during testing are tracked down to their source in the code and
removed.
To ensure quality of the product, the discipline of structured programming is essential. Coding the
program by relying on a small number of simple programming structures for organizing its logic. This
makes the program code relatively easy to understand, test, and modify.
58
Walkthroughs and Inspections
A walkthrough is a review by a small group of people of a system development product presented by its
author. Walkthroughs should be scheduled frequently during systems development so that a manageable
piece of work can be thoroughly reviewed in one to two hours. Walkthroughs include:
Specification walkthroughs, where the group looks for errors, omissions, and ambiguities in the
data flow diagrams at various levels, in the data dictionary entries, and in other components of
requirement’s specifications.
Design walkthroughs, where program listings are studied.
Code walkthroughs, where program listings are studied.
Test walkthroughs, to ensure that the test cases are prepared thoroughly.
It is crucial for the effectiveness of walkthroughs that they are established as a quality assurance tool as
opposed to a management tool for evaluating the performance of IS professionals.
An inspection is similar to a walkthrough in its objectives, but it is a more formal review technique. In an
inspection, a review team checks a data flow diagram or a program against a prepared list of concerns. At
the heart of code inspection is the paraphrasing technique: An inspector verbally expresses the meaning of
one or more lines of code at a time, with other participants striving to detect errors in this code.
Inspections also include formal rework and follow-up stages to see that the discovered errors were
corrected.
Testing
Testing involves executing the information system components, and the entire system when available, for
the purpose of fixing errors.
General principles of testing include:
A test plan must be prepared to specify the sequence in which the modules will be coded, in
individually tested, and then integrated into the program.
Test cases must be prepared as part of the plan.
Each test case should include a specification of the data to be submitted as inputs, as well as a
specification of the expected results of the test.
All test results should be studied and recorded.
Test cases should be prepared for both valid and invalid input conditions.
Software tools are available to support testing and debugging; their use significantly increases the
effectiveness of the process.
59
3. System testing
- the system is validated against its functional specifications, in an environment and
under loads that resemble the actual operation as closely as possible. The system is subjected
to stress loads to see whether it degrades gracefully. The system's compatibility is checked
against other systems it will have to interact with. Controls and recovery procedures are also
tested. It is very important to test the documentation that will accompany the system along
with the system itself.
A beta test of software is used to test the early copies of software by the intended end users in
order to uncover problems in actual use.
4. Acceptance testing
- a set of systems tests are run in order to ensure that the requirements of Aall users@
have been satisfied. A suite of tests validating the overall system operation is identified,
documented, and preserved for maintenance purposes. These regression tests will be used to
revalidate the system following each maintenance procedure.
5. Installation testing
- if acceptance testing was done before a system was installed in its production
environment, a set of system tests is run again following installation. The system is now ready
for operation.
Conversion
Following acceptance testing, a planned conversion to the new system is performed. The four common
conversion methods include:
1. Parallel operation
this method is the safest method of conversion
the old and new systems are run simultaneously until sufficient confidence is gained in the new
system.
it is expensive to run both the old and new systems during this conversion method
2. Direct conversion
this method is the most risky (and thus potentially the most expensive) method of conversion.
at a certain point the old system is completely replaced by the new one.
3. Phased conversion
involves a gradual conversion
the new system is introduced in incremental stages, which are divided by function, organizational
units served, the hardware on with the new system will reside, or some other factor.
4. Pilot version
60
Postimplementation Review
The final phase of the development life cycle is actually conducted during systems operations. Its
objective is to assess both the system and the development methodology, and it is a vital aspect of
organizational learning. This stage is called the postimplementation review.
A properly conducted review pursues several objectives:
The organizational impact of the system is studied and further effort is made to ensure successful
implementation. The review may trigger adjustments in organizational structure, business processes,
and job designs.
A major system development project should be a source of organizational learning.
The system's performance and controls are evaluated, with the IS auditors participating. Requests for
maintenance frequently follow this evaluation.
61
We need to understand the software to be modified and identify the parts targeted for maintenance.
We must then modify the appropriate components of the application system without adversely
affecting the rest of the system
We must test and thus validate the modified components, as well as the entire system.
62
developed. This information begins with the plans and goes on to the entities that appear in data flow
diagrams, onto the code, and even to the project management information. CASE tools facilitate
traceability - the ability to relate program code to the analysis and design entities it implements.
CASE tools provide automatic assistance for checking the consistency and completeness of the products
as the development goes on. The availability of this information makes it easier to introduce
modifications in a consistent fashion at any time during system development or maintenance.
CASE tools can also contribute significantly to improved maintenance of information systems. In the first
place, the use of CASE during the development means better documented systems, with essential
documentation kept in the repository and thus relatively easy to maintain. It is possible to trace a user's
request for an enhancement from a DFD to the code modules to be modified and thus to determine the
impact of the change. CASE tools make it possible to maintain system specifications as they are changed
during maintenance.
Certain CASE tools are expressly designed for maintenance activities. Such packages automatically recast
a program from unstructured code into a structured format that relies disciplined programming.
More elaborate CASE packages for maintenance support reverse engineering - developing analysis and
design specifications from the program code.
CASE technology has contributed significantly in reducing time-to-market for products and services.
However, CASE is a complex technology, requiring organizational and individual learning. Quality
improvements are likely to come before increases in productivity of systems development or
maintenance. The complexity of CASE tools and the lack of integrated support for systems development
have limited their adoption.
Object-Oriented Development
Object-oriented development (OOD) aims to build a software model of the real-world system. This
explicit modeling is done by defining and implementing classes of objects using the vocabulary of the
business that will be supported by the information system.
The central principal in object-oriented development (OOD) is building the system as a collection of
interacting objects. If program objects represent real-world objects, we obtain a rather close
correspondence between the program components and their real-world equivalents. Much of the
development proceeds by defining the classes of objects for the information system. Classes are templates
of objects and, conversely, objects are instances of classes. The classes and objects that information
systems deal with are relatively permanent in their behaviour. Therefore, code libraries can be built up, to
be used as needed.
The appeal of OOD is the ability to build up libraries of reusable code. Developers are able to use
software components developed for other systems - and tested through prior use.
Producing reusable software components is only one of the potential benefits of the object-oriented
approach. The process of systems analysis and design based on object orientation is a powerful technique
for gaining understanding of a business system and casting this understanding into modifiable software
components. With OOD, there is a smooth transition from analysis to design - both of these development
tasks deal with objects and classes of objects.
64
Gantt Chart - is a graphical tool for project management that represents project tasks over time
as a bar chart.
2. Democratic team
all the team members bear equal responsibility for the project, and the relationships between them
are informal.
there is much communication among team members in a democratic team than in a chief
programmer team.
team members are assigned fixed roles, which may be rotated s the situation requires.
frequently, decisions are made by consensus.
because the team's operation is highly dynamic, it is vital to preserve group memory as the work
on the project progresses.
the role is assigned to the project librarian, who maintains all the project information in an
accessible computerized form.
the democratic team lends itself better when new technologies are applied in smaller, exploratory
projects.
65
Conceptual design and design methods
What is conceptual design?
Conceptual design is a framework for establishing the underlying idea behind a design and a plan for how it will be
expressed visually.
It is related to the term “concept art”, which is an illustration (often used in the preproduction phase of a film or a
video game) that conveys the vision of the artist for how the final product might take form. Similarly, conceptual
design occurs early on in the design process, generally before fine details such as exact colour choices or
illustration style. The only tools required are a pen and paper.
Conceptual design has the root word “concept,” which describes the idea and intention behind the design. This is
contrasted by “execution”, which is the implementation and shape that a design ultimately takes.
Essentially, the concept is the plan, and the execution is the follow-through action. Designs are often evaluated for
quality in both of these areas: concept vs execution. In other words, a critic might ask: what is a design trying to
say, and how well does it say it?
Most importantly, you can’t have one without the other. A poorly executed design with a great concept
will muddle its message with an unappealing art style. A well-executed design with a poor concept might
be beautiful, but it will do a poor job of connecting with viewers and/or expressing a brand.
For the purposes of this article, we’ll focus on the concept whereas execution involves studying the
particulars of design technique.
To achieve originality
There’s a famous saying that nothing is original, and this is true to an extent. The practice of design—like
any artistic discipline—is old, with designers building on the innovations of those who came before.
66
But you should at least aspire to stand on the shoulders of those giants. And the concept and ideation
phase in the design process is where truly original creative sparks are most likely to happen.
1. Definition
You must start your design project by asking why the project is necessary. What is the specific goal of the
design and what problem is it meant to solve?
Defining the problem can be a lot trickier than it at first appears because problems can be complex. Often,
a problem can be a symptom of deeper issues, and you want to move beyond the surface to uncover the
root causes.
One technique for doing so is known as the Five Whys, in which you are presented with a problem and
keep asking “Why?” until you arrive at a more nuanced understanding. Otherwise, if you fail to get to the
exact root of the problem, your design solution would have been ultimately flawed. And the design
solution—the answer to the problem—is just another way of describing the concept.
2. Research
Designs must eventually occupy space (whether physical or digital) in the real world. For this reason, a
design concept must be grounded in research, where you will understand the context in which the design
must fit.
This can start with getting information on the client themselves—who is the brand and what is their
history and mission, their personality? You must also consider the market.
Who are the people that will interact with the design? In order for the concept to speak effectively to these
people, you must conduct target audience research to understand who they are and what they are looking
for in a design. Similarly, researching similar designs from competitors can help you understand industry
conventions as well as give you ideas for how to set your concept apart.
Finally, you will want to research the work of other designers in order to gather reference material and
inspiration, especially from those you find particularly masterful. Doing so can show you conceptual
possibilities you might never have imagined, challenging you to push your concepts. You’ll want to
collect these in a mood board, which you will keep handy as you design.
67
3. Verbal ideation
Concepts are essentially thoughts—which is to say, they are scattered words in our minds. In order to
shape a concept into something substantial, you need to draw some of those words out. This phase is
generally referred to as brainstorming, in which you will define your concept verbally.
This can be as straightforward as simply posing the problem (see the first step) and creating a list of
potential solutions.
There are also some helpful word-based techniques, such as mind-mapping or free association. In both of
these cases, you generally start with a word or phrase (for logos, this is usually the brand name and for
other designs, it can be based on some keywords from the brief).
You then keep writing associated words that pop into your head until you have a long list. It is also
important to give yourself a time limit so that you brainstorm quickly without overthinking things.
The purpose of generating words is that these can help you come up with design characteristics (in the
next step) to express your concept. For example, the word “freedom” can translate into loose flowing
lines or an energetic character pose.
Ultimately, it is helpful to organize these associated ideas into a full sentence or phrase that articulates
your concept and what you are trying to accomplish. This keeps your concept focused throughout the
design process.
4. Visual ideation
At some point, concepts must make the leap from abstract ideas to a visual design. Designers usually
accomplish this through sketching.
One helpful approach is to create thumbnails, which are sketches of a design that are small enough to fit
several on the same page.
Like brainstorming (or verbal ideation) the goal is to come up with sketches fast so that your ideas can
flow freely. You don’t want to get hung up on your first sketch or spend too much time on minute detail.
Right now, you are simply visualizing possible interpretations of the concept.
This phase is important because while you may think you have the concept clear in your mind, seeing it
on the page is the true test of whether it holds water. You may also surprise yourself with a sketch that
articulates your concept better than you could have planned.
Once you have a couple sketches that you like, you can refine this into a much larger and more detailed
sketch. This will give you a presentable version from which you can gather feedback.
68
Conceptual design is the bedrock of any design project. For this reason, it is extremely important to get
right. Creating a concept can be difficult and discouraging—over time, you might find your garbage bin
overflowing with rejected concepts.
But this is exactly why it is so helpful to have a delineated process like conceptual design to guide you
through the messy work of creating ideas. But at the end of the day, getting a design of value will require
both a great concept and a skilled designer.
69
UNIT – V
Introduction to Cyber Crime
Cyber Crime:
“Cybercrime” is an amorphous field. It refers broadly to any criminal activity that pertains to or is committed through
the use of the Internet. A wide variety of conduct fits within this capacious definition. We will concentrate in this
chapter on five activities that have been especially notorious and that have strained especially seriously the fabric of
traditional criminal law: use of the Internet to threaten or stalk people; online fraud; “hacking”; online distribution
of child pornography; and cyberterrorism.
Cybercrime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over
the medium of computers or internet or other technology recognised by the Information Technology Act. Cybercrime
is the most prevalent crime playing a devastating role in Modern India. Not only the criminals are causing enormous
losses to the society and the government but are also able to conceal their identity to a great extent. There are number
of illegal activities which are committed over the internet by technically skilled criminals. Taking a wider
interpretation, it can be said that, Cybercrime includes any illegal activity where computer or internet is either a tool
or target or both. The term cybercrime may be judicially interpreted in some judgments passed by courts in India;
however, it is not defined in any act or statute passed by the Indian Legislature. Cybercrime is an uncontrollable evil
having its base in the misuse of growing dependence on computers in modern life. Usage of computer and other
allied technology in daily life is growing rapidly and has become an urge which facilitates user convenience. It is a
medium which is infinite and immeasurable. Whatsoever the good internet does to us, it has its dark sides too.1 Some
of the newly emerged cybercrimes are cyber-stalking, cyber-terrorism, e-mail spoofing, e-mail bombing, cyber
pornography, cyberdefamation etc. Some conventional crimes may also come under the category of cybercrimes if
they are committed through the medium of computer or Internet.
70
message requesting payment for a software licence. Ransomware assaults have developed significantly over time,
with the healthcare industry continuing to be a major target.
The birth of the web and a new dawn for Cyber Crime
The web browser and email were widely available in the 1990s, providing new tools for cybercriminals to exploit.
The cybercriminal was able to dramatically increase their reach as a result of this. Until the cybercriminal had to
carry out a physical transaction, such as handing over a floppy disc. Cybercriminals might now use these new, very
susceptible web browsers to send virus code around the internet. Cybercriminals adapted what they'd learnt in the
past to operate via the internet, with disastrous repercussions.
With phishing assaults, cybercriminals were also able to reach out and scam individuals from afar. It was no longer
required to interact with folks on a one-on-one basis. You could attempt to trick millions of users simultaneously.
Even if only a small percentage of people took the bait you stood to make a lot of money as a cybercriminal.
The decade of the 2000s saw the emergence of social media as well as identity theft. Identity theft has become the
new financial piggy bank for criminal groups all over the world, thanks to the emergence of databases storing millions
of users' personal identifying information (PII).
Because of this information and the general public's lack of cybersecurity knowledge, hackers were able to perpetrate
a variety of financial frauds, including creating bank accounts and credit cards in the names of others.
71
Cyber Crime:
Cybercrime is a crime that involves a computer, networking device or network. Most cybercrimes are committed by
cybercriminals to make a profit, some cybercrimes are used to directly damage or disable computers or equipment,
while others use computers or networks to spread malware, illegal information, images or other content. Some
cybercrimes target both computers, i.e., infecting computer viruses, which then spread to other machines and
sometimes to entire networks. The primary consequence of cybercrime is financial; Cybercrime involves a variety of
for-profit criminal activities, including ransom-ware attacks, email and internet fraud and identity scams, as well as
attempts to steal financial account, credit card or other payment card information. Cybercriminals can target one's
personal information as well as corporate data for theft and resale. Following are the some different types of cyber-
crimes...
Hacking: Simply put, hacking is the permission of an intruder. Hackers are basically computer programmers,
who have advanced knowledge about computers and usually misuse this knowledge for wrong reasons. They are
usually technologists who have expert level skills in a particular software program or language. As intended,
there may be many, but the most common are very simple and can be explained by human instincts such as greed,
fame, power, etc. Some people do it entirely to show off their skills through relatively harmless activities. Such
as improving software and even hardware to carry out tasks beyond the manufacturer's purpose, others seem to
be destroyed. Due to greed and sometimes voluntary tendencies, a hacker can break into the system to steal
personal banking information, corporation financial data, etc…
Virus Diffusion: Viruses are computer programs that attach themselves to systems or files and infect
them, and tend to spread to other computers on the network. They disrupt computer operations and affect
stored data either by modification or deletion altogether. Unlike viruses, "worms" do not require a host to
stick to. They only make replicas without consuming all the available memory in the system. The word
"worm" is sometimes used for the selfish purpose of "malware". The term is frequently changed in reference
to hybrid viruses / worms thatdominate the current viral situation. Trojan horses differ from viruses in their
mode of transmission. They masquerade as legal files, such as email attachments from a friend with a trusted
name and do not spread you.
Logic Bomb: A logic bomb, also known as a "slag code", is a piece of malicious code that is intentionally
inserted into software to perform malicious actions when triggered by a specific event. It is not a virus,
72
although it usually behaves the same. This program is inserted precisely into the program where it is dormant
until a specific program is completed. Malicious software, such as viruses and worms, often contain logic
bombs that run on a specific payload or at a predetermined time. Payload of logic bombs to the user of the
software and it performs unwanted functions. Codes programmed to execute at a particular time are known
as "time-bombs." For example, the infamous “Friday the 13th” virus attacked the host system only on certain
dates; Every Friday it "exploded" (duplicated itself) which was the thirteenth of the month, so the system
slows down. Logic bombs are usually assigned by disgruntled employees working in the IT sector. You may
have heard of "Dissatisfied Employees Syndrome" in which employers of fired angry employees use logic
bombs to delete databases, temporarily stabilize networks, or even trade internally. The trigger associated
with the execution of a logic bomb could be a specific date and time, an entry not received from the database,
or a failure to place commands at the usual time, meaning that the person no longer works there. Many logic
bombs only stay in the network in which they work. So often they are an internal affair. This makes them
easier to design and operate than viruses. No need to duplicate it; which is a more complex task. To protect
your network from logic bombs, you need constant monitoring of data on every computer on the network
and efficient anti-virus software.
Phishing: This is a technique to extract confidential information, such as credit card numbers and
username passwords, under the guise of a legitimate enterprise. Phishing is usually carried out through email
spoofing. You may have received emails with links to legitimate websites. You may have been suspicious
and have not clicked on the link. The malware may have installed itself on your computer and stolen private
information. Cybercriminals use social engineering to trick you into downloading malware from the Internet
or filling out your personal information under false pretences. There are a few things to keep in mind when
it comes to phishing scams in email.
Email Spamming and Bombing: Email bombing is characterized by a victim's email account or
mail server crashing as a result of a large number of emails being sent to the target address by a prohibited
user. Message is useless and too long to use resources. If multiple accounts on the mail server are targeted,
denial of service may result. Frequent mail in your mail can be easily detected by the spam filter. Email
bombing is usually carried out using botnets (private Internet connected computers whose security is
compromised by malware and under the control of attackers) as a DDOS attack.
Web Jacking: Web jacking is called "hijacking". Here, the hacker fraudulently takes control of the
website. It may change the content of the original site or redirect its controlled user to another fake similar
page. The owner of the website no longer has control and the attackers may use the website for their own
benefit. Cases of ransom have been reported by the attackers, as well as pornographic material posted on the
site. The attack of the web jacking method can be used to create a clone of the website and to present the
victim with a new link stating that the site has been moved. Unlike the usual phishing methods, when you
hover your cursor over the provided link, the URL presented will be original, not the attacker's site. But when
you click on a new link, it opens and is quickly replaced with a malicious web server. The name on the
address bar will be slightly different from the original website which will make the user think that it is a legal
site.
Cyber Stalking: Cyber stalking is a new form of internet crime in our society when a person is being
pursued or followed online. A cyber stalker does not physically follow your victim; He literally does this
through his online actions to gather information about the pastor and to harass and verbally threaten him.
This is an attack on someone's online privacy. Cyber stacking uses the Internet or any other electronic means
and is different than offline stacking, but usually with it. The most common victims of this crime are women
who are victimized by men and children by adult predators and paedophiles. Cyber stalkers thrive on
inexperienced web users who are unaware of the rules of native and internet safety. A cyber stalker may be
a stranger, but a person you know can easily become a stranger.
Data Diddling: Data dissection is the process of unauthorized exchange of data before or during access
to a computer and back after the process is complete. Using this technique, the attacker can improve the
expected output and is difficult to track. In other words, the information that will be entered is altered, the
virus programmed to alter the data, the programmer or creator of the database or of application, anyone else
involved in the recording process, encoding, checking, investigating, converting or transmitting data is the
easiest computer related crime. There is a method, because even a computer amateur can do it. Although this
73
is an easy task, it can have detrimental effects. For example, a person in charge of accounting indicates that
the data may change, either for himself or for a friend or relative. They are able to steal from the enterprise
if the information changes or fails. Other examples include forging or forging documents and exchanging
valid computer tapes or cards with readymade replacements. Electrical circles in India have fallen victim to
data diddling by computer criminals when private parties were computerizing their systems.
Information Security:
Information Security is not only about securing information from unauthorized access. Information Security is
basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection,
recording or destruction of information. Information can be physical or electronic one. Information can be anything
like Your details or we can say your profile on social media, your data in mobile phone, your biometrics etc. Thus
Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online
Social Media etc.
During First World War, Multi-tier Classification System was developed keeping in mind sensitivity of information.
With the beginning of Second World War formal alignment of Classification System was done. Alan Turing was the
one who successfully decrypted Enigma Machine which was used by Germans to encrypt warfare data.
Information Security programs are built around 3 objectives, commonly known as CIA – Confidentiality, Integrity,
Availability.
Confidentiality – means information is not disclosed to unauthorized individuals, entities and process. For example,
if we say I have a password for my Gmail account but someone saw while I was doing a login into Gmail account.
In that case my password has been compromised and Confidentiality has been breached.
Integrity – means maintaining accuracy and completeness of data. This means data cannot be edited in an
unauthorized way. For example, if an employee leaves an organisation, then in that case data for that employee in all
departments like accounts, should be updated to reflect status to JOB LEFT so that data is complete and accurate and
in addition to this only authorized person should be allowed to edit employee data.
Availability – means information must be available when needed. For example, if one needs to access information
of a particular employee to check whether employee has outstood the number of leaves, in that case it requires
collaboration from different organizational teams like network operations, development operations, incident response
and policy/change management.
Denial of service attack is one of the factors that can hamper the availability of information.
Apart from this there is one more principle that governs information security programs. This is Non repudiation.
Non repudiation – means one party cannot deny receiving a message or a transaction nor can the other party deny
sending a message or a transaction. For example, in cryptography it is sufficient to show that message matches the
digital signature signed with sender’s private key and that sender could have a sent a message and nobody else could
have altered it in transit. Data Integrity and Authenticity are pre-requisites for Non repudiation.
Authenticity – means verifying that users are who they say they are and that each input arriving at destination is
from a trusted source. This principle if followed guarantees the valid and genuine message received from a trusted
source through a valid transmission. For example, if take above example sender sends the message along with digital
signature which was generated using the hash value of message and private key. Now at the receiver side this digital
signature is decrypted using the public key generating a hash value and message is again hashed to generate the hash
value. If the 2 value matches, then it is known as valid transmission with the authentic or we say genuine message
received at the recipient side
Accountability – means that it should be possible to trace actions of an entity uniquely to that entity. For example,
as we discussed in Integrity section Not every employee should be allowed to do changes in other employees’ data.
For this there is a separate department in an organization that is responsible for making such changes and when they
receive request for a change then that letter must be signed by higher authority for example Director of college and
74
person that is allotted that change will be able to do change after verifying his bio metrics, thus timestamp with the
user (doing changes) details get recorded. Thus, we can say if a change goes like this then it will be possible to trace
the actions uniquely to an entity.
At the core of Information Security is Information Assurance, which means the act of maintaining CIA of
information, ensuring that information is not compromised in any way when critical issues arise. These issues are not
limited to natural disasters, computer/server malfunctions etc.
Thus, the field of information security has grown and evolved significantly in recent years. It offers many areas for
specialization, including securing networks and allied infrastructure, securing applications and databases, security
testing, information systems auditing, business continuity planning etc.
Cyber Criminals:
Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital
systems or networks with the intention of stealing sensitive company information or personal data, and generating
profit.
Cybercriminals are known to access the cybercriminal underground markets found in the deep web to trade malicious
goods and services, such as hacking tools and stolen data. Cybercriminal underground markets are known to
specialize in certain products or services.
Laws related to cybercrime continue to evolve across various countries worldwide. Law enforcement agencies are
also continually challenged when it comes to finding, arresting, charging, and proving cybercrimes.
75
(a). White Hat Hackers – These hackers utilize their programming aptitudes for a good and lawful reason. These
hackers may perform network penetration tests in an attempt to compromise networks to discover network
vulnerabilities. Security vulnerabilities are then reported to developers to fix them.
(b). Gray Hat Hackers – These hackers carry out violations and do seemingly deceptive things however not for
individual addition or to cause harm. These hackers may disclose a vulnerability to the affected organization after
having compromised their network.
(c). Black Hat Hackers – These hackers are unethical criminals who violate network security for personal gain. They
misuse vulnerabilities to bargain PC frameworks.
2. Organized Hackers: These criminals embody organizations of cyber criminals, hacktivists, terrorists, and state-
sponsored hackers. Cyber criminals are typically teams of skilled criminals targeted on control, power, and wealth.
These criminals are extremely subtle and organized, and should even give crime as a service. These attackers are
usually profoundly prepared and well-funded.
3. Internet stalkers: Internet stalkers are people who maliciously monitor the web activity of their victims to acquire
personal data. This type of cybercrime is conducted through the use of social networking platforms and malware,
that are able to track an individual’s PC activity with little or no detection.
4. Disgruntled Employees: Disgruntled employees become hackers with a particular motive and also commit
cybercrimes. It is hard to believe that dissatisfied employees can become such malicious hackers. In the previous
time, they had the only option of going on strike against employers. But with the advancement of technology there
is increased in work on computers and the automation of processes, it is simple for disgruntled employees to do more
damage to their employers and organization by committing cybercrimes. The attacks by such employees brings the
entire system down. Please refer for: Cyber Law (IT Law) in India
the term cybercrime is well known and needs no introduction. Crime is a great hurdle in the development of a country.
It adversely affects the members of the society and lowers down the economic growth of the country. Computer
technology provides a boost to the human life and makes it easier and comfortable. It adds accuracy, speed and
efficiency to the life of human being. But a computer is exploited by the criminals and its illegal use leads to
cybercrime. To combat cybercrime, India enacted the Information Technology Act,2000 which was drastically
amended in the year 2008 providing more powerful and stringent law. Cybercrime is a crime done with the misuse
of information technology for unauthorized or illegal access, electronic fraud; like deletion, alteration, interception,
concealment of data, forgery etc... Cybercrime is an international crime as it has been affected by the global revolution
in information and communication technologies (ICTs). It has affected the global community. It would be unlawful
act where the computer is either a tool or a target or both. Continuous attempts have been made to specify different
types of cybercrime, their detection and preventive methods. Cybercrimes have become the most potentially
damaging threat to IT-related activities, transactions, and assets. Unfortunately, some organizations do not seem to
be much alert to detect, address, or protect themselves from these threats.
The internet has become an integral part of everyone’s life. It has also given new dimensions to our economic and
social life. But at the same time, we cannot be oblivious of the negative side of use of computers and internet. It is
very unfortunate that computer crime is rampant and is increasing exponentially as the side effect of the excessive
76
use of computers and internet. The internet security problem is immensely growing and cybercrimes are continuously
increasing even though we are using many countermeasures. The following figures would reveal the worldwide
penetration percentage of cybercrimes.
Legal Perspectives:
LEGISLATIVE MEASURES FOR PREVENTION OF CYBER CRIMES
Statutory Provisions Governing Cyber Defamation in India
The Indian Penal Code, 1860
The Indian Penal Code, 1860 contains provisions dealing with the menace of cyber defamation.
77
accusation preferred in good faith against any person by authorized person, imputation on the character of another
made in good faith by person for protection of the interest of the person making it or of any other person, or for
the public good, caution intended for good of person to whom conveyed or for public good.
The exceptions are based on the ground of truth, good faith or public interest, and strike a balance between
freedom of speech and expression guaranteed under Article 19(1) (a) of the Constitution of India and the
individual’s rights to reputation. The expression ‘harm’ used in Section 499 means harm to the reputation of the
aggrieved party. No imputation is said to harm a person's reputation, unless that imputation directly or indirectly,
in the estimation of others, lowers the moral or intellectual character of that person, or lowers the character of
that person in respect of his caste or of his calling, or lowers the credit of that person. The harm to reputation of
the person is made with necessary men’s rea (guilty mind). The offence of defamation is punishable under Section
500 of IPC with a simple imprisonment up to 2 years or fine or both.
[Link]
78
The Information Technology Act, 2000 also aims to provide for the legal framework so that legal sanctity is
accorded to all electronic records and other activities carried out by electronic means. The Act states that unless
otherwise agreed, an acceptance of contract may be expressed by electronic means of communication and the
same shall have legal validity and enforceability.
Since the first computer crime law, the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984,
the government has been trying to track down and stop online criminals. The FBI has tried many programs and
investigations in order to deter Internet crime, like creating an online crime registry for employers (Metchik
29). The reality is that Internet criminals are rarely caught. One reason is that hackers will use one computer in
one country to hack another computer in another country. Another eluding technique used is the changing of
the emails, which are involved in virus attacks and “phishing” emails so that a pattern cannot be recognized.
An individual can do their best to protect themselves simply by being cautious and careful. Internet users need
to watch suspicious emails, use unique passwords, and run anti-virus and anti-spyware software. Do not open
any email or run programs from unknown sources.
[Link]
79
Cyber-crime: A Global Perspective
Cybersecurity constitutes one of the top five risks of most firms, especially in Big Tech and Banking & Financial
Services. A weekend reading led to some interesting data points from various sources such as AV-Test and Cove
ware, among others, and that further led to me pondering over the mitigating actions that we can take as
individuals and as organisations for some, if not all, of these cybercrime risks. I extend my thanks to the respective
experts who shared their knowledge, enabling me to piece together some parts of the larger jigsaw puzzle.
Global cybercrime damage costs this year are expected to breach US $6 trillion an annum. That is almost one-
fourth of the US GDP or twice the GDP of India. This is expected to scale up to US $10.5 trillion an annum by
2025. Cyber attackers are disrupting critical supply chains, at least 4 times more than in 2019.
Yet, approximately 4 of every 5 organisations don’t consider themselves having proper responses to cyber-attacks
which creates a need for a cybersecurity risk management team for them. Let’s have a look at the individual
components.
While digital transformation, move to cashless transactions and zero contact communication supported with
proliferation in internet and mobile phone usage, cyber risks in India have risen exponentially during the
pandemic. According to the annual IBM X-Force Threat Intelligence Index, India reported the second-highest
number of cyber-attacks after Japan in the Asia-Pacific region in 2020, accounting for 7 percent of all cyber-
attacks observed in Asia in 2020.
The cybersecurity market in India is expected to grow to over $3 billion by 2022, at about 150% of the global
rate. A 2019 report by IBM revealed that cyberattacks cost India ₹12.8 crores on an average between July 2018
and April 2019, while the average cost of a data breach globally was ₹27 crore. Besides these financial losses,
cyberattacks can and have caused huge dents in organizational brand value.
45% of adult Indian internet users faced identity threat in 2020, up almost 40% since 2019, at 2.7 crore – over 2
percent of India’s entire population.
A German cybersecurity firm, Greenbone Sustainable Resilience, reported that medical records of over 120
million Indian patients (mostly from Maharashtra and Karnataka) were leaked on the Internet. The leaked records
included pictures of the patients, X-rays, CT scans and MRIs.
Stuart Solomon, COO of Massachusetts based Recorded Future, had made an interesting claim based on malware
tracing. He alleged that a Chinese group called Red Echo, “has been seen to systematically utilize advanced cyber
intrusion techniques to quietly gain a foothold in nearly a dozen critical nodes across the Indian power generation
and transmission infrastructure.” The firm claimed that the electricity outage in Mumbai on 13th October 2020,
was orchestrated by Red Echo. Whether Red Echo was acting as a state actor or not, the threat is nonetheless
real.
80
The latest one in the country is a fake SMS message, that claims to offer an app to register for Covid-19
vaccination in India. Once the link is clicked, this installs malicious code that gains permissions to the user’s
data, such as contact lists, and spreads via SMS to the user’s contacts.
Having perused these data points, it does not take much to decipher that these incidents are only expected to
increase. Let’s look at some of the steps that can be taken to mitigate or reduce the impact;
Individuals For home usage, some cyber etiquettes generally are good enough to firstly avoid being attacked, and
if one does become a victim of cyber-crime, can minimize impact;
Organisations need a much more structured approach to manage cybersecurity risks. Also, before commencing,
it is important to realise that Human errors (~95%) are a major cause of cybersecurity breaches – any
sophisticated programme that does not consider this element will be fraught with deficiencies. Having
cybersecurity management can help mitigate the risks across the organisation.
A typical programme in a global organisation would mostly involve the following, amongst other steps, though
may not be in any specific order.
81