MCA Semester III MIS Syllabus
MCA Semester III MIS Syllabus
MCA
(TWO YEARS PATTERN)
SEMESTER - III (CBCS)
MANAGEMENT
INFORMATION SYSTEM
SUBJECT CODE: MCAE343
© UNIVERSITY OF MUMBAI
Published by : Director,
Institute of Distance and Open Learning,
University of Mumbai,
Vidyanagari,Mumbai - 400 098.
1.0 OBJECTIVES
1.1 INTRODUCTION
22
1.4 MIS MEANING Management Information
Systems (MIS)
3
Management Information • It set down a framework which includes set of rules and regulation for
System
the management to bring a clear and concise communication between
employees.
• It provides an impartial system for collecting, assessing, and
aggregating information for a business.
Scope of MIS
MIS involves in performing a number of task simultaneously such as:-
• Processing data
• Initiating transaction
• Responding to inquiries
• Producing reports and its summaries
• Manage the data created within the structure of a particular business.
5
Management Information collected and stored in a database or in data files. The data can be stored on
System
various storage media like hard drives, DVDs etc.
1.8.2 Data Storage or Information Storage
It means storing information in a safe manner so as to make it available for
any future use. Cloud based application store data on virtual server
converting raw data into meaningful information is what experts call data
processing.
1.8.3 Data Processing
Data processing is an important function of MIS as information is the core
necessity for achieving competition advantage giving the right the
information to the right person at the right time is termed as information
distribution. The information could be in the form of a report, an image, a
message, files, and a video or even audio. The gathered data needs to be
processed in a system so that it can in help to the management. The data is
processed into information which is used for planning, controlling,
organizing, and directing functionalities at different levels of the
organization.
1.8.4 Data and Information Distribution
The Distribute Information process is responsible for getting information to
stakeholders about the project in a timely manner. It describes how reports,
and other information, are distributed and to whom. Executing the
communications management plan also occurs during this process. Data is
defined as 'groups of non-random symbols in the form of text, images, and
voice representing quantities, action and objects'. Information is interpreted
data; created from organized, structured, and processed data in a particular
context. A set of information systems physically distributed over multiple
sites, which are connected with some kind of communication network.
1.8.5 Prediction and forecasting
To facilitate comparison, information is presented in the form of charts,
tables and graphs with the help of modern arithmetic statics or simulation.
MIS can predict business trends using historical as a base. Reports are
generated based on the comparing needs to help management plain in
advance enabling each functional department to work efficiently.
1.8.6 Planning and control
One of the most important supporting tools in planning and control. It
is computerized integrated system which gives accurate information about
the past, present and projected. It helps to do analysis on variance, reason
to enjoy success and most important to take further decision. Planning
involves establishing goals and communicating these goals to employees of
the organization. The control function assesses whether goals were achieved
and is often used to evaluate the performance of employees, departments,
and the organization as a whole.
66
1.9 Characteristics of MIS Management Information
Systems (MIS)
9
Management Information
System
1.12 CHALLENGES OF MIS
Even though MIS has many benefits but it also has its
limitations. Limitations of MIS are discussed below:
• While MIS may solve some critical problems but it is not a solution
to all problems of an organization.
• Database
• Qualified System and Management Staff
• Top Management Support
• Active Participation of Operating Management
• Control and Maintenance of Management Information System
• Evaluation of Management Information System
1.15 SUMMARY
https://www.geektonight.com/what-is-mis/
https://www.google.com
1.17 BILBLIOGRAPGY
https://www.geektonight.com/what-is-mis/
https://www.google.com
MCQ FOR PRACTICE
Q1. The back bone of any organization is_________
a. information’
b. employee’
c. Management
d. Capital
Q2. The flow of information through MIS is
a. need dependent
b. organization dependent
c. information dependent
d. management dependent
11
Management Information Q3. Internal information for MIS may come from any one of the following
System
department.
a. customers care department
b. hr department
c. marketing department
d. production department
Q4. MIS normally found in a manufacturing organization will not be
suitable in the ______.
a. service sector
b. banking sector
c. agriculture sector
d. all of the above
Q5. ______ involves the investigation of new approaches to existing
problems
a. systems analysis
b. creative analysis
c. critical analysis
d. organizational analysis
12
12
2
MANAGEMENT INFORMATION
SYSTEMS (MIS) -II
Unit Structure
2.0 Objectives
2.1 Introduction
2.2 Impact of MIS
2.3 Functions and future of MIS
2.3.1 Data Capturing
2.3.2 Processing Data
2.3.4 Storage Information
2.3.5 Retrieval of Information
2.3.6 Dissemination of MI
2.4 MIS: A support to the management
2.4.1 Planning
2.4.2 Organization
2.4.3 Staffing
2.4.4 Directing
2.4.5 Coordinating
2.4.6 Controlling
2.5 MIS: organization effectiveness
2.5.1 Leadership
2.5.2 Communication
2.5.3 Accountability
2.5.4 Delivery
2.5.5 Performance
2.5.6 Measurement
2.6 MIS for a digital firm
2.6.1 The Network Revolution and the Internet
2.6.2 New Option for organization design: The digital firm and the
collaborative Enterprise.
2.6.3 Electronic Commerce
2.6.4 Electronic Business
2.6.5 Intranet
2.6.6 Extranet
2.6.7 Positive Impact of Information Systems
2.7 Summary
2.8 Reference for further reading
13
Management Information
System
2.0 OBJECTIVES
2.1 INTRODUCTION
15
Management Information • MIS lowers market transaction costs for firm, making it worthwhile
System
for firms to transact with other firms rather than grow the number of
employees.
• Empowers lower-level employees to make decisions without
supervision and increase management efficiency
• Management span of control (the number of employees supervised by
each manager) will also grow
• MIS give both large and small organizations additional flexibility to
overcome the limitations posed by their size.
• Small organizations use information systems to acquire some of the
muscle and reach of larger organizations.
• Large organizations use information technology to achieve some of
the agility and responsiveness of small organizations.
• Customization and personalization: MIS makes it possible to tailor
products and services to individuals.
• Factors to consider while planning a new system:
a) Organizational structure, hierarchy, specialization, routines,
and business processes.
b) The organization’s culture and politics.
• The type of organization and its style of leadership:
a) Groups affected by the system and the attitudes of workers who
will be using the system.
• The kinds of tasks, decisions, and business processes that the
information system is designed to assist
• Flexibility and multiple options for handling data and evaluating
• information (CREAM WIZARD)
• Capability to support a variety of management styles, skills, and
knowledge.
• Capability to keep track of many alternatives and consequences
• sensitivity to the organization’s bureaucratic and political
requirements.
• Change Management:
a) MIS become bound up in organizational politics because they
influence access to a key resource (FINANCE).
b) They potentially change an organization’s structure, culture,
politics, and work.
c) Most common reason for failure of large projects is due to
organizational and political resistance to change.
16
16
Management Information
Systems (MIS) -II
17
Management Information 5) Dissemination of MI:
System
Management information, which is a finished product of MIS, is
disseminated to the users in the organization. It could be periodic,
through reports or online through computer terminals.
• The six systems are broader in scope than functional departments and
must be understood independently and interpedently as part of an
integrated whole.
19
Management Information 1) Leadership :
System
To achieve high performance or sustain results, leaders must define
and refine key processes and execute them with daily discipline.
They must translate vision and values into strategy and objectives,
processes and practices, actions and accountabilities, execution and
performance.
Leader addresses three questions:
a) Vision and Value
b) Strategy and Approach
c) Structure and Alignment
2) Communication:
Leader should maximize their contribution to daily conversations,
they must engage and align people around a common cause, reduce
uncertainty, keep people focused, equip people for moments of truth
that creates on-table culture, prevent excuses, learn from experience ,
treat mistakes as intellectual capital, and leverage the power of
leadership decisions to shape beliefs and behaviours.
3) Accountability:
Leaders translate vision and strategic direction into goals and
objectives actions and accountabilities. Performance accountability
systems clarify what is expected of people and align consequences or
rewards with actual performance. Leaders need to build discipline
into their leadership process and management cycle to achieve
accountability, predictability, learning, renewal, and sustainability.
4) Delivery:
The best organizations develop simple process that is internally
efficient, locally responsive, and globally adaptable. Complexity is
removed from the customer experience to enable them to engage in
way as those are elegant and satisfying. Establishing and optimizing
operational performance is an ongoing journey.
5) Performance:
The human performance system is designed to attract, develop, and
retain the most talented people. The idea is to hire the best people and
help them develop their skills, talents, and knowledge over time.
6) Measurement:
A system of metrics, reviews and course corrections keep the business
on track. Organizations need concrete measures that facilitate quality
control, consistent behaviours, and predictable productivity and
results.
20
20
Management Information
Systems (MIS) -II
2.15 SUMMARY
https://www.slideshare.net/
https://www.learnpick.in/
http://www.openlearningworld.com/
https://ecomputernotes.com/
https://www.geektonight.com/what-is-mis/
https://www.google.com
2.17 BILBLIOGRAPGY
https://www.slideshare.net/
https://www.learnpick.in/
https://ecomputernotes.com/
http://www.openlearningworld.com/
https://www.geektonight.com/what-is-mis/
https://www.google.com
23
Management Information MCQ FOR PRACTICE
System
Q1. The information of MIS comes from the boot _______ source.
A. Internal
B. External
C. Superficial
D. internal and external
Q2. MIS is normally found in ______sector
A. Service
B. Education
C. Manufacturing
D. Marketing
Q3. Management information system usually NOT serves managers
interested in _______ results.
A. weekly
B. monthly
C. yearly
D. day-to-day
Q4. _______ is an important factor of a management information
system.
A. Information
B. System
C. Planning
D. Personnel
Q5. Information technology is the combination of computer science
and ______
A. telecommunications
B. electronics
C. digital marketing
D. networking
24
24
3
ORGANIZATIONS AND INFORMATION
SYSTEMS
Unit Structure
3.0 Introduction to Information System and MIS
3.1 Modern Organization
3.2 Information Systems in Organizations
3.3 Managing Information Systems in Organizations
3.4 List of References
3.5 Quiz
3.6 Exercise
3.7 Video Links
What is IS?
An information system (IS) can be any organized combination of people,
hardware, software, communications networks, data resources, and policies
and procedures that stores, retrieves, transforms, and disseminates
information in an organization.
People rely on modern information systems to communicate with one
another using a variety of physical devices (hardware), information
processing instructions and procedures (software), communications
channels (networks), and stored data (data resources). Although today’s
information systems are typically thought of as having something to do with
computers, we have been using information systems since the dawn of
civilization.
An Information System can be described in two different ways: the
components that make up an information system and the role that those
components play in an organization.
Information systems support an organization's business operations,
managerial decision making and strategic competitive advantage. Such
system is called roles of information systems.
An information system depends on the resources of people (end users and
IS specialists), hardware (machines and media), software (programs and
procedures), data (data and knowledge bases), and networks
25
Management Information (communications media and network support) to perform input, processing,
System
output, storage, and control activities that transform data resources into
information products.
This information system model highlights the relationships among the
components and activities of information systems. It also provides a
framework that emphasizes four major concepts that can be applied to all
types of information systems:
• People, hardware, software, data, and networks are the five basic
resources of information systems.
• End users (also called users or clients) are people who use an
information system or the information it produces. They can be
customers, salespersons, engineers, clerks, accountants, or managers
and are found at all levels of an organization. In fact, most of us are
information system end users. Most end users in business are
knowledge workers, that is, people who spend most of their time
communicating and collaborating in teams and workgroups and
creating, using, and distributing information.
• Computer hardware
This is the physical technology that works with information.
Hardware can be as small as a smartphone that fits in a pocket or as
large as a supercomputer that fills a building. Hardware also includes
the peripheral devices that work with computers, such as keyboards,
external disk drives, and routers. With the rise of the Internet of
things, in which anything from home appliances to cars to clothes will
be able to receive and transmit data, sensors that interact with
computers are permeating the human environment.
• Computer software
The hardware needs to know what to do, and that is the role of
software. Software can be divided into two types: system software
and application software. The primary piece of system software is the
operating system, such as Windows or iOS, which manages the
hardware’s operation. Application software is designed for specific
tasks, such as handling a spreadsheet, creating a document, or
designing a Web page.
• Telecommunications
This component connects the hardware together to form a network.
Information technology is the combination of computer science and
telecommunications. Connections can be through wires, such as Ethernet
cables or fibre optics, or wireless, such as through WiFi. A network can be
27
Management Information designed to tie together computers in a specific area, such as an office or a
System
school, through a local area network (LAN). When computers are more
distributed, the network is called a wide area network (WAN). The Internet
itself can be thought of as a network of networks.
What is MIS?
A management information system (MIS) can be defined as a system that:
28
28
• Includes files, hardware, software and operations research models of Organizations and
Information Systems
processing, storing, retrieving and transmitting information to the
users.
A management information system (MIS) is a subset of the overall internal
controls of a business covering the application of people, documents,
technologies, and procedures by management accountants to solving
business problems such as costing a product, service or a business wide
strategy. Management information systems are distinct from regular
information systems in that they are used to analyse other information
systems applied in operational activities in the organization. From an
academic point of view, the term is commonly used to refer to a group of
information management technologies related to, for example, automation
or human decision support. Decision support systems, expert systems and
information systems for managers.
Objectives of Management Information Systems (MIS)
30
30
Organizations and
Information Systems
31
Management Information ▪ Benefits of this type of structure include:
System
• Hierarchical structure
In a hierarchical organizational structure, employees are grouped and
assigned a supervisor. It is the most common type of organizational
structure. Employees may be grouped together by their role or
function, geography or type of products or services they provide. This
structure is often depicted as a pyramid because there are multiple
levels or authority with the highest level of leadership at the top, their
direct employees below them and so forth.
▪ Benefits of this type of structure include:
Establishing clearly defined levels of authority
Promoting teamwork and department loyalty
Fostering employee development and promotion opportunities
▪ Potential disadvantages include:
Limiting collaboration
Restricting innovation
Creating bureaucracy that must be managed
• Functional structure
In a functional structure, the organization is divided into groups by
roles, responsibilities or specialties. For example, within an
organization you may have a marketing department, finance
department and sales department with each overseen by a manager
who also, has a supervisor that oversees multiple departments. A
functional structure can be beneficial because departments can trust
that their employees have the skills and expertise needed to support
their goals.
▪ Benefits of this type of structure include:
• Divisional Structure
In a divisional structure, organizations are split into divisions based
on specific products, services or geographies. For this reason, this
structure is typically used by large companies that operate in wide
geographic areas or own separate, smaller companies. Each division
has its own executive leadership, departments and resources. For
example, a large software company may separate its organization
based on product type, so there's a cloud software division, corporate
software division and a personal computing software division.
▪ Benefits of this structure include:
Scaling limitations
Duplicating resources or activities
Decentralizing decision-making
• Network Structure
In a network structure, managers at an organization will coordinate
relationships with both internal and external entities to deliver their
products or services. For example, a retail company will just focus on
selling clothing items but will outsource the design and production of
these items in a partnership with other company. This structure
focuses more on open communication and relationships than
hierarchy.
▪ Benefits of this type of structure include:
33
Management Information ▪ Potential disadvantages include:
System
• Line Structure
In a line structure, authority within the organization flows from top to
bottom and there are no specialized or supportive services. It is one of
the simplest types of organization structure. It is also known as
Military organisation. The organization is typically divided into
departments that are overseen and controlled by a general manager,
and each department has its own manager with authority over its staff.
The departments work independently to support the organization's
primary goal.
▪ Benefits of this type of structure include:
Limiting specialization
Becoming rigid and inflexible
Giving too much power to a manager
34
34
▪ Potential disadvantages include: Organizations and
Information Systems
Decreasing organization consistency
Limiting contact with other functions
Increasing potential for conflict
• Circular Structure
A circular organizational structure relies on hierarchy to depict
higher-level employees within the inner rings of a circle and the
lower-level employees along the outer rings. Seated at the center of
the organization, leaders do not send orders down the chain of
command, but rather outward. While many of the other structure types
contain different departments that work independently with
individual goals, this structure removes that strict separation and
looks at the bigger picture with all departments being part of the same
whole.
▪ Benefits of this type of structure include:
Encouraging communication across all levels of staff
Promoting free flow of information across the business
Collaborating amongst departments, rather than separation
▪ Potential disadvantages include:
Causing confusion over who to report to
Requiring more resources and training
Causing slowdown in decision-making
• Process – based structure
In a process-based structure, the organization is designed around the
flow of its processes and how the duties performed by its employees
interact with one another. Instead of flowing from top to bottom, this
structure outline services from left to right.
An executive at the top of the structure oversees the departments
below, which represents the different processes, but each process
cannot start until the one before it has finished. And each department
will have its own management and team working to fulfil their duties
so that the business can move onto the next task and eventually reach
its ultimate goal, such as selling a product to consumers.
▪ Benefits of this type of structure include:
Improving business' efficiency and speed
Encouraging teamwork between departments
Adapting easily to meet industry changes
▪ Potential disadvantages include:
Erecting barriers, or silos, between groups
Limiting communication
Requiring more resources to achieve process optimization
35
Management Information
System
3.2 INFORMATION SYSTEMS IN ORGANIZATIONS
38
38 • The Role of Management Information Systems | Smartsheet
• 10 Types of Organizational Structures (With Pros and Cons) | Organizations and
Information Systems
Indeed.com
• The Role of Management Information Systems | Smartsheet
3.5 QUIZ
39
Management Information a) electronics
System
b) telecommunications
c) digital marketing
d) networking
7. How can organisational structures that are characterised by
democratic and inclusive styles of management be described?
a) Hierarchical
b) Flat
c) Functional
d) Matrix
8. Functional structures help to create _____ of work task
a) specialisation
b) teamwork
c) project work groups
d) multi-skilled employees.
9. What is not a purpose of an organisational structure?
a) To formalise authority
b) To limit workers' rights
c) To coordinate people and resources
d) To organise lines of communication block group
10. Specialisation is a feature of which organisational structure?
a) Matrix
b) Divisional
c) Multi-divisional
d) Functional
11. What is I in MIS?
a) Information
b) Informative
c) Inform
d) Informa
12. Organisation establishes relationship between?
a) People, work and resources
b) Customer, work and resources
c) People, work and management
d) Customer, work and management
40
40 e)
13. Organisation is a process of Organizations and
Information Systems
A: Identifying and grouping of work to be performed
B: Defining and delegating the responsibility and authority
a) Only A
b) Only B
c) Both A & B
d) Neither A nor B
14. Responsibility always flows from_____
A: Superior to subordinate
B: Subordinate to superior
a) Only A
b) Only B
c) Both A & B
d) Neither A nor B
15. Authority always flows from_____
A: Superior to subordinate
B: Subordinate to superior
a) Only A
b) Only B
c) Both A & B
d) Neither A nor B
16. The following is not a type of organisation structure _____.
a) Line organisation
b) Functional organisation
c) Line and staff organisation
d) Flexible organisation
17. The following is also known as Military organisation.
a) Line organisation
b) Functional organisation
c) Circular organisation
d) Flexible organisation
18. A credit manager may be provided with a report that includes only
information about customers who have exceeded their credit limits.
This is an example of ______ report.
41
Management Information a) exception
System
b) send
c) periodic scheduling
d) request and response
19. Daily or weekly sales analysis reports and monthly financial reports
are an example of ______ report.
a) exception
b) send
c) periodic scheduling
d) request and response
20. When a DBMS query is fired to retrieve information on demand then
it can act as an example of ______ report.
a) exception
b) send
c) periodic scheduling
d) request and response
3.6 EXERCISE
1. What is IS?
2. Explain components of IS.
3. What is MIS?
4. Explain objectives and characteristics of MIS.
5. Short note on modern organization.
6. How does IS help in Organizations?
7. Explain in detail about the types of modern organizational structures.
8. Short note on
43
4
CONCEPTS OF MANAGEMENT
INFORMATION SYSTEMS
Unit Structure
4.0 Data and Information
4.1 Information as a Resource
4.2 Information in Organisational Functions
4.3 Types of Information Technology
4.4 Types of Information Systems
4.5 Decision Making with MIS
4.6 Communication in Organizations
4.7 Self-Learning Topics: Case Study: Management Issues- Challenges
for Managers
4.8 List of References
4.9 Quiz
4.10 Exercise
4.11 Video Links
The applicability of Management Information Systems (MIS) has evolved
over a period of time comprising many different facets of the organizational
function. MIS is a need in all the organizations. The initial concept of MIS
was processing available data available in the organization and present it in
the form of reports at regular time intervals. The system was largely capable
of handling the data from collection to processing. It was more impersonal,
requiring each individual to pick and choose the processed data and use it
according to the requirements. This concept was further modified when a
distinction was made between data and information.
• Computers
Computers are used in some businesses. They are equipped with
software that allows them to perform all sorts of tasks: Analysing
financial information, sending and receiving emails, and designing
48
48 sales presentations. This computer is designed as a desktop device or
mobile laptop for use in the office or travel. PCs (personal computers) Concepts of Management
Information Systems
running Microsoft Windows are the most commonly used. Macintosh
computers running the Apple operating system are also used, but are
primarily used by professionals. Computers are essential to enable
businesses to manage their daily activities more productively and
efficiently.
• Software
Computers use different types of programs and operational
information called software to perform specific tasks. Companies use
productivity tools such as Microsoft Word, a word processing
package, and Microsoft Excel, a financial spreadsheet system.
Microsoft PowerPoint and Apple Keynote are also used to quickly
and easily create professional-looking sales presentations. Companies
use specific software that suits their needs.
● Networking
Networking is used to interact with groups of people, share
information and documents, store information, and communicate via
email. You can also share printers and storage devices on your
computer. The network can be limited to computers in the office or
connected to multiple offices. Networking is essential to your
business as it provides a way to build relationships with others in
relevant areas to find and grow new customers and partnerships.
● Telephone Communication
Communication is the key to building business relationships. For this
reason, businesses use some type of telephone system to communicate
with their customers and organizations. This provides a fast and
efficient personal connection with other users. Good customer service
with customers and effective communication with employees will
ultimately help build and grow your business's reputation. Currently,
there are business telephone systems with various functions to meet
the needs of companies. Voice over internet protocol, Voice over IP,
is very popular and allows users to make calls over the internet instead
of traditional analog phone systems.
● Accounting System
Accounting System is software that allows businesses to manage their
expenses and income. Quickbooks are most commonly used by small
businesses. It is easy to set up and maintain. Large enterprises, on the
other hand, use SAP Business One or Sage Accpac to enhance
customization and integration with other systems. The choice of the
right accounting system depends on the size and needs of your
business. Before making a decision, it's a good idea to consult an
accountant to review your options.
49
Management Information ● Inventory Management System
System
The Warehouse Management System is used to manage all of the
company's inventory. It accurately tracks items, including quantity in
stock, updates the system when new stock arrives and is sold, and
keeps accurate records. Companies need an appropriate and organized
inventory management system to maintain the proper balance of items
in their inventory, understand their inventory, and check their
finances.
54
54 The communication process model
The easiest way to understand a model is when one person is Concepts of Management
Information Systems
communicating with another. The sender, who initiates the communication,
has information that other recipients need to know. However, the
information must be encoded in a format before it can be sent. In simple
cases, the information is put into the words spoken to the recipient.
Alternatively, you can convert the information into printed text, tables,
charts, or graphs and provide it to your recipients. In more complex cases,
the information is encoded into words or images and then converted into
electronic signals that are sent to the recipient. A channel is the medium
through which information is transmitted. It can be air carrying sound
waves, paper carrying text or images, or wires or magnetic fields carrying
electronic signals. In the opening example, management had information
about when Matthias was hired and started. They wanted employees of the
company to have this information, so they put it in a message and sent it to
them.
Recipient reverses the process. Recipient receives an encrypted message
and decrypts it. That is, it transforms the message back into understandable
information. In the first example, the employee reads the message and
knows who is hired and when to start.
The role of the manager is to achieve the goals of the organization. To do
this, the manager creates a plan that defines what needs to be done, when to
do it, and how to do it. To implement the plan, managers need to share this
information with everyone in the organization. In other words, you need to
communicate your plan to the members of your organization. However,
managers do more than just educate people about what they need to do to
support their plans. You also need to support your plans, build commitments
to your organization, build trust and collaboration, and motivate people to
inform everyone about events and actions that affect your organization.
Good communication not only provides information, but also helps create a
culture in which people feel they belong and want to support their
organization. Below are some of the benefits of effective communication.
4.10 EXERCISE
62
62
5
DECISION SUPPORT SYSTEM(DSS)
Unit Structure
5.0 Objectives:
5.1. Introduction to Decision Support System
5.1.1 A brief history of Decision Support Systems
5.1.2 Components of a Decision Support System
5.1.3 Types of Decision Support System
5.1.4 Data-driven
5.1.5 Model-driven
5.1.6 Knowledge-driven
5.1.7 Communication -driven
5.1.8 Advantages of DSS
5.1.9 Disadvantages of DSS
5.2. Introduction of Group Decision Support System.
5.2.1 What is GDSS ?
5.2.2 Advantages of GDSS :
5.2.3 Disadvantages of GDSS :
5.2.4 Features of Group Decision Support System (GDSS):
5.2.5 Components of Group Decision Support System (GDSS) :
5.3 Knowledge Based Expert System
5.3.1 History of KBS
5.3.2 How does it work?
5.3.3 Components of a KBS
5.3.4 Types of knowledge-based systems
5.3.5 Advantages of KBS
5.3.6 Disadvantages of KBS
5.3.7 Challenges of knowledge-based systems
5.4 Summary
5.5 References for further reading. 63
Management Information
System
5.0 OBJECTIVES:
This chapter will make the readers understand the following concepts:
• History of DSS
• Concept Of KBS
• Components of KBS
As organizations grow, they usually have multiple data sources that store
different kinds of information. The data that is present within various
sources in the organization can provide meaningful insights to the business
users if analysed in a proper way and can assist in making data as a strategic
tool leading to improvement of processes. A decision support system (DSS)
is an information system that aids a business in decision-making activities
that require judgment, determination, and a sequence of actions. The
information system assists the mid- and high-level management of an
organization by analyzing huge volumes of unstructured data and
accumulating information that can help to solve problems and help in
decision-making. A DSS is either human-powered, automated, or a
combination of both. Broadly speaking, a decision support system (DSS) is
an analytics software program used to gather and analyze data to inform
decision making. There are many different types of decision support
systems, from modern business intelligence which uses AI and machine
learning to suggest insights and analyses for humans to perform, to model-
based DSS systems which use predefined criteria to perform automated
calculations and deliver best-case decisions. For all types, DSS is used in
timely problem solving to improve efficiency and streamline operations,
planning and company management.
A decision support system produces detailed information reports by
gathering and analyzing data. Hence, a DSS is different from a normal
operations application, whose goal is to collect data and not analyze it.
In an organization, a DSS is used by the planning departments – such as the
operations department – which collects data and creates a report that can be
used by managers for decision-making. Mainly, a DSS is used in sales
projection, for inventory and operations-related data, and to present
64
64 information to customers in an easy-to-understand manner.
Theoretically, a DSS can be employed in various knowledge domains from Decision Support
System(DSS)
an organization to forest management and the medical field. One of the main
applications of a DSS in an organization is real-time reporting. It can be
very helpful for organizations that take part in just-in-time (JIT) inventory
management.
In a JIT inventory system, the organization requires real-time data of their
inventory levels to place orders “just in time” to prevent delays in
production and cause a negative domino effect. Therefore, a DSS is more
tailored to the individual or organization making the decision than a
traditional system.
5.1.1 A brief history of Decision Support Systems
Decision Support Systems have evolved over the past three decades from
simple model-oriented systems to advanced multi-function entities. During
the 1960’s, most Decision Support Systems were fairly based on powerful
(and expensive) mainframe computers which provided managers with
structured, periodic reports. MIS theory developments during the 1970’s
saw Decision Support Systems evolve into more elaborate computer-based
systems that supported production, promotion, pricing, marketing and some
logistical functions. By early 1980’s Decision Support Systems enjoyed
more interests from academics and the framework for Decision Support
Systems was greatly expanded by the end of the decade. It was only during
the 1990’s that a paradigm shift occurred in Decision Support Systems and
more complex systems, which incorporated, advanced database technology
and client/server capabilities, were emerging from many areas in business
processes. As many organizations started to upgrade their network
infrastructure, object oriented technology and data warehousing started to
make its mark on Decision Support Systems. The rapid expansion of the
Internet provided additional opportunities for the scope of Decision Support
Systems and consequently many new innovative systems such as OLAP and
other web-drive systems were developed.
5.1.2 Components of a Decision Support System
The three main components of a DSS framework are:
1. Model Management System
The model management system S=stores models that managers can
use in their decision-making. The models are used in decision-making
regarding the financial health of the organization and forecasting
demand for a good or service.
2. User Interface
The user interface includes tools that help the end-user of a DSS to
navigate through the system.
3. Knowledge Base
The knowledge base includes information from internal sources
(information collected in a transaction process system) and external
sources (newspapers and online databases).
65
Management Information
System
5.1.4 Data-driven
Data-driven DSS refers to a category or type of Decision Support System
that emphasizes access to and manipulation of a time-series of internal
company data and sometimes external data. Simple file systems accessed
by query and retrieval tools provide the most elementary level of
functionality.
66
66
Decision Support System includes file drawer systems, data analytics Decision Support
System(DSS)
systems, analytical information systems, data storage systems and
emphasizes access and manipulation of large structured data databases.
Examples: chats and instant messaging software’s, online collaboration and
net-meeting systems. Most data-driven DSSs are targeted at managers, staff
and also product/service suppliers. It is used to query a database or data
warehouse to seek specific answers for specific purposes.
5.1.5 Model-driven
Decision Support System model comes from a variety of fields or
specialties and could include accounting models, financial models,
representative models, optimization models, etc. n some decision situations,
quantitative models embedded in a Decision Support System (DSS) can
help managers make better decisions. Model-driven DSS use algebraic,
decision analytic, financial, simulation, and optimization models to provide
decision support. This category of DSS is continuing to evolve, but research
can resolve a variety of behavioral and technical issues that impact system
performance, acceptance and adoption. This article includes a brief survey
of prior research. It focuses on model-driven DSS built using decision
analysis, optimization, and simulation technologies; implementation using
spreadsheet and web technologies; issues associated with the user interface;
and behavioral and technical research questions.
Model-driven DSS can be used to aid decision making in a variety of
situations. It can assist managers in making:
68
68
• Information Overload: A computerized decision making system Decision Support
System(DSS)
may sometimes result in information overload. Since it analyzes all
aspects of a problem, it leaves a user in a dilemma what to consider
and what not to consider. Not each bite of information is necessary in
decision making. But when it’s present, a decision maker finds it
difficult to ignore information that is not a priority.
• Too much Dependence on DSS: It is true that decision support
systems are integrated into businesses to make everyday decisions
faster and more easily. Some decision makers develop a tendency to
depend too much on computerized decision making and don’t want to
apply their own brains. Clearly, there is a shift in focus and decision
makers may not hone their skills further because of excessive
dependence on DSS.
• Devaluation of Subjectivity: A decision support system promotes
rational decision making by suggesting alternatives basis the
objectivity. While bounded rationality or restricted irrationality plays
a critical role in decision making, subjectivity cannot and should not
be rejected. A DSS promotes objectivity and relegates subjectivity,
which can have serious impact on a business.
• Overemphasis on Decision Making: Clearly the focus of
computerized decision making is on considering all aspects of a
problem all the time, which may not be required in many of the
situations. It is essentially important to train the users to ensure
effective and optimal use of DSS.
• Cost of Development: The cost of decision making decreases once a
decision support system is installed. But development and
implementation of a DSS requires a huge monetary investment.
Customization may attract higher cost. If you’re on a tight budget, you
might not get a customized DSS specific to your needs.
70
70
3) Technical Failure : Decision Support
System(DSS)
The system must be properly implemented to reduce the risk
associated with loss of connectivity and power loss. It is
highly dependent on LAN/WAN infrastructure and bandwidth.
4) Keyboarding Skills :
If the members get frustrated they might participate less.
5) Training :
There is variation in the learning curve of the user in various
situations.
6) Perception of Messages :
MIS-interpretations may occur in case the members communicate less
verbally.
5.2.4 Features of Group Decision Support System (GDSS):
1) Ease of Use :
It consists of an interactive interface that makes working with GDSS
simple and easy.
2) Better Decision Making :
It provides the conference room setting and various software tools that
facilitate users at different locations to make decisions as a group
resulting in better decisions.
3) Emphasis on Semi-structured and Unstructured Decisions :
It provides important information that assists middle and higher level
management in making semi-structured and unstructured decisions.
4) Specific and General Support :
The facilitator controls the different phases of the group decision
support system meeting (idea generation, discussion, voting and vote
counting, etc.) what is displayed on the central screen and the type of
ranking and voting that takes place, etc. In addition, the facilitator also
provides general support to the group and helps them to use the
system.
5) Supports all Phases of the Decision Making :
It can support all the four phases of decision making, viz intelligence,
design, choice, and implementation.
6) Supports Positive Group Behaviour :
In a group meeting, as participants can share their ideas more openly
without the fear of being criticized, they display more positive group
behavior towards the subject matter of the meeting.
71
Management Information 5.2.5 Components of Group Decision Support System (GDSS) :
System
A group decision support system (GDSS) is composed of 3 main
components, namely hardware, software tools, and people.
1) Hardware :
It includes electronic hardware like the computer, equipment used for
networking, electronic display boards and audio-visual equipment. It
also includes the conference facility, including the physical set up –
the room, the tables, and the chairs – laid out in such a manner that
they can support group discussion and teamwork.
2) Software Tools :
It includes various tools and techniques, such as electronic
questionnaires, electronic brainstorming tools, idea organizers, tools
for setting priority, policy formation tool, etc. The use of these
software tools in a group meeting helps the group decision-makers to
plan, organize ideas, gather information, establish priorities, take
decisions and document the meeting proceedings. As a result,
meetings become more productive.
3) People :
It compromises the members participating in the meeting, a trained
facilitator who helps with the proceedings of the meeting, and an
expert staff to support the hardware and software. The GDSS
components together provide a favorable environment for carrying
out group meetings.
72
72
Decision Support
System(DSS)
73
Management Information • Real-world problems do not have well-defined solutions • KBS allow
System
this knowledge to be represented and creates an explained solution.
5.4 SUMMARY
76
76
• Decision support systems allow for more informed decision-making, Decision Support
System(DSS)
timely problem-solving, and improved efficiency in dealing with
issues or operations, planning, and even management.
• A group decision support system (GDSS) is an interactive computer-
based system that facilitates a number of decision-makers (working
together in a group) in finding solutions to problems that are
unstructured in nature.
• The tools and techniques provided by the group decision support
system improve the quality and effectiveness of the group meetings.
• A group decision support system (GDSS) meeting comprises different
phases, such as idea generation, discussion, voting, vote counting and
so on.
• A group decision support system (GDSS) is composed of 3 main
components, namely hardware, software tools, and people.
• A knowledge-based system (KBS) is a computer
program that reasons and uses a knowledge base to solve complex
problems.
• A knowledge-based system is a major area of artificial intelligence.
• These systems can make decisions based on the data and information
that resides in their database. In addition, they can comprehend the
context of the data being processed.
• A knowledge-based system is comprised of a knowledge base and an
interface engine.
Web References:
1. https://www.guru99.com/data-mining-vs-datawarehouse.html
2. https://www.tutorialspoint.com/dwh/dwh_overview
3. https://www.geeksforgeeks.org/
4. https://blog.eduonix.com/internet-of-things/web-mining-text-
mining-depth-mining-guide
77
6
ERP, SCM AND CRM
Unit Structure
6.0 Objectives
6.1 Introduction of ERP
6.1.1 Why Do Companies Implement ERP Software?
6.1.2 Benefits of ERP Systems
6.1.3 ERP MODELS
6.1.4 Benefits of ERP modules
6.2 Supply Chain Management (SCM)
6.2.1 Introduction
6.2.2 Why is supply chain management important?
6.2.3 Scope of SCM
6.2.4 SCM Processes
6.2.5 Advantages of SCM
6.2.6 Key features of effective supply chain management
6.2.7 Information Management in SCM
6.3 Customer Relationship Management(CRM)
6.3.1 Understanding Customer Relationship Management (CRM)
6.3.2 Components of CRM
6.3.3 Types of CRM technology
6.3.4 Advantages of Customer Relationship Management
6.4 Summary
6.0 OBJECTIVES:
This chapter will make the readers understand the following concepts:
• Meaning of ERP
• Need of ERP
• ERP models
• Introduction to SCM
• Need of SCM
• Working of SCM
• Information Management in SCM
77
Management Information • Advantages of SCM
System
• Concept of CRM
• Need of CRM
• Implementation of CRM
79
Management Information Employees can also be granted access rights to submit leave and
System
reimbursement requests, view pay checks, record working hours, view
information about other employees, and so on.
To handle procurement
Without the help of an integrated system, companies will have
difficulty managing the purchase of goods and communicating with
suppliers. ERP systems allow companies to automate purchases, control
costs incurred for purchasing goods, and speed up the order management.
To gain comprehensive insights
Generating reports is a time-consuming task. But with an ERP system,
financial, tax
summary, sales reports, etc. can be created in just seconds. ERP systems
allow companies to create accurate and complete reports that can help
stakeholders make better business decisions.
6.1.2 Benefits of ERP Systems
Today’s ERP solutions have rich feature sets that bring countless benefits
to businesses. While what an individual firm sees as the greatest value of
this technology will vary, here are key universal advantages ERP delivers:
1. Cost savings:
Perhaps the biggest value proposition of ERP systems is they can save
your organization money in a number of ways. By automating many
simple, repetitive tasks, you minimize errors and the need to add
employees at the same rate as business growth. Cross-company
visibility makes it easier to spot inefficiencies that drive up costs and
leads to better deployment of all resources, from labor to inventory to
equipment. And with cloud ERP, companies may quickly see
incremental value from the software, over and above what they’re
spending.
2. Workflow visibility:
With all workflows and information in one place, employees with
access to the system can see the status of projects and the performance
of different business functions relevant to their jobs. This visibility
may be particularly valuable to managers and leaders, and it’s far
faster and easier than searching for the right documents and constantly
asking colleagues for updates.
3. Reporting/analytics:
Data is useful only if companies can analyze and understand it, and
an ERP helps with that. Leading solutions have impressive reporting
and analytics tools that allow users to not only track KPIs, but display
any metrics or comparisons they can dream up. Since an ERP is all-
encompassing, it can help a business understand how a change or
problem with a process in one department affects the rest of the
company.
80
80
4. Business insights/intelligence: ERP, SCM And CRM
Because ERPs can access real-time data from across the company,
these systems can uncover impactful trends and provide extensive
business insights. This leads to better decision-making by
organizational leaders who now have easy access to all relevant data.
5. Regulatory compliance & data security:
Financial reporting standards and governmental and industry-specific
data security regulations change frequently, and an ERP can help your
company stay safe and compliant. An ERP provides an audit trail by
tracking the lifecycle of each transaction, including adherence to
required approval workflows. Businesses may also reduce the chance
of errors and related compliance snafus with automation. ERP
software provides financial reports that comply with standards and
regulations, and SaaS applications are well-equipped to help
companies with PCI-DSS compliance.
6. Risk management:
ERP technology reduces risk in a few ways. Granular access control
and defined approval workflows can strengthen financial controls and
reduce fraud. Additionally, more-accurate data heads off mistakes
that could lead to lost sales or fines. And finally, the ability to see the
status of the entire operation enables employees to quickly handle
risks posed by business disruptions.
7. Data security:
ERP providers understand that your system houses critical, sensitive
data and take necessary steps to ensure it is secure. This diligence is
more important than ever as the volume and scale of cyberattacks
increase. Cloud ERP software, in particular, uses cutting-edge
security protocols to ensure your company doesn’t fall victim to a
damaging attack.
8. Collaboration:
Employees are most effective when they work together. ERP
solutions make it easy to share information — like purchase orders,
contracts and customer-support records — among teams. It knocks
down walls between departments by giving employees appropriate
access to real-time data on related business functions.
9. Scalability:
The right ERP system will be scalable and flexible enough to meet
your company’s needs today and for the foreseeable future. Cloud
systems in particular adapt to minor and major operational changes
even as the amount of data the organization captures and demand for
access increase.
81
Management Information 10. Flexibility:
System
While ERP software helps businesses follow best practices, it also
offers the flexibility to support unique processes and objectives. The
system gives administrators the ability to build out company-specific
workflows and create automatic reports important to different
departments and executives. An ERP enhances your organization’s
innovation and creativity.
11. Customization:
While most companies find that modern ERPs support their
businesses “out of the box,” some firms need to add to the extensive
built-in functionality. If you have a lot of specialized processes, look
for an extensible system that allows your integrator or IT staff to write
code that adds needed features, or that can integrate with homegrown
or legacy solutions. However, before going the custom route, take a
close look at your processes — the prebuilt functionality and
configurations modern ERP solutions support are based on best
practices gathered from thousands of companies. Aim to minimize
customizations.
12. Customer & partner management:
An ERP can strengthen a company’s partner and customer
relationships. It can provide insights on suppliers, shipping carriers
and service providers, with the cloud enabling even better, more
convenient information exchange. When it comes to customers, the
solution can track survey responses, support tickets, returns and more
so the organization can keep its finger on the pulse of customer
satisfaction.
82
82
6. 1.3 ERP MODELS ERP, SCM And CRM
• ERP modules help your business attain the desired efficiency and
enhance day-to-day activities by automating all business processes.
• It keeps all the data in a centralized place and gives clear data
whenever you need it.
• It improves business reporting with the help of reporting features with
real-time data.
• It helps to eliminate the manual process and reduces errors done by
the manual errors. Thus, it increases the efficiency and productivity
of the business.
• It provides better communication within the department as well as
between the departments. When there is a smooth flow of
information, cooperation in the workplace also increases.
• It helps the business provide good customer service by enhancing on-
time delivery and order accuracy.
• It allows the business to control who can use, share, and edit the data.
• ERP modules analyze the real-time data.
• Enhances profitability by avoiding extra expenses like an additional
store of inventories.
• It improves the cash flow with better invoicing.
2.1 Introduction
Supply chain management is the handling of the entire production flow of
a good or service — starting from the raw components all the way to
delivering the final product to the consumer. A company creates a network
of suppliers (“links” in the chain) that move the product along from the
suppliers of raw materials to those organizations that deal directly with
users.
85
Management Information How does supply chain management work?
System
According to CIO, there are five components of traditional supply chain
management systems:
Planning
Plan and manage all resources required to meet customer demand for a
company’s product or service. When the supply chain is established,
determine metrics to measure whether the supply chain is efficient,
effective, delivers value to customers and meets company goals.
Sourcing
Choose suppliers to provide the goods and services needed to create the
product. Then, establish processes to monitor and manage supplier
relationships. Key processes include: ordering, receiving, managing
inventory and authorizing supplier payments.
Manufacturing
Organize the activities required to accept raw materials, manufacture the
product, test for quality, package for shipping and schedule for delivery.
Delivery and Logistics
Coordinate customer orders, schedule deliveries, dispatch loads, invoice
customers and receive payments.
Returning
Create a network or process to take back defective, excess or unwanted
products.
6.2.2 Why is supply chain management important?
Effective supply chain management systems minimize cost, waste and time
in the production cycle. The industry standard has become a just-in-time
supply chain where retail sales automatically signal replenishment orders to
manufacturers. Retail shelves can then be restocked almost as quickly as
product is sold. One way to further improve on this process is to analyze the
data from supply chain partners to see where further improvements can be
made.
By analyzing partner data, the CIO.com post identifies three scenarios
where effective supply chain management increases value to the supply
chain cycle:
86
86
• Optimizing price dynamically. Seasonal products have a limited ERP, SCM And CRM
shelf life. At the end of the season, these products are typically
scrapped or sold at deep discounts. Airlines, hotels and others with
perishable “products” typically adjust prices dynamically to meet
demand. By using analytic software, similar forecasting techniques
can improve margins, even for hard goods.
• Demand Management
• Procurement Management
• Returns Management
87
Management Information 6.2.5 Advantages of SCM
System
SCM have multi-dimensional advantages −
• To the suppliers −
▪ Help in giving clear-cut instruction
▪ Online data transfer reduce paper work
• Inventory Economy −
▪ Low cost of handling inventory
▪ Low cost of stock outage by deciding optimum size of
replenishment orders
▪ Achieve excellent logistical performance such as just in time
• Distribution Point −
▪ Satisfied distributor and whole seller ensure that the right
products reach the right place at right time
▪ Clear business processes subject to fewer errors
▪ Easy accounting of stock and cost of stock
● Channel Management −
▪ Reduce total number of transactions required to provide product
assortment
▪ Organization is logically capable of performing customization
requirements
● Financial management −
▪ Low cost
▪ Realistic analysis
● Operational performance −
▪ It involves delivery speed and consistency.
● External customer −
▪ Conformance of product and services to their requirements
▪ Competitive prices
▪ Quality and reliability
▪ Delivery
▪ After sales services
88
88
● To employees and internal customers − ERP, SCM And CRM
A CRM system helps in closing faster deals by facilitating quicker and more
efficient responses to customer leads and information. Customers get more
convinced to turn their inquiries into purchases once they are responded to
promptly. Organizations that have successfully implemented a CRM system
have observed a drastic decrease in turnaround time.
95
Management Information
System
6.4 SUMMARY
• ERP solutions have evolved over the years, and many are now
typically web-based applications that users can access remotely.
QUESTIONS
97
Management Information
System
7
BUSINESS INTELLIGENCE FOR MIS
Unit Structure
7.1 Objectives
7.2 Business Intelligence and MIS
7.3 what is Business Intelligence (BI),
7.4 Tools and Techniques of BI
7.5 why is BI Developed? How is BI used?
7.6 Process of generation of BI
7.7 MIS and BI.
7.8 Self Learning Topics: Case illustration of BI
7.9 Summary
7.10 Sample Questions
7.11 References
7.1 OBJECTIVES
The term 'Business Intelligence' has evolved from the decision support
systems and gained strength with the technology and applications like data
warehouses, Executive Information Systems and Online Analytical
Processing (OLAP).
Business Intelligence System is basically a system used for finding patterns
from existing data from operations.
98
98
The definition of the term ‘Management Information System’ has been Business Intelligence for MIS
varies from person to person. It has more than one definition, some of which
are given below
1) The MIS is defined as a system which provides information to support
decision making process in the organization.
2) The MIS is defined as a system based on the database of the
organization evolved for the purpose of providing information to the
people in the organization.
3) According to Coleman and Riley ‘an MIS (a) applies to all
management levels; (b) is linked to an organizational subsystem; (c)
Functions to measure performance, monitor progress, evaluate
alternatives or provides knowledge for change or collective action,
and (d) is flexible both internally and externally’.
4) According to Schwartz, ‘MIS is a system of people, equipment
procedures, documents and communication that collects, validates,
operates, stores, retrieves, and present data for use in planning ,
budgeting , accounting, controlling and other management process’.
5) Thomas R. Prince defined MIS as ‘an approach that visualizes the
business organization a single entity composed of various inter-
related and inter – dependent sub systems looking together to provide
timely and accurately information for management decision making,
which leads to the optimization of overall enterprise goals’.
6) Frederick B. Cornish defined MIS as ‘structure to provide the
information needed when needed and where needed. Further, the
system represents the internal communication network of the business
providing the necessary intelligence to plan, execute and control.
Before business intelligence took over, many enterprises had another
information system called the MIS. Management Information Systems were
the heart of every business and played a vital role in data collecting, storage,
processing, and reporting. However, MIS had its disadvantages and became
a burden for many businesses.
With business intelligence entering the market, enterprises adopted BI, not
to replace MIS but to revamp their entire internal system. MIS is a small
part of the business intelligence framework and is no longer enough in the
competitive world to help establishments make the right decisions. Though
management information systems are still used by enterprises, many have
digitally transformed the systems and processes to get the best of business
intelligence. BI helps enterprises reduce their costs and increase returns by
enhancing customer experience and taking the businesses deeper into the
market.
Business intelligence (BI) tools are types of application software that collect
and process large amounts of unstructured data from internal and external
systems, including books, journals, documents, health records, images,
files, email, video, and other business sources.
Typically used for more straightforward querying and reporting of business
data, business intelligence tools can combine a broad set of data analysis
applications including ad hoc analysis and querying, enterprise reporting,
online analytical processing (OLAP), mobile BI, real-time BI, operational
BI, cloud and software as a service BI, open-source BI, collaborative BI,
and location intelligence. It can also include data visualization software for
designing charts, as well as tools for building BI dashboards and
performance scorecards that display business metrics and KPIs to bring
company data to life in easy-to-understand visuals.
Tableau
Tableau is one of the most popular and simple Microsoft BI tools used in
organizations today. A much sought-after platform of BI, Tableau is among
the top in the best BI tools list. This integrated tool allows even non-
technical users to easily build personalized reports and dashboards to gain
valuable information. Further, it offers a varied range of graphical
representations that are extremely interactive and pleasing. This tool mainly
serves two functions, the collection of data and data analysis. It gathers data
from various sources such as spreadsheets and cloud applications. This
Business Intelligence software is used in numerous industries and business
100
100
sectors, including banking, manufacturing, education, sales, Business Intelligence for MIS
telecommunication, and more.
Features of Tableau:
• You can share dashboards and tools to perform group analysis on any
given dataset.
• You have the option to choose between two versions, the 32-bit
version and the 64-bit version.
• You can deploy the tool either on a local server or on the cloud server.
Datapine
Datapine is another commonly used BI software that is easy-to-use yet
powerful. This tool allows both professionals like Data Analysts and non-
technical professionals to analyze, explore, and visualize data from several
data sources. Additionally, it helps you collect the data from these sources
and analyze it using advanced analytical and predictive features.
Features of Datapine:
• It consists of easy and fast data connectors that integrate the necessary
data sources in a matter of a few seconds.
• You can use its unique drag-and-drop feature to create appealing data
visualizations in a few clicks, providing a user-friendly interface.
• Since data is centralized here, the time taken for data processing is
lesser.
• You can use this tool to work on all sizes of datasets with no
complications.
• This tool also consists of the ETL facility, report and query writer,
data warehouses, and customized dashboards.
Yellowfin BI
Yellowfin BI, one of the best BI tools, is used as an end-to-end analytics
platform, combining Machine Learning and data visualization. You can
filter tons of data via intuitive filtering features such as radio buttons and
checkboxes. Besides, its mobile accessibility feature and flexibility allow
you to use, monitor and understand the dashboard from anywhere.
Features of Yellowfin BI:
• You can easily access the dashboard from anywhere including the
Wiki, the company intranet, mobile devices, or the website.
• Features like mapping mobile BI assist you to access and monitor the
organizational data.
• It allows you to make smarter and faster collective decisions.
• It offers interactive reports and data-rich presentations that can make
your insights more effective and presentable.
Power BI
Microsoft Power BI is one of the widely-used open-source BI tools that
provide an environment for the analysis, integration, and visualization of
data. This tool is efficient and effective in assisting organizations to make
informed business decisions.
Features of Power BI:
• Its Power Query feature allows you to load data automatically even
from extremely old databases for the report making.
102
102 • You can also use this software to share reports for free.
QlikView Business Intelligence for MIS
103
Management Information Reporting
System
Reporting in business intelligence represents the whole process of
designing, scheduling, generating the performance, sales, reconciliation,
and saving the content. It helps companies to effectively gather and present
information to stand by the management, planning, and decision-making
process. Business leaders get to view the reports at daily, weekly, or
monthly intervals as per their needs.
Analytics
Analytics in Business Intelligence defines the study of data to extract
effective decisions and figure out the trends. Analytics is famous among
business companies as it lets analysts and business leaders deeply
understand the data they have and drive value from it. Many business
perspectives, from marketing to call centers to use analytics in different
forms. For example, call centers leverage speech analytics to monitor
customer sentiments and improve the way answers are presented.
Multi-Cloud
Following the outbreak of the pandemic and the lockdown that came to
effect, companies across the globe started moving their routine working into
cloud modes. The rise of cloud technology has greatly impacted many
businesses. However, even after the restrictions are lifted, companies still
prefer to work over the cloud because of its lenient accessibility and easy-
to-use attributes. Moving a step forward, even Research & Development
initiatives are being moved to the cloud, thanks to its cost-saving and easy-
to-use nature.
ETL
Extraction-Transaction-Loading (ETL) is a unique business intelligence
technique that takes care of the overall data processing routine. It extracts
data from storage, transforms it into the processor, and loads it into the
business intelligence system. They are mainly used as a transaction tool that
transforms data from various sources to data warehouses. ETL also
moderates the data to address the need of the company. It improves the
quality level by loading it into the end targets such as databases or data
warehouses.
Statistical Analysis
Statistical analysis uses mathematical techniques to create the significance
and reliability of observed relations. It also grasps the change of behavior
in people that are visible in data with its distribution analysis and confidence
intervals. Post data mining, analysts carry out statistical analysis to devise
and get effective answers.
107
Management Information
System
7.7 MIS AND BI.
• Scheduling automated refresh: set alerts and rules to view the latest
data and receive reports securely from systems.
108
108
7.8 SELF LEARNING TOPICS: CASE ILLUSTRATION Business Intelligence for MIS
OF BI
7.9 SUMMARY
109
Management Information
System
7.11 REFERENCES
110
110
8
MANAGING INFORMATION SYSTEMS
AND INFORMATION TECHNOLOGY
INFRASTRUCTURE
Unit Structure
8.1 Objectives
8.2 Introduction
8.3 Managing Information System
8.3.1 Challenges of Managing the IT Function
8.3.2 Vendor Management
8.3.3 IT Governance
8.4 Information Technology Infrastructure and Choices.
8.4.1 What is the IT Infrastructure?
8.4.2 IT Infrastructure Decisions
8.4.3 Infrastructure Components
8.4.4 Networks
8.5 Self Learning Topics: Case Study of Managing Information System
8.6 Summary
8.7 Practice Questions
8.8 References
8.1 OBJECTIVES
8.2 INTRODUCTION
114
114
• Vendor onboarding. This will involve gathering the documentation Managing Information
Systems and Information
and information needed to set the vendor up as an approved supplier Technology Infrastructure
to the company and ensure that the vendor can be paid for the goods
or services they provide. As well as essential contact and payment
information, the onboarding process may also include information
such as relevant licenses held by the vendor, as well as tax forms and
insurance details.
• Payment. Ensuring vendors are paid on time for the goods and
services they provide, in line with the agreed terms.
8.3.3 IT Governance
IT governance is the alignment of leadership, organizational structures, and
processes to actualize and sustain the organizational objectives through the
use of IT.
The need for IT governance is felt because the interests of the organization
and those managing the IT systems can be at odds or in other words, there
is a conflict between these two imperatives. Thus, IT governance is needed
to ensure that the IT systems are doing their assigned duty and that the
objectives of the CEO and the CIO are the same. Indeed, it can be said that
IT governance includes all the key stakeholders in the organization starting
with the executive management and the boards and including the staff,
customers, and other stake holders. It also needs to be mentioned that
corporate governance and IT governance must not be viewed in isolation
but must act and move in tandem. IT governance is a subset of corporate
governance and that both must be framed in a mutually dependent manner.
the objectives of IT governance can be summed up as assuring the creation
of value through the use of IT; oversight of the management’s performance;
mitigation of the risks associated with the use of IT; and a general tendency
to have oversight over the IT systems so that there is alignment between the
organizational goals and the goals of the IT systems. The key reasons why
organizations use the IT frameworks are to ensure that they use the IT
systems in an efficient and effective manner. Further, risk mitigation and
performance management are key business imperatives, which the
organization must follow so that there are no surprises for its operations and
that the business objectives are being met.
115
Management Information
System
8.4 INFORMATION TECHNOLOGY
INFRASTRUCTURE AND CHOICES:
• Desktop computers
• Servers
• Data centers
• Hubs
• Routers
• Switches
• Facilities
Software
Software components can include:
● Web servers
Facilities
Facilities or physical plants provide space for networking hardware, servers
and data centers. It also includes the network cabling in office buildings to
connect components of an IT infrastructure together.
Network
Networks are comprised of switches, routers, hubs and servers. Switches
connect network devices on local area networks (LAN) like routers, servers
and other switches. Routers allow devices on different LANs to
communicate and move packets between networks. Hubs connect multiple
networking devices to act as a single component.
Server
A core hardware component needed for an enterprise IT infrastructure is a
server. Servers are essentially computers that allow multiple users to access
and share resources.
Server room/data center
Organizations house multiple servers in rooms called server rooms or data
centers. Data centers are the core of most networks.
8.4.4 Networks
A computer network is a communications system connecting two or more
computers that work to exchange information and share resources
(hardware, software and data). A network may consist of microcomputers,
or it may integrate microcomputers or other devices with larger
computers. Networks may be controlled by all nodes working together
equally or by specialized nodes coordinating and supplying all
resources. Networks may be simple or complex, self-contained or
dispersed over a large geographical area.
Network architecture is a description of how a computer is set-up
(configured) and what strategies are used in the design. The
interconnection of PCs over a network is becoming more important
especially as more hardware is accessed remotely and PCs
intercommunicate with each other.
Different communication channels allow different types of networks to be
formed. Telephone lines may connect communications equipment within
the same building. Coaxial cable or fiber-optic cable can be installed on
building walls to form communication networks. You can also create your
own network in your home or apartment. Communication networks also
differ in geographical size.
Three important networks according to geographical size are LANs, MANs
and WANs.
119
Management Information Local Area Network (LAN)
System
A LAN allows all users to share hardware, software and data on the
network.
Minicomputers, mainframes or optical disk storage devices can be
added to the network.
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
A MAN is a computer network that may be citywide. This type of network
may be used as a link between office buildings in a city. The use of cellular
phone systems expand the flexibility of a MAN network by linking car
phones and portable phones to the network.
Wide Area Networks (WAN)
Wide Area Networks (WAN)
A WAN is a computer network that may be countrywide or worldwide. It
normally connects networks over a large physical area, such as in different
buildings, towns or even countries. A modem connects a LAN to a WAN
when the WAN connection is an analogue line.
For a digital connection a gateway connects one type of LAN to another
LAN, or WAN, and a bridge connects a LAN to similar types of LAN. This
type of network typically uses microwave relays and satellites to reach users
over long distances. The widest of all WANs is the Internet, which spans
the entire globe.
Network protocols
Protocols are the set of conventions or rules for interaction at all levels of
data transfer. They
have three main components:
120
120
Internet Managing Information
Systems and Information
Technology Infrastructure
The Internet is a giant worldwide network. The Internet started in 1969
when the United States government funded a major research project on
computer networking called ARPANET (Advanced Research Project
Agency NETwork). When on the Internet you move through
cyberspace.
Cyberspace is the space of electronic movement of ideas and information.
The web provides a multimedia interface to resources available on the
Internet. It is also known as WWW or World Wide Web. The web was
first introduced in 1992 at CERN (Centre for European Nuclear Research)
in Switzerland. Prior to the web, the Internet was all text with no graphics,
animations, sound or video.
8.6 SUMMARY
8.8 REFERENCES
122
122
9
INFORMATION SECURITY AND
THREATS
Unit Structure
9.0 Objectives
9.1 Information Security
9.1.1 Introduction
9.1.2 Principles of Information Security
9.1.3 Information Security vs Cyber Security
9.2 Threats and Vulnerability
9.2.1 Introduction
9.2.2 Information Security Concerns
9.3 Controlling Security Threat and Vulnerability
9.4 Managing Security Threat in E-Business
9.5 Measures of Information Security
9.6 Information Security Management
9.0 OBJECTIVES
9.1 INTRODUCTION
124
124
• Security professional priorities: Cybersecurity professionals are Information Security
and Threats
most concerned with preventing active threats, such as hacking
attempts and viruses. On the other hand, infosec professionals have a
broader remit, including policies, procedures, and organizational roles
and responsibilities to ensure confidentiality, integrity, and
availability.
Introduction
The word ‘threat’ and ‘vulnerability’ are often used interchangeably
but they are not the same. A threat is a person or event that has the potential
for impacting a valuable resource adversely. A vulnerability is that quality
of a resource or its environment that allows the threat to be realized. An
armed bank robber is an example of a threat. A bank teller is an example of
a valuable resource that may be vulnerable during a bank robbery. Bullet-
proof glass between the robber and the teller denies the robber the
opportunity to shoot the teller. The threat remains present, but one of its
harmful effects (a gun shot) has been mitigated by a protection mechanism
(the glass).
A vulnerability refers to a known as a loophole of an asset (resource) that
can be exploited by one or more attackers. In other words, it is a known
issue that allows an attack to succeed.
For example, when a team member resigns and you forget to disable their
access to external accounts, change logins, or remove their names from
company credit cards, this leaves your business open to both intentional and
unintentional threats. However, most vulnerabilities are exploited by
automated attackers and not a human typing on the other side of the
network.
Information Security threats can be many like Software attacks, theft of
intellectual property, identity theft, theft of equipment or information,
sabotage, and information extortion.
Threat can be anything that can take advantage of a vulnerability to breach
security and negatively alter, erase, harm object or objects of interest.
125
Management Information Software attacks means attack by Viruses, Worms, Trojan Horses etc.
System
Many users believe that malware, virus, worms, bots are all same things.
But they are not same, only similarity is that they all are malicious software
that behaves differently.
Malware is a combination of 2 terms- Malicious and Software. So,
Malware basically means malicious software that can be an intrusive
program code or anything that is designed to perform malicious operations
on system. Malware can be divided in 2 categories:
1. Infection Methods
2. Malware Actions
Malware on the basis of Infection Method is classified into following:
1. Virus – They have the ability to replicate themselves by hooking
them to the program on the host computer like songs, videos etc and
then they travel all over the Internet. The Creeper Virus was first
detected on ARPANET. Examples include File Virus, Macro Virus,
Boot Sector Virus, Stealth Virus etc.
2. Worms – Worms are also self-replicating in nature, but they don’t
hook themselves to the program on host computer. Biggest difference
between virus and worms is that worms are network aware. They can
easily travel from one computer to another if network is available and
on the target machine, they will not do much harm, they will, for
example, consume hard disk space thus slowing down the computer.
3. Trojan – The Concept of Trojan is completely different from the
viruses and worms. The name Trojan is derived from the ‘Trojan
Horse’ tale in Greek mythology, which explains how the Greeks were
able to enter the fortified city of Troy by hiding their soldiers in a big
wooden horse given to the Trojans as a gift. The Trojans were very
fond of horses and trusted the gift blindly. In the night, the soldiers
emerged and attacked the city from the inside.
Their purpose is to conceal themselves inside the software that seem
legitimate and when that software is executed, they will do their task
of either stealing information or any other purpose for which they are
designed. They often provide backdoor gateway for malicious
programs or malevolent users to enter your system and steal your
valuable data without your knowledge and permission. Examples
include FTP Trojans, Proxy Trojans, Remote Access Trojans etc.
Bots –: can be seen as advanced form of worms. They are automated
processes that are designed to interact over the internet without the
need for human interaction. They can be good or bad. Malicious bot
can infect one host and after infecting creates connection to the central
server which will provide commands to all infected hosts attached to
126
126 that network called Botnet.
Malware classified on the basis of Actions: Information Security
and Threats
• Theft of intellectual property means violation of intellectual
property rights like copyrights, patents etc.
• Identity theft means to act someone else to obtain person’s personal
information or to access vital information they have like accessing the
computer or social media account of a person by login into the account
by using their login credentials.
• Fire
• Flood
• Tsunami
• Earthquake
• Volcanic Eruptions
• Lightning
• Severe Weather
• Smoke
• Dust
• Insects
• Rodents
• Chemical Fumes
• Sprinkler Activation
• Water Leakage - pipe breakage, hole in roof, condensation 127
Management Information • Explosion - nearby gas line, chemical plant, tank farm, munitions
System
depot
• Vibration - nearby railroad track, jet traffic, construction site
• Electromagnetic Interference - suggested by poor radio reception or
jittery workstation displays
• Electrostatic Discharge - suggested by "sparking" to grounded objects
Physical concerns include undesirable site-specific personnel actions,
either intentional or unintentional, such as theft, vandalism and trip
hazards.
Example of Physical (undesirable site-specific personnel actions)
• Theft
• Vandalism
• Sabotage
• Extortion
• Object Reuse - a system providing the user with a storage object (e.g.
memory or disk space) that contains useful information belonging to
another user
Worms. Worms are programs that can self-replicate and spread through a
variety of means, such as emails. Once on a system, the worm will search
for some form of contacts database or file sharing system and send itself out
as an attachment. When in email form, the attachment is part of an email
that looks like it’s from the person whose computer was compromised.
Denial of service (DOS) attack occurs when hackers deluge a website with
traffic, making it impossible to access its content. A distributed denial of
service (DDOS) attack is more forceful and aggressive since it is initiated
from several servers simultaneously. As a result, a DDOS attack is harder
to mount defenses against it.
SQL injections are network threats that involve using malicious code to
infiltrate cyber vulnerabilities in data systems. As a result, data can be
stolen, changed, or destroyed.
Man-in-the-middle attacks involve a third party intercepting and
exploiting communications between two entities that should remain private.
Eavesdropping occurs, but information can be changed or misrepresented
by the intruder, causing inaccuracy and even security breaches.
Lack of Encryption
Encryption processes encode data so that it can only be decoded by users
with secret keys. It is very effective in preventing data loss or corruption in
case of equipment loss or theft, or in case organizational systems are
compromised by attackers. Unfortunately, this measure is often overlooked
133
Management Information due to its complexity and lack of legal obligations associated with proper
System
implementation.
Security Misconfiguration
Modern organizations use a huge number of technological platforms and
tools, in particular web applications, databases, and Software as a Service
(SaaS) applications, or Infrastructure as a Service (IaaS) from providers like
Amazon Web Services.Enterprise grade platforms and cloud services have
security features, but these must be configured by the organization. Security
misconfiguration due to negligence or human error can result in a security
breach. Another problem is “configuration drift”, where correct security
configuration can quickly become out of date and make a system
vulnerable.
Hidden Backdoor Programs
This is an example of an intentionally created computer security
vulnerability. When a manufacturer of computer components, software, or
whole computers installs a program or bit of code designed to allow a
computer to be remotely accessed (typically for diagnostic, configuration,
or technical support purposes), that access program is called a backdoor.
Superuser or Admin Account Privileges
One of the most basic tenets of managing software vulnerabilities is to limit
the access privileges of software users. The less information/resources a
user can access, the less damage that user account can do if compromised.
However, many organizations fail to control user account access
privileges—allowing virtually every user in the network to have so-called
“Superuser” or administrator-level access. Some computer security
configurations are flawed enough to allow unprivileged users to create
admin-level user accounts.
Automated Running of Scripts without Malware/Virus Checks
One common network security vulnerability that some attackers learned to
exploit is the use of certain web browsers’ (such as Safari) tendencies to
automatically run “trusted” or “safe” scripts. By mimicking a trusted piece
of code and tricking the browser, cybercriminals could get the browser
software to run malware without the knowledge or input of the user—who
often wouldn’t know to disable this “feature.”
Unknown Security Bugs in Software or Programming Interfaces
Computer software is incredibly complicated. When two or more programs
are made to interface with one another, the complexity can only increase.
The issue with this is that within a single piece of software, there may be
programming issues and conflicts that can create security vulnerabilities.
When two programs are interfaced, the risk of conflicts that create software
vulnerabilities rises. Programming bugs and unanticipated code interactions
rank among the most common computer security vulnerabilities—and
cybercriminals work daily to discover and abuse them.
134
134
IoT Devices Information Security
and Threats
The Internet of Things (IoT) encompasses many “smart” devices, such as
Wi-Fi capable refrigerators, printers, manufacturing robots, coffee makers,
and countless other machines. The issue with these devices is that they can
be hijacked by attackers to form slaved networks of compromised devices
to carry out further attacks.
Employees within the organisation
The biggest security vulnerability in any organization is its own employees.
Whether it’s the result of intentional malfeasance or an accident, most data
breaches can be traced back to a person within the organization that was
breached.For example, employees may abuse their access privileges for
personal gain. Or, an employee may click on the wrong link in an email,
download the wrong file from an online site, or give the wrong person their
user account credentials—allowing attackers easy access to your systems.
Some of the same prevention techniques mentioned in the anti-phishing
bullets can be applied to prevent data breaches caused by employees.
Password Attacks
With the right password, a cyber attacker has access to a wealth of
information. Social engineering is a type of password attack that Data
Insider defines as “a strategy cyber attackers use that relies heavily on
human interaction and often involves tricking people into breaking standard
security practices.” Other types of password attacks include accessing a
password database or outright guessing.
The Explosion of Data
Data storage on devices such as laptops and cell phones makes it easier for
cyber attackers to find an entry point into a network through a personal
device. For example, in the May 2019 book Exploding Data: Reclaiming
Our Cyber Security in the Digital Age, former U.S. Secretary of Homeland
Security Michael Chertoff warns of a pervasive exposure of individuals’
personal information, which has become increasingly vulnerable to cyber-
attacks.
Common Network Vulnerabilities
Some of the most common network vulnerabilities include the
following gaps in your application security: when applications are not
kept up-to-date, tested, and patched, the doors are open to code injection,
cross-site scripting, insecure direct object references, and much more.
Security attacks can also be classified into
● Active attack
● Passive attack
135
Management Information Active Attack
System
An active attack involves intercepting a communication or message and
altering it for malicious effect. There are three common variants of an active
attacks:
Introduction
Through widespread adoption of computer resources in everyday life,
the nature of business has changed. That is, traditional documents and
communication methods in business have been replaced by electronic data
and more efficient communication. From the combination of traditional
businesses and computer technology, various issues have become apparent.
Positive effects include the decreasing use of limited natural resources (such
as paper), efficient and cost-effective methods of communication, and fast
accurate calculations in financial reports. Negative effects are more related
to internet usage: the Internet is an open environment from which everyone
may benefit; in particular, attackers may use this opportunity to gain access
to sensitive data and sabotage infrastructure. Companies may be potential
targets for attackers because of secret or useful data which exists within
their systems. For instance, a database of an online shopping website
includes usernames, passwords, card numbers and transactions which are
suitable targets for cybercriminals and so possible theft of wealth and
identity. The dynamic nature of risks to ebusiness environments makes
identification of threats and vulnerabilities more difficult. Although the
purpose of every kind of cyberattack is not the theft of money, sabotage is
another threat and this causes possible loss of reputation and money for the
target. Threats are divided into the classes of ‘external’ and ‘internal’, and
are defined thus: External threats: those threats located outside of
companies, such as hacker groups and organised cybercriminals. Internal
threats: those types of threats which should be dealt from inside of
companies. Former employees and current employees might also be a
potential enemy or vulnerability for an e-business. Former employees can
act as an insider to reveal sensitive information about the company, such as
open ports in the network or other vulnerabilities. In addition, current 139
Management Information employees are not always trustworthy: such employees may be lured by
System
social engineering techniques or phishing emails requesting sensitive
information.
Popularity of E-Commerce has brought threat to it. E-commerce
refers to all the commercial transactions- buying and selling of goods
online. Many innovations such as mobile business, internet marketing,
online transaction processing, the transfers of electronic funds, electronic
data interchange (EDI), stock management, chain supply administration
systems and automated data collection systems can be implemented for the
purpose of e-commerce.
The danger of e-commerce comes from using the internet for unfair
purposes in order to steal money and the infringement of protection. E-
commerce risks of different kinds occur. Many of them are accidental, some
of them attributable to human errors. Electronic payments, e-cash, data
misuse, credit/debit card fraud, etc., are the most common security threats.
Below are the list of threats in E-business:-
1. Financial frauds
Ever since the first online businesses entered the world of the internet,
financial fraudsters have been giving businesses a headache. There
are various kinds of financial frauds prevalent in the e-commerce
industry, but we are going to discuss the two most common of them.
a. Credit Card Fraud
It happens when a cybercriminal uses stolen credit card data to
buy products on your e-commerce store. Usually, in such cases,
the shipping and billing addresses vary. You can detect and curb
such activities on your store by installing an AVS – Address
Verification System.
Another form of credit card fraud is when the fraudster steals
your personal details and identity to enable them to get a new
credit card.
b. Fake Return & Refund Fraud
The bad players perform unauthorized transactions and clear the
trail, causing businesses great losses. Some hackers also engage
in refund frauds, where they file fake requests for returns.
2. Phishing
Several e-commerce shops have received reports of their customers
receiving messages or emails from hackers masquerading to be the
legitimate store owners. Such fraudsters present fake copies of your
website pages or another reputable website to trick the users into
believing them. For example, see this image below. A seemingly
harmless and authentic email from PayPal asking to provide details.
140
140
3. Spamming Information Security
and Threats
Some bad players can send infected links via email or social media
inboxes. They can also leave these links in their comments or
messages on blog posts and contact forms. Once you click on such
links, they will direct you to their spam websites, where you may end
up being a victim.
4. DoS & DDoS Attacks
Making the website unavailable through DDOS attack is very
common in e-commerce.Many e-commerce websites have incurred
losses due to disruptions in their website and overall sales because
of DDoS (Distributed Denial of Service) attacks. What happens is that
your servers receive a deluge of requests from many untraceable IP
addresses causing it to crash and making unavailable to your store
visitors.
5. Malware
Hackers may design a malicious software and install on your IT and
computer systems without your knowledge. These malicious
programs include spyware, viruses, trojan, and ransomware.
The systems of your customers, admins, and other users might have
Trojan Horses downloaded on them. These programs can easily swipe
any sensitive data that might be present on the infected systems and
may also infect your website.
6. Exploitation of Known Vulnerabilities
Attackers are on the lookout for certain vulnerabilities that might be
existing in your e-commerce store.Often an e-commerce store is
vulnerable to SQL injection (SQLi) and Cross-site Scripting (XSS).
Some of these vulnerabilities include:
a. SQL Injection
It is a malicious technique where a hacker attacks your query
submission forms to be able to access your backend database.
They corrupt your database with an infectious code, collect
data, and later wipe out the trail.
b. Cross-Site Scripting (XSS)
The attackers can plant a malicious JavaScript snippet on your
e-commerce store to target your online visitors and customers.
Such codes can access your customers’ cookies and compute.
You can implement the Content Security Policy (CSP) to
prevent such attacks.
7. Bots
Some attackers develop special bots that can scrape your website to
get information about inventory and prices. Such hackers, usually
your competitors, can then use the data to lower or modify the prices
in their websites in an attempt to lower your sales and revenue. 141
Management Information 8. Brute force
System
The online environment also has players who can use brute force to
attack your admin panel and crack your password. These fraudulent
programs connect to your website and try out thousands of
combinations in an attempt to obtain you site’s passwords. Always
ensure to use strong, complex passwords that are hard to guess.
Additionally, always change your passwords frequently.
9. Man in The Middle (MITM)
A hacker may listen in on the communication taking place between
your e-commerce store and a user. Walgreens Pharmacy
Store experienced such an incident. If the user is connected to a
vulnerable Wi-Fi or network, such attackers can take advantage of
that.
10. E-Skimming
E-skimming involves infecting a website’s checkout pages with
malicious software. The intention is to steal the clients’ personal and
payment details. The method is to connect an ATM card reader with
a data skimming tool. The information is copied from the magnetic
strip to the computer when the customer swipes his card in the ATM
card reader. The specifics of the card number, name, number, CVV,
expiry of the card, and other information are therefore made available
to offenders.
11. The Risk of Payment Conflicts
An automated computer machine handles payments in electronic
payment systems, not by individuals. When it manages large sums of
payments regularly with many clients, the program is vulnerable to
errors. When each pay period ends, it is important to review our
payroll to ensure everything is meaningful regularly. When this is not
accomplished, payment disputes may result in technological
breakdowns and anomalies.
12. The Risk of Tax Evasion
Internal Revenue Service legislation requires every corporation to
disclose its financial transactions and to provide documents to ensure
tax compliance. Electronic systems are troublesome because they
don’t offer this paradigm clean. This is quite difficult for the Internal
Revenue Service to raise revenue. Payments obtained or made via
electronic payment systems are available to the company. The IRS
does not know whether or not it tells the truth that tax evasion is easy.
13. Eavesdropping
This is an illegal way to listen to private network contact. It does not
interfere with the normal operations of the targeting program so that
142
142
the sender and the receiver do not know that their communication is Information Security
and Threats
being monitored.
14. Spam
Where emails are known as a strong medium for higher sales, it also
remains one of the highly used mediums for spamming. Nonetheless,
comments on your blog or contact forms are also an open invitation
for online spammers where they leave infected links to harm you.
They often send them via social media inbox and wait for you to click
on such messages. Moreover, spamming not only affects your
website’s security, but it also damages your website speed too.
15. Virus, Worms and Trojan Horses are the other risk in E-Commerce.
E-BUSINESS SECURITY SOLUTIONS
E-commerce security solutions that can ease your life includes the
following: -
1. HTTPS and SSL certificates
HTTPS protocols not only keep your users’ sensitive data secure but
also boost your website rankings on Google search page. They do so
by securing data transfer between the servers and the users’ devices.
Therefore, they prevent any interception.
2. Anti-malware and Anti-virus software
An Anti-Malware is a software program that detects, removes, and
prevents infectious software (malware) from infecting the computer
and IT systems. Since malware is the umbrella term for all kinds of
infections including worms, viruses, Trojans, etc getting an efficient
Anti-Malware would protect your system from all.
3. Securing the Admin Panel and Server
Always use complex passwords that are difficult to figure out and
make it a habit of changing them frequently. It is also good to restrict
user access and define user roles. Every user should perform only up
to their roles on the admin panel. Furthermore, make the panel to send
you notifications whenever a foreign IP tries to access it.
4. Securing Payment Gateway
Avoid storing the credit card information of your clients on your
database. Instead, let a third party such as PayPal and Stripe handle
the payment transactions away from your website. This ensures better
safety for your customers’ personal and financial data.
5. Deploying Firewall
Effective firewalls keep away fishy networks, XSS, SQL injection,
and other cyber-attacks that are continuing to hit headlines. They also
143
Management Information help in regulating traffic to and from your online store, to ensure
System
passage of only trusted traffic.
6. Educating Your Staff and Clients
Ensure your employees and customers get the latest knowledge
concerning handling user data and how to engage with your website
securely. Provide them with restricted access to system.
7. Additional security implementations
145
Management Information 16. Keep an Eye out for Malicious Activity
System
To be alert is very important. One should keep an eye on the
suspicious activity. This can save you a lot of trouble – not to mention
revenue – since you can potentially catch a fraudulent transaction
before it can take place. You can utilize special monitoring software
that tracks the activity in real time and notifies you of any
questionable transaction. For instance, a scammer using different
cards to place multiple orders, or orders where the person using the
card isn’t its holder.
17. Perform a security audit
The way we do a routine health check-up, a regular examination of
the website is similarly very important. Companies should prioritize
going through their security protocols on a weekly or monthly basis.
This will allow them to identify any fault in the hosting before it’s too
late.
Additional e-commerce security measures
● Tell your clients to use resources that are familiar to them, click
on saved links, use the official internet banking app and check
out where they get their messages from.
● Make scanning your website from malware your constant
routine.
● Increase your data protection by using multi-layer security and
backing up your data.
● Use efficient plugins for e-commerce security and update your
systems often.
146
146
ways through which information can be kept away from being misused
9.5 MEASURES OF INFORMATION SECURITY Information Security
and Threats
Firewalls
A firewall is a network security tool that is designed to monitors incoming
and outgoing network traffic. Moreover, it’s a like a gate between you and
the internet. As a result, you can create a secure defence from an untrusted
external network.
Data Encryption
Through encryption software, you can encrypt or decrypt data stream during
transmission and storage. Moreover, it allows the encryption of the content
of a data object, file, and network packet or application. Furthermore, there
are different varieties of encryption methods such as:
• AES
• SHA 1
• MD5
Use Strong Passwords
Use of strong passwords is recommended.
Use Antivirus Software
Antivirus software is an essential program. It helps protect the following
areas:
• computing devices
• data files
147
Management Information Secure Your Computer
System
Computer security protects you from theft, hackers, and unauthorized
access.
To update operating system and security patches
Cybersecurity experts recommend updating your operating system
regularly. When installing the latest security patches and drivers, enables
you to secure your data. Moreover, it will guarantee that your computer is
up-to-date and liberated from viruses and other cyber threats.
Digital Signature
A digital signature serves as a validation method for incoming messages
and documents. This helps you to authenticate the contents of electronic
documents. Thus, ensuring data security.
Moreover, it utilizes encryption techniques and promises that the contents
of a message have not been modified in transit.
Educate Your Employees
This is another key type of security measure. Because of this, you will
spread awareness to every employee within the organization. So, you should
conduct an awareness workshop and training program on data security.
Careful Use of Email and Website
One thing about data security relates to confirmation. Yes, you need to
confirm things first. For example, if you think your incoming email is
suspicious then don’t click on that email. Moreover, the email can also
contain a link in some cases. If so, you might be directed to another
vulnerable website. Keep an eye on such suspicious events. Like we should
no sign any document without reading similarly we should not confirm
anything without reading and understanding.
149
Management Information controls are put in place to ensure the confidentiality, integrity and
System
availability of protected information.
Confidentiality – It is about preserving the confidentiality/privacy of
information means ensuring that only authorized persons can access or
modify the data. Information security management teams may classify or
categorize data based on the perceived risk and anticipated impact that
would result of the data was compromised. Additional privacy controls can
be implemented for higher-risk data.
Company
The Act What it Regulates
Affected
This framework
was created to
provide a
customizable guide
This is a
on how to manage
voluntary
and reduce
framework
NIST cybersecurity
that can be
(National related risk by
implemented
Institute of combining existing
by any
Standards and standards,
organization
Technology) guidelines, and best
that wants to
practices. It also
reduce their
helps foster
overall risk.
communication
between internal
and external
stakeholders by
151
Management Information
System
creating a common
risk language
between different
industries.
Companies
CIS Controls Protect your that are
(Center for organization assets looking to
Internet and data from strengthen
Security known cyber-attack security in the
Controls) vectors. internet of
things (IoT).
These
This family of
regulations
standards provide
are broad and
security
can fit a wide
ISO 27000 requirements
range of
Family (Interna around the
businesses.
tional maintenance of
All businesses
Organization information
can use this
for security
family of
Standardization management
regulations for
) systems (ISMS)
assessment of
through the
their
implementation of
cybersecurity
security controls.
practices.
These
regulations
are broad and
can fit a wide
ISO 31000
range of
Family (Interna This set of
businesses.
tional regulations governs
All businesses
Organization principles of
can use this
for implementation and
family of
Standardization risk management.
regulations for
)
assessment of
their
cybersecurity
practices.
152
152
Information Security
and Threats
This act is a two
part bill. Title I
Any
protects the
organization
healthcare of
that handles
people who are
healthcare
transitioning
data. That
HIPAA (Health between jobs or are
includes, but
Insurance laid off. Title II is
is not limited
Portability and meant to simplify
to, doctor’s
Accountability the healthcare
offices,
Act) process by shifting
hospitals,
/ HITECH Omni to electronic data. It
insurance
bus Rule also protects the
companies, bu
privacy of
siness
individual patients.
associates,
This was further
and
expanded through
employers.
the HITECH /
Omnibus Rule.
A set of 12
PCI-DSS
regulations Companies
(Payment Card
designed to reduce handling
Industry Data
fraud and protect credit card
Security
customer credit information.
Standard)
card information.
Any company
doing
business in
This regulates the
the European
GDPR data protection and
Union or
(General Data privacy of citizens
handling the
Protection Act) of the European
data of a
Union.
citizen of the
European
Union.
Any business,
Privacy rights and
CCPA including any
consumer
(California for-profit
protection for the
entity,
153
Management Information
System
Consumer residents of that does
Privacy Act) California. business in
California and
collects
consumers’
personal data.
The security,
availability,
AICPA
processing
(American Service
integrity, and
Institute of organizations
privacy of systems
Certified Public that process
processing user
Accountants) S user data.
data and the
OC2
confidentiality of
these systems.
Organizations
that are
responsible
This framework for business
was developed to processes
COBIT related to
help organizations
(Control technology
manage
Objectives for and quality
information and
Information control of
technology
and Related information.
governance by
Technologies) This includes,
linking business
and IT goals. but is not
limited to,
areas such as
audit and
assurance,
154
154
Information Security
and Threats
compliance,
IT operations,
governance,
and security
and risk
management.
This act
This act allowed defines
insurance “financial
companies, institutions”
commercial banks, as:
and investment “…companies
GLBA banks to be within that offer
(Gramm- the same company. financial
Leach-Bliley As for security, it products or
Act) mandates that services to
companies secure individuals,
the private like loans,
information of financial or
clients and investment
customers. advice, or
insurance.”
155
Management Information
System
Management
Program)
Any post-
secondary
institution
FERPA including, but
Section 3.1 of the
(The Family not limited to,
act is concerned
Educational academies,
with protecting
Rights and colleges,
student educational
Privacy Act of seminaries,
records.
1974) technical
schools, and
vocational
schools.
The online
COPPA
collection of Any Person or
(Children’s
personal entity under
Online Privacy
information about U.S.
Protection
children under 13 jurisdiction.
Rule)
years of age.
NERC CIP
Standards Improve the All bulk
(NERC Critical security of North power system
Infrastructure America’s power owners and
Protection system. operators.
Standards)
156
156