KEMBAR78
Mis PDF | PDF | Security | Computer Security
0% found this document useful (0 votes)
16 views11 pages

Mis PDF

Uploaded by

Aiswarya Lal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

Mis PDF

Uploaded by

Aiswarya Lal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

INFO SYSTEM ACTIVITIES

1. Input of Data Resource: The input activity involves capturing data about business
transactions and other events, preparing them for processing. Data is often recorded on
physical mediums or entered directly into computer systems and may undergo various
editing activities for accuracy before being stored in a machine-readable format for
processing.

2. Processing of Data into Information: During this stage, data undergoes processing
activities such as calculating, comparing, sorting, classifying, and summarizing.

3. Output of Information Products: The aim is to produce appropriate information products


like messages, reports, forms, and graphic images, which can be delivered through video
displays, audio responses, paper products, or multimedia. This stage ensures that end-users
have access to the information they need in a format that is most useful to them.

4. Storage of Data Resource: Storage is a fundamental component of information systems,


where data and information are organized and retained for later use.

5. Control of System Performance: Controlling the performance of the information system


involves monitoring and producing feedback about its input, processing, output, and
adherence to performance standards.

IMPACT 0F INFO SYSTEM ON ORG

1.Improved Efficiency and Productivity: #Automation of routine tasks reduces manual labor,
speeding up processes and minimizing errors. #Enhances workflow and process
management through integrated systems like ERP.

⁠ . Enhanced Decision-Making: #Access to real-time data and analytics improves the quality
2
and speed of decisions. # Decision support systems provide insights and simulations for
strategic planning.

3. Better Communication and Collaboration: #Streamlines communication within the


organization and with external stakeholders. # Collaborative tools enable teamwork across
different locations and time zones

4. Competitive Advantage: # Information systems enable data #driven strategies, giving


organizations an edge in market

5. Cost Reduction: #Optimizes resource allocation and reduces wastage

6. Enhanced Customer Experience: #CRM systems ensure personalized and timely customer
interactions. # Improves service delivery through better tracking and response mechanisms.

7. Innovation and Agility: # Supports rapid development and deployment of new


technologies.
8. Data Management and Security: #Improves data storage, retrieval, and analysis
capabilities.

9. Global Reach and Scalability: #Supports international operations and collaboration. #


Scales systems to accommodate growth and expansion.

10. Human Resource Management: #Enhances recruitment, training, and performance


management through HR information.

How Organizations Can Thrive with Information Systems:

1. Strategic Alignment: #Align information systems with organizational goals and strategies.

2. Investment in Technology: #Continuously invest in upgrading and maintaining information


systems. # Explore new technologies that can drive innovation and efficiency.

3. Skilled Workforce: #Train employees to effectively use information systems. # Hire or


develop IT specialists who can manage and innovate with these systems.

4. Integration and Interoperability: #Ensure seamless integration of different information


systems within the organization. # Use interoperable systems that can communicate and
share data efficiently.

5. Data-Driven Culture: #Foster a culture that values data and evidence-based decision-
making. # Encourage the use of analytics and business intelligence tools across the
organization.

6. Security and Compliance: #Implement robust cybersecurity measures to protect data


and systems. # Stay compliant with industry regulations and standards.

7. Customer Focus: #Use information systems to enhance customer interactions and


satisfaction. # Continuously gather and analyse customer feedback to improve services.

8. Agility and Innovation: #Stay agile by quickly adapting to new technologies and market
demands. #Encourage innovation through technology-driven initiatives and projects.

9. Change Management: #Implement effective change management strategies to handle


transitions and new system adoptions. #Communicate the benefits and provide adequate
support during changes.

10. Performance Measurement: # Regularly measure the performance and impact of


information systems.

EMERGENCE OF DIGITAL FIRMS

1. Integration of Digital Technologies: #Digital firms leverage various digital technologies like
cloud computing, big data, artificial intelligence (AI), and the Internet of Things (IoT). MIS
integrates these technologies to improve data management, streamline operations, and
enhance decision-making.
2. Real-Time Data Processing #Digital firms often require real-time data processing and
analytics to make timely decisions. MIS systems have evolved to support real-time data
collection, processing, and analysis, enabling businesses to respond quickly to market
changes and customer needs.

3. Enhanced Data Analytics: The use of big data and advanced analytics has become central
to digital firms.

4. Improved Customer Relationship Management (CRM): #MIS integrates CRM systems


that collect and analyze customer data, enabling firms to tailor their offerings and
interactions to individual customer preferences and behaviors.

5. Automation and Efficiency : # MIS systems incorporate automation tools and


technologies, streamlining repetitive tasks, improving accuracy, and freeing up human
resources for more strategic activities.

6. Enhanced Collaboration Tools: #MIS supports digital firms by providing collaboration


tools that facilitate communication and cooperation among employees, regardless of their
physical location. Platforms like Slack, Microsoft Teams, and project management tools are
integrated into MIS to support remote work and teamwork.

7. Security and Compliance: #MIS systems now include robust security features to protect
sensitive information and ensure compliance with regulations such as GDPR and HIPAA.

8. Scalability and Flexibility: #Digital firms need scalable and flexible MIS solutions to adapt
to rapid growth and changing business needs.

9. Digital Supply Chain Management: #MIS plays a critical role in digital supply chain
management, providing visibility and control over the entire supply chain.

Geographic Information Systems (GIS) : in Management Information Systems (MIS) refer to


the integration of GIS technology into MIS to analyze, visualize, and interpret spatial data in
relation to business operations and decision-making. GIS provides a framework for
gathering, managing, and analyzing data rooted in the science of geography, enabling
organizations to understand patterns, relationships, and trends in spatial contexts.

1. Spatial Data Analysis: GIS allows businesses to analyze spatial data to make informed
decisions. This includes evaluating the geographic distribution of customers, sales, or other
key business metrics.

2. Enhanced Decision Making : #GIS provides tools for visualizing data on maps, which can
improve decision-making processes.

3. Resource Management: #Organizations can use GIS within MIS to manage resources
more efficiently.
4. Logistics and Supply Chain Management: # GIS plays a crucial role in logistics and supply
chain management by optimizing routes, tracking shipments, and managing inventory across
different locations.

5. Market Analysis : #Businesses can use GIS to conduct market analysis by mapping
customer locations, analyzing competitor locations, and identifying potential market
opportunities.

6. Disaster Management and Planning: # GIS aids in disaster management and planning by
providing real-time data on weather conditions, natural disasters, and emergency response
resources.

7. Environmental Impact Assessment : #Companies can use GIS to assess the environmental
impact of their operations..

8. Urban Planning and Development : #GIS is essential in urban planning and development,
allowing planners to visualize and analyze spatial data related to land use, zoning,
infrastructure, and population growth.

9. Customer Relationship Management (CRM): # Integrating GIS with CRM systems enables
businesses to visualize customer data geographically.

ENTERPRISE WIDE SYSTEMS

Enterprise Wide Systems are information systems that support the entire enterprise, from
manufacturing to customer service. These systems provide an integrated view of the
business and help enterprises make decisions and manage operations in a more informed
and efficient manner. By centralizing data and processes across multiple departments,
organizations can reduce costs and increase efficiency while gaining better insight into their
business environment.

1. Internal business systems: # customer relationship Management #Enterprise resource


planning #Document Management systems #Human resources Management

2.Enterprise communication and collaboration #Content management system# E-mail


#Voice mail #Web conferencing # Business process Management

3. Electronic commerce: # Internet shop #Supply chain Management #Online marketing


# Offline marketing.

E- GOVERNANCE

E-Governance, or electronic governance, refers to the use of digital tools and technologies to
provide government services, engage with citizens, and enhance the efficiency and
transparency of governmental processes. It involves the integration of Information and
Communication Technology (ICT) into the functioning of government departments and
services.

Applications of E-Governance:

1. Citizen Services: Online portals and platforms for services like applying for permits,
paying taxes, and accessing public records, making these services more accessible and
efficient.

2. Internal Management: Digital systems for internal operations, including human resources
management, financial management, and project tracking, to streamline workflows and
improve data management.

3. Data Analysis and Reporting: Tools for gathering, analyzing, and reporting data to support
decision-making, monitor performance, and evaluate public programs.

4. Public Communication: Platforms for disseminating information to the public, such as


government websites, social media channels, and email newsletters, improving transparency
and engagement.

5. E-Participation: Online mechanisms for citizens to participate in decision-making


processes, such as e-consultations, online voting, and feedback systems.

6. Regulatory and Compliance Monitoring: Systems to ensure adherence to regulations and


standards, including digital record-keeping and automated compliance checks.

7. Crisis Management: Tools for managing and coordinating responses during emergencies
or disasters, including real-time information sharing and resource allocation.

Management Information Systems (MIS) are systems designed to collect, process, store,
and disseminate information to support management and decision-making within an
organization. They integrate various data sources and tools to provide relevant information
to managers and decision-makers.

Key components of an MIS include:

1. Data Collection: Gathering data from internal and external sources.

2. Data Processing: Converting raw data into meaningful information through sorting,
organizing, and analyzing.

3. Data Storage: Storing processed data in databases or data warehouses for easy retrieval.

4. Information Output: Generating reports, dashboards, and summaries to support decision-


making.

5. Feedback Mechanism: Providing insights and feedback to refine data collection and
processing methods.
Applications of MIS in organizations include:

1.Financial Management: Tracking and analysing financial performance and transactions.

2. Human Resources Management: Managing employee records, payroll, and performance


evaluations.

3.Operations Management: Monitoring and optimizing production processes and supply


chain activities.

4.Marketing Management: Analysing customer data and market trends to develop


marketing strategies.

5.Customer Relationship Management (CRM): Managing interactions with customers and


improving service delivery.

Business change model: It focuses on how organizations adapt their information systems
and processes to support strategic and operational changes. It emphasizes the alignment of
MIS with the evolving needs of the business.:

1. Assessment of Current Systems: Evaluate existing MIS to identify gaps and areas needing
improvement or alignment with business goals.

2. Defining Change Objectives: Establish clear objectives for how MIS should evolve to
support new business strategies or operational efficiencies.

3. Redesign and Integration: Modify or integrate new systems and technologies to address
the identified gaps. This could involve updating software, implementing new data
management practices, or integrating new technologies like cloud computing or AI.

4. Change Management: Implement a structured approach to manage the transition,


including stakeholder communication, training, and support to ensure smooth adoption of
new systems.

5. Performance Measurement: Develop metrics and KPIs to monitor the effectiveness of the
changes in MIS and their impact on business performance.

6. Continuous Improvement: Establish feedback loops and mechanisms for ongoing


evaluation and enhancement of MIS to adapt to future changes.

*Examples* of business change models applied in MIS include:

1. *Business Process Reengineering (BPR)*: Redesigning business processes and supporting


MIS to achieve significant improvements in performance, efficiency, and service quality.
2. *ITIL (Information Technology Infrastructure Library) *: A framework for managing IT
services that aligns IT with business needs, focusing on best practices for service
management and continuous improvement.

3. *ERP (Enterprise Resource Planning) Implementation Models*: Structured approaches


for deploying ERP systems to integrate various business processes and data across the
organization.

Seeking and gaining a competitive advantage: involves strategies and practices that allow
an organization to outperform its competitors and achieve superior performance. Here are
key approaches to gaining a competitive advantage:

1. Differentiation: #Unique Products or Services: Offer products or services that are distinct
in features, quality, or design. #Branding: Build a strong brand reputation that resonates with
customers and distinguishes your offerings from competitors.

2. Cost Leadership: #Operational Efficiency: Streamline operations to reduce costs and


offer products or services at lower prices than competitors. #Economies of Scale*: Leverage
high production volumes to lower per-unit costs.

3. Innovation: #Technological Advancements: Invest in research and development (R&D) to


create new products or improve existing ones. #Business Model Innovation: Develop new
business models or strategies that offer unique value to customers.

4. Customer Focus: #Exceptional Customer Service: Provide superior customer service to


enhance customer satisfaction and loyalty. #Personalization: Use data and insights to tailor
products, services, and experiences to individual customer needs.

5. Strategic Alliances and Partnerships: #Collaborations: Form alliances or partnerships with


other organizations to access new markets, technologies, or resources . #Joint Ventures:
Share resources and risks with partners to pursue new opportunities.

6. Technology Utilization: #Advanced Analytics: Use data analytics to gain insights into
market trends, customer preferences, and operational efficiency. #Automation: Implement
automation technologies to enhance productivity and reduce costs.

7. Talent Management*: #Skill Development: Invest in employee training and development


to build a skilled and knowledgeable workforce. #Attraction and Retention: Attract top talent
and retain skilled employees to maintain a competitive edge.

8. Market Positioning: #Niche Markets: Focus on specific market segments where you can
offer unique value or achieve a dominant position. #Geographic Expansion: Enter new
geographic markets to reach additional customers and diversify revenue sources. By
leveraging these strategies, organizations can build and sustain a competitive advantage,
positioning themselves favorably in the market and achieving long-term success.
JUSTIFYING IT INVESTMENTS

1. Alignment with Business Strategy: #Strategic Objectives*: Show how the MIS investment
aligns with the organization's strategic goals and business objectives. # Value Contribution*:
Explain how the MIS will enhance decision-making, improve operational efficiency, or
support strategic initiatives.

2. Cost-Benefit Analysis: # Cost Breakdown: Provide a detailed estimate of the costs


involved, including acquisition, implementation, training, and ongoing maintenance. #
Benefits Quantification*: Estimate the financial and operational benefits, such as increased
productivity, reduced costs, or improved reporting capabilities. #*Return on Investment
(ROI)*: Calculate the ROI to demonstrate the expected financial return relative to the
investment costs.

3. Performance Improvement: #Operational Efficiency*: Illustrate how the MIS will


streamline processes, reduce manual tasks, and enhance overall efficiency.#Data
Management*: Show improvements in data accuracy, accessibility, and management.

4. Risk Assessment: #*Risk Identification*: Identify potential risks associated with the MIS
investment, including implementation challenges or integration issues.#Mitigation Plans*:
Develop strategies to manage and mitigate these risks.

5. Impact on Decision-Making: Enhanced Reporting: Demonstrate how the MIS will improve
reporting capabilities and provide actionable insights for better decision-making. #Data
Analytics*: Explain how advanced analytics and reporting tools will support data-driven
decisions.

6. Competitive Advantage: - *Market Position*: Illustrate how the MIS investment will
strengthen the organization’s competitive position through better information management
and strategic insights. # - *Innovation*: Highlight any innovative features or capabilities of
the MIS that provide a competitive edge.

7. Stakeholder Benefits: #Employee Efficiency: Show how the MIS will improve employee
productivity by providing better tools and streamlined processes. #Customer Service: Explain
how the MIS will enhance customer service through improved information access and
management.

8. Financial Metrics: # Payback Period: Estimate the time required to recoup the investment
through the benefits realized.# NET Present Value (NPV): Calculate the NPV to assess the
long-term value and profitability of the investment.

9. Scalability and Flexibility: #Future Growth: Show how the MIS can scale with the
organization’s growth and adapt to future needs. # Integration*: Explain how the MIS will
integrate with existing systems and support future technological advancements.
Computer crime

also known as cybercrime, refers to illegal activities that involve the use of computers or
networks. These crimes can range from hacking and identity theft to more complex schemes
like cyber espionage and cyber terrorism. Here are some common types of computer crimes:

1.Hacking: #Unauthorized Access: Gaining unauthorized access to computer systems or


networks. # Defacement: Altering website content without permission.

2. Malware: #Viruses: Malicious software that attaches itself to other programs and spreads
when those programs are executed. #Worms: Self-replicating malware that spreads across
networks without user intervention.

3. *Phishing and Social Engineering*: #Phishing: Fraudulent attempts to obtain sensitive


information, such as usernames, passwords, and credit card details, by masquerading as a
trustworthy entity. #Spear Phishing: Targeted phishing attacks aimed at specific individuals
or organizations. #Social Engineering: Manipulating individuals into divulging confidential
information or performing actions that compromise security.

4. *Identity Theft and Fraud*: #Identity Theft*: Stealing personal information to commit
fraud or other crimes. #Online Fraud*: Various schemes to deceive individuals or
organizations for financial gain, including online auction fraud and credit card fraud.

5. *Cyber Terrorism*: - *Disruption of Services*:# Attacks aimed at disrupting critical


infrastructure, such as power grids, water supplies, and communication networks.
#Propaganda and Recruitment*: Using the internet to spread extremist ideologies and
recruit members.

6. *Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks*:# *DoS*:
Overloading a system or network to make it unavailable to users.

- *DDoS*: Using multiple systems to launch coordinated attacks, making it harder to


defend against.

7. Cyberstalking and Harassment:# - *Cyberstalking*: Using the internet to harass or stalk


individuals.# - *Online Harassment*: Various forms of harassment, including bullying,
defamation, and threats, conducted online.

8. *Intellectual Property Theft*:#Software Piracy*: Copying and distributing software


without authorization.#Copyright Infringement*: Sharing or distributing copyrighted
material without permission.

9. *Financial Crimes*:# *Online Banking Fraud*: Stealing money from online bank
accounts.#Cryptocurrency Theft*: Hacking cryptocurrency exchanges or wallets to steal
digital currencies.
Securing wireless networks

1. *Use Strong Encryption*:# *WPA3*: Implement Wi-Fi Protected Access 3 (WPA3) for the
strongest encryption available for wireless networks.#*WPA2*: If WPA3 is not available, use
WPA2 with AES (Advanced Encryption Standard) encryption.

2. *Strong Authentication Methods*:# - *Multi-Factor Authentication (MFA)*: Require


multiple forms of verification for accessing the wireless network.#- *Enterprise-Level
Security*: Use WPA2 or WPA3 Enterprise mode with a RADIUS (Remote Authentication Dial-
In User Service) server for secure authentication.

3. *Secure Network Configuration*:#*SSID Management*: Disable the broadcasting of the


Service Set Identifier (SSID) to make the network less visible to unauthorized
users.#*Network Segmentation*: Create separate SSIDs for different user groups (e.g.,
employees, guests) and use VLANs (Virtual Local Area Networks) to segment network traffic.

4. *Access Control*:#*MAC Address Filtering*: Restrict access to the network based on the
physical MAC addresses of devices.#*Access Control Lists (ACLs)*: Use ACLs to control which
devices and users can access the wireless network and what resources they can access.

5. *Network Monitoring and Intrusion Detection*:#*Wireless Intrusion Detection Systems


(WIDS)*: Deploy systems to monitor for unusual activity or unauthorized devices on the
network.# *Regular Audits*: Perform regular security audits and vulnerability assessments
to identify and address potential weaknesses.

6. Firmware and Software Updates*: #Regular Updates*: Keep the firmware of all wireless
access points, routers, and related devices up to date with the latest security patches.# -
*Automatic Updates*: Enable automatic updates where possible to ensure that devices are
always running the latest secure versions.

7. *Physical Security*:- *Secure Access Points*: Place wireless access points in secure
locations to prevent unauthorized physical access or tampering. - *Environmental Controls*:
Ensure that network hardware is protected from environmental hazards and physical
threats.

8. *Strong Password Policies*:# *Complex Passwords*: Use strong, complex passwords for
network access and change them regularly.#Password Management*: Implement policies for
password creation, usage, and rotation to ensure they remain secure.

9.Guest Network Management*:#Separate Guest Network*: Provide a separate guest


network for visitors and restrict access to the main corporate network.#Access Limits*:
Implement time-limited access for guests and restrict bandwidth and available services.

10. *User Education and Training*:#*Security Awareness Training*: Regularly educate


employees on best practices for network security and the importance of following security
protocols.#Phishing and Social Engineering Awareness*: Train users to recognize and report
phishing attempts and other social engineering attacks.

ENSURING SYSTEM AVAILABILITY

As companies increasingly rely on digital networks for revenue and operations, they need to
take additional steps to ensure that their systems and applications are always available.#•
Firms such as those in the airline and financial services industries with critical applications
requiring online transaction processing have traditionally used fault-tolerant computer
systems for many years to ensure 100-percent availability.

#Fault-tolerant Computer Systems• Fault-tolerant computer systems contain redundant


hardware, software, and power supply components that create an environment that
provides continuous, uninterrupted service.• Fault-tolerant computers use special software
routines or self-checking logic built into their circuitry to detect hardware failures and
automatically switch to a backup device.• Parts from these computers can be removed and
repaired without disruption to the computer system.

#High-availability Computing• Fault tolerance should be distinguished from high-availability


computing. • Both fault tolerance and high-availability computing try to minimize
downtime.• Downtime refers to periods of time in which a system is not operational..

#Recovery-oriented Computing. • Researchers are exploring ways to make computing


systems recover even more rapidly when mishaps occur, an approach called recovery-
oriented computing. • This work includes designing systems that recover quickly, and
implementing capabilities and tools to help operators pinpoint the sources of faults in multi-
component systems and easily correct their mistakes.

# Controlling Network Traffic: #Deep Packet Inspection• Bandwidth consuming applications


such as file-sharing programs, Internet phone service, and online video are able to clog and
slow down corporate networks, degrading pertormance• A technology called deep packet
inspection

#Security Outsourcing• Many companies, especially small businesses, lack the resources or
expertise to provide a secure high-availability computing environment on their own.• They
can outsource many security functions to Managed Security Service Providers (MSSPs)that
monitor network activity and perform vulnerability testing and intrusion detection

You might also like