Sei sulla pagina 1di 68

UNIT-1

Importance of information for management decisions:

We all are involved in the decision making process in our day-to-day life, whether in office or at
home or elsewhere. We say good about those who can take quick decisions; we call them
efficient and effective. One may feel it is futile to discuss about this topic stating that this trait is
an innate part of our character and nothing much is possible to be done. But people are trainable,
arent they?

We see some people taking decisions and moving forward while some others stay put with the
current situation due to indecision. Some make bold decisions, take risks and jump far ahead and
out of reach of others while some exercise extreme caution and make little progress. Is this a
quality that is inherent in a person or is it one that a person develops over time. We can perhaps
leave this matter to be debated by philosophers and psychologists, and move ahead and discuss
the consequences of poor decision making.

Taking a stand

In our day to day professional life we are confronted with various situations where we are
required to take a stand. Our decisions may relate to choosing of a technology solution or a
partner, fixing up something that has gone wrong in the datacenter, resolving unreasonable user
demands and many such things, but these decision points are critical and essential part of our
work. If we keep taking decisions, work moves on and we embark on the next important matter.
However, if we are stuck with indecision, matters come to a standstill and it affects our
productivity and efficiency.

I am in no way hinting at hurried decision making or taking matters casually. Decisions need to
be taken with utmost care; and these need to be well considered and sound. The process may take
longer in some cases which require analysis and research but it is important to take a call after a
reasonable time has elapsed.

Not all decisions we take may be correct and perfect; we may make mistakes at times and that is
humana corollary would be to say that we would not make a mistake if we do not get into
decision making. I am reminded of one of our Prime Ministers, who had adopted a unique
approach of postponing decisions hoping that circumstances will take care of the problem on its
own. To quote Paul Newman, A man who waits to do something so perfect that nobody would
find fault it, he would do nothing.

Effects of indecision

Consequences of indecision or delayed decision are enormous. First, you lose on time; things
that needs to be done today will be done tomorrow or the day after. Any work getting stretched
over days leads to inefficiency and higher costs. If work does not proceed as scheduled, there is a
sheer waste of resources put on the job. Both our assistants and also the end users, so affected,
develop a wrong impression and lose confidence in us. By not acting on time we may lose out an
opportunity to make use of a situation or lose out on making a difference to the environment
when it was most essential.
On occasions when we stretch the time for making a decision, the situation changes and the
decision loses its relevance. Delay in decision could also alter your position from a winner to a
loser. I would like to share the example of my son who is a brilliant amateur chess player. He
makes well considered moves and often surprises opponents ranked higher than him, but loses a
few games due to time constraints. He considers all possibilities to choose the correct move and
hence consumes more time. The lesson he has to learn is that if he develops the habit of faster
decision making, he could win many more games and the championship. Rather than looking for
the perfect move, he can move with faster with quicker decisions and not mind if there is a rare
move that is incorrect.

Decisions are taken easily taken by people who have courage; as they proceed ahead, their
confidence grows. If they make mistakes they consider these as opportunities to learn and move
on.

Systems Approaches to Information Systems

Introductory Definitions

Data unstructured or raw facts


Information data processed to make it useful in decision making
Communication - to transmit information, by speech, writing, signal,

from Information, Systems and Information Systems, by Checkland and Holwell

Mathematical Theory of Communications

Developed by Claude Shannon, 1949

signal
Information Transmitter Receiver Destination

Source

message message

Noise

Source
Source Develops information in form of message

Transmitter Encodes message, into a signal, a format acceptable


to communication channel

Channel Path by which message is transferred from Source to Destination

e.g. telephone wire, fiber optics, air (sound wave) Receiver


Accepts signal from transmitter and decodes it into back into

message
Destination Accepts message from transmitter

concept used to create and optimize most modern information


systems bandwidth, relays, transmitting and receiving, processing

Definitions of Information Technology (IT) and Information Systems (IS)

Information Technology - focused mainly on computer hardware and


communication equipment and the transfer of information between them
Interested in microelectronics, software, telecommunications

Information Systems intersection of aspects of information technology


and social & behavioral sciences

Two Methods for Handling

Hard Systems Approach


adoption of Herbert Simons management ideas to IS field

scientific approach to management of system,


The New Science of Management Decision, 1960
founded on goal seeking nature of organizations, control theory,
systems engineering,
Soft Systems Methodology (SSM)

learning organization approach championed by G. Vickers

implementation and management of information system exhibits adaptive


behavior

Hard Systems Approach

Problem Definition
Data Collection / Gap Assessment (information is received from the IS in
this stage)

Creating Alternative System Solutions


Assessing Possible Outcomes
Selecting System Solution
Implementing System Solution (information for change may be released to
IS at this stage)

Monitoring System

reductionist by design

Each problem generates sub-problems, until we find a sub-problem that we


can solve. We proceed until, by successive solution of such sub-problems, we
eventually achieve, our goal or give up. Simon, 1960

Soft Systems Methodology


(presenter and class expressed reservations on some of the comparisons
made by this table from, Information, Systems and Information Systems, by
Checkland and Holwell)

Examples Information System Development


Hard Systems Approach
Design of corporate / public Information Systems
telephone networks, radio broadcasting, cable TV , corporate networks

Design of traditional control systems
chemical plants, utilities,
Wiring systems in product design
electronics, computers, automobiles,
Soft System Methodology
Development of corporate Intranet Systems
Implementation of lean production systems
Evolution of communication technologies

Example of Information Systems for Electric Utilities


Prior to 1920
Electric utilities were run locally
Information/Control system controlled single plants
1920 -1990
Electric utilities organized into grids (networks)
Necessitated broader control, centralized command center for optimization
of many plants as whole system
-broader system level optimization, during periods of low load, efficient plants stay open
, least efficient plants are cycled down.

MIS - Development Process

In MIS, the information is recognized as a major resource like capital and time. If this resource
has to be managed well, it calls upon the management to plan for it and control it, so that the
information becomes a vital resource for the system.

The management information system needs good planning.


This system should deal with the management information not with data processing
alone.
It should provide support for the management planning, decision-making and action.
It should provide support to the changing needs of business management.

Major challenges in MIS implementation are:

Quantity, content and context of information - how much information and exactly what
should it describe.
Nature of analysis and presentation - comprehensibility of information.
Availability of information - frequency, contemporariness, on-demand or routine,
periodic or occasional, one-time info or repetitive in nature and so on
Accuracy of information.
Reliability of information.
Security and Authentication of the system.
Planning for MIS
MIS design and development process has to address the following issues successfully:

There should be effective communication between the developers and users of the
system.
There should be synchronization in understanding of management, processes and IT
among the users as well as the developers.
Understanding of the information needs of managers from different functional areas
and combining these needs into a single integrated system.
Creating a unified MIS covering the entire organization will lead to a more economical,
faster and more integrated system, however it will increase in design complexity
manifold.
The MIS has to be interacting with the complex environment comprising all other sub-
systems in the overall information system of the organization. So, it is extremely
necessary to understand and define the requirements of MIS in the context of the
organization.
It should keep pace with changes in environment, changing demands of the customers
and growing competition.
It should utilize fast developing in IT capabilities in the best possible ways.
Cost and time of installing such advanced IT-based systems is high, so there should not
be a need for frequent and major modifications.
It should take care of not only the users i.e., the managers but also other stakeholders
like employees, customers and suppliers.

Once the organizational planning stage is over, the designer of the system should take the
following strategic decisions for the achievement of MIS goals and objectives:

Development Strategy: Example - an online, real-time batch.


System Development Strategy: Designer selects an approach to system development
like operational verses functional, accounting verses analysis.
Resources for the Development: Designer has to select resources. Resources can be in-
house verses external, customized or use of package.
Manpower Composition: The staffs should have analysts, and programmers.

Information system planning essentially involves:

Identification of the stage of information system in the organization.


Identification of the application of organizational IS.
Evolution of each of this application based on the established evolution criteria.
Establishing a priority ranking for these applications.
Determining the optimum architecture of IS for serving the top priority applications.
Information System Requirements
The following diagram illustrates a brief sketch of the process of information requirement
analysis

The following three methodologies can be adopted to determine the requirements in


developing a management information system for any organization:

Business Systems Planning (BSP) - this methodology is developed by IBM.


o It identifies the IS priorities of the organization and focuses on the way data is
maintained in the system.
o It uses data architecture supporting multiple applications.
o It defines data classes using different matrices to establish relationships among
the organization, its processes and data requirements.
Critical Success Factor (CSF) - this methodology is developed by John Rockart of MIT.
o It identifies the key business goals and strategies of each manager as well as that
of the business.
o Next, it looks for the critical success factors underlying these goals.
o Measure of CSF effectiveness becomes an input for defining the information
system requirements.
End/Means (E/M) analysis - this methodology is developed by Wetherbe and Davis at
the University of Minnesota.
o It determines the effectiveness criteria for outputs and efficiency criteria for the
processes generating the outputs.
o At first it identifies the outputs or services provided by the business processes.
o Then it describes the factors that make these outputs effective for the user.
o Finally it selects the information needed to evaluate the effectiveness of outputs

Information System Analysis and Design


System analysis and design follows the typical System/Software Design Life Cycle (SDLC) as
discussed in the previous chapter. It generally passes through the following phases:

Problem Definition
Feasibility Study
Systems Analysis
System Design
Detailed System Design
Implementation
Maintenance

In the analysis phase, the following techniques are commonly used:

Data flow diagrams (DFD)


Logic Modeling
Data Modeling
Rapid Application Development (RAD)
Object Oriented Analysis (OOA)

Technology for Information Systems


The technology requirement for an information system can be categorized as:

Devices
Data center systems - It is the environment that provides processing, storage,
networking, management and the distribution of data within an enterprise.
Enterprise software - These are software system like ERP, SCM, Human Resource
Management, etc. that fulfill the needs and objectives of the organizations.
IT services - It refers to the implementation and management of quality IT services by IT
service providers through people, process and information technology. It often includes
various process improvement frameworks and methodologies like six sigma, TQM, and
so on.
Telecom services

System Test Planning and Execution


The system should be fully tested for errors before being fully operational.

The test plan should include for each test:

Purpose
Definition
test inputs
detailed specification of test procedure
details of expected outputs

Each sub-system and all their components should be tested using various test procedures and
data to ensure that each component is working as it is intended.

The testing must include the users of the system to identify errors as well as get the feedback.

System Operation
Before the system is in operation, the following issues should be taken care of:

Data security, backup and recovery;


Systems control;
Testing of the system to ensure that it works bug-free in all expected business
situations;
The hardware and software used should be able to deliver the expected processing;
The system capacity and expected response time should be maintained;
The system should be well documented including;
o A user guide for inexperienced users,
o A user reference or operations manual for advanced users,
o A system reference manual describing system structures and architecture.

Once the system is fully operational, it should be maintained throughout its working life to
resolve any glitches or difficulties faced in operation and minor modifications might be made to
overcome such situations.
Factors for Success and Failure
MIS development projects are high-risk, high-return projects. Following could be stated as
critical factors for success and failure in MIS development:

It should cater to a specific, well-perceived business.


The top management should be completely convinced, able and willing to such a
system. Ideally there should be a patron or a sponsor for the system in the top
management.
All users including managers and other employees should be made an integral part of
the development, implementation, and use of the system.
There should be an operational prototype of the system released as soon as possible, to
create interest among the users.
There should be good support staff with necessary technical, business, and
interpersonal skills.
The system should be simple, easy to understand without adding much complexity. It is
a best practice, not to add up an entity unless there is both a use and user for it.
It should be easy to use and navigate with high response time.
The implementation process should follow a definite goal and time.
All the users including the top management should be given proper training, so that
they have a good knowledge of the content and function of the system, and can use it
fully for various managerial activities such as reporting, budgeting, controlling, planning,
monitoring, etc.
It must produce useful outputs to be used by all managers.
The system should be well integrated into the management processes of planning,
decision-making, and monitoring.

Information System Architecture


The architecture is a art and science of designing.

An information system architecture is a formal definition of the business processes and rules,
systems structure, technical framework, and product technologies for a business or organizational
information system.

An information system architecture usually consists of four layers:


Business process architecture,
Systems architecture,
Technical architecture,
Product delivery architecture.
The architecture of an information system encompasses the hardware and software used to deliver
the solution to the final consumer of services.
The architecture is a description of the design and contents of a computerized system. If
documented, the architecture may include information such as a detailed inventory of current
hardware, software and networking capabilities; a description of long-range plans and priorities for
future purchases, and a plan for upgrading and/or replacing dated equipment and software.

The architecture should document: What data is stored?, How does the system function?, Where
are components located?, When do activities and events occur in the system?, and Why does the
system exist?

Information system architecture is a blue print used to develop, implement, maintain the elements
in the organization.

Business architecture is a blue print of enterprise, that provides a common understanding of the
organization and is used to align objectives and demands.

A System architecture is the conceptual model that defines the structure, behavior and more views
of the systems. here we set the conventions, rules and standards employed in a system.

A Technical architecture defines all the Technical requirements like operational, performance, etc.

Product delivery architecture as the information regarding the delivery of the


product, maintenance, etc.
Example for the system Architecture:
This is for the architecture for the banking services.
Quantitative Techniques and Management Information Systems interfacing.
Meaning and Definition:

Quantitative techniques may be defined as those techniques which provide the decision
makes a systematic and powerful means of analysis, based on quantitative data. It is a scientific method
employed for problem solving and decision making by the management. With the help of quantitative
techniques, the decision maker is able to explore policies for attaining the predetermined objectives. In
short, quantitative techniques are inevitable in decision-making process.
Classification of Quantitative Techniques:

There are different types of quantitative techniques. We can classify them into three
categories.
They are:

1.Mathematical Quantitative Techniques

2.Statistical Quantitative Techniques

3. Programming Quantitative Techniques

Mathematical Quantitative Techniques:

A technique in which quantitative data are used along with the principles of mathematics is known as
mathematical quantitative techniques.

Mathematical quantitative techniques involve:

1.Permutations and Combinations:

Permutation means arrangement of objects in a definite order. The number of arrangements depends
upon the total number of objects and the number of objects taken at a time for arrangement.

The number of permutations or arrangements is calculated by using the formula.

Combination means selection or grouping objects without considering their order.The number of
combinations is calculated by using the formula.

2.Set Theory:-

Set theory is a modern mathematical device which solves various types of critical problems.

3.Matrix Algebra:

Matrix is an orderly arrangement of certain given numbers or symbols in rows and columns. It is a
mathematical device of finding out the results of different types of algebraic operations on the basis of
the relevant matrices.

4.Determinants:

It is a powerful device developed over the matrix algebra. This device is used for finding out values of
different variables connected with a number of simultaneous equations.

5.Differentiation:

It is a mathematical process of finding out changes in the dependent variable with reference to a
small change in the in dependent variable.

6.Integration:

Integrationis the reverse process of differentiation.

7.Differential Equation:

It is a mathematical equation which involves the differential coefficients of the dependent variables.

Statistical Quantitative Techniques:

Statistical techniques are those techniques which are used in conducting the statistical enquiry
concerning to certain Phenomenon. They include all the statistical methods beginning from the
collection of data till interpretation of those collected data.

Statistical techniques involve:

1.Collection of data:

One of the important statistical methods is collection of data. There are different methods for
collecting primary and secondary data.

2.Measures of Central tendency, dispersion, skewness and Kurtis

Measures of Central tendency is a method used for finding he average of a series while measures of
dispersion used for finding out the variability in a series. Measures of Skewness measures asymmetry of
a distribution while measures of Kurtis measures the flatness of peakedness in a distribution.

3. Correlation and Regression Analysis:

Correlation is used to study the degree of relationship among two or more variables. On the other
hand, regression technique is used to estimate the value of one variable for a given value of another.

4.Index Numbers:

Index numbers measure the fluctuations in various Phenomena like price, production etc over a period
of time,They are described as economic barometres.

5. Time series Analysis:

Analysis of time series helps us to know the effect of factors which are responsible for changes:

6. Interpolation and Extrapolation:

Interpolation is the statistical technique of estimating under certain assumptions, the missing figures
which may fall within the range of given figures. Extrapolation provides estimated figures outside the
range of given data.

7. Statistical Quality Control

Statistical quality control is used for ensuring the quality of items manufactured. The variations in
quality because of assignable causes and chance causes can be known with the help of this tool.
Different control charts are used in controlling the quality of products.

8. Ratio Analysis:

Ratio analysis is used for analyzing financial statements of any business or industrial concerns which help
to take appropriate decisions.

9. Probability Theory:

Theory of probability provides numerical values of the likely hood of the occurrence of events.

10. Testing of Hypothesis


Testing of hypothesis is an important statistical tool to judge the reliability of inferences drawn on the
basis of sample studies.

Programming Techniques:

Programming techniques are also called operations research techniques. Programming techniques are
model building techniques used by decision makers in modern times. Programming techniques involve:

1. Linear Programming:

Linear programming technique is used in finding a solution for optimizing a given objective under certain
constraints.
2. Queuing Theory:

Queuing theory deals with mathematical study of queues. It aims at minimizing cost of both servicing
and waiting.

3. Game Theory:

Game theory is used to determine the optimum strategy in a competitive situation.


4. Decision Theory:

This is concerned with making sound decisions under conditions of certainty, risk and uncertainty.

5. Inventory Theory:

Inventory theory helps for optimizing the inventory levels. It focuses on minimizing cost associated with
holding of inventories.

6. Net work programming:

It is a technique of planning, scheduling, controlling, monitoring and co-ordinating large and complex
projects comprising of a number of activities and events. It serves as an instrument in resource
allocation and adjustment of time and cost up to the optimum level. It includes CPM, PERT etc.

7. Simulation:
It is a technique of testing a model which resembles a real life situations

8. Replacement Theory:
It is concerned with the problems of replacement of machines, etc due to their deteriorating efficiency
or breakdown. It helps to determine the most economic replacement policy.

9. Non Linear Programming:

It is a programming technique which involves finding an optimum solution to a problem in which some
or all variables are non-linear.
10. Sequencing:

Sequencing tool is used to determine a sequence in which given jobs should be performed by minimizing
the total efforts.

11. Quadratic Programming:


Quadratic programming technique is designed to solve certain problems, the objective function of which
takes the form of a quadratic equation.

12. Branch and Bound Technique

It is a recently developed technique. This is designed to solve the combination problems of decision
making where there are large number off easible solutions. Problems ofplant location, problems of
determining minimum cost of production etc. are examples of combination problems.

Functions of Quantitative Techniques:

The following are the important functions of quantitative techniques:

1. To facilitate the decision-making process


2. To provide tools for scientific research

3. To help in choosing an optimal strategy

4. To enable in proper deployment of resources

5. To help in minimizing costs

6. To help in minimizing the total processing time required for performing a set of jobs

USES OF QUANTITATIVE TECHNIQUES


Business and Industry

Quantitative techniques render valuable services in the field of business and industry. Today, all
decisions in business and industry are made with the help of quantitative techniques.
Some important uses of quantitative techniques in the field of business and industry are given below:
1. Quantitative techniques of linear programming is used for optimal allocation of scarce resources in
the problem of determining product mix
2. Inventory control techniques are useful in dividing when and how much items are to be purchase so
as to maintain a balance between the cost of holding and cost of ordering the inventory
3. Quantitative techniques of CPM, and PERT helps in determining the earliest and the latest times for
the
events and activities of a project. This helps the management in proper deployment of resources.
4. Decision tree analysis and simulation technique help the management in taking the best possible
course of action under the conditions of risks and uncertainty.

5. Queuing theory is used to minimize the cost of waiting and servicing of the customers in queues.
6. Replacement theory helps the management in determining the most economic replacement policy
regarding replacement of an equipment.

Limitations of Quantitative Techniques:

Even though the quantitative techniques are inevitable in decision-making process, they are not free
from short comings. The following are the important limitations of quantitative techniques:
1. Quantitative techniques involves mathematical models, equations and other mathematical
expressions
2. Quantitative techniques are based on number of assumptions. Therefore, due care must be ensured
while using quantitative techniques, otherwise it will lead to wrong conclusions.
3. Quantitative techniques are very expensive.

4. Quantitative techniques do not take into consideration intangible facts like skill, attitude etc.
5. Quantitative techniques are only tools for analysis and decision-making. They are not decisions itself.
RAOS MANAGEMENT STUDIES

UNIT-II
BASIC STRUCTURAL CONCEPTS
The architecture of an enterprise information system determines relation of its individual parts
with its surrounding environment. An effective use of information system requires, apart from
other things, its painless integration in to the enterprise management system. The information
system architecture can be seen by different angels. The structural design of information system
might be closely interconnected with enterprise organizational architecture.
There are certain basic concepts relating to the structure of management
information system .They are:
FORMAL AND INFORMAL INFORMATION SYSTEM
The information processing system in an organization can be divided into two categories namely
public system and private system.

1. Public information system

Public information system is a part of an organization and used by the relevant persons in an
organization. Such information can be utilized by all personnel who have authority to access the
information.

2. Private information system

On the other hand private information system are kept by individuals . private system may help
and supplement the public system .There are both formal and informal system with in the public
and private system.

3. Formal information system

The formal information system are represented by records and document .There are certain well
prescribed rules and procedures to be followed in formal information system.

4. Informal information system

The informal information system also process information needed for organizational functioning
.But such an information system is not represented by any records and documents.

5. Formal public information system

Management information system with its specified rules and procedures is a part of the formal
public system .

SD.MASTHA BASHA,MCA Page 20


RAOS MANAGEMENT STUDIES

6. Informal public information system

In addition to the public formal system ,there also exist informal public system in order to provide
benefits to all persons in the organization who really need such information .strict rules and
procedures may not be
found in such systems .

7. Formal private information system

Besides these formal and informal public information system , there are also formal and informal
private system in an organization.

8. Private informal information system

Many individuals may maintain their own private informal information system for discharging their
duties more effectively and efficiently .

MIS Office Automation

The use of computer is to execute a variety of office operations, such as word processing,
accounting, and e-mail. Office automation almost always implies a network of computers with a
variety of available programs

SD.MASTHA BASHA,MCA Page 21


RAOS MANAGEMENT STUDIES

Office automation refers to the varied Computer machinery and Software used to digitally
create, collect, store, manipulate, and relay office information needed for accomplishing basic
tasks. Raw data storage, electronic transfer, and the management of electronic business
information comprise the basic activities of an office automation system. Office automation
helps in optimizing or automating existing office procedures. The backbone of office automation
is a LAN, which allows users to transfer data, mail and even voice across the network. All office
functions, including dictation, typing, filing, copying, fax, Telex, microfilm and records
management, telephone and telephone switchboard operations, fall into this category. Office
automation was a popular term in the 1970s and 1980s as the desktop computer exploded onto
the scene.

Advantages are:

1. Office automation can get many tasks accomplished faster.


2. It eliminates the need for a large staff.
3. Less storage is required to store data.
4. Multiple people can update data simultaneously in the event of changes in schedule

5. Businesses can easily purchase and stock their wares with the aid of technology. Many of the
manual tasks that used to be done by hand can now be done through hand held devices and UPC
and SKU coding. In the retail setting, automation also increases choice. Customers can easily
process their payments through automated credit card machines and no longer have to wait in
line for an employee to process and manually type in the credit card numbers.
6. Office payrolls have been automated which means no one has to manually cut checks, and those
checks that are cut can be printed through computer programs. Direct deposit can be
automatically set up and this further reduces the manual process and most employees who
participate in direct deposit often find their paychecks come earlier than if they'd have to wait for
their checks to be written and then cleared by the bank.
7. Other ways automation has reduced employee manpower on tasks is automated voice direction.
Through the use of prompts, automated phone menus and directed calls, the need for employees
to be dedicated to answer the phones has been reduced, and in some cases, eliminated.

SD.MASTHA BASHA,MCA Page 22


RAOS MANAGEMENT STUDIES

The term office automation refers to all tools and methods that are applied to office activities
which make it possible to process written, visual, and sound data in a computer-aided manner.
Office automation is intended to provide elements which make it possible to simplify,
improve, and automate the organization of the activities of a company or a group of people
(management of administrative data, synchronization of meetings, etc.).
Considering that company organizations require increased communication, today, office
automation is no longer limited to simply capturing handwritten notes. In particular, it also
includes the following activities:

exchange of information
management of administrative documents
handling of numerical data
meeting planning and management of work schedules

The term "office suite" refers to all software programs which make it possible to meet office
needs. In particular, an office suite therefore includes the following software programs:

word processing
a Spread sheet
a presentation tool
a Database
a scheduler

The main office suites are:

Open Office (freeware)


Apple Works
Corel word Perfect
IBM/Lotus Smart Suite

SD.MASTHA BASHA,MCA Page 23


RAOS MANAGEMENT STUDIES

Microsoft Office
Sun Star Office

Example:

EDMS - Electronic Document Management System


EDMS - electronic document management system is a software program that manages the
creation, storage and control of documents electronically. The primary function of an EDMS is
to manage electronic information within an organization workflow. A basic EDMS should
include document management, workflow, text retrieval, and imaging. An EDMS must be
capable of providing secure access, maintaining the context, and executing disposition
instructions for all records in the system.
One should always look for an EDMS that provides:

Security control: This function controls which users have access to which information.
Any system that you use must be able to protect not-public records as defined by the
MGDPA.
Version Control: The EDMS should allow users to add documents to the system and
designate a document as an official record. It should also automatically assign the correct
version designation.
Metadata Capture: The EDMS should allow you to capture and use the metadata
appropriate for your agency.

Decision support systems

SD.MASTHA BASHA,MCA Page 24


RAOS MANAGEMENT STUDIES

Decision support systems (DSS) are interactive software-based systems intended to help
managers in decision-making by accessing large volumes of information generated from various
related information systems involved in organizational business processes, such as office
automation system, transaction processing system, etc.

DSS uses the summary information, exceptions, patterns, and trends using the analytical models.
A decision support system helps in decision-making but does not necessarily give a decision
itself. The decision makers compile useful information from raw data, documents, personal
knowledge, and/or business models to identify and solve problems and make decisions.

Programmed and Non-programmed Decisions

There are two types of decisions - programmed and non-programmed decisions.

Programmed decisions are basically automated processes, general routine work, where:

These decisions have been taken several times.


These decisions follow some guidelines or rules.

For example, selecting a reorder level for inventories, is a programmed decision.

Non-programmed decisions occur in unusual and non-addressed situations, so:

It would be a new decision.


There will not be any rules to follow.
These decisions are made based on the available information.
These decisions are based on the manger's discretion, instinct, perception and judgment.

For example, investing in a new technology is a non-programmed decision.

Decision support systems generally involve non-programmed decisions. Therefore, there will be
no exact report, content, or format for these systems. Reports are generated on the fly.

Attributes of a DSS

Adaptability and flexibility


High level of Interactivity
Ease of use
Efficiency and effectiveness
Complete control by decision-makers
Ease of development
Extendibility
Support for modeling and analysis
Support for data access
Standalone, integrated, and Web-based

SD.MASTHA BASHA,MCA Page 25


RAOS MANAGEMENT STUDIES

Characteristics of a DSS

Support for decision-makers in semi-structured and unstructured problems.


Support for managers at various managerial levels, ranging from top executive to line
managers.
Support for individuals and groups. Less structured problems often requires the
involvement of several individuals from different departments and organization level.
Support for interdependent or sequential decisions.
Support for intelligence, design, choice, and implementation.
Support for variety of decision processes and styles.
DSSs are adaptive over time.

Benefits of DSS

Improves efficiency and speed of decision-making activities.


Increases the control, competitiveness and capability of futuristic decision-making of the
organization.
Facilitates interpersonal communication.
Encourages learning or training.
Since it is mostly used in non-programmed decisions, it reveals new approaches and sets
up new evidences for an unusual decision.
Helps automate managerial processes.

Components of a DSS

Following are the components of the Decision Support System:

Database Management System (DBMS): To solve a problem the necessary data may
come from internal or external database. In an organization, internal data are generated
by a system such as TPS and MIS. External data come from a variety of sources such as
newspapers, online data services, databases (financial, marketing, human resources).
Model Management System: It stores and accesses models that managers use to make
decisions. Such models are used for designing manufacturing facility, analyzing the
financial health of an organization, forecasting demand of a product or service, etc.

Support Tools: Support tools like online help; pulls down menus, user interfaces,
graphical analysis, error correction mechanism, facilitates the user interactions with the
system.

Classification of DSS

There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as follows:

SD.MASTHA BASHA,MCA Page 26


RAOS MANAGEMENT STUDIES

Text Oriented DSS: It contains textually represented information that could have a
bearing on decision. It allows documents to be electronically created, revised and viewed
as needed.
Database Oriented DSS: Database plays a major role here; it contains organized and
highly structured data.
Spreadsheet Oriented DSS: It contains information in spread sheets that allows create,
view, modify procedural knowledge and also instructs the system to execute self-
contained instructions. The most popular tool is Excel and Lotus 1-2-3.
Solver Oriented DSS: It is based on a solver, which is an algorithm or procedure written
for performing certain calculations and particular program type.
Rules Oriented DSS: It follows certain procedures adopted as rules.
Rules Oriented DSS: Procedures are adopted in rules oriented DSS. Export system is the
example.
Compound DSS: It is built by using two or more of the five structures explained above.

Types of DSS

Following are some typical DSSs:

Status Inquiry System: It helps in taking operational, management level, or middle level
management decisions, for example daily schedules of jobs to machines or machines to
operators.
Data Analysis System: It needs comparative analysis and makes use of formula or an
algorithm, for example cash flow analysis, inventory analysis etc.
Information Analysis System: In this system data is analyzed and the information report
is generated. For example, sales analysis, accounts receivable systems, market analysis
etc.
Accounting System: It keeps track of accounting and finance related information, for
example, final account, accounts receivables, accounts payables, etc. that keep track of
the major aspects of the business.
Model Based System: Simulation models or optimization models used for decision-
making are used infrequently and creates general guidelines for operation or
management.

Knowledge Management System

Definition of KMS
A knowledge management system comprises a range of practices used in an organization to identify,
create, represent, distribute, and enable adoption to insight and experience. Such insights and
experience comprise knowledge, either embodied in individual or embedded in organizational processes
and practices.

Purpose of KMS

Improved performance

SD.MASTHA BASHA,MCA Page 27


RAOS MANAGEMENT STUDIES

Competitive advantage
Innovation
Sharing of knowledge
Integration
Continuous improvement by:
o Driving strategy
o Starting new lines of business
o Solving problems faster
o Developing professional skills
o Recruit and retain talent

All the systems we are discussing here come under knowledge management category. A
knowledge management system is not radically different from all these information systems, but
it just extends the already existing systems by assimilating more information.

As we have seen, data is raw facts, information is processed and/or interpreted data, and
knowledge is personalized information.

What is Knowledge?

Personalized information
State of knowing and understanding
An object to be stored and manipulated
A process of applying expertise
A condition of access to information
Potential to influence action

Sources of Knowledge of an Organization

Intranet
Data warehouses and knowledge repositories
Decision support tools
Groupware for supporting collaboration
Networks of knowledge workers
Internal expertise

Activities in Knowledge Management

Start with the business problem and the business value to be delivered first.
Identify what kind of strategy to pursue to deliver this value and address the KM
problem.
Think about the system required from a people and process point of view.
Finally, think about what kind of technical infrastructure are required to support the
people and processes.
Implement system and processes with appropriate change management and iterative
staged release.

SD.MASTHA BASHA,MCA Page 28


RAOS MANAGEMENT STUDIES

Level of Knowledge Management

Artificial Intelligence
A branch of Computer Science named Artificial Intelligence pursues creating the computers or
machines as intelligent as human beings.

What is Artificial Intelligence?

According to the father of Artificial Intelligence, John McCarthy, it is The science and
engineering of making intelligent machines, especially intelligent computer programs.

Artificial Intelligence is a way of making a computer, a computer-controlled robot, or a


software think intelligently, in the similar manner the intelligent humans think.

AI is accomplished by studying how human brain thinks, and how humans learn, decide, and
work while trying to solve a problem, and then using the outcomes of this study as a basis of
developing intelligent software and systems.

SD.MASTHA BASHA,MCA Page 29


RAOS MANAGEMENT STUDIES

Philosophy of AI

While exploiting the power of the computer systems, the curiosity of human, lead him to wonder,
Can a machine think and behave like humans do?

Thus, the development of AI started with the intention of creating similar intelligence in
machines that we find and regard high in humans.

Goals of AI

To Create Expert Systems The systems which exhibit intelligent behavior, learn,
demonstrate, explain, and advice its users.
To Implement Human Intelligence in Machines Creating systems that understand,
think, learn, and behave like humans.

What Contributes to AI?

Artificial intelligence is a science and technology based on disciplines such as Computer


Science, Biology, Psychology, Linguistics, Mathematics, and Engineering. A major thrust of AI
is in the development of computer functions associated with human intelligence, such as
reasoning, learning, and problem solving.

Out of the following areas, one or multiple areas can contribute to build an intelligent system.

SD.MASTHA BASHA,MCA Page 30


RAOS MANAGEMENT STUDIES

Programming Without and With AI

The programming without and with AI is different in following ways

Programming Without AI Programming With AI

A computer program without AI can answer the A computer program with AI can answer the
specific questions it is meant to solve. generic questions it is meant to solve.

AI programs can absorb new modifications by


putting highly independent pieces of information
Modification in the program leads to change in its
together. Hence you can modify even a minute
structure.
piece of information of program without affecting
its structure.

SD.MASTHA BASHA,MCA Page 31


RAOS MANAGEMENT STUDIES

Modification is not quick and easy. It may lead to


Quick and Easy program modification.
affecting the program adversely.

What is AI Technique?

In the real world, the knowledge has some unwelcomed properties

Its volume is huge, next to unimaginable.


It is not well-organized or well-formatted.
It keeps changing constantly.

AI Technique is a manner to organize and use the knowledge efficiently in such a way that

It should be perceivable by the people who provide it.


It should be easily modifiable to correct errors.
It should be useful in many situations though it is incomplete or inaccurate.

AI techniques elevate the speed of execution of the complex program it is equipped with.

Applications of AI

AI has been dominant in various fields such as

Gaming AI plays crucial role in strategic games such as chess, poker, tic-tac-toe, etc.,
where machine can think of large number of possible positions based on heuristic
knowledge.
Natural Language Processing It is possible to interact with the computer that
understands natural language spoken by humans.
Expert Systems There are some applications which integrate machine, software, and
special information to impart reasoning and advising. They provide explanation and
advice to the users.
Vision Systems These systems understand, interpret, and comprehend visual input on
the computer. For example,
o A spying aeroplane takes photographs, which are used to figure out spatial
information or map of the areas.
o Doctors use clinical expert system to diagnose the patient.
o Police use computer software that can recognize the face of criminal with the
stored portrait made by forensic artist.
Speech Recognition Some intelligent systems are capable of hearing and
comprehending the language in terms of sentences and their meanings while a human
talks to it. It can handle different accents, slang words, noise in the background, change
in humans noise due to cold, etc.
Handwriting Recognition The handwriting recognition software reads the text written
on paper by a pen or on screen by a stylus. It can recognize the shapes of the letters and
convert it into editable text.

SD.MASTHA BASHA,MCA Page 32


RAOS MANAGEMENT STUDIES

Intelligent Robots Robots are able to perform the tasks given by a human. They have
sensors to detect physical data from the real world such as light, heat, temperature,
movement, sound, bump, and pressure. They have efficient processors, multiple sensors
and huge memory, to exhibit intelligence. In addition, they are capable of learning from
their mistakes and they can adapt to the new environment.

Group Decision Making

Many decisions in an organization require the collaboration and participation of multiple


individuals. For example, consider a company manufacturing electronic consumer products, such
as TVs, DVD players, MP3 players, car stereos, etc. The company is losing market share to the
competition. The company needs to decide whether to keep selling its existing range of products,
focus only on its best-selling products or add new types of products.

This decision requires the input from a number of different units within the organization, such as
marketing, engineering, manufacturing, etc. Let's say the CEO of the company has set up a task
force to develop a recommendation. Each unit in the organization is represented by one of its
managers. How is the task force going to work together to come up with the best decision?

There are a number of ways for the group members to collaborate. They can have meetings to
share information and discuss the decisions that need to be made. If meeting face-to-face is not
practical, they can use a technology, like videoconferencing. They can also communicate with
each other by e-mail to share ideas and provide updates.

While these approaches can be productive, many decisions in today's world are very complex
and require a lot of different considerations. Having access to the same information can
contribute to better decision making. However, this can quickly become overwhelming, and not
all participants may have the time, skill or interest to analyze all this information. Imagine
having to read through hundreds of pages of a document just to prepare for a meeting.

One strategy to not get bogged down by complexity and information overload is to use
computer-based tools for group decision making. A Group Decision Support System, or
GDSS, consists of interactive software that allows for making decisions by a group of
participants. The goal of a GDSS is to improve the productivity of a group to come to a decision.
A GDSS is sometimes also referred to as a 'computerized collaborative work system.'

Characteristics of a GDSS

A GDSS has a number of unique characteristics to support a group of participants in their


decision-making process:

Special design to support creative thinking, effective communications and decision-making


techniques
Easy to use so participants from different backgrounds can all participate effectively
Flexible so it can incorporate the different perspectives and decision-making styles of the
different participants

SD.MASTHA BASHA,MCA Page 33


RAOS MANAGEMENT STUDIES

Automated record keeping for future review and analysis


Parallel communication to allow multiple participants to contribute simultaneously

The most important characteristic, however, is that it provides support for a group to come to a
decision. A number of different approaches can be used.

The Delphi approach is a structured communication technique in which experts answer


questionnaires in several rounds. Participants get to see each other's input after each round and
are encouraged to revise their earlier answers based on replies by others. The underlying
assumption is that this type of communication will lead to a convergence toward a final answer.
This approach is often used when conditions are highly uncertain and the opinion of experts is
weighed heavily. A good example of this would be trying to predict the sales of a particular new
product. If there are no similar products on the market, there may not be a lot of data for analysis.

The group consensus approach forces members to come to a unanimous decision. This is sort
of like locking a team up in a room, and they can't leave before a decision is reached - but the
room could be virtual, and the communications could all be electronic.

The nominal group technique gives each participant an equal voice, and the final decision is
reached by voting. Contrary to regular voting, however, the group comes up with a number of
different solutions, and these are ranked by using a voting process. Whatever the specific
decision-making strategy employed, a GDSS is designed to facilitate this process.

SD.MASTHA BASHA,MCA Page 34


RAOS MANAGEMENT STUDIES

UNIT-III
SYSTEM DEVELOPMENT METHODOLOGIES

INTRODUCTION
Different types of system development methodologies are used in designing information system.
Depending upon the actual requirement of the system, different approaches for data processing
are adopted. However, some system groups recommend a centralized
data processing system while others may go in for a distributed data processing system. In a
centralized data processing, one or more centralized computers are used for processing and the
retrieval of information is done from them. The distributed processing systeminvolves a number
of computers located remotely in the branches/
departments of the organization. The client/server technology is also gaining popularity these
days.
OBJECTIVES
various approaches to the information system
l explain networking environment
l explain the meaning of client/server technology
DATA PROCESSING SYSTEM
Data processing techniques are very much dependent on the kind of applications and the
working environment. The activities involved in data processing are along departmental lines
and application based such as Store Management, Production Planning & Control, Sales
Accounting, Financial Accounting, Student Information System, etc.The basic input data are the
real resource of data processing. With the progress in technology the concept of integrated data
processing has also come into being. In integrated data processing the outputdata of one
application can be used as the input of anotherapplication.

Depending upon the applicationarea,workingenvironment and the needs of the


management, there are basically

two approaches to data processing: l Centralized data processing Decentralized data processing

CENTRALISED DATA PROCESSING SYSTEM


With the increasing use of computer based data processing, there has been a growing tendency in
the minds of management to centralize the data processing activities. A separate department EDP
(Electronic Data Processing) department is established to carry out the data processing work of
different departments in the organization.
Many times the data processing is also done by hiring the services of the outside agencies and
with the passage of time and experience in-house set is developed for data-processing.

. DECENTRALISED DATA PROCESSING SYSTEM


In the decentralized data processing system, there is really a divisional breakdown of computing
services. Each division, unit or department handles its own computer needs and does not like to
interact with any other division, unit or department. It is well suited to a decentralized

SD.MASTHA BASHA,MCA Page 35


RAOS MANAGEMENT STUDIES

mangement scheme in which organizational autonomy is important. For example, research


divisions of a large organization
INFORMATION SYSTEM
The information system aims at providing detailed information on a timely basis throughout the
organization so that the top management can take proper and effective decisions.
The information system cuts across departmental lines and help achieving overall optimization
for the organization.
The organization is viewed as a network of inter-related sub-systems rather than as a hierarchy of
manager-subordinate relationship. The information system can be of two types: Computer
Applications
Integrated information system
Distributed information system
(a) Integrated Information System
The integrated information system is based on the presumption that the data and
information are used by more than one system in the organization. Accordingly, data and
information are channeled into a reservoir or database. All the data processing and provision of
information is derived and taken from this common database.
(b) Distributed Information System
There are opinion that development of an integrated information system is embodied with
several practical problems and therefore, not feasible. This view has been reinforced by the
failure of integrated systems in various large organizations. The concept of a distributed
information system has emerged as an alternative to the integrated information system. In the
distributed information system, there are information sub-systems that form islands of
information systems.

MULTI-USER ENVIRONMENT
The necessity of sharing of data and information gave rise to multiuser environment. In a multi-
user environment, there is a concept of file server and user nodes or user terminals connected to
the file server. There are various ways of developing a multi-user environment depending upon
the connectivity. There is local area network (LAN)
where nodes are connected with the file server with cables through which the data and
information are transferred from file server to the different nodes connected to the file server and
vice-versa. In a Wide Area Network (WAN), the nodes are connected through MODEM or
through satellite.
NETWORKING/FILESERVER SYSTEM
In a Local Area Network, all the data and programme files are stored in a file server. A file
server is the central node in the network. All the users connected to the file server through
different nodes can access the data and information stored in the fileserver simultaneously.

systems development life cycle (SDLC)


The systems development life cycle (SDLC) is a conceptual model used in project management that
describes the stages involved in an information system development project, from an initial feasibility
study through maintenance of the completed application

SD.MASTHA BASHA,MCA Page 36


RAOS MANAGEMENT STUDIES

Guide: Software Testing Careers & Test Management Tools

The role of the software tester has undergone significant upheaval and change in recent years. To
help get you situated in today's landscape, we filled this guide with advice, research, and user
reviews of popular test management tools.

Various SDLC methodologies have been developed to guide the processes involved, including the
waterfall model (which was the original SDLC method); rapid application development (RAD); joint
application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-
and-stabilize. Frequently, several models are combined into some sort of hybrid methodology.
Documentation is crucial regardless of the type of model chosen or devised for any application, and is
usually done in parallel with the development process. Some methods work better for specific types of
projects, but in the final analysis, the most important factor for the success of a project may be how
closely the particular plan was followed.

What is systems development life cycle (SDLC)?

(SDLC is also an abbreviation for Synchronous Data Link Control.)

The systems development life cycle (SDLC) is a conceptual model used in project management
that describes the stages involved in an information system development project, from an initial
feasibility study through maintenance of the completed application.

Guide: Software Testing Careers & Test Management Tools

The role of the software tester has undergone significant upheaval and change in recent years. To
help get you situated in today's landscape, we filled this guide with advice, research, and user
reviews of popular test management tools.

Various SDLC methodologies have been developed to guide the processes involved, including
the waterfall model (which was the original SDLC method); rapid application development
(RAD); joint application development (JAD); the fountain model; the spiral model; build and fix;
and synchronize-and-stabilize. Frequently, several models are combined into some sort of hybrid
methodology. Documentation is crucial regardless of the type of model chosen or devised for
any application, and is usually done in parallel with the development process. Some methods
work better for specific types of projects, but in the final analysis, the most important factor for
the success of a project may be how closely the particular plan was followed.

In general, an SDLC methodology follows the following steps:

1. The existing system is evaluated. Deficiencies are identified. This can be done by
interviewing users of the system and consulting with support personnel.
2. The new system requirements are defined. In particular, the deficiencies in the existing
system must be addressed with specific proposals for improvement.

SD.MASTHA BASHA,MCA Page 37


RAOS MANAGEMENT STUDIES

3. The proposed system is designed. Plans are laid out concerning the physical construction,
hardware, operating systems, programming, communications, and security issues.
4. The new system is developed. The new components and programs must be obtained and
installed. Users of the system must be trained in its use, and all aspects of performance
must be tested. If necessary, adjustments must be made at this stage.
5. The system is put into use. This can be done in various ways. The new system can phased
in, according to application or location, and the old system gradually replaced. In some
cases, it may be more cost-effective to shut down the old system and implement the new
system all at once.
6. Once the new system is up and running for a while, it should be exhaustively evaluated.
Maintenance must be kept up rigorously at all times. Users of the system should be kept
up-to-date concerning the latest modifications and procedures.

Varying SDLC methodologies among development teams: Software development life cycle
(SDLC) methodologies have their own advantages, tools and so forth. Expert David Christiansen
explains why development groups should be allowed to embrace a variety of methodologies.

How use cases facilitate the SDLC: Why incorporate use case techniques into your software
development lifecycle? Requirements expert Betty Luedke explains how use cases benefit the
SDLC and how practitioners can get the most out of them

When to begin testing in the SDLC: Testing is one of the most important components of the
software development lifecycle, but when to begin testing depends on a number of factors.
Expert Mike Kelly discusses how certain issues affect the timing of testing in the SDLC.

Prototypes are instruments used within the software development process and different kinds of
prototypes are employed to achieve different goals. The product prototype has been variously
defined within the prototyping literature and an early definition is that of Naumann and Jenkins
(1982) who consider an information
systems prototype to be:
... a system that captures the essential features of a la prototype system, intentionally
incomplete, is to be modified, supplemented, or

supplanted.Budde et al (1992) classify along two different vectors - according to the purpose
they fulfil and according to the manner of their construction. Four types of prototypes:
presentation prototypes, prototype proper, breadboard prototypes and pilot system prototypes are
identified according to the different tasks they accomplish.

presentation prototype is one which is presented to prospective

clients by a software manufacturer in order to convince them of the feasibility of anew project.
As such it is their first impression of the future system.

SD.MASTHA BASHA,MCA Page 38


RAOS MANAGEMENT STUDIES

The prototype proper is constructed and tested, to clarify user needs, while the actual information
system is under construction.

The breadboard prototype is used mainly by development staff to ascertain the feasibility of
certain technical aspects of the system.

A pilot system prototype is a type of prototype which constitutes the core of an application
system. After one or more iterations of evolutionary prototyping a pilot system prototype reaches
enough sophistication to become the final system. the most appropriate definition of a
prototype. A prototype system,

Intentionally incomplete, is to be modified, supplemented, or supplanted.Budde et al. (1992)


classify along two different vectors - according to the purpose they fulfil and according to the
manner of their construction. Four types of prototypes: presentation prototypes, prototype proper,
breadboard prototypes and pilot system prototypes are identified according to the different tasks
they accomplish. The presentation prototype is one which is presented to prospective clients by
a software manufacturer in order to convince them of the feasibility of a new project. As such it
is their first impression of the future system. The prototype proper is constructed and tested, to
clarify user needs, while the actual information system is under construction. The breadboard
prototype is used mainly by development staff to ascertain the feasibility of certain technical
aspects of the system. A pilot system prototype is a type of prototype which constitutes the core
of an application system. After one or more iterations of evolutionary prototyping a pilot system
prototype reaches enough sophistication to become the final system. Buddeet al. (1992) also
delineate the construction techniques employed in prototyping as either horizontal or vertical
prototyping. Prototypes can be developed technically in different ways. Software construction
can be seen as the design and implementation of a number of different software layers from the
user-interface to database query language or the operating system

PROTOTYPING PROCESS MODELS

iterative procedure involving users and developers:


1) users basic needs are identified;
2) a working prototype is developed;
3) the working prototype is then implemented and used;
4) the prototyping system is revised and enhanced.
This process undergoes several iterations and steps three and four are repeated until the user
accepts the system. Boar(1986) describes the prototyping life cycle as identifying basic needs,
developing a working model, demonstrating the model to all people affected by it in order to
solicit requirements, and implementing revisions or enhancements with successive iterations
until all participants are satisfied with the functionality. Stephen and Bates (1990) note the
difficulty of formulating a universal definition for prototyping.

SD.MASTHA BASHA,MCA Page 39


RAOS MANAGEMENT STUDIES

Systems development is systematic process which includes phases such as planning, analysis,
design, deployment, and maintenance. Here, in this tutorial, we will primarily focus on

Systems analysis
Systems design

Systems Analysis

It is a process of collecting and interpreting facts, identifying the problems, and decomposition of
a system into its components.

System analysis is conducted for the purpose of studying a system or its parts in order to identify
its objectives. It is a problem solving technique that improves the system and ensures that all the
components of the system work efficiently to accomplish their purpose.

Analysis specifies what the system should do.

Systems Design

It is a process of planning a new business system or replacing an existing system by defining its
components or modules to satisfy the specific requirements. Before planning, you need to
understand the old system thoroughly and determine how computers can best be used in order to
operate efficiently.

System Design focuses on how to accomplish the objective of the system.

System Analysis and Design (SAD) mainly focuses on

Systems
Processes
Technology

What is a System?

The word System is derived from Greek word Systema, which means an organized relationship
between any set of components to achieve some common cause or objective.

A system is an orderly grouping of interdependent components linked together according to a


plan to achieve a specific goal.

Constraints of a System

A system must have three basic constraints

SD.MASTHA BASHA,MCA Page 40


RAOS MANAGEMENT STUDIES

A system must have some structure and behavior which is designed to achieve a
predefined objective.
Interconnectivity and interdependence must exist among the system components.
The objectives of the organization have a higher priority than the objectives of its
subsystems.

For example, traffic management system, payroll system, automatic library system, human
resources information system.

Properties of a System

A system has the following properties

Organization

Organization implies structure and order. It is the arrangement of components that helps to
achieve predetermined objectives.

Interaction

It is defined by the manner in which the components operate with each other.

For example, in an organization, purchasing department must interact with production


department and payroll with personnel department.

Interdependence

Interdependence means how the components of a system depend on one another. For proper
functioning, the components are coordinated and linked together according to a specified plan.
The output of one subsystem is the required by other subsystem as input.

Integration

Integration is concerned with how a system components are connected together. It means that the
parts of the system work together within the system even if each part performs a unique function.

Central Objective

The objective of system must be central. It may be real or stated. It is not uncommon for an
organization to state an objective and operate to achieve another.

The users must know the main objective of a computer application early in the analysis for a
successful design and conversion.

SD.MASTHA BASHA,MCA Page 41


RAOS MANAGEMENT STUDIES

Outputs and Inputs

The main aim of a system is to produce an output which is useful for its user.
Inputs are the information that enters into the system for processing.
Output is the outcome of processing.

Processor(s)

The processor is the element of a system that involves the actual transformation of input
into output.
It is the operational component of a system. Processors may modify the input either
totally or partially, depending on the output specification.
As the output specifications change, so does the processing. In some cases, input is also
modified to enable the processor for handling the transformation.

Control

The control element guides the system.


It is the decisionmaking subsystem that controls the pattern of activities governing
input, processing, and output.

SD.MASTHA BASHA,MCA Page 42


RAOS MANAGEMENT STUDIES

The behavior of a computer System is controlled by the Operating System and software.
In order to keep system in balance, what and how much input is needed is determined by
Output Specifications.

Feedback

Feedback provides the control in a dynamic system.


Positive feedback is routine in nature that encourages the performance of the system.
Negative feedback is informational in nature that provides the controller with information
for action.

Environment

The environment is the supersystem within which an organization operates.


It is the source of external elements that strike on the system.
It determines how a system must function. For example, vendors and competitors of
organizations environment, may provide constraints that affect the actual performance of
the business.

Boundaries and Interface

A system should be defined by its boundaries. Boundaries are the limits that identify its
components, processes, and interrelationship when it interfaces with another system.
Each system has boundaries that determine its sphere of influence and control.
The knowledge of the boundaries of a given system is crucial in determining the nature of
its interface with other systems for successful design.

Types of Systems

The systems can be divided into the following types

Physical or Abstract Systems

Physical systems are tangible entities. We can touch and feel them.
Physical System may be static or dynamic in nature. For example, desks and chairs are
the physical parts of computer center which are static. A programmed computer is a
dynamic system in which programs, data, and applications can change according to the
user's needs.
Abstract systems are non-physical entities or conceptual that may be formulas,
representation or model of a real system.

SD.MASTHA BASHA,MCA Page 43


RAOS MANAGEMENT STUDIES

Open or Closed Systems

An open system must interact with its environment. It receives inputs from and delivers
outputs to the outside of the system. For example, an information system which must
adapt to the changing environmental conditions.
A closed system does not interact with its environment. It is isolated from environmental
influences. A completely closed system is rare in reality.

Adaptive and Non Adaptive System

Adaptive System responds to the change in the environment in a way to improve their
performance and to survive. For example, human beings, animals.
Non Adaptive System is the system which does not respond to the environment. For
example, machines.

Permanent or Temporary System

Permanent System persists for long time. For example, business policies.
Temporary System is made for specified time and after that they are demolished. For
example, A DJ system is set up for a program and it is dissembled after the program.

Natural and Manufactured System

Natural systems are created by the nature. For example, Solar system, seasonal system.
Manufactured System is the man-made system. For example, Rockets, dams, trains.

Deterministic or Probabilistic System

Deterministic system operates in a predictable manner and the interaction between


system components is known with certainty. For example, two molecules of hydrogen
and one molecule of oxygen makes water.
Probabilistic System shows uncertain behavior. The exact output is not known. For
example, Weather forecasting, mail delivery.

Social, Human-Machine, Machine System

Social System is made up of people. For example, social clubs, societies.


In Human-Machine System, both human and machines are involved to perform a
particular task. For example, Computer programming.
Machine System is where human interference is neglected. All the tasks are performed by
the machine. For example, an autonomous robot.

SD.MASTHA BASHA,MCA Page 44


RAOS MANAGEMENT STUDIES

ManMade Information Systems

It is an interconnected set of information resources to manage data for particular


organization, under Direct Management Control (DMC).
This system includes hardware, software, communication, data, and application for
producing information according to the need of an organization.Man-made information
systems are divided into three types
Formal Information System It is based on the flow of information in the form of
memos, instructions, etc., from top level to lower levels of management.
Informal Information System This is employee based system which solves the day to
day work related problems.
Computer Based System This system is directly dependent on the computer for
managing business applications. For example, automatic library system, railway
reservation system, banking system, etc.

UNIT-IV

SD.MASTHA BASHA,MCA Page 45


RAOS MANAGEMENT STUDIES

Software life cycle models

PLANNING
COMMUNICATION

SDLC
DEPLOYMENT
MODELLING

CONSTRUCTION

COMMUNICATION: Before customer requirements can be analysed,modeled or


specified they must be gathered through communication activity.The principles apply for
effective communication are :

Listen
Prepare before communicate
Face to face communication best
If something is unclear draw a picture
Take notes and document decision

SD.MASTHA BASHA,MCA Page 46


RAOS MANAGEMENT STUDIES

PLANNING: The planning activity provides a set of management technical practices to


define a road map to achieve the and objectives.

Understand the scope of the project


Involve the customer in the planning activity
Define how you intend ensure the quality

MODELING: Create models to gain a better understanding of the software to built.Two types
of models are used in this activity.Those are:

1. Analysis modeling
2. Design modeling

Analysis modeling represents the information,function and behavior of the product.


design model represents the architecture, interfaceses and component details

CONSTRUCTION: In this activity mainly concentrates on the codeing and testing principles of
the product

Coding principles: the programmer begin writing code be sure that

Select data structures that will meet the needs of the design
Keep the conditional logics as simple as possible
Create nested loops that makes them Easley

Testing principles: testing process of executing a program with the intent of finding errors

All test should be traceable to customer requirements


Testing should be planned and systematic

DEPLOYMENT: it consists of three action they are delivery ,support and feedback.

A complete delivery package should be assembled and tested


A support must be established before the software is released
Feedback should be collected and recorded by the software team as well as
customer.

Difference Between Verification and Validation

In the context of testing, Verification and Validation are very widely and commonly used
terms. Most of the times, we consider the terms same, but actually the terms are quite different.

SD.MASTHA BASHA,MCA Page 47


RAOS MANAGEMENT STUDIES

There are two aspects of V&V tasks

Confirms to requirements (Producer view of quality)


Fit for use (consumers view of quality)

Producers view of quality, in simpler terms means the developers perception of the final
product.
Consumers view of quality means users perception of final product.
When we carry out the V&V tasks, we have to concentrate both of these view of quality.

To begin, lets try to understand the terms first and try to explore them with different standards.

What is Verification?

Verification is a process of evaluating the intermediary work products of a software development


lifecycle to check if we are in the right track of creating the final product.

Now the question here is : What are the intermediary products? Well, These can include the
documents which are produced during the development phases like, requirements specification,
design documents, data base table design, ER diagrams, test cases, traceability matrix etc. We
sometimes tend to neglect the importance of reviewing these documents but we should
understand that reviewing itself can find out many hidden anomalies when if found or fixed in
the later phase of development cycle, can be very costly.

In other words we can also state that verification is a process to evaluate the mediator products of
software to check whether the products satisfy the conditions imposed during the beginning of
the phase.

What is Validation?

Validation is the process of evaluating the final product to check whether the software meets the
business needs. In simple words the test execution which we do in our day to day life are actually
the validation activity which includes smoke testing, functional testing, regression testing,
systems testing etc

Lets try to understand the differences between Verification and Validation:

Verification Validation

Evaluates the intermediary products to check whether it Evaluates the final product to check whether
meets the specific requirements of the particular phase it meets the business needs.

Checks whether the product is built as per the specified It determines whether the software is fit for
requirement and design specification. use and satisfy the business need.

SD.MASTHA BASHA,MCA Page 48


RAOS MANAGEMENT STUDIES

Verification Validation

Checks Are we building the product right? Checks Are we building the right product?

This is done without executing the software Is done with executing the software

Involves all the static testing techniques Includes all the dynamic testing techniques.

Example includes all types of testing like


Examples includes reviews, inspection and walkthrough smoke, regression, functional, systems and
UAT

Verification &Validation in various standards:

ISO / IEC 12207:2008

Verification Activities Validation Activities

Requirement verification Prepare the test requirements documents, test cases, and
Involves review of the requirements other test specifications to analyze the test results.

Design Verification Evaluate that these test requirements, test cases and other
Involves reviews of all the design specifications reflects the requirements and is fit for use.
documents including the HLD and LDD
Test for boundry values, stress and the functionalities
Code verification
Code review Test for error messages and in case of any error, the
application is terminated gracefully.
Documentation Verification
Verification of user manuals and other Test that the software meets the business requirements and
related documents. is fit for use.

CMMI

Verification and validation are two different KPAs at maturity level 3

Verification Activities Validation Activities

Performing peer reviews. Validate that the products and its


components are suitable for environment.
Verify the selected work products.

SD.MASTHA BASHA,MCA Page 49


RAOS MANAGEMENT STUDIES

Verification Activities Validation Activities

When the validation process is being


Standardize a definite process by establishing implemented , It is monitored and controlled.
organizational level policies for planning and doing
reviews. Do lessons learnt activities and collect the
improvement information.

Institutionalize a definite process.

What is Security Testing?

Security testing is a testing technique to determine if an information system protects data and
maintains functionality as intended. It also aims at verifying 6 basic principles as listed below:

Confidentiality
Integrity
Authentication
Authorization
Availability
Non-repudiation

Security Testing - Techniques:

Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Insecure Direct Object References
Security Misconfiguration
Sensitive Data Exposure
Missing Function Level Access Control
Cross-Site Request Forgery (CSRF)
Using Components with Known Vulnerabilities
Unvalidated Redirects and Forwards

What is Simulation?

A simulation is a computer model that mimics the operation of a real or proposed system and it is
time based and takes into account all the resources and constraints involved.

SD.MASTHA BASHA,MCA Page 50


RAOS MANAGEMENT STUDIES

Parameters affected by Simulation

Cost
Repeatability
Time

Example:
A mobile simulator also known as emulator, a software that can be installed on a normal desktop which
creates a virtual machine version of a mobile device such as a mobile phone, iPhone, other smartphone
within the system.
Mobile simulator allows the user to execute the application under test on their computer.

What is Smoke Testing?

Smoke Testing is a testing technique that is inspired from hardware testing, which checks for the
smoke from the hardware components once the hardware's power is switched on. Similarly in
Software testing context, smoke testing refers to testing the basic functionality of the build.

If the Test fails, build is declared as unstable and it is NOT tested anymore until the smoke test
of the build passes.

Smoke Testing - Features:

Identifying the business critical functionalities that a product must satisfy.


Designing and executing the basic functionalities of the application.
Ensuring that the smoke test passes each and every build in order to proceed with the
testing.
Smoke Tests enables uncovering obvious errors which saves time and effort of test team.
Smoke Tests can be manual or automated.

Electronic devices feature a large number of small components, each piece being highly
important to their overall functionality and safety. The responsibility for ensuring that each
minute component is performing adequately rests firmly on the shoulders of the device and
component manufacturers. However, their jobs are being made more difficult by the growing
issue of counterfeiting in the electrical market.

Printed codes and marks enable manufacturers to track and trace products throughout the supply
chain. These also, importantly, help distinguish between genuine and counterfeited components.
However, counterfeiters are becoming increasingly sophisticated and have developed capabilities
to replicate codes. In order to counter this problem, manufacturers find it necessary to employ
more sophisticated coding methods such as smart code techniques.

SD.MASTHA BASHA,MCA Page 51


RAOS MANAGEMENT STUDIES

Smart coding and micro-printing


Utilising algorithmic software technology, printers equipped with smart coding capabilities can
alter and verify specific characters within codes. Implementation of smart coding techniques to improve
existing basic lot/batch codes is simple, with nominal incremental production costs. Without knowledge
of algorithms and keys, these smart codes are impossible to duplicate and can go a long way towards
preventing counterfeiting activities, which contribute to huge profit losses.

Smart coding techniques

There are numerous smart coding techniques that component manufacturers can employ to
enhance their basic lot/batch codes. Each technique (explained below) varies in complexity and
application:

Self-verifying codes.

These are one of the most basic ways to identify the authenticity of products with a visual check.
With this type of marking, a pre-determined pattern is set for the code; for example, all digits add
up to a certain number.

Interleaved marking.

With interleaved marking, characters within a code are partially overlapped. While this overlay
is visible to the naked eye, it is highly difficult to replicate this character formulation.

Dynamically-altered font.

Varied numbers and letters within a code can have minute sections of characters missing in order
to create distinct codes. The advantage of this code is that, visually it is difficult to recognise the
small differencesonly supply chain partners who have a trained understanding of the code
formation can observe the differences.

Verifiable codes.

Tracked with vision-inspection systems, verifiable codes utilise unique software-driven


algorithms, which cannot be duplicated without an understanding of the algorithm and keys.

Covert codes.

Ultraviolet and infrared inks can be utilised to create covert codes that are not visible to the
naked eye. Codes are only visible under ultraviolet or other high-frequency lighting, and these
are inconspicuous methods of tracking products throughout the supply chain.

SD.MASTHA BASHA,MCA Page 52


RAOS MANAGEMENT STUDIES

Challenges of coding electrical components

Increased productivity and maximised profitability are the main objectives of any production
facility, and manufacturers ultimately need to ensure their production line is streamlined in order
to safeguard these objectives.

What is Error?

Error is a condition when the output information does not match with the input information.
During transmission, digital signals suffer from noise that can introduce errors in the binary bits
travelling from one system to other. That means a 0 bit may change to 1 or a 1 bit may change to
0.

Error-Detecting codes

Whenever a message is transmitted, it may get scrambled by noise or data may get corrupted. To
avoid this, we use error-detecting codes which are additional data added to a given digital
message to help us detect if an error occurred during transmission of the message. A simple
example of error-detecting code is parity check.

Error-Correcting codes

Along with error-detecting code, we can also pass some data to figure out the original message
from the corrupt message that we received. This type of code is called an error-correcting code.
Error-correcting codes also deploy the same strategy as error-detecting codes but additionally,
such codes also detect the exact location of the corrupt bit.

In error-correcting codes, parity check has a simple way to detect errors along with a
sophisticated mechanism to determine the corrupt bit location. Once the corrupt bit is located, its
value is reverted (from 0 to 1 or 1 to 0) to get the original message.

SD.MASTHA BASHA,MCA Page 53


RAOS MANAGEMENT STUDIES

How to Detect and Correct Errors?

To detect and correct the errors, additional bits are added to the data bits at the time of
transmission.

The additional bits are called parity bits. They allow detection or correction of the errors.
The data bits along with the parity bits form a code word.

Parity Checking of Error Detection

It is the simplest technique for detecting and correcting errors. The MSB of an 8-bits word is
used as the parity bit and the remaining 7 bits are used as data or message bits. The parity of 8-
bits transmitted word can be either even parity or odd parity.

Even parity -- Even parity means the number of 1's in the given word including the parity bit
should be even (2,4,6,....).

Odd parity -- Odd parity means the number of 1's in the given word including the parity bit
should be odd (1,3,5,....).

Use of Parity Bit

The parity bit can be set to 0 and 1 depending on the type of the parity required.

For even parity, this bit is set to 1 or 0 such that the no. of "1 bits" in the entire word is
even. Shown in fig. (a).
For odd parity, this bit is set to 1 or 0 such that the no. of "1 bits" in the entire word is
odd. Shown in fig. (b).

SD.MASTHA BASHA,MCA Page 54


RAOS MANAGEMENT STUDIES

How Does Error Detection Take Place?

Parity checking at the receiver can detect the presence of an error if the parity of the receiver
signal is different from the expected parity. That means, if it is known that the parity of the
transmitted signal is always going to be "even" and if the received signal has an odd parity, then
the receiver can conclude that the received signal is not correct. If an error is detected, then the
receiver will ignore the received byte and request for retransmission of the same byte to the
transmitter.

validation
data validation is the process of ensuring that a program operates on clean, correct and useful
data. It uses routines, often called "validation rules" "validation constraints" or "check routines", that
check for correctness, meaningfulness, and security of data that are input to the system. The rules may
be implemented through the automated facilities of a data dictionary,[1] or by the inclusion of explicit
application program validation logic.

Different kinds of validation

In evaluating the basics of data validation, generalizations can be made regarding the different
types of validation, according to the scope, complexity, and purpose of the various validation
operations to be carried out.

SD.MASTHA BASHA,MCA Page 55


RAOS MANAGEMENT STUDIES

For example:

Data type validation;


Range and constraint validation;
Code and Cross-reference validation; and
Structured validation

Data-type validation

Data type validation is customarily carried out on one or more simple data fields.

The simplest kind of data type validation verifies that the individual characters provided through
user input are consistent with the expected characters of one or more known primitive data types;
as defined in a programming language or data storage and retrieval mechanism.

For example, many database systems allow the specification of the following primitive data
types: 1) integer; 2) float (decimal); or 3) string.

For example, many database systems allow the specification of the following l(, and ) (plus,
minus, and parentheses). A more sophisticated data validation routine would check to see the
user had entered a valid country code, i.e., that the number of digits entered matched the
convention for the country or area specified.

A validation process involves two distinct steps: (a) Validation Check and (b) Post-Check action.
The check step uses one or more computational rules (see section below) to determine if the data
is valid. The Post-validation action sends feedback to help enforce validation.

Simple range and constraint validation

Simple range and constraint validation may examine user input for consistency with a
minimum/maximum range, or consistency with a test for evaluating a sequence of characters,
such as one or more tests against regular expressions.

Code and cross-reference validation

Code and cross-reference validation includes tests for data type validation, combined with one or
more operations to verify that the user-supplied data is consistent with one or more external
rules, requirements, or validity constraints relevant to a particular organization, context or set of
underlying assumptions. These additional validity constraints may involve cross-referencing
supplied data with a known look-up table or directory information service such as LDAP.

For example, an experienced user may enter a well-formed string that matches the specification
for a valid e-mail address, as defined in RFC 5322 [4][5][6] but that well-formed string might not
actually correspond to a resolvable domain connected to an active e-mail account.

SD.MASTHA BASHA,MCA Page 56


RAOS MANAGEMENT STUDIES

Structured validation

Structured validation allows for the combination of any of various basic data type validation
steps, along with more complex processing. Such complex processing may include the testing of
conditional constraints for an entire complex data object or set of process operations within a
system.

Error loading player: No playable sources found

What is a 'Cost-Benefit Analysis'

A cost-benefit analysis is a process by which business decisions are analyzed. The benefits of a
given situation or business-related action are summed, and then the costs associated with taking
that action are subtracted. Some consultants or analysts also build the model to put a dollar value
on intangible items, such as the benefits and costs associated with living in a certain town, and
most analysts will also factor opportunity cost into such equations.

BREAKING DOWN 'Cost-Benefit Analysis'


Prior to erecting a new plant or taking on a new project, prudent managers conduct a cost-benefit
analysis as a means of evaluating all the potential costs and revenues that may be generated if the
project is completed. The outcome of the analysis will determine whether the project is financially
feasible or if another project should be pursued.

The Cost-Benefit Analysis Process

The first step in the process is to compile a comprehensive list of all the costs and benefits
associated with the project or decision. Costs should include direct and indirect costs, intangible
costs, opportunity costs and the cost of potential risks. Benefits should include all direct and
indirect revenues and intangible benefits, such as increased production from improved employee
safety and morale, or increased sales from customer goodwill. A common unit of monetary
measurement should then be applied to all items on the list. Care should be taken to not
underestimate costs or overestimate benefits. A conservative approach with a conscious effort to
avoid any subjective tendencies when calculating estimates is best suited when assigning value
to both costs and benefits for the purpose of a cost-benefit analysis.

The final step is to quantitatively compare the results of the aggregate costs and benefits to
determine if the benefits outweigh the costs. If so, then the rational decision is to go forward with
project. In not, a review of the project is warranted to see if adjustments can be made to either
increase benefits and/or decrease costs to make the project viable. If not, the project may be
abandoned.

Limitation of Cost-Benefit Analysis

For projects that involve small to mid-level capital expenditures and are short to intermediate in
terms of time to completion, an in-depth cost-benefit analysis may be sufficient enough to make

SD.MASTHA BASHA,MCA Page 57


RAOS MANAGEMENT STUDIES

a well-informed rational decision. For very large projects with a long-term time horizon, cost-
benefit analysis typically fails to effectively take into account important financial concerns such
as inflation, interest rates, varying cash flows and the present value of money. Alternative capital
budgeting analysis methods including net present value (NPV) or internal rate of return (IRR) are
more appropriate for these situations.

Become A Day Trader In Less Than A Day

Through Investopedia Academy's Become A Day Trader an experienced Wall Street trader will
teach you proven, profitable strategies you can start using today. After this self-paced, on-
demand course you'll understand money management and trading psychology, speak the
language of the market, and use six profitiable, tried-and-true trading techniques. Watch Free
Trailer >>

Shadow Pricing

Shadow pricing is used to refer to either one of two things: the actual market value of a money
market fund share, or more commonly, the assignment of a dollar value to an abstract
commodity that is not ordinarily quantifiable as having a market price, but needs to be assigned a
valuation to conduct a cost-benefit analysis. In the latter instance, a shadow price is assigned to
goods that are not generally bought and sold as separate assets in a marketplace, such as
production costs or intangible assets.

BREAKING DOWN 'Shadow Pricing'


Shadow pricing is frequently guided by certain assumptions about costs or value. It is generally a
subjective and inexact, or imprecise, endeavor.

Shadow pricing as it relates to money market funds refers to the practice of accounting the price
of securities based on amortized costs rather than on their assigned market value. Money market
fund shares are always assigned a nominal net asset value (NAV) of $1, even though the actual
NAV is usually slightly more or less than $1. Such funds are required by law to disclose the
actual NAV the shadow share price to show the fund's performance to investors more
accurately.

Shadow Pricing

Shadow pricing is used to refer to either one of two things: the actual market value of a money
market fund share, or more commonly, the assignment of a dollar value to an abstract
commodity that is not ordinarily quantifiable as having a market price, but needs to be assigned a
valuation to conduct a cost-benefit analysis. In the latter instance, a shadow price is assigned to

SD.MASTHA BASHA,MCA Page 58


RAOS MANAGEMENT STUDIES

goods that are not generally bought and sold as separate assets in a marketplace, such as
production costs or intangible assets.

BREAKING DOWN 'Shadow Pricing'


Shadow pricing is frequently guided by certain assumptions about costs or value. It is generally a
subjective and inexact, or imprecise, endeavor.

Shadow pricing as it relates to money market funds refers to the practice of accounting the price
of securities based on amortized costs rather than on their assigned market value. Money market
fund shares are always assigned a nominal net asset value (NAV) of $1, even though the actual
NAV is usually slightly more or less than $1. Such funds are required by law to disclose the
actual NAV the shadow share price to show the fund's performance to investors more
accurately.

Intangible Cost

An intangible cost is an unquantifiable cost relating to an identifiable source. Intangible costs


represent a variety of expenses such as losses in productivity, customer goodwill or drops in
employee morale. While these costs do not have a firm value, managers often attempt to estimate
the impact of the intangibles.

Risk management information systems

The management of risk data and information is key to the success of any risk management
effort regardless of an organization's size or industry sector. Risk management information
systems/services (RMIS) are used to support expert advice and cost-effective information
management solutions around key processes such as:

Risk identification and assessment


Risk control
Risk financing

Typically, RMIS facilitates the consolidation of information related to insurance, such as claims
from multiple sources, property values, policy information, and exposure information, into one
system. Often, RMIS applies primarily to casualty claims/loss data systems. Such casualty
coverages include auto liability, auto physical damage, workers' compensation, general liability
and products liability.

RMIS products are designed to provide their insured organizations and their brokers with basic
policy and claim information via electronic access, and most recently, via the Internet. This
information is essential for managing individual claims, identifying trends, marketing an
insurance program, loss forecasting, actuarial studies and internal loss data communication
within a client organization. They may also provide the tracking and management reporting

SD.MASTHA BASHA,MCA Page 59


RAOS MANAGEMENT STUDIES

capabilities to enable one to monitor and control overall cost of risk in an efficient and cost-
effective manner.

In the context of the acronym RMIS, the word risk pertains to an insured or self-insured
organization. This is important because prior to the advent of RMIS, insurance company loss
information reporting typically organized loss data around insurance policy numbers. The
historical focus on insurance policies detracted from a clear, coherent and consolidated picture of
a single customer's loss experience. The advent of the first PC and UNIX based standalone
RMIS was in 1982, by Mark Dorn, under the trade name RISKMASTER. This began a
breakthrough step in the insurance industry's evolution toward persistent and focused
understanding of their end-customer needs. Typically, the best solution for an organization
depends on whether it is enhancing an existing RMIS system, ensuring the highest level of data
quality, or designing and implementing a new system while maintaining a focus on state-of-the-
art technology.

Common types of RMIS

Most major insurance companies (carriers), broker/agents, and third party administrators
(TPAs)offer/provide at least one external RMIS product to their insureds (clients) and any
brokers involved in the insurance program. Most commonly, RMIS products allow individual
claim detail look-up, basic trend report production, policy summaries and ad hoc queries. The
resulting information can then be shared throughout the client's organization, usually for
insurance program cost allocation, loss prevention and effective claim management at the local
level. More advanced products allow multiple claim data sources to be consolidated into one
Master RMIS, which is essential for most large client organizations with complex insurance
programs.

Insurance companies normally use a different version of externally provided RMIS for internal
use, such as by underwriting and loss control personnel. Occasionally, there could be timing or
other differences that could cause data discrepancies between the internal system and externally
provided RMIS.

Insurance brokers have a similar need for access to their insured client's claim data. Brokers are
normally added as an additional user to the RMIS product provided to their clients by the
insurance carrier and TPAs. The information available from RMIS is critical to the broker for
interfacing effectively with their counterparts in the insurance carrier and TPAs. Additionally,
effectively presented RMIS information that shows trends and analysis is essential to
successfully marketing their clients' insurance programs.

Insurance carrier and a TPA claim adjusters traditionally use claims management systems to
collect and manage claim information and to administer claims. Some client organizations,
however, may choose to manage certain types of claims or those within a loss retention layer and
thus use this type of system as well.

Typically, the claims management system provides the primary data to RMIS products. RMIS
products in turn provide an externally accessed view into the client's claims data. RMIS products

SD.MASTHA BASHA,MCA Page 60


RAOS MANAGEMENT STUDIES

are commonly available directly from larger insurance carriers and TPAs, but the most advanced
systems are often offered by independent RMIS vendors. Independent RMIS vendor systems are
most desirable when a client organization needs to consolidate claims data from multiple current
insurance programs and/or past programs with current program information.

Key vendor attributes and differences

Along with insurance carriers, broker/agents and TPAs that offer their own proprietary systems,
there are a variety of direct RMIS technology companies who sell to direct insureds and even the
carriers, broker/agents and TPAs themselves.

Major differences among RMIS vendors include:

Currency of technology (Internet-based vs. Internet-accessible);


System speed (response time for screen changes, report generation time, etc.);
Flexibility in meeting client requirements (custom screen views, client-defined data fields,
special reports, etc.);
Ongoing support service quality (availability of senior/quality technical support, help desk
availability, dedicated staff and stability, etc.);
Data quality control (data conversion accuracy, data source cleanup, etc.);
Pricing (first-year cost, ongoing cost, custom programming charges, data record storage fees);
Availability of related modules (property exposure management, policy management,
claim/incident setup, occupational safety and health administration (OSHA) record keeping,
claims audits, etc.);
Turnaround time for data loads;
Foreign conversion/support (financial fields, language, fluent support staff, etc.)

SD.MASTHA BASHA,MCA Page 61


RAOS MANAGEMENT STUDIES

UNIT-V

Pitfalls in MIS Development

Following are the pitfalls of the MIS development :


(A) Fundamental Weaknesses : Following are the fundamental weaknesses of the MIS
development :
(a) No Management System to Build Upon : The MIS must be built on top of a
management system that includes the organizational arrangements, the structure and procedures
for adequate planning and control, the clear establishment of objectives, and all the other
manifestations of good organization and management. The lack managerial and operational
application is serious because it implies that the process not being performed well. if we can say
that the information is the raw material of decision making , and if information is not generated,
disseminated and used for management, then no system-manual or computer-is going to solve
the problem.
(b) What business are we in? : Not having the crispy stated mission and purpose for the
company is a common weakness. Since if it is not terrible clear what business we are in, each
major challenge the company must face is a completely new challenge and must be analyzed
from the ground up. If there was a mission statement,some of these problem could be dealt with
routinely as opposed to their being major crises.
(c) Company Objectives : written objective are also often missing in the company. A
firm without objectives is much like a company without a statement of mission and purpose.

An effective MIS requires continuous, consistent, long-range planning with involvement


and commitment from the management as an institutionalized planning process involving
everybody concerned. There is a need for an information steering committee and it may take
more than one iteration to establish the process firmly. It has to undergo an application
development cycle consisting of analysis, synthesis and implementation phases. Systems
feasibility (consisting of technical, economic and operational feasibility) is a most important
starting point of MIS development. In other words, the development process should take into
account the rationale, definition and characteristics, economics, design, specification;
schedule, implementation plan, implementation status and review. Some of the usual pitfalls and
problems in developing and running effective Information System are mentioned below along
with -some ways of increasing effectiveness:

1. Emphasis on Clerical System: Just taking over an existing clerical system and modifying
it without upgrading or changing it does not help. The clerical system has to be upgraded
to a management system. On the other hand, computers have been put to work on those
things that are best understood and easily structured and which require little management
involvement.

2. Communication gap between Computer Technologist and Manager/ User: Ensuring


maximum cooperation and coordination between computer personnel and managers is
necessary. A greater degree of interaction and involvement between the systems function
and themanagement function is required.

SD.MASTHA BASHA,MCA Page 62


RAOS MANAGEMENT STUDIES

3. Lack of a Master Plan: A systematic long range plan/planned approach is necessary for
establishing an effective Management Information System. Increased focus on the area
of problems definition is required in the systems analysis. The dramatic changes in
business strategy together with changes in the top management personnel and
organisation structure call for a through plan.

4. Subordination of MIS Function to EDP Accounting System: Management Information


System's function should be made an independent function so that it reports directly to
top management.

5. Lack of Managerial Participation: This involvement and support of top management as


well as participation of all managers in the design of their own management information
system are necessary. If top management tends to depend upon its informally designed
private information systems, development of structured, formalised and a public
management information systems becomes difficult. Many top managers wrongly feel
that good strategic decisions are made more by intuition than by a quantitative
analysis of the available data.

6. Overlooking Human Acceptance: Users of Management Information System should be


involved right at the early stages of design. Their cooperation by demonstrating how
Management Information System will positively affect their job is a must.

7. Lack of Resources and Trained Personnel: Lack of trained personnel consisting of


system analysts, system designers, programmers and chief information officers who are
business trained and/or have a basic business prospective is a handicap.

8. Voluminous and Unstructured Nature of Data: Sometimes the volume of data itself can
be a hurdle unless careful sifting is done. On the other hand, it may also be difficult to
locate and retrieve relevant data.Often, the data required by top management is
unstructured, non- programmed, future oriented. inexact and external and hence difficult
to capture.

9. Limited Use of Management Science and or Techniques: Some of the ways of increasing
the effective of Management Information System include motivating managers to
participate and get involved in Management Information System, establishing consistent
performance and work criteria for Management Information System, maintaining
simplicity and ease of use, training systems analysts and careful consideration of basic
computer feasibility criteria like volume and repetitive nature of transactions, degree
of mathematical processing, quick turnaround time, accuracy and validity of data,
common source documents and well understood processing logic.

10. Enormous Time, Effort and Resources Required: MIS budget includes data processing
costs, hardware costs, personnel costs, supplies, services, etc.

SD.MASTHA BASHA,MCA Page 63


RAOS MANAGEMENT STUDIES

System engineering methodology for MIS problem solving

Systems approach is widely used in problem solving in different contexts.


Researchers in the field of science and technology have used it for quite some time now.
Business problems can also be analyzed and solved using this approach. The following
steps are required for this:

Defining the Problem

This is the step when the problem has to be defined. Sometimes one may confuse the
symptoms or the exhibition of a behavior to be a problem but actually it may only be a
symptom of a larger malaise. It may just exhibit the behavior of a larger phenomenon. It
is vital to drill deep into an issue and clearly understand the problem rather than having
a superficial understanding of the problem. One must appreciate that this in the initial
stage of problem solving and if the problem itself is not correctly diagnosed then the
solution will obviously be wrong. Systems approach is therefore used to understand the
problem in granular detail to establish requirement and objectives in-depth.

Developing Alternative Solutions

This the logical next step in the systems approaches for problem solving. In this stage
alternative solutions are generated. This requires creativity and innovation. In this
stage-the analyst uses creativity to come up with possible solutions to the problem.
Typically in this stage only the outline of solutions are generated rather than the actual
solutions.

Selecting a Solution

In this step, the solution that suits the requirement and objectives in the most
comprehensive manner is selected as the 'best' solution. This is done after evaluating all
the possible solutions and then comparing the possible set of solutions to find the most
suitable solution lot of mathematical, financial and technical models is used to select the
most appropriate solution.

Designing the Solution

Once the most appropriate solution is chosen, it is then made into a design document to
give it the shape of an actionable solution, as in the evaluation stage, only the outline of
the solution is used. At this stage the details of the solution are worked out to create the
blueprint for the solution. Several design diagrams are used to prepare the design
document. At this stage the requirement specifications are again compared with the
solution design to double check the suitability of the solution for the problem.

Implementing the Solution

SD.MASTHA BASHA,MCA Page 64


RAOS MANAGEMENT STUDIES

It is the next step in the process. The solution that has been designed is implemented as
per the specifications -laid down in the design document. During implementation care is
taken to ensure that there are no deviations from the design.

Reviewing the Solution

This is the final step in the problem solving process where the review of the impact of
the solution is noted. This is a stage for finding out if the desired result has been
achieved that was set out.

A Systems Approach Example

Let us assume that A is the coach of the Indian cricket team. Let us also assume that the
objective that A has been entrusted with is to secure a win over the touring Australian
cricket team. The coach uses a systems approach to attain this objective. He starts by
gathering information about his own team.

Through systems approach he views his own Indian team as a system whose
environment would include the other team in the competition, umpires, regulators,
crowd and media. His system, i.e., team itself maybe conceptualized as having two
subsystems, i.e., players and supporting staff for players. Each subsystem would have its
own set of components/entities like the player subsystem will have openers, middle
order batsmen, fast bowlers, wicket keeper, etc. The supporting staff subsystem would
include bowling coach, batting coach, physiotherapist, psychologist, etc. All these
entities would indeed have a bearing on the actual outcome of the game. The coach
adopts a systems approach to determine the playing strategy that he will adopt to ensure
that the Indian side wins. He analyses the issue in a stepwise manner as given below:

Step 1: Defining the problem-In this stage the coach tries to understand the past
performance of his team and that of the other team in the competition. His objective is
to defeat the competing team. He realizes that the problem he faces is that of losing the
game. This is his main problem.

Step 2: Collecting data-The coach employs his supporting staff to gather data on the
skills and physical condition of the players in the competing team by analyzing past
performance data, viewing television footage of previous games, making psychological
profiles of each player. The support staff analyses the data and comes up with the
following observations:

1. Both teams use an aggressive strategy during the period of power play. The competing
Australian team uses the opening players to spearhead this attack. However, recently the
openers have had a personal fight and are facing interpersonal problems.
2. The game is being played in Mumbai and the local crowd support is estimated to be of
some value amounting to around fifty runs. Also the crowd has come to watch the Indian
team win. A loss here would cost the team in terms of morale.
3. The umpires are neutral and are not intimidated by large crowd support but are lenient
towards sledging.

SD.MASTHA BASHA,MCA Page 65


RAOS MANAGEMENT STUDIES

Step 3: Identifying alternatives-Based on the collected data the coach generates the
following alternate strategies:

1. Play upon the minds of the opening players of the competitors by highlighting their
personal differences using sledging alone.
2. Employ defensive tactics during power play when the openers are most aggressive and
not using sledging.
3. Keep close in fielders who would sledge and employ the best attacking bowlers of the
Indian team during the power play.

Step 4: Evaluating alternatives-After having generated different alternatives, the coach


has to select only one. The first alternative may lead to loss of concentration on the part
of openers and result in breakthroughs. However, there is a chance that the
interpersonal differences between the two openers may have already been resolved
before they come to the field and in such a case this strategy will fail. The second
strategy provides a safer option in the sense that it will neutralize the aggressive game of
the openers but there is limited chance of getting breakthroughs. The third option of
employing aggressive close in fielders to play upon the internal personal differences of
the openers and at the same time employing the best bowlers may lead to breakthroughs
and may also restrict the aggressive openers.

Step 5: Selecting the best alternative-The coach selects the third alternative as it
provides him with the opportunity of neutralizing the aggressive playing strategy of the
openers as well as increases the chances of getting breakthrough wickets.

Step 6: Implementing and monitoring-The coach communicates his strategy to his


players and support staff, instructs support staff to organize mock sessions and tactics to
be employed to make the strategy a success. The players and support staff performance
is monitored by the coach on a regular basis to ensure that the strategy is employed
perfectly.

Software engineering qualities

The goal of software engineering is, of course, to design and develop better software. However,
what exactly does "better software" mean? In order to answer this question, this lesson
introduces some common software quality characteristics. Six of the most important quality
characteristics are maintainability, correctness, reusability, reliability, portability, and efficiency.

Maintainability is "the ease with which changes can be made to


satisfy new requirements or to correct deficiencies Well designed
software should be flexible enough to accommodate future changes
that will be needed as new requirements come to light. Since maintenance
accounts for nearly 70% of the cost of the software life cycle the importance of
this quality characteristic cannot be overemphasized. Quite often the programmer
responsible for writing a section of code is not the one who must maintain it. For
this reason, the quality of the software documentation significantly affects the

SD.MASTHA BASHA,MCA Page 66


RAOS MANAGEMENT STUDIES

maintainability of the software product.


Correctness is "the degree with which software adheres to its specified requirements"
At the start of the software life cycle, the requirements for the software are determined
and formalized in the requirements specification document. Well designed software
should meet all the stated requirements. While it might seem obvious that software
should be correct, the reality is that this characteristic is one of the hardest to assess.
Because of the tremendous complexity of software products, it is impossible to perform
exhaustive execution-based testing to insure that no errors will occur when the software is run.
Also, it is important to remember that some products of the software life cycle such as the design
specification cannot be "executed" for testing. Instead, these products must be tested with various
other techniques such as formal proofs, inspections, and walkthroughs.
Reusability is "the ease with which software can be reused in developing other
software" . By reusing existing software, developers can create more complex
software in a shorter amount of time. Reuse is already a common technique
employed in other engineering disciplines. For example, when a house is
constructed, the trusses which support the roof are typically purchased
preassembled. Unless a special design is needed, the architect will not bother to design a new
truss for the house. Instead, he or she will simply reuse an existing design that has proven itself
to be reliable. In much the same way, software can be designed to accommodate reuse in many
situations. A simple example of software reuse could be the development of an efficient sorting
routine that can be incorporated in many future applications.
Reliability is "the frequency and criticality of software failure, where failure is
an unacceptable effect or behavior occurring under permissible operating
conditions" . The frequency of software failure is measured by the average
time between failures. The criticality of software failure is measured by the
average time required for repair. Ideally, software engineers want their
products to fail as little as possible (i.e., demonstrate high correctness) and be as easy as possible
to fix (i.e., demonstrate good maintainability). For some real-time systems such as air traffic
control or heart monitors, reliability becomes the most important software quality characteristic.
However, it would be difficult to imagine a highly reliable system that did not also demonstrate
high correctness and good maintainability.
Portability is "the ease with which software can be used on computer configurations
other than its current one" . Porting software to other computer configurations is
important for several reasons. First, "good software products can have a life of 15
years or more, whereas hardware is frequently changed at least every 4 or 5 years.
Thus good software can be implemented, over its lifetime, on three or more different
hardware configurations" . Second, porting software to a new computer configuration may be
less expensive than developing analogous software from scratch. Third, the sales of "shrink-
wrapped software" can be increased because a greater market for the software is available.
Efficiency is "the degree with which software fulfills its purpose without waste of
resources" . Efficiency is really a multifaceted quality characteristic and must be
assessed with respect to a particular resource such as execution time or storage space.
One measure of efficiency is the speed of a program's execution. Another measure is the
amount of storage space the program requires for execution. Often these two measures
are inversely related, that is, increasing the execution efficiency causes a decrease in the space

SD.MASTHA BASHA,MCA Page 67


RAOS MANAGEMENT STUDIES

efficiency. This relationship is known as the space-time tradeoff. When it is not possible to
design a software product with efficiency in every aspect, the most important resources of the
software are given priority.

SD.MASTHA BASHA,MCA Page 68

Potrebbero piacerti anche