Uploaded by Carol Warau

BMS 400 2021 Notes

advertisement
BMS 400 Management Information System
2.
Shareware: this software is freely available for certain duration
INTRODUCTION
of time after which you are required to pay a nominal fee to
Basic Terminologies used:
continue using the software. Shareware can used to advertise
Computer system: It’s an electronic device that accepts data input,
and promote little software in the market. Some shareware
processes the data to produce information output, stores programs
versions contain limited edition with few essential features.
and data for future reference under a set of instructions called
3.
Public Domain Software: this is freely available software which
programs.
is not copyrighted. The codes used to develop the software are
Advantages of a Computer:
freely distributed to allow other developers to improve it. You
1.
Computers are fast, they can process a lot of data within a
can get public domain software from friends, universities,
fraction of seconds.
software vendors, software developers and the internet.
2.
3.
They are accurate, the electronic technology that computer
5.
propriety software, which can be bought off the shelf or from
not computers.
the internet. A software license give the user a right to use the
They offer compact storage, large volumes of data can be
software and other rights to training, documentation, support,
stored in small storage devices, for example; a flash disk can be
updates, installation, e.t.c.
5.
Application service providers – these are organizations that buy
They produce quality output and improve information
and install large pieces of software systems and provide
accessibility.
software services to subscribing firms.
They are diligent and can do boring and repetitive tasks
Classification of software:
without complain or getting tired
6.
Purchase a software license / Commercial software: these are
uses is very precise and errors are as result of human beings
used to store to the tunes of 10GB of data.
4.
4.
They make work easier by automating tasks and activities
reducing the effort and time required to perform them
Disadvantages of a Computer:
1.
System software
2.
Application software
3.
Programming software
System Software:
1.
It requires training to use them effectively.
2.
It needs a constant supply of power
3.
Long use and exposure to computer systems results in health
-
system and peripheral devices.
-
hazards such as; miscarriages, eye problems, hand and wrist
4.
5.
6.
They include the operating system, language translators
and utilities.
problems/ disorders, radiations.
Examples of operating systems will include; Windows XP, Windows
They are numerous security challenges associated with
Vista, Windows 98, MS-DOS, UNIX, MAC O/S, Android O/S.
computers such as; theft, virus attack, hack attack.
Language translators
Computer technology changes very fast rendering huge
Language translators are used to convert programs written in high
investments obsolete within short periods of time
level language (source code) to low level language (object code) that
It is has promoted fall in moral standards
the computer system can understand and use. Examples include:
Compilers, assemblers and interpreters.
SOFTWARE:
A program is a collection of statements and instructions that perform
certain tasks. A collection of these programs together with their
Utilities
Utilities are components of the system software that performs
common housekeeping task or tasks performed by many computer
associated documentation is known as software.
users such as screen savers, disk management utilities, compression
How to acquire software:
1.
It controls and manages the operations of the computer
Freeware: this is freely available software but it is copyrighted,
this means that you can’t change it, you have to use it the way it
utilities, Back-up and restore utility, power management utilities, Sort
utility, debuggers, text editors, Merge utility etc.
Application Software:
is.
by Oteino B
Page 1 of 33
-
-
These are software programs that aid user to perform various
In a traditional file management system each and every department
tasks.
or user are responsible for maintaining their own files or the
They are largely classified into:
programs that interact with those files.
1.
Bespoke, customized or tailor made software
Traditional file system has a lot of limitations that include;
2.
Commercial or off-the-shelf, readymade software

Lack of data/ program independence

High level of data redundancy.

Lack of data integrity or security

Lack of data sharability

Difficulty of enforcing standard
Advantages of customized software:
1.
It meets specific user needs.
2.
You own the copy right and hence one is able to change the
software.
3.
Database management system
It is unique and provides strategic advantages.

centrally managed.
Advantages of Readymade software:

1.
It is readily available.
2.
It is less costly, since development costs are shared
Databases store data about important entries in an
organization e.g. a student database voter’s database etc.

amongst potential buyers.
3.
A database – is a collection of files that is logically organized or
A Database management system- a software system used to
control the structure of a database or access to the data e.g. of
It is well tried and tested.
DBMS include;
Software selection factors
Components of DBMS;

Utility – The use and purpose of the software.
Most DBMS consist of three components namely;

Usability – Ease of use.

Data manipulation language (DML)

Performance – Speed, quality, volumes that it can handle.

Data dictionary (DD)

Security – Protect software from unauthorized access and

Data definition language (DDL)
alteration.
Data manipulation language
Compatibility – How well the software works with other
The DML is used to manipulate the database by; adding data,
systems.
deleting data, editing data or copying data from the database

Maintainability – Ease of making changes.
Data dictionary

Versions and edition of the software.
It’s used to describe the data elements that make up the database.

Quality of documentation of the software.
It stores the data definitions and descriptions of the structure of

Support and after sales services
data used in the database

Files and databases
Data definition language
Computers have ability to manage vast and complex amounts of
It’s used to describe the structure of the database
data accurately and fast. Business store records about the major
It identifies the database fields their data types and field size
events and activities such as sales and marketing, investments,
amongst others etc.
products and services. For this reason computers are currently
Advantages of DBMS
holding important business trade data and transactions. The data in

Minimized data redundancy – in a DBMs data is stored only
the computers are organized in terms of files and databases. The
once with minimum redundancy to allow for interrelationship
reports, trends and patterns produced from the databases are used
between data elements
for decision making and judgemental purpose. Moreover the

Improved data integrity & security – since in a database the
databases can be analysed using data mining tools and drill down
database is updated only once, this minimizes chances of data
tools to provide more insights into decision making. The major
inconsistencies that results in updating data in several files
challenge of the database is the need to protect them from security
threats and ensure unauthorized access to the database.

Using passwords or username, users can be limited on the type
& amount of data they access for security purposes.
FILE MANAGEMENT SYTEM & DATA BASE MANAGEMENT SYSTEM
by Oteino B
Page 2 of 33

Data sharability: in a database system many user can share the

same data or even different views of data that is provided in

Program / data independence-In a DBMs the structure of

Using data tools new or complex relationship about data can
be discovered.
database can be changed without affecting the data.

better decision making.

the database
Get organization wide view of information or external views for
Disadvantages/challenges
Enforcement of standards – DBMs provides tools that allow for
It’s very expensive to maintain a warehouse
enforcements of integrity rules and also validation and
It’s complex or difficult to manage
verification checks.
Consolidation of data creates vulnerability
Ease of data maintenance – using DBMS tools users can easily
Information overload
add edit & delete record from a database ease of primary
Data mining
system failure

The procedure for extracting or mining knowledge from large
Disadvantages of DBMs
qualities of data, to establish new or complex inter relationship

between data elements.
Database systems are large & complex pieces of s/w that are

difficult to manage & administer.


The consolidation of large amounts of data in centralized
amounts of data in order extract hidden patterns or meaning
locations increases security vulnerability.
and to discover new knowledge.

DBMS systems especially the large ones are costly.
Data warehouse


It’s a central repository for data a large storage location for

A number of activities work under data mining or this include;
data.

Data cleansing: removing inconsistences between data
Data stored in the data warehouse is collided from multiple
elements.

past or current activities, data about transactions that take
place in the organization or data from various department in

A data warehouse usually resides in a single site.

The data is stored under a unified scheme that is under



Data transformation: data is consolidated by summarizing or
aggregating.
It’s a subset/ part of a data warehouse in summarized or highly
Steps in data mining;
focused portion.
1.
2.
Data cleansing: data are cleaned and checked for errors or
inconsistencies.
It focuses on a single subject area and can be consolidated
3.
more rapidly and at lower cost than the data warehouse.
Data sources: Data is collected from many sources both from
internal or external.
It stores data in a separate data base for a specific population
of tasks.
Meta-data: the cleansing process yields both the cleansed up
data and meta-data (data about data)
It provides faster access and updating of data.
4.
Benefits of data warehouse
Data transport to the data warehouse: both the data and metadata are sent to the data warehouse.

Improved quality of decision making.

Enable decision makers to access the data as enter as needed

Pattern evaluation: in which interesting patterns between data
elements are observed.
Data mart

Data selection: where the data relevant to the analysis are
retrieved from the data base.
common data base structure.

Data integration: this is where multiple data sources may be
combined.
the organization.

It’s useful in many applications such as credit railings, counter
terrorism, marketing, sports etc.
sources that include; internal or external sources, data about

Computer assisted process of sifting through or analyzing vast
without affecting performance of underlying operational
TELECOMMUNICATION AND NETWORKS
systems.
Most of the information systems we use today require networks
Manager can
and communication technology. Companies, large and small from all
over the world, are using networked systems and the Internet to
by Oteino B
Page 3 of 33
locate suppliers and buyers, to negotiate contracts with and to
product formula, or even government secrets. Networks are
service their trades. Networked systems are fundamental to
vulnerable to virus attack, Hackers attack, and a variety of malicious
electronic commerce and electronic business.
software
Data communication is the movement of encoded multimedia data
Initial Cost
from one point to another using optical, electrical and free space
The computer network requires the net work card and special
transmission system. Multimedia data take the form of text, voice,
network software as well as special communication cables like the
video, pictures, graphics and animations.
coaxial cable, twisted pair. Hence the initial costs are high although
A network is an interconnection of computers and peripheral
the benefits accrued to networking are many.
devices to facilitate sharing of resources and data. Network can be
Networks are complex to manage and administer
wired or wireless. A wired network uses cables to connect computer
It requires skills and training to effectively manage and control
systems together while a wireless network uses free space or
network operations
airwaves to connect computer systems together.
Failure of networked systems can greatly affect business
Advantages of networking
operations
Resource Sharing
Network interlink important business process that if one failure
Networks facilitate sharing of resources such as printers,
result in failure of other system which depend on it
processors, memory, and data and so on to reduce on operation
Types of networks
costs.
LAN – Local Area Network
Security
It is a network within a small geographical area such as building, a
Through the use of the network administrator control can be
business premises. It is a privately owned network that belongs
ensured through the use of passwords. This ensures that the
exclusive to one organization.
unauthorized users don’t have access to the organization data.
WAN – Wide Area Network
Remote communication
It is a network that covers a wide geographical area such as
This is well illustrated by the use of Internet. It eliminates the need
between towns and cities. It even can cover the entire world for
for people to travel to attend meetings. People can hold meetings
example the internet. The ownership of wide area network is
through ‘virtual technology’.
sharable.
Rapid Dissemination of information
MAN – Metropolitan Area Network
Using systems such as emails, chatting, and internet telephony
It is a network within a city or the suburbs of a city. For example a
networks makes it easy to distribute and share information from
bank can have network of bank branches within different parts of
one point to another.
the city.
Telecommuting
CAN – Campus Area Network
Using networks people can work away from the office and continue
Most universities and colleges have established campuses in various
to complete important assignment and duties even at home or
part of town or a country that need to be connected together to
travelling.
form one administrative unit. Such networks which connects the
Management and control
different campuses are called CAN
Networked systems can easily, cheaply and effectively be managed
PAN – Personal Area Network
from remote locations. They do not require managers to travel or be
It is a network that connects personal hand held and mobile devices
present to conduct management duties
such as palm top computers, printers, mobile phones, personal
digital assistant and digital cameras within several feet’s of each
Disadvantages of networking
other. The devices are able to exchange low volumes of data using
Data and Network Security
transmission systems such as blue tooth and infrared technology.
The mere existence of data communication capabilities poses a
threat to security. One is able to enter into a company’s computer
COMPONENTS AND FUNCTIONS OF A TELECOMMUNICATIONS
system and tap very secret information of the company such as
SYSTEM
by Oteino B
Page 4 of 33

Telecommunications is the communication of information by
Co-axial cable
Thin coax-RG5
electronic means usually over some distance. Today, a great deal of
telecommunications transmission is digital data transmission using
Thick coax -RG8-thicknet

Fiber – optic cable
Mono mode fiber
computers to transmit data from one location to another.
Multimode fiber
TELECOMMUNICATIONS SYSTEM COMPONENTS
Wireless channels
A telecommunications system is a collection of compatible

Microwaves
hardware and software arranged to communicate information from

Satellites
one location to another. Telecommunications systems can transmit

Radio waves
text, graphic images, voice, or video information. The major

Infrared
components of telecommunications following:-
Various types of wireless technologies

Computers to process information

Blue tooth technologies

Terminals or any input/output devices that send or receive data

Wifi technologies

Communications channels, the links by which data or voice are

Hotspots
transmitted between sending and receiving devices in a
Twisted Wire
network. Communications channels use various
communications media, such as telephone lines, coaxial cable,
fiber-optic cable, and wireless transmission.

Communications processors, such as modems, multiplexers,
Twisted wire consists of strands of
controllers, and front-end processors, which provide support

functions for data transmission and reception
copper wire twisted in pairs. Twisting gives the wires physical
Communications software, which controls input and output
strength and minimizes the levels of cross talk noise. Many of the
activities and manages other functions of the communications
telephone systems in buildings had twisted wires installed for
network
analog communication, but they can be used for digital
communication as well
Coaxial Cable
COMMUNICATIONS CHANNELS
Communications channels are the means by which data are
Coaxial cable, like that used for cable television,
transmitted from one device it a network to another.
consists of thickly insulated copper wire which can
Definitions
transmit a larger volume of data than twisted wire.
1.
Bandwidth –it’s a measure of the capacity of a communication
channel i.e. the amount of data that a communication channel can
Fiber Optics and Optical Networks
transmit. It’s also the range of frequency, i.e. the difference
between the highest frequency and lowest frequency in a
communication channel. The larger the bandwidth the more the
data that can be carried or transmitted over a communication
channel.
2. Transmission speed – its measured in bits per second. It’s a
measure of the rate at which data is transmitted within
a communication channel for example a network card can operate
thickness of a human halt which are bound into cables. Data are
at speeds of 10 megabits per second 10Mbps
transformed into pulses of light, which are sent through the fiber-
Wired channel

Twisted pair cable
Fiber-optic cable consists of strands of clear glass fiber, each the
optic cable by a laser device at a rate from 500 kilobits to several
Telephone line.
Unshielded twisted pair (UTP)
Shielded twisted pair (STP)
trillion bits per second. Fiber-optic cable is considerably faster,
lighter, and more durable than media and is well suited to systems
requiring transfers of large volumes of data.
by Oteino B
Page 5 of 33
Wireless Transmission
optical fiber forms a closed loop. Data are passed along the ring
Wireless transmission that sends signals through air or space
from one computer to another and always flow in one direction.
without being tied to a physical line. Today, common technologies
for wireless data transmission include microwave transmission,
communication satellites, pagers, cellular telephone; personal
communication services (PCS), smart phones, personal digital
assistants (PDAs), and mobile data networks.
Microwave systems, both terrestrial and celestial, transmit highfrequency radio signals through the atmosphere and are widely
used for high-volume, long-distance, point-to-point communication.
Satellites are typically used for
communications in large, geographically
dispersed organizations that would be
difficult to tie together through cabling
media or terrestrial microwave. With such
wireless networks, businesspeople will be able to travel virtually
anywhere in the world and have access to full communication
capabilities including videoconferencing and multimedia-rich
Internet access.
COMMUNICATIONS NETWORKS
A number of different ways exist to organize telecommunications
components to form a network and hence provide multiple ways of
classifying networks. NETWORK TOPOLOGIES
The Star Network
The star network consists of a central host computer connected to a
number of smaller computers or terminals. This topology is useful
for applications where some processing must be centralized and
some can be performed locally.
The Bus Network
The bus network links a number of computers by a single circuit
made of twisted wire, coaxial cable, or fiber-optic cable. All of the
signals are broadcast in both directions to the entire network, with
special software to identify which components receive each
message (there is no central host computer to control the network).
The Ring Network
LAN Technologies
Each computer in the network can communicate directly with any
This is a network that spans a small geographical region as business
other computer, and each processes its own applications
premises or between adjacent buildings. LAN are privately owned
independently. in a ring topology, the connecting wire, cable, or
by Oteino B
Page 6 of 33
by the organization that sets up the network. It can be set-up using
charges and transmission costs because the costs of using the
wired or wireless channels. It is easier to secure than WAN
network are shared among many users.
LAN’s can be set-up as either peer to peer networks or client/server
Many companies are now using the Internet to transmit their data
networks.
because it is less expensive than using VANs.
Peer-to-peer network
Client/server network
NETWORK CONVERGENCE


Computers are
Most companies maintain separate networks for voice, data, and
in status and can provide
designated as being
video, but products are now available to create converged
and receive network
either servers or clients.
networks, which can deliver voice, data, and video in a single
services
Servers are powerful
network infrastructure. These multi service networks can potentially
Every computer is
computers that store
reduce networking costs by eliminating the need to provide support
responsible for managing
and programs and
services and personnel for each different type of network. Multi
its own files and programs
provides network
service networks can be attractive solutions for companies running

Less costly to set-up
services to clients.
multimedia applications, such as video collaboration, voice-data call

It’s difficult to secure and
Clients request and
centers, distance learning or unified messaging, or for firms with
protect files
receive network services
high costs for voice services. Unified messaging systems combine
Suitable for a network
from the server
voice mail, e-mail, and faxes so they can all be obtained from one
Files and programs are
system.
Failure of one computer
managed centrally by
ELECTRONIC BUSINESS AND ELECTRONIC COMMERCE
doesn’t greatly affect the
the server.
TECHNOLOGIES

More costly to set-up
Electronic mail (e-mail), groupware, voice mail, facsimile machines

Suitable for a network
(fax), digital information services, teleconferencing, data
with many computers.
conferencing, videoconferencing, and electronic data interchange
It’s easier to secure and
are key applications for electronic commerce and electronic
manage files since they
business because they provide network-based capabilities for
are managed centrally.
communication, coordination, and speeding the flow of purchase


All nodes/computers are
with few computers

network



Failure of the server can
and sale transactions.
MANAGEMENT ELECTRONIC MAIL AND GROUPWARE
greatly affect the
E-mail eliminates costly long-distance telephone charges, expediting
network
communication between different parts of an organization.
Popular LAN protocols include: Ethernet and token ring for wired
Although e-mail has become a valuable tool for communication,
groupware provides additional capabilities for supporting
networks while those of wireless network include Wi-Fi and
enterprise-wide communication and collaborative work. Individuals,
Bluetooth.
teams, and work groups at different locations in the organization
NETWORK SERVICES AND BROADBAND TECHNOLOGIES
In addition to topology and geographic scope, networks can be
can use groupware to participate in discussion forums and work on
shared documents and projects.
classified by the types of service they provide.
VOICE MAIL AND FAX
Value-Added Networks (VANs) - Value-added networks are an
alternative to firms designing and managing their own networks.
Value-added networks (VANs) are private, third-party-managed
networks that offer data transmission and network services to
subscribing firms. Subscribers pay only for the amount of data they
transmit plus a subscription fee. Customers do not have to invest in
network equipment and software and may achieve savings in line
A voice mail system digitizes the sender's spoken message,
transmits it over a network, and stores the message on disk for later
retrieval. When the recipient is ready to listen, the messages are
reconverted to audio form.
Facsimile (fax) machines can transmit documents containing both
text and graphics over ordinary telephone lines. A sending fax
machine scans and digitizes the document image. The digitized
by Oteino B
Page 7 of 33
document is transmitted over a network and reproduced in hard
Although distance learning can be accomplished with print-based
copy form by receiving fax machine. The process results in a
materials, the distance learning experience is increasingly based on
duplicate, or facsimile, of the original.
information technology, including videoconferencing, satellite or
TELECONFERENCING, DATACONFERENCING, AND
cable television, or interactive multimedia, including the Web. The
VIDEOCONFERENCING
term e-learning is increasingly being used to describe instruction
People can meet electronically, even though they are hundreds or
using purely digital technology such as CD-ROMs, the Internet, or
thousands of miles apart, by using teleconferencing, data
private networks. Some distance learning programs use
conferencing, or videoconferencing. Teleconferencing allows a
synchronous communication, where teacher and student are
group of people to confer simultaneously via telephone or via e-mail
present at the same time during the instruction, even if they are in
group communication software. Teleconferencing that includes the
different places. Other programs use asynchronous communication,
ability of two or more people at distant locations to work on the
where teacher and student don't have person-to-person interaction
same document or data simultaneously is called data conferencing.
at the same time or place.
With data conferencing, users at distant locations are able to edit
ELECTRONIC DATA INTERCHANGE
and modify data (text, such as word processing documents;
Electronic data interchange (EDI) is a key technology for electronic
numeric, such as spreadsheets; and graphic) files. Teleconferencing
commerce because it allows the computer-to-computer exchange
in which participants see each other over video screens is termed
between two organizations of standard transaction documents
video teleconferencing, or videoconferencing.
such as invoices, bills of lading, or purchase orders. EDI lowers
Desktop videoconferencing systems typically provide windows for
transaction costs because transactions can be automatically
users to see each other and capabilities for participants to work on
transmitted from one information system to another through a
the same document from different locations.
telecommunications network, eliminating the printing and handling
Most desktop systems provide audio capabilities for two-way, real-
of paper at one end and the inputting of data at the other.
time conversations and a whiteboard. The whiteboard is a shared
INFORMATION SYSTEMS
drawing program that lets multiple users collaborate on projects by
Definition of information:
modifying images and text online. Software products such as
This is processed data, it is meaningful, has value and utility (use). It
Microsoft NetMeeting and CU-SeeMe provide low-cost tools for
is used for decision making, judgment and also for control.
desktop videoconferencing over the Internet.
Information provides managers with facts and reasons to make
certain decisions and not others
DIGITAL INFORMATION SERVICES, DISTANCE LEARNING, AND E-
Characteristics of good information:
LEARNING

Powerful and far-reaching digital electronic services enable
Reliability – the provision of information for decision making
should be certain and dependable.
networked PC and workstation users to obtain information from

outside the firm instantly without leaving their desks. Stock prices,
accurately and to the point

periodicals, competitor data, industrial supplies catalogs, legal
research, news articles, reference works, and weather forecasts are
some of the information that can be accessed online. Many of these
Accuracy and precision – information should be provided
Format – it should be presented in a form that is meaningful to
the recipient and decision makers

services provide capabilities for e-mail, electronic bulletin boards,
Cost effectiveness – the process of acquiring, processing and
dissemination information should be affordable
online discussion groups, shopping, and travel reservations as well

Comprehensive – the information should be easy to understand
as Internet access.

Completeness – the information should contain all relevant
Organizations can also use communications technology to run
facts needed for decision making

distance learning programs where they can train employees in
remote locations without requiring the employees to be physically
Accessibility – the information should be readily available
whenever required.
present in a classroom. Distance learning is education or training
Organizations and enterprises that effectively handle information
delivered over a distance to individuals in one or more locations.
have a competitive edge.
by Oteino B
Page 8 of 33
Definition of information system:
Information systems provide information for decision making.
This is a set of resources that handle information in an enterprise.
Different managers make different kinds of decisions in the
It’s a set of people, tools and technologies that are used to collect,
organization. Therefore the nature and type of information they
process, distribute and manage information in an enterprise. An
need varies greatly. Information can be classified according to
information system can be manual, mechanized or computer based.
management levels

A manual information system uses pen and paper only.
The main management levels include;

Mechanized information system in addition to pen and paper,
Strategic management – this is the top level management that
uses simple machines such as calculators, cash registers, tax
makes long-term decisions in the organization. They include CEOs,
registers etc.
Chairpersons, Managing directors etc. They make decision such as
Computer based information system uses computers to handle
whether to buy a competitor firms who is not doing well in the
information. They accurately handle information, can provide
market or merger decisions or to invest in a new country e.t.c
easy accessibility to information and can easily distribute
Tactical management – they make decisions that affect the
information between decision makers.
organization in the medium-term over 1 to 2 they include:

Components of an information system:
departmental heads and group heads. Example of the decision can

People - these are divided into two categories:
be where to locate a new facility for distribution and pricing

End users – consume and use information provided by
decisions
information systems. They include; Business managers,
Knowledge based management-these are special categories of
accountants, secretaries etc.
managers that include scientists, lawyers accountants etc that
Information system professionals – create information
create new knowledge in the organization. They bring new ideas
systems. They include; network managers, system analyst,
into the organization. They will create new products and services.
programmers, web designers etc
Operations management- They manage the organization on a day to
Hardware resources - they are computer resources such as
day basis and make short term decisions. They include supervisors,
scanners, printers, disks, CDs e.t.c that are used to create,
foremen, general managers etc.
process, distribute and store information.
Types of information systems
Software resources – these are collection of programs, system
TRANSACTION PROCESSING SYSTEM TPS
software and application software used to manage and control
It is a computerized system that performs and records the daily
information systems.
routine transactions and activities that are necessary to conduct
Data base resources – this is a collection of meaningful
business. These activities include: handling sales reservations,
information that relates to the entities in the enterprise e.g. it is
payroll, employee record keeping etc.
information about workers, products and services, sales and
TPS deals with tasks and activities that are well defined and highly
purchase etc Data resources are organized and managed as a
structured such as what amount of goods to produce, what credit
database.
amount to give to a customer etc.
Rules and Procedures – this represents the way in which
Characteristics of TPS
business activities are to be conducted in the enterprise e.g.






when to give a discount or credit to a customer, how many
products to produce, what quality level should we adhere to?
business.

How to price the products etc

They accumulate information from internal operations of the
They collect specific data in specific formats and in accordance
with clearly defined rules and policies.
Telecommunication resources – this include network

They act as input to higher level systems such as MIS and DSS
equipment that facilitate distribution of information from one

They provide detailed reports about system performance
point to another. The resources include mobile phones,

They have limited analytical capability
wireless networks, radio and broadcasting and the telephone.

They provide accurate and precise data
Types of information systems:
TYPES OF TPS
by Oteino B
Page 9 of 33
In sales and marketing- TPS is used for sales management, market

They have limited analytical capabilities
research promotion and pricing. Using systems such as Sales Order

They provide the feedback path in the target vs. actual results
Systems, Market Research System and Sales Communication
enabling management control on key organisational issues
Systems.

In finance and accounting- TPS is used for budgeting maintaining
KNOWLEDGE BASED INFORMATION SYSTEM KBIS
the general ledger billing etc. Using systems such as Accounts
There are two types of workers in the organization
Payable Systems.
Data workers –who have less formal qualification, tend to use and
In manufacturing and production- TPS is used for scheduling
process information rather than create it. They include clerks,
activities, purchasing, shipping operations etc. Using systems such
secretaries managers etc. Knowledge workers- who are people with
as Purchase order system, Machine Control System and quality
formal education and members of recognized profession s such as
control system.
engineers, doctors and accountants. They create integrate and
In human resource-TPS is used for maintaining personnel records,
disseminate new knowledge in the organization. KBIS are
benefits of employees, training etc. Using systems such as Benefit
specialized systems used to create integrate and disseminate new
and Employee management system.
knowledge in organization.
MANAGEMENT INFORMATION SYSTEM MIS
OFFICE AUTOMATION SYSTEMS OAS
It is also called Management Reporting system MRS. It provides
This is an information system that helps automate the performance
routine information to decision makers to make structured
of office tasks. These systems are at almost all levels of
decisions such as re stocking decisions on bonus award etc. They
management. The OAS can be categorized into;
focus on operational efficiency and provide summaries of data. They
Software systems
are mostly used by middle managers and they summarise data from

They mostly deal with internal data
Word processors and desktop publishing- that includes Ms-
TPS and provide it in a useful format for decision making. Most of
word, PageMaker etc Used for managing documents such as
the information from MIS is provided to inform of reports that
letters, memos etc

include regular or periodic reports.
Spreadsheets - Ms-Excel that are ideal for handling numerical
Regular or periodic report- These are reports produced periodically
and financial data on issues such as budgets, cash flow,
on stated dates and times. This can be daily, weekly or even monthly
purchase and payments

e.g. daily sales of a supermarket for a period of one week.
On demand report-They provide specific information upon request.
They can also be regular reports demanded before their reporting
Image processing systems - PowerPoint, Corel draw used for
presentations, reporting etc

Communication systems - Ms-Outlook express use for
cycle e.g. a sales manager must be interested in knowing sales per
correspondence and communication within and outside the
hour instead of the usual per day.
office.

Exception reports-They are also called trigger reports and are
supposed to make the managers to act quickly to the situation. They
Others include systems such as internet explorer, presentation
software, graphic software,
are reports produced to describe unusual circumstances or out of
In the addition to the above software an automated office will
ordinary situations such as excessively high or low sales.
include a number of devices such as:-
Adhoc reports-these are reports that are requested in a format that

Scanners, printers , Fax machines and Photocopier
is not pre defined in a system.eg requesting for accounting records

Electronic Typewriters
for the last 8 years if the system only stores records for 7 years.

Digital cameras
CHARACTERISTICS OF MIS

Computers & Computers networks

They summarise key data and present information in standard

Phones
formats.

TV and Radio

They are stable over a significant time period

internet

They are oriented towards reporting on the past and not the
Advantages of OAS
present

by Oteino B
Minimize paper work
Page 10 of 33

They automate office task minimizing errors and increasing

Data driven DSS- they emphasize access to and manipulation of
efficiency task
time series of internal company data and sometimes of

Better and cheaper correspondence in the office
external data

Production of high quality system

Rapid dissemination of information

Increased increase speed and accuracy of performing task

Reduce cost of running the office
person working on shared tasks. They support group decision

Facilitate faster access and retrieval of documents
models

Model driven DSS –they emphasize access to and manipulation
of statistical, financial, optimization or simulation models


DECISION SUPPORT SYSTEMS DSS
This provides manages with information and analytical capabilities
Communication driven DSS –they support more than one
Knowledge driven DSS –they provide specialized problem
solving expertise stored as facts rules and procedures
to aid in the decision-making process. They support semi-structured
EXECUTIVE INFORMATION SYSTEM EIS
decisions that are partly well defined and partly unclear. They can be
It’s an information system intended to facilitate and support the
used in quite number of decision making scenarios such as loan
information and decision-making needs of strategic manages by
amount to give to clients, product pricing, level and quality of
providing easy to access internal and external information relevant
workforce to maintain and managing costs or expenditure etc
to meeting strategic goals of the organization.
DSS have user interfaces that are highly interactive that manages
ElS are used to analyse business performance in general, analyse
can we to ask what if questions to analyze that possible outcome of
action of competitors and economic trends and patterns in order to
a number of scenarios
develop strategic plans for the future.
Components of DSS
Internally they draw their data from MIS and DIS. With external
Database-it contains information about external and internal data
sources the data is filtered to only include important information
that will contribute to the decision-making process. This data is
necessary for their decision-making.
summarized from TPS and IMIS
They provide an easy way to use interface with lots of table and
Model base-it contains a set of algorithms and formula that aid in
graphs. They provide stronger reporting capabilities and drill down
the decision-making. This includes accounting, financial,
capabilities that have abilities to establish and define complex and
mathematical models that outline the relationship between
hidden relationship among data elements. They can be used to
variables used in the decision-making current ratio = C.A/C.L it helps
analyse, compare and highlight trends in important variables so that
to determine the liquidity of the firm and hence help in decision-
they can monitor performance and identify opportunities and
making.
problems. They evolve with the decision-making styles of top
User interface-it aids user interaction with the DSS system, provide
management. They have less analytical capabilities.
summarized information inform of tables and graphs. It is highly
Advantages of EIS
interactive and easy to navigate

The decision maker – this is a person with some knowledge in the
decision making area who use their and DSS to make decisions.
They aid top managers to make quality decisions by providing
both summarized internal and external information.

Characteristics of DSS
They are able to determine hidden & complex relationship
between data element.

They support semi and unstructured decision problems.


They can be used for individual or group decision-making.

They are adaptable and flexible.

They support a variety of decision making process and decision-
They evolve with the decision-making style of top management
improving decision-making efficiency and speed.

They are easy to use and don't require extensive computer
knowledge.
making styles.
Disadvantages of EIS

They are highly interactive and easy to use.

They are expensive to build and implement.

They have good analytical capabilities.

They have limited analytical capability and can't perform
Classification of DSS
complex computations.

by Oteino B
The benefits of EIS are difficult to quantify.
Page 11 of 33


Executives may encounter information overload.
They can't make creative responses as human experts would, in
EXPERT SYSTEM ES
unusual circumstance.
It's a knowledge based information system that uses its knowledge
Uses of ES
about a specific complex, application area to act as an expert

For customer service to direct customer queries to a specific
consultant to end users. They provide answers to questions in a very
source for help
specific problem domain by making human like inferences about

Provide an accurate estimation for insurance claims
knowledge contained in a specialized knowledge base. They are

To assist financial to make investment decision such as which
able to explain their reasoning process and conclusion to a user.
They are mostly used where there is shortage of human experts or
stock to buy or sell.
Summary review
to supplement their knowledge – You will find them in credit
Type
Informati
Processing
Information
Uses
application systems, machine diagnostic system business to
s of
on Inputs
Graphics
Outputs
Strategic
minimize costs and optimize profit and as medical systems that are
I.S
-
simulations
able to diagnose a patient’s ailment and give a recommendation for
1.EIS
Aggregat
and
medication. ES are used in artificial intelligence technology that
e data,
interactive.
provides computer systems and machines with human-like
both
intelligence. Making such machines able to reason, talk and behave
internal
like human beings.
and
Components of ES
external




Knowledge base- this represents knowledge that has been
2.DS
Database
Interactive,
Reports,
Professional
captured from a number of experts in form of a database of
S
s
simulation
responses to
staffs and
decision rules and outcomes.
analytical
and
queries, deci
managers
Inference engine – It gives the expert system ability to find
models,
analysis
sion analysis
solutions to diagnostic and prescriptive problems using if then
data
rules. It represents the search algorithm
analysis
Explanation sub-system – It’s responsible for providing reasons
tools
and explanations why certain decisions were made or
3.MI
Summary
Routine
Reports –
Used by
suggested.
S
transactio
reports,
summary
tactical
User Interface – It provides interaction between the users and
n
low-level
-scheduled
managers
the expert system. It allows users to present questions and
Data and
analysis,
-exceptional
information to the expert system and also the expert system to
simple
simple
supply the users with responses to the inference engine.
models
models
4.KB
Knowledg
Modeling,
Graphics
Professional
IS
e base
simulations
and models
and technical
Advantages of ES

It is deemed to have superior knowledge than any expert
because it collects knowledge from no.of experts.
design
They are reliable and provide consistent answers to repetitive
Specificati
tasks,
on,

They can easily be replicated.
modeling

They supplement shortage of experts in technical areas.

management
Disadvantages of ES

They are expensive to design, model and implement.

They are inflexible and can't be easily adapted.

They lack common sense needed in some decision-making.
by Oteino B
staffs
5.TP
Transacti
Sorting,
Detailed
Operation
S
on data,
messaging,
reports, lists
management
event
updating
and
and
summaries
supervisors
Page 12 of 33
6.OA
Documen
Document
Documents,
clerical
S
ts,
manageme
schedules
workers and
schedules
nt,
and mails
office
scheduling
7.ES
Human Resource
workers
and
At strategic level-HR systems identify man-power requirements to
communica
meet firms long-term business plans.
tion
At management level-IS are used to monitor and analyse
recruitment, allocation and compensation of employees.
Knowledg
Simulation,
Response to
All
e base,
modeling
queries
management
models
At operational level-IS is used to track recruitment and placement of
employees.
interactive
Information Systems from a functional perspective
-Information systems can also be categorized according to the
functional areas of an organization. This include:-
Enterprise Wide Information Systems
Enterprise systems, also known as enterprise resource planning
Finance and Accounting
(ERP) systems solve this problem by providing a single information
At the strategic level, information systems establish long term
system for organization-wide coordination and integration of key
investment goals of the firm and provide long range forecasts of the
firm’s financial performance.
business processes. Discrete business processes from sales,
production, finance, and logistics can be integrated into
At management level it helps managers to oversee and control the
firm’s financial resource.
company-wide business processes that flow across organizational
levels and functions. Enterprise systems integrate the key business
At operational level IS tracks flow of funds in the firm through
processes of an entire firm into a single software system that
transaction such as payments, receipts, cheques e.t.c
enables information to flow seamlessly throughout the
organization. These systems focus primarily on internal processes
but may include transactions with customers and vendors.
The enterprise system collects data from various key business
Manufacturing and Production
processes in manufacturing and production, finance and
At strategic level - IS supports the firm long term manufacturing
accounting, sales and marketing, and human resources and stores
such as where to locate new plants or whether to invest in new
the data in a single comprehensive data repository where they can
manufacturing technology,
be used by other parts of the business. Managers emerge with more
At management level - IS analyze and monitor manufacturing and
precise and timely information for coordinating the daily operations
production cost and recourses.
of the business and a firmwide view of business processes and
At operational level-IS is used for inventory management
information flows. The system transmits information for calculating
the salesperson’s commision to the payroll department. The system
also automatically recalculates the company’s balance sheets,
accounts receivable and payable ledgers, cost-center accounts, and
Sales and Marketing
available cash. Corporate headquarters
At strategic level-IS is used to monitor trends affecting new
Benefits
products and sales opportunities, support , planning for new

Firm structure and organization: One Organization
products and services and monitor performance of competitors.

Management: Firm wide Knowledge-based
At management level-Is support market research, advertising

Management Processes
promotional campaigns and pricing decisions.

Technology: Unified Platform
At operational level-provide customer service support,

Business: More Efficient Operations and Customer driven
processing of orders and locating and contacting customers.
Challenges
by Oteino B
Page 13 of 33

Daunting Implementation
How can organizations obtain a sizable payoff from their

High Up-front Costs and Future Benefits
investment in information systems? How can management ensure

Inflexibility
that information systems contribute to corporate value?
SUPPLY CHAIN MANAGEMENT - SCM
2. The strategic business challenge: What complementary assets are
Supply chain management systems are outward looking systems
needed to use information technology effectively? Despite heavy
focusing on helping the firm manage its relationship with suppliers.
information technology investments, many organizations are not
It facilitates close linkage and coordination of activities involved in
realizing significant business value from their systems, because they
buying, making, and moving a product.
lack—or fail to appreciate—the complementary assets required to
It link suppliers, manufacturing plants, distribution centers,
make their technology assets work. The power of computer
conveyances, retail outlets, people, and information through
hardware and software has grown much more rapidly than the
processes such as procurement, inventory control, distribution, and
ability of organizations to apply and use this technology. To benefit
delivery to supply goods and services from source through
fully from information technology, realize genuine productivity, and
consumption.
become competitive and effective, many organizations actually
Information systems can help participants in the supply chain to:-
need to be redesigned. They will have to make fundamental

Decide when and what to produce, store, and move
changes in employee and management behavior, develop new

Rapidly communicate orders
business models, retire obsolete work rules, and eliminate the

Track the status of orders
inefficiencies of outmoded business processes and organizational

Check inventory availability, transportation, and warehousing
structures. New technology alone will not produce meaningful
costs
business benefits.

Track shipments
3. The globalization challenge: How can firms understand the

Plan production based on actual customers demand
business and system requirements of a global economic

Rapidly communicate changes in product design
environment? The rapid growth in international trade and the
CUSTOMER RELATIONSHIP MANAGEMENT - CRM
emergence of a global economy call for information systems that
CRM focuses on managing all of the ways that a firm deals with
can support both producing and selling goods in many different
existing and potential new customers. CRM uses information
countries. In the past, each regional office of a multinational
systems to integrate all of the business process surrounding the
corporation focused on solving its own unique information
firm’s interactions with its customers in sales, marketing and
problems. Given language, cultural, and political differences among
service.
countries, this focus frequently resulted in chaos and the failure of
CRM systems facilitate:-
central management controls. To develop integrated, multinational,

Unified view of customers
information systems, businesses must develop global hardware,

Consistent message to customers
software, and communications standards; create cross-cultural

End to end customer care

Long term customer relationship

Identification of best customers
accounting and reporting structures; and design transnational
business processes.
4. The information technology infrastructure challenge: How can
organizations develop an information technology infrastructure
The Challenge of Information Systems: Key Management Issues
Although information technology is advancing at a blinding pace,
that can support their goals when business conditions and
technologies are changing so rapidly? Many companies are saddled
with expensive and unwieldy information technology platforms that
there is nothing easy or mechanical about building and using
cannot adapt to innovation and change. Their information systems
information systems.
are so complex and brittle that they act as constraints on business
There are five major challenges confronting managers:
strategy and execution. Meeting new business and technology
1. The information systems investment challenge: How can
organizations obtain business value from their information systems?
challenges may require redesigning the organization and building a
new information technology (IT) infrastructure.
by Oteino B
Page 14 of 33
5. Ethics and security: The responsibility and control challenge: How
The internet is a global network of computers. It is multimedia
can organizations ensure that their information systems are used in
based i.e. it presents information inform of text, voice, video,
an ethically and socially responsible manner? How can we design
animation, pictures e.t.c.
information systems that people can control and understand?
It is based on clients/server architecture in which some computers
Although information systems have provided enormous benefits
are designated as server and others as clients. Clients can be
and efficiencies, they have also created new ethical and social
computers, mobile phones, smart phones that access services from
problems and challenges.
servers. Servers are the main computers on the internet that
Knowledge Management Systems
provide internet services such as web, email, file transfer, database,
The value of a firm’s products and services is based not only on its
and communication e.t.c.
physical resources but also on intangible knowledge assets. Some
It’s based on packet switching technology in which message are
firms perform better than others because they have better
subdivided and packed into message units called data packets. The
knowledge about how to create, produce, and deliver products and
typical structure of a data packets include
services. This firm knowledge is difficult to imitate, unique, and can
Source
Destination
Message
Packet
Error
be leveraged into long-term strategic benefit. Knowledge
Address
Address
Unit
Sequence
check
Number
bits
management systems collect all relevant knowledge and experience
in the firm and make it available wherever and whenever it is
Data packets travel independently and can follow different routes in
needed to support business processes and management decisions.
the internet depending on network conditions upon reception have
They also link the firm to external sources of knowledge.
to be reassembled into the original message.
Knowledge management systems support processes for acquiring,
It is based on mesh topology that provides multiple paths for
storing, distributing, and applying knowledge, as well as processes
routing data packets from one destination to another.
for creating new knowledge and integrating it into the organization.
It is based on universally acceptable standards and protocols called
They include enterprise-wide systems for managing and distributing
TCP/IP protocol. Transmission control protocol ensures reliable
documents, graphics, and other digital knowledge objects, systems
delivery of data packets on the internet and that data packets are
for creating corporate knowledge directories of employees with
received without getting lost or received in errors.
special areas of expertise, office systems for distributing knowledge
Internet protocol IP is responsible for routing data packets from
and information, and knowledge work systems to facilitate
one point to another using the most reliable efficient route. It
knowledge creation.
chooses the best path and most economical to transfer the data
Other knowledge management applications are expert systems that
packets. Other protocol of the TCP/IP protocol include; FTP, UDP,
codify the knowledge of experts in information systems that can be
TELNET, ARP e.t.c.
used by other members of the organization and tools for
All devices on the internet are all assigned unique IP address to
knowledge discovery that recognize patterns and important
facilitate sending and receiving data. Two versions of addresses are
relationships in large pools of data. Examples of knowledge
currently used:-
management systems
IPv4 – That uses 4 decimal numbers between 0 and 255 separated
by 4 full stops. Example includes 192.168.01.24. It can provide a
maximum of 4.2biliion addresses.
IPv6 – that uses hexadecimal numbers separated by 6 full colons.
Example include 100E:27BD:FACE:1970:BD75:48F9. It is downward
compatible with IPv4 and can accommodate up to 2128 addresses.
To connect to the internet you need

An ISP connection, TCP/IP protocol suite, Web browsing
software, Internet enabled device or network, Routers for
LANs and WANs, Switches and Hubs, Cables 4 wired
Internet
connections, Network cards
by Oteino B
Page 15 of 33
replace existing distribution channels or extend them, creating
Internet
Intranet
Extranet
outlets for attracting and serving customers who otherwise would
Public network
Private network
Private network
not patronize the company. For example, Web-based discount
accessible by all
accessible only by
accessible by
brokerages have attracted new customers who could not afford
users
employees of the
employees
paying the high commissions and fees charged by conventional
organization
together and
brokerage and financial services firms. Internet technology is
trusted
helping companies radically reduce their transaction costs.
customers,
What’s more, Internet technology is providing the infrastructure for
suppliers and
running the entire business because its technology and standards
business
enable information to flow seamlessly from one part of the
partners
organization to another. Internet technology provides a much less
Based on TCP/IP
Based on TCP/IP
Based on
expensive and easier to use alternative for coordination activities
protocol and
protocol and
TCP/IP protocol
than proprietary networks.
standards
standards
and standards
Managers are using e-mail and other Internet communication
Covers mostly a
Covers a wide
capabilities to oversee larger numbers of employees, to manage
Covers a wide
small geographical
geographical
many tasks and subtasks in projects, and to coordinate the work of
geographical area
area but can also
area WAN
multiple teams working in different parts of the world. Internet
WAN
cover wide area for
standards can link disparate systems, such as those for order
multinational
processing and logistics tracking, which previously could not
organizations
communicate with each other. The Internet also reduces other
Less Secure
Very Secure
agency costs, such as the cost to coordinate activities of the firm
Secure
with suppliers and other external business partners. The low-cost
Internet Technology and the Digital Firm
connectivity and universal standards provided by Internet
For a number of years, companies used proprietary systems to
technology are the driving force behind the explosion of electronic
integrate information from their internal systems and to link to their
business and the emergence of the digital firm.
customers and trading partners. Such systems were expensive and
based on technology standards that only a few companies could
follow.
The Internet is rapidly becoming the infrastructure of choice for
electronic commerce because it offers businesses an even easier
way to link with other businesses and individuals at a very low cost.
It provides a universal and easy-to-use set of technologies and
technology standards for all organizations, no matter which
computer system or information technology
platform the organizations are using.
Trading partners can directly communicate with each other,
bypassing intermediaries and inefficient multilayered procedures.
Web sites are available to consumers 24 hours a day.
Some information-based products, such as software, music, and
videos, can actually be physically distributed over the Internet.
Vendors of other types of products and services use the Internet to
EXTRANET
distribute the information surrounding their wares, such as product
An extranet is similar to an intranet but it is made accessible to
pricing, options, availability, and delivery time. The Internet can
selected external partners such as business partners, suppliers, key
by Oteino B
Page 16 of 33
customers, etc, for exchanging data and applications and sharing
3.
Improved customer service - better access to accurate and
information.
consistent information by your staff leads to enhanced levels of
Benefits of extranets
customer service
1.
2.
3.
4.
5.
6.
7.
More integrated supply chains through the use of online
4.
Reduction in paperwork - forms can be accessed and
ordering, order tracking and inventory management
completed on the desktop, and then forwarded as appropriate
Reduced costs by making manuals and technical
for approval, without ever having to be printed out, and with
documentation available online to trading partners and
the benefit of an audit trail
customers
THE WOLRD WIDE WEB (WEB)
More effective collaboration between business partners -
The web is a system of universally accepted standards of storing,
perhaps members of a project team by enabling them to work
retrieving, formatting and displaying information using the chart
online on common documentation
server architecture on the internet. The web combines text, video,
Improved business relationships with key trading partners
sound etc i.e. it’s multimedia. It uses a graphical user interface for
because of the close collaborative working that extranets
ease of viewing and navigation
support
The documents in web are formulated according to the accepted
Improved customer service by giving customers direct access
standards
to information and enabling them to resolve their own queries

HTML-Hyper Text Mark Up Language
Improving the security of communications between you and

XML-Extension Mark Up Language
your business partners, since exchanges can take place under a

WML-Wireless Markup Language
controlled and secure environment

XHML- Extensible Hyper Text Mark Up Language
Shared news of product development exclusively with partner
A collection of documents or web pages that belong to an
companies
organisation, an individual, a group or a government is called a
website
INTRANET
In a website, the most important web page is called the home page.

It refers to an organization private or internal network
It’s the start up page that welcome the users to the website. It
designed using web standards and is protected from public
allows users to navigate to or the resources and services offered by
visits by firewalls.
the website by providing links that direct you to those services
Access rights are only given to the employees or member
To access a website, you must know its URL (uniform resource
within an organization.
locator). The URL points to a specific address of a specific resource
Firewalls are security systems that consist of hardware and
such as a website on the web. For example the URL of Kenyatta
software placed between an organization . Internal network
University is Http://www-kenyattauniversity.ac.ke
and an external network including the internet. They are
In a web page, the documents are formulated to have hyper links
programmed to intercept each message packet passing
which when you select or click on direct you to other website on a
between the two networks, examine the characteristics of the
web. The hyperlinks are either a hypertext which is a text that
message and reject unauthorized messages or access attempts.
contains a hyperlink or a hyper-media which can be a picture, an
Intranets require no special hardware and can run over any
image, a video or animation containing a hyperlink
existing network infrastructure.
To search for info on the web we use search digits such as Google,



Lycos, Ask com, Alta vista.
Benefits of intranets
A web portal like yahoo.com and MSN.com provide users with
1.
Better internal communications - corporate information can be
access to a variety of online products, services and resources on the
stored centrally and accessed at any time
web that include email, sports, news, weather, finance and health
Sharing of resources and best practice - a virtual community
etc.
can be created to facilitate information sharing and
Web Hosting
2.
collaborative working
by Oteino B
Page 17 of 33
For users to access a website it must be hosted. Web hosting is the
counter .The electronic wallet enters the shopper’s name, credit
process of uploading a website to a web server and assigning it an
card no. and shipping information automatically when invoked to
IP address and a domain name to facilitate access. A variety of
complete the purchase e.g yahoo wallet
options exist for web hosting that include:-
2.

Hosting your own websites
They are mostly used for purchase of low value goods /services e.g.

Outsourcing web hosting services
downloading music clips, posters etc they are implemented in two

Using virtual web hosting services
different ways.

Using sub domains


U
sing free web hosting services
Micro-payment system
Accumulated balance digital payment system-that allows users
to make micro-payment and on the web, accumulating debit
balance that they must pay periodically using credit cards e.g.
E-COMMERCE AND E-BUSSINESS
Qpass
E-commerce is buying and selling products and services using the

ii) Stored value payment system-enables consumer to make
internet
instant online payment based on a value stored in a digital
E-business in addition to buying and selling using the internet also
account
includes activities such as pricing, distribution, marketing,
3. Smart card
payments, shipping and other support activities to ensure
It’s a plastic card almost the size of a credit card that store and
successful online trading.
process digital information it serves as an electronic purchase in
Mobile commerce-it’s buying and selling products and services on
place of cash. it can be able to record details of financial
the internet using hand held devices such as mobile phones,
transactions and update account balances e.g. American express
internet phones, smart phones and palm top computers
blue smart card
CATEGORIES OF E-COMMERCE
4. Digital cash (E-cash) they are suitable for large purchases. Digital
E-commerce transactions can be classified into a no. of groups
cash is currently represented in electronic form that moves outside
including
normal network of money. users are supplied with direct software
1. Business to consumer E-commerce - B2C
and can exchange money with another E-cash user over internet
It involves retailing products and services to individual shoppers in
e.g. E-coin.net
the internet e.g. Barnes and Nobbs.com it sells book soft ware and
5. Digital cheque-payment system such as western union money
music to individual customers
transfer extend functionality of existing chequeing account to be
2. Business to Business E-commerce - B2B
used for online payment, they are less costly, the cheque can be
It involves selling of goods and services among businesses using the
encrypted to secure them
internet for example milpro.com is a website for selling cutting
6.Use of credit cards and debit cards
tools, grinding wheels and metal work fluid to other hundreds of
Advantages of E-commerce to business
small machining businesses
1. E-commerce system offers round the clock operations
3. Consumer to consumer E-commerce - C2C
2. Global customer reach
It involves consumer selling directly to other consumers using the
3. Low cost of acquiring services and retaining customers
internet e.g. eBay.com is a giant web auction site that allow people
4. Improved customer service
to sell their goods and services to other consumers by auctioning
5. Disintermediation such that customers and suppliers can be
the merchandise to the highest bidder
reached directly eliminating expensive middle men
Other forms of E-commerce include business to government E-
6. Firms can deploy knowledge of customer behavior using
commerce and govt to govt E-commerce
customization and tracking tools
MODES OF E-COMMERCE PAYMENTS
7. Reduce business transaction costs through use of systems such as
1.
EDS and EFT
E-commerce payment system
It securely stores credit cards and owners identification info and
Advantages of E-commerce to consumers
provide the info whenever required on E-commerce site checkout
1. Easy and convenient shopping
by Oteino B
Page 18 of 33
2. A wide variety of goods to choose from

Text Ads - e.g. Google, Facebook
3. Affordable goods to choose from

Video Ads - e.g. YouTube
4. 24 hrs shopping

Audio Ads – e.g. Saavn
5. Better customer support and services

Promoted Content - e.g. Twitter, Facebook
6. Prices of products/services can easily be compared

Paid content promotion

Recruitment Ads - e.g. LinkedIn

Classifieds - e.g. JustDial, Quikr

Featured listings - e.g. Zomato, CommonFloor
built around the internet are not yet proven

Email Ads – e.g. Yahoo!, Google
2. Legal issues-Law governing E-commerce are still being written

Location-based offers - e.g. Foursquare
Disadvantages of E-commerce
1. Unproven business models-Not all companies make money on the
web; many companies have shut down because it’s difficult to
generate enough revenue to sustain web business. Business models
and most are not enforceable as law e.g. the legality of E-mail
2. Freemium model
contact is still questionable, other problems include location laws
Perhaps the most common model used by Web services. The idea
between different countries
here is to sell a basic free product to as many customers as possible,
3. Trust, security and privacy-Many consumers have remained
but keep the premium features exclusively for paying customers. A
hesitant to make purchase over the web from unfamiliar vendors
large number of SaaS products use this model. For instance,
due to privacy, fraud and security concerns
Dropbox offers 2GB of free cloud data storage. But if one wants
4. E-commerce and E-business systems require radical changes in
more space, one has to pay up. Dropbox's purchase plans. Other
business process and environments. These create uncertainty in the
examples include Adobe Flash, Evernote, Google Docs/Drive,
organization and are likely to be resisted by employees
LinkedIn, Prezi, Slideshare, Skype, Wordpress, and many mobile
5. Difficulty of inspecting goods that are not within physical reach of
games like Farmville, Angry Birds etc.
buyer (i.e.) WYSWYG(What you see is what you get)
3. E-commerce
The traditional world of retail comprising of malls and high street
stores changed forever in the 90s when companies
like Amazon emerged. Because they could save on expensive real
estate costs, the prices offered on these stores were significantly
lower.
Selling through e-commerce can include:

Retailing – e.g. Myntra

Marketplace – e.g. Snapdeal

Sharing Economy - AirBnB

Aggregators – e.g Taxi for Sure

Group buying – e.g. Groupon

Digital goods / downloads – e.g. iTunes

Virtual goods – e.g. Zynga
1. Advertising

Training – e.g. Coursera, SimpliLearn
One of the oldest money-making sources, this model is under

Pay what you want – e.g. Instamojo (optional)
constant evolution. With the general internet population having

Auction commerce – e.g. eBay
access to ad-blocking tools, the industry has gone on to employ

Crowdsourced Services – e.g. Elance, oDesk
The common internet revenue models include:-
complex and creative methods to stay relevant.
4. Affiliate Marketing

Display Ads - e.g. Yahoo!
Mostly followed by high-traffic blogs, this is a model wherein the

Search Ads - e.g. Google
publisher signs up for affiliate programs related to their
by Oteino B
Page 19 of 33
service/content and convert their users to customers of their

Search Data – e.g. Google
affiliates/advertisers. In most cases this involves a publisher earning

Benchmarking services – e.g. Comscore
a commission when a user follows a link on their blog to another

Market research – e.g. MarketsandMarkets
site and this converts into the user buying something at the affiliate
The famous annual appeal from Jimmy Wales
site.A recent example is several well-known bloggers pushing out
8. Sponsorship/Donations
MotoG reviews and then linking to the Flipkart exclusive sale site for
Many services are sponsored by government organizations and
commissions.
major funds if it directly helps them or the world at large, for
5. Subscription Model
example, Khan Academy is funded by the Gates Foundation and
Newspapers, Gym, Magazines – yes, all of them use a subscription
Google. Then there is the Wikipedia model where the users are
model. So, it has been existent since long.In the digital domain,
asked to willingly donate small to large amounts of donation to help
software, which was once dominated by the licensing model, is
support the initiative. Many browser extensions and Wordpress
slowly moving towards a subscription model. Generally, unlimited
plugins etc. also follow this route.
usage is offered, but a few have a specified cap above which they
9. Build to sell (to Google, Facebook and others)
charge a higher rate.
This might be counterintuitive and not the best of ‘revenue models’
The different sub-models are:
because there is no revenue involved. But many companies have

Software as a Service (SaaS) – e.g. Freshdesk
built traction over time and never worried about how they are going

Service as a Service – e.g. PayU
to make money, and have finally sold for big bucks to the internet

Content as a Service
giants, for example, Instagram, Pinterest.

Infrastructure/Platform as a service – e.g. AWS, Azure
Mobile and Gaming Revenue Models

Membership Services – e.g. Amazon Prime

Paid App Downloads – e.g. WhatsApp

Support and Maintenance – e.g. Red Hat

In-app purchases – e.g. Candy Crush Saga, Temple Run

Paywall – e.g. ft.com, NYtimes

In-app subscriptions – e.g. NY Times app
6. Licensing

Advertising – e.g. Flurry
Licensing could be for usage, which is the model for Intellectual

Transactions – e.g. Airtel Money
Property (patents, copyrights, trademarks). This type of license is

Freemium – e.g. Zynga
usually limited by time, territory, types of products, volume, etc. The

Subscription -- e.g. World of Warcraft
other kind is for certification, like the McAfee SECURE trustmarks

Premium – e.g. xBox games
used for Internet websites.

Downloadable Content – e.g. Call of Duty

Ad-supported

Per Device/Server License – e.g. Microsoft products

Per Application instance – e.g. Adobe Photoshop

Per Site License – e.g. Private cloud on internal

E-GOVERNMENT
infrastructure
This refers to the application of electronic means in the interaction
Patent Licensing – e.g. Qualcomm
between government and citizens, government and businesses as
7. Selling Data
well as in internal government operations to simplify and improve
High-quality, exclusive data is very valuable in the digital age. Many
democratic and business aspects of governance
companies specialize in lead generation of potential customers and
Areas where E-government is beneficial and applicable
sell them to third parties. You don’t pay for services like Google,

Online license applications and renewals
Twitter and Facebook. But they aggregate high quantities of data

Online renewal of car tags and vehicles registration
about you and several millions like you and show you contextual

Payment of property taxes online
advertisements based on this data. Which is why ‘you are not the

Payment of utility bills online
customer, you are the product being sold.’

Registering and voting online

Downloading of forms on websites e.g. passport application

User data – e.g. LinkedIn
by Oteino B
Page 20 of 33

Submitting forms online e.g. ID application
One of the benefits of outsourcing is that your organization will be

Online help with filling forms e.g. permits, birth and death
free to concentrate on your core business. By outsourcing all your
certificates
non-core functions, your employees can be put to better use and
Online repository of public information such as laws, rules and
you will be able to see a huge growth in your core business.
regulations
7. Improved customer satisfaction

Online polls and questionnaire
With timely deliveries and high-quality services you can impress your

Online discussion groups to facilitate democratic exchange of
customers. Outsourcing can help you benefit from increased
Ideas
customer satisfaction and your customers will remain loyal to your

Advantages of E-government
organization.

It reduces government expenditure as a result of reduced work
8. Increased efficiency
force
Another benefit of outsourcing is increased efficiency. Your non-

Cheaper and better services for citizen of a nation
core business functions will be performed efficiently by your

Round the clock services i.e. services can be provided anytime
outsourcing partner, while your core functions can be efficiently

Services can easily and cheaply reach geographically dispersed
carried out in-house.
areas
Disadvantages of Outsourcing
Disadvantages of E-government
· Loss of managerial control, because it is more difficult to manage

outside service providers than managing one’s own employees
Expensive to implement and establish due to very high costs to
be incurred in the installation of ICT hardware and software

Limited access to only those with the knowledge to use the
between two companies and the time spent to coordinating the
Insecurity threats due to use of vulnerable networks and
contract.
systems

· Often the hidden costs are difficult to calculate or prepare for.
These include legal costs related to putting together a contract
systems

working possibly in the same building.
Control and management of systems might be a challenge
· Threat to security and confidentiality. If your company is
outsourcing processes like payroll, medical transcriptions or other
confidential information, a company must be very careful in
OUTSOURCING
The process of turning over an organization’s computer center
choosing which process it wants to outsource and to which
provider.
operations, telecommunications networks or applications
· A possible loss of flexibility in reacting to changing business
development to external vendors is called outsourcing
conditions, lack of internal and external customer focus and sharing
The Benefits of Outsourcing
cost savings may also be a disadvantage of outsourcing.
1. Take advantage of the cost-advantages
Outsourcing can give you access to cost-effective services. Getting
access to high-quality services at a cost-effective price is the biggest
· Unfavorable contract lengths, loss of competitive edge, problems
in contract renewal, and contractual misunderstandings.
• The company that outsourcers can get into serious trouble if the
benefit that you can get while outsourcing.
service provider refuses to provide business due to bankruptcy, lack
2. Save Big
One of the benefits of outsourcing is that you can save on every
of funds, labor etc
• Outsourcing requires the control of the process being outsourced
aspect of your business and increase your profits. When you
by transferred to the service provider. Thus the company may lose
outsource, you can save on time, effort, infrastructure and
control over its process
manpower.
3. Get access to specialized services
By outsourcing you can get expert and skilled services. This benefit
of outsourcing has been the key reason why several outsourcers opt
Michael porter’s five forces model
According to Michael Porter, a firm can survive and succeed in the
for outsourcing.
long run if it successfully develops strategies to confront five
4. Concentrate more on your core business
by Oteino B
Page 21 of 33
competitive forces that shape the structure of competition in its

Differentiate
industry. These include:

Innovate
1. Rivalry of competitors within its industry

Promote Growth
2. Threat of new entrants

Develop Alliances
3. Threat of substitutes

Improve quality and efficiency
4. Bargaining power of customers

Build an IT platform
5. Bargaining power of suppliers

Use inter organizational information systems to create
A variety of competitive strategies can be developed to help a firm

confront these competitive forces.
Cost Leadership Strategy
switching costs that lock in customers and suppliers.
-
Use investments in IT to build barriers to entry against industry
outsiders.

Become a low cost producer of products and services
Find ways to help suppliers or customers reduce their costs
Use IT components to make substitution of competing
products unattractive.
Increase the costs of competitors.
Differentiation Strategy
Improving Business Processes:
Develop ways to differentiate products and services from
Investments in information technology can help make a firm’s
competitors. Reduce the differentiation advantages of competitors.
operational processes substantially more efficient, and its
Innovation Strategy
managerial processes much more effective. By making such
-
Find new ways of doing business:
improvements to its business processes a firm may be able to:
Develop new products & services
1.
Dramatically cut costs
Enter new markets or marketing segments.
2.
Improve the quality and customer service
Establish new business alliances
3.
Develop innovative products for new markets
Find new ways of producing products/services
Find new ways of distributing products/services
Promoting Business Innovation
Growth Strategies
Investments in information systems technology can result in the
Significantly expand the companys capacity to produce goods and
development of new products, services, and processes. This can:
services.
1. Create new business opportunities
Expand into global markets
2. Enable a firm to enter new markets
Diversify into new products and services
3. Enable a firm to enter into new market segments of existing
Integrate into related products and services.
markets.
Alliance Strategies
Lock In Customers & Suppliers
Establish new business linkages and alliances with customers,
Investments in information technology can also allow a business to
suppliers, competitors, consultants and other companies (mergers,
lock in customers and suppliers (and lock out competitors) by
acquisitions, joint ventures, forming virtual companies, etc.).
building valuable new relationships with them. This can be
accomplished by:
Strategic Roles for Information Systems:
1. Deters both customers and suppliers from abandoning a firm for
How can the preceding competitive strategy concepts be applied to
its competitors or intimidating a firm into accepting less
the strategic role of information systems? Information technology
profitable relationships.
can be used to implement a variety of competitive strategies. These
include the five basic competitive strategies (differentiation, cost,
innovation, growth, alliance), as well as other ways that companies
2. Offer better-quality service to customers allows a company to
differentiate themselves from their competitors.
3. Create inter organizational information systems in which
can use information systems strategically to gain a competitive
telecommunications networks electronically link the terminals
edge. For example:
and computers of businesses with their customers and

suppliers, resulting in new business alliances and partnerships.
Lower Costs
by Oteino B
Page 22 of 33
Creating Switching Costs
2. Break geographic barriers.
A major emphasis in strategic information systems is to build
3. Break cost barriers.
switching costs into the relationships between a firm and its
4. Break structural barriers.
customers or suppliers. That is, investments in information systems
Breaking Time Barriers
technology can make customers or suppliers dependent on the
Information technology is used to shorten the intervals between
continued use of innovative, mutually beneficial inter organizational
the various critical steps in a business process. Telecommunications
information systems. Then, they become reluctant to pay the cost
is a lot faster than most other forms of communications, thus, it
in time, money, effort, and inconvenience that it would take to
provides information to remote locations immediately after it is
change to a firm’s competitors. Example: APOLLO (USA) airline
requested.
reservation system, and GEMNI (CAN) airline reservation system
Breaking Geographic Barriers
Raising Barriers to Entry
Telecommunications networks enable you to communicate with
Investment in information technologies that increase operational
people almost anywhere in the world. Telecommunications and
efficiency can erect barriers to entry for new players in the industry,
computing technologies make it possible to distribute key business
and can discourage firms already in the market. This can be
activities to where they are needed, where they are best performed,
accomplished by:
or where they best support the competitive advantage of a
1. Increasing the amount of investment or the complexity of the
business.
technology required to compete in a market segment.
Breaking Cost Barriers
2. Discourage firms already in the industry and deter external firms
Computers and telecommunications can often significantly reduce
from entering the industry.
the cost of business operations when compared with other means
Leveraging a Strategic IT Platform
of information processing and communications. For example, they
Information technology enables a firm to build a strategic IT
can reduce costs in such areas as production, inventory,
platform that allows it to take advantage of strategic opportunities.
distribution, or communications. Information technologies have
Typically, this means acquiring hardware and software, developing
also helped companies cut labour costs, minimize inventory levels,
telecommunications networks, hiring information system
reduce the number of distribution centres, and lower
specialists, and training end users. A firm can then leverage
communications costs.
investment in information technology by developing new products
and services.
Information systems security
Developing a Strategic Information Base
Introduction
Information systems allow a firm to develop a strategic information
It is very difficult to secure computer systems due to their
base that can provide information to support the firm's competitive
complexity and cost. The security of computer system is further
strategies. A firms’ database is considered a strategic resource
complicated by the need to balance between security and
which is used to support strategic planning, marketing, and other
productivity, since too strict security measures curtail productivity.
strategic initiatives. These resources are being used by firms in such
The other important issue is that to be viable security policy and
areas as:
framework should be duly implemented and enforced in the
1. Strategic planning
organization. Employees, system auditors, managers and other
2. Marketing campaigns
users who have either direct or indirect access to computer systems
3. Erecting barriers to entry for competitors
are likely to be the major perpetrators of computer security attacks.
4. Finding better ways to lock in customers and suppliers
Employees and other stakeholders have to be monitored and
Breaking Business Barriers:
motivated to actively take the initiative to protect and secure
Several vital capabilities of information technology that break
computer systems.
traditional barriers to strategic business success include:
Computer systems are difficult to protect for a number of reasons
1. Break time barriers.
that include:by Oteino B
Page 23 of 33

The complexity of computerized systems
may involve modification, deletion or destruction.

The difficulty of detecting changes to computerized systems
There are many ways in which computer systems can be attacked

The many possible security threats and attacks such as virus
and threatened. This include
attack, hacking, malware, password attack e.t.c
1.
Virus attack – A virus is an illegitimate program capable

The prohibitive cost of securing computerized systems
replicating very fast and infecting and damaging computer

The many access points in computerized systems especially
programs and data. A time bomb is a virus program whose
networked system increase vulnerability
damage is triggered by the attainment of a certain specific
Properties of a secure system
time.
Authentication – Identify and ensure that users are who they
2.
purport to be. It requires that users provide usernames and
Theft – Stealing computer hardware and software and other
devices such as camera, printers, e.t.c
passwords.
3.
Password attack –This is where someone try to figure out your
Authorization – Once users have been authenticated they are
password and use it to illegally access computer systems
allowed to access all or part of the computer system depending on
without your authority for malicious intentions.
who they are. The system should provide different rights and
4.
Hacking – This is unauthorized access to computer systems
privileges to different categories of users. For example systems
with malicious intentions. Crackers also illegally access
administrators are given unlimited access to computerized systems
computer systems but not with malicious intention however
unlike normal users who are have limited access
they can cause damage and heavy losses just like hackers
Confidentiality - Protect information value and preserve the
5.
Malware – Targets organizations connected to the Internet.
confidentiality of sensitive data. Information should not be
Cyber vandals use data flowing through the Internet to
disclosed without authorization.
transmit computer viruses, which disable the computers they
Integrity - Ensure the accuracy and reliability of the information
"infect".
stored on the computer systems. Information should not be altered
6.
Spyware –They are software routines that travel in the
without authorization. Communication channels should relay
network with capability to intercept confidential information
messages in a secure manner to ensure that integrity.
that is conveyed in such networks
Availability - Ensure the continued of the information system and
7.
Spamming - usually targets organizations connected to the
all its assets to legitimate users at an acceptable level of quality of
Internet. Marketers send out unsolicited mass e-mail to
service. Any event that degrades performance or quality and of a
recipients who have not requested the information.
system affects availability
8.
Jamming - Targets organizations connected to the Internet.
Legislation - Ensure conformity to laws, regulations and standards
Jammers use software routines to tie up the computer hosting
Security refers to the policies, procedures, and technical measures
a website so that legitimate users can't access the site.
used to prevent unauthorized access, alteration, theft, or physical
9.
Sniffing - Targets organizations linked to the Internet. Sniffing,
damage to information systems. Security can be promoted with an
a form of eavesdropping, involves placing a piece of software
array of techniques and tools to safeguard computer hardware,
to interpret information passing from a user to the computers
software, communications networks, and data.
hosting a website. This information can include credit card
A security attack is the act or attempt to exploit vulnerability in a
numbers and other confidential data.
system. Security controls are the mechanisms used to control an
10. Phishing – It is a criminal and fraudulent process of attempting
attack. Attacks can be classified into active and passive attacks.
to acquire sensitive information such as user names,
Passive attacks - attacker observes information without interfering
passwords, and credit user details by sending e-mails and pop
with information or flow of information. He/she does not interfere
up advertisement that entice users to provide such
with operation. Message content and message traffic is what is
information.
observed.
11.
Active attacks - involves more than message or information
Spoofing - Targets organizations linked to the Internet
Spoolers fraudulently misrepresent themselves as other
observation. There is interference of traffic or message flow and
by Oteino B
Page 24 of 33
organizations, setting up false websites where they can collect
confidential information from unsuspecting visitors to the site.
12. Eavesdropping / Tapping – It is intercepting electronic
22. Trojan horse - It is a category of virus program which pretends
to be an otherwise genuine program and can easily hide
beneath the genuine programs. It can be able to cause damage
transmission as they travel from one point to another.
and delete files and programs without easily being detected.
Espionage mostly involves spying with a view to obtain
They are mostly spread using pirated computer games, music,
confidential data and information.
video and software.
13. Denial of service attack - In the denial of service attack, the
23. Piggy backing – It is the act following an authorized user
hacker flooded the server with requests to connect to other
through a secured door or electronically attaching to a
servers that did not exist. The server would try to establish
telecommunication link to intercept and possibly alter
connections with the nonexistent servers and wait for a
transmission in order to gain access to computer resources.
response while being flooded with thousands of other bogus
24. Piracy – It is the illegal act of copying, reproducing, and
connection requests. This caused the server to deny service to
distributing software programs without authority. Software
legitimate users because it was overwhelmed trying to handle
pirates download software programs from the internet or get
the bogus requests
the software from other users and crack the product key which
14. Cyber terrorism – It is perpetuating acts of terrorism using
computers and internet resources. It can involve sending
allows them to use the software free without purchasing it.
25. Worms – It is like a virus program however it does not damage
threatening messages and posting scary videos and pictures of
computer files and programs. The worms have ability to
the internet.
replicate very fast and take up any available storage space and
15. Identity theft / Masquerading – It is assuming somebody’s
transmission space preventing users from saving data in
identity by falsifying information, profiles or stealing their
computer systems or even be able to transmit data from one
passwords and user names. It is usually done for malicious
point to another by clogging transmission networks.
intention and to fraudulently obtain favours and information
about the person.
26. Vandalism – Disrupting telecommunication transmission by
vandalizing cables and power transmissions.
16. Errors – Errors are either intentional or unintentional. They are
due to mistakes, lack of knowledge and skills. Errors can be
caused by hardware failure, software faults, or people actions.
17. Natural disaster –These are natural calamities such as floods,
earthquakes, strong winds, wild fires e.t.c that are caused by
27. Equipment failure – Hardware system and other peripheral
devices fail due to fault in their systems.
28. Data diddling – It is also called data corruption. It involves
changing and altering data without authority and for malicious
intentions and personal gains.
situation beyond the control of human beings.
18. Sabotage – It is a criminal activity that involves affecting the
CREATING A CONTROL ENVIRONMENT
normal operation of the computer system and provision of
To minimize errors, disasters, interruptions of service, computer
services. These can involve acts such as cutting cables,
crimes, and breaches of security, special policies and procedures
interfering with power supply, pouring water on the server
must be incorporated into the design and implementation of
e.t.c.
information systems. The combination of manual and automated
19. Salami slicing – It involve taking small but insignificant sum of
measures that safeguard information systems and ensure that they
money from many people or business transactions. If the
perform according to management standards is termed controls.
money is accumulated it becomes significant and of high value.
Controls consist of all the methods, policies, and organizational
20. Trap door – A program installed on a computer that permits
procedures that ensure the safety of the organization's assets, the
access to the computer, thus bypassing the normal
accuracy and reliability of its accounting records, and operational
authentication process.
adherence to management standards.
21. Fraud – Committing financial misappropriation using
computerized and electronic systems for personal gains.
Physical security procedures that may be adopted:
by Oteino B
Page 25 of 33
1. Bolting door locks — These require the traditional metal key to

Internet downloads and attachments
gain entry. The key should be stamped 'Do not duplicate.'

Pirated computer software, games, music and video
2. Combination door locks — These utilize a numeric keypad or

Hackers and malicious programmers
dial to gain entry. The combination should be changed at regular

Device drivers that accompany hardware and peripheral
intervals or whenever an employee with access is transferred, fired
devices
or subject to disciplinary action.
Virus protection measures
3. Electronic door locks — these utilize a magnetic or embedded

Use updated antivirus program to regularly scan computers
chip-based plastic card key or token entered into a sensor card
and files. These are programs such as Internet Kaspersky,
reader to gain access. A special code internally stored in the card or
Norton, Mr Clean, Macfee.
token is read by the sensor device that activates the door locking

Use diskless workstations
mechanism.

Ensure that all programs are installed only by authorized
4. Biometric door locks — use of individual’s unique body features,
persons
such as voice, retina, fingerprint or signature, activates these locks.

Internet downloads and attachments must be scanned
5. Manual logging — All visitors should be required to sign a

Protect against password cracking
visitor's log indicating their name, company represented, reason for

Maintain backup of important files and programs
visiting and person to see. Logging should be at the front reception
Protecting against password cracking
desk and at the entrance to the computer room.
The following principles can be observed when using passwords
6. Electronic logging — All access should be logged with

unsuccessful attempts highlighted.
Do not use your background information such as name, date of
birth, and anniversary as passwords.
7. Identification Badges (Photo Ids) — Badges should be worn

and displayed by all personnel. Visitor badges should be a different
memorisable

colour from employee badges for easy identification.
Passwords should not be written down they should be
8. Video cameras — They should be located at strategic points
Use a mixture of letters, numbers and special symbols as
passwords e.g. P@ssw0rd or xyz@2012
and monitored by security guards.

Passwords should be unique to an individual
9. Security guards — They could be used together -with video

Periodically change your passwords
cameras for efficiency.

Once a password has been used do not use it again i.e. recycle
10. Controlled visitor access - All visitors should be escorted by a
it

responsible employee.
11. Alarm systems — should be linked to inactive entry points,
Allow users a maximum of 3 attempts when trying to use their
passwords
motion detectors and the reverse flow of enter or exit only doors.

12. Controlled single entry point A controlled single entry point
Passwords should neither be too long or too short around 5-8
characters
monitored by a receptionist should be used by all incoming
Physical security measures
personnel.

Bolting door locks – use of keys and padlocks
Virus protection

Combination door locks – use of combination of unique

Signs that the computer has virus

The computer performance and speed suddenly degrades

Electronic door locks – use of swipe cards

Size of the file increase and decrease

Biometric door locks – use of biological features to gain access

The computer suddenly reboots or hangs

Manual logging and electronic logging

The computer posts funny or unfamiliar messages on the

Use of security personnel
screen

Use of badges and uniforms
A message or alert from the antivirus program

Escort agents
Sources of computer virus

CCTV cameras


Terminal locks

numbers to gain access
Infected storage devices such as flask disks
by Oteino B
Page 26 of 33
Environmental control measures
Private Key encryption
It includes measures such as
The same key is used to decrypt the data as well as encrypt the data.

Use of fire extinguisher
This private key must be known by both the sending and receiving

Use of fire and water detectors
encryption devices. Its main disadvantage is the safe and reliable

Strategically locating the computer and server room
distribution of the private key among the numerous encryption

Using uninterruptible power supply
devices. Since if the private key is intercepted, then the integrity of

Use of fire proof materials such as asbestos
the encryption systems are compromised.

Emergency power switch off
Public key encryption

Properly wiring and cabling ensuring that cables and wires are
It combines the use of both private and public key. In public key
placed in their panels and conduits
encryption the sending encryption devices encrypts a document
Logical access control measures
using the intended recipient public and the originating parties’

Use of usernames and passwords
private keys. The public keys are readily available in the public key

Firewalls
encryption directories. To decrypt the document the receiving

Encryption
encryption/decryption device must be programmed with its own

Access rights and privileges
private key and the sender’s public key. These eliminate the need

Intrusion detection systems
for safe transmission of private key between the sending and

Data classification and segregation
receiving parties. The 2 keys are related.

Terminal usage constraints
Fire walls
Personnel issue on security
Firewall is generally placed between internal LANs and WANs and
Most computer crimes and security breaches are done by
external networks such as the Internet. The firewall controls access
employees of the organization or with people who have access to
to the organization's internal networks by acting like a gatekeeper
computer system like vendors, outsourced employees, maintenance
that examines each user's credentials before they can access the
personnel, clients, cleaners and security personnel.
network. The firewall identifies names, Internet Protocol (IP)
The organization should come up with security policies and
addresses, applications, and other characteristics of incoming
practices to ensure that these personnel are closely monitored for
traffic. It checks this information against the access rules that have
any acts of security breaches.
been programmed into the system by the network administrator.
These policies can include:-
The firewall prevents unauthorized communication into and out of

Segregation of responsibility
the network, allowing the organization to enforce a security policy

Training employee on security issue
on traffic flowing between its network and the Internet.

Periodic employee performance evaluation
Digital signatures

Job rotation
Digital signatures and digital certificates help with authentication. A

Secure termination policy
digital signature is a digital code attached to an electronically

Good hiring practices
transmitted message that is used to verify the origins and content

Enforcement of security measures
of a message. It provides a way to associate a message with the
Encryption
sender, performing a similar to a written signature. For an electronic
This is the process of scrambling data. It involves using
signature to be legally binding in the court someone must be able to
mathematical algorithm (Key) to change plaintext into cipher text.
verify that the signature actually belongs to whoever sent the data
Decryption involves changing back cipher text into plaintext.
and that the data were not altered after being "signed." Digital
Encryption protects against data corruption, password cracking,
certificates are data files used to establish the identity of people and
and Eavesdropping e.t.c
electronic assets for protection of online transactions. A digital
Encryption is based on mathematical algorithm usually called keys.
certificate system uses a trusted third party known as a certificate
The keys are used to decrypt and encrypt the data. There are 2
authority (CA) to validate a user's identity. The digital certificate
common ways of encryption.
system would enable, for example, a credit card user and merchant
by Oteino B
Page 27 of 33
to validate their digital certificates were issued by an authorized and
Security awareness – all employees, including management need be
trusted third party before exchange of data
aware on a regular basis of the importance of security.
Intrusion detection systems
Contingency planning
They represent fulltime monitoring tools that are placed at the most
A contingency is an unscheduled interruption of computing services
vulnerable point of an organization network to continually detect
that requires measures outside the day to day routine operating
and deter intruders. They look for known problems such as bad
procedures. A contingency plan must provide for standby
passwords or check to see if important files have been removed and
procedures to continue operations, recovery procedures to correct
modified and send warnings to the systems administrator.
the breakdown arid personnel management policies for the
Some intrusion detection systems shut down sensitive parts of a
procedures.
network if it receives unauthorized trap.
Contents of a contingency plan include:
Vulnerability
•
Definition of responsibilities.
Vulnerability is a weakness within the system that can potentially
•
Setting priorities.
lead to loss or harm. The threat of natural disasters has instances
•
Back-up and standby arrangements.
that can make the system vulnerable. If a system has programs that
•
Communication with staff.
have threats (erroneous programs) then the system is vulnerable.
•
Public relations.
Security policy
•
Risk assessment.
Security failures can be costly to business. Losses may be suffered
as a result of the failure itself or costs can be incurred when
DISASTER RECOVERY PLANNING
recovering from the incident, followed by more costs to secure
Disaster recovery planning devises plans for the restoration of
systems and prevent further failure. A well-defined set of security
computing and communications services after they have been
policies and procedures can prevent losses and save money. The
disrupted by an event such as an earthquake, flood, or terrorist
information systems security policy is the responsibility of top
attack. Business managers and information technology specialists
management of an organization who delegate its implementation
need to work together to determine what kind of plan is necessary
to the appropriate level of management with permanent control.
and which systems and business functions are most critical to the
The policy contributes to the protection of information assets. Its
company
objective is to protect the information capital against all types of
risks, accidental or intentional. An existing and enforced security
Importance of disaster management
policy should ensure systems conformity with laws and regulations,

To keep the business running uninterrupted after disaster
integrity of data, confidentiality and availability.

To protect assets and information against possible abuse and
Key components of such a policy include the following:
security threats
Management support and commitment - management should

To develop a plan that will reduce risks and uncertainty
approve and support formal security awareness and training.
Access philosophy - access to computerized information should be
Developing a disaster recovery plan
based on a documented 'need-to-know, need-to-do' basis.

Compliance with relevant legislation and regulations
Assess the risk of particular disaster such as floods, power
outages or terrorist attacks, occurring at your specific company
Access authorization – the data owner or manager responsible for

the accurate use and reporting of the information should provide
written authorization for users to gain access to computerized
Identify the most mission critical applications, the files they use
and where these files and applications are located

Develop an action plan for handling mission critical applications
information
such as using manual processes or running these applications
Reviews of access authorization – like any other control, access
at a safe location
controls should be evaluated regularly to ensure they are still
effective
by Oteino B
Page 28 of 33

Outline responsibilities of individuals staff members and
This is a traditional system development methodology is no longer
procedures to follow during a disaster. including how to locate
popular as it was in the late 70’s and early 80’s. SDLC consists of
and communicate with the employees
taking a large system development process and breaking the

Test the disaster recovery plan at least once a year
process into sequential stages done progressively one after the

Make sure you have the backing and support of a senior
other until the final system is developed. It main stages include
management to ensure compliance
Preliminary study
INFORMATION SYSTEMS DEVELOPMENT
Feasibility study
A systems analysis methodology provides a way to tackle the
development of each information system in a structured and
System investigation
detailed way. Typically, it dictates what the main stages of the
development are but also what steps should be done at each stage
System design
and what must be completed before moving on to the next stage. It
may also define what is produced at each stage, how the user
System construction
should be involved in the development and in short, provides a
complete plan for the project. A methodology usually consists of a
System implementation
collection of most of the following:

An underlying life-cycle model.
System review and maintenance

Project stages and the steps that make up each stage.
SDLC is suitable for large system projects that take long to develop.

Deliverables for each step/stage, the form of each
It is also suitable for projects which have clearly defined
model/deliverable, and the techniques to be used to produce
requirements.
each deliverable.
Advantages of SDLC
A set of principles / decision guidelines, that allow a project


planner to construct a detailed method for each particular
project — choices to determine which steps and deliverables
easy to manage, solve and control.

are appropriate, and the level of detail/abstraction to take for
In the stage, proper documentation is produced resulting in
well documented systems.

each model.
The system development is broken down into activities that are
Characteristics of a good development methodology
It possible to track development from one point to another
since each stage provides input to the other stage

Easy to understand and manage
Disadvantages of SDLC

Flexible and adaptable

It’s inflexible and cannot incorporate new requirements easily.

It should be an open methodology i.e. no restrictions on its use

The methodology focuses more on the process rather than the

It should reflect modern practices

It should focus more on producing the product than the
product.

process
It’s not suitable for web-based systems that incorporate
internet technology.

Approaches to systems development
Most system development using SDLC are always over budget

Prototyping

Packaged based development

Waterfall model

System Development life Cycle
PACKAGED BASED SOFTWARE DEVELOPMENT

End user Computing
Sometimes developing a system means finding the right software
and beyond time

A working system is availed later in the development cycle deny
user involvement
package that can readily be implemented from software vendors.
SYSTEMS DEVELOPMENT LIFE CYCLE SDLC
This methodology simply involves purchasing the right equipment
i.e. hardware & telecommunication and installing readymade
by Oteino B
Page 29 of 33
software that best suits the organisations new systems needs.
single computer system that can serve all those departments’
Advantages of this model
particular needs. ERP allows a company to automate and integrate
1.
Low development costs.
the majority of its business processes, including product planning,
2.
Shorten system implementation system cycle.
purchasing, production control, inventory control, interaction with
3.
Proven reliability and performance benchmark
suppliers and customer, delivery of customer service and keeping
4.
Requires less technical development staff
track of orders, to share common data and practices across the entire
5.
Future software updates provided by the software vendors.
enterprise, and to produce and access information in a real-time
Disadvantages
environment. ERP enables decision-makers to have an enterprise-
1.
The software package may not be a perfect fit for organisation
wide view of the information they need in a timely, reliable and
requirement.
consistent fashion. ERP applications market grew to $25.4 billion in
The best package may not be compatible / functional with
2005, and will reach $29 billion in 2006. Over the next five years, the
existing systems.
market will grow at an average of 10%.
2.
3.
4.
The organisation is in the hands of the package supplier in
terms of getting changes and enhancement made.
Advantages of ERP
It doesn't provide competitive advantage since even
With ERP to automate processes, the benefits are as follows:

Increase inventory turns

Increase inventory accuracy rate
END USER COMPUTING

Reduce inventory costs
End-user computing happens when computer-literate users

Improve customer service
develop their own systems. E.g. a faculty in a university develops its

Reduce setup times
own system.

Reduce paper work.
Advantages include:

Provide a unified customer database usable by all
competitors can acquire the software.

Reduce development backlog

Reduce time lag in development

Provide greater and effective control on account.

Creativity and expertise of end users is put to use;

Faster response and follow ups to customers

Users’ needs are met in exactly the way they want;

Improves supply demand linkage with remote locations

Increases user awareness of IS

Relieves work load of IT professional
applications
and branches in different locations
Disadvantages include:

Higher quality, less re-work

Timely revenue collection, improved cash flow

Duplication and waste of resources

Increased costs
Risks of ERP

Questionable quality
There is 70% percent of all ERP projects fail to be fully implemented,

Data integrity concerns
even after three years. Few companies are making full use of their

Resources are not used effectively.
ERP systems, despite the high cost of the software and the length of

Hardware and software might be incompatible between
time an implementation can take. Once installed, more than 50% of
departments.
companies said it was hard to make changes to ERP software in order
Systems can become badly designed and even worse
to meet any changes in business processes or requirements. More
documented.
than 50% of the companies did not measure their return on
Threats to data, as controls to who may access it or modify it
investment from business applications. The failure rates for ERP


projects are relatively high and could lead to the bankruptcy of the
ENTERPRISE RESOURCE PLANNING -ERP
corporation.
Enterprise Resource Planning (ERP) is software that attempts to
integrate all departments and functions across a company onto a
by Oteino B
Page 30 of 33
Challenges of ERP Implementation
institutions considered essential to the quality of life in an

Customization Related Challenges
information society.

Redesigning Business Processes
Five Moral Dimensions of the Information Age

Cost of upgrades/updates
The major ethical, social, and political issues raised by information

Training

Little flexibility in adapting to business processes

High integration costs

High maintenance costs

Lengthy or incomplete integrations
systems include the following moral dimensions:
Information rights and obligations. What information rights do
individuals and organizations possess with respect to information
about themselves? What can they protect? What obligations do
individuals and organizations have concerning this information?
Property rights and obligations. How will traditional intellectual
property rights be protected in a digital society in which tracing and
Critical Success Factors of Implementing ERP
accounting for ownership are difficult and ignoring such property
Critical factors to ERP implementation success:

ERP teamwork and composition;

Change management program and culture;

Top management support;

Business plan and vision; '

Business process re-engineering and minimum
rights is so easy?
Accountability and control. Who can and will be held accountable
and liable for the harm done to individual and collective information
and property rights?
System quality. What standards of data and system quality should
we demand to protect individual rights and the safety of society?
customization;
Quality of life. What values should be preserved in an information-

Effective communication;

Project management;

Software development, testing, and troubleshooting;

Monitoring and evaluation of performance;

Project champion; and

Appropriate business and information
and knowledge-based society? Which institutions should we protect
from violation? Which cultural values and practices are supported by
the new information technology?
Key Technology Trends That Raise Ethical Issues
technology legacy systems.
ETHICS
Ethics refers to the principles of right and wrong that individuals,
acting as free moral agents, use to make choices to guide their
behaviors. Information systems raise new ethical questions for both
The doubling of computing power every 18 months has made it
individuals and societies because they create opportunities for
possible for most organizations to use information systems for their
intense social change, and thus threaten existing distributions of
core production processes. As a result, our dependence on systems
power, money, rights, and obligations.
and our vulnerability to system errors and poor data quality have
Ethical issues in information systems have been given new urgency
increased.
by the rise of the Internet and electronic commerce. Internet and
Advances in data storage techniques and rapidly declining storage
digital firm technologies make it easier than ever to assemble,
costs have been responsible for the multiplying databases on
integrate, and distribute information, unleashing new concerns
individuals—employees, customers, and potential customers—
about the appropriate use of customer information, the protection
maintained by private and public organizations. These advances in
of personal privacy, and the protection of intellectual property.
data storage have made the routine violation of individual privacy
Other pressing ethical issues raised by information systems include
both cheap and effective. Already massive data storage systems are
establishing accountability for the consequences of information
cheap enough for regional and even local retailing firms to use in
systems, setting standards to safeguard system quality that protect
identifying customers.
the safety of the individual and society, and preserving values and
by Oteino B
Page 31 of 33
Advances in data analysis techniques for large pools of data are a
Due process is a related feature of law-governed societies and is a
third technological trend that heightens ethical concerns because
process in which laws are known and understood and there is an
companies and government agencies are able to find out much
ability to appeal to higher authorities to ensure that the laws are
detailed personal information about individuals. With contemporary
applied correctly.
data management tools companies can assemble and combine the
Information Rights: Privacy and Freedom in the Internet Age
myriad pieces of information about you stored on computers much
Privacy is the claim of individuals to be left alone, free from
more easily than in the past.
surveillance or interference from other individuals or organizations,
Think of all the ways you generate computer information about
including the state. Claims to privacy are also involved at the
yourself—credit card purchases, telephone calls, magazine
workplace: Millions of employees are subject to electronic and other
subscriptions, video rentals, mail-order purchases, banking records,
forms of high-tech surveillance (Ball, 2001). Information technology
and local, state, and federal government
records (including court and police
records). Put together and mined
properly, this information could reveal
not only your credit information but also
your driving habits, your tastes, your
associations, and your political interests.
Companies with products to sell purchase relevant information from
and systems threaten individual claims to privacy by making the
invasion of privacy cheap, profitable, and effective.
these sources to help them more finely target their marketing
campaigns. The use of computers to combine data from multiple
sources and create electronic dossiers of detailed information on
Federal Trade Commission Fair Information Practices Principles
individuals is called profiling.
ETHICS IN AN INFORMATION SOCIETY
Ethics is a concern of humans who have freedom of choice. Ethics is
about individual choice: When faced with alternative courses of
action, what is the correct moral choice? What are the main features
Property Rights: Intellectual Property
Contemporary information systems have severely challenged
existing law and social practices that protect private intellectual
property. Intellectual property is considered to be intangible
of ethical choice?
property created by individuals or corporations. Information
Basic Concepts: Responsibility, Accountability, and Liability
technology has made it difficult to protect intellectual property
Ethical choices are decisions made by individuals who are
responsible for the consequences of their actions. Responsibility is a
because computerized information can be so easily copied or
distributed on networks. Intellectual property is subject to a variety
key element of ethical action.
Responsibility means that you accept the potential costs, duties,
of protections under three different legal traditions: trade secret,
copyright, and patent law.
and obligations for the decisions you make. Accountability is a
feature of systems and social institutions: It means that mechanisms
TRADE SECRETS
Any intellectual work product—a formula, device, pattern, or
are in place to determine who took responsible action, who is
responsible. Systems and institutions in which it is impossible to find
compilation of data used for a business purpose can be classified as
a trade secret, provided it is not based on information in the public
out who took what action are inherently incapable of ethical
domain. Protections for trade secrets vary from state to state. In
analysis or ethical action.
Liability extends the concept of responsibility further to the area of
laws. Liability is a feature of political systems in which a body of laws
is in place that permits individuals to recover the damages done to
general, trade secret laws grant a monopoly on the ideas behind a
work product, but it can be a very tenuous monopoly. Software that
contains novel or unique elements, procedures, or compilations can
be included as a trade secret. Trade secret law protects the actual
them by other actors, systems, or organizations.
ideas in a work product, not only their manifestation. To make this
claim, the creator or owner must take care to bind employees and
by Oteino B
Page 32 of 33
customers with nondisclosure agreements and to prevent the
music; compactness—making theft easy; and difficulties in
secret from falling into the public domain.
establishing uniqueness.
The limitation of trade secret protection is that although virtually all
The proliferation of electronic networks, including the Internet, has
software programs of any complexity contain unique elements of
made it even more difficult to protect intellectual property. Before
some sort, it is difficult to prevent the ideas in the work from falling
widespread use of networks, copies of software, books, magazine
into the public domain when the software is widely distributed.
articles, or films had to be stored on physical media, such as paper,
COPYRIGHT
computer disks, or videotape, creating some hurdles to distribution.
Copyright is a statutory grant that protects creators of intellectual
Using networks, information can be more widely reproduced and
property from having their work copied by others for any purpose
distributed.
during the life of the author plus an additional 70 years after the
As more and more homes adopt high-speed Internet access, illegal
author’s death. For corporate-owned works, copyright protection
file sharing of videos will pose similar threats to the motion picture
lasts for 95 years after their initial creation. Congress has extended
industry. The manner in which information is obtained and
copyright protection to books, periodicals, lectures, dramas, musical
presented on the Web further challenges intellectual property
compositions, maps, drawings, artwork of any kind, and motion
protections.
pictures. The intent behind copyright laws has been to encourage
Web pages can be constructed from bits of text, graphics, sound, or
creativity and authorship by ensuring that creative people receive
video that may come from many different sources. Each item may
the financial and other benefits of their work. Most industrial
belong to a different entity, creating complicated issues of
nations have their own copyright laws, and there are several
ownership and compensation.
international conventions and bilateral agreements through which
nations coordinate and enforce their laws.
Reading list
Copyright protects against copying of entire programs or their
Global Information system and Business Value chain model…
parts. Damages and relief are readily obtained for infringement. The
drawback to copyright protection is that the underlying ideas
behind a work are not protected, only their manifestation in a work.
A competitor can use your software, understand how it works, and
build new software that follows the same concepts without
infringing on a copyright.
PATENTS
A patent grants the owner an exclusive monopoly on the ideas
behind an invention for 20 years. The congressional intent behind
patent law was to ensure that inventors of new machines, devices,
or methods receive the full financial and other rewards of their labor
and yet still make widespread use of the invention possible by
providing detailed diagrams for those wishing to use the idea under
license from the patent’s owner.
CHALLENGES TO INTELLECTUAL PROPERTY RIGHTS
Contemporary information technologies, especially software, pose
severe challenges to existing intellectual property regimes and,
therefore, create significant ethical, social, and political issues.
Digital media differ from books, periodicals, and other media in
terms of ease of replication; ease of transmission; ease of alteration;
difficulty classifying a software work as a program, book, or even
by Oteino B
Page 33 of 33
Download