Developing MIS System

advertisement
DEVELOPING MIS SYSTEM
Question paper
1. What is BPR? How IT is an enabler for BPR?
2. What is Brick and Mortar ?How Virtual companies are
different from Brick and Mortar business?
3. How IT helps in becoming the Agile company?
4. What is SDLC?What are the steps involved in SDLC?
5. What is maintenance and its types?
6. What is Testing ? Difference between White box and
Black box testing?
7. What is Predictive and Adaptive approach for software
development with example?
8. What is Waterfall model?
System Development Life
Cycle
 SDLC (System Development Life Cycle) is
defined as the process (as a whole) of
developing system or software to meet certain
requirements.
 It covers many activities




Understanding why the system should be built,
Studying the project feasibility,
analyzing problems,
choosing the system design and architecture,
implementing and testing it,
 up to delivering the system as product to the user.
 The systems development life cycle (SDLC) is
a conceptual model used in project
management that describes the stages
involved in an information system
development project.
Phases of SDLC
 System development life cycle (SDLC).






includes six steps
investigation,
analysis,
design,
development,
implementation and
maintenance.
SDLC Methodology
 The existing system is evaluated. Deficiencies are
identified. This can be done by interviewing users of
the system and consulting with support personnel.
 The new system requirements are defined. In
particular, the deficiencies in the existing system
must be addressed with specific proposals for
improvement.
 The proposed system is designed. Plans are laid out
concerning the physical construction, hardware,
operating systems, programming, communications,
and security issues.
SDLC Methodology Contd..
 The new system is developed. The new components and
programs must be obtained and installed. Users of the system
must be trained in its use, and all aspects of performance must be
tested. If necessary, adjustments must be made at this stage.
 The system is put into use. This can be done in various ways. The
new system can phased in, according to application or location,
and the old system gradually replaced. In some cases, it may be
more cost-effective to shut down the old system and implement
the new system all at once.
 Once the new system is up and running for a while, it should be
exhaustively evaluated. Maintenance must be kept up rigorously
at all times. Users of the system should be kept up-to-date
concerning the latest modifications and procedures.
Phases of SDLC
Investigation Phase
 System Investigation :What is the Fault in the System?
 Preliminary Analysis
 Determining the nature and scope of the problems to be solved is
carried out.
 Possible solutions are proposed,
 Feasibility Study is carried out
Here are some possible definitions of problems:
1. The existing system has a poor response time, i.e. it is slow.
2. It is unable to handle workload.
3. The problem of cost, i.e. the existing system is not economical.
4. The problem of accuracy and reliability.
5. The requisite information is not produced by the existing system.
6. The problem of security.
Key Activities
 Conduct preliminary investigation/feasibility study
 Determine scope of problem/project
 Identify constraints to systems development
 Identify resources required
Feasibility Study
 The feasibility of a proposed system can be assessed in terms
of four major categories, as summarized below.
1. Organizational Feasibility: the extent to which a proposed
information system supports the objective of the organization.
2. Economic Feasibility: is the cost benefit analysis.In this
study, costs and returns are evaluated to know whether returns
justify the investment in the system project.
(a) The cost of conducting a full system investigation.
(b) The cost of hardware and software for the class of
application being considered.
(c) The benefits in the form of reduced costs, improved
customer service, improved resource utilization or fewer costly
errors.
 3. Technical Feasibility: whether reliable
hardware and software resources required to
meet the needs of the proposed system can be
acquired or developed by the organization in the
required time.

4. Operational Feasibility: the willingness and
the ability of the management, employees,
customers, suppliers, etc., to operate, use and
support a proposed system.
Analysis Phase/Requirement
definition Phase
 The aim of this phase is to document the existing user functions,
processes, activities and data.
 The analyst understands the type of information and the nature
of the functions required for the propose system. The analyst
makes a brief survey of the requirements and tries to analyze the
performance of the system which is to be developed.
Key Activities
 Gather business requirements
 Build trust and rapport with users
 Document the existing system
 Develop preliminary data and process models
 Verify requirements and current system/procedures with users
How to get information
 Direct observation
 Interviews (individual and groups, structured
and unstructured)
 Questionares
 Surveys
 Records
 Observations
 Activity logs/work diaries
Requirements
 User Interface Requirement
 Processing Requirements
 Storage Requirements
 Control requirements
Output of analysis phase is System requirement
specification, a requirements specification for
a software system, is a complete description of the
behavior of a system to be developed and may
include a set of use cases that describe interactions
the users will have with the software.
Flow Charts
 A system flow chart, or data flow chart, is used to describe
the flow of data through a complete data-processing system.
Different graphic symbols represent the clerical operations
involved and the different input, storage, and output
equipment required. Although the flow chart may indicate the
specific programs used, no details are given of how the
programs process the data. In other words, it's like a DFD.
 A program flow chart is used to describe the flow of data
through a particular computer program, showing the exact
sequence of operations performed by that program in order to
process the data. Different graphic symbols are used to
represent data input and output, decisions, branches, and
subroutines.
Design Phase
 Objective of the design phase is to create a
design that satisfies the agreed software
requirements.
Successful completion of the Design Phase
should comprise:
 Transformation of all requirements into
detailed specifications covering all aspects of
the system
 Approval to progress to the Development
Phase
System Design Phase








Data structure (e.g. field names, data types and lengths, filenaming, folder structure schemes etc
How the data is to be acquired (what procedures and equipment will be needed?)
Data input procedures and equipment (e.g. keyboard? barcode reader? ICR/OMR?)
Interfaces (e.g. what will a data entry screen look like? Will people need to leave the main screen to
access functions? How will menus be organised into commands and submenus? What shortcut keys will
be used? Will you use a text box, listbox, combo box, tickbox for a particular item of data entry? What
colour scheme will be used? What navigation scheme will be used? What icons represent what
meaning? Will the layout of the data entry form help users enter data in the required order and the
required format? Control procedures - What validation rules will be used on what fields to check for
data reasonableness, existence or format?) What will different error messages say?
What workloads and capacities the system must be capable of - e.g. storage capacities, number of
transactions per hour, disaster-recovery abilities
Documentation and training requirements for different types of users
Validation and storage methods to be used
Backup requirements and procedures - what needs to be backed up, how often, how backups are
stored, what backup scheme will be used?
Tools for System Design
 A data flow diagram is used to describe the flow of data





through a complete data-processing system.
Different graphic symbols are used to represent input, process
,storage, and output.
Flow chart may indicate the specific programs used, no details
are given of how the programs process the data.
Gantt Charts is detailed timeline of events in a project laid out.
Structure chart consist of a top-down description of a process
and its sub-processes.
Data Dictionary - describes (for example) a database's fields,
types, lengths, validation rules, formulae.
Development phase
 The design must be translated into a machinereadable form.
 The code generation step performs this task. If
the design is performed in a detailed manner,
code generation can be accomplished without
much complication.
 Programming tools like compilers, interpreters,
debuggers etc. are used to generate the code.
 Different high level programming languages
like C, C++, Pascal, Java are used for coding.
Testing Phase
 Software testing is the process of checking software, to
verify that it satisfies its requirements and to detect errors.
Software testing methods are traditionally divided into
black box testing and white box testing.
Black box testing
Black box testing treats the software as a black-box without
any understanding of internal behavior. It aims to test the
functionality according to the requirements. Thus, the
tester inputs data and only sees the output from the test
object.
White box testing
White box testing, however, is when the tester has access
to the internal data structures and algorithms.
Implementation Phase
In SDLC, implementation refers to post-development process of
guiding to use the system. This includes customizations,
Systems Integrations, User Policies, User Training and Delivery.
Software Implementations involve several professionals like
Business Analysts, Technical Analysts, Solution Architect , and
Project Managers.
Analysts in the implementation phase acts as the intermediator
between user and developers.
The Implementation Phase includes:
Hardware and software installation
User Training
Documentation
Implementation
 Deploying of new system in its target
environment. The purpose of the
Implementation Phase is to deploy and
enable operations of the new information
system in the production environment.
Types of Implementation











Direct Approach:Installation of new system and the immediate discontinuation of old
system.Sometimes called Cut off.This approach produces rime gap when no system is working.
Parallel Approach:The new system is installed and operated in parallel with the current system
untill it has been tested throughly.
It is the opposite of the direct implementation approach.
It is costly because of duplicating facelities and personnel to maintain the dual system.
Advantage is the accuracy of the system.
Modular Approach:”Pilot Approach” refers to implementation of a system in the organisation on a
module basis.for example:an inventory system might be implemented with only selected product
grouping or with all the products on one location of multiple location oreganisation.
Advantages
The risk of system failure is localised
The problem is identified in the system can be corrected before further implementation.
Other operating personnel can be trained in a live environment before the system is implemented
at their location.
Phase-in Approach:”Cut over by segments” which is similar to the modular approach. The only
difference is the system itself is segmented and not the organisation.
Maintenance
 Maintenance includes all the activity after the
installation of software that is performed to
keep the system operational.
Types of Maintenance
 System maintenance is an ongoing activity, which covers a wide
variety of activities, including removing program and design errors,
updating documentation and test data and updating user support.
For the purpose of convenience,
Maintenance may be categorized into three classes, namely
i) Corrective,
ii) Adaptive, and
iii)Perfective.
Corrective Maintenance: - Corrective maintenance refers to action
only taken when a system or component failure has occurred.

This type of maintenance implies removing errors in a program,
which might have crept in the system due to faulty design or
wrong assumptions.
Adaptive Maintenance: - In adaptive maintenance, program functions are
changed to enable the information system to satisfy the information
needs of the user. This type of maintenance occurs due to organizational
changes which may include:
a) Change in the organizational procedures,
b) Change in organizational objectives, goals, policies, etc.
c) Change in forms,
d) Change in information needs of managers.
e) Change in system controls and security needs, etc.
Perfective Maintenance: - Perfective maintenance means adding new
programs or modifying the existing programs to enhance the
performance of the information system.
 To respond to user’s additional needs which may be due to the changes
within or outside of the organization.
 Outside changes are primarily environmental changes that include:
a) Changes in governmental policies,laws, etc.,
b) Economic and competitive conditions, and
c) New technology.
Data Flow diagrams
Graphical representation of the logical flow of
data. It is also know as bubble chart.
A DFD consists of a series of bubbles joined by
lines representing data flow in the system.
 Square: Represents the source and
destination of system data.
 Arrow: It represents the data flow.
 Circle or Bubble: Represents a process that
transforms incoming data flow into outgoing
data flow.
 Open Rectangle: Represents a data store.
Rules for DFD
 Process should be named and numbered
 The direction of flow is from top to bottom
and from left to right.
 When a process is exploded into lower levels
they are numbered properly.e.g-5 can be
exploded in 5.1,5.2..
 The name of data stores, source and
destinations are written in capital letters.
ER Diagrams
 A graphical representation of entities and their
relationships to each other.
It is used in organization of data within databases.
The elements of an ERD are:
 Entities are the "things" for which we want to
store information. An entity is a person, place,
thing or event.
 Attributes are the data we want to collect for an
entity.
 Relationships describe the relations between
the entities.
 A relationship is how the data is shared
between entities.
There are three types of relationships
 1. One-to-One
 For example, in a database of employees,
each employee name (A) is associated with
only one social security number (B).
 One to Many
 For example, for a company with all employees
working in one building, the building name (A) is
associated with many different employees (B), but
those employees all share the same singular
association with entity A.
 Many-to-Many
 For example, for a company in which all of its
employees work on multiple projects, each
instance of an employee (A) is associated with
many instances of a project (B), and at the same
time, each instance of a project (B) has multiple
employees (A) associated with it.
Relationships
Decision Tree
 Graphical representation of a sequence of
decisions and actions.
 The decision tree represents various
conditions and actions that resembles
branches of a tree that why it is called
decision tree.
Example
 A computer firm offers the following discount





policy to its customers
If payment is made within 10 days
3% discount is allowed on orders above Rs
10000
2% for orders between 5000 to 10000
1% for orders upto 5000
However if the payment is made more than
10 days than no discount is allowed.
Objectives of SDLC
 An SDLC has three primary business
objectives:
- Ensure the delivery of high quality systems;
- Provide strong management controls;
- Maximize productivity.
Waterfall Model
 In "The Waterfall" approach, the whole process
of software development is divided into
separate process phases.
 The phases in Waterfall model are: Requirement
Specifications phase, Software Design,
Implementation and Testing & Maintenance.
 All these phases are cascaded to each other so
that second phase is started as and when
defined set of goals are achieved for first phase
and it is signed off, so the name "Waterfall
Model".
Waterfall Model
Phases of waterfall maodel

1.
Requirement Analysis and Definition
All possible requirements of the system to be developed are captured in this
phase.
2. Requirements are a set of functions and constraints that the end user (who will
be using the system) expects from the system.
3.
The requirements are gathered from the end user are analyzed for their validity,
and the possibility of incorporating the requirements in the system to be
developed is also studied.
4. Finally, a requirement specification document is created which serves the
purpose of guideline for the next phase of the model.

1.
System and Software Design
The requirement specifications from the first phase are studied in this phase and
a system design is prepared.
2. System design helps in specifying hardware and system requirements and also
helps in defining the overall system architecture.
3.
The system design specifications serve as an input for the next phase of the
model.

1.
Implementation and Unit Testing
On receiving system design documents, the work is divided in modules/units and
actual coding is started.
2. The system is first developed in small programs called units, which are
integrated in the next phase.
3.
Each unit is developed and tested for its functionality; this is referred to as unit
testing. Unit testing mainly verifies if the modules/units meet their
specifications.

1.
Integration and System Testing
These units are integrated into a complete system during integration phase and
tested to check if all modules/units coordinate with each other, and the system
as a whole behaves as per the specifications.
2. After successfully testing the software, it is delivered to the customer.


Operations & Maintenance
This phase of the model is virtually a never-ending phase. Actions taken to solve
the problems or errors arises after the system become operational.
Spiral Model
 The spiral model, also known as the spiral
lifecycle model, combines the features of the
prototyping model and the waterfall model.
 The spiral model is intended for large,
expensive, and complicated projects.
Steps of Spiral Model
 The new system requirements are defined in as much detail as





possible. This usually involves interviewing a number of users
representing all the external or internal users and other aspects of the
existing system.
A preliminary design is created for the new system.
A first prototype of the new system is constructed from the
preliminary design. This is usually a scaled-down system, and
represents an approximation of the characteristics of the final
product.
A second prototype is evolved by a fourfold procedure: (1) evaluating
the first prototype in terms of its strengths, weaknesses, and risks; (2)
defining the requirements of the second prototype; (3) planning and
designing the second prototype; (4) constructing and testing the
second prototype.
The cycle keep on repeating itself untill the customer is satisfied.
The final system is constructed, based on the refined prototype.
Iterative Model
 Iteration means the act of repeating a process with
the aim of approaching a desired goal,target or
result.
 An iterative lifecycle model does not attempt to
start with a full specification of requirements.
 Instead, development begins by specifying and
implementing just part of the software, which can
then be reviewed in order to identify further
requirements.
 This process is then repeated, producing a new
version of the software for each cycle of the model.
Prototype
 A prototype is a working model that is functionally




equivalent to a component of the product. In many
instances the client only has a general view of what is
expected from the software product.
In such a scenario where there is an absence of detailed
information regarding the input to the system, the
processing needs and the output requirements, the
prototyping model may be employed.
This model reflects an attempt to increase the flexibility
of the development process by allowing the client to
interact and experiment with a working representation
of the product.
The developmental process only continues once the
client is satisfied with the functioning of the prototype.
At that stage the developer determines the
specifications of the client’s real needs.
Software Prototyping
 Software prototyping, a possible activity during
software development, is the creation of
prototypes, i.e., incomplete versions of the software
program being developed.
 A prototype typically implements only a small
subset of the features of the eventual program, and
the implementation may be completely different
from that of the eventual product.
 The purpose of a prototype is to allow users of the
software to evaluate proposals for the design of the
eventual product by actually trying them out, rather
than having to interpret and evaluate the design
based on descriptions.
Data Flow Daigram





A data-flow diagram (DFD) is a graphical representation of the "flow" of
data through an information system.
Entities: can be people, departments, other companies, other systems
are called sources if they are external to the system and provide data to
the system, and sinks if they are external to the system and receive
information from the system
Processes must have at least one input and at least one output at the
primitive.
Data stores: can be online or “hard copy” (see notes on logical VS
physical DFD’s below) are labeled with a noun (e.g. the label “customer”
indicates that information about customers is kept in that data
store)data is stored whenever there are more than one process that
needs it and these processes don’t always run one after the other (if the
data is ever needed in the future it must be stored)
Data flows :must originate from and/or lead to a process and data stores
cannot communicate with anything except processes
Enterprise resource planning
 ERP software means Enterprise Resource Planning
systems.
 ERP systems are large computer systems that
integrate all facets of an operation, including
development, manufacturing, sales and marketing.
 This integration is accomplished with through a
database shared by all the application programs.
An ERP is a “do it all” system that performs everything
from entry of sales orders to customer service.
 The purpose of ERP is to facilitate the flow of
information between all business functions inside the
boundaries of the organization and manage the
connections to outside stakeholders.
Scope of ERP
 The scope offered by ERP is to include other
“back-office” functions such as order
management, financial management,
warehousing, distribution production, quality
control, asset management and human
resources management.
 The evolution of extended-ERP systems has
further expanded in recent years to include more
“front-office” functions, such as sales force and
marketing automation, electronic commerce
and supply chain management systems.
Evolution of ERP
 In 1990 Gartner Group first employed the
acronym ERP as an extension of material
requirements planning (MRP), later
manufacturing resource planning and
computer-integrated manufacturing.
 ERP systems initially focused on automating
back office functions that did not directly
affect customers and the general public.
History of ERP
 Inventory Management & Control : Inventory
Management and control focuses on appropriate
level of stock in a warehouse.
 Material Requirement Planning (MRP) : Materials
Requirement Planning (MRP) utilizes software
applications for scheduling production processes.
MRP generates schedules for the operations and
raw material purchases based on the production
requirements of finished goods, the current
inventories levels and the lot sizing procedure for
each operation.
 Manufacturing Requirements Planning (MRP II) : MRPII
focused on the manufacturing process. Manufacturing
Requirements Planning or MRP utilizes software
applications for coordinating manufacturing processes,
from product planning, parts purchasing, inventory control
to product distribution. A major purpose of MRPII is to
integrate primary functions (i.e. production, marketing and
finance).
 Enterprise Resource Planning (ERP) : Enterprise Resource
Planning or ERP uses multi-module application software for
improving the performance of the internal business
processes. ERP systems often integrates business activities
across functional departments, from product planning,
parts purchasing, inventory control, product distribution,
fulfillment, to order tracking.
ERP Software Modules
 ERP software consists of many enterprise
software modules that are individually
purchased, based on what best meets the
specific needs and technical capabilities of the
organization.
 Each ERP module is focused on one area of
business processes, such as product
development or marketing.
 Some of the more common ERP modules include
those for product planning, material purchasing,
inventory control, distribution, accounting,
marketing, finance and HR.
ERP Model
ERP Vendors
Depending on your organization's size and needs there are a number of
enterprise resource planning software vendors to choose from in the
large enterprise, midmarket and small business ERP markets.
The ERP vendors are continuously expanding the capabilities of their
packages by adding functionality for new business functions such as
sales force automation, supply-chain, order management, data
warehousing, maintenance repair-and-overhaul, etc. SAP-AG, Oracle,
JD Edwards,PeopleSoft and Baan – collectively called the “Big Five” of
ERP software vendors coovering 70 percent of ERP market share.
 Large Enterprise ERP (ERP Tier I)
The ERP market for large enterprises is dominated by three companies: SAP,
Oracle and Microsoft.
 Midmarket ERP (ERP Tier II)
For the midmarket vendors include Infor, QAD, Lawson, Epicor, Sage and
IFS.
 Small Business ERP (ERP Tier III)
Exact Globe, Syspro, NetSuite, Visibility, Consona, CDC Software and
Activant Solutions.
Advantages and Disadvantages
 ERP systems have certain advantages such as
low operating cost and improving customer
service.
 Tight Integration, Huge storage needs,
networking requirements and training overheads
are frequently mentioned ERP problems.
 ERP projects are large, costly and difficult and
that they require large investment in capital and
staff and management time. ERP systems are
complex, and implementing one can be a
difficult, time-consuming and expensive project
for a company
Selection criteria of ERP
 The three distinct types of an ERP system
evaluation were vendor, functional and
technical. Criteria such as vendor reputation,
financial stability, long term viability and the
vendor’s vision/corporate direction were
factors that were considered during the
vendor evaluation.
 Enterprise resource planning (ERP) system is a business






management system that
comprises integrated sets of comprehensive software,
which can be used, when
successfully implemented, to manage and integrate all the
business functions within an
organisation. These sets usually include a set of mature
business applications and tools
for financial and cost accounting, sales and distribution,
materials management,
human resource, production planning and computer
integrated manufacturing, supply
chain, and customer information
Customer Relationship
Management
 Customer Relationship Management (CRM) is
specific software that allows a company to
measure and control contacts with customers.
 CRM is a business philosphy which provides a
vision for the way your company wants to deal
with your customers.
 CRM can be used for controlling contacts with a
customer either by phone, fax, mail and e-mail.
The data collected can be used for research and
analysis of the customer relationship.
Characteristics of CRM
 It will track and report every interaction with a customer,
describing the customer's purchase, interest or demand. It
will report also the changing needs of the customer and the
way your business reacts effectively to them.
 Furthermore, the CRM will be a universal instrument for
collecting data about the service requests, order entry,
satisfaction and billing.
 3. Third, the CRM will be able to measure the performance
of the business on the basis of internal benchmarks.
 4. Last the CRM will facilitate the working processes by
emphasizing on the positive and exclude the negative
practices in your customer relations center.
Benefits of CRM
• Improve customer Loyalty
• Gain Competitive Advantage over
competitors
• Increase Sales Revenue
• Increase Profitability
• Improve internal Productivity
• Enhance executive decision making
• Decrease costs and expenses
• Deliver Value Added Service to your clients
CRM
CRM Model
 Customer Attraction. This stage intends to attract the customer towards
the website in order to expose the client to our online offers. In this part
of the cycle the customer must be able to find out about our products or
services in an easy and simple way .
 Customer Acquisition. This stage has the important mission of
converting the visitor into a buyer of our products. In order for this to
happen the potential customer has to be able to:

evaluate the product, when possible visualising it as close as he would do in a
traditional shop
 compare the product with other similar options.
 select the product that best fits their needs, eventually purchasing it
 Customer Analysis. In this stage the data gathered about the different
actions and transactions preformed by the customers are analysed in
different ways with the goal of understanding and better using the
customers'



buying patterns
navigation patterns through the website
problems they suffer when trying to find information, products or both.
CRM Cycle
 Plan your marketing strategy, determining the
customer segment you will target and the campaigns
you will aim at those segments.Those campaigns
should incorporate some kind of loyalty programmes
to develop long term relationship with the customer.
 Interact with customers through different channels
and execute the marketing plan so that both the
company and its customer gets most out of their
interactions.
 Process the information captured during the
interaction and ensure that customer requirement are
fulfilled.
 Leverage the information collected during previous
stages and use that to update your plan in order to take
relationship with the customer to a higher level.
Vendors of CRM
 Vendors of CRM are
Microsoft,SAP,Oracle,SiebelSystems
,SalesForce ,Maximizer Software.
CRM Cycle
CRM Cycle- Understand and
Differentiate
 Understand what they value, what types of service are important to
them, how and when they like to interact, and what they want to buy.
True understanding is based on a combination of detailed analysis and
interaction.
 Profiling to understand demographics, purchase patterns and channel
preference.
 Segmentation to identify logical unique groups of customers that tend to
look alike and behave in a similar fashion.


Primary research to capture needs and attitudes.
Customer valuation to understand profitability, as well as lifetime value or longterm potential. Value may also be based on the customer's ability or inclination to
refer other profitable customers.
 Customers need to see that we are differentiating our service and communications
based both on what we've learned independently and on what they've told us.
 At the same time, differentiation should be based on the value customers
are expected to deliver.
Develop and Customize
 Earlier companies were product-oriented and used to
develop products and services and expected customers to
buy them. In a customer-focused world, product and
channel development have to follow the customer's lead.
Organizations are increasingly developing products and
services, and even new channels, based on customer needs
and service expectations.
 Most organizations today are not able to cost-effectively
customize products for individual customers. However,
products, services, channels and media can be customized
based on the needs of quantitative customer segments.
The extent of customization should be based on the
potential value delivered by the customer segment.
Interact and deliver
 Interaction is also a critical component of a successful CRM
initiative. It is important to remember that interaction doesn't just
occur through marketing and sales channels and media; customers
interact in many different ways with many different areas of the
organization including distribution and shipping, customer service
and online.
 To foster relationships, organizations need to insure that:
 All areas of the organization have easy access to relevant, actionable
customer information.
 All areas are trained how to use customer information to tailor
interactions based on both customer needs and potential customer value.
 With access to information and appropriate training, organizations will be
prepared to steadily increase the value they deliver to customers.
Acquire and Retain
 Successful customer retention is based very
simply on the organization's ability to
constantly deliver on three principles:
 Maintain interaction; never stop listening.
 Continue to deliver on the customer's definition of
value.
 Remember that customers change as they move
through differing life stages; be alert for the changes
and be prepared to modify the service and value
proposition as they change.
 The use of information technology in e-business
has major impacts on society, and thus raises
serious ethical issues in the areas such as:
Crime
Privacy
Individuality
Employment
Health
Working Conditions
 Computer crime is a growing threat to society
by the criminal or irresponsible actions of
computer individuals whoare taking
advantage of the widespread use and
vulnerability of computers and the Internet
and other networks.
IT and Ethical Issues
 Ethics refers to the principles of right and wrong that
individuals, acting as free moral agents, use to make
choices to guide their behaviors.
 Many ethical issues are arising due to Information
Technology for both individuals and societies.
 IT creates opportunies and helped in social progress
but it can also be used to commit crimes and threaten
cherished social values. The development of
information technology will produce benefits for many
and costs for others.
Employment Challenges:
 The impact of IT on employment is a major ethical
concern and is directly related to the use of
computers to achieve automation of work
activities.
 The use of e-business technologies has created new
jobs and increased productivity. However, it has
also caused a significant reduction in some types of
job opportunities.
Computer Monitoring
 One of the most explosive ethical issues
concerning the quality of working conditions
in e-business is computer monitoring
 Computers are being used to monitor the
productivity and behavior of employees while
they work. Supposedly, computer monitoring
is done so employers can collect productivity
data about their employees to increase the
efficiency and quality of services.
Computer monitoring has been criticized as unethical because:
1.
2.
3.
4.
5.
It is used to monitor individuals, not just work, and is done
continually, thus violating workers’ privacy and personal
freedom.
Is considered an invasion of the privacy of employees, because in
many cases, they do not know that they are being monitored, or
don’t know how the information is being used.
Employee’s right of due process may be harmed by the improper
use of collected data to make personneldecisions.
It increases the stress on employees who must work under
constant electronic surveillance.
It has been blamed for causing health problems among
monitored workers.
Challenges to Individuality
A frequent criticism of e-business systems
concerns their negative effect on the
Individuality of people. Computer- based systems
are criticized as:
 Being impersonal systems they eliminate the
human relationships present in non computer
systems. Humans feel a loss of identity.
 Humans feel a loss of individuality as some
systems require strict adherence to detailed
procedures.
Health issues
The use of IT in the workplace raises a variety of
health issues
1.
Job stress
2.
Damaged arm and neck muscles
3.
Eye strain
4.
Radiation exposure
5.
Death by computer-caused accidents
Security Issues
Computer crime is a growing threat to society
by the criminal or irresponsible actions of
computer individuals who are taking
advantage of the widespread use and
vulnerability of computers and the Internet
and other networks.
Computer Crime
 Association of Information Technology professionals
1.
2.
3.
4.
5.
(ATIP) defines computer crime as including:
The unauthorized use, access, modification, and
destruction of hardware, software, data, or network
resources.
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his or her own
hardware, software, data, or network resources
Using or conspiring to use computer or network
resources to illegally obtain information
Hacking
Hacking is the obsessive use of computers, or the
unauthorized access and use of networked computer
systems.Illegal hackers (also calledcrackers) frequently
assault the Internet and other networks to steal or damage
data and programs. Hackers can:
1. Monitor e-mail, Web server access, or file transfers to
extract passwords or steal network files, or to plant data
that will cause a system to welcome intruders.
2. Use remote services that allow one computer on a network
to execute programs on another computer to gain
privileged access within a network.
Cyber Theft
Many computer crimes involve the theft of
money.
In the majority of cases, they are “inside jobs”
that involve unauthorized network entry and
fraudulent alternation of computer databases
to cover the tracks of the employees involved
Computer Viruses or worms
1. They typically enter a computer system
through illegal or borrowed copies of
software, or through network links to other
computer systems.
2. A virus usually copies itself into the operating
systems programs, and from there to the
hard disk and any inserted floppy disks.
Vaccine programs, and virus prevention and
detection programs are available, but may
not work for new types of viruses
Mona’s Factory
Mona is a manager of a gadget factory. Her factory has been quite successful the past
three years. She is wondering whether or not it is a good idea to expand her factory
this year. The cost to expand her factory is $1.5M. If she does nothing and the
economy stays good and people continue to buy lots of gadgets she expects $3M in
revenue; while only $1M if the economy is bad.
If she expands the factory, she expects to receive $6M if economy is good and $2M if
economy is bad.
She also assumes that there is a 40% chance of a good economy and a 60% chance of a
bad economy.
(a) Draw a Decision Tree showing these choices.
Decision Tree Example
40 % Chance of a Good Economy
Profit = $6M
Expand Factory
Cost = $1.5 M
60% Chance Bad Economy
Profit = $2M
Good Economy (40%)
Profit = $3M
Don’t Expand Factory
Cost = $0
Bad Economy (60%)
Profit = $1M
DSS Techniques
 Sensitivity analysis, what-if analysis, and goal
seeking analysis are used to analyze complex
relationships among data items
to discover business patterns, trends.
All of them are part of Decision support
systems (DSS) analysis techniques.
What if Analysis
 In what-if analysis, an end user makes
changes to variables, or relationships among
variables, and observes the resulting changes
in the values of other variables.
 Managers repeat this analysis with different
variables until they understand all the effects
of various situations.
Sensitivity Analysis
Under this analysis the value of only one
variable is changed repeatedly at a time, and
the resulting changes on other variables are
observed.
Typically, sensitivity analysis is used when
decision-makers are uncertain about the
assumptions made in estimating the value of
certain key variables.
Goal Seeking Analysis
 goal-seeking analysis sets a target value for a
variable and then repeatedly changes other
variables until the target value is achieved.
 Backwards approach, starts with goal
 Determines values of inputs needed to achieve
goal
 Relationship is verb and entity is noun
 http://www.careerbless.com/db/rdbms/c1/er2
.php
Download