Federal Express, founded in 1971, handles an average of 3million package-tracking request Every day. To stay ahead in a highly competitive industry, the.

Slides:



Advertisements
Similar presentations
Module 3: Business Information Systems
Advertisements

Chapter 1 Business Driven Technology
Information Systems in Business
Concepts in Enterprise Resource Planning Fourth Edition
1 MIS, Chapter 1 ©2011 Course Technology, a part of Cengage Learning INFORMATION SYSTEMS: AN OVERVIEW CHAPTER 1 Hossein BIDGOLI MIS Cambios en este color.
Chapter 3 Database Management
Enterprise Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
7-1 PowerPoint Presentation by Douglas Cloud Professor Emeritus of Accounting Pepperdine University © Copyright 2007 Thomson South-Western, a part of The.
Chapter 8 Competitive Advantage with Information Systems across Organizations © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Principles of Information Systems, Seventh Edition2 An organization’s TPS must support the routine, day-to- day activities that occur in the normal course.
Essentials of Management Information Systems, 6e Chapter 2 Information Systems in the Enterprise 2.1 © 2005 by Prentice Hall Information Systems in the.
Information Systems In The Enterprise
Chapter 14 The Second Component: The Database.
Achieving Operational Excellence Enterprise Applications Business Information Systems Laudon & Laudon Ch.8 (P.266)
Achieving Operational Excellence Enterprise Applications Business Information Systems Laudon & Laudon Ch.8 (P.266)
Introduction to SAP R/3.
Global E-business and Collaboration
9 C H A P T E R Transaction Processing and Enterprise Resource Planning Systems.
TOPIC 1: GAINING COMPETITIVE ADVANTAGE WITH IT (CONTINUE) SUPPLY CHAIN MANAGEMENT & BUSINESS INTELLIGENCE.
Chapter Lead Black Slide © 2001 Business & Information Systems 2/e.
Lecture-8/ T. Nouf Almujally
Chapter 5 Application Software.
Copyright ©2016 Cengage Learning. All Rights Reserved
Chapter 2 – Enterprise Systems
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 10 Business Operations.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
BUSINESS B1 Information Security.
Fundamentals of Information Systems, Third Edition
Information System and Management
Prepared by: Dinesh Bajracharya Nepal Security and Control.
2.1 © 2007 by Prentice Hall 2 Chapter How Businesses Use Information Systems.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
@ ?!.
CHAPTER 2: INFORMATION SYSTEMS IN THE ENTERPRISE.
© 2007 by Prentice Hall 1 Introduction to databases.
Computerized Manufacturing Systems
Chapter 2  2000 by Prentice Hall. 2-1 How Businesses Use Information Systems Uma Gupta Introduction to Information Systems.
1 California State University, Fullerton Chapter 10 Business Operations.
BUSINESS DRIVEN TECHNOLOGY
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 1-1 BUSINESS DRIVEN TECHNOLOGY UNIT 1: Achieving Business Success Through.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 1 Foundations of Information Systems in Business.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
Business Functions, Processes, and Data Requirements
Concepts in Enterprise Resource Planning Fourth Edition
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
7-1 Computerized Accounting Systems Electronic Presentation by Douglas Cloud Pepperdine University Chapter F7.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Chapter 1 An Introduction to Information Systems
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
Fundamentals of Information Systems, Third Edition1 An Overview of Transaction Processing Systems Every organization has transaction processing systems.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
 An Information System (IS) is a collection of interrelated components that collect, process, store, and provide as output the information needed to.
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Learning Objectives Understand the concepts of Information systems.
Foundations of Information Systems in Business
Chapter1 FOUNDATIONS OF INFORMATION SYSTEMS IN BUSINESS.
Revision Chapter 1/2/3. Management Information Systems CHAPTER 1: INFORMATION IN BUSINESS SYSTEMS TODAY How information systems are transforming business.
Discovering Computers 2010: Living in a Digital World Chapter 14
Foundations of Information Systems in Business
Global E-Business: How Businesses Use Information Systems
Presentation transcript:

Federal Express, founded in 1971, handles an average of 3million package-tracking request Every day. To stay ahead in a highly competitive industry, the company focuses on customer Service by maintaining a comprehensive web site, www.FedEx.com, to assist customers and Reduce costs. For example, every request for information that is handled at the web site instead of by the call Center saves an estimated $1.87. Federal Express has reported that customer calls have decreased by 83000 per day since 2000, Which saves the company $ 57.56 million per year. And since each package-tracking request Costs Federal Express 3 cents, costs have been reduced from More than $1.36 billion per year to $21.6 million per year by Customers using the Web site instead of the call center. Another technology that improves customer service is Ship Manager, an application installed on customer’s sites so that Users can weigh packages, determine shipping charges, and print shipping labels. Customers can also link their invoicing, billing, accounting, and inventory systems to ship manager.

However , Federal Express still spends almost $326 million per year on its call center to reduce Customers frustration when the Web site is down or when customers have difficulty using it. Federal Express uses customer relationship management software called Clarify in its call centers to make customer service representatives jobs easier and more efficient and to speed up Response time. Is technology by itself enough to ensure high-quality customer service? What are Federal Express’s estimated annual savings from using information technology? What are a couple of examples of information technologies used by Federal Express?

Management Information System.

Term Management : Term Information : Term System : It is a set of interrelated components, with a clearly defined boundary, Working together to achieve a common set of objectives. Components of System Data People Information Systems Hardware Telecommunications Software

Management Information System Definition A system to convert data from internal and external sources into information And to communicate that information in an appropriate form to managers at All Levels in all functions to enable them to make timely and effective decisions For planning , directing and controlling the activities for which they are Responsible. MIS is - A system It combines human and computer based resources It is meant to provide information to managers This information enables managers to make timely and effective decisions.

Management Information Systems Resources and Products People Resources Specialists: Systems analysts, Software developers, System Operators. End Users: any one else who uses information system. 2. Hardware Resources: Machine: Computers, video monitors, printers, optical scanner. Media: Floppy disks, magnetic tape, 3. Software Resources: Programs: operating system programs, spreadsheet programs, word processing Programs, payroll programs. Procedures: data entry procedures, error correction programs. 4. Data Resources: Product descriptions, customer records, employee files, inventory database.

5. Network Resources: Communication media, communications processors, network access and control software. 6. Information Products: Management reports and business documents using text and graphics displays, audio responses, and paper forms.

Basic Characteristics of MIS Management-oriented: MIS should start its journey from appraisal of management needs, mission and goal of the business organization. It may be individual or collective goals of an organization. The MIS is such that it serves all the levels of management in an organization i.e. top, middle and lower. 2. Management directed: When MIS is management-oriented, it should be directed by the management because it is the management who tells their needs and requirements more effectively than anybody else. 3. Integrated:. Development of information must be integrated so that all the operational and functional information sub systems should be worked together as a single entity. 4. User friendly/Flexibility 5. Common database ----Master Table -----------Transaction Table 6. Computerized

The Importance of Information System HRIS (Human Resource Inf. Sys.) Choosing the best job candidate Scheduling and assigning employees Predicting the organization’s future personnel needs. 2. LIS (Logistics Information System) Improving routing and delivery schedule Selecting the best mode of transportation Improving transportation budgeting Improving the shipment planning. 3. MFIS(Manufacturing Inf. Sys.) Maintaining the manufacturing cost.

Product Cost Calculation Space Utilization Analysis of Price changes and discounts 4. FIS (Financial Inf. System) Improving budget allocation Minimizing capital investment risks Monitoring cost trends Managing cash flow 5. MKIS(Marketing Information System) Analyzing market share, sales and sales personnel Sales forecasting Price and cost analysis of items sold.

Wal-Mart Stores, Inc. Wal-mart, the largest retailer in the world, built the Wal-Mart Satellite Network, Which is the largest private satellite communication system in the United States. It links branch stores with the home office in Bentonville, Arkansas, by using two-way Voice communication. Wal-mart uses the following information technologies to gain a Competitive advantage: Telecommunication is used to link stores with the central computer system and then to supplier’s computers. This system creates a seamless connection among all parties. Network technologies are used to manage inventory and implement a just-in-time inventory system. As a result, products and services are provided at the lowest possible prices. Wal-Mart uses an extranet, called Retail Link, to communicate with suppliers. Suppliers can use this extranet to review product sales records in all stores and track Current sales figures and inventory levels. Wal-Mart is a major user of RFID technologies which have improved its Supply Chain and Inventory Management System.

The Business Information Value chain Business Processes Supply Enterprise customer knowledge Chain manage mange management Manage ment ment ment Firm Profitability and Strategic position Data Transfor Dissemi Collection mat ion nation and Data into storage Business Systems Planning coordination controlling Modeling and decision making Information processing activities Management Activities

Topic No—2 Types of Information System Strategic Level Executive Support Systems (ESS) Sales mngt. Sales region analysis Inventory control Production schedule Groups Served Management level Middle Managers Annual Budgeting Profitability analysis Management Information Systems (MIS) Decision support Systems (DSS) Transaction Processing Systems (TPS) Operational level Sales and marketing Manufacturing & production Finance& accounting Human Resources Functional Areas

On 12th September 2002, Blue Dart and DHL signed a Sales Alliance Agreement which came into effect from 1st October 2002 on a principal to principal basis. This alliance was further strengthened in 2005 when DHL Express (Singapore) Pvt. LTD. acquired 81.03% stake in Blue Dart and currently holds 75% stake since 23rd November, 2012  While Blue Dart is the leader of the air express industry in India, DHL Express is the No.1 international air express services provider in India offering its customers the entire spectrum of express services from international air express to high-end logistics solutions including repair and return, strategic inventory management and direct express inventory distribution. The coming together of the world's No. 1 international air express service provider and India's No. 1 domestic express services provider is a logical step in a win-win relationship to benefit all the parties involved, the customer and the stakeholders of both organizations. 

Information Systems To Achieve Competitive Advantage Chapter 3 Information Systems To Achieve Competitive Advantage Firms that “do better” than the others are said to have a competitive advantage over other: They either have access to special resources that others do not, or They are able to use commonly available resources more efficiently- Usually because of superior knowledge or information asset.

Why do some firms do better than others and how do they achieve Competitive advantage? How can you analyze a business and identify its strategic advantages? How can you develop a strategic advantage for your own business? How do information systems contribute to strategic advantages? Michael Porter’s competitive model.

The most widely used model for understanding competitive advantage Is Michael Porter’s competitive forces model General view of the firm General view of its competitors General view of the firm’s environment . which includes New market entrants Substitute product Suppliers customers

Porter’s Competitive forces Model Potential Entrants Threat of new entrants Industry Competitors Bargaining power Of supplier Bargaining power Of Buyers Buyers Suppliers Rivalry among existing Competitors Threat of Substitutes products Or services Substitutes In this model, five competitive forces shape the fate of the firm.

Low-Cost Leadership: Use Information Systems to produce products and services at a lower price than competitors while enhancing quality and level of service. example: Big Bazar. 2. Product Differentiation: Use Information systems to differentiate products, and enable new example: Rediff.com, Google, eBay, Focus on market niche: Use information systems to enable a focused strategy on a single market niche; specialize. 4. Customer and Supplier intimacy: Use information systems to develop strong ties and loyalty with customers and suppliers. example: Amazon.com

Example

Database Systems, Data Warehouses, And Data Mart Ch-4, Database Systems, Data Warehouses, And Data Mart Databases : Database is a collection of related data that can be stored in a central location or in multiple locations. Data Hierarchy : is the structure and organization of data, which involves fields, records, and files. 629-12-1127 Mary Smith S.E. Barber File 510-16-9211 Alan Bidgoli N.E. Morrison 524-13-1926 John Brown S.W.Broadway Records

Interaction between the User, DBMS, and database User makes a Request for information DBMS searches the database Database User DBMS DBMS returns Information to The user DBMS retrieves the information

Database Systems, Data Warehouses, and Data Marts

Types Of Data in a Database To Generate Business Intelligence the database component of an information systems needs access to two types of data: Internal Data: Collected from the organization. ex: Transaction records Sales Record Personnel Records 2. An Organization might use internal data on customer’s past purchase to generate BI about future buying patterns . 3. External Data: Collected from outside the organization. ex: Competitors, customers and suppliers Distribution network Economic indicators (consumer price index) Government regulations Labor and population statistics Tax records

Data Warehouses Data warehouse is a collection of data from a variety of sources Used to support decision-making, application and generate business Intelligence. Data warehouses store multi dimensional data, so they’re sometimes called “Hypercube ”. Data Warehouse Configuration

External data sources Databases OLAP analysis Transaction files Extraction Transformation and loading Raw data Summary data Metadata Enterprise Resource Planning systems Data-mining analysis Customer Relationship Management Decision-making reports

Data can come from variety of sources ERP system collect, integrate, and process data that can be used by all functional areas in an organization. 2. CRM systems collect and process customer data to provide information for improving customer service. 3. Extraction, Transformation, and loading (ETL) refers to the process used in a data warehouse. Extraction means collecting data from a variety of sources and converting it into a format that can be used in a transformation processing. Extraction process can also parse (divide into pieces) data to make sure it meets the data warehouse’s structural needs. ex: parsing can be used to separate the street number, street name, city etc. Transformation processing is done to make sure data meets the data warehouse’s need. It is basically sorting and filtering of the data. It is also aggregating and and summarizing data before loading it in the data warehouse. Loading is the process of transferring, data to the data warehouse depending o on the organization’s need and the data warehouse’s storage capacity .

Collected information is organized in a data warehouse as Raw data : Is the information in its original form. Summary data : Gives users subtotals of various categories, which can be useful. Metadata : Is information about data – its content, quality, condition, origin, and other Characteristics. Metadata tells users how, when, and by whom data was collected and how data has been formatted and converted into its present form. ex: Metadata in a financial database could be used to generate a report for shareholders explaining how revenue , expenses and profits from sales transactions are calculated and stored in the data warehouse.

Online Transaction Processing: Systems are used to facilitate and manage transaction –oriented applications, such as point of sale data entry retrieval transaction processing Online Analytical Processing: It generate business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product and location. Data-mining Analysis: is the process of analyzing data from different perspective and summarizing it into useful information that can be used for increasing revenue. Decision –Making Reports: A data warehouse can generate all types of information as well as reports used for decision making.

Data Marts : is usually a smaller version of data warehouse , used by a Single department or functions.

Protecting Information Resources A comprehensive security system can protect an organization’s information resources, which are its most important asset after human resources.

Types of Threats Malicious Software: Malicious software programs referred to as malware Include a variety threats such as: Computer viruses Worms Trojan horses >> Computer viruses: Computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. * It destroys data. * clogging computer memory. * Reformatting a computer’s hard drive. * Causes program to run improperly.

>> Worms: Many recent attacks have come from worms. Which are independent computer programs that copy themselves from one computer to others over network. They are independent in nature. worms can destroy * data and programs * It also disrupt or even halt the operation of computer network. Worms and viruses are often spread over the internet from files of Downloaded software Files attached to e-mail transmissions, or from compromised e-mail messages. >> Trojan horse: A Trojan horse is a software program that appears to be gentle, but then does something other than expected. The Trojan horse is not itself a virus because it does not replicate, but is often a way for viruses or other malicious code to be introduced into a computer system.

Hackers and Cyber vandalism: A hacker is an individual who intends to gain Unauthorized access to computer system. Hacker activities have broadened beyond mere system intrusion to include Theft of goods and information as well as system damage and cyber vandalism. Spoofing and Sniffing : Hackers attempting to hide their true identity often spoof, or Misrepresent themselves by using fake e-mail address or camouflaged as someone Else. Spoofing also can involve redirecting a web link to an address different from the intended One, A sniffer is a type of eavesdropping program that monitors information Traveling over a network. When used legitimately, sniffer can help identify Potential network trouble-spots or criminal activity on networks but when Used for criminal purpose they can be damaging and very difficult to detect.

Types of Information systems Control General Controls: General controls include software control, physical hardware controls, computer operations controls, data security control etc. Application controls: Application controls include both automated and manual procedures that ensures that only authorized data are completely and accurately processed by that application. > Input control: checks data for accuracy and completeness when they enter the system. > Processing control: establishes that data are complete and accurate during updating. > Output controls: ensures that the results of computer processing are accurate, complete, and properly distributed.

Technologies and Tools for Security and Control. It includes : Tools for authentication Firewall Intrusion Detection system Antivirus software Encryption

Access Control: Access control consists of all the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Firewall: The use of firewalls to prevent unauthorized users from accessing private networks. A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. 3. Intrusion Detection Systems: In addition to firewalls, commercial security vendors now provide intrusion detection tools and services to protect against suspicious network traffic and attempts to access files and databases. 4. Antivirus software: Antivirus software is designed to check computer systems and drives for the presence of computer viruses. Encryption: Many organizations rely on encryption to protect sensitive information transmitted over the internet and other networks. Encryption is the coding and scrambling of messages to prevent unauthorized access to or understanding of the data being transmitted. It can be encrypted with the help of numerical codes. Eg; Credit card information.