Management Information System: Introduction

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 13

MANAGEMENT INFORMATION SYSTEM

INTRODUCTION:We are living in a macro world -where knowledge expertise has been changing rapidly and pioneering business models taking place by the every minute. Its quite obvious fact that almost every day we are surprised by the innovative revelations in communications and information technology. It is proven that the last few years information technology has become basic elementary rule for business societies. Change is always a persistent process, in the current growth of information management and global communications management systems have the most significant factors for change which are influencing a reinvention of the system and also build the dynamic information management system. ** INFORMATION = WEALTH ** Organizations desperately require to gain competitive advantage & a profitable organization depends on the consolidation of company resources grouped together in a passionate way and committed achieve market leadership and information is a vital resource. MIS empowers with the aim of set up competitive advantage and develops the healthy competitive environment of a business. Information system management enhances decision making mechanism. Characteristics of the new information managements system includes Data Management Computerization of new technologies Information resources management Competitive analysis and business intelligence

Definitions of Management Information System: The study of MIS is not about the use of computers, it is about the provision and use of information relevant to the user. Computers are one - albeit important - means of producing information and concentration on the means of production rather than the needs of the user can lead to expensive mistakes." (Lucey [1997] pg 195) A system to convert data from internal and external sources into information and to communicate that information, in an appropriate form, to managers at all levels in all functions to enable them to make timely and effective decisions for planning, directing and controlling the activities for which they are responsible. (Lucey [1997] pg 2).

TESCO AS A FIRM DESGINED AND IMPLEMENT MIS Mark Goddard, IT Strategic Development Manager, (Tesco) The creation of a centralized MIS solution based upon Business Objects and Teradata is enabling Tesco to create a single set of key business performance indicators across the UK and all international operations. This consistency is crucial for Tesco and will enable meaningful international performance comparisons that will inform ongoing global expansion. The mixture of total web based business intelligence & Business Objects has close association with Teradata delivers speed, flexibility & functionality required to bring both ad hocreporting & standard in timely fashion to the Tesco users across the world, says Goddard. MIS gives confidence to build the setting up and manage. Every firm require MIS is difficult to modify the atmosphere is acquire everyday industry environment. It must be build up because it help out to business, to perform exact advertising, healthy distinct output of unique good that are generated, along with first class economic support. As well it gives support to strategic decision building.

This is recognized scheme in Tesco this impact on the administration to undertake judgment in good time including precise conclusion. The main influence on organisation arrangement is described below: The below are the few MIS strategic advantages that TESCO has:Ease Preparation: facilitate planning put right value of the goods by giving the perfect direction to take good resolution, the resource of the MIS changes in age of period. As well it supports the directors who have lost the private links among the area of process. Reducing the hardness: MIS analysing the bulk quantity of figures to prevent misunderstandings when the records are hard. Motivate the innovation: It frequently supervise the alteration of industry arrangements and events by evaluating the functioning and examine the process. Develop synchronization: It set up the decision building by make clear to each and every division on the subject of trouble shooting and necessities of different departments, they create the business to build combined decision. Scheming: controlling is the main connection between mapping and scheming, consequently to estimate and develop the implementation, using processors to processing and storage of the information through low expenses. Scheming mostly build up the methods, reserves and recover the information. It calculates and deal out the data. Five attributes to describe the MIS, they are explained below Timeliness: The thing which is sustaining MIS must carry out in providing and sort out the perfect and right data to valid customer. It must be deliberate to approach and speed up the data in shortest time. It must be mounting up the information, amend it and extract it. The blunder should be set right by changing.

Relevance: proper data must be sending to the directors. Based on the data they will take good decisions, when they take useless decisions because the information is out of date. Relevance is primarily concentrate on the data which is required in specific method, to the specific individuals to the related sections. It precisely offers the purpose and the presentation of each and every worker frequently. Completeness: Which decision we take, the data available for that is absolutely truthful, in summarize way. The excess which is available must be summarising so we can prevent uncertainty. Accuracy: The total method of procedure and typical blunt have to tolerate the Information system processing achievements. Data should be fair and restricted and changed in usual breaks. Correct auditing must be done externally and internally with accurateness. Consistency: The information which is established must be prearranged casually and uniformly. The incorrect procedure of gathering information and exposure the information can influence the progression of examine. Data compilation technique and treatment is adjust in formal breaks, so the individual should have correct procedure to calculate the modifications. The technique should be heading into shape of file and sound described so we can converse with suitable role in a correct time through extremely successful counselling approach. The mechanism of MIS is illuminated below: Business dispensation supervisor: It is also called as operation dealing method. It is unhelpful planning which supervise the syllabus which interrelated to the business. For ex in airlines ticket reservation, some seats are must be hold after reservation because to avoid the twice booking, this also a kind of business. It is primarily take care of efficient utilization, revival method and to prevent breakdowns.

Assessment maintains method: Here precise division which assist the individual to get the conclusion. The conclusion can be complete by considering the basic information, the organisation and the credentials. These are intended by the DSS. The data is primarily added by contrast of transaction, income, and supply. Skill employment scheme: The main position of the module to produce latest skills in addition to data to improve the article for good handling of latest data and skills for attain objectives, efficient appearance and distributing of the syllabus. Decision making strengthen technique: It majorly obtain the information from DSS. It analyse the information in a worth vile way for perceive correct decision. This system is exposure technique. Ex employment, statements, setting up in further it would assemble the information with fast tackle.

1. Tesco has predefined architecture for

information sharing

within the organization:-

Decision Making: It is the main topic of MIS here the directors are mainly involved in making decisions. It is majorly grouping in 3 types. Strategic decision making: By making some goals and sources the conclusion is made. The main issue here is to forecast the feature of the individuals.

Management control decision: It is mostly identify the effectiveness of the prepared units and make use of sources. It communicates through the community starting the job. It is conceded agreement with the board Policies and goals that are established by initiators. Operational control decision: It engages the no. of entity and components in the units that are transport the exact task. The make use of sources and examine the product. It is essentially calculate the decision connected to the service forbidden in this kind of decision the individuals would answer in accordance to the everyday commerce state. It focuses on the continued existence in the marketplace location. Privacy Impact Assessment: This includes the individuals to summarise the isolation of job in collecting, operating and distributing the data. It include wherever it is practical. Data protection Act is main principal that decribe the condition of make the most sensitive personal and personal information the 7th standard inform that security measures must be hold while, gathering, accumulate, handling out the data. Daniel (1957) the idea of identifying critical success factor as a basis for determining the information needs manager was proposed. In a unity of few issues are participate vital role for achievement. Few of them are latest results improvement, improved sharing and high quality marketing, CSF point out the region which are vital and help out the recognize the corporate information required. These are declared as cost drives value drives. It also declared the faction of the R&D similar to superiority benefits and client service. These are identified both inside and outside. CSF help out the industry to be viable facilitates in reaching strategic objectives, make the first relation through other firms activity and extent of the venture. Safety is a method of shield of data and its systems from a variety feature like use wrongly, trouble, obliteration. The main objective is to defend the CIAconfidentiality, integrity, availability of the data. Safety has turn into the peak of the

record. Data system is opposing the issues. The dangers are occurring due toprocesser viruses, worms, malware which is monitor by asses is not permitted that escort to damage. The safety system raised as it is controlled by the investigators like producing antivirus , firewalls and Trojans. Checking the programs and keep up the policies they helping in monitoring the damage. The major uniqueness of matter is safety it must be Privacy: only permitted members asses the data. Reliability: correct controlling like keeping the data, discovery of the data must be maintained. Verification: this is can be made by the entity who had maintained the data. Knowledge Management involves strategies in business to produce, to deal out, recognizing and take up of insides and experiences. It majorly wants entity and the firm to decrease the effort and on the period assigned for training given to the latest staff and helps out to adopt in the organisation environment that is altering in the official breaks. The primary strategy of the knowledge management include involvement of the skill is organised for attain deliberately objectives. It also helps the individuals by inspiring the entity, by make use of the skills to increase latest out puts and good turn. It gives information, data to total staff in a business for efficient decision taking. It improve the business from team work of progression by make use of technology. It is main in undersized firms to keep up incessantly. Safety and manage: safety is to protector for the sources and behaviour in urbanized countries the safety system is extensively Electronic communication isolation act, the processer scam and misuse act in 1986 assist in monitoring the take out of the information and intruding. Principled Considerations: The connection of IT experts (ATTP) believes principled consideration which is the major tasks of data system experts. The experts, professionals and firm must preserve

the principled tasks like acquiring the legal responsibility of the job, assign first choice to reliability, increasing the experts work, progression in secrecy, strength and interests of the singles. For decision making, the principled decision must be well thought out it mostly involve firm ethics. Stock Holder Theory: The task of the firm is to make use of the income and providing to them without any deception and violating the laws. Social Contract Theory: In this firm must value the principles of the people and start the assistance by building communal agreement. Technology Ethics: Information Consent: The persons who gain knowledge in the technology must understand the danger. Justice: troubles and profits must be dispersed equally, and also the threats should be splitting moderately, the persons who dont get profits they are not undergo elevated risk. Security Code: Accurate code must maintain so that the system is secured from hacking. Backup Files: This is mainly ensured in storing of files that are used in past. These files are stored & kept them for the use that is managed. Security Monitors: It augments the unit of control, usage of hardware, data & software. It permits the authorised people only, by which destruction and fraud can controlled. Biometric Security: This is one of the advanced security system method in which the program is set in the way which allows only the authorised people, details like finger print, voice verification and retina scan.

2. TESCO uses MIS as a tool for support strategic decision making

and Critical evaluation of the information systems

Strategic Information Management: Myburgh (2002) described strategic management information as Focuses on corporate strategy and direction. It emphasizes the quality of decision making and information needed to improve overall business performance. It basically helps for organization in strategic planning and also fulfils the requirements of the organizations entity. Strategic decision making process, involves in the finding of crisis & issues and analysis of the characteristics of issue. Structured Decision Making: In the structured decision making data, process & evaluation are 3 components that are enumerated generically. Here the verdict is taken frequently according to the time, Hence it is a place for comparative firm that is frame work encompassing both the decision and the individuals who are making it. Profuse business make these credit granting decision that routine. Generally in this case most of the entities would be collect data for credit granting decision. The combined data is probably consistent. For example the household debt should be 25% lesser than the gross income. The decision could be judged in a structured way. To make a structured decision computer programs can be developed so as to collect the data as well as to combine the data, hence gung extreme degree of entity to the process. As it as a routine and anticipated process hence there is no need of DSS for extravagant standard making. Alternatively there are number of automated tools by which considering the criteria they can take decision. Unstructured Decision Making: It is a strenuous process, where the firm or the individual generates alternative so that if one is not accessible the other would be in hand. The process complicated where the person do not known the path of solution. The alternative is made so as to investigate the choice. It enhances the tumuli randomly by experimenting the choice. Which is a Iterative naturalistic decision. Some components are present as structured with slight variation. It is a dominant decision making where experts are present in the given field of domain. Different decision maker uses data and processes for conclusion. Then the decision is evaluated by the qualified and skilled

people. These decisions are not made in regular intervals and made when the nature is not understood properly. Decision on new product can fit the type in either of the ways. It primarily starts with the person who takes the decision. The decision makers are experts or the experienced people who are entrusted decisions; hence there is great value for individual ability. A program is constructed to accelerate the process that is used by a specific person, it is one of the approach. These are known as Expert System. It is not in the way the expert decision maker is compensated with system. But it indirectly supports as an alternative in decision making. The other approach is widely used by the decision maker so as to make quick review of the conclusion. It is mainly done by documentation and constant monitoring. The major support of these type of decision is the experience which help in making decision and the individual approaches are allowed. Semi Structured Decision: It is the middle of both structured and unstructured; this is where true support system are enlighted. The data, process and evaluation are characterising in the process of agreement where the fewer use of structured decision making & more human judgement importance is given. The demand necessity is mainly data oriented. Dash Boards: It is executive information system. Dash boards are in the organized layout. The product information is acquired through local operating system. Digital dash board flows inherent which are frequently checked. More of them prefers high level processing. The 3 digital dash boards are desktop widgets, web browser & software application itself. It primarily grades the function of unit like, human resource, customer relation, security, information technology, sales & operations. This dash board is like driven & IT division is a facilitator for the project of dash board which is mainly depends on metrics. The advantages are, efficiency measurement, time, performance which is presented visually, new trends, identifies incorrect & negative trends.

Competitive or Competitor Intelligence: Lindon and Lendrevie (1990) demonstrated competitive intelligence as those activities by which a company determines and understand its competitors, determines and understands than strengths and weaknesses and anticipates their moves. The first thing is to finding the consumer needs & after followed by recognition of competitors. The final step is that analysing the companys strengths & weaknesses. It mainly tells market place competitiveness, to under entity spirited competitors & environment. Generally these are the collections of data legally & analysing its vulnerability, intention & capability of competitor into their business line with the help of database & open source with decent enquiry. It primarily enhance the managers of industry of all dimension to build up decision by research & development and investigate long term plans for the business marketing. This is continuous procedure where ethically & legally data is gathered and that helps for the good decision making. The 8 steps to start & complete competitive intelligence mission are-1. Research of Competitor: This involves in establishing of analysing data & making decision about the product and are leading. 2. Research Competitor: Gathering different information, participation in sales and understanding of competition in high resolution. 3. Research the Competitive Environment: understand the threats & opportunities and analysing foreign business environment including regulations & laws. 4. Competitive Analysis: Qualitative & quantitative analysis is made between companies by data consideration, screening & processing the weakness & strengths of the both companies. 5. Plan Competitive Strategy: This is depends on qualified analysis of development of the strategic planning & marketing strategy according to research. 6. Organizational System: Establishment is made independently and this is lead by leader of the enterprise.

7. Computer System: MIS is depending on competitive intelligence. Data gathering process transaction & delivery make CI data or information, warning & truly tracking. 8. Improvement System: The suggestion is taken by managing files like feedback; which suggests improvement for which enhancing the improvement of quality.

Challenge: Tesco is one of top retailers in world. And it is widely spread over 13 countries with more than 326,000 people in 2,000 stores. The main components of the internal strategies are persistence policies & processes. Basic logical global business technique is lots of standard performance measures and operations. Tesco decided to create single MIS answer for supporting both group reporting requirements and local. International business is extended by TESCO, importance to attain public of major concert across the world. In each international operation TESCO requires refined business alertness. Approach: The approach in IT expansion is main one of the key factors of companys international expansion. Then build up explanation & arrange the typical solution to all of the global operations, by following exact process, TESCO decided for the centralize MIS which is relocate for the extreme and advanced reporting to smaller tasks. It originates well-built reporting frame-work in between Ireland & UK by utilizing Tera data, data warehouse & business object reporting tools. The most important web based MIS solutions which are centralized can result in the solution which is cost effective. It was primarily started at South Korea where thirty hyper markets are located. The data is send through RMS operating system to teradata by wide area network from UK. Then information is collected & leads into data warehousing reporting form. After South Korea will assessing to the web base which gives performance of other day. Results: It gives amount of wastage in stock, sales, the staff & customer satisfaction and the ability to track stock available; the providers performance is analyzed regularly.

South Korea has succeeded in greater extent. It has enhanced its marketing strategy by checking performance of goods. That is product category performance and format to store low cost ownership.

REFERENCES OBrien, J (1999). Management Information Systems Managing Information Technology in the Internetworked Enterprise. Boston: Irwin McGraw-Hill Trcek, D., Trobec, R., Pavesic, N., & Tasic, J.F. (2007). Information systems security and human behaviour. Behaviour & Information Technology Sloan Career Cornerstone Center (2008). Information Systems. Alfred P. Sloan Foundation. Accessdate June 2, 2008. O'Brien, J A. (2003). Introduction to information systems: essentials for the ebusiness enterprise. McGraw-Hill, Boston, MA http://findarticles.com/-Article about reality of strategic information management

You might also like