MIS ... in A Nutshell
MIS ... in A Nutshell
MIS ... in A Nutshell
In an organization
Manual procedures
A database
MIS
for
Strategic
and policy
Planning and
Decision making
Management information
for tactical planning
and decision making
MANAGERIAL ACCOUNTING
OPERATION RESEARCH
COMPUTER SCIENCE
SUBSYSTEMS OF AN MIS:
Two approaches of defining the subsystems of an MIS are :
Marketing
Manufacturing
Logistics
Personnel
Information processing
Top management
ACTIVITIES SUBSYSTEMS:
Activity subsystem
Transaction processing
Operational control
Management control
Strategic planning
ACTIVITIES
Strategic
Management Control
Operational
M
a
r
k
e
t
i
n
g
P
r
o
d
u
c
t
i
o
n
P
e
r
s
o
n
n
e
l
L
o
g
i
s
t
i
c
s
F
i
n
a
n
c
e
A
c
c
o
u
n
t
i
&n
g
I P
n r
f o
o c
r e
ms
a s
t i
i n
o g
n
Transaction
T
o
p
M
a
n
a
g
e
m
e
n
t
USES
Clerical personnel
First-level managers
Staff specialists
Management
Regular reports.
Adhoc retrieval requests.
Adhoc analyses.
Adhoc reports.
Assistance in identifying problems and
opportunities.
Assistance in decision-making analysis.
CHAPTER 2
STRUCTURE OF A MANAGEMENT INFORMATION SYSTEM
Information system can be classified in terms of the following.
1. Operating elements
2. Decision support
3. Management activity
4. Organizational function
1. OPERATING ELEMENTS OF AN INFORMATION SYSTEM:
A. PHYSICAL COMPONENTS:
Hardware :
Hardware must provide for five major functions:
1. Input or entry
2. Output
3. Secondary storage for data and programs
4. Central processor
5. Communications
Software :
The software can be classified into two major types:
System software & Application software
Database
The database contains all data utilized by application software.
Procedures
Three major types of procedures are required:
1. User instructions
2. Instructions for preparation of input by data preparation personnel
3. Operating instructions for computer operations personnel
Operations personnel
Computer operators, systems analysts, programmers, data preparation personnel,
information systems management, data administration, etc.
B. PROCESSING FUNCTIONS:
1. Process Transactions :
Performance of a
transaction requires
records to
FILES
TRANSACTIO
NS
PROCESS
TRANSACTIO
NS
TRANSACTIO
N
DOCUMENTS
TRANSAC
TION
DATA
UPDATED
MASTER
FILES
UPDATE
MASTER
FILES
MASTER
FILE
CHANGES
3. Produce Reports :
Scheduled reports are
produced on a regular basis.
FILES
PREPARE
REPORT
REPORT
4. Process Inquiries :
Other outputs are responses
HANDLE
INQUIRY
INQUIRY
INQUIRY
RESPONSE
INQUIRY
INQUIRY
RESPONSE
or ad hoc inquiries.
MODEL
INPUT
AND
DECISION
MODEL
PROCESSING
Reports, inquiry responses, and dialog results provide four types of information:
1. Monitoring information
Monitoring information provides a basis for problem finding and diagnosis and may lead to
action, but no action is specified by the information itself.
2. Problem finding information
The information is presented in a format that promotes identification of problems.
3. Action information
The information is presented with action specified or implied.
4. Decision support
The report, inquiry, result, or dialog is oriented to performing analysis and
making a decision.
Preplanned reports have a regular content and format and are usually run on a regularly
scheduled basis.
Prepared at a given time, they reflect one of three conditions with respect to the time
period they cover:
1. They describe status or condition at a point in time.
2. They summarize what has occurred during a period such as a week, month, or year.
3. They present results to date and project to the end of the period.
Ad hoc reports and inquiry responses occur at irregular intervals and require data or analysis
whose format has not been preplanned.
Ad hoc request are handled in two ways :
1. The user may be provided with a means (inquiry language) for preparing and processing
the request.
2. An information service may be available to process ad hoc requests.
2. MANAGEMENT INFORMATION SYSTEM SUPPORT FOR DECISION
MAKING
Decisions are of different types with respect to the structure that can be provided for making
them.
personnel with little specialized knowledge. In many cases, it is not possible to define a
decision procedure or decision rule to handle all possible situations.
COMMENTS
Strategic planning
Management control
and tactical planning
Acquisition of resources.
Acquisition tactics, plant location, new products.
Establishment and monitoring of budgets.
Operational planning
and control
Operational
control
Management
control
Strategic
Planning
Time Horizon
Historical
---------------
Future
Currency
Highly current
---------------
Quite old
Required
Accuracy
High
---------------
Low
Frequency
Of use
Very frequent
---------------
Infrequent
Transaction processing,
Unique to
application
Strategic planning
Model
Base
Management
Control
Operational
Control
Common
Applications
software
Transaction
Processing
Unique subsystem
files
CHAPTER 6
THE DECISION-MAKING PROCESS
PHASES IN THE DECISION MAKING PROCESS :
1. SIMONS MODEL
INTELLIGENCE
DESIGN
Inventing,developing and
analyzing possible courses of
Action
CHOICE
Selecting an alternative or
course of action from these
available.
10
Level of programmability
Knowledge of outcomes:
Three types:
2. Cannot be delegated.
Normative or Prescriptive :
Descriptive :
A model which describes how decision makers actually make decisions is descriptive. It
attempts to explain the actual behavior and therefore developed by behavioral scientists.
11
Explanation
Local rationality
Acceptable level
- decision rules
Uncertainty avoidance
Organizations live in uncertainty due to behavior of the market, supplier, shareholders and
government.
Legal methods used to reduce or avoid uncertainty are:
Method of avoiding uncertainty
Explanation
Negotiated environment
Problematic search:
The search for solutions is problem-stimulated. The behavioral theory postulates that search
for the solutions is based on simple rules:
1. Search locally either close to the present symptom or close to the present solution.
2. If local search fails, expand the search first to organizationally vulnerable areas before
moving to other areas.
Organizational learning:
Organizations adapt with time. They change their goals and revise their problem search
procedures on the basis of experience. Aspiration levels for goals are assumed to change in
response to the results experienced. In the steady state, aspiration levels are a little above
achievement; when there is increasing achievement, aspiration level will lag behind
achievements. When there is decreasing level of achievement, aspiration levels will decrease
but tend to remain above achievement levels.
Incremental decision:
In Incremental approach, decision making in organizations is confined to small changes from
existing policy and procedures. The emphasis is on correcting or improving existing policies
and actions.
Decision making under psychological stress:
There are many decisions in organizations and in personal life that are charged with emotion
because of strong desires by the decision maker to achieve certain objectives or to avoid
dangers of unpleasant consequences. There are strong opposing tendencies in the individual
with respect to courses of action. The result is decisional conflict, a significant source of
psychological stress. The conflict is heightened if the decision maker becomes aware of the
risk of serious losses from every alternative course of action. Such decisions are still taken
but by using various copying patterns.
Copying patterns:
Conflict theory:
Four questions that determine the copying pattern are :
13
Decision Tree
Game Theory
COMMENTS
It can be used to present pairs of
of conditions and resulting action.
Decision Table
Flowchart
Decision tree
Pseudocode
14
CHAPTER 7
CONCEPTS OF INFORMATION
DEFINITION OF INFORMATION:
Information is data that has been processed into a form that is meaningful to the recipient and
is of real or perceived value in current or prospective actions or decisions.
MATHEMATICAL DEFINITION OF INFORMATION:
It is the average number of binary digits which must be transmitted to identify a given
message from the set of all possible messages to which it belongs.
INFORMATION PRESENTAION:
Communication of information for human use is affected by methods of transmission and
message handling. These methods can be classified as
Method
Message delay
Message modification or
Filtering
Uncertainty absorption
Presentation bias
15
QUALITY OF INFORMATION:
Some aspects of information quality in terms of the perceptions of the decision maker are
1. Utility of information
Andrus identifies four information utilities
Form Utility: As the form of information more closely matches the requirements of the
decision maker, its value increases
Time Utility: Information has greater value to decision maker if it is available when
needed.
Place Utility (physical accessibility): Information has greater value if it can be accessed
or delivered easily.
2. Information Satisfaction
It is the degree to which the decision maker is satisfied with the output of the
formal information system.
3. Errors and Bias
Bias is caused by the ability of individuals to exercise discretion in information
presentation.
Errors are more serious problem and may be a result of:
Deliberate falsification
AGE OF INFORMATION:
1. Condition data which pertains to a point in time.
2. Operating data which reflects changes over a period of time.
16
CHAPTER 8
HUMANS AS INFORMATION PROCESSORS
The Newell-Simon Model:
Allen Newell and Herbert A. Simon proposed a model of human problem solving which
makes use of the analogy between computer processing and human information processing.
The Human Information Processing System:
The human information processing system consists of a processor, sensory input, motor
output and three different memories: long term memory (LTM), short-term memory (STM),
and external memory (EM). The system operates in serial fashion rather than in parallel.
Tentative limits of Human Information Processing:
The Newell-Simon model suggests that there are limitations on the ability of human as
information processors.
One set of limits concerns the processing of data and is directly related to short-term
memory.
Humans are also limited in their ability to generate, integrate and interpret
probabilistic data.
Two individuals rarely follow the same decision-making process, even if they make the same
choice. One aspect of individual decision-making style that has received much research
attention is cognitive style. This refers to the process through which individuals organize and
change information during the decision-making process.
Learning Theory:
Information and information systems can aid individual learning. The learning process has
four important elements: drive, cue, response and reinforcement. The drive to learn in an
infant is primarily associated with physiological processes: in an adult, the drive to learn
beyond innate curiosity is acquired. Cues are stimuli that guide and determine responses.
Reinforcement consists of the reward or punishment or praise that follows a response. The
reinforcement causes responses to be learned.
17
Filtering
Newell-Simon Model
Magical number 72
Just noticeable
Differences
Human as intuitive
Statisticians
Concreteness
18
Concept
Anchoring and
Adjustment
Cognitive style
Learning theory
Feedback
Information overload
Individual differences
Nonverbal input
Processing time
Amount of
Information
Compression
19
CHAPTER 9
SYSTEM CONCEPTS
System:
Systems can be abstract or physical. An abstract system is an orderly arrangement of
interdependent ideas or constructs. A physical system is a set of elements which operate
together to accomplish an objective.
Types of Systems:
1. Deterministic and Probabilistic systems:
A deterministic system operates in a predictable manner. The interaction among the parts is
known with certainty.
The probabilistic system can be described in terms of probable behavior, but a certain
degree of error is always attached to the predication of what the system will do.
2. Closed and Open systems:
A closed system is defined as a system which is self-contained.
Open systems exchange information, material, or energy with the environment including
random and undefined inputs.
3. Artificial systems:
They are systems that are created rather than occurring in nature.
4. Human-Machine systems:
Information systems are generally human-machine systems (or user-machine systems) in that
both perform some of the activities in the accomplishment of a goal. The machine elements
(computer hardware and software) are relatively closed and deterministic, whereas the human
elements of the system are open and probabilistic.
Principles of Systems:
1. Decomposition:
It is the process by which complex systems are decomposed or factored into subsystems. The
boundaries and interfaces are defined, so that the sum of subsystems constitutes the entire
system.
2. Simplification:
It is the process of organizing subsystems so as to reduce the number of interconnections.
3. Decoupling:
If two different subsystems are connected very tightly, than such tight coupling places a
heavy co-ordination and time requirement on the two systems. The solution is to decouple
or loosen the connection so that the two systems can operate in the short run with some
measure of independence. Some means of decoupling are:
Inventories, buffer, or waiting lines
Slack and flexible resources
Standards
20
Chapter 14
Developing a Long-Range Information System Plan
Content of the information system master plan:
The master plan has two components
2.
3.
b.
External environment
c.
d.
e.
f.
Current Capabilities:
It includes such items as the following:
1.
Inventory of :
a. Hardware
b. Generalized Software
c.
Application systems
d. Personnel
2.
Analysis of :
a.
Expense
b. Hardware utilization
c.
Software utilization
d. Personnel utilization
3.
21
2.
3.
System software
Applications software
Description
Initiation
22
Initiation
planning.
Contagion
Costs
rise and costs from lack of integration become visible.
Control
Integration
Data administration
Maturity
Assumptions of Nolans Model about the growth dynamics of movement through the
stages:
1. Organizational learning permits movement through stages.
2. Stages cannot be skipped because experience is necessary before the organization is ready
for the next stage.
3. Although there is certain natural growth processes involved, the four growth processes
can be planned, coordinated and managed to move through the stages effectively and
efficiently.
The Three - Stage Model of the Planning Process:
Generic
Activity
Strategic
Planning
Alternate
Methodologies
Strategy set
transformation
Strategic grid
Strategic fit
Derivation from
organizational
plan
Organizational
Information
Requirements
Analysis
Business
systems
Planning (BSP)
Critical success
Factors (CSF)
Ends/means
Analysis (E/M)
23
Resource
Allocation
Comparative cost/benefits
Return on investment
(ROI)
Zero-based budgeting
Portfolio approach
Chargeout
Steering committee
ranking
organization.
High
Low
Support
High
Turnaround
Strategic
Factory
Strategic Fit withHigh
Organizational Culture
24
Goals, objectives, and strategies for information systems should fit with the culture in order
to avoid high resistance and high risk of failure. Clues of culture can be obtained from the
following sources:
Stories
Meetings
Physical layout
Ritual
Documents
2.
3.
Resource Allocation:
Information system resources are limited, and not all projects can be done at once. Each
project should be analyzed in terms of four factors.
1. The expected cost of savings or profit improvement resulting from the project.
2. Cost savings or increased profit which cannot easily be quantified.
3. Institutional factors such as the need to have the development proceed in an orderly
fashion or the need to have the entire organization involved in a new information
system.
4. System management factors.
Using the four factors as input, a number of methods have been proposed for allocating scare
development resources with different underlying criteria for decision making. The methods
may be used single or in combination.
Method
Underlying Criteria
Economic rationality
Portfolio approach
Chargeout
26
Chapter 15
Strategies for the Determination of Information Requirements
Difficulties to obtain a set of information requirements:
1. The constraints on humans as information processors and problem solvers.
2
reasons)
The Three Levels of Information requirements:
There are three levels at which information requirements need to be established in order to
design and implement computer-based information systems:
1. The organizational information requirements to define an overall information system
structure and to specify a portfolio of applications and databases.
2. The requirements for each database defined by data models and other specifications.
3. The detailed information requirements for an application
Strategies for determining information requirements:
1. Asking
2. Deriving from an existing information system
3. Synthesizing from characteristics of the utilizing system
4. Discovering from experimentation with an evolving information system
1. Asking
Asking method
Description
Closed questions
Open questions
No answers provided.
Respondent is allowed
to formulate response.
27
Asking method
Description
Brainstorming
ideas
solutions
Guided
Brainstorming
Group consensus
judgmental estimate of
expectations regarding
significant variables.
impossible to estimate
quantitatively
similarity of classes of object systems. For example, all billing applications perform a set
of basic functions that can be prescribed in advance. These fundamental characteristics
are the basis for a prescribed in advance. These fundamental characteristics are the basis
for a prescribed or normative set of requirements. Analysis then concentrates on tailoring
the normative requirements to meet nonstandard needs of a specific organization or
application.
2. Strategy set transformation: It is a methodology primarily for describing organization
level information requirements from the objectives of the organization.
28
3. Critical factor analysis: In this approach, information requirements are derived from the
critical factors for operating and managing an enterprise. There is therefore a two step
process of drawing out the critical factors and then deriving information requirements. An
example of this approach is the Critical Success Factors (CSF) method. The analyst asks
users to define the factors that are critical to success in performing their functions or
making decisions. Information requirements can then be derived.
4. Process analysis: The idea underlying this approach is that business processes (groups of
decisions and activities required to manage the resources of the organization) are the basis for
information system support. Processes remain relatively constant over time, and the
requirements derived from the process will reflect the non-transient needs of the organization.
An example of a process-based methodology is Business System Planning (BSP).
5. Ends-means analysis: It is a technique for determining requirements based on theory. The
technique can be used to determine information requirements at the organizational,
departmental, or individual manager level. The technique separates the definition of ends or
output (goods, services, and information) generated by an organizational process from the
means (inputs and processes) used to accomplish them. The ends or output from one process
is the input to some other process.
6. Decision analysis: This method for information requirements determination is performed
by the following steps:
1. Identify and prescribe the decision
2. Define the decision algorithm or decision process
3. Define information needed for the decision process.
This method is very useful in clarifying information requirements with users in cases where
the decision process is fairly well defined.
7. Socio-technical analysis: This approach consists of two parts: Social analysis and
technical analysis. The social analysis determines system requirements relative to the social,
human interaction system of the organization. These requirements include system design
features and implementation procedures. The social analysis is performed by studying
patterns of social interaction and group behavior in the current system. Technical analysis is
an analysis of variance and control loops that require information.
Requirements for socio-technical design are usually obtained from participative methods and
are oriented to application level analysis. It is especially appropriate for applications that
involve many users, particularly secondary users where the application will significantly
change the work environment, social interaction or job design.
29
Utilizing system
Users
Analysts
2. Evaluate the effect of the characteristics of the four elements in the development process
on three process uncertainties :
Strategy
Low
Asking
Deriving from an existing system
Synthesis from characteristics of utilizing system
High
5. Select one or more methods from the set of methods to implement the primary strategy.
30
Chapter 16
Database Requirements
Database
A database is a collection of logically related data. By data we mean know facts that can be
recorded and that have implicit meaning.
Database Management System (DBMS)
A DBMS is a collection of programs that enable users to create and maintain a database. It is
general purpose software that facilitates the process of defining, constructing and
manipulating database for various applications.
Objectives of Database and DBMS
Database Objective
Description
Availability
Shareability
Evolvability
Data Independence
Data Integrity
Description
Requirements determination
Physical design
31
Chapter 17
User Interface Requirements
Classification of Users:
Developers versus Non-developers
Developers are those who develop information processing applications and tools for use by
other workers. They are professional system analysts who must deal with large, complex
systems.
Non-developers (end users) are workers who input, manipulate, or retrieve information using
the application and tools
Novice versus Experts
A novice is one who is unfamiliar with both the systems specific syntax and semantic
knowledge. They should be able to get explanations or assistance through the system.
An expert is one who has internalized the systems syntactic structure or has considerable
semantic knowledge. They should be permitted rapid interaction and not be held up by
explanations or details that are only required by the novice.
Occasional versus Frequent Users
Frequent users are experts particularly in syntactic knowledge than an occasional user.
Occasional user needs training in basic system commands & functions whereas frequent users
can learn unnatural commands.
Primary versus Secondary Users
Primary user is one who benefits from the systems output whereas a secondary user is
responsible input into the system and sometimes for output but does not use the output
directly in his or her job.
Consideration in Design of a User Interface:
Screen Design
A good screen design is clear, uncluttered, and free of irrelevant information. Two useful
guidelines for deciding what information should be put on a single screen are the following.
1. Provide only information that is essential to make a decision or perform an action
2. Provide all data related to one task on a single screen.
The following are some guidelines for placement based on information processing limitations
plus culture-based habits of processing.
Place items together that logically belong together.
Place items in customary processing order.
32
Position of most important items (preferably) at left side and arrange in importance
from top to bottom.
Leave sufficient space so that items do not get confused.
Position items across close enough that the eye does not change rows in moving
across. Use guide strips of lines, dots or dashes if necessary.
Feedback and Assistance:
Two types of feedback should be part of a user dialog.
1. The system should acknowledge every user request in some way.
2. Additional assistance (such as system status) should be available upon request.
3. Help
Help:
Type of Help
Description
Command Assistance
General Help
Prompting
Online tutor
Online Documentation
Error Control:
A well-designed user interface should have four distinct dimensions of error control.
1. Error prevention: As much as possible, the system should provide specific instructions
(eg. prompts, help facilities) so that the user knows exactly what to do and avoid
making errors.
2. Error detection: When an error is made, the system should it clearly and explicitly.
However, polite error messages are favoured. Notification, that an error has been
detected should occur immediately. The user should be able to easily identify the
error. Finally, no error should cause the system to terminate abnormally.
33
3. Error correction: Correction should be straight forward and should require re-keying
only the portion of the data in error.
4. Error recovery: An important feature of a well-designed system is the ability to
undo something which has been done.
Response Time:
Response time in an interactive system is that time that elapses between the user keying in a
command and the system beginning to display a response. Some useful guidelines for best
response time are the following.
1. Frequent, simple commands should take less than a second.
2. For a given command type, response time should be as consistent as possible, even if
it takes slightly longer time.
3. Short response times to relatively complex requests may actually increase error rates.
4. If a response will take a long time (say > 10 secs) a message should be issued within 1
or 2 seconds to give the user feedback.
Workstation Design:
Considerations in a visual display terminal are the following:
1. The screen should usually be fixed at an angle of 10 to 15 degrees from the vertical,
away from the user. Preferably, the tilt should be adjustable, horizontally as well as
vertically.
2. Characters should not flicker or move on the screen.
3. Glare and reflections on the display surface should be minimized.
4. Resolution must provide a sharp image.
5. Character-to-background brightness contrast should be greater than 50 percent.
Preferably, the brightness should be adjustable. Screens may offer alternatives of dark
on light or light on dark.
The ergonomic considerations for physical design of the keyboard are the following:
1. Key force: A range of 15 to 125 grams pressure.
2. Key spacing: 18 to 20 millimeters between keys
3. Key displacement and activation: The results in the feel of a key when it is pressed.
Suggested displacement is 3 to 5 millimeters, with a key activation point requiring an
increasing force until contact is made at 65 to 75 percent of downward travel, then a
decrease in force so that the point of contact can be felt.
4. Key shape: Concave shape, with a matte finish to prevent reflection.
5. Keyboard slope: 10 to 15 degrees, preferably adjustable.
34
35
Chapter 18
Developing and Implementing Applications
Prototyping Approach to Application System Development
The strategy of experimental assurance in development of information system applications
which is achieved by an evolutionary design method is called prototyping. Prototyping is
used when requirements are difficult to specify in advance or when requirements may change
significantly during development. The prototyping methodology is based on the simple
proposition that people can express what they like or do not like about an existing application
system more easily than they can express what they think they would like in an imagined,
future system.
STEP 1
STEP 2
Initial
prototype
STEP 3
YES
Is the
user/ designer
satisfied ?
Operational
prototype
NO
Working
prototype
Use prototype
as specification
for application
development
Use prototype
As application
STEP 4
Revise and
Enhance prototype
36
Enhanced
working
prototype
Advantages:
The ability to get a functioning system into the hands of the user quickly.
Effective division of labor between the user professional and the MIS professional.
Disadvantages:
There may be a tendency to accept a prototype as the final product when it should
only be the basis for a fully-specified design.
DEFINITION STAGE
Proposal definition
37
Feasibility assessment
Comments
Proposal Definition
Feasibility assessment
Definition
Information requirements
Determination of information
needed for analysis
Conceptual design
User-oriented design of
application
Development
Program Development
Procedure Development
Design
of
procedures
and
Operation and
Day-to-day operation,
Maintenance
modification,
Installation and
Operation
and maintenance
Post Audit
Evaluation of development
process, application system, and
results of use
38
Chapter 19
Quality Assurance and Evaluation
Definition of Quality:
Quality is defined as excellence or fitness. An application has quality relative to its primary
and secondary users, operation personnel, control personnel, maintenance personnel, and so
forth.
Quality Characteristics:
Information System
Quality Characteristics
Complete data
All data items are captured and stored for use. Data items
are properly identified with time periods.
Accurate data
Precise data
Understandable output
Timely output
Relevant output
Meaningful output
Authorized use
Operations
39
Approve the information system charter, the information system long-range plan,
and the yearly budget
Review and approve information system procedures for quality assurance and
control.
Establish and supervise quality assurance procedures for application developed inhouse or obtained as packages
Establish and monitor procedures to measure and report evidence of quality errors,
downtime, reruns, application repair maintenance, etc
output and
up
on
40
Sign-offs at each phase of development to assure review and agreement on the system
to that point.
Program development procedures for quality control. These include structured design,
structured programming, independent review of program logic and program testing
41
MINICASES
1. AMERICAN EXPRESS WITHDRAWS $1 BILLION IDS OFFER
The following excerpts are from a news article in the Minneapolis Star and Tribune, August 17, 1983,
p. 58.
American Express Co. called off its acquisition of Investors Diversified Services, Inc. (IDS), Tuesday,
saying that $1 billion was too high a price." (IDS have investment funds such as mutual funds and
money market funds. It would therefore allow American Express to expand its range of services to
customers.)
Although American Express officials would not comment further, several observers said that
problems discovered at IDS probably lay behind the decision [The] article [in the Wall Street
Journal] said that American Express feared that IDS's data-processing system was inadequate to
handle the new products planned for the IDS sales staff. American Express officials also were
concerned about the 30 percent annual turnover among sales personnel . Walter Scott, IDS
president, responded that IDS data-processing was quite competent and has absorbed at least one new
product a month for two years. (Note: The acquisition was completed after a revised offer.)
Questions
a. Why should American Express be so concerned about the capabilities of IDS's data processing?
b. What competitive advantages to a financial services company may be provided by an information
system?
2. THE COMPUTER IN THE RESTAURANT
The installation of a minicomputer-based information system has enabled Dailey's Restaurant in
Atlanta to streamline their operations arid promote tighter internal controls over their business.
A waiter takes an order at a table, and then enters it online via one of the six terminals located in the
restaurant dining room. The order is routed to a printer in the appropriate preparation area: the colditem printer if it is a salad, the hot-item printer if it is a hot sandwich or the bar printer if it is a drink.
A customer's meal check listing the items ordered and the respective prices is automatically generated.
This ordering system eliminates the old three-carbon-copy guest check system as well as any
problems caused by a waiter's handwriting. When the kitchen runs out of a food item, the cooks send
an "out of stock" message, which will be displayed on the dining room terminals when waiters try to
order that item. This gives the waiters faster feedback, enabling them to give better service to the
customers.
Other system features aid management in the planning and control of their restaurant business. The
system provides up-to-the-minute information' on the food items ordered and breaks out percentages
showing sales of each item versus total sales. This helps management plan menus according to
customers' tastes. The system also compares the weekly sales totals versus food costs, allowing
planning for tighter cost controls. In addition, whenever an order is voided, the reason for the void is
42
keyed in. This may help later in management decisions, especially if the voids are consistently related
to food or service.
Acceptance of the system by the users is exceptionally high since the waiters and waitresses were
involved in the selection and design process. All potential users were asked to give their impressions
and ideas about the various systems available before one was chosen.
Based on Ann Dukes, "Side Order of (Computer) Chips Speeds Meals," MIS Week, June 17, 1981, p.
14.
Questions
a. In managing the business of a restaurant, what are some decisions that must be made in the areas of:
-strategic planning
-managerial control
-operational control
b. What information would you require from this system in order to aid in making such decisions?
(In other words, what would make this system a more complete management information system
rather than just doing transaction processing?)
c. Compared to this system, most restaurant information systems are relatively informal. Explain the
probable effects that making the system more formal would have on:
- customers
- waiters
- management
3. THE ROBOT SUICIDE
Isaac Asimov's science fiction mystery The Naked Sun (Fawcett, New York, 1957) takes place on a
planet served by robots. In order to protect the humans on the planet, the robots are programmed with
the Laws of Robotics. The first two laws are:
1. A robot may not injure a human being or, through inaction, allow a human being to come to
harm.
2. A robot must obey the orders given it by a human being except where such orders conflict
with the first law.
In one episode, a robot serves a glass of water to a man. The man is poisoned. The robot short circuits
because it brought harm to the man, although it did not know the water was poisoned. '
Questions
a. Using this illustration, describe the problem(s) of programmed decision making.
b. Why wasn't the robot programmed to recognize that giving a normally non injurious substance or
object to a human that turns out to do injury does not violate the first law (or does it)?
c. What would be the implications of a decision rule that required human decisions when no other
decision rule applied?
4. SOLAR ENERGY DECISION
43
The leasing of solar energy equipment for industrial use is a potential alternative to federally
subsidized programs for encouraging use of solar technology. The factors encouraging the leasing of
solar equipment include rising fuel costs, decreasing cost of solar technology, and the Business
Energy Property Tax Credit. The latter measure, passed by Congress in 1980, added an incentive
credit of 15 percent for energy savings on top of the already existing 10 percent business investment
tax credit.
Planned Energy International (PEl) is perhaps the first company to have formalized a lease for solar
equipment. According to PEl's president, Billie Jolson, the company leased 52 solar panels to a
California laundromat. She estimated the savings to the business would be $165,000 over the sevenyear lease, including $720 in the first year.
Under a typical arrangement, PEl conducts extensive energy audits of the potential client company
and estimates the potential savings on utility bills each year under a lease agreement. Once the lease is
signed, PEl assumes all responsibility for purchasing, delivering, installing, and maintaining the solar
equipment.
"Solar Energy: Leasing Cuts High Cost of Providing 'Harness' for the Sun," Christian Science
Monitor, July 20, 1981.
Questions
a. What appears to be the goal of each organization in relation to solar energy? (Hint: Examples are
maximizing, minimizing regret, satisfying, avoiding uncertainty, and resolving conflict.)
b. What are the information requirements for each goal?
c. Which decision model fits each organization?
5. EXCELLENCE IN MANAGEMENT
Recently, the management consulting firm of McKinsey and Company conducted an in- depth study
of 37 firms considered to be examples of well-managed companies. The study revealed eight
attributes that the firms had in common. The most significant attributes were concentration on one key
business value, simple form and lean staff, a bias toward action and emphasis on doing what they
know best.
Some of the companies used modem management tools such as decision support systems and strategic
planning. Rather than a perfect overall plan, they preferred controlled experirnents. The general
attitude was "get some data; do it; adjust it.'
Both new ideas and problems were handled quickly. Ideas were implemented quickly on a small
scale, with the results leading to rapid expansion or to the idea being discarded. Problems were put
into the hands of a task force or a person with temporary but extraordinary power. Action, not reports,
were expected. A later follow-up would evaluate the action taken; rewards or criticism would then
result. Most problem handlers preferred to find solutions expeditiously and return to their interrupted
work. .'
"Putting Excellence into Management," Business Week, July 21, 1980, p. 196,
44
Questions
a. What form of decision making is illustrated in these "well-run" companies?' '
b. What are the decision attributes?
c. What information is of greatest interest to who are assigned problems?
6. DECIDING WHERE TO SEND CHECKS
One way a bank can improve its performance is to speed up collection of out -of-town checks. When a
bank accepts an out-of-town check, it must clear the check by sending it to the bank on which it was
drawn. There are several ways this can be done, each having a cost and a time. In increasing order of
cost, typical options are:
Send the check to a private clearing bank which transports the check
The time each option takes will depend on the time of day and day of week. The decision must be
made for each check.
The Maryland National Bank, averaging over 500,000 transit checks per day, developed an integer
linear program for decision making as to the clearing option. The bank has saved over $100,000 per
year using the linear program analysis.
Robert E. Markland and Robert M. Nauss, 'Improving Transit Check Clearing Operations at Maryland
National Bank," Interfaces, 13:1, February 1983, pp. 1-9.
Questions
a. How does this application fit into the categories of decision making?
b. What kind of decision rules might be prepared if the criterion were satisfying?
45
Source: A joint survey by the International Association of Business Communicators, San Francisco,
CA, and Towers, Perrin, Forster, & Crosby, Inc., New York, 1980.
Questions
a. Mintzberg's study shows that executives prefer an oral means of communication. How does that
compare with this study of workers?
b. What do their choices indicate about their locus of control?
c. Identify the frame of reference and the filters that appear to be operating in these workers.
d. How is their problem space probably defined?
8. DAYDREAMS IN MANHATAN
A penny for your thoughts" was the inducement some psychology graduate students gave pedestrians
on Fifth Avenue when they wanted to study what passersby had on their minds.
Two tables were set up on a fine Friday lunch hour to sample people's thoughts at Fifth Avenue near
57th Street and at 14th Street. The results showed that the two environments produced quite different
thoughts. At fashionable Fifth Avenue, the most common thoughts were about the environment, the
misfortune of having to return to work, and members of the opposite sex - in that order. In the open
market area of 14th Street, the most common thoughts were of money and shopping. Those were
followed in frequency by thoughts of the future and thoughts about a particular member of the
opposite sex. In addition, men were more likely to be thinking about themselves while women were
more likely to be thinking about another person.
"Daydreams in Manhattan," Psychology Today, August 1981.
Questions
a. How do you feel about this story as a source of information? Would you be likely to base a business
decision on it?
b. If you did decide that it might be a useful study, what additional information would you want to
have about the study?
c. What do your answers say about your limitations as an intuitive statistician?
9. A SYSTEM LOG-IN
Consider the following interaction with a commonly used operating system. The user made the
connection through telephone lines. On the screen appeared:
TERMINAL =
The user typed in the name of the terminal on which he was working, and the system responded:
?
The user began again from the point of dialing in. This time when he received the message
TERMINAL =
he skipped it by hitting the carriage return. Then the system responded with:
@
He tried typing a few things but only received the response
46
?
Finally he gave up.
Question
Without being concerned about what the user is trying to accomplish, describe what is wrong with the
user interface and make suggestions for improving it.
10. AN ENGINEER'S VIEW OF A USER INTERFACE
"I remember the first time I used the computer. Our data processing department gave me an account
number. Two days later, a terminal was moved into my office and half of my desk disappeared. To
help me get acquainted with my new assistant, I was handed something called a user's manual. It was
two inches thick, filled with pages of diagrams, boxes, examples. It had long black lines in the lefthand margin. I tried to read it that afternoon, but got bogged down after the first two pages.
"The next day, manual in hand, I started to explore the system. After I turned the terminal, the
following message appeared:
VERSION 3.3 3/10/81
ENTER LOGON/PASSWORD:
A "LOGON"? What was that? No one had ever mentioned a LOGON. I could not even find it in the
unbridged dictionary. After spending 15 minutes searching through the manual, I realized a LOGON
was my account number. Why couldn't the data processing department and the computer agree on
what they call an account number? Why don't they say what they mean?
As I began to type, everything seemed to be going fine, until I pressed the" /" key; then the computer
stopped printing. I hit the return key, but nothing happened. The computer simply told me
ACCESS DENIED
"I attempted to revive the computer a few times with no success. When I called the woman from the
computer center, I was told that the computer would not print my password, but it read it anyway.
How could the computer read something if it was not printed? The answer: the printing is not
important; it's the pressing of the keys that sends information to the machine. In fact, the computer
looks at each key as it is pressed. Suddenly, I knew why the computer did not print my password.
When I pressed the key marked" /", the computer turned off the printing for the rest of the line. From
then on, I avoided using that key; I wanted to know what I typed.
"A few minutes after I typed the next line I was treated to the following information:
**** THE SYSTEM WILL BE DOWN FOR PM FROM
1000 TO 1130.
**** USER SHOULD REFER TO LIB.$SYS.NEW.PROC
FOR UPDATED PROCEDURES.
**** THERE HAVE BEEN REPORTS ABOUT
PROBLEMS WITH XLIBSTA. IF YOU HAVE
EXPERIENCED ANY PROBLEMS CONTACT BOB
47
AT EXTENSION 8425.
**** DUE TO THE HEAVY LOAD ON THE SYSTEM,
GAMES WILL NOT BE ALLOWED FROM 10:00 TO 17:30.
At least I understood the last part of the message; where were the games?
"During the next two week I worked on a number of different jobs, each requiring different program.
Each program looked different; each worked differently; one could communicate with another. What
bothered me most was that I had to think in different terms for each program. Not only were the same
items called by different names in different programs, but operations I could do on the same item in
one program were impossible in another As an engineer I had learned well-defined methods for
designing cars. Why couldn't computer people do the same thing?"
Michael L. Schneider and john C. Thomas, "The Humanization of Computer Interfaces,
Communications of the ACM, April 1983, p. 253.
Question
Apply the principles learned in this chapter to justify the engineer's complaints.
11. THE TEMPORARY PROTOTYI:'E THAT BECAME PERMANENT
The company embraced the idea of prototyping as a method of developing applications, but
management wanted to use the prototypes only to identify requirements; working systems were then
to be developed with proper controls and with consideration to efficiency. This followed the concept
of heuristic development. (See T. Berrisford and James C. Wetherbe, "Heuristic Development: A
Redesign of Systems Design," MIS Quarterly, 3:1, March 1979, pp. 11-19.)
The policy didnt , workout for many applications. The users didn't want to proceed with a project to
move from the prototype to a regular working version.
Question
Why didnt users follow the heuristic development policy? What are the costs and benefits of full
development and the users' alternative of using only the prototype?
12. THE MICROCOMPUTER DECISION
The Dean of the School of Management was upset. He was just about to make a decision to purchase
microcomputers for the faculty and staff of the School. A vendor and model number had been
selected. Then a new product announcement was made for a better, faster, cheaper computer. He had
seen similar announcements every few months. How was he to make a decision on equipment when
the "leading edge" where he wanted to be was a moving target?
Questions
a. Explain how this decision can be made within the context of an information system plan.
b. The replacement period for the microcomputers was never specified. If the plan calls for a three
year life before replacement, aid the Dean by explaining the dynamics of product announcement,
availability of initial software, availability of significant amounts of software, and hardware
obsolescence.
48