Notes On Management Information System
Notes On Management Information System
COURSE DESCRIPTION
The Management Information Systems (MIS) course is designed to provide students
with a comprehensive understanding of the role of information systems in supporting
managerial decision-making and organizational processes. The course explores the
theoretical foundations, practical applications, and strategic implications of MIS in
modern business environments.
Throughout the course, students will examine key concepts, frameworks, and
methodologies related to the design, development, implementation, and
management of information systems. They will gain insights into how organizations
leverage technology to collect, process, analyze, and disseminate information to
enhance operational efficiency, improve decision-making, and gain a competitive
advantage.
Learning Outcomes
Upon completion of the course, students are expected to be able to:
❖ Understand the fundamental concepts and principles of management
information systems and their role in organizations.
❖ Analyze t h e s t r a t e g i c i m p o r t a n c e of information systems in
achieving organizational objectives and gaining a competitive advantage.
❖ Identify and evaluate different types of information systems and
their applications in various business functions.
❖ Demonstrate knowledge of the system development life cycle and apply
appropriate methodologies for system analysis, design, implementation, and
maintenance.
❖ Comprehend the principles and practices of database management
❖ systems, including data modeling, storage, retrieval, and security. Explore
the use of business intelligence and analytics tools to extract insights from
data and support decision-making processes.
❖ Understand the integration of enterprise systems such as supply chain management, and
customer relationship management systems to streamline business processes.
❖ Develop an a w a r e n e s s o f i n f o r m a t i o n s e c u r i t y r i s k s a n d a p p l y
appropriate measures to protect organizational information assets.
❖ Stay informed about emerging trends in management information systems,
including cloud computing, big data analytics, mobile technologies, and artificial
intelligence.
❖ Apply critical thinking and problem-solving skills to analyze real-
world scenarios and propose effective information system solutions.
❖ Work collaboratively in teams to complete projects and assignments related to
management information systems.
❖ Develop effective communication skills to present and articulate
information system concepts and solutions to diverse stakeholders.
2
1.0 Introduction
Information is defined as the processed form of data that is used for decision-making. There
are various types of information viz; strategic and tactical. The quality of information is
determined on the basis of several factors such as completeness and accuracy. Information
helps create a system which is defined as a collection of elements such as manpower and
production. You need to integrate all the elements of the system to achieve the organizational
goals. There are various types of systems such as physical and abstract and open and closed.
The information system helps to manage and store information to perform various functions
such as decision-making, documentation of business activities and generation of reports for
the analysis of organizational operations. There are various terms that are used in the
information system. They are as follows:
2
3
• Data: These are the raw material that can be a number, a fact, a sound, a picture or a
statement gathered from different sources. Data represent something that exists in the
real world such as business processes and employee details.
• Information: It is a meaningful data or a processed data. It defines the relation
between different types of data.
• System: It is a collection of components that help in achieving a common objective.
For example, in a human-machine system, the machine element consists of hardware
and software to perform computation and human makes decisions based on this
computation.
Input: Gathering and capturing data or information from various sources, such as users,
sensors, or other systems.
Storage: Storing and organizing data in databases, files, or other data repositories for easy
access and retrieval.
3
4
4
5
• Cost of information: It determines the total cost involved in obtaining the information.
The cost of information includes:
• Cost of acquiring the data from different data sources
• Cost of maintaining the data in the database
• Cost of generating the accurate information from the data stored in the database
• Cost of communicating the information to the intended receiver
➢ Business Dimension
The business dimension of information helps determine the relevance of information at the
various levels of the management. The business dimension of information at the top-level
management is totally different from the business dimension of information at the lower-level
management. The difference in business dimension arises from the difference in the level and
nature of work performed at the various levels of the management.
➢ Technical Dimension
The technical dimension of information covers the technical aspects of information such as
the volume of information to be stored in the database and type of database. The type of
database helps store the information in the database. The technical dimension covers the
storing capacity of the database and the time required to retrieve information from the
database.
5
6
2.0 Introduction
6
7
• To produce reports for specific time periods designed for managers responsible for
specific functions in an organization. For example, departmental expense reports and
performance reports
• To provide correct information to the concerned manager at the right time
• To help in carrying out regular and routine operations
• To control, organize and plan better business operations
7
8
8
9
communications and updating databases of the organization. You can find the following
different types of operating support systems in an organization:
Transaction Processing Systems: A Transaction Processing System (TPS) allows you to
process and record data and helps produce reports from the processed data. It also represents
the automation of the general routine processes which are used to support business operations
in an organization.
Process Control Systems: A Process Control System (PCS) monitors and controls the
physical processes in an organization. While monitoring the physical processes, PCS handles
the architecture and mechanisms involved in the physical process. An example of a PCS is
the electronic sensors linked to computers used in pharmaceutical industries that help in
monitoring the chemical process and the adjustments need to be performed.
Office Automation Systems: Office automation systems refer to those information systems
in which computer and communication technology applications are used to process office
transactions and office activities at all levels of an organization. The office automation
systems provide secretarial assistance and enhanced communication facilities at different
level of management that helps improve the productivity of the managers at different levels.
The office automation system performs various activities such as typing, mailing, scheduling
of meetings, conferences, etc.
2. Management Support Systems
Management support systems include those information systems which emphasize on
providing information and support for effective decision-making by the managers of an
organization. The various management support systems are as follows:
• Management information system
• Decision support system
• Executive support system
i. Management Information System
Management information system is the information system that takes data as input and
processes the data to convert it into information as the output. Figure 2.1 shows the
processing of management information systems:
9
10
Management information system uses TPS to get the input data for processing. It processes
the data received from TPS to support a wide range of organizational functions and
management processes. Therefore, the information generated from the management
information system can be used for the control of operations and management along with
various short-term and long-term planning.
ii. Decision Support System (DSS)
Decision Support Systems are information systems that support decision-making in an
organization. DSS is also used in planning and error handling in the organization. A DSS has
three elements, namely database, model base and user interface. The database specifies the
accumulation of data from the master files and external sources. The model base specifies a
library of models which help in manipulating and analyzing the data in the desired way. The
user interface allows a user to communicate with DSS.
iii. Executive Support System (ESS)
Executive Support System extends the management information system and includes the
functionality of a DSS that helps support the decision-making of the chief executives in an
organization. Therefore, ESS is an extensive and broad information system that includes
different types of DSS and is more specific and person-oriented than other information
systems.
3. General Support Systems
The information systems under MIS that perform both the roles of operations and
management are categorized as general support systems. The various general support systems
are as follows:
Business Expert System: A Business Expert Systems (BES) is an advanced and knowledge-
based information system that acts as an expert to provide knowledge-specific solutions to
application areas which include medical, business and engineering. The main elements of a
BES are as follows:
• Knowledge base: It contains information about the specific area for which the BES
can provide expert information.
• Inference engine: It specifies how you can deduce an inference from the stored data
and rules.
• User interface: It allows a user to communicate with BES.
10
11
11
12
Answers to the above questions help the analyst of the information system to understand the
scope and complexity of the information system.
Production Subsystem; responsible for collecting all the information provided by the
production department of the organization.
Marketing Subsystem; responsible for collecting information about acquisition,
transportation, storage and delivering of the product of the organization.
Personnel Subsystem; responsible for maintaining information such as records of account,
employees and finance of the organization.
Material Subsystem; responsible for collecting information about materials used in different
departments of an organization.
Financial Subsystem; responsible for collecting all the information related to financial
management of the organization
2.7 Decomposition of System
Decomposition of system refers to the division of system into various subsystems. The
decomposition of system into various subsystems allows you to perform complex tasks with
greater ease. Moreover, the division of system into various subsystems leads to the
hierarchical representation of the operations. A system is divided into smaller units until the
smallest unit of the system becomes manageable at the system level. Figure 2.2 shows the
decomposition of a system.
12
13
In the following section, we will discuss Nolan stage model to understand the various
features of information system correspond to the stages of growth.
The Nolan Stage Model: IS Planning Framework
Nolan stage model is developed by Richard Nolan in 1974 to provide framework for
information system planning in which the various features of information system correspond
to the stages of growth. This model very clearly explains the stage-by-stage development of
an information system in an organization. Initially, the model consisted of four stages;
initiation, expansion or contagion, formalism or control, and maturity or integration. The
basic principle behind this model is that an organization must go through each stage of
growth before progressing to the next stage.
Later on, in 1979, Nolan recommended that these four stages are not sufficient to depict the
growth of IT in an organization so; he enhanced his four-stage model to six stages by
introducing stage 5 and stage 6. This growth curve takes the shape of a double ‘S’. It shows
that the growth rises sharply in the first and the second stage and then become stable by the
end of the third stage. Again, for the fourth stage, growth increases but only to get a steady
shape at the last stage of the growth curve.
13
14
Since most medium and large-sized companies have already installed computer systems, this
stage has already been achieved by most of the organizations.
Stage 2: Contagion
This stage is also known as expansion stage. This is the phase when most of the organizations
wish to have an access to the computer hardware, develop software and have the trained
manpower working. Every organization head wishes to have some computer resources
controlled by them.
Stage 3: Control
This stage is also known as formalism stage. During this stage, management notices that
benefits derived from MIS activity are not in proportion to the actual expenditure spent on it.
So, organizations exercise control over resources by implementing various formal control
processes and standards.
Stage 4: Integration
This stage is also known as maturity stage. By this stage, organizations gain enough
experience and maturity in IS applications. So, this stage mainly focuses on the integration of
applications so as to avoid duplications of efforts and systems. In this stage, controls are
adjusted and planning is performed in well-organized manner hence, this stage is called the
‘stage of perfection’.
Stage 6: Maturity
This is the final stage of enhanced Nolan model. It shows that application portfolio (tasks like
orderly entry, material requirements planning, etc.) is completed and hence information flows
within an organization. It is assumed that by this stage, the applications have been
incorporated into the organizational functioning and these are as per the strategic
requirements of the organisation.
14
15
3.0 Introduction
Database Management System (DBMS) is a software solution that allows you to create and
maintain databases in which data are stored. There are four types of data models: relational,
hierarchical, network and object-oriented that you can use to store data. Different individuals,
such as a database manager, perform separate roles to manage the database. DBMS supports
multiple-layered architecture that provides physical and logical data independence. Data
stored in the database can be accessed using different languages such as FML and SQL.
Database design is a process in which you create a logical data model for a database which
stores data of a company. You use the normalization technique to create the logical data
model for a database and eliminate data redundancy. Normalization also allows you to
organize data efficiently in a database and reduce anomalies during data operations. Various
normalization forms, such as first, second and third can be applied to create a logical data
model for a database. Second and third normal forms are based on partial dependency and
transitive dependency. Partial dependency occurs when a row of a table is uniquely identified
by one column that is a part of a primary key. A transitive dependency occurs when a non-
key column is uniquely identified by values in another non-key column of a table. In this
unit, you will learn about the concept of DBMS, its functions, types and benefits.
15
16
1. Database Administrator
16
17
DBA is responsible for making the strategy and policy decisions regarding the organization
of data in the database. DBA also provides technical support in implementing the decisions
which are taken by the data administrator. DBA performs the following functions:
• Defining the conceptual schema for a database
• Defining the internal schema for a database
• Coordinating with users
• Defining security and integrity constraints for the database
• Defining dump and reload policies for a database
• Monitoring performance and responding to changing requirements
2. Database D e s i g n e r s
A database designer identifies the data to be stored in a database. The database designer is
also responsible for choosing the right database structure to represent and store the data in the
database. The tasks of identifying the data and choosing the structure are performed before
the implementation of a database. The database designer communicates with the various
database users to understand their requirements before selecting the database structure.
3. Database U s e r s
The database users are the people who need to interact with DBMS. The database users can
be categorized according to their requirements of data. The people who interact with DBMS
to retrieve data are called the naïve users and the people who interact with DBMS to make
some changes in the database are called the developers.
4. Database M a n a g e r
The database manager refers to the software that helps use and management of the data stored
in a database. The database manager handles the requests of database users to access the data
items from database. The database manager also provides facilities such as support for a
query language, to retrieve and update the database. The facilities provided by the database
manager depend on the design of the database manager. For example, if the data manager is
designed to handle one request at a time,
17
18
Nowadays, there also exist three new types of databases: parallel database, distributed
database and object-oriented databases.
For DBMS implementation you can use various data models which include all database-
related concepts for describing the structure of a database. The various data models used in
DBMS are as follows:
• Hierarchical
• Network
• Relational
• Object-oriented
18
19
19
20
Hierarchical model uses two types of data structures, records and parent-child relationship to
define the data and relationship among data. Records can be defined as a set of field values
which are used to provide information about an entity. An entity is a collection of objects in a
database which can be described by using a set of attributes. Records of same type can be
easily grouped together to form a record type and assigned a name.
Parent-Child Relationship (PCR) can be defined as a 1: N relationship between two different
record types. The record type on the 1-side is called parent record type and record type on the
N-side is called child record type. The Figure below shows an example of 1: N relationship
between a finance department and the employees of finance department.
Department Employee
The network model can be defined as a database model which is used to represent objects and
the relationships among these objects. In network model, a record can have a number of
parent records and it also can have multiple child records. Like Hierarchical model, network
model also supports the concept of data independence which can be defined as the ability to
change the representation of data at one level of a database system without the compulsion of
changing the data representation at the next higher level. In network model, Data
Manipulation Language (DML) is used for searching and retrieving records from the
database. DML can also be used for connecting records from the set of instances, deleting
and modifying records.
Network model uses two types of data structures: records and set type to define the data and
relationship among data. Records can be defined as a set of field values which are used to
provide information about an entity. An entity is a collection of objects in a database
which can be described by using a set of attributes. Records that have a same type can be
easily grouped together to form a record type and assigned a name.
20
21
The structure of a record type can be defined by using a collection of named fields or data
items. Each data item or field has a certain data type such as character, float or integer. The
figure below represents a record type employee that has data items name, sex and birth-date.
Set type is a description of a 1: N relationship between two record types. Each set type
definition has following elements:
• Name for set type
• Owner record type
• Number record type
In the above Table, Cust_name represents the name of the customers, Cust_id is the unique
number for each customer and Cust_city represents the city of the customers.
21
22
Relational data model makes use of the set theory and is based on the concept of
mathematical relation which contains several data elements. The basic characteristics of the
relational model are relational algebra and relational calculus. Relational algebra is a set of
operations for manipulating relations and specifying queries. Relational calculus provides a
declarative way to specify database queries. The relational algebra and the relational calculus
are two different means of representing the database queries. Any relational algebraic
expression can also be converted into a corresponding expression in the relational calculus
and vice versa.
Relations
A relation is a two-dimensional table which is used to represent data in the form of rows and
columns. The names of the columns are known as attributes and rows are known as tuples of
the relation. There are various parts of a relation which are as follows:
• Domain: It is a set of atomic values. The values that cannot be divided into
subcomponents are called atomic values. Generally, you specify a domain as a data
type from which the values forming the domain are taken. You should also give a
name to a domain to help interpret its values.
• Tuple: In relational data model, a row is termed as tuple that gives complete
information of an entity.
• Attribute: It is a column header in a relation that represents the attributes of an entity.
Data mapping is the process of creating data element mappings between two distinct
data models. Data mapping is used as a first step for a wide variety of data integration
tasks including: Data transformation or data mediation between a data source and a
destination.
22
23
23
24
It is a process used in data warehousing by which different data models are linked to each
other using a defined set of methods to characterize the data in a specific definition. This
definition can be any atomic unit, such as a unit of metadata or any other semantic. This data
linking follows a set of standards, which depends on the domain value of the data model
used. Data mapping serves as the initial step in data integration.
3.7 Normalization
Normalization is integral to the database design and it can be defined as the process of
eliminating the redundancy of data in a database. A relational table in a database is said to be
in a normal form if it satisfies certain constraints. The normalization process involves various
levels of normal forms that allow you to separate the data into multiple related tables. The
various normal forms are first normal form (1NF), second normal form (2NF), third normal
form (3NF), fourth normal form (4NF) and fifth normal Form (5NF).
The goals of normalization are as follows:
• Removing the redundant data
• Ensuring that only related data is stored in a table
24
25
Therefore, normalization helps you to remove data redundancy and update inconsistencies
when data are inserted, deleted or modified in a database. The benefits of normalization are
as follows:
• Provides better overall database organization and data consistency within a database
• Allows you to create tables that can be easily joined with other tables with related
information
• Helps to reduce redundant data across the tables
• Prevents data loss by assigning primary and foreign keys in a table
• Helps to reduce modification anomalies such as deletion, insertion and update
anomalies
• Defines relation constraints that are a logical consequence of keys
A unique Student number of a student is a primary key in the STUDENTS table. You cannot
make the first or last name of a student a primary key because more than one student can
have the same first name and can have same stream.
➢ Functional Dependency
A functional dependency is a constraint between two sets of attributes from the database.
Functional dependency is represented by X Y between two attributes, X and Y, in a table.
The functional dependency X Y implies that Y is functionally dependent on X. The Table
below lists the various attributes in the EMPLOYEE table.
25
26
In the table above, the various attributes of the EMPLOYEE are Employee_id,
Employee_name and Employee_dept. You can state that:
Employee_id “ >Employee_name
The above representation that the Employee_name attribute is functionally dependent on the
Employee_id implies that the name of an employee can be uniquely identified from id of the
employee. However, you cannot uniquely identify the Employee_id from the
Employee_name column because more than one employee can have the same name.
However, each employee has different value in the Employee_id column.
Functional dependencies are a type of constraints based on keys such as primary key or
foreign key. For a relation table R, a column Y is said to be functionally dependent on a
column X of the same table if each value of the column X is associated with only one value
of the column Y at a given time. All the columns in the relational table R should be
functionally dependent on X if the column X is a primary key.
If the columns X and Y are functionally dependent, the functional dependency can be
represented as:
R.x R.y
For example, consider the following functional dependency in a table. Employee_id
Salary, the column Employee_id functionally determines the
Salary column because the salary of each employee is unique and remains the same for an
employee, each time the name of the employee appears in the table.
A functional dependency, represented by X Y, between two sets of attributes, X and
Y, that are subsets of R, is called as trivial functional dependency if Y is a subset of X. For
example, Employee_id Project is a trivial functional dependency.
26
27
Data mining refers to extracting or mining knowledge from large amounts of data. The term
is actually a misnomer. Thus, data mining should have been more appropriately named as
knowledge mining which emphasis on mining from large amounts of data.
It is the computational process of discovering patterns in large data sets involving methods at
the intersection of artificial intelligence, machine learning, statistics, and database systems.
The overall goal of the data mining process is to extract information from a data set and
transform it into an understandable structure for further use.
The key properties of data mining are
• Automatic discovery of patterns
• Prediction of likely outcomes
• Creation of actionable information
• Focus on large datasets and databases
27
28
help focus the search, and performing exploratory datamining based on the intermediate data
mining results. In addition, this component allows the user to browse database and data
warehouse schemas or data structures, evaluate mined patterns, and visualize the patterns in
different forms.
29
30
30
31
31
32
32
33
33
34
Tier-1:
The bottom tier is a warehouse database server that is almost always a relational database
system. Back-end tools and utilities are used to feed data into the bottom tier from
operational databases or other external sources (such as customer profile information
provided by external consultants). These tools and utilities perform data extraction, cleaning,
and transformation (e.g., to merge similar data from different sources into a unified format),
as well as load and refresh functions to update the data warehouse. The data are extracted
using application program interfaces known as gateways. A gateway is supported by the
underlying DBMS and allows client programs to generate SQL code to be executed at a
server.
Examples of gateways include ODBC (Open Database Connection) and OLEDB (Open
Linking and Embedding for Databases) by Microsoft and JDBC (Java Database Connection).
This tier also contains a metadata repository, which stores information about the data
warehouse and its contents.
Tier-2:
The middle tier is an OLAP (Online analytical Processing ) server that is typically
implemented using either a relational OLAP (ROLAP) model or a multidimensional OLAP.
OLAP model is an extended relational DBMS that maps operations on multidimensional data
to standard relational operations.
A multidimensional OLAP (MOLAP) model, that is, a special-purpose server that directly
implements multidimensional data and operations.
Tier-3:
The top tier is a front-end client layer, which contains query and reporting tools, analysis
tools, and/or data mining tools (e.g., trend analysis, prediction, and so on).
4.1.2 Data Warehouse Models:
There are three data warehouse models.
1. Enterprise warehouse:
An enterprise warehouse collects all of the information about subjects spanning the entire
organization.
It provides corporate-wide data integration, usually from one or more operational systems or
external information providers, and is cross-functional in scope.
It typically contains detailed data as well as summarized data, and can range in size from a
few gigabytes to hundreds of gigabytes, terabytes, or beyond.
An enterprise data warehouse may be implemented on traditional mainframes, computer
super servers, or parallel architecture platforms. It requires extensive business modelling and
may take years to design and build.
2. Data mart:
A data mart contains a subset of corporate-wide data that is of value to a specific group of
users. The scope is confined to specific selected subjects. For example, a marketing data mart
may confine its subjects to customer, item, and sales. The data contained in data marts tend to
be summarized.
Data marts are usually implemented on low-cost departmental servers that are
UNIX/LINUX- or Windows-based. The implementation cycle of a data mart is more likely to
be measured in weeks rather than months or years. However, it may involve complex
integration in the long run if its design and planning were not enterprise-wide.
34
35
35
36
5.0 Introduction
The retrieval systems are usually in a state of continuous gradual revision; data are added or
withdrawn; new index points inserted; syndetic relationship changed. The development of
effective retrieval technique has been the core of IR research for more than 30 years.
Nowadays multimedia indexing and retrieval techniques are being developed to access
image, video and sound database without text descriptions.
36
37
The main problem here is to obtain a representation of each document and query suitable for
a computer to use. Let me emphasize that most computer-based retrieval systems store only a
representation of the document (or query) which means that the text of a document is lost
once it has been processed for the purpose of generating its representation. A document
representative could, for example, be a list of extracted words considered to be significant.
Rather than have the computer process the natural language, an alternative approach is to
have an artificial language within which all queries and documents can be formulated.
37
38
38
39
39
40
40
41
41
42
The black box is the processing part of the information retrieval system; it includes mainly
indexing and searching
42
43
Information need)
43
44
44
45
➢ Disgruntled employees/contractors
Internal attacks are one of the biggest threats facing our data and systems. Rogue employees,
especially members of the IT team with knowledge of and access to networks, data centres
and admin accounts, can cause serious damage to an organizations network, systems and
data.
45
46
45
46
47
Human Resources
Security
Information Security
Incident Management
47
Given the trends in security threats and attack technologies, a robust defense requires a
flexible strategy that allows adaptation to the changing environment, well-defined policies
and procedures, the use of appropriate security technologies, and constant vigilance.
It is helpful to begin a security improvement programme by determining the current state of
security. Integral to a security programme are documented policies and procedures, as well as
technology that supports their implementation.
A. Administrative Security
Administrative security consists of an information security strategy, policy and guidelines.
An information security strategy sets the direction for all information security activities.
An information security policy is a documented high-level plan for organization-wide
information security. It provides a framework for making specific decisions, such as an
administrative and physical security plan.
Information security guidelines should be established according to the information security
strategy and policy. The guidelines should specify regulations for each area related to
information security. And because the guidelines must be comprehensive and national in
scope, they must be developed and delivered by the government for observance by
organizations.
A country’s information security strategy, policy and guidelines should be in compliance
with related law. Their scope should be within the boundaries of national and international
laws.
B. Technological security
Various technologies have been developed to help organizations secure their information
systems against intruders. These technologies help to protect systems and information against
attacks, to detect unusual or suspicious activities, and to respond to events that affect security.
Today’s security systems have been designed and developed based on a Defense-In-Depth
(DID) model that leads to unified management of the technologies involved. This model is
different from perimeter defence, which has only one layer of defence against all threats. The
DID model consists of prevention, detection and tolerance, with threats being reduced at each
pha
Prevention Technology
Prevention technologies protect against intruders and threats at the storage or system level.
These technologies include the following:
1. Cryptography – Also referred to as encryption, cryptography is a process of
translating information from its original form (called plaintext) into an encoded,
incomprehensible form (called ciphertext). Decryption refers to the process of taking
ciphertext and translating it back into plaintext.
2. One-time passwords (OTPs) – As the name implies, OTPs can be used only once.
Static passwords can more easily be accessed by password loss, password sniffing,
brute-force password cracks, and the like.
3. Firewalls – Firewalls regulate some of the flow of traffic between computer networks
of different trust levels such as between the Internet, which is a no-trust zone, and an
internal network, which is a zone of higher trust
4. Vulnerability analysis tool –In computer security, a vulnerability is a weakness that
allows an attacker to violate a system. Vulnerabilities may result from weak
passwords, software bugs, a computer virus, a script code injection, an SQL injection
or malware. Vulnerability analysis tools detect these vulnerabilities.
Detection Technology
Detection technology is used to detect and trace abnormal states and intrusion in networks or
important systems. Detection technology includes the following:
1. Antivirus – An antivirus software is a computer program for identifying, neutralizing
or eliminating malicious code, including worms, phishing attacks, rootkits, Trojan
horses and other malware.
2. Intrusion detection system (IDS) – An IDS gathers and analyses information from
various areas within a computer or a network to identify possible security breaches.
Intrusion detection functions include analysis of abnormal activity patterns and ability
to recognize attack patterns.
3. Intrusion prevention system (IPS) – Intrusion prevention attempts to identify potential
threats and respond to them before they are used in attacks. An IPS monitors network
traffic and takes immediate action against potential threats according to a set of rules
established by the network administrator. For example, an IPS might block traffic
from a suspicious IP address.
4. Malware sand box system – A "malware sandbox" is a security system that separates
execution of programs, usually in an effort to mitigate malware from spreading. It is
often used to execute untested or untrusted programs or code, possibly from
unverified or untrusted third parties, suppliers, users or websites, in a “sandbox”
without risking harm to the host machine or operating system. The sandbox typically
tightly controls the programs, and restricts the program’s access to disk, memory and
network.
5. Network Traffic Analysis (NTA) – Network traffic analysis is an active cyber defence
activity. It is "the process of proactively and iteratively searching through networks to
detect and isolate advanced threats that evade existing security solutions”
6.6. Protection of Privacy
This section aims to:
• Trace changes in the concept of privacy;
• Describe international trends in privacy protection; and
• Give an overview and examples of Privacy Impact Assessment
6.6.1. The Concept of Privacy
Personal information is any information relating to an identifiable individual or an identified
or identifiable natural person. It includes information such as an individual’s name, phone
number, address, e-mail address, licence number of an automobile, physical characteristics
(facial dimensions, fingerprints, handwriting, etc.), credit card number and family
relationship.
Inappropriate access to and collection, analysis and use of an individual’s personal
information have an effect on the behaviour of others towards that individual, and ultimately
have a negative impact on his/her social standing, property and safety. Therefore, personal
information should be protected from improper access, collection, storage, analysis and use.
In this sense, personal information is the subject of protection.
When the subject of protection is the right to personal information rather than the personal
information itself, this is the concept of privacy. There are five ways to explain the right to
privacy:
• The right to be free from unwanted access (e.g., physical access and access via short
messaging service)
• The right not to allow personal information to be used in an unwanted way (e.g., sale
of information, exposure of information and matching)
• The right not to allow personal information to be collected by others without
one’s knowledge and consent (e.g., through the use of CCTV and cookies)
• The right to have personal information expressed accurately and correctly (i.e.
integrity)
• The right to get rewarded for the value of one’s own information
Since the late 1960s, the world has paid attention to the effect on privacy of automated
information processing. UNESCO in particular has shown interest in privacy and privacy
protection since the “UN Guidelines for the Regulation of Computerized Personal Data File”
was adopted by the General Assembly in 1990.
The United Nations Guidelines are applied to documents (papers) as well as computerized
data files in the public or private sectors. The Guidelines establish a series of principles
concerning minimum guarantees to be provided for national legislation or in the internal laws
of international organizations, as follows:
7.0 Introduction
Information systems analysis and design is a method used by companies ranging from IBM
to PepsiCo to Sony to create and maintain information systems that perform basic business
functions such as keeping track of customer names and addresses, processing orders, and
paying employees. The main goal of systems analysis and design is to improve organizational
systems, typically through applying software that can help employees accomplish key
business tasks more easily and efficiently. As a systems analyst, you will be at the center of
developing this software.
The analysis and design of information systems are based on: Your understanding of the
organization’s objectives, structure, and processes Your knowledge of how to exploit
information technology for advantage To be successful in this endeavour, you should follow
a structured approach.
7.1 The Systems Development Life Cycle (SDLC)
The SDLC is a structured approach used in the field of software engineering to guide the
development of information systems and software applications. It encompasses a series of
phases or stages that help ensure the successful planning, design, development,
implementation, and maintenance of a system. Here are the typical phases of the SDLC:
Figure 7.2: Stages of the Systems Development Life Cycle (SDLC)
Stage 1: Analysis – What Do We Want?
In this initial phase, the project team works closely with stakeholders to understand their
needs and gather requirements for the system. This involves identifying user requirements,
functional specifications, and any constraints or limitations.
Stage 2: Design – What Will the Finished Project Look Like?
In this phase, the system's architecture and design are created based on the requirements
gathered. The design includes components such as database structure, user interface, system
modules, and integration points. Design decisions are made to ensure that the system meets
the specified requirements and is scalable, maintainable, and efficient.
Stage 3: Development– Let’s Create the System
The phase involves the actual development of the system. Programmers write code based on
the design specifications, and databases are created and populated with data. This phase may
also involve integrating third-party components or customizing existing software. Testing is
an integral part of implementation to identify and fix any defects or issues.
Stage 4: Testing– Let’s Create the System
In this phase, the system is thoroughly tested to ensure it meets the specified requirements
and functions correctly. Different testing techniques, such as unit testing, integration testing,
system testing, and user acceptance testing, are employed to validate the system's
functionality, performance, and reliability. Defects and issues are identified and resolved
during this phase.
Stage 5: Implementation– How Will We Use It?
Once the system has passed the testing phase, it is ready for deployment. This involves
installing the system in the production environment, configuring any necessary hardware or
software, and migrating data from legacy systems if applicable. User training and
documentation may also be provided to facilitate the smooth transition to the new system.
Stage 6: Maintenance– Let’s Make the Improvements
After the system is deployed, ongoing maintenance and support activities are performed. This
includes monitoring the system's performance, addressing user feedback, fixing defects, and
implementing changes or enhancements as needed. Regular updates, patches, and system
backups are part of the maintenance process to ensure the system's stability and security.
It's important to note that there are different variations and models of the SDLC, such as the
Waterfall model, Agile methodologies (e.g., Scrum, Kanban), and iterative models. Each
model has its own set of characteristics and emphasizes different aspects of the development
process. The choice of the SDLC model depends on factors such as project requirements,
timeline, team size, and organizational preferences.
The Waterfall model is a linear and sequential approach to software development. It follows a
strict top-down flow, where each phase (requirements, design, implementation, testing,
deployment) is completed before moving to the next. It is a plan-driven methodology and
works well for projects with well-defined and stable requirements.
a. Agile Model:
Agile methodologies, such as Scrum, Kanban, and Extreme Programming (XP), promote an
iterative and incremental approach. They emphasize flexibility, collaboration, and
adaptability to change. Agile methodologies prioritize delivering working software in short
iterations called sprints, gathering feedback from stakeholders, and continuously improving
the product.
c. Spiral Model:
The Spiral model is an iterative and risk-driven approach that combines elements of the
Waterfall model and prototyping. It involves multiple iterations where each iteration includes
requirements gathering, risk analysis, prototyping, development, and testing. The Spiral
model is suitable for projects with high-risk factors that require a flexible and iterative
approach.
The Iterative model incorporates a series of smaller “waterfalls,” where manageable portions
of code are carefully analyzed, tested, and delivered through repeating development cycles.
Getting early feedback from an end user enables the elimination of issues and bugs in the
early stages of software creation.
The Iterative model is often favored because it is adaptable, and changes are comparatively
easier to accommodate.
UNIT 8. LEGAL AND ETHICAL ISSUES IN INFORMATION MANAGEMENT
8.0 Introduction
It probably goes without saying that the security and ethical issues raised by the Information
Age, and specifically the Internet, are the most explosive to face our society in decades. It
will be many years and many court battles before socially acceptable policies and practices
are in place. You say to yourself, “Hey I don’t really care about my online privacy. Nobody
will ever care about what I do or where I go on the Internet.” Well, you might want to think
twice about that.
Organizations nowadays are having strict policies and measures in terms of ethical concerns
pertaining to information management, training is provided which helps them to engage in
learning about the conduct as well as learning to resolve issues when they arise. Workplace
policies are based on the company’s mission statement and the philosophy they follow and
help employees follow that code of conduct.
The most noticeable difference between intellectual property and other forms of property,
however, is that intellectual property is intangible, that is, it cannot be defined or identified
by its own physical parameters. It must be expressed in some discernible way to be
protectable.
8.1.1 Types of Intellectual Property
The term intellectual property is usually thought of as comprising four separate legal fields:
1. Trademarks
2. Copyrights
3. Patents
4. Trade secrets
1. Trademarks and Service Marks: A trademark or service mark is a word, name, symbol,
or device used to indicate the source, quality and ownership of a product or service. A
trademark is used in the marketing is recognizable sign, design or expression which identifies
products or service of a particular source from those of others. The trademark owner can be
an individual, business organization, or any legal entity. A trademark may be located on a
package, a label, a voucher or on the product itself. For the sake of corporate identity
trademarks are also being.
2. Copyrights:
Copyright is a form of protection provided by U.S. law (17 U.S.C 101 et seq) to the authors
of "original works of authorship" fixed in any tangible medium of expression. The manner
and medium of fixation are virtually unlimited. Creative expression may be captured in
words, numbers, notes, sounds, pictures, or any other graphic or symbolic media. The subject
matter of copyright is extremely broad, including literary, dramatic, musical, artistic,
audiovisual, and architectural works. Copyright protection is available to both published and
unpublished works.
3. Patents:
A patent for an invention is the grant of a property right to the inventor, issued by the United
States Patent and Trademark Office. Generally, the term of a new patent is 20 years from the
date on which the application for the patent was filed in the United States or, in special cases,
from the date an earlier related application was filed, subject to the payment of maintenance
fees. U.S. patent grants are effective only within the United States, U.S. territories, and U.S.
possessions. Under certain circumstances, patent term extensions or adjustments may be
available.
Privacy and data protection regulations are laws and regulations designed to safeguard the
privacy and personal data of individuals. These regulations vary across countries and regions,
but they generally share common objectives in protecting the rights and freedoms of
individuals and establishing rules for the collection, use, storage, and disclosure of personal
information. They include;
General Data Protection Regulation (GDPR): The GDPR is a comprehensive privacy
regulation that came into effect in the European Union (EU) in May 2018. It applies to all EU
member states and regulates the processing of personal data of EU residents. The GDPR
grants individuals various rights, such as the right to access, rectify, and erase their personal
data, and imposes obligations on organizations to ensure privacy and data protection.
California Consumer Privacy Act (CCPA): The CCPA is a privacy law in California,
United States, that became effective in January 2020. It aims to enhance privacy rights and
consumer protection for California residents. The CCPA grants consumers the right to know
what personal information is collected about them, the right to opt out of the sale of their
personal information, and the right to request deletion of their data.
Personal Information Protection and Electronic Documents Act (PIPEDA): PIPEDA is a
federal privacy law in Canada that applies to the collection, use, and disclosure of personal
information in the course of commercial activities. It sets out rules for obtaining consent,
safeguarding personal information, and providing individuals with access to their data.
PIPEDA has been supplemented by provincial privacy laws in some provinces, such as the
Personal Information Protection Act (PIPA) in Alberta and British Columbia.
Health Insurance Portability and Accountability Act (HIPAA): HIPAA is a United States
federal law that sets privacy and security standards for protected health information (PHI). It
applies to health care providers, health plans, and other entities that handle PHI. HIPAA aims
to protect the privacy and confidentiality of individuals' medical information and establishes
guidelines for its use and disclosure.
Personal Data Protection Act (PDPA): The PDPA is a data protection law in Singapore that
governs the collection, use, and disclosure of personal data. It provides individuals with the
right to access and correct their data, imposes obligations on organizations to protect personal
data, and establishes rules for the transfer of data outside Singapore.
Privacy Act of 1974: The Privacy Act is a U.S. federal law that governs the collection, use,
and disclosure of personal information by federal agencies. It grants individuals certain
rights, such as the right to access and amend their records, and imposes obligations on
agencies to protect personal information
Mode of Assessment
Participation 5 Mks
Attendance 5 Mks
Assignment/Individual Work 10 Mks
Continuous Assessment 10 Mks
End Of Semester Evaluation 70 Mks