Bachelor
of Business Administration-BBA Semester IV
BB0020
– Managing Information – 4 Credits
(Book
ID: B0099)
Assignment
Set- 1 (60 Marks)
Note: Each question
carries 10 Marks. Answer all the questions.
Q 1. a. What are the sources of data from which
the manager can collect the data? [2 Marks]
A.1a). Sources of
data used by managers can be classified in several ways. Some of these
alternative way of classifying sources of data are discussed below:
Internal versus External data: Internal data is the
data that is generated within the organisation while external data is generated
outside the organization. for example data on the sales of a company is
generated within the company and can be extracted from records of the company.
But data on total industry sales or sales of a particular competitor is not
generated within the company. Such data need to be collected from sources that
are external to the company.
Primary versus secondary data: Primary data refers
to the data that is collected from direct interview, observation or research
carried out by the person for a specific purpose. Secondary data refers to the
data that is available to a person from such data compiled, analysed and
documented by the person concerned or some other person earlier for a different
person. Such secondary data is also available through published sources and
information supplied on payment by agencies specializing in collecting and
providing such data.
Operational versus special purpose data: Some data used by
managers may be generated during the course of normal operations such as
selling, purchase, and manufacturing. For example data on actual time taken for
machining different components may be collected from the production records.
However, the data on machining time for a new component may have to be
generated specifically for the use of a manager.
Direction of flow of
information: A manager may receive
information from superiors, subordinates, or from peers.
Q 1.b. What are
the uses of information to any organization? [3 Marks]
A.1b.There are 4 main uses of information in organisations.
Monitoring and control
Decision-making
Measuring performance
Identifying new business opportunities
Monitoring and control
Decision-making
Measuring performance
Identifying new business opportunities
Monitoring and control Businesses will compare actual performance
against its predicted (budgeted) performance. Then they will act upon it.
Decision-making When managers are ready to make tough choices
(decisions) they need good, accurate and up-to-date information. If they act
without relevant information it could lead to disaster, and failure.
Measuring performance Organisations can compare their sales figures
with their competitors or indeed against their own previous years.
Q 1.c. What is the
difference between Data, Information and Knowledge? [2 Marks]
A1.c. The Differences Between Data,
Information and Knowledge
We frequently hear the words Data, Information and Knowledge
used as if they are the same thing. You
hear people talking about the Internet as a “vast network of human knowledge”
or that they’ll “e-mail through the data.” By
defining what we mean by data, information and knowledge – and how they interact
with one another – it should be much easier.
Has Anyone Seen My CDs?
A few years ago, the UK Government Tax office lost some CDs
containing 25 million people’s records, when they were posted
unsecurely. The fear was that there was enough information contained on them to
allow criminals to set up bank accounts, get loans, and do their Christmas
shopping… all under someone else’s name. In
the fallout, the main argument in the press was about security, and
inevitably there were many that were using it to attack Government ministers.
Anyone who’s ever worked in a bureaucracy will know that this kind of thing
goes on more often that we would like to think, as people cut corners. No
procedure or official process is water-tight. It’s just this time, they didn’t
get away with it.
The media used the terms “data” and “information”
interchangeably.
For example, one of the frequent mistakes was that they lost
“data.” However, you can’t physically lose data. You can’t physically
pick up data, move it about, etc.
Let me explain, but – before we go any further - I should
point out that I’m using the Infogineering definitions of the three
words (data, information, knowledge) here. They’ve been so muddled up over the
past few years that the various definitions don’t match up. So, let me explain
how Infogineering views them all.
Knowledge
Firstly,
let’s look at Knowledge. Knowledge is what we know. Think of this as the
map of the World we build inside our brains. Like a physical map, it helps us
know where things are – but it contains more than that. It also contains
our beliefs and expectations. “If I do this, I will probably get that.”
Crucially, the brain links all these things together into a giant network of
ideas, memories, predictions, beliefs, etc. It is from this “map” that we base
our decisions, not the real world itself. Our brains constantly update
this map from the signals coming through our eyes, ears, nose, mouth and
skin.You can’t currently store knowledge in anything other than a brain,
because a brain connects it all together. Everything is inter-connected in the
brain. Computers are not artificial brains. They don’t understand what
they are processing, and can’t make independent decisions based upon
what you tell them.
There
are two sources that the brain uses to build this knowledge - information and
data.
Data
is/are the facts of the World. For example, take yourself. You may be
5ft tall, have brown hair and blue eyes. All of this is “data”. You have brown
hair whether this is written down somewhere or not. In many ways, data can be
thought of as a description of the World. We can perceive this data with
our senses, and then the brain can process this. Human beings have used data as
long as we’ve existed to form knowledge of the world. Until we started using
information, all we could use was data directly. If you wanted to know how tall
I was, you would have to come and look at me. Our knowledge was limited by our
direct experiences.
Information
allows us to expand our knowledge beyond the range of our senses. We can capture
data in information, then move it about so that other people can access it
at different times. Here is a simple analogy for you. If I take a picture of
you, the photograph is information. But what you look like is data. I
can move the photo of you around, send it to other people via e-mail etc.
However, I’m not actually moving you around – or what you look like.
I’m simply allowing other people who can’t directly see you from where they are
to know what you look like. If I lose or destroy the photo, this doesn’t change
how you look. So, in the case of the lost tax records, the CDs were
information. The information was lost, but the data wasn’t. Mrs
Jones still lives at 14 Whitewater road, and she was still born on 15th August
1971. The Infogineering Model (below) explains how these interact…
Q1.d. What is a data
bank? Give an example for databank to express your understanding.
[3 Marks]
A1.d. In telecommunications,
a data bank is a repository of information on one or more subjects that is
organized in a way that facilitates local or remote information retrieval. A
data bank may be either centralized or decentralized. In this sense, data bank
is synonymous with database. In computers the data bank is the sam as in
telecommunication (i.e. it is the repository of data. The data in the data bank
can be things such as credit card transactions of a store or it can be any data
base of a company where 1000 of queries are being processed on daily bases).
Data bank may also refer to an organization primarily concerned with the
construction and maintenance of a database Data packages can be uploaded using
the Data Stage web module. Submissions can also be made with any other
http-compatible language using the Data Bank API, so long as the data is
submitted as a .zip file (ideally BagIt or SWORD-2-compliant). When uploading a data package, the following
settings are available:
• Public: (metadata and data fully accessible
by the outside world, from day 1).
• Embargoed: metadata is visible but
underlying data files are invisible for a period of time (e.g. embargoed until
the related thesis has been judged, or paper has been published).
• Metadata-only: metadata is visible but the
data will never be visible (the file is "embargoed" with no end
date). All Data Bank submissions are assigned a default 70-year embargo, but
the administrator can change default setting.
• Dark archive: metadata and data completely
invisible; only the person who made the deposit, and the silo manager, can ever
find it. NOTE: this cannot be achieved on a Data Bank instance in which some
metadata or data are public. It requires a separate "dark" Data Bank
instance.
Unless the administrator
adds a robots file saying they do not want to be crawled, by default all data
held in a non-dark instance of Data Bank will be visible to Google and any
other web crawlers. Users can make files more visible by including richer
metadata in the "manifest.rdf" file (the metadata "label"
on the data package).
The following are examples
of various database types. Some of them are not main-stream types, but most of
them have received special attention (e.g., in research) due to end-user
requirements. Some exist as specialized DBMS products, and some have their
functionality types incorporated in existing general-purpose DBMSs. Though may
differ in nature and functionality, these various types typically have to
comply with the usability requirements below to comply as databases.
Examples
Active
database - An active database is a database that includes an
event-driven architecture which can respond to conditions both inside and
outside the database. Possible uses include security monitoring, alerting,
statistics gathering and authorization. Most modern relational databases
include active database features in the form of database trigger.
Cloud
database - A Cloud database is a database that relies on cloud
technology. Both the database and most of its DBMS reside remotely, "in
the cloud," while its applications are both developed by programmers and
later maintained and utilized by (application's) end-users through a web
browser and Open APIs. More and more such database products are emerging, both
of new vendors and by virtually all established database vendors.
Data
warehouse - Data warehouses archive data from operational databases and
often from external sources such as market research firms. Often operational
data undergo transformation on their way into the warehouse, getting
summarized, anonymized, reclassified, etc. The warehouse becomes the central
source of data for use by managers and other end-users who may not have access
to operational data. For example, sales data might be aggregated to weekly
totals and converted from internal product codes to use UPCs so that they can
be compared with ACNielsen data. Some basic and essential components of data
warehousing include retrieving, analyzing, and mining data, transforming,
loading and managing data so as to make them available for further use.
Operations in a data warehouse are typically concerned with bulk data
manipulation, and as such, it is unusual and inefficient to target individual
rows for update, insert or delete. Bulk native loaders for input data and bulk
SQL passes for aggregation are the norm.
Distributed
database - The definition of a distributed database is
broad, and may be utilized in different meanings. In general it typically
refers to a modular DBMS architecture that allows distinct DBMS instances to
cooperate as a single DBMS over processes, computers, and sites, while managing
a single database distributed itself over multiple computers, and different
sites. Examples are databases of local work-groups and departments at regional
offices, branch offices, manufacturing plants and other work sites. These
databases can include both segments shared by multiple sites, and segments specific
to one site and used only locally in that site.
Document-oriented
database - A
document-oriented database is a computer program designed for storing,
retrieving, and managing document-oriented, or semi structured data,
information. Document-oriented databases are one of the main categories of
so-called NoSQL databases and the popularity of the term
"document-oriented database" (or "document store") has
grown with the use of the term NoSQL itself. Utilized to conveniently store, manage,
edit and retrieve documents.
Embedded
database - An embedded database system is a DBMS which is tightly
integrated with an application software that requires access to stored data in
a way that the DBMS is “hidden” from the application’s end-user and requires
little or no ongoing maintenance. It is actually a broad technology category
that includes DBMSs with differing properties and target markets. The term
"embedded database" can be confusing because only a small subset of
embedded database products is used in real-time embedded systems such as
telecommunications switches and consumer electronics devices.
End-user
database - These databases consist of data developed by individual
end-users. Examples of these are collections of documents, spreadsheets,
presentations, multimedia, and other files. Several products exist to support
such databases. Some of them are much simpler than full fledged DBMSs, with
more elementary DBMS functionality (e.g., not supporting multiple concurrent
end-users on a same database), with basic programming interfaces, and a
relatively small "foot-print" (not much code to run as in
"regular" general-purpose databases). However, also available
general-purpose DBMSs can often be used for such purpose, if they provide basic
user-interfaces for straightforward database applications (limited query and
data display; no real programming needed), while still enjoying the database
qualities and protections that these DBMSs can provide.
Federated
database and multi-database - A federated database is an
integrated database that comprises several distinct databases, each with its
own DBMS. It is handled as a single database by a federated database management
system (FDBMS), which transparently integrates multiple autonomous DBMSs,
possibly of different types (which makes it a heterogeneous database), and
provides them with an integrated conceptual view. The constituent databases are
interconnected via computer network, and may be geographically decentralized.
Sometime the term multi-database is used as a synonym to federated database,
though it may refer to a less integrated (e.g., without an FDBMS and a managed
integrated schema) group of databases that cooperate in a single application.
In this case typically middleware for distribution is used which typically includes
an atomic commit protocol (ACP), e.g., the two-phase commit protocol, to allow
distributed (global) transactions (vs. local transactions confined to a single
DBMS) across the participating databases.
Graph
database - A graph database is a kind of NoSQL database
that uses graph structures with nodes, edges, and properties to represent and
store information. General graph databases that can store any graph are
distinct from specialized graph databases such as triple stores and network
databases.
Hypermedia
databases - The World Wide Web can be thought of as a
database, albeit one spread across millions of independent computing systems.
Web browsers "process" these data one page at a time, while web
crawlers and other software provide the equivalent of database indexes to
support search and other activities.
Hypertext
database - In a Hypertext database, any word or a piece of text
representing an object, e.g., another piece of text, an article, a picture, or
a film, can be linked to that object. Hypertext databases are particularly
useful for organizing large amounts of disparate information. For example they
are useful for organizing online encyclopedias, where users can conveniently
jump in the texts, in a controlled way, by using hyperlinks.
In-memory
database - An in-memory database (IMDB; also main memory database
or MMDB) is a database that primarily resides in main memory, but typically
backed-up by non-volatile computer data storage. Main memory databases are
faster than disk databases. Accessing data in memory reduces the I/O reading
activity when, for example, querying the data. In applications where response
time is critical, such as telecommunications network equipment, main memory
databases are often used.
Knowledge
base - A knowledge base (abbreviated KB, kb or Δ[5][6]) is a
special kind of database for knowledge management, providing the means for the
computerized collection, organization, and retrieval of knowledge. Also a
collection of data representing problems with their solutions and related
experiences.
Operational
database -These databases store detailed data about the operations
of an organization. They are typically organized by subject matter, process
relatively high volumes of updates using transactions. Essentially every major
organization on earth uses such databases. Examples include customer databases
that record contact, credit, and demographic information about a business'
customers, personnel databases that hold information such as salary, benefits,
skills data about employees, Enterprise resource planning that record details
about product components, parts inventory, and financial databases that keep
track of the organization's money, accounting and financial dealings.
Parallel database - A
parallel database, run by a parallel DBMS, seeks to improve performance through
parallelization for tasks such as loading data, building indexes and evaluating
queries. Parallel databases improve processing and input/output speeds by using
multiple central processing units (CPUs) (including multi-core processors) and
storage in parallel. In parallel processing, many operations are performed
simultaneously, as opposed to serial, sequential processing, where operations
are performed with no time overlap. The major parallel DBMS architectures
(which are induced by the underlying hardware architecture are:
Shared memory architecture,
where multiple processors share the main memory space, as well as other data
storage.
Shared disk architecture, where each
processing unit (typically consisting of multiple processors) has its own main
memory, but all units share the other storage.
Shared nothing architecture, where each
processing unit has its own main memory and other storage.
Real-time database -If a
DBMS system responses users' request in a given time period, it can be regarded
as a real time database.
Spatial
database - A spatial database can store the data with
multidimensional features. The queries on such data include location based
queries, like "where is the closest hotel in my area".
Temporal
database - A temporal database is a database with built-in time
aspects, for example a temporal data model and a temporal version of Structured
Query Language (SQL). More specifically the temporal aspects usually include
valid-time and transaction-time.
Unstructured-data
database- An unstructured-data database is intended to store in a
manageable and protected way diverse objects that do not fit naturally and
conveniently in common databases. It may include email messages, documents,
journals, multimedia objects etc. The name may be misleading since some objects
can be highly structured. However, the entire possible object collection does
not fit into a predefined structured framework. Most established DBMSs now
support unstructured data in various ways, and new dedicated DBMSs are
emerging.
Q.2 a. Bring out the
difference between Paper based records and Computer based
information
[5 Marks]
A.2 a. When
businesses first began using computers in large numbers, pundits heralded the
coming of the "paperless society." The computer revolution still has
a way to go to deliver on that particular promise. Nevertheless, traditionally
paper-based processes--both business and personal--continue to migrate to more
computerized forms, and for some very good reasons.
Documents The computer has brought great ease and flexibility to the creation and editing of documents. In contrast to a typewriter, computerized word processing programs offer an almost limitless choice of styles, typefaces and formats for documents. Typing errors can be easily corrected onscreen without the need for correction fluid or correction tape. Whole blocks of text can be easily copied from one document to another without the need for any retyping. Photos and other graphics can be included in the document with very little effort.
Documents The computer has brought great ease and flexibility to the creation and editing of documents. In contrast to a typewriter, computerized word processing programs offer an almost limitless choice of styles, typefaces and formats for documents. Typing errors can be easily corrected onscreen without the need for correction fluid or correction tape. Whole blocks of text can be easily copied from one document to another without the need for any retyping. Photos and other graphics can be included in the document with very little effort.
Sharing Sharing documents with a computerized system is simple. There is no need to make physical copies of the document and then mail or fax them to the recipients. A document on file in a computerized system can be shared with anyone else who has access to that system simply by having them display the document on their own computer screen. Documents can be shared outside the company by simply attaching the document to an email sent to the recipient.
Filing The purpose of filing is not just to store documents, but to also make them easily accessible. The computer excels in this in a way that the simple filing cabinet never could. Documents filed in a computerized system are automatically indexed by the computer's file control system. These indexes are automatically updated and maintained by the system no matter how often the document may be moved or edited. Documents can even be located by having the computer search large numbers of documents for specific words or phrases. Additionally, computerized filing systems can store a huge number of documents in a tiny fraction of the space required by physical filing cabinets.
Functionality Far from being simply an electronic representation of a static paper document, an electronic document can become a truly interactive entity. An electronic version of a fill-in form, for instance, can allow the entry of data directly into the document with real time error checking and verification. Calculations and functionality can be built directly into the document. For example, an existing customer can be listed on an electronic document by having the document use the computer's customer database file to allow the user to simply select the customer's name from a list of all customers in the file. The logic built into the document will then automatically transfer the customer's information into the document, including addresses, customer accounting numbers, or any other desired data.
Safety The physical safety of a company's files is of utmost importance. Files must be secured against physical damage or destruction. Access to files by unauthorized personnel must also be prevented. A computerized filing system simplifies these tasks. Copies of computerized files can easily be created and stored in various locations, both in multiple computer platforms within the network or on removable data media for off-site physical storage. Files in the computer system can also be encrypted to render them unreadable by those without authorized permission to view the files.
b. What are the pre
requisites for establishing National Information? [5 Marks]
A2.(b). The
fundamental premise of an overall national information policy is that any
economic, social and political system will perform more efficiently if a
mechanism is provided which will ensure that government officials,
decision-makers, managers and researchers have timely access to up-to-date,
relevant and reliable data and information.
Unesco, the chief
promoter of the establishment of national information systems, advocates that
an overall national information policy, fully incorporated into the national
development plan, is essential for rational socio-economic development. Many
countries around the world, developed as well as developing ones, have been
concerned with the co-ordination of their various information systems and
services so that all the information resources can be channeled into a national
information system - composed of sectoral information systems, specialized
libraries, data banks and other information services - which can respond to the
information needs of all citizens.
In most countries
there exist constitutional acts, policies, and legislation of various
kinds relating in varying degrees to the provision of information. But
the interrelationships which exist between issues concerning information
communication, information technology, information economics,
information management, information privacy and confidentiality, and the
right to information signal the need for an
overall comprehensive
approach to the problem.
In addition, the very
fact that sound decision-snaking and planning in the world of to-day
necessitates data and information of all kinds, such as financial, social,
scientific, from national as well as foreign
sources, makes it
essential that an overall basic policy statement be adopted. Such a statement
should be comprehensive, sufficiently sensitive to the development of new
technologies, responsive to the implications of the "Information Age"
and formulated in broad terms to minimize the need for frequent
revisions as circumstances
evolve. Explicit in the statement of a national information policy is the need
for an effective co-ordinating mechanism.
Q.3 a. Explain the
different media from which you can obtain and share information in the daily
life and compare each one of them with a justification [5 Marks]
A.3.a In business there are the same media
forums that most people are familiar with these days. The first would be to
look at publications such as pamphlets. Perhaps your company wants to get word
out about a new product. Having a flyer that details information about the
product is one form of media. The Internet has websites that may be used by a
business as a public forum for sharing information. The Internet is world wide
and can reach many people. A newsletter
can be sent through the mail or by e-mail to stakeholders and others. The
information could be well planned and reach many people easily. Television is a
media often used for advertising a product. In the case of BP it was used for
public relations following the oil spilling into the gulf incident.
b. Write short notes
on Business Process Re-engineering and record
management [5 Marks]
A.3(b) Business process re-engineering is a business
management strategy, originally pioneered in the early 1990s, focusing on the
analysis and design of workflows and processes within an organization. BPR
aimed to help organizations fundamentally rethink how they do their work in
order to dramatically improve customer service, cut operational costs, and
become world-class competitors. In the mid-1990s, as many as 60% of the Fortune
500 companies claimed to either have initiated reengineering efforts, or to
have plans to do so. BPR seeks to help companies radically restructure their
organizations by focusing on the ground-up design of their business processes.
According to Davenport (1990) a business process is a set of logically related
tasks performed to achieve a defined business outcome. Re-engineering
emphasized a holistic focus on business objectives and how processes related to
them, encouraging full-scale recreation of processes rather than iterative
optimization of sub processes. Business process re-engineering is also known as
business process redesign, business transformation, or business process change
management.
The most notable
definitions of reengineering are:
"... the
fundamental rethinking and radical redesign of business processes to achieve
dramatic improvements in critical contemporary modern measures of performance,
such as cost, quality, service, and speed."
"encompasses the envisioning of new work
strategies, the actual process design activity, and the implementation of the
change in all its complex technological, human, and organizational
dimensions."
BPR is different from
other approaches to organization development (OD), especially the continuous
improvement or TQM movement, by virtue of its aim for fundamental and radical
change rather than iterative improvement. In order to achieve the major
improvements BPR is seeking for, the change of structural organizational variables,
and other ways of managing and performing work is often considered as being
insufficient. For being able to reap the achievable benefits fully, the use of
information technology (IT) is conceived as a major contributing factor. While
IT traditionally has been used for supporting the existing business functions,
i.e. it was used for increasing organizational efficiency, it now plays a role
as enabler of new organizational forms, and patterns of collaboration within
and between organizations. BPR derives its existence from different
disciplines, and four major areas can be identified as being subjected to
change in BPR - organization, technology, strategy, and people - where a
process view is used as common framework for considering these dimensions.
Records management, or RM, is
the practice of maintaining the records of an organization from the time they
are created up to their eventual disposal. This may include classifying,
storing, securing, and destruction (or in some cases, archival preservation) of
records. A record can be either a tangible object or digital information: for
example, birth certificates, medical x-rays, office documents, databases,
application data, and e-mail. Records management is primarily concerned with
the evidence of an organization's activities, and is usually applied according
to the value of the records rather than their physical format. In the past,
'records management' was sometimes used to refer only to the management of
records which were no longer in everyday use but still needed to be kept -
'semi-current' or 'inactive' records, often stored in basements or offsite.
More modern usage tends to refer to the entire 'lifecycle' of records - from
the point of creation right through until their eventual disposal. The ISO
15489-1: 2001 standard ("ISO 15489-1:2001") defines records
management as "[the] field of management responsible for the efficient and
systematic control of the creation, receipt, maintenance, use and disposition
of records, including the processes for capturing and maintaining evidence of
and information about business activities and transactions in the form of
records". The ISO 15489-1:2001 defines records as "information
created, received, and maintained as evidence and information by an
organization or person, in pursuance of legal obligations or in the transaction
of business". While there are many purposes of and benefits to records
management, as both this definition highlights, a key feature of records is
their ability to serve as evidence of an event. Proper records management can
help preserve this feature of records. It should be noted that the format and
media of records is generally irrelevant for the purposes of records
management. The ISO considers management of both physical and electronic records.
Also, section DL1.105 of the United States Department of Defense standard DoD
5015.02-STD (2007) defines Records Management as "[t]he planning,
controlling, directing, organizing, training, promoting, and other managerial
activities involving the life cycle of information, including creation,
maintenance (use, storage, retrieval), and disposal, regardless of media."
Q.4 a. What are the
disadvantages of Questionnaire method of data collection? [5
Marks]
A.4 a. Disadvantages of questionnaires:
1. Questionnaires, like many evaluation methods occur
after the event, so participants may forget important issues.
2. Questionnaires are standardised so it is not possible to explain any points in the questions that participants might misinterpret. This could be partially solved by piloting the questions on a small group of students or at least friends and colleagues. It is advisable to do this anyway.
3. Open-ended questions can generate large amounts of data that can take a long time to process and analyse. One way of limiting this would be to limit the space available to students so their responses are concise or to sample the students and survey only a portion of them.
4. Respondents may answer superficially especially if the questionnaire takes a long time to complete. The common mistake of asking too many questions should be avoided.
5. Students may not be willing to answer the questions. They might not wish to reveal the information or they might think that they will not benefit from responding perhaps even be penalised by giving their real opinion. Students should be told why the information is being collected and how the results will be beneficial. 6. They should be asked to reply honestly and told that if their response is negative this is just as useful as a more positive opinion. If possible the questionnaire should be anonymous.
2. Questionnaires are standardised so it is not possible to explain any points in the questions that participants might misinterpret. This could be partially solved by piloting the questions on a small group of students or at least friends and colleagues. It is advisable to do this anyway.
3. Open-ended questions can generate large amounts of data that can take a long time to process and analyse. One way of limiting this would be to limit the space available to students so their responses are concise or to sample the students and survey only a portion of them.
4. Respondents may answer superficially especially if the questionnaire takes a long time to complete. The common mistake of asking too many questions should be avoided.
5. Students may not be willing to answer the questions. They might not wish to reveal the information or they might think that they will not benefit from responding perhaps even be penalised by giving their real opinion. Students should be told why the information is being collected and how the results will be beneficial. 6. They should be asked to reply honestly and told that if their response is negative this is just as useful as a more positive opinion. If possible the questionnaire should be anonymous.
b. What is the use of
documentation? [5 Marks]
A.4.b Documentation is a
rather general activity meaning recording in a document form any useful
information. Thus documents refer to any recorded information. Traditionally
documents referred to the paper records of any information such as contracts,
certificates, forms and other papers used in routine business documents, and
manuals. However, with the increasing usage of computers, the documents can
also be in the form of electronic records. The purpose of documentation in
general is to make record information for use whenever required. The documents
may be used for a one time and immediate specific use. For example a purchase
order is a document used in this way. Other documents may be used for referring
again and again. User manuals is an example of such documents. Still other type
of documents are created and preserved for possible future use. For example, at
the close of project, some history of the project may be documented just in
case someone wants to study it in future. Documents are also used a a proof of
truth of certain facts such as decisions taken, instructions given and
agreements reached. These documents are used as reference and for establishing
the facts if and when required.
Q.5 Explain the
different types of information search in detail. [10 Marks]
A 5 An information system is a collection of hardware,
software, data, people and procedures that are designed to generate information
that supports the day-to-day, short-range, and long-range activities of users
in an organization. Information systems generally are classified into five
categories: office information systems, transaction processing systems,
management information systems, decision support systems, and expert systems.
The following sections present each of these information systems.
1. Office
Information Systems An office information system, or OIS
(pronounced oh-eye-ess), is an information system that uses hardware, software
and networks to enhance work flow and facilitate communications among
employees. Win an office information system, also described as office
automation; employees perform tasks electronically using computers and other
electronic devices, instead of manually. With an office information system, for
example, a registration department might post the class schedule on the
Internet and e-mail students when the schedule is updated. In a manual system,
the registration department would photocopy the schedule and mail it to each
student’s house. An office information system supports a range of business
office activities such as creating and distributing graphics and/or documents,
sending messages, scheduling, and accounting. All levels of users from
executive management to no management employees utilize and benefit from the
features of an OIS. The software an office information system uses to support
these activities include word processing, spreadsheets, databases, presentation
graphics, e-mail, Web browsers, Web page authoring, personal information
management, and groupware. Office information systems use communications
technology such as voice mail, facsimile (fax), videoconferencing, and
electronic data interchange (EDI) for the electronic exchange of text,
graphics, audio, and video. An office information system also uses a variety of
hardware, including computers equipped with modems, video cameras, speakers,
and microphones; scanners; and fax machines.
2. Transaction Processing Systems A transaction processing system (TPS) is an information
system that captures and processes data generated during an organization’s
day-to-day transactions. A transaction is a business activity such as a
deposit, payment, order or reservation. Clerical staff typically performs the
activities associated with transaction processing, which include the following:
1. Recording a business activity such as a student’s
registration, a customer’s order, an employee’s timecard or a client’s payment.
2. Confirming an action or triggering a response, such as
printing a student’s schedule, sending a thank-you note to a customer,
generating an employee’s paycheck or issuing a receipt to a client.
3. Maintaining data, which involves adding new data,
changing existing data, or removing unwanted data.
Transaction processing systems were among the first
computerized systems developed to process business data – a function originally
called data processing. Usually, the TPS computerized an existing manual system
to allow for faster processing, reduced clerical costs and improved customer
service.
The first transaction processing systems usually used
batch processing. With batch processing, transaction data is collected over a
period of time and all transactions are processed later, as a group. As
computers became more powerful, system developers built online transaction
processing systems. With online transaction processing (OLTP) the computer
processes transactions as they are entered. When you register for classes, your
school probably uses OLTP. The registration administrative assistant enters
your desired schedule and the computer immediately prints your statement of
classes. The invoices, however, often are printed using batch processing,
meaning all student invoices are printed and mailed at a later date.
Today, most transaction processing systems use online
transaction processing. Some routine processing tasks such as calculating
paychecks or printing invoices, however, are performed more effectively on a
batch basis. For these activities, many organizations still use batch
processing techniques.
3. Management
Information Systems While computers were ideal for routine
transaction processing, managers soon realized that the computers’ capability
of performing rapid calculations and data comparisons could produce meaningful
information for management. Management information systems thus evolved out of
transaction processing systems. A management information system, or MIS
(pronounced em-eye-ess), is an information system that generates accurate,
timely and organized information so managers and other users can make
decisions, solve problems, supervise activities, and track progress. Because it
generates reports on a regular basis, a management information system sometimes
is called a management reporting system (MRS). Management information systems
often are integrated with transaction processing systems. To process a sales
order, for example, the transaction processing system records the sale, updates
the customer’s account balance, and makes a deduction from inventory. Using
this information, the related management information system can produce reports
that recap daily sales activities; list customers with past due account
balances; graph slow or fast selling products; and highlight inventory items
that need reordering. A management information system focuses on generating
information that management and other users need to perform their jobs. An MIS
generates three basic types of information: detailed, summary and exception.
Detailed information typically confirms transaction processing activities. A
Detailed Order Report is an example of a detail report. Summary information
consolidates data into a format that an individual can review quickly and easily.
To help synopsize information, a summary report typically contains totals,
tables, or graphs. An Inventory Summary Report is an example of a summary
report. Exception information filters data to report information that is
outside of a normal condition. These conditions, called the exception criteria,
define the range of what is considered normal activity or status. An example of
an exception report is an Inventory Exception Report is an Inventory Exception
Report that notifies the purchasing department of items it needs to reorder.
Exception reports help managers save time because they do not have to search
through a detailed report for exceptions. Instead, an exception report brings
exceptions to the manager’s attention in an easily identifiable form. Exception
reports thus help them focus on situations that require immediate decisions or
actions.
4. Decision
Support Systems Transaction processing and management
information systems provide information on a regular basis. Frequently,
however, users need information not provided in these reports to help them make
decisions. A sales manager, for example, might need to determine how high to
set yearly sales quotas based on increased sales and lowered product costs.
Decision support systems help provide information to support such decisions. A
decision support system (DSS) is an information system designed to help users
reach a decision when a decision-making situation arises. A variety of DSSs
exist to help with a range of decisions. A decision support system uses data
from internal and/or external sources. Internal sources of data might include
sales, manufacturing, inventory, or financial data from an organization’s
database. Data from external sources could include interest rates, population
trends, and costs of new housing construction or raw material pricing. Users of
a DSS, often managers, can manipulate the data used in the DSS to help with
decisions. Some decision support systems include query language, statistical
analysis capabilities, spreadsheets, and graphics that help you extract data
and evaluate the results. Some decision support systems also include
capabilities that allow you to create a model of the factors affecting a
decision. A simple model for determining the best product price, for example,
would include factors for the expected sales volume at each price level. With
the model, you can ask what-if questions by changing one or more of the factors
and viewing the projected results. Many people use application software
packages to perform DSS functions. Using spreadsheet software, for example, you
can complete simple modeling tasks or what-if scenarios. A special type of DSS,
called an executive information system (EIS), is designed to support the
information needs of executive management. Information in an EIS is presented
in charts and tables that show trends, ratios, and other managerial statistics.
Because executives usually focus on strategic issues, EISs rely on external
data sources such as the Dow Jones News/Retrieval service or the Internet.
These external data sources can provide current information on interest rates,
commodity prices, and other leading economic indicators. To store all the
necessary decision-making data, DSSs or EISs often use extremely large
databases, called data warehouses. A data warehouse stores and manages the data
required to analyze historical and current business circumstances.
5. Expert Systems An expert system is an information system that captures and stores the
knowledge of human experts and then imitates human reasoning and
decision-making processes for those who have less expertise. Expert systems are
composed of two main components: a knowledge base and inference rules. A
knowledge base is the combined subject knowledge and experiences of the human
experts. The inference rules are a set of logical judgments applied to the
knowledge base each time a user describes a situation to the expert system. Although
expert systems can help decision-making at any level in an organization, no
management employees are the primary users who utilize them to help with
job-related decisions. Expert systems also successfully have resolved such
diverse problems as diagnosing illnesses, searching for oil and making soup. Expert
systems are one part of an exciting branch of computer science called
artificial intelligence. Artificial intelligence (AI) is the application of
human intelligence to computers. AI technology can sense your actions and,
based on logical assumptions and prior experience, will take the appropriate
action to complete the task. AI has a variety of capabilities, including speech
recognition, logical reasoning, and creative responses. Experts predict that AI
eventually will be incorporated into most computer systems and many individual
software applications. Many word processing programs already include speech
recognition.
6. Integrated Information Systems With today’s sophisticated hardware, software and communications
technologies, it often is difficult to classify a system as belonging uniquely
to one of the five information system types discussed. Much of today’s
application software supports transaction processing and generates management
information. Other applications provide transaction processing, management
information, and decision support.
Q.6 Define
Information Society. Describe the impact of information society on
information
profession. [10 Marks]
A.6 There
is currently no universally accepted concept of what exactly can be termed
information society and what shall rather not so be termed. Most theoreticians
agree that a transformation can be seen that started somewhere between the
1970s and today and is changing the way societies work fundamentally.
Information technology goes beyond the internet, and there are discussions
about how big the influence of specific media or specific modes of production
really is. In 2005, governments reaffirmed their dedication to the foundations
of the Information Society in the Tunis Commitment and outlined the basis for
implementation and follow-up in the Tunis Agenda for the Information Society.
In particular, the Tunis Agenda addresses the issues of financing of ICTs for
development and Internet governance that could not be resolved in the first
phase. Some people, such as Antonio Negri, characterize the information society
as one in which people do immaterial labour. By this, they appear to refer to
the production of knowledge or cultural artifacts. One problem with this model
is that it ignores the material and essentially industrial basis of the
society. However it does point to a problem for workers, namely how many
creative people does this society need to function? For example, it may be that
you only need a few star performers, rather than a plethora of non-celebrities,
as the work of those performers can be easily distributed, forcing all
secondary players to the bottom of the market. It is now common for publishers
to promote only their best selling authors and to try to avoid the rest—even if
they still sell steadily. Films are becoming more and more judged, in terms of
distribution, by their first weekend's performance, in many cases cutting out
opportunity for word-of-mouth development. Considering that metaphors and
technologies of information move forward in a reciprocal relationship, we can
describe some societies (especially the Japanese society) as an information
society because we think of it as such as letters.
Impact
In the modern world,
information has the power to transform the lives of people and nations. National
development is influenced by the amount of available information. The idea of
an "information society" is connected to this fact. There are
different definitions of "Information Society." Access to information
is crucial, and it is influenced by many factors. Balance among the factors is
essential to shrink the digital divide (Rao, 2006).
Martin (1995) defined
an information society as a society in which the quality of life, as well as
prospects for social change and economic development, depends increasingly upon
information and its exploitation. In such a society, living standards, patterns
of work and leisure, the education system and the marketplace are influenced markedly
by advances in information and knowledge. This is evidenced by an increasingly
array
of
information-intensive products and services, communicated through a wide range
of media, many of them electronic in nature.
The information
society is driven by information and communication technologies (ICT), along with
new skills for the population, government support, and sustainability (Rao,
2006). Rao notes that
ICTs can be seen as
an instrument or an industry. ICTs are expanding into developing countries, but
there is a large gap between those who can afford it and those who cannot. ICTs
can have a positive impact on development and help close the gap.
Technology can be
both a tool of development and a divider of the populace. It also can be misused.
ICTs can strengthen education, public service, government, agriculture, and
other industries.
Implementation of the
Information Society
In developed
countries, the Internet is a mainstream medium, but this is still not the case
in developing countries. There are 500 million Internet users in the world, and
80 percent are in the developed world, while in developing countries only two
percent of the population has access to the Internet (Rao, 2006). There is both
anecdotal and theoretical evidence about the impact of the Internet and other
features of the information society (Rao, 2006).
Political
Implications
Governments are the
largest producers and consumers of information. Governments organize and
disseminate statistical data, which is used for decision-making. E-government
allows direct participation by citizens in matters of public interest. Although
the pace of change to e-government is not as quick as it could be, particularly
in developing countries, changes are inevitable.
ICTs influence the
lives of poor people in developing countries in different ways. It might take
time before the impact is visible. Implementation has different implications
for different areas of a country, and these factors must be taken into account
when attempting to measure impact. The Internet has hosted social networks,
activism, community networks, and e-government initiatives. Challenges include inadequate
access, poor electricity, high costs, and lack of skills, infrastructure, and
sustainability
(Neelameghan, 1999).
Governments accustomed to tight media control may be surprised by the instant global
dissemination of information. This has resulted in Internet filtering in a
number of cases. Also, despite the new opportunities for industry and culture,
there is concern about the hegemony of Western culture enabled by
globalization.
ICTs must be
incorporated in the development plans of a country. ICT should ideally be
driven by the government, with a clear ICT policy that contributes to the
eradication of poverty. The policy should cover knowledge creation, transfer,
and innovation. There must also be people in government who understand the ICT
and can move it forward (Geldof, 2005). The use of ICT can influence the
delivery of government services, as well as access to them and participation by
citizens. Models of e-government include the wider dissemination model, and the
service delivery model. One issue of particular concern related to e-government
is Internet governance, including not only ownership, but also governance of
and on the Internet. This is a complex issue which can be politically
sensitive.
Social Implications
ICT has affected all
aspects of life in both positive and negative ways. This has led to
consideration of
information ethics. Geldof (2005) observes that introducing ICTs is a social
process. The social implications are as important as the technology. ICT is transforming
communication. ICT can have a significant impact on the position of women in
society. ICT has the potential to help poor women to improve their lives, but
women are also often vulnerable, and may need protection from the negative aspects
of ICT, as with human trafficking via the Internet. Social and cultural norms
may constrain
women’s participation
in ICT, as so a lack of literacy and education, language, infrastructure, as
well as high costs (Geldof, 2005).
ICT can have an
important impact on poor and marginalized people, and can improve education, training
and employment. ICT can be used to alleviate poverty. There are still concerns
about the social impact of ICT. If the digital divide becomes more severe, new
generations could become estranged from
their own culture.
Moral Implications
Bachelor
of Business Administration-BBA Semester IV
BB0020
– Managing Information –
4
Credits
(Book ID: B0099)
Assignment
Set- 2
Q.1 a. What are the advantages of information
retrieval?
Ans. Full text retrieval
systems are designed to retrieve information from a database made of any kind
text or data. This capability, in fact,
widened the scope of application of text retrieval system. In fact, text retrieval packages are useful
for any kind of organization. Major
areas are:
Administrative
Correspondence tracking
Manual preparation
Proposals and procedures
Financial
Credit history
Capital budget requests
Business plans
Legal
Litigation support
Control analysis
Brief preparation
Regulatory findings
Legislative tracking
Manufacturing
Project control and
planning
Process description
Vendor information
Specifications
Quality assurance
procedures
Marketing
Competitor analysis
Customer tracking
Attitude survey
Questionnaire analysis
Product descriptions
Personnel
Skills inventory
Resume tracking
Employee benefit policies
Self-instruction programs
Performance reviews
Scientific and engineering
Technical abstracts
Journal articles
Research cross-references
Patent information
Reaction results
A closer look through the above list would
reveal that text retrieval systems are applicable virtually to every area of an
organization.
b. What are the problems of full text
retrieval systems?
Ans. Problems
of full text retrieval systems
· Full text retrieval
systems are designed to display, as the result of a successful search, the
'facts' directly on the screen from a single source. The major problem of a
full text database is that the text should be in ASCII or EBCDIC format, which
is intelligible to the database handler.
· Acquisition of complete
text in the database is often a major problem of full text systems. Keyboarding the whole lengthy text is not
only a time consuming job, but is also quite expensive. An attractive way of
entering full texts may be to use the method of Optical Character Recognition
(OCR). However, this requires the original text in quite clean and standard
fonts.
· Another problem of full
text systems arises from the time and resources taken up in updating with additions
of new materials. Need for updating is not quite unexpected given the large
size of the text data and the auxiliary files, but it does make
frequent-amendments and thus quite costly in terms of computer resources. Some
other difficulties associated with text retrieval systems could be
-Different database designers or online
services often handle the same publication differently, which may confuse the
user community. Again, some services include selected part of the texts for
economic use of disk space, but this may hamper user's interest.
Q2. What are the different types of
trade and product bulletins? Explain in brief.
Ans. Types
of Trade and Product Bulletins
The format and design of trade and product
bulletins seems to be governed by the psychology and economics of advertising
and selling rather than by considerations of their use and preservation.
In-spite of the wide variety of physical characteristics of trade bulletins, a
few, basis types may be examined in some detail in the following sections.
Some of the types of trade and product
bulletins are:
· House journals;
· Advertisements and
supplements in technical journals and trade magazines;
· Special issues and
supplements of journals;
· Manufacture's catalogues
and data sheets;
· Product descriptions
supplied at trade fairs, conventions, exhibitions
· Directories of products
and companies; and
· Trade catalogues service.
Q3. What are the different types of
attacks on information you will find in your daily life? Explain in brief.
Ans. We have noted that
computer and communications technologies have propelled us into the Information
Age. These advances have also made business susceptible to new and dangerous
kinds of invisible attacks, popularly generalized as computer crime and are
probably a real threat to businesses. But as of 1989, the most significant
threats to critical business information continue to come from the mental or
written form. A secondary risk is from trusted insiders, who purposely expose
or destroy information.
The answer to these kinds of threat is simple
and obvious. Better training, supervision, and motivation for employees and
procedures are the alternative to minimize errors and safeguard valuable
information. Unfortunately, the regularity and frequency of cases involving
exposure or loss of sensitive information show that in many companies,
management has not bothered to address the matter effectively.
Risk to business information other than
carelessness with paper and loose talk is far less frequent and has less
impact. But the potential for information exposure or loss sensitive
information show that in many companies, management has not bothered to address
the matters effectively.
Q.4 Take a scenario of your choice and
explain in your own words how one can think of taking care of information
security.
Ans. The following are areas to
watch:
Press releases: The competitive
intelligence people before going out should check sensitive press
releases. Is the information being let
out worth the cost of having the competition know it? In some cases, a little
pruning may be necessary.
Public filings: The same goes for public
filings with federal, state, and local agencies. It's illegal not to provide the requested
information, but the form should be checked to make sure you haven't
"overfilled," given more information than necessary. Indeed, the
information that is left out should be noted so that the competitive intelligence
unit knows what puzzle pieces are out there and available to the competitor. While
the competitor may have some information about you, the idea is to keep them
from having all the pieces needed to make a strong analysis. Keeping away from
having that critical mass of information takes skill and experience.
For example, on blueprints submitted for a
city building permit, are machinery positions required to be included? What's
the least amount of information you can supply about the machine's description?
Technical Papers: One of the main leaks
from companies is through technical papers delivered at conferences by
engineers and researchers. While a free exchange of ideas benefits everyone,
the papers should be examined to make sure that strategic plan or other
confidential information isn't being broadcasted or telecasted inadvertently.
Speeches and
presentations: The same holds true for speeches by the CEO or other top managers.
While no one will purposely give away confidential information, it's important
to check speeches for certain pieces of information that could help a
competitor analyse something and give them a competitive advantage.
Plant tours: Using the old methods of
security, all plant tours would be considered off limits. Today companies are to fulfil civic duties or
business obligations by allowing visitors in their facilities. However,
visitors should be kept to areas with little strategic value to
competitors. They should be escorted and
not allowed to roam free.
Q.5 Explain Knowledge
Management Cycle with a neat diagram.
Ans. Knowledge Management Cycle
The KM cycle can be represented as below in
the figure 1. KM cycle has four activities, which are almost interrelated to
each other.
Figure 1
Planning: This requires a three
phased approach and this encompass the following process.
1. Clear understanding of user needs,
including the time constraints of user.
2. Understand business environment
3. Understand customer need
4. Understand competitors’ activities
5. Establish a collection and analysis plan
6. Keep the user informed.
Collection: This process
involves collection of various
1. Types of information
2. Primary Secondary and Tertiary
3. Now and later types of information (refers
to information required for immediate and later use)
4. Easy v/s difficult
5. Public domain information (Government
information)
6. Trade Association
7. Databases both In-house and external. The external database can be either free or
paid in nature.
8. Internet
9. Non public domain information
· Sales people
· Observation
· Trade shows
Analysis:
Knowledge is analysed information, which is
ready to perceive and take decision on that. The concept of analysis became
popular after the World War II. US is the first to become leader in analysis
concept and as such information analysis to generate knowledge.
"Analysis is the process of taking
information often seemingly unconnected information and turning it into
knowledge. One should understand that analysis is a skill, which one has to
develop. Intelligence Agencies look for good analyst for predictions because
they make remote relationships from things they have learned and know about
from outside the realm of their immediate investigation. They relate this
outside information to what is going on with in their own organization.
Q.6 Explain the need
for an information policy and national information
Policy.
Ans. Need for an Information Policy and National
Information Policy
Information is for use. Which encompasses a
whole range of information transfer processes, stemming from the recognition that
information is a basic resource that transforms natural resources into value
added powerful wealth. The value and importance of information and knowledge,
therefore, demand their care, harnessing management and exploitation for use. The ultimate purpose of information and
knowledge is to put them to use, and in turn, to provide for a higher quality
of life to people. The vital role of information in national development has to
be seen in this perspective.
The primary objective of a National
Information Policy is to achieve a progressive up-liftment of the
socio-economic development of the country through the provision of access to
and availability of information and knowledge with speed and efficiency to all
those who are involved in activities for national development. In the context
of India, a National Information Policy must necessarily be governed by and
form an integral and harmonious part of the social, economic, educational,
research and development and other related policies which get formulated at
various stages of our national development. Further, the Information Policy
needs to be properly made compatible with the five year National Plans of the
country.
No comments:
Post a Comment