(MIS Assignment March 21st 2017) Nur Muthrofin T/1401164001 (MB40-INT01)


ASSIGNMENT 1

Mid-Term

  1. The other five major objectives are:

a. New products, services, and business models

The company can make new variance or products to reach the strategic of business

b. Customer and supplier intimacy

If know the information about the customer and the supplier we can get their loyality

c. Improved decision making

With the improvement of the technology nowadays we can making the decision quickly

d. Competitive advantage

We can win the competitiveness by reducing the price or make a goods with top quality

e. Survival

The company survival against the economic conditions and the law

2.Characteristic of DSS and MIS

Decision Support System (DSS) is an internal business element that provides owners, executives, and other employees with information for making informed decisions

· Sensitivity analysis. The study of the impact that changes in one (or more) parts of a model have on other parts.

· What-if analysis. The study of the impact of a change in the assumptions (input data) on the proposed solution.

· Goal-seeking analysis. Study that attempts to find the value of the inputs necessary to achieve a desired level of output.

Management information system (MIS) is a set of systems which helps management at different levels to take better decisions by providing the necessary information to managers. Here are the basic characteristics of MIS:

· Management-oriented

The basic objective of MIS is to provide information support tothe management in the organization for decision making.

· Management directed

When MIS is management-oriented, it should be directed by themanagement because it is the management who tells their needs and requirements moreeffectively than anybody else.

· Integrated

Development of information must be integrated so that all theoperational and functional information sub systems should be worked together as a singleentity. This integration is necessary because it leads to retrieval of more meaningful anduseful information

  1. Five Primary activity of value chain model

a. Inbound logistic: automated warehousing systems

b. Operations: computer controlled machining systems

c. Sales and marketing: computerized ordering systems

d. Services: equipment maintenance systems

e. Outbound logistics: automated shipment scheduling systems

  1. Five-step ethical analysis are:

a. Identify and clearly describe the facts.

In this step we have to find out about who did what to whom, and where, when, and how

b. Define the conflict or dilemma and identify the higher-order values involved.

Typically, an ethical issue involves a dilemma two diametrically opposed courses of action that support worthwhile values. The parties to a dispute all claim to be pursuing higher values

c. Identify the stakeholders.

players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions.

d. Identify the options that you can reasonably take.

We may find that none of the options satisfy all the interests involved, but that some options do a better job than others. Sometimes arriving at a good or ethical solution may not always be a balancing of consequences to stakeholders.

e. Identify the potential consequences of your options.

Some options may be ethically correct but disastrous from other points of view. Other options may work in one instance but not in other similar instances

  1. Short for storage area network, SAN is a high-speed network of storage devices that also connects those storage devices with servers. It provides block-level storage that can be accessed by the applications running on any networked servers.

  2. DBMS

A database management system (DBMS) is software that permits an organization, people, or users to centralize data, manage them efficiently, and provide access. DBMS has some of capabilities such as data definition capability, data dictionary, and data manipulation language like SQL.

Traditional file management environment usually creates such problems as data redundancy and inconsistency, program–data dependence, inflexibility, poor security, and lack of data sharing and availability. When the application program calls for a data item such as Monthly Payment, the DBMS finds this item in the database and presents it to the application program. But when using traditional data files, the users should have to specify the size and format of each data element used in the program and then tell the computer where they were located. Database management system (DBMS) solves these problems with software that permits centralization of data and data management so that businesses have a single, consistent source for all their data needs. Using a DBMS can minimizes the redundant and inconsistent files.

  1. Network convergence is the efficient coexistence of telephone, video and data communication within a single network. The use of multiple communication modes in a single network offers convenience and flexibility not possible with separate infrastructures. Network convergence is also called media convergence.

  2. The CRM help firms achieve customer intimacy by using it’s system. CRM systems examine customers from a multifaceted perspective. These systems use a set of integrated applications to address all aspects of the customer relationship, including customer service, sales, and marketing. Companies can use this customer knowledge when they interact with customers to provide them with better service or to sell new products and services. The major CRM software products support business processes in sales, service, and marketing, integrating customer information from many different sources. Included are support for both the operational and analytical aspects of CRM.

ASSIGNMENT 2

  1. Informtion System organization evolution

The steady progress of technology and common patterns of growth have inspired a whole body of literature on the evolution of information systems. The combination of hardware, software, data, and communication formed the core of information systems. As each of these dimensions developed and integrated, the concept, design, and capability of information systems underwent massive changes. The earliest systems were the classic centralized systems typically characterized by a mainframe host computer supported by an array of peripherals, including "dumb” terminals, which allowed interactive, information processing activities mostly of a transactional nature Leifer, 1988). These centralized systems were modest in size in the earlier generation computers, but grew from small, medium to large centralized mainframe systems over time. This was the trend up to the 1970s, and for the first 20 years discussions on data and systems were about techniques to manage data in a centralized environment.

  1. Sarbanes Oaxley Act

is legislation passed by the U.S. Congress to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise, as well as improve the accuracy of corporate disclosures. The U.S. Securities and Exchange Commission (SEC) administers the act, which sets deadlines for compliance and publishes rules on requirements. The Sarbanes-Oxley Act was enacted in response to a series of high-profile financial scandals that occurred in the early 2000s.

  1. Key Performance Indicators

is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs at multiple levels to evaluate their success at reaching targets. High-level KPIs may focus on the overall performance of the enterprise, while low-level KPIs may focus on processes in departments such as sales, marketing or a call center.

  1. The business continuity planning (BCP)

is the creation of a strategy through the recognition of threats and risks facing a company, with an eye to ensure that personnel and assets are protected and able to function in the event of a disaster. Business continuity planning (BCP) involves defining potential risks, determining how those risks will affect operations, implementing safeguards and procedures designed to mitigate those risks, testing those procedures to ensure that they work, and periodically reviewing the process to make sure that it is up to date.


Leave a Reply