information technologyomtrivedi.com/admins/pic/20180514120550_ldr_it... · copyright © 2017 om s...

Post on 12-May-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Copyright © 2017 Om S Trivedi. All rights reserved.

Information Technology

By: Om Trivedi

Copyright © 2017 Om S Trivedi. All rights reserved.

An Introduction to BPM

CHAPTER 1

Copyright © 2017 Om S Trivedi. All rights reserved.

Business System

Fixed set of rules to execute a task assigned by the business process with the help of

❖Man

❖Machine

❖ Computer and

❖Other resources.

Systems are static and dynamic, both.

Organisational structure within which several processes are executed.

System supports processes and processes support people.

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Process

BP is a sequence of co-ordinated activities to transforms input into output

which creates some value to the customer as well as the organization.

BP is a sequence of co-ordinated activities to reach a goal.

Business Process is a dynamic activity.

Copyright © 2017 Om S Trivedi. All rights reserved.

What is Process Flow?

An event

Well-defined beginning and end

Completed in a short period

❖ A prescribed sequence of work steps

❖ Performed in order to produce a desired result

Copyright © 2017 Om S Trivedi. All rights reserved.

Accounting Process Cycle

Copyright © 2017 Om S Trivedi. All rights reserved.

Sales Process Cycle

Copyright © 2017 Om S Trivedi. All rights reserved.

Purchase Process Cycle

Copyright © 2017 Om S Trivedi. All rights reserved.

Finance Process Cycle

Financial Planning

Allocation

Operations & Monitoring

Evaluation & Analysis

Reporting

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of Business Processes

Business Process

Organizational Business Process

Operational Business Process

Copyright © 2017 Om S Trivedi. All rights reserved.

Levels of Business Processes

Business Strategy

Goals

Organizational Business Process

Implemented Business Process

Operational Business Process

Realize

Realize

Realize

Realize

Determines

Determines

Determines

Determines

Level 1

Level 2

Level 3

Level 4

Level 5

Copyright © 2017 Om S Trivedi. All rights reserved.

Process Management

“Process management involves coordinated and

standardised efforts

to

map, implement, improve, and follow

the organizational processes.”

Copyright © 2017 Om S Trivedi. All rights reserved.

Steps in Process Management

Define the steps (tasks)

Map the tasks to the roles involved

Implement the steps (tasks)

Establish performance measures to improve

Set up the standardised organizational processes that can be

followed throughout

Copyright © 2017 Om S Trivedi. All rights reserved.

What is BPM?

BPM is a set of functions in a certain sequence that, at

the end, delivers value for an internal or external

customer.

Copyright © 2017 Om S Trivedi. All rights reserved.

What is BPM?

“The achievement

of

an organization’s objectives

through the

improvement, management and control

of

essential business processes”.

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Process Life Cycle (BPLC)

It is a step-wise or phase-wise presentation of one process

after the other in a cyclical structure.

Incorporates:

Data, HR, Technologies, Resources, Infrastructure, Cultures, Roles

and Responsibilities. (Or, we can say all the components of

Internal Environment)

Copyright © 2017 Om S Trivedi. All rights reserved.

BPM Life-cycle

2

1

5

4

3Redesign 2A

Copyright © 2017 Om S Trivedi. All rights reserved.

Objectives of BPM

Cost Reduction and Control

Achieve Process Objectives

Value Creation

Efficiency and Effectiveness of BP

Copyright © 2017 Om S Trivedi. All rights reserved.

Benefits of using Technology for BPM

Goal fulfilment

Process improvements

Creation of basic operational value proposition

Effectiveness gains for enterprises

Revenue growth

Copyright © 2017 Om S Trivedi. All rights reserved.

BPM Principles

Role of IT in Business Processes

Business Processes are assets

Business Processes create value to customers

Continuous improvement of processes

Copyright © 2017 Om S Trivedi. All rights reserved.

BPM Practices

Processes oriented organizational structure

Appoint process owners

Rewards for BP performances

Top-Bottom Commitment

Bottom-Up Execution

Collaborate with business partners

Co-ordination on inter-departmental BPs

IT enabled BPM

Continuous process improvements

Use TQM, Six-Sigma, BPR, etc. for continuous BP improvement

Training of workforce

Copyright © 2017 Om S Trivedi. All rights reserved.

Theories of Process Management

• Six Sigma

• Total Quantity Management

• Business Process Re-engineering

Copyright © 2017 Om S Trivedi. All rights reserved.

What is Six Sigma?

Six Sigma focuses on developing and delivering near

perfect products and services.

Why Six Sigma?

Improving Customer Satisfaction

Reducing Cycle Time

Reducing Defects

CCD

Copyright © 2017 Om S Trivedi. All rights reserved.

Six Sigma Methodology

Six Sigma Methods

DMADVDMAIC

Copyright © 2017 Om S Trivedi. All rights reserved.

DMAIC

Define

Measure

Analyse

Improve

Control

Copyright © 2017 Om S Trivedi. All rights reserved.

Define

Measure

AnalyzeImprove

ControlDMAIC

Supplier InputManufacturing and Services

Output Customer

Quality Productivity Cost Profitability

Copyright © 2017 Om S Trivedi. All rights reserved.

BPR Success Factors

IT Infrastructure

Team

Business Need Analysis

Organization-wide Commitment

Ongoing Continuous Improvements

Management of Change

IT BOOM

Copyright © 2017 Om S Trivedi. All rights reserved.

BPM Implementation

&

Role of IT

Copyright © 2017 Om S Trivedi. All rights reserved.

Key Factors in Implementing BPM

Scope

Goal

Methods

Skills

Tools

Investments

Sponsorship

1

2

3

4

5

6

7

Copyright © 2017 Om S Trivedi. All rights reserved.

Need for BPM Implementation

Positioning for future

Cost effectiveness

Continuous Improvement

Knowledge of Product

Address the cultural barriers

Reengineering of business

Leadership

Copyright © 2017 Om S Trivedi. All rights reserved.

Impact of IT on BPM (BPM Leads to Success)

Saves lot of time, money and energy

Makes BPs Simple

Optimizes work and revenue

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Risks of failure of IT

Deficient executive involvement

Deficient project management

Breakdown in gap analysis

Limited options for customization of BPMS

Too complicated to be customized

Failure to identify future business needs

Inadequate assessment of the need for change management

Software fails to meet business needs

Unavailability of resources when desired

Compatibility issues with other BPMS

Technological Obsolescence

Copyright © 2017 Om S Trivedi. All rights reserved.

BPA

A business process is

✓ a set of activities or strategies

✓ to automate business processes so as

✓ to bring benefit to enterprise

✓ in terms of cost, time and effort

Copyright © 2017 Om S Trivedi. All rights reserved.

Key Benefits of BPA

Improved Process

Improved Procedures

Improved Process Control

Improved Assignments

Improved Customer Service

Improved Efficiency

Improved Flexibility

Copyright © 2017 Om S Trivedi. All rights reserved.

Benefits of BPA

Save Cost

Stay ahead in competition

Fast customer service

Copyright © 2017 Om S Trivedi. All rights reserved.

Risk of BPA

Unemployment

False sense of Security

Copyright © 2017 Om S Trivedi. All rights reserved.

Challenges in Implementing BPA

Budgets

Options of products, services and prices

Build and buy system

Interfaces/interactions with the customer

Copyright © 2017 Om S Trivedi. All rights reserved.

Automation of Functional Units

Automation of all the functional areas involved in the day to day operations.

Copyright © 2017 Om S Trivedi. All rights reserved.

Enterprise Business Systems: End-to-end Customer Processes

Copyright © 2017 Om S Trivedi. All rights reserved.

The Value Chain Analysis (Important Concepts)

Value Added

Creation of a competitive advantage by bundling,

combining, or packaging features and benefits that result

in greater customer acceptance.

Value Analysis

It is an accounting analysis to understand the ‘value added’

of separate activities in a complex manufacturing process,

in order to determine where cost improvement could be

made and/or value creation improved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Value Chain Framework of Porter (1990)

Copyright © 2017 Om S Trivedi. All rights reserved.

Processing Cycles of an Accounts BPM

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Process Mapping

Systems

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Entity Relationship Diagrams

Entity

Relationship

Attributes

Copyright © 2017 Om S Trivedi. All rights reserved.

Data Flow Diagrams

Logical Data Flow Diagram

Physical Data Flow Diagram

Context Diagram

Copyright © 2017 Om S Trivedi. All rights reserved.

Information System, It’s

Components and

Computing Technologies

CHAPTER 2

Copyright © 2017 Om S Trivedi. All rights reserved.

One person’s information can become

another person’s data

Copyright © 2017 Om S Trivedi. All rights reserved.

Data Vs. Information

Data InformationData is raw facts and figures. Information is facts or figures ready for

communication or use.

Data is unorganized. Information is meaningful and recorded by

human intellect.

Copyright © 2017 Om S Trivedi. All rights reserved.

Data, Information, Knowledge and Wisdom

Copyright © 2017 Om S Trivedi. All rights reserved.

Information System

It refers to a system that

▪ collects,

▪ stores,

▪ Analyses

▪ processes and

▪ distributes

Information in the enterprise for decision-making, co-ordination and control.

It can be manual as well as computer-based information system.

•Data as Resource

Input

Process• Information

as Product

Output

Copyright © 2017 Om S Trivedi. All rights reserved.

Components of an Information System

Organisation

Management

Technology

TInformation

System

TechnologyOrganizations

Management

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Information Technology

It refers to the applications of

❖ Computer systems – Hardware and Software

❖ Telecommunications and Networks

❖ DBMS and

❖Other Information Processing Technologies

To collect, store, transmit and manipulate data for processing of

information in the enterprise.

Also defined as an “Information and Communication Technology (ICT)”.

Copyright © 2017 Om S Trivedi. All rights reserved.

Why IS?

Operational excellence

Customer-supplier intimacy

Better decision-making

Competitive advantage

Copyright © 2017 Om S Trivedi. All rights reserved.

Need for Information Technology in IS

Work efficiently and maximize productivity

Faster communication, electronic storage, protection

of records

Differentiate product and services from competitors

Strategic business enabler

Copyright © 2017 Om S Trivedi. All rights reserved.

Communication Capabilities

Reasons to Use IT for Business

Data and Information Management

Automated Process

• Business Process Automation (BPA)

• Enterprise Resource Planning (ERP)

Some Examples of

communication capabilities

which help in Business

Copyright © 2017 Om S Trivedi. All rights reserved.

Communication Capabilities

Communicate quickly, efficiently and effectively

Communicate with different locations

Examples: Chat rooms, E-mail, Video conferencing; etc.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Automated Process

A BPA is a set of activities or strategies to automate complex

business processes so as to bring benefit to enterprise in terms

of cost, time and effort.

Aided by SCM, CRM, HRMS and ERP

Benefits:

Greater Control

Reduced Cost

Small Cycle Time

Reduced Risk

Copyright © 2017 Om S Trivedi. All rights reserved.

Data and Information Management

Data, information and documents are digitally stored

Available for access at different locations

Protected through “Security Engineering Systems”

Copyright © 2017 Om S Trivedi. All rights reserved.

System Security

Physical Security

Logical Security

Copyright © 2017 Om S Trivedi. All rights reserved.

Importance of Network Security

Protect company assets

Gain a competitive advantage

Comply with regulatory requirements

Safeguard your job

Copyright © 2017 Om S Trivedi. All rights reserved.

Threats

Threats

Structured Threats

Unstructured Threats

Internal Threats

External Threats

Copyright © 2017 Om S Trivedi. All rights reserved.

Vulnerabilities

Software Bugs

Timing Windows

Insecure default configurations

Bad Protocols

Trusting Untrustworthy information

End users

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Security Protocols

Cryptography

Encryption Decryption

Copyright © 2017 Om S Trivedi. All rights reserved.

FirewallA system designed to prevent unauthorized access to or from a network.

Types:

➢ Software firewall

➢ Hardware firewall

Copyright © 2017 Om S Trivedi. All rights reserved.

Software Firewall

Protects a single computer

Usually less expensive

Easier to configure

❖Norton Internet Security

❖MacAfee Internet Security

❖Microsoft IIS server

Copyright © 2017 Om S Trivedi. All rights reserved.

Hardware Firewall

Protects an entire network

Usually more expensive

Harder to configure

❖ Cisco PIX

❖ Net Screen

❖ WatchGuard

❖ Check Point

Copyright © 2017 Om S Trivedi. All rights reserved.

Information System

Layers

Copyright © 2017 Om S Trivedi. All rights reserved.

Computer

Computer is an electronic

data processing device or

machine which:

accepts and stores data

input,

processes the data

input, and

generates the output in

a required format.

Copyright © 2017 Om S Trivedi. All rights reserved.

Computer System

Copyright © 2017 Om S Trivedi. All rights reserved.

HARDWARE

Copyright © 2017 Om S Trivedi. All rights reserved.

Input Devices

Keyboard

Mouse

Joy Stick

Light pen

Copyright © 2017 Om S Trivedi. All rights reserved.

Keyboard

Copyright © 2017 Om S Trivedi. All rights reserved.

Mouse

Copyright © 2017 Om S Trivedi. All rights reserved.

Joystick -----------Track Ball---------Light Pen

Copyright © 2017 Om S Trivedi. All rights reserved.

Touch Screen/Digitizing Pad/Tabs

Copyright © 2017 Om S Trivedi. All rights reserved.

Voice Input Device and Microphone

Copyright © 2017 Om S Trivedi. All rights reserved.

Input Devices

Scanner

Smart Card Reader

Copyright © 2017 Om S Trivedi. All rights reserved.

Direct Entry Devices

Magnetic Ink Character Reader (MICR)

Optical Character Reader (OCR)

Copyright © 2017 Om S Trivedi. All rights reserved.

Direct Entry Devices

Optical Mark Reader (OMR)

Bar Code Reader

Copyright © 2017 Om S Trivedi. All rights reserved.

Other Input Devices

Computer Terminals

Facial Recognition System

Copyright © 2017 Om S Trivedi. All rights reserved.

Output Devices

Copyright © 2017 Om S Trivedi. All rights reserved.

VDUs -- Monitor

Monitor

Plazma

Liquid Crystal Display (LCD)

LED

Copyright © 2017 Om S Trivedi. All rights reserved.

Output Devices

Sound

Computer Output on Microfilm (COM)

Copyright © 2017 Om S Trivedi. All rights reserved.

Printers

Dot Matrix Printers

Ink-Jet Printers

Laser Printers

3D Printers

Output Devices

Copyright © 2017 Om S Trivedi. All rights reserved.

Graph Plotters

Flat-bed Plotters Drum Plotters

Copyright © 2017 Om S Trivedi. All rights reserved.

SOFTWARE

Copyright © 2017 Om S Trivedi. All rights reserved.

System Software

Operates Hardware

A Platform for Application Software

Computer Operating Systems

Example: MS Windows, Linux, Unix; etc.

Copyright © 2017 Om S Trivedi. All rights reserved.

Functions of Operating Systems

Performing hardware functions

User Interfaces

Hardware Independence

Memory Management

Task Management

Networking Capability

Logical access security

File management

Copyright © 2017 Om S Trivedi. All rights reserved.

Application Software

Perform useful tasks

Collection of programs that address the real-life problems

of its users

Business related

Scientific

Others

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of Application Software

Application Suite

Enterprise Software

Enterprise Infrastructure Software

Information Worker Software

Content Access Software

Educational Software

Media Development Software

Copyright © 2017 Om S Trivedi. All rights reserved.

Benefits of Application Software

Addressing User needs

Less threat from virus

Regular updates

Copyright © 2017 Om S Trivedi. All rights reserved.

Disadvantages of Application Software

Development is costly

Infection from Malware

Copyright © 2017 Om S Trivedi. All rights reserved.

Processing Devices

Copyright © 2017 Om S Trivedi. All rights reserved.

Central Processing Unit

Control Unit (CU)

Arithmetic Logic Unit (ALU)

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Primary Memory

RAM ROM CMOS

Copyright © 2017 Om S Trivedi. All rights reserved.

Registers

Accumulators

Address Registers

Storage Registers

Miscellaneous

Copyright © 2017 Om S Trivedi. All rights reserved.

Cache Memory

Copyright © 2017 Om S Trivedi. All rights reserved.

Bubble Memory and Flash Memory

Bubble Memory Flash Memory

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Storage

Copyright © 2017 Om S Trivedi. All rights reserved.

Virtual Memory

Copyright © 2017 Om S Trivedi. All rights reserved.

SDLC

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Emerging

Computing Technologies

Copyright © 2017 Om S Trivedi. All rights reserved.

Server

Computer program or device (A System)

Hw Point of View: A device on the network to serve the

needs of other computers on the network (Clients).

Sw Point of View: A computer program running to serve the

request of other programs on the network (Client).

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of Server

✓ Database Server

✓ File Server

✓ Print Servers

✓ Internet Servers

✓ Web Servers

✓ Mail Servers

✓ Application Servers

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Popular Computing Architecture

Computer Architecture

Instruction Set

Architecture (ISA)Micro Architecture System Design

Reduced Instruction

Set Computer (RISC)

Complex Instruction

Set Computer (CISC)

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Instruction Set Architecture (ISA)

➢ ADD

➢ COMPARE

➢ IN

➢ JUMP

➢ LOAD

➢ OUT

➢ STORE

Instruction Set

Architecture (ISA)

Reduced Instruction

Set Computer (RISC)

Complex Instruction

Set Computer (CISC)

Copyright © 2017 Om S Trivedi. All rights reserved.

✓ Also known as Computer Organization.

✓ Concerned with the way the hardware components operate.

Micro Architecture

Copyright © 2017 Om S Trivedi. All rights reserved.

System Design

✓ System interconnects-Computer buses and switches.

✓ Memory controllers and hierarchies

✓ CPU off -load mechanisms-Direct Memory Access (DMA)

✓ Issues-multi-processing, virtualization, software features etc.

Copyright © 2017 Om S Trivedi. All rights reserved.

Clo

ud C

om

puti

ng

Copyright © 2017 Om S Trivedi. All rights reserved.

Mobile Computing

Copyright © 2017 Om S Trivedi. All rights reserved.

Mobile Computing

Mobile Computing, is the use of portable computing devices

(such as laptop and handheld computers) in conjunction with

mobile communications technologies to enable users to access

the Internet and data on their home or work computers from

anywhere in the world.

Copyright © 2017 Om S Trivedi. All rights reserved.

Mobile Computing Technology

Mobile Communication

Mobile Hardware

Mobile Software

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Applications of Mobile Computing

Increase in workforce productivity

Improvement in customer service

Improvement in incident management

Transformation in business processes

Dynamic and efficient business offerings

Availability of data at multiple locations

Copyright © 2017 Om S Trivedi. All rights reserved.

Mobile Computing Concerns

Security of data

Dangers of misrepresentation

Power consumption

Potential health hazards

Copyright © 2017 Om S Trivedi. All rights reserved.

Grid Computing

Copyright © 2017 Om S Trivedi. All rights reserved.

Grid Computing

A Parallel Computing

With complete computers (Grid and Donors)

Connected through networks

Many computers create the impact of a Super-Computer

They have access of each other

Copyright © 2017 Om S Trivedi. All rights reserved.

Resource Pooling

Resource balancing

Parallel Computing

Virtualization

Security of Data Resources

Additional Resource Access

Reliability

Management

Benefits of Grid Computing

Copyright © 2017 Om S Trivedi. All rights reserved.

Computation

Storage

Communication

Software and Licence

Special Devices, Equipment, policies; etc

Resources of Grid Computing

Copyright © 2017 Om S Trivedi. All rights reserved.

Planning

Installation

Enrollment of Donors and Users

Certificate Authority

Resources Management

Data Sharing

Using a Grid: Administrative Point of View

Copyright © 2017 Om S Trivedi. All rights reserved.

Enroll on the Grid

Install the Software

Login

Queries and Jobs Submission

Data Configuration

Monitoring Progress and Recovery

Reserving Resources

Using a Grid: User’s Point of View

Copyright © 2017 Om S Trivedi. All rights reserved.

Single Sign-on

Protection of Credentials

Interoperability with local security solutions

Exportability

Support for secure group communication

Support for multiple implementations

Development of Security Architecture on Grid

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Virtualization

Copyright © 2017 Om S Trivedi. All rights reserved.

What is Virtualization?

Copyright © 2017 Om S Trivedi. All rights reserved.

Platform

Virtualization

Copyright © 2017 Om S Trivedi. All rights reserved.

Hardware Virtualization

Network Virtualization

Storage Virtualization

Types of Virtualization

Copyright © 2017 Om S Trivedi. All rights reserved.

Server Consolidation

Disaster Recovery

Testing and Training

Portable Application

Portable Workspaces

Applications of Virtualization

Copyright © 2017 Om S Trivedi. All rights reserved.

VPN (Virtual Private Network)

Copyright © 2017 Om S Trivedi. All rights reserved.

VPN (Virtual Private Network)

Copyright © 2017 Om S Trivedi. All rights reserved.

BIS and

Specialized BIS

Chapter 4

Copyright © 2017 Om S Trivedi. All rights reserved.

Information Architecture

A conceptual framework that defines the basic structure, content, and relationships of theorganizational databases that provide the data needed to support the basic business processes of an organization.

Copyright © 2017 Om S Trivedi. All rights reserved.

Transaction Processing System (TPS)

Data Entry

Transaction Processing

Database Maintenance

Document and Report Generation

Copyright © 2017 Om S Trivedi. All rights reserved.

ACID TEST for any TPS

Atomicity

Consistency

Isolation

Durability

Copyright © 2017 Om S Trivedi. All rights reserved.

TPS Attributes

High Volume Rapid Processing

Equivalence

Access Control

Trustworthiness

Copyright © 2017 Om S Trivedi. All rights reserved.

Office Automation Systems (OAS)

OAS refers to the use of computer and software to digitally generate,

collect, store, manipulate, and relay office information needed for

accomplishing basic tasks and goals.

The functions of this system are word processing, e-mails, work group

programming, work group scheduling, facsimile processing, e-document,

imaging and management of work flow.

Copyright © 2017 Om S Trivedi. All rights reserved.

OAS Activities

Exchange of information

Management of administrative documents

Handling of numerical data

Meeting planning

Management of work schedules

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of Knowledge

Explicit Knowledge

Implicit Knowledge

Copyright © 2017 Om S Trivedi. All rights reserved.

Knowledge Management System (KMS)

Knowledge Management Systems (KMS) refer to any kind of IT

system that

Stores and retrieves knowledge

improves collaboration

locates knowledge sources

mines repositories for hidden knowledge

captures and uses knowledge

or in some other way enhances the KM process.

Copyright © 2017 Om S Trivedi. All rights reserved.

Why knowledge has gained so much momentum

in recent times?

Changing Business Environment

Wide Connections

Globalization

New Organizational Structures

Copyright © 2017 Om S Trivedi. All rights reserved.

Management Information System (MIS)

A management support system that produces pre-specified

reports, displays, and responses on a periodic, exception,

demand, or push reporting basis.

Copyright © 2017 Om S Trivedi. All rights reserved.

Decision Support Systems (DSS)

Decision support systems are computer-based information

systems that provide interactive information support to managers

and business professionals during the decision making process.

Copyright © 2017 Om S Trivedi. All rights reserved.

Components of DSS

Users

Database

Planning Language

General-purpose planning languages

Special-purpose planning languages

Model Base

Copyright © 2017 Om S Trivedi. All rights reserved.

Phases

of DSS

Copyright © 2017 Om S Trivedi. All rights reserved.

Executive Information Systems (EIS)

Executive information systems (EIS) are information systems that

combine many of the features of management information

systems and decision support systems.

Copyright © 2017 Om S Trivedi. All rights reserved.

Components of EIS

Hardware

Software

User Interface

Telecommunication

Copyright © 2017 Om S Trivedi. All rights reserved.

Enterprise Resource Planning (ERP)

Integrated cross-functional software that reengineers

Manufacturing

Distribution

Finance

Human resources,

and other basic business processes of a company

to improve its

efficiency,

agility, and

profitability.

Copyright © 2017 Om S Trivedi. All rights reserved.

ERP Linkages

Copyright © 2017 Om S Trivedi. All rights reserved.

Various Stages of ERP

Phase 1 • Inventory Control

Phase 2 • ABC Analysis

Phase 3 • Economic Order Quantity

Phase 4 • Just In Time (JIT)

Phase 5 • Material Requirement Planning (MRP– I)

Phase 6 • Material Requirement Planning (MRP– II)

Phase 7 • Distribution Resource Planning (DRP)

Phase 8 • Enterprise Resource Planning

Phase 9 • Material Requirement Planning (MRP– III)

Phase 10 • Web-enabled EIS

Copyright © 2017 Om S Trivedi. All rights reserved.

Customer Relationship Management (CRM)

CRM is about giving the

customer a better experience.

It enhances the company’s

chances of retaining the life-

time value of that customer

and acquiring new customers.

Copyright © 2017 Om S Trivedi. All rights reserved.

CRM Philosophies

CRM Philosophies

Analytical CRM

Operational CRM

Collaborative CRM

Copyright © 2017 Om S Trivedi. All rights reserved.

Supply Chain Management System (SCMS)

Copyright © 2017 Om S Trivedi. All rights reserved.

Components of SCM

Procurement/Purchasing

Operations

Distribution

Integration

Copyright © 2017 Om S Trivedi. All rights reserved.

Human Resource Management Systems (HRMS)

Information systems that support human resource management

activities such as

recruitment,

selection and hiring,

job placement,

performance appraisals, and

training and development.

Copyright © 2017 Om S Trivedi. All rights reserved.

Accounting Information System

“A computer-based system of collection, storage and processing of financial

and accounting data that is used by internal and external users.

Copyright © 2017 Om S Trivedi. All rights reserved.

Functions of AIS

Collect and store data

Record transactions

Safeguard organizational assets

Copyright © 2017 Om S Trivedi. All rights reserved.

Components of AIS

People

Procedures

Data

IT Infrastructure

Internal Control

Copyright © 2017 Om S Trivedi. All rights reserved.

Artificial Intelligence

Artificial Intelligence (AI) is a research field that studies how to

comprehend the intelligent human behaviours on a computer.

Deep Blue system which defeated the world chess champion is a

well-know example.

Expert systems

Pattern Recognition

Natural language processing

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Commercial applications of AI

Decision Support

Information Retrieval

Virtual Reality

Robotics

Copyright © 2017 Om S Trivedi. All rights reserved.

Expert System

A computerized information system that allows non-experts to make

decisions comparable to those of an expert.

An expert system (ES) is a knowledge-based information system that

uses its knowledge about a specific, complex application area to act as

an expert consultant to end users.

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of ES

Example-based system

Rule-based systems

Frame based systems

Copyright © 2017 Om S Trivedi. All rights reserved.

Components of ES

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Intelligence

Gathering and analysis of data and information that can be used to

drive strategic business decisions.

A term used in industry that incorporates a range of analytical

and decision support applications in business including

Data mining

Decision Support Systems (DSS)

Knowledge Management Systems (KMS)

Online Analytical Processing (OLAP)

Copyright © 2017 Om S Trivedi. All rights reserved.

BI Tools

Business Intelligence tools are software programs and features that are

used to complete detailed data analysis.

Simple Reporting and Querying

Data Mining or Statistical Analysis

Business Analysis

Dashboards

Scorecards

Copyright © 2017 Om S Trivedi. All rights reserved.

Core Banking Solutions (CBS)

“Centralized Online Real-time Environment”

Software components that manage the services provided by a

bank to its customers through its branches (branch network).

The platform where communication technology and information

technology are merged to suit core needs of banking.

Infosys’ Finacle

Nucleus FinnOne

Oracle’s Flexcube

Copyright © 2017 Om S Trivedi. All rights reserved.

Payment Mechanisms

Payment Gateway

Credit Cards

Electronic Cheques

Smart Cards

Electronic Purses

Copyright © 2017 Om S Trivedi. All rights reserved.

Access Controls

Procedures

developed and implemented

to protect Software Systems from

unauthorized modification,

disclosure or destruction.

Ensures that information remains accurate and confidential.

Available to USERS authorized by Security Administrator when

required.

Copyright © 2017 Om S Trivedi. All rights reserved.

Functions of Access Controls

Identity Management

Authentication

Authorization

Accountability

Copyright © 2017 Om S Trivedi. All rights reserved.

Approaches to Access Controls

Role-based Access Control (RBAC)

Rule-based Access Control (RAC)

Copyright © 2017 Om S Trivedi. All rights reserved.

Privilege Controls

A fundamental principle of information security, which refers to give only

those privileges to a user account, which are essential to that user's work.

Least User Access or Least Privileged User Account (LUA):

All user accounts at all times should run with as few privileges as possible, and

also launch applications with as few privileges as possible.

Purpose:

Security of Systems

Security of Functions

Security of Data

Copyright © 2017 Om S Trivedi. All rights reserved.

AUSkey Authentication

AUSkey is a secure login that identifies you when you use participating in

government online services on behalf of a business.

AUSkey allows you to access and send business information to government

online.

AUSkey reduces the number of ID and Passwords that you need.

Types of AUSkey

Administrator AUSkey

Standard AUSkey

Copyright © 2017 Om S Trivedi. All rights reserved.

XBRL (eXtensible Business Reporting Language)

Organization: XBRL International in more than 50 countries.

XBRL is the open international standard for digital business reporting.

Replacing older, paper-based reports with more useful, effective and accurate

digital versions.

Accountants use XBRL in support of clients reporting requirements.

It’s a language that can be used and extended as needed.

Multi-lingual Support

Strong Software Support

Who uses it?

Companies, Analysts, Regulators, Governments, Accountants, Data providers, Investors; etc.

Copyright © 2017 Om S Trivedi. All rights reserved.

VPN (Virtual Private Network)

Copyright © 2017 Om S Trivedi. All rights reserved.

Telecommunication and

Networks

Chapter 3

Copyright © 2017 Om S Trivedi. All rights reserved.

Trends in Telecommunication

Copyright © 2017 Om S Trivedi. All rights reserved.

Industry Trends

Copyright © 2017 Om S Trivedi. All rights reserved.

Technology Trends

Open Systems

Internet Networking Technologies

Middleware

Change from Analog to Digital Technology

Wireless Technology

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Application Trends

Electronic commerce

Enterprise collaboration

Internal business applications

Develop new products and services

Cut costs

Share Resources

Copyright © 2017 Om S Trivedi. All rights reserved.

Business Value of Telecommunications

Overcome geographic barriers

Overcome time barriers

Overcome cost barriers

Overcome structural barriers

Copyright © 2017 Om S Trivedi. All rights reserved.

Telecommunication Processors

Telecommunication Processors

NIC Modems Multiplexers

Copyright © 2017 Om S Trivedi. All rights reserved.

NIC

A network interface card or

controller, also known as

network adapter, LAN adapter or

physical network interface is a

computer hardware component

that connects a computer to a

computer network.

NICs implement a networking

standard called Ethernet.

Ethernet cards or are in-built

with the motherboard.

Copyright © 2017 Om S Trivedi. All rights reserved.

Modems

Modulator-demodulator

Computers use modems to talk to each other

Copyright © 2017 Om S Trivedi. All rights reserved.

Multiplexers

Multiplexer is a device that combines large number of low speed

transmission lines into high speed line.

It can also transmit data from CPU to appropriate terminal linked to the

Multiplexer.

a separate computer processor is devoted to this activity and it is known as

“front-end-processor”.

Copyright © 2017 Om S Trivedi. All rights reserved.

Telecommunication Processors

Internetwork Processors

Switch Router Hub Bridge Repeaters Gateway

Copyright © 2017 Om S Trivedi. All rights reserved.

Switch

Each computer in a Network is connected by the cable to a device known as a switch

Also called switching hub, bridging hub, officially MAC bridge

The switch, in turn, connects to the rest of the network

Number of ports on a Switch: 8 or 16

8 port switch connects up to 8 computers

Switches can be connected to each other to build larger networks

Copyright © 2017 Om S Trivedi. All rights reserved.

Hub

Hub is a port-switching communications

processor.

This allows for the sharing of the

network resources such as servers, LAN

workstations, printers, etc.

Copyright © 2017 Om S Trivedi. All rights reserved.

Routers

Router is a communications processor

It interconnects networks based on different rules or protocols,

So that a telecommunications message can be routed to its destination.

Routing is the process of deciding on how to communicate the data from

source to destination, in a network.

Copyright © 2017 Om S Trivedi. All rights reserved.

Repeaters

Repeater is a

communications

processor that boosts or

amplifies the signal

before passing it to the

next section of cable in

a network.

Copyright © 2017 Om S Trivedi. All rights reserved.

Bridge

A bridge is a device that connects two networks so that they act as if they are

one network.

Used to partition one large network into two smaller networks for performance

reasons.

A bridge as a kind of smart repeater.

Bridge is a communication processor that connects number of Local Area

Networks (LAN).

It magnifies the data transmission signal while passing data from one LAN to

another.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Gateway

A device that connects dissimilar networks.

Gateways often connect Ethernet networks

to mainframe computers or to the

Internet.

They perform protocol conversion to allow

interoperability between two different

types of communications architectures.

Copyright © 2017 Om S Trivedi. All rights reserved.

Telecommunications Media/Channels

Copyright © 2017 Om S Trivedi. All rights reserved.

Telecom Media

Guided Media

Twisted Pair Copper Cable

Coaxial Copper Cable

Fibre Optic Cable

Unguided Media

Terrestrial Microwave

Radio Waves

Micro Waves

Infrared Waves

Communication Satellites

Copyright © 2017 Om S Trivedi. All rights reserved.

Guided Media

Twisted Pair Copper Cable

Coaxial Copper Cable

Fibre Optic Cable

Copyright © 2017 Om S Trivedi. All rights reserved.

Twisted Pair Copper Cable

Copyright © 2017 Om S Trivedi. All rights reserved.

Coaxial Copper Cable

Copyright © 2017 Om S Trivedi. All rights reserved.

Fibre Optic Cable

Copyright © 2017 Om S Trivedi. All rights reserved.

Unguided Media

Radio Waves

Terrestrial Microwave

Micro Waves

Communication Satellites

Infrared Waves

Copyright © 2017 Om S Trivedi. All rights reserved.

Radio Waves

Copyright © 2017 Om S Trivedi. All rights reserved.

Terrestrial Microwave

Copyright © 2017 Om S Trivedi. All rights reserved.

Micro Waves

Copyright © 2017 Om S Trivedi. All rights reserved.

Communication Satellites

Copyright © 2017 Om S Trivedi. All rights reserved.

Infrared Waves

Copyright © 2017 Om S Trivedi. All rights reserved.

Area Coverage Based Classification

LAN

MAN

WAN

Copyright © 2017 Om S Trivedi. All rights reserved.

Functional Based Classification

Client-Server Networking

Peer to Peer model

Copyright © 2017 Om S Trivedi. All rights reserved.

Tier System

Single Tier Systems/One-Tier architecture

Two-Tier Architecture

3-tier Architecture

n tier Architecture

Copyright © 2017 Om S Trivedi. All rights reserved.

Single Tier Systems/One-Tier architecture

Copyright © 2017 Om S Trivedi. All rights reserved.

2-Tier architecture

Copyright © 2017 Om S Trivedi. All rights reserved.

3-Tier architecture

Copyright © 2017 Om S Trivedi. All rights reserved.

Single Tier Systems/One-Tier architecture

Copyright © 2017 Om S Trivedi. All rights reserved.

Ownership Based Classification

Public Data Network

Private Data Network

VPN

Remote-access VPN

Site-to-Site VPN

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Computing

Centralized Computing

Centralized computing is computing done at a central location, using terminals that

are attached to a central computer.

Decentralized Computing

Decentralized computing is the allocation of resources, both hardware and

software, to each individual workstation, or office location which are capable of

running independently of each other.

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Topology

Bus Topology

Star Topology

Ring Topology

Mesh Topology

Copyright © 2017 Om S Trivedi. All rights reserved.

Transmission Technologies

Copyright © 2017 Om S Trivedi. All rights reserved.

VPN (Virtual Private Network)

Copyright © 2017 Om S Trivedi. All rights reserved.

Protocols

Syntax

Semantics

Timing

Copyright © 2017 Om S Trivedi. All rights reserved.

OSI Model

Copyright © 2017 Om S Trivedi. All rights reserved.

What is TCP?

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Security Protocols

Secure Shell (SSH)

Secure File Transfer Protocol (SFTP)

Secure Hypertext Transfer Protocol (HTTPS)

Secure Socket Layer (SSL)

Copyright © 2017 Om S Trivedi. All rights reserved.

Intrusion Detection System (IDS)

Network Intrusion Detection (NID)

Host-based Intrusion Detection (HID)

Hybrid Intrusion Detection (HID)

Network-Node Intrusion Detection (NNID)

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Administration and Management

Operations

Administrations

Maintenance

Provisioning

Copyright © 2017 Om S Trivedi. All rights reserved.

Network Management Functions

Fault Management

Configuration Management

Accounting Management

Performance Management

Security Management

Copyright © 2017 Om S Trivedi. All rights reserved.

Internet Architecture

Analog or Dial Up Connections

DSL Connections (ADSL, SDSL and VDSL)

Cable Connections

Wireless Internet Connections

T-1 Line Connections

Copyright © 2017 Om S Trivedi. All rights reserved.

E-commerce

Any form of business transaction in which the parties interact

electronically rather than by physical exchanges.

Copyright © 2017 Om S Trivedi. All rights reserved.

E-commerce

E-commerce is

the use of electronic communications and

digital information processing technology

in business transactions

to create, transform, and redefine relationships

for value creation between or among organizations, and between

organizations and individuals.

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of E-commerce

B2B (Business-to-Business E-commerce)

B2C (Business-to-Consumer E-commerce)

C2C (Consumer to Consumer E-commerce)

C2B (Consumer-to-Business E-commerce)

Copyright © 2017 Om S Trivedi. All rights reserved.

Business-to-Government (B2G) e-Commerce

B2G e-Commerce, also known as e-Government, refers to the use of

information and communication technologies to build and strengthen

relationships between government and employees, citizens, businesses,

non-profit organizations, and other government agencies.

Copyright © 2017 Om S Trivedi. All rights reserved.

Business-to-Employee (B2E) e-Commerce

B2E e-Commerce, from an intra-organizational perspective, has

provided the means for a business to offer online products and services

to its employees.

Copyright © 2017 Om S Trivedi. All rights reserved.

Mobile Commerce

M-commerce (mobile commerce) is the buying and selling of goods and

services through wireless handheld devices such as cellular telephone and

personal digital assistants (PDAs).

Known as next-generation e-commerce

M-commerce enables users to access the Internet without needing to find a

place to plug in.

Copyright © 2017 Om S Trivedi. All rights reserved.

Electronic Fund Transfer

EFT is fast, safe, and means that the money will be confirmed in user’s bank

account quicker than if he had to wait for the mail, deposit the cheque, and

wait for the funds to become available.

EFT Systems

Automated Teller Machines (ATMs)

Point-of-Sale (POS) Transactions

Preauthorized Transfers

Telephone Transfers

Copyright © 2017 Om S Trivedi. All rights reserved.

BPA

through

Application Software

Chapter 3

Copyright © 2017 Om S Trivedi. All rights reserved.

Types of Business Applications

Copyright © 2017 Om S Trivedi. All rights reserved.

Controls in BPA

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Copyright © 2017 Om S Trivedi. All rights reserved.

Questions??????

THANX

omtrivedi@ymail.com

9958300572

top related