information technologyomtrivedi.com/admins/pic/20180514120550_ldr_it... · copyright © 2017 om s...
TRANSCRIPT
Copyright © 2017 Om S Trivedi. All rights reserved.
Information Technology
By: Om Trivedi
Copyright © 2017 Om S Trivedi. All rights reserved.
An Introduction to BPM
CHAPTER 1
Copyright © 2017 Om S Trivedi. All rights reserved.
Business System
Fixed set of rules to execute a task assigned by the business process with the help of
❖Man
❖Machine
❖ Computer and
❖Other resources.
Systems are static and dynamic, both.
Organisational structure within which several processes are executed.
System supports processes and processes support people.
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Process
BP is a sequence of co-ordinated activities to transforms input into output
which creates some value to the customer as well as the organization.
BP is a sequence of co-ordinated activities to reach a goal.
Business Process is a dynamic activity.
Copyright © 2017 Om S Trivedi. All rights reserved.
What is Process Flow?
An event
Well-defined beginning and end
Completed in a short period
❖ A prescribed sequence of work steps
❖ Performed in order to produce a desired result
Copyright © 2017 Om S Trivedi. All rights reserved.
Accounting Process Cycle
Copyright © 2017 Om S Trivedi. All rights reserved.
Sales Process Cycle
Copyright © 2017 Om S Trivedi. All rights reserved.
Purchase Process Cycle
Copyright © 2017 Om S Trivedi. All rights reserved.
Finance Process Cycle
Financial Planning
Allocation
Operations & Monitoring
Evaluation & Analysis
Reporting
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of Business Processes
Business Process
Organizational Business Process
Operational Business Process
Copyright © 2017 Om S Trivedi. All rights reserved.
Levels of Business Processes
Business Strategy
Goals
Organizational Business Process
Implemented Business Process
Operational Business Process
Realize
Realize
Realize
Realize
Determines
Determines
Determines
Determines
Level 1
Level 2
Level 3
Level 4
Level 5
Copyright © 2017 Om S Trivedi. All rights reserved.
Process Management
“Process management involves coordinated and
standardised efforts
to
map, implement, improve, and follow
the organizational processes.”
Copyright © 2017 Om S Trivedi. All rights reserved.
Steps in Process Management
Define the steps (tasks)
Map the tasks to the roles involved
Implement the steps (tasks)
Establish performance measures to improve
Set up the standardised organizational processes that can be
followed throughout
Copyright © 2017 Om S Trivedi. All rights reserved.
What is BPM?
BPM is a set of functions in a certain sequence that, at
the end, delivers value for an internal or external
customer.
Copyright © 2017 Om S Trivedi. All rights reserved.
What is BPM?
“The achievement
of
an organization’s objectives
through the
improvement, management and control
of
essential business processes”.
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Process Life Cycle (BPLC)
It is a step-wise or phase-wise presentation of one process
after the other in a cyclical structure.
Incorporates:
Data, HR, Technologies, Resources, Infrastructure, Cultures, Roles
and Responsibilities. (Or, we can say all the components of
Internal Environment)
Copyright © 2017 Om S Trivedi. All rights reserved.
BPM Life-cycle
2
1
5
4
3Redesign 2A
Copyright © 2017 Om S Trivedi. All rights reserved.
Objectives of BPM
Cost Reduction and Control
Achieve Process Objectives
Value Creation
Efficiency and Effectiveness of BP
Copyright © 2017 Om S Trivedi. All rights reserved.
Benefits of using Technology for BPM
Goal fulfilment
Process improvements
Creation of basic operational value proposition
Effectiveness gains for enterprises
Revenue growth
Copyright © 2017 Om S Trivedi. All rights reserved.
BPM Principles
Role of IT in Business Processes
Business Processes are assets
Business Processes create value to customers
Continuous improvement of processes
Copyright © 2017 Om S Trivedi. All rights reserved.
BPM Practices
Processes oriented organizational structure
Appoint process owners
Rewards for BP performances
Top-Bottom Commitment
Bottom-Up Execution
Collaborate with business partners
Co-ordination on inter-departmental BPs
IT enabled BPM
Continuous process improvements
Use TQM, Six-Sigma, BPR, etc. for continuous BP improvement
Training of workforce
Copyright © 2017 Om S Trivedi. All rights reserved.
Theories of Process Management
• Six Sigma
• Total Quantity Management
• Business Process Re-engineering
Copyright © 2017 Om S Trivedi. All rights reserved.
What is Six Sigma?
Six Sigma focuses on developing and delivering near
perfect products and services.
Why Six Sigma?
Improving Customer Satisfaction
Reducing Cycle Time
Reducing Defects
CCD
Copyright © 2017 Om S Trivedi. All rights reserved.
Six Sigma Methodology
Six Sigma Methods
DMADVDMAIC
Copyright © 2017 Om S Trivedi. All rights reserved.
DMAIC
Define
Measure
Analyse
Improve
Control
Copyright © 2017 Om S Trivedi. All rights reserved.
Define
Measure
AnalyzeImprove
ControlDMAIC
Supplier InputManufacturing and Services
Output Customer
Quality Productivity Cost Profitability
Copyright © 2017 Om S Trivedi. All rights reserved.
BPR Success Factors
IT Infrastructure
Team
Business Need Analysis
Organization-wide Commitment
Ongoing Continuous Improvements
Management of Change
IT BOOM
Copyright © 2017 Om S Trivedi. All rights reserved.
BPM Implementation
&
Role of IT
Copyright © 2017 Om S Trivedi. All rights reserved.
Key Factors in Implementing BPM
Scope
Goal
Methods
Skills
Tools
Investments
Sponsorship
1
2
3
4
5
6
7
Copyright © 2017 Om S Trivedi. All rights reserved.
Need for BPM Implementation
Positioning for future
Cost effectiveness
Continuous Improvement
Knowledge of Product
Address the cultural barriers
Reengineering of business
Leadership
Copyright © 2017 Om S Trivedi. All rights reserved.
Impact of IT on BPM (BPM Leads to Success)
Saves lot of time, money and energy
Makes BPs Simple
Optimizes work and revenue
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Risks of failure of IT
Deficient executive involvement
Deficient project management
Breakdown in gap analysis
Limited options for customization of BPMS
Too complicated to be customized
Failure to identify future business needs
Inadequate assessment of the need for change management
Software fails to meet business needs
Unavailability of resources when desired
Compatibility issues with other BPMS
Technological Obsolescence
Copyright © 2017 Om S Trivedi. All rights reserved.
BPA
A business process is
✓ a set of activities or strategies
✓ to automate business processes so as
✓ to bring benefit to enterprise
✓ in terms of cost, time and effort
Copyright © 2017 Om S Trivedi. All rights reserved.
Key Benefits of BPA
Improved Process
Improved Procedures
Improved Process Control
Improved Assignments
Improved Customer Service
Improved Efficiency
Improved Flexibility
Copyright © 2017 Om S Trivedi. All rights reserved.
Benefits of BPA
Save Cost
Stay ahead in competition
Fast customer service
Copyright © 2017 Om S Trivedi. All rights reserved.
Risk of BPA
Unemployment
False sense of Security
Copyright © 2017 Om S Trivedi. All rights reserved.
Challenges in Implementing BPA
Budgets
Options of products, services and prices
Build and buy system
Interfaces/interactions with the customer
Copyright © 2017 Om S Trivedi. All rights reserved.
Automation of Functional Units
Automation of all the functional areas involved in the day to day operations.
Copyright © 2017 Om S Trivedi. All rights reserved.
Enterprise Business Systems: End-to-end Customer Processes
Copyright © 2017 Om S Trivedi. All rights reserved.
The Value Chain Analysis (Important Concepts)
Value Added
Creation of a competitive advantage by bundling,
combining, or packaging features and benefits that result
in greater customer acceptance.
Value Analysis
It is an accounting analysis to understand the ‘value added’
of separate activities in a complex manufacturing process,
in order to determine where cost improvement could be
made and/or value creation improved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Value Chain Framework of Porter (1990)
Copyright © 2017 Om S Trivedi. All rights reserved.
Processing Cycles of an Accounts BPM
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Process Mapping
Systems
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Entity Relationship Diagrams
Entity
Relationship
Attributes
Copyright © 2017 Om S Trivedi. All rights reserved.
Data Flow Diagrams
Logical Data Flow Diagram
Physical Data Flow Diagram
Context Diagram
Copyright © 2017 Om S Trivedi. All rights reserved.
Information System, It’s
Components and
Computing Technologies
CHAPTER 2
Copyright © 2017 Om S Trivedi. All rights reserved.
One person’s information can become
another person’s data
Copyright © 2017 Om S Trivedi. All rights reserved.
Data Vs. Information
Data InformationData is raw facts and figures. Information is facts or figures ready for
communication or use.
Data is unorganized. Information is meaningful and recorded by
human intellect.
Copyright © 2017 Om S Trivedi. All rights reserved.
Data, Information, Knowledge and Wisdom
Copyright © 2017 Om S Trivedi. All rights reserved.
Information System
It refers to a system that
▪ collects,
▪ stores,
▪ Analyses
▪ processes and
▪ distributes
Information in the enterprise for decision-making, co-ordination and control.
It can be manual as well as computer-based information system.
•Data as Resource
Input
Process• Information
as Product
Output
Copyright © 2017 Om S Trivedi. All rights reserved.
Components of an Information System
Organisation
Management
Technology
TInformation
System
TechnologyOrganizations
Management
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Information Technology
It refers to the applications of
❖ Computer systems – Hardware and Software
❖ Telecommunications and Networks
❖ DBMS and
❖Other Information Processing Technologies
To collect, store, transmit and manipulate data for processing of
information in the enterprise.
Also defined as an “Information and Communication Technology (ICT)”.
Copyright © 2017 Om S Trivedi. All rights reserved.
Why IS?
Operational excellence
Customer-supplier intimacy
Better decision-making
Competitive advantage
Copyright © 2017 Om S Trivedi. All rights reserved.
Need for Information Technology in IS
Work efficiently and maximize productivity
Faster communication, electronic storage, protection
of records
Differentiate product and services from competitors
Strategic business enabler
Copyright © 2017 Om S Trivedi. All rights reserved.
Communication Capabilities
Reasons to Use IT for Business
Data and Information Management
Automated Process
• Business Process Automation (BPA)
• Enterprise Resource Planning (ERP)
Some Examples of
communication capabilities
which help in Business
Copyright © 2017 Om S Trivedi. All rights reserved.
Communication Capabilities
Communicate quickly, efficiently and effectively
Communicate with different locations
Examples: Chat rooms, E-mail, Video conferencing; etc.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Automated Process
A BPA is a set of activities or strategies to automate complex
business processes so as to bring benefit to enterprise in terms
of cost, time and effort.
Aided by SCM, CRM, HRMS and ERP
Benefits:
Greater Control
Reduced Cost
Small Cycle Time
Reduced Risk
Copyright © 2017 Om S Trivedi. All rights reserved.
Data and Information Management
Data, information and documents are digitally stored
Available for access at different locations
Protected through “Security Engineering Systems”
Copyright © 2017 Om S Trivedi. All rights reserved.
System Security
Physical Security
Logical Security
Copyright © 2017 Om S Trivedi. All rights reserved.
Importance of Network Security
Protect company assets
Gain a competitive advantage
Comply with regulatory requirements
Safeguard your job
Copyright © 2017 Om S Trivedi. All rights reserved.
Threats
Threats
Structured Threats
Unstructured Threats
Internal Threats
External Threats
Copyright © 2017 Om S Trivedi. All rights reserved.
Vulnerabilities
Software Bugs
Timing Windows
Insecure default configurations
Bad Protocols
Trusting Untrustworthy information
End users
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Security Protocols
Cryptography
Encryption Decryption
Copyright © 2017 Om S Trivedi. All rights reserved.
FirewallA system designed to prevent unauthorized access to or from a network.
Types:
➢ Software firewall
➢ Hardware firewall
Copyright © 2017 Om S Trivedi. All rights reserved.
Software Firewall
Protects a single computer
Usually less expensive
Easier to configure
❖Norton Internet Security
❖MacAfee Internet Security
❖Microsoft IIS server
Copyright © 2017 Om S Trivedi. All rights reserved.
Hardware Firewall
Protects an entire network
Usually more expensive
Harder to configure
❖ Cisco PIX
❖ Net Screen
❖ WatchGuard
❖ Check Point
Copyright © 2017 Om S Trivedi. All rights reserved.
Information System
Layers
Copyright © 2017 Om S Trivedi. All rights reserved.
Computer
Computer is an electronic
data processing device or
machine which:
accepts and stores data
input,
processes the data
input, and
generates the output in
a required format.
Copyright © 2017 Om S Trivedi. All rights reserved.
Computer System
Copyright © 2017 Om S Trivedi. All rights reserved.
HARDWARE
Copyright © 2017 Om S Trivedi. All rights reserved.
Input Devices
Keyboard
Mouse
Joy Stick
Light pen
Copyright © 2017 Om S Trivedi. All rights reserved.
Keyboard
Copyright © 2017 Om S Trivedi. All rights reserved.
Mouse
Copyright © 2017 Om S Trivedi. All rights reserved.
Joystick -----------Track Ball---------Light Pen
Copyright © 2017 Om S Trivedi. All rights reserved.
Touch Screen/Digitizing Pad/Tabs
Copyright © 2017 Om S Trivedi. All rights reserved.
Voice Input Device and Microphone
Copyright © 2017 Om S Trivedi. All rights reserved.
Input Devices
Scanner
Smart Card Reader
Copyright © 2017 Om S Trivedi. All rights reserved.
Direct Entry Devices
Magnetic Ink Character Reader (MICR)
Optical Character Reader (OCR)
Copyright © 2017 Om S Trivedi. All rights reserved.
Direct Entry Devices
Optical Mark Reader (OMR)
Bar Code Reader
Copyright © 2017 Om S Trivedi. All rights reserved.
Other Input Devices
Computer Terminals
Facial Recognition System
Copyright © 2017 Om S Trivedi. All rights reserved.
Output Devices
Copyright © 2017 Om S Trivedi. All rights reserved.
VDUs -- Monitor
Monitor
Plazma
Liquid Crystal Display (LCD)
LED
Copyright © 2017 Om S Trivedi. All rights reserved.
Output Devices
Sound
Computer Output on Microfilm (COM)
Copyright © 2017 Om S Trivedi. All rights reserved.
Printers
Dot Matrix Printers
Ink-Jet Printers
Laser Printers
3D Printers
Output Devices
Copyright © 2017 Om S Trivedi. All rights reserved.
Graph Plotters
Flat-bed Plotters Drum Plotters
Copyright © 2017 Om S Trivedi. All rights reserved.
SOFTWARE
Copyright © 2017 Om S Trivedi. All rights reserved.
System Software
Operates Hardware
A Platform for Application Software
Computer Operating Systems
Example: MS Windows, Linux, Unix; etc.
Copyright © 2017 Om S Trivedi. All rights reserved.
Functions of Operating Systems
Performing hardware functions
User Interfaces
Hardware Independence
Memory Management
Task Management
Networking Capability
Logical access security
File management
Copyright © 2017 Om S Trivedi. All rights reserved.
Application Software
Perform useful tasks
Collection of programs that address the real-life problems
of its users
Business related
Scientific
Others
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of Application Software
Application Suite
Enterprise Software
Enterprise Infrastructure Software
Information Worker Software
Content Access Software
Educational Software
Media Development Software
Copyright © 2017 Om S Trivedi. All rights reserved.
Benefits of Application Software
Addressing User needs
Less threat from virus
Regular updates
Copyright © 2017 Om S Trivedi. All rights reserved.
Disadvantages of Application Software
Development is costly
Infection from Malware
Copyright © 2017 Om S Trivedi. All rights reserved.
Processing Devices
Copyright © 2017 Om S Trivedi. All rights reserved.
Central Processing Unit
Control Unit (CU)
Arithmetic Logic Unit (ALU)
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Primary Memory
RAM ROM CMOS
Copyright © 2017 Om S Trivedi. All rights reserved.
Registers
Accumulators
Address Registers
Storage Registers
Miscellaneous
Copyright © 2017 Om S Trivedi. All rights reserved.
Cache Memory
Copyright © 2017 Om S Trivedi. All rights reserved.
Bubble Memory and Flash Memory
Bubble Memory Flash Memory
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Storage
Copyright © 2017 Om S Trivedi. All rights reserved.
Virtual Memory
Copyright © 2017 Om S Trivedi. All rights reserved.
SDLC
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Emerging
Computing Technologies
Copyright © 2017 Om S Trivedi. All rights reserved.
Server
Computer program or device (A System)
Hw Point of View: A device on the network to serve the
needs of other computers on the network (Clients).
Sw Point of View: A computer program running to serve the
request of other programs on the network (Client).
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of Server
✓ Database Server
✓ File Server
✓ Print Servers
✓ Internet Servers
✓ Web Servers
✓ Mail Servers
✓ Application Servers
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Popular Computing Architecture
Computer Architecture
Instruction Set
Architecture (ISA)Micro Architecture System Design
Reduced Instruction
Set Computer (RISC)
Complex Instruction
Set Computer (CISC)
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Instruction Set Architecture (ISA)
➢ ADD
➢ COMPARE
➢ IN
➢ JUMP
➢ LOAD
➢ OUT
➢ STORE
Instruction Set
Architecture (ISA)
Reduced Instruction
Set Computer (RISC)
Complex Instruction
Set Computer (CISC)
Copyright © 2017 Om S Trivedi. All rights reserved.
✓ Also known as Computer Organization.
✓ Concerned with the way the hardware components operate.
Micro Architecture
Copyright © 2017 Om S Trivedi. All rights reserved.
System Design
✓ System interconnects-Computer buses and switches.
✓ Memory controllers and hierarchies
✓ CPU off -load mechanisms-Direct Memory Access (DMA)
✓ Issues-multi-processing, virtualization, software features etc.
Copyright © 2017 Om S Trivedi. All rights reserved.
Clo
ud C
om
puti
ng
Copyright © 2017 Om S Trivedi. All rights reserved.
Mobile Computing
Copyright © 2017 Om S Trivedi. All rights reserved.
Mobile Computing
Mobile Computing, is the use of portable computing devices
(such as laptop and handheld computers) in conjunction with
mobile communications technologies to enable users to access
the Internet and data on their home or work computers from
anywhere in the world.
Copyright © 2017 Om S Trivedi. All rights reserved.
Mobile Computing Technology
Mobile Communication
Mobile Hardware
Mobile Software
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Applications of Mobile Computing
Increase in workforce productivity
Improvement in customer service
Improvement in incident management
Transformation in business processes
Dynamic and efficient business offerings
Availability of data at multiple locations
Copyright © 2017 Om S Trivedi. All rights reserved.
Mobile Computing Concerns
Security of data
Dangers of misrepresentation
Power consumption
Potential health hazards
Copyright © 2017 Om S Trivedi. All rights reserved.
Grid Computing
Copyright © 2017 Om S Trivedi. All rights reserved.
Grid Computing
A Parallel Computing
With complete computers (Grid and Donors)
Connected through networks
Many computers create the impact of a Super-Computer
They have access of each other
Copyright © 2017 Om S Trivedi. All rights reserved.
Resource Pooling
Resource balancing
Parallel Computing
Virtualization
Security of Data Resources
Additional Resource Access
Reliability
Management
Benefits of Grid Computing
Copyright © 2017 Om S Trivedi. All rights reserved.
Computation
Storage
Communication
Software and Licence
Special Devices, Equipment, policies; etc
Resources of Grid Computing
Copyright © 2017 Om S Trivedi. All rights reserved.
Planning
Installation
Enrollment of Donors and Users
Certificate Authority
Resources Management
Data Sharing
Using a Grid: Administrative Point of View
Copyright © 2017 Om S Trivedi. All rights reserved.
Enroll on the Grid
Install the Software
Login
Queries and Jobs Submission
Data Configuration
Monitoring Progress and Recovery
Reserving Resources
Using a Grid: User’s Point of View
Copyright © 2017 Om S Trivedi. All rights reserved.
Single Sign-on
Protection of Credentials
Interoperability with local security solutions
Exportability
Support for secure group communication
Support for multiple implementations
Development of Security Architecture on Grid
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Virtualization
Copyright © 2017 Om S Trivedi. All rights reserved.
What is Virtualization?
Copyright © 2017 Om S Trivedi. All rights reserved.
Platform
Virtualization
Copyright © 2017 Om S Trivedi. All rights reserved.
Hardware Virtualization
Network Virtualization
Storage Virtualization
Types of Virtualization
Copyright © 2017 Om S Trivedi. All rights reserved.
Server Consolidation
Disaster Recovery
Testing and Training
Portable Application
Portable Workspaces
Applications of Virtualization
Copyright © 2017 Om S Trivedi. All rights reserved.
VPN (Virtual Private Network)
Copyright © 2017 Om S Trivedi. All rights reserved.
VPN (Virtual Private Network)
Copyright © 2017 Om S Trivedi. All rights reserved.
BIS and
Specialized BIS
Chapter 4
Copyright © 2017 Om S Trivedi. All rights reserved.
Information Architecture
A conceptual framework that defines the basic structure, content, and relationships of theorganizational databases that provide the data needed to support the basic business processes of an organization.
Copyright © 2017 Om S Trivedi. All rights reserved.
Transaction Processing System (TPS)
Data Entry
Transaction Processing
Database Maintenance
Document and Report Generation
Copyright © 2017 Om S Trivedi. All rights reserved.
ACID TEST for any TPS
Atomicity
Consistency
Isolation
Durability
Copyright © 2017 Om S Trivedi. All rights reserved.
TPS Attributes
High Volume Rapid Processing
Equivalence
Access Control
Trustworthiness
Copyright © 2017 Om S Trivedi. All rights reserved.
Office Automation Systems (OAS)
OAS refers to the use of computer and software to digitally generate,
collect, store, manipulate, and relay office information needed for
accomplishing basic tasks and goals.
The functions of this system are word processing, e-mails, work group
programming, work group scheduling, facsimile processing, e-document,
imaging and management of work flow.
Copyright © 2017 Om S Trivedi. All rights reserved.
OAS Activities
Exchange of information
Management of administrative documents
Handling of numerical data
Meeting planning
Management of work schedules
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of Knowledge
Explicit Knowledge
Implicit Knowledge
Copyright © 2017 Om S Trivedi. All rights reserved.
Knowledge Management System (KMS)
Knowledge Management Systems (KMS) refer to any kind of IT
system that
Stores and retrieves knowledge
improves collaboration
locates knowledge sources
mines repositories for hidden knowledge
captures and uses knowledge
or in some other way enhances the KM process.
Copyright © 2017 Om S Trivedi. All rights reserved.
Why knowledge has gained so much momentum
in recent times?
Changing Business Environment
Wide Connections
Globalization
New Organizational Structures
Copyright © 2017 Om S Trivedi. All rights reserved.
Management Information System (MIS)
A management support system that produces pre-specified
reports, displays, and responses on a periodic, exception,
demand, or push reporting basis.
Copyright © 2017 Om S Trivedi. All rights reserved.
Decision Support Systems (DSS)
Decision support systems are computer-based information
systems that provide interactive information support to managers
and business professionals during the decision making process.
Copyright © 2017 Om S Trivedi. All rights reserved.
Components of DSS
Users
Database
Planning Language
General-purpose planning languages
Special-purpose planning languages
Model Base
Copyright © 2017 Om S Trivedi. All rights reserved.
Phases
of DSS
Copyright © 2017 Om S Trivedi. All rights reserved.
Executive Information Systems (EIS)
Executive information systems (EIS) are information systems that
combine many of the features of management information
systems and decision support systems.
Copyright © 2017 Om S Trivedi. All rights reserved.
Components of EIS
Hardware
Software
User Interface
Telecommunication
Copyright © 2017 Om S Trivedi. All rights reserved.
Enterprise Resource Planning (ERP)
Integrated cross-functional software that reengineers
Manufacturing
Distribution
Finance
Human resources,
and other basic business processes of a company
to improve its
efficiency,
agility, and
profitability.
Copyright © 2017 Om S Trivedi. All rights reserved.
ERP Linkages
Copyright © 2017 Om S Trivedi. All rights reserved.
Various Stages of ERP
Phase 1 • Inventory Control
Phase 2 • ABC Analysis
Phase 3 • Economic Order Quantity
Phase 4 • Just In Time (JIT)
Phase 5 • Material Requirement Planning (MRP– I)
Phase 6 • Material Requirement Planning (MRP– II)
Phase 7 • Distribution Resource Planning (DRP)
Phase 8 • Enterprise Resource Planning
Phase 9 • Material Requirement Planning (MRP– III)
Phase 10 • Web-enabled EIS
Copyright © 2017 Om S Trivedi. All rights reserved.
Customer Relationship Management (CRM)
CRM is about giving the
customer a better experience.
It enhances the company’s
chances of retaining the life-
time value of that customer
and acquiring new customers.
Copyright © 2017 Om S Trivedi. All rights reserved.
CRM Philosophies
CRM Philosophies
Analytical CRM
Operational CRM
Collaborative CRM
Copyright © 2017 Om S Trivedi. All rights reserved.
Supply Chain Management System (SCMS)
Copyright © 2017 Om S Trivedi. All rights reserved.
Components of SCM
Procurement/Purchasing
Operations
Distribution
Integration
Copyright © 2017 Om S Trivedi. All rights reserved.
Human Resource Management Systems (HRMS)
Information systems that support human resource management
activities such as
recruitment,
selection and hiring,
job placement,
performance appraisals, and
training and development.
Copyright © 2017 Om S Trivedi. All rights reserved.
Accounting Information System
“A computer-based system of collection, storage and processing of financial
and accounting data that is used by internal and external users.
Copyright © 2017 Om S Trivedi. All rights reserved.
Functions of AIS
Collect and store data
Record transactions
Safeguard organizational assets
Copyright © 2017 Om S Trivedi. All rights reserved.
Components of AIS
People
Procedures
Data
IT Infrastructure
Internal Control
Copyright © 2017 Om S Trivedi. All rights reserved.
Artificial Intelligence
Artificial Intelligence (AI) is a research field that studies how to
comprehend the intelligent human behaviours on a computer.
Deep Blue system which defeated the world chess champion is a
well-know example.
Expert systems
Pattern Recognition
Natural language processing
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Commercial applications of AI
Decision Support
Information Retrieval
Virtual Reality
Robotics
Copyright © 2017 Om S Trivedi. All rights reserved.
Expert System
A computerized information system that allows non-experts to make
decisions comparable to those of an expert.
An expert system (ES) is a knowledge-based information system that
uses its knowledge about a specific, complex application area to act as
an expert consultant to end users.
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of ES
Example-based system
Rule-based systems
Frame based systems
Copyright © 2017 Om S Trivedi. All rights reserved.
Components of ES
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Intelligence
Gathering and analysis of data and information that can be used to
drive strategic business decisions.
A term used in industry that incorporates a range of analytical
and decision support applications in business including
Data mining
Decision Support Systems (DSS)
Knowledge Management Systems (KMS)
Online Analytical Processing (OLAP)
Copyright © 2017 Om S Trivedi. All rights reserved.
BI Tools
Business Intelligence tools are software programs and features that are
used to complete detailed data analysis.
Simple Reporting and Querying
Data Mining or Statistical Analysis
Business Analysis
Dashboards
Scorecards
Copyright © 2017 Om S Trivedi. All rights reserved.
Core Banking Solutions (CBS)
“Centralized Online Real-time Environment”
Software components that manage the services provided by a
bank to its customers through its branches (branch network).
The platform where communication technology and information
technology are merged to suit core needs of banking.
Infosys’ Finacle
Nucleus FinnOne
Oracle’s Flexcube
Copyright © 2017 Om S Trivedi. All rights reserved.
Payment Mechanisms
Payment Gateway
Credit Cards
Electronic Cheques
Smart Cards
Electronic Purses
Copyright © 2017 Om S Trivedi. All rights reserved.
Access Controls
Procedures
developed and implemented
to protect Software Systems from
unauthorized modification,
disclosure or destruction.
Ensures that information remains accurate and confidential.
Available to USERS authorized by Security Administrator when
required.
Copyright © 2017 Om S Trivedi. All rights reserved.
Functions of Access Controls
Identity Management
Authentication
Authorization
Accountability
Copyright © 2017 Om S Trivedi. All rights reserved.
Approaches to Access Controls
Role-based Access Control (RBAC)
Rule-based Access Control (RAC)
Copyright © 2017 Om S Trivedi. All rights reserved.
Privilege Controls
A fundamental principle of information security, which refers to give only
those privileges to a user account, which are essential to that user's work.
Least User Access or Least Privileged User Account (LUA):
All user accounts at all times should run with as few privileges as possible, and
also launch applications with as few privileges as possible.
Purpose:
Security of Systems
Security of Functions
Security of Data
Copyright © 2017 Om S Trivedi. All rights reserved.
AUSkey Authentication
AUSkey is a secure login that identifies you when you use participating in
government online services on behalf of a business.
AUSkey allows you to access and send business information to government
online.
AUSkey reduces the number of ID and Passwords that you need.
Types of AUSkey
Administrator AUSkey
Standard AUSkey
Copyright © 2017 Om S Trivedi. All rights reserved.
XBRL (eXtensible Business Reporting Language)
Organization: XBRL International in more than 50 countries.
XBRL is the open international standard for digital business reporting.
Replacing older, paper-based reports with more useful, effective and accurate
digital versions.
Accountants use XBRL in support of clients reporting requirements.
It’s a language that can be used and extended as needed.
Multi-lingual Support
Strong Software Support
Who uses it?
Companies, Analysts, Regulators, Governments, Accountants, Data providers, Investors; etc.
Copyright © 2017 Om S Trivedi. All rights reserved.
VPN (Virtual Private Network)
Copyright © 2017 Om S Trivedi. All rights reserved.
Telecommunication and
Networks
Chapter 3
Copyright © 2017 Om S Trivedi. All rights reserved.
Trends in Telecommunication
Copyright © 2017 Om S Trivedi. All rights reserved.
Industry Trends
Copyright © 2017 Om S Trivedi. All rights reserved.
Technology Trends
Open Systems
Internet Networking Technologies
Middleware
Change from Analog to Digital Technology
Wireless Technology
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Application Trends
Electronic commerce
Enterprise collaboration
Internal business applications
Develop new products and services
Cut costs
Share Resources
Copyright © 2017 Om S Trivedi. All rights reserved.
Business Value of Telecommunications
Overcome geographic barriers
Overcome time barriers
Overcome cost barriers
Overcome structural barriers
Copyright © 2017 Om S Trivedi. All rights reserved.
Telecommunication Processors
Telecommunication Processors
NIC Modems Multiplexers
Copyright © 2017 Om S Trivedi. All rights reserved.
NIC
A network interface card or
controller, also known as
network adapter, LAN adapter or
physical network interface is a
computer hardware component
that connects a computer to a
computer network.
NICs implement a networking
standard called Ethernet.
Ethernet cards or are in-built
with the motherboard.
Copyright © 2017 Om S Trivedi. All rights reserved.
Modems
Modulator-demodulator
Computers use modems to talk to each other
Copyright © 2017 Om S Trivedi. All rights reserved.
Multiplexers
Multiplexer is a device that combines large number of low speed
transmission lines into high speed line.
It can also transmit data from CPU to appropriate terminal linked to the
Multiplexer.
a separate computer processor is devoted to this activity and it is known as
“front-end-processor”.
Copyright © 2017 Om S Trivedi. All rights reserved.
Telecommunication Processors
Internetwork Processors
Switch Router Hub Bridge Repeaters Gateway
Copyright © 2017 Om S Trivedi. All rights reserved.
Switch
Each computer in a Network is connected by the cable to a device known as a switch
Also called switching hub, bridging hub, officially MAC bridge
The switch, in turn, connects to the rest of the network
Number of ports on a Switch: 8 or 16
8 port switch connects up to 8 computers
Switches can be connected to each other to build larger networks
Copyright © 2017 Om S Trivedi. All rights reserved.
Hub
Hub is a port-switching communications
processor.
This allows for the sharing of the
network resources such as servers, LAN
workstations, printers, etc.
Copyright © 2017 Om S Trivedi. All rights reserved.
Routers
Router is a communications processor
It interconnects networks based on different rules or protocols,
So that a telecommunications message can be routed to its destination.
Routing is the process of deciding on how to communicate the data from
source to destination, in a network.
Copyright © 2017 Om S Trivedi. All rights reserved.
Repeaters
Repeater is a
communications
processor that boosts or
amplifies the signal
before passing it to the
next section of cable in
a network.
Copyright © 2017 Om S Trivedi. All rights reserved.
Bridge
A bridge is a device that connects two networks so that they act as if they are
one network.
Used to partition one large network into two smaller networks for performance
reasons.
A bridge as a kind of smart repeater.
Bridge is a communication processor that connects number of Local Area
Networks (LAN).
It magnifies the data transmission signal while passing data from one LAN to
another.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Gateway
A device that connects dissimilar networks.
Gateways often connect Ethernet networks
to mainframe computers or to the
Internet.
They perform protocol conversion to allow
interoperability between two different
types of communications architectures.
Copyright © 2017 Om S Trivedi. All rights reserved.
Telecommunications Media/Channels
Copyright © 2017 Om S Trivedi. All rights reserved.
Telecom Media
Guided Media
Twisted Pair Copper Cable
Coaxial Copper Cable
Fibre Optic Cable
Unguided Media
Terrestrial Microwave
Radio Waves
Micro Waves
Infrared Waves
Communication Satellites
Copyright © 2017 Om S Trivedi. All rights reserved.
Guided Media
Twisted Pair Copper Cable
Coaxial Copper Cable
Fibre Optic Cable
Copyright © 2017 Om S Trivedi. All rights reserved.
Twisted Pair Copper Cable
Copyright © 2017 Om S Trivedi. All rights reserved.
Coaxial Copper Cable
Copyright © 2017 Om S Trivedi. All rights reserved.
Fibre Optic Cable
Copyright © 2017 Om S Trivedi. All rights reserved.
Unguided Media
Radio Waves
Terrestrial Microwave
Micro Waves
Communication Satellites
Infrared Waves
Copyright © 2017 Om S Trivedi. All rights reserved.
Radio Waves
Copyright © 2017 Om S Trivedi. All rights reserved.
Terrestrial Microwave
Copyright © 2017 Om S Trivedi. All rights reserved.
Micro Waves
Copyright © 2017 Om S Trivedi. All rights reserved.
Communication Satellites
Copyright © 2017 Om S Trivedi. All rights reserved.
Infrared Waves
Copyright © 2017 Om S Trivedi. All rights reserved.
Area Coverage Based Classification
LAN
MAN
WAN
Copyright © 2017 Om S Trivedi. All rights reserved.
Functional Based Classification
Client-Server Networking
Peer to Peer model
Copyright © 2017 Om S Trivedi. All rights reserved.
Tier System
Single Tier Systems/One-Tier architecture
Two-Tier Architecture
3-tier Architecture
n tier Architecture
Copyright © 2017 Om S Trivedi. All rights reserved.
Single Tier Systems/One-Tier architecture
Copyright © 2017 Om S Trivedi. All rights reserved.
2-Tier architecture
Copyright © 2017 Om S Trivedi. All rights reserved.
3-Tier architecture
Copyright © 2017 Om S Trivedi. All rights reserved.
Single Tier Systems/One-Tier architecture
Copyright © 2017 Om S Trivedi. All rights reserved.
Ownership Based Classification
Public Data Network
Private Data Network
VPN
Remote-access VPN
Site-to-Site VPN
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Computing
Centralized Computing
Centralized computing is computing done at a central location, using terminals that
are attached to a central computer.
Decentralized Computing
Decentralized computing is the allocation of resources, both hardware and
software, to each individual workstation, or office location which are capable of
running independently of each other.
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Topology
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Copyright © 2017 Om S Trivedi. All rights reserved.
Transmission Technologies
Copyright © 2017 Om S Trivedi. All rights reserved.
VPN (Virtual Private Network)
Copyright © 2017 Om S Trivedi. All rights reserved.
Protocols
Syntax
Semantics
Timing
Copyright © 2017 Om S Trivedi. All rights reserved.
OSI Model
Copyright © 2017 Om S Trivedi. All rights reserved.
What is TCP?
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Security Protocols
Secure Shell (SSH)
Secure File Transfer Protocol (SFTP)
Secure Hypertext Transfer Protocol (HTTPS)
Secure Socket Layer (SSL)
Copyright © 2017 Om S Trivedi. All rights reserved.
Intrusion Detection System (IDS)
Network Intrusion Detection (NID)
Host-based Intrusion Detection (HID)
Hybrid Intrusion Detection (HID)
Network-Node Intrusion Detection (NNID)
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Administration and Management
Operations
Administrations
Maintenance
Provisioning
Copyright © 2017 Om S Trivedi. All rights reserved.
Network Management Functions
Fault Management
Configuration Management
Accounting Management
Performance Management
Security Management
Copyright © 2017 Om S Trivedi. All rights reserved.
Internet Architecture
Analog or Dial Up Connections
DSL Connections (ADSL, SDSL and VDSL)
Cable Connections
Wireless Internet Connections
T-1 Line Connections
Copyright © 2017 Om S Trivedi. All rights reserved.
E-commerce
Any form of business transaction in which the parties interact
electronically rather than by physical exchanges.
Copyright © 2017 Om S Trivedi. All rights reserved.
E-commerce
E-commerce is
the use of electronic communications and
digital information processing technology
in business transactions
to create, transform, and redefine relationships
for value creation between or among organizations, and between
organizations and individuals.
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of E-commerce
B2B (Business-to-Business E-commerce)
B2C (Business-to-Consumer E-commerce)
C2C (Consumer to Consumer E-commerce)
C2B (Consumer-to-Business E-commerce)
Copyright © 2017 Om S Trivedi. All rights reserved.
Business-to-Government (B2G) e-Commerce
B2G e-Commerce, also known as e-Government, refers to the use of
information and communication technologies to build and strengthen
relationships between government and employees, citizens, businesses,
non-profit organizations, and other government agencies.
Copyright © 2017 Om S Trivedi. All rights reserved.
Business-to-Employee (B2E) e-Commerce
B2E e-Commerce, from an intra-organizational perspective, has
provided the means for a business to offer online products and services
to its employees.
Copyright © 2017 Om S Trivedi. All rights reserved.
Mobile Commerce
M-commerce (mobile commerce) is the buying and selling of goods and
services through wireless handheld devices such as cellular telephone and
personal digital assistants (PDAs).
Known as next-generation e-commerce
M-commerce enables users to access the Internet without needing to find a
place to plug in.
Copyright © 2017 Om S Trivedi. All rights reserved.
Electronic Fund Transfer
EFT is fast, safe, and means that the money will be confirmed in user’s bank
account quicker than if he had to wait for the mail, deposit the cheque, and
wait for the funds to become available.
EFT Systems
Automated Teller Machines (ATMs)
Point-of-Sale (POS) Transactions
Preauthorized Transfers
Telephone Transfers
Copyright © 2017 Om S Trivedi. All rights reserved.
BPA
through
Application Software
Chapter 3
Copyright © 2017 Om S Trivedi. All rights reserved.
Types of Business Applications
Copyright © 2017 Om S Trivedi. All rights reserved.
Controls in BPA
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Copyright © 2017 Om S Trivedi. All rights reserved.
Questions??????
THANX
9958300572