Evolution of Management Information System

There have been a lot of changes in the way in which information processing has come up. This change in information processing system can be seen from the point of view of the enabling technologies as well as the increasing demands of the information processing capabilities of organizations. In the past, small organizations were owned and operated by one man. The owner was both president and chief-executive who single handedly undertook all the functions required to operate the organization, including accounting, inventory control, public relations, research and so on. The owner personally gathered information necessary to carry out various functions, either using it as it was gathered or storing the information in his memory for later retrieval.… Read the rest

Role and Impact of Management Information Systems (MIS) in an Organization

Management information system (MIS) provides information that organizations require to manage themselves efficiently and effectively. Management information systems are typically computer systems used for managing the organizations. Management information systems are distinct from other information systems because they are used to analyze and facilitate strategic and operational activities.

Role of Management Information Systems in an Organization

The role of the MIS in an organization can be compared to the role of heart in the body. The information is the blood and MIS is the heart. In the body the heart plays the role of supplying pure blood to all the elements of the body including the brain.… Read the rest

Case Study: Cisco Systems Inc.’s ERP Implementation

Introduction

Cisco Systems, Inc. is a big player in the Internet technologies field, manufacturing their primary product – the router. Two Stanford computer scientists founded the company in 1984, unbelievably by 1997, Cisco became a fortune 500 company and in the following year Cisco’s market capitalization was over $100 billion dollars.  With the gigantic growth experienced Cisco needed to look into their future regarding their existing Enterprise Resource Planning package.

Unreliability and common outages brought into question the validity of trying to enlarge the current system to meet the Cisco’s constantly growing needs. The current system was a UNIX-based software package that supported financial, manufacturing, and order-entry systems.  … Read the rest

Types of Information Systems Used in Business

The implementation of the information system in the development of the business is most necessary now days. For most business, there are varieties of requirements for information. In every organization different level of management need different type of information for development of business. For example, senior management needs information to help with their business planning. Middle management needs more detailed information to monitor and control business activity. The employees at lower management need information to help them to perform their duties.

In this global world information systems are playing important role in any organizations to meet their strategic goals. For the development of the business it very important to have good information system in each department of organization such as accounting, finance, marketing and human resource department to perform business operations.… Read the rest

Classification of Security Threats in Information Systems

As use of internet and related telecommunications technologies and systems has become pervasive, use of these networks now creates a new vulnerability for organizations or companies. These networks can be infiltrated or subverted a number of ways. As a result, organizations or companies will faced threats that affect and vulnerable to information system security. Threats to information system can come from a variety of places inside and external to an organizations or companies. In order to secure system and information, each company or organization should analyze the types of threats that will be faced and how the threats affect information system security.… Read the rest

The Five Phases of Ethical Hacking

It is debatable, if hacking can be ethical or not, the term “Hacking” over time has been associated with destructive activity.

These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose.

The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker.… Read the rest