9
Assigment:Explain different control issues in Management Information System MANAGAMENT INFORMATION SYSTEM INTRODUCTION Information system is a group of interrelated components that work to carry out input , processing, storage, output and control actions in-order to convert data into information that can be used in decision making. It is a mechanism that ensures that information is available to the managers in the form they want it and when they need it. The term management information system (MIS) made its first appearance in U.S. navy report on the use of computers to construct a single integrated system to manage all navy resources. MIS is the study of providing information to people who make choices about the disposition of valuable resources in a timely, accurate, and complete manner at a minimum of cognitive and economic cost for acquisition, processing, storage, and retrieval. CONTROL ISSUES IN MANAGEMENT INFORMATION SYSTEM Control It is the process through which manager assures that actual activities are according to standards leading to achieving of common goals. Information systems operate in real world

Managament Information System 2 (3)

Embed Size (px)

Citation preview

Assigment:Explain different control issues in Management Information SystemMANAGAMENT INFORMATION SYSTEM INTRODUCTIONInformation system is a group of interrelated components that work to carry out input , processing, storage, output and control actions in-order to convert data into information that can be used in decision making. It is a mechanism that ensures that information is available to the managers in the form they want it and when they need it.The term management information system (MIS) made its first appearance in U.S. navy report on the use of computers to construct a single integrated system to manage all navy resources. MIS is the study of providing information to people who make choices about the disposition of valuable resources in a timely, accurate, and complete manner at a minimum of cognitive and economic cost for acquisition, processing, storage, and retrieval.CONTROL ISSUES IN MANAGEMENT INFORMATION SYSTEMControl It is the process through which manager assures that actual activities are according to standards leading to achieving of common goals. Information systems operate in real world situations which are always changing and there are lots of problems. Information systems are vulnerable to various threats and abuses thus controls are needed to protect the system. These controls include:i. Security controlii. physical protection controliii. Telecommunication controlsiv. Computer failure1: Security controlThese are Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

Basic Principles of Information Systems security includes;1. ConfidentialityThis principle is applied to information by enforcing rules about who is allowed to know it. It prevents the unauthorized disclosure of information and restricts the data access to only those who are authorized. 2. Integrity In any business organization having information system, the values of data stored and manipulated, such as maintaining the correct signs and symbols is an important issue of concern. This issue is referred to integrity within an organization which is the prevention of the unauthorized modification3. AvailabilityThis is referred to as accessibility of information and in usable form when and where it is required. The major source of Security issues in an organization is system vulnerability. Listed below are examples of system vulnerability and abuse in an organization Hardware problems, this includes, breakdowns, configuration errors, damage from improper use or crime. Software problems ,this includes, programming errors, installation errors, unauthorized changes Use of networks/computers outside of firms control Loss and theft of portable devices Internet vulnerabilities Wireless security challenges and this include radio frequency bands easy to scan. Malware (malicious software)

There are several types of security controls which include:1. General controls This includes; Establish framework for controlling design, security, and use of computer programs Hardware controls Monitor for and fix malfunction in the system Environmental systems and protection Backup of disk-based data Day-to-day operations of Information Systems Password protection Data level access controls 2. Administrative controls. These are the main controls that helps the top executives provide leadership in setting the control policy of the whole industry. Without the administrative control, the whole control systems will not achieve its intended objectives.3. Application controls. This include input, processing, and output controls Input controls-computers take in what the users feed in. In this case we need to control the data entry process in-order to get the required results. Processing control -Once data is fed into the computer, controls are embedded in various computer programs to help, detect arithmetic calculations and logical operations errors Output controls -.These are developed to ensure that processed information is correct, complete and is transmitted to authorized user in a timely manner. The documents are thoroughly checked by staff to ensure their correctness.5. Processing control -Once data is fed into the computer, controls are embedded in various computer programs to help detect arithmetic calculations and logical operations errors. This can be achieved by ensuring that the below listed measures are acted upon; Ensuring that transactions entered online are immediately processed by computer Load balancing. This is distributing large number of requests for access among multiple servers Mirroring. This is duplicating all processes and transactions of server on backup server to prevent any interruption in service Clustering. This is linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing 6. Information system controls- Its control assures the accuracy, validity and proprietary of information system activities. Control must be there to ensure proper data entry processing techniques, storage methods and information output. 7. Storage control these are controls that ensure maintenance and accessibility of computer programs and database information. Protection is ensured against un-authorized users by assigning passwords and security codes8. Procedural controls these helps in providing security to operation of information. It helps individuals in knowing what to do in the industry by using the procedures stipulated .It promotes uniformity and organization in the industry thus reducing confusion.9. Physical facility control-This is a method that protect physical facilities and their contents from loss and destruction. Machines are vulnerable to physical damages through accidents, theft and fire therefore physical safeguards and various control procedures are required to protect the hardware, software and vital data resources of computers. 2: Physical Protection ControlThese are controls which give access to only authorized personnel to the computers of the industries. measures such identification badges of information services, electronic door locks, security alarm, security policy, closed circuit TV and dust control etc., are installed to protect the computer centre from un-authorized person3: Telecommunication controlsThe telecommunication processor and control software play a vital role in the control of data communication activity. Data can be transmitted in coded from and it is decoded in the computer centre itself. The process is called as encryption.It includes; Firewalls. This is Preventing unauthorized users from accessing private networks Coding and scrambling of messages to prevent their access without authorization Authentication. It is the ability of each party in a transaction to ascertain identity of other party Digital signature. It is ensuring that there is digital code attached to electronically transmitted message to uniquely identify contents and sender 4: Computer Failure ControlsComputers can fail for several reasons like power failures, electronic circuitry malfunctions, mechanical malfunctions of peripheral equipment and hidden programming errors. To protect from these failure precaution, any measure with automatic and remote maintenance capabilities may be required. This can be achieved by; Fault-tolerant. This can be achieved by having extra hardware, software, and power supply components to provide continuous uninterrupted service High-availability computing. Organization should have tools and technologies to enable system to recover quickly from a crash, this can be achieved by having a Disaster recovery plan. This will assist in running business in event of computer outage

CONCLUSIONThe objective of the information system is to help company to improve its business processes and operations and like any other major corporate asset, information systems must be controllable.REFERENCEDecision Support Systems A Data-Based, Model-Oriented UserDeveloped Discipline. Petrocelli Books, Inc. New York, NY. IBM Agricultural Symposium (1963).Vittal, A., & Shivraj, K. (2008). Role of IT and KM in improving project managementperformance. VINE, 38 (3), 357 369.Jarboe, K. P. (2005). Reporting intangibles: A hard look at improving business information in the U.S. Athena Alliance.