Professional Documents
Culture Documents
Decision-making
o o o
o o
CBIS can make the process effective and efficient in decision making
Decision-Making process PHASES By Herbert Simon (researcher of management & decision making)
o o o
Design. Design the method by which we will consider data. Methods are sequences of steps, formulas, models & other tools that enable us to systematically reduce the alternatives to a manageable number.
Types of Problems
most physical & mathematical problems are structured. A formula or sequence is followed
solution
not enough information about the factors that may affect the solution
Many potential factors that no algorithm can be formulated to guarantee a unique optimal
Because experts may have enough knowledge to narrow down number of possible solutions, \but not enough to guarantee 100% certainty of producing an optimal solution
Programmable problems
o o
Semistructured problems
Managers chooses one alternative from many multiple possible courses of action.
A CBIS designed to help managers select one of many alternative solutions to a problem & help the corporations increase market share, reduce costs, increase profitability, and enhance product quality.
DSS Components
o o o
Dialog module
o o o
These modules:
Present the results in one or several manners so the output can be easily understood.
o o o o
DIALOG MODULE
o o o
Allows the user to access the database and select data for the decision process, Lets user enter parameters and change them to see how the change affects the result of the analysis
Maybe in the form of commands, menus, dialog boxes, or any other approach. Simply, it is the interface.
Types of DSS
Differ in degree of sophistication and the manner in which they are used
o o
Personal DSS. Built for the use of the individual knowledge worker in his/her daily work
Group DSS. Usually installed in conference room settings or through a group of networked computers. Designed to take input from multiple users interacting with the program at the same time and converging on decision as a group
o o o o o
Are decision-aids especially designed for high ranking managers, to provide them with the most essential information for running the organization.
Useful to executives who almost always suffer from information overload Information overload is the phenomenon whereby the very volume of information creates the additional burden of having to decide what is important, rather than helping to solve problems and make decisions.
MEIS do not require user to enter the values of any parameter like DSS do
o o
On request drill down capability that allows the executive to reach information in further detail
o o o o o o
On-demand financial and other ratios & indicators to reflect organizational strengths & weaknesses
Easy-to-use but sophisticated tools to allow navigation in databases and data warehouses
o o o o
A set of tools for collecting, storing, retrieving, transforming and display of spatial data from the real world.
famous IT application tool which can provide best decision support to bridge the gap between the requirements and the reality.
Integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information.
allows us to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts.
Why GIS?
o o o o
To make the map the 2nd time, the 50th time, the 100th time...
GIS in business Source: Lofty Azaz, International Conference on Humanities, Geography and Economics (ICHGE'2011) Pattaya Dec. 2011
o o
-
Use for management functions such as logistics, site and facilities management, marketing, decision making, & planning
Help retail business locate the best site for its next store Help marketers find new prospects Highlights where the firm has many customers by placing data on the map
Use for a variety of routine decision support and analysis applications (eg. Market & demographic analyses)
o o o o
Spatial Imaging - representing displays of data and information within a spatially defined coordinate system.
a.
Digital Mapping
Use of Remote sensing and global positioning systems (GPS) allow more accurate map production
b.
Facilities Management
provides managers with a powerful tool for supporting real-time monitoring of facilities and is
Utility firms represent one of the largest private-sector GIS end-user groups
c.
o o
it provides a platform for representing the spatial relationship between the components of the market; that is, the customers, suppliers, and competitors.
it also provides a way to bring together data from multiple sources and link them based on spatial attributes.
d.
o o o o o
dispatch systems
inventory systems
e.
Expert Systems and AI
make use of both the imaging and the planning functions of GIS.
in 25 years Projected that intelligent machines would do physical and intellectual work for
human beings
AI Categories (fields)
a. b. c.
Artificial Vision ability of a machine to see its environment, and to recognize visual input (ex: handwriting) according to general patterns
Natural Language Processing programs designed to take human language as input and translate it into a standard set of statements that a computer can execute
d. e. f. g. h.
Neural Networks designed to mimic the way the human brain operates the way it links facts, draws conclusions and use experience to learn & to understand how new facts relate to each other.
Fuzzy Logic based on logic that do not have discrete boundaries but lie along a continuum, enabling a system to better deal with ambiguity.
Genetic Algorithms math functions that use Darwinian principles to improve application.
Software mimics a living organisms improve through mutation and natural selection,
Intelligent Agents computer programs that automatically wade through massive amounts of data and select and deliver the most suitable information for the user, according to the contextual or specific requirements.
Examples:
EXPERT SYSTEMS
reasoning.
Purpose: replicate the unstructured and undocumented knowledge the few (experts), and
o o o o o o o o o
Preserve expertise
Reduce costs
o o o o o o o o
Planning. It can use information from previous projects to improve subsequent plans. Example: by cautioning the planner against pitfalls that may cause budget and time overruns.
Decision making. Supports decision making by bringing input from several experts, thereby providing the organization with a true strategic weapon.
Diagnosis. Diagnosing different conditions like malfunctioning equipment, products or processes; or hardware problems & their solutions
Training. Contain an explanation facility that describes the logic being used to address the problem at hand. Teach users decision rules.
Incidental learning. While users use ES in their regular work, they internalize how the system reaches decisions; thereby increasing their own expertise and makes them better decision makers.
Replication of expertise. Since it is software, it can be replicated and disseminated, thereby implementing the same expertise in the organization
Timely response. ready at all times to provide immediate support and to perform processes.
Consistent solutions. Consistency in decision making, thereby managers makes consistent solutions.
o o
Aquisition
a. b.
c. d. e. f.
Outsourcing
IS subsidiaries
Pre-packaged software
g.
Outsourcing
User-developed applications
Contracting with an IT (software) company for the development That the organization trusts all the activities associated with its ISs.
i.
Companies go for long term service (like maintenance) aside from just purchasing the hardware & software.
ii.
Advantages of outsourcing
h. i. j. l.
k. m. n. o. p. q. r.
Increased security
Risk of outsourcing
Loss of control
IS Subsidiary
s. t.
IS vendors like other IT consulting firm but they always have a primary client the company that
owns them
Advantage:
u. v.
Purchased applications
w. x.
y. z. aa. bb.
High quality
Low price
Available support
RENTING a SOFTWARE
cc.
i. ii.
dd.
Nowadays, software is good to 2-3 years or even less, another version is introduced
On-site renting rent software in a limited period and pay less than owning a system
Information security
Ensure compliance with national security laws and privacy policies and law
jj.
Risk to hardware
Natural disaster
Solution: UPS
kk.
Controls
Theft of information
solution: key/password
Computer viruses
ll.
i.
mm.
Common controls:
Backup
Access controls
Atomic transactions
Audit trail
Robust when a computer program is powerful in what it is intended to do, resists inappropriate usage like incorrect data entry.
It gives a message when data entry violates data parameters and processes
nn.
i. ii.
Backup
Easiest way to protect against loss of data caused by disasters, viruses & human errors. (ex: SPU coop has a backup)
Backing up duplicate data periodically and place it in another storage and even other place
oo.
i. ii. iii.
Access Controls
are measures taken to ensure that only those who are authorized have access to a computer network or to certain apps or data.
pp.
i. ii. iii.
Atomics Transactions
A system supports atomic transactions when its code will only allow the recording of data if they successfully reach their destinations.
Example: order system where sale is recorded in shipping file, invoice file, A/R file and commission file.
qq.
i. ii. iii.
Audit Trail
a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval.
Purposes:
* *
rr.
i. ii.
ss.
i.
Separation of duties
In systems development
ii.
tt.
Network Controls, such as: 1. Callback popular measure against unauthorized remote access. When a modem dials into a system, a special application asks for the tel.no. from which the call has been made... 2. Encryption - Authentication process of ensuring that the person who sends a message to or receives a message from you is indeed that person - Encryption coding a message into a form unreadable to an interceptor. 3. Digital Certificate - Equivalent of a physical ID card containing a public key and a digital signature 4. Firewalls - The best defense against unauthorized access to system over the internet - A software who purpose is to block access to computing resources.