Skip to main content

Posts

Showing posts from April 14, 2010

DEVELOPING MIS – DOS AND DON’TS

DO’s Have simpler and manageable system Develop common understanding between consultant and the organization Involve programmer in needs assessment Customize off-the-shelf software Have simple software for users to handle Extensively involve users in MIS development Adopt modular approach for s/w development DON’Ts Be ambitious Be unrealistic in developing action plan Delay decisions on hiring application developer/s Depend heavily on the Consultant Invest heavily in in-house application development Let vendors determine hardware needs for LAN Go for large applications NOOPUR GARG BBA/4536/07

ROLE OF COMPUTER PROGRAMMER/APPLICATION DEVELOPER

Participate in assessing users’ information needs Develop computer based applications Undertake initial testing and debugging applications Operationalize the applications Staff training Extend on-going support to users in handling the applications Focus on customizing inexpensive market software for agency needs NOOPUR GARG BBA/4536/07

ROLE OF MIS COORDINATOR IN DEVELOPING A MIS

Interact with user groups Identify the needs of users of MIS ·Designing of reporting formats Identify systems of information flow Ensure smooth flow of information within and outside the organization Time management – tracking inputs/reports Act as interface among sections and management tiers Identify training needs of staff in MIS jointly with application developer Organize monthly/periodic meetings to assess performance, maintain minutes and follow-up on the decisions Interface with the various divisions/units in the organization for information sharing NOOPUR GARG BBA/4536/07

STEPS IN MIS DEVELOPMENT

Preliminary Investigation · The problem · Magnitude and scope · Alternatives · Viability and cost effectiveness Requirements Analysis · Knowing the primary and secondary users · Ascertaining user needs · Primary and secondary sources of information · Design, development and implementation needs Systems design · Inputs · Processing · Outputs · Storage · Procedures · Human resources Acquisition/procurement · Compatibility · Cost effectiveness · Performance standards · After sales service · Configuration · Portability Implementation/installation · Application development · Testing · Debugging – logical and syntactical · Procedure and user manual preparation · Orientation and training Maintenance and Upgradation NOOPUR GARG BBA/4536/07

Information & Types of Management Information

WHAT IS INFORMATION? Information is data presented in a form that is meaningful to therecipient. It adds to knowledge and is relevant for the situation. Two types of information are accounting information and management information. Data becomes information when they are transformed to communicate meaning or knowledge, ideas or conclusions. By itself data is meaningless. The attributes of an item of information are: accuracy, form, frequency, breadth (scope), origin, time. horizon. Attributes of a set of information are relevance, completeness and timeliness. TYPES OF MANAGEMENT INFORMATION Seven types of information are necessary for top-level managers. 1. Comfort information: informs about current situation or achievement levels that are tuned to expectations. (Clients served, target achieved, patients treated, operations conducted, etc.) 2. Status information or progress information: keeps abreast of current problem and crises and changes.(progress on office...

Integrated Financial Management Information Syatem [MIS]

A financial management information system, or integrated financial management information system (IFMIS), is an information system that tracks financial events and summarizes financial information. In its basic form, an IFMIS is little more than an accounting system configured to operate according to the needs and specifications of the environment in which it is installed. Generally, the term “IFMIS” refers to the use of information and communications technology in financial operations to support management and budget decisions, fiduciary responsibilities, and the preparation of financial reports and statements. In the government realm, IFMIS refers more specifically to the computerization of public financial management (PFM) processes, from budget preparation and execution to accounting and reporting, with the help of an integrated system for financial management of line ministries, spending agencies and other public sector operations. The principal element that “integrates” ...

Achieving Sound MIS

The development of sound MIS is the result of the development and enforcement of a culture of system ownership. An "owner" is a system user who knows current customer and constituent needs and also has budget authority to fund new projects. Building "ownership" promotes pride in institution processes and helps ensure accountability. Although MIS does not necessarily reduce expenses, the development of meaningful systems, and their proper use, will lessen the probability that erroneous decisions will be made because of inaccurate or untimely information. Erroneous decisions invariably misallocate and/or waste resources. This may result in an adverse impact on earnings and/or capital. MIS which meets the five elements of useability is a critical ingredient to an institution's short- and long-range planning efforts. To achieve sound MIS, the organization's planning process should include consideration of MIS needs at both the tactical and stra...

MIS Basics

A management information system (MIS) is a system or process that provides the information necessary to manage an organization effectively. MIS and the information it generates are generally considered essential components of prudent and reasonable business decisions. The importance of maintaining a consistent approach to the development, use, and review of MIS systems within the institution must be an ongoing concern of both bank management and OCC examiners. MIS should have a clearly defined framework of guidelines, policies or practices, standards, and procedures for the organization. These should be followed throughout the institution in the development, maintenance, and use of all MIS. MIS is viewed and used at many levels by management. It should be supportive of the institution's longer term strategic goals and objectives. To the other extreme it is also those everyday financial accounting systems that are used to ensure basic control is maintained over fin...

Management, Opportunities, Challenges, and Solutions

Opportunities Natural disasters such as fires and earthquakes can strike at any time. A spilled cup of coffee can also do some damage! Waiting until disaster strikes isn't the best time to figure out how to recover your systems. Smart organizations create a disaster recovery plan ahead of time and/or use firms specializing in disaster recovery. Management Challenges There's a reason why we explain all those methods and procedures and processes in future chapters for building good, solid information systems. They ensure system quality so that the product produced by the system is as good as it can be. Designing Systems that are Neither Over-controlled nor Under-controlled You should be realistic about security and system controls. If you institute five layers of entry into your Web site, people probably won't use it that much. They'll either ignore it or find a way around your controls. You have to analyze the system and determine those areas that should receive mor...

Technologies and Tools for Security and Control

Access Control The headlines telling of hackers' exploits in the past year should be enough to convince every company of the need to install firewalls, access controls , and other security measures. With the installation of cable modems or DSL lines, home users must follow the same guidelines. These new connections, which leave your personal computer "always on," are just as vulnerable to attacks as corporate systems. In corporate systems, it's important to ensure authentication methods are in place so that unauthorized users can't gain access to the system and its data. Because most simple password systems are too weak and make the system too vulnerable, security experts are devising new methods to control access. Biometric authentication is becoming more popular as a method of protecting systems and data as the technology is refined. While you may have seen the fingerprint or facial recognition techniques only on sci-fi movies, rest assured it may be the next...