Wednesday, September 24, 2008

finals Question # 5


As a topic before KBS, DSS and VO, identify and describe one company that adopts an MIS. Include in your discussion, how MIS help and support the company, its managers and other employees, in their problem solving and decision-making.


This MIS (Management Information System) helps to manage a logistics company just like sulpicio lines. The primary aim of this system is to design a management information that provides logistics company with a possible way to decide in financial ways. There will be three primary systems that the is going to design to help company solve the problem that they face and that will be the invoice system, bank system and financial system. This system will benefit the logistics company by calculating financial report, statements and gross profits and losses. This system can run in any latest Windows operating system and it is easy to use. This system can also be used in networked environment where everyone can execute the data within the company.

Question # 4

Describe or define KBS
kbs provides specific facts & rules about the subject and the inference engine provides the reasoning ability that enables the expert system to from conclusions.Data used for problem solving and the computerized data in an expert system required for solving problem in a specific area or necessary facts for solutions.
Distinguish KBS to MIS
(KBS) provide a way of formalizing and automating knowledge. Their worth for managing the knowledge assets has not gone unnoticed: they have been promoted as safeguards to retain expert knowledge, to avoid knowledge erosion, etc.While (MIS) deals with planning , development, management and use of information technology to help people perform all task ralated to information processing & management.
Illustrate ( give examples ) how KBS improve company's competitive advantages and organization performance
A knowledge-based system ensures accuracy, freshness and richness that is otherwise impossible to achieve. It provides the customer-value insight that your business or organization needs to recognize perfect candidates for up- or cross-sells and drive successful retention initiatives.
The organization that wants to build competitive advantages has to create and leverage its capabilities. One of the central bases for achieving competitive advantage is the organizational capability to create new knowledge and transfer it across various levels and parts of the organization. Because knowledge based system is central to strategy formulation and implementation, knowledge management has become a key strategic task facing managers for achieving success in today's complex and dynamic environments.

Reference:

http://chiefmarketer.com/customer_recognition_08212007/

Monday, September 22, 2008

QUESTION # 3

Describe or defined Virtual office.

for me it is a office work can be done at virtually world or any geographical location as long as the work site is linked to one or more of the firm's fixed location.

Distinguish DSS from MIS

virtual office is an office in a virtual world they make decision making there, do office work just like regular office do meeting but in virtual world MIS is more involved in decision making within subordinates and supports managers decision but in computer based system.

Illustrate (give samples) how can improve company's
competitive advantage and organizational performance.


the company can improve their competitive advantages to other company by using DSS is
reduces the end-user installation, deployment, maintenance, training, and software costs normally associated with data warehouse implementation.

this is the sample of company using DSS program or using server based appliction

VIENNA, Va.--(BUSINESS WIRE)--April 23, 1996--MicroStrategy, the largest relational on-line analytical processing (ROLAP) vendor, today comments on the overwhelming support and acceptance of DSS Web, its recently introduced relational OLAP interface for the World Wide Web.

DSS Web is a server-based product that enables end users to access data warehouse and decision support applications through standard Internet browsers.

MicroStrategy has a number of customers developing mission-critical web-based ROLAP applications using DSS Web. "Our customers are excited about DSS Web because as a server-based application, it drastically reduces the end-user installation, deployment, maintenance, training, and software costs normally associated with data warehouse implementation," continued Saylor.

Clients using DSS Web for developing applications include Hannaford Bros. Co., a $2.5 billion company with stores in New England and the Southeast. Hannaford is enabling remote decision support by using DSS Web to create a high performance, easy-to-implement solution for store-level decision making. With DSS Web, Hannaford's remote users and corporate users have comparable access to critical data.

reference:

http://findarticles.com/p/articles/mi_m0EIN/is_1996_April_23/ai_18214664


question # 2

Describe or Define DSS

DSS is an important role on middle managers it can solve problem-solving & decision making activities. and it is more complex and non routine than those faced by operational managers. Thier decision making task require significantly more data. There fore they use computer based decisions aids including DSS and ES.

it is a software that enables as to develop specific tasks provides user interfaced management system.
Distinguish DSS from MIS

DSS is a specific class of computerized information system it supports business and organizational decision-making activities,while MIS it supports managers and thier subordinates in strategic planning, transaction and decision in daily operatives.
Illustrate ( give examples) how DSS can improve company's competitive advantages and organizational performance.

it improve frameworks of company just like thier technological levels, people are involved,The developmental approach for a DSS system should be strongly iterative.Because of these combination and characteristics, MIS can provide support to managers as they work to achieve corporate goals.
  1. Improves personal efficiency
  2. Expedites problem solving
  3. Facilitates interpersonal communication
  4. Promotes learning or training
  5. Increases organizational control
  6. Generates new evidence in support of a decision
  7. Creates a competitive advantage over competition
  8. Encourages exploration and discovery on the part of the decision maker
"this is sample company competitive when they use these system"

The Virtual Office Group's BVQI quailty accredited is testament to the exceptional level of service which you can expect from the original Virtual Office and serviced office leader.

What our clients say:

"We have found the services offered by the Virtual Office key to our continued ability to serve our UK clients in a client-focused manner.

By having access to meeting rooms in a central London location, we can meet clients at a time of their choosing, in well-equipped and smart rooms, of a size suitable to the meeting.


We are able to use their facilities when required, thus avoiding expensive office rental in central London which would often stand empty; we frequently work on client site.

The Virtual Office team are always helpful and friendly – often going the extra mile to provide us with what we need at short notice. As a 21st Century business using the latest technology and home working practices, this is a solution to our needs that has really delivered for us".
Rachael Hanley-Browne, Resourceful People



"The Virtual Office has been a fantastic find; intelligent staff giving quality service with that personal touch. Doing business here is a joy!"
Christina Griffiths, time 4 change



"The 211 Piccadilly and the Virtual Office concept has certainly helped us when starting up business in the UK. It gave us quick and easy access to a prime location at affordable costs that would simply not have been possible otherwise.

The flexibility of office and meeting space is also very important as we have people over from Stockholm regularly on a project basis over shorter periods of time. The Virtual Office switchboard concept is ideal when you have offices in different places with 'one number reaches all, anywhere'."


Reference:

http://www.voffice.com/

Monday, September 8, 2008

FINAL BLOG POST # 1

Research one company from the Internet and describe their MIS strategic plan in 1-2 paragraphs. Discuss too the impact of this strategic plan on the company's management, competitors, customers and the company as a whole.

Because of increasing popularity of technology now the company of BDO is emerging of new technologies that help BDO to give good services to the consumers and be competitive of other banking institutions. Producing an entity whose value is greater than merely the sum of its parts the merger of banking industry stalwarts Banco de Oro Universal Bank and Equitable PCI Bank gave rise to BDO, which today represents an unparalleled consolidation of the distinct strengths of the merged banks.

Banco de Oro has built a remarkable reputation as a universal bank, providing a wide range of corporate, commercial, retail, and investment banking services in the country. On the other hand, EPCI lays claim to a proven track record in commercial banking, middle market and SME lending, trust, leasing, and remittances. Both have reaped numerous awards from prestigious international publications. And just recently, the merged institution, now the second-largest bank in the country with a vast distribution network of more than 680 branches and over 1,200 ATMs nationwide, was cited as Best Bank in the Philippines for 2007 by Euromoney.

Wednesday, August 20, 2008

MIDTERM BLOG POST # 3

For those who are not working, research one company in the net who is using computerized database systems. Describe the use and/or nature of these systems and describe too the benefits/disadvantages from these systems. Include your reference.

The Bureau internal revenue (BIR) implemented the Tax Computerization Program (TCP) in 1994 to establish an integrated tax system designed to provide a standard processing framework for the Bureau's functions related to tax collection and administration.

Having an integrated tax system supports the Bureau in meeting its goals in increasing revenue collections, improving taxpayer service, promoting better taxpayer compliance, and improving operational efficiency and transparency.


Increased revenue collection through strengthened collection efforts, improved collection programs and enabled collection officers
· Improved taxpayer service through time efficient taxpayer transaction processing, including responding to queries and completion of taxpayer-related services
· Improved taxpayer compliance with automated audit selection case management, income verification and withholding tax reconciliation
· Improved processes with better provision of management information, and reduction of turnaround times to complete activities
· Increased technology literacy of BIR management and personnel based on new and improved processes
· Established information linkages with affiliations with other government agencies, as well as private institutions like banks and insurance companies

DISADVANTAGES:

COMPUTER'S GET COMPUTER CRIMES CAN MANIPULATE DATA

SOME PERSON ARE NOT COMPUTER LITERATE OR HOW TO USE IT

SOME TAX PAYER CAN'T ACCESS TO COMPUTER BECAUSE THEY DIDN'T KNOW HOW TO USE COMPUTERS.


http://www.bir.gov.ph/updates/birprog1.htm

Monday, August 4, 2008

midterm blogpost #2

Research 1 company and describe how they protect their company from internet risks.

Also, research for possible risks or dangers and/or impacts of internet - related crimes to a company.

Yahoo! encourages all thier subscribers to use thier service as long as you abide by the Yahoo! Terms of Service and Yahoo!'s prohibition on spamming and unethical marketing activities. The following are some examples of spamming that may violate the Terms of Service and Yahoo!'s Universal Spam Policy:

  • Manipulating identifiers, such as email headers, to disguise the origin of any content transmitted to or through Yahoo! computer systems.
  • Relaying email from a third party's mail servers without the permission of that third party.
  • Using or causing to be used Yahoo! computer systems to facilitate the transmission of unsolicited or unauthorized material. This includes any promotional materials, URLs, "junk mail," "chain letters," "pyramid schemes," or any other form of unauthorized solicitation that you may upload, post, email, transmit, or otherwise make available.
  • Using "robots" or otherwise harvesting other's email addresses from the Yahoo! site for purposes of sending unsolicited or unauthorized material.
  • Uploading, posting, emailing, or transmitting the same message, URL, or post multiple times.
  • Disrupting the normal flow of dialogue, or causing the screen to "scroll" faster than other users of the service are able to type, or otherwise acting in a manner that negatively affects other users' ability to engage in real-time exchanges.

Certain Yahoo! services may have additional spam guidelines explaining appropriate conduct for those services. Those additional policies are incorporated by reference into the Yahoo! Universal Spam Policy. It is the user's responsibility to check each property's guidelines for additional details regarding spam.

Violations of our Terms of Service or this Universal Spam Policy may result in legal action against you and the termination, without notice, of your Yahoo! ID and/or anything associated with it, including, but not limited to, email accounts, clubs, posts, home pages, and profiles. Nothing in this policy is intended to grant any right to transmit email to or through Yahoo! computer systems. Yahoo! does not waive any rights by the failure to enforce this policy in every instance in which it might apply.

this possible computer crimes is generally defined as any crime accomplished through
special knowledge of computer technology. All that is required is a personal
computer, a modem, and a phone line. Increasing instances of white-collar crime
involve computers as more businesses automate and information becomes an
important asset. Computers are objects of crime when they or their contents are
damaged, as when terrorists attack computer centers with explosives or gasoline,
or when a "computer virus"--a program capable of altering or erasing computer
memory--is introduced into a computer system. As subjects of crime, computers
represent the electronic environment in which frauds are programmed and
executed; an example is the transfer of money balances in accounts to
perpetrators' accounts for withdrawal....





Midterm BLOG POST # 1

Research 1 company that makes use of E-commerce. Describe the nature of this company in 1-2 paragraphs.

Identify then, how does this company use e-commerce to achieve strategic advantage. Describe the benefits derived from this strategy.


It was back in 1990 when Metrobank rode the waves of electronic banking innovation by introducing the country’s first talking ATM machine. Electronic Touch banking or Metrobank E.T. was a name that easily caught the attention of ATM users and Metrobank depositors alike. Henceforth, there was no stopping Metrobank in developing new electronic banking (e-Banking) services to give clients more choices for their diverse banking needs.

"they want to provide clients with innovative and more convenient ways to avail of banking services, said Metrobank president Arthur Ty.

Providing support to the Bank's e-banking services is a strong and sophisticated information technology infrastructure that allows the use of latest technology without compromising security. "there IT investments through the years have enabled us to provide accurate over-the-counter servicing, ATM online availability, and access to our Internet banking facility,”

Monday, July 7, 2008

Blog Question # 6

Research one multinational corporation like Procter and Gamble, Unilever, IBM, Microsoft, Honda and etc. Identify and describe how their subsidiaries are managed and how technology has assisted them in their corporate and/or local operations. Further, identify one Philippine company that has gone worldwide (eg. Jollibee and BENCH) and describe their strategies. Evaluate the strategies of foreign companies with that of Philippine corporations.

The Dole Food Company's worldwide team of growers, packers, processors, shippers and employees is committed to consistently providing safe, high-quality fresh fruit, vegetables, and food products, along with fresh-cut flowers, while protecting the environment in which its products are grown and processed. Dole's dedication to quality is a commitment solidly backed by: comprehensive programs for food safety, scientific crop protection programs, stringent quality control measures, state-of-the-art production and transportation technologies, continuous improvement through research and innovation, and dedication to the safety of our employees, communities and the environment. Dole is committed to nutrition education to communicate to the public the health benefits of eating a diet rich in fruits and vegetables. Dole is a founding member of the National 5 A Day for Better Health Program and is a leader in developing technology-based nutrition education programs for children.Dole supports these goals with a corporate philosophy of adhering to the highest ethical conduct in all its business dealings, treatment of its employees, and social and environmental policies

Tuesday, July 1, 2008

BLOG POST# 5

As a future manager, What is your computer ethics program? Justify each activity.

As a future manager my computer ethics program in my company and as a good user of computer too.let my employees learn my ethical standard of company for example no chatting when working.turn off computer when it is not use,no pirating of software and hardware no surfing of pornographic cites inside the office this are simple regulation but its effective.

1)Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.

2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical.

3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption.

4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it.

5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong.

6) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format.

7) Thou shalt not use other people's computer resources without authorization:user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking Multiuser systems use a system to break and bypass the authorization is unethical.

8) Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.

9) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country's constitution. The discussion, of course, is going on.

10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.

Christian B. Jakosalem


1

Thursday, June 26, 2008

BLOG POST # 4

If you are just a student of RMMC and not currently working, cite a manual procedure here in our school which you prefer to computerize. Describe how this system should function and how can this help the employees and the students of RMMC.

A prefer to computerize in this school much advange technology of ID SYSTEM especially when we time in and time in this school. I introduce some example i hope this technology is implemented in this school i want to change the today ID SYSTEM in this school to not using the their ID in log in i want to use their thumb print as a personal identification each employees in this school because these technology is a really big help because giving accurate information about teacher, faculty and students.

COMMENTS:

I want to prefer to change much improve technology of computer and printer on FINANCE and CASHIER department of this school. Because they using old computer i hope they change that it consumes more time especially on examination day so each students pay for their obligation it causes of long row students waiting for there turn to pay.

Monday, June 23, 2008

Blog post # 3

WIth MIS trends, justify and contradict the statements. Cite examples whenever needed.

1. MIS users are more knowledgeable.
Its important to be knowledgeable in MIS because
the use of this system it improves our skills and knowledge to achieve the organizational objectives.
2. More computing power is available to the user
with the aid of MIS, the users can obtain and use much computing power, that they may use to make their work easier and faster. As a top level management we must know how our work especially employees learn many things about the objective of the company
3. Resistance to the implementation of emerging MIS is subsiding.-
MIS implementation are long term and its resistance is high enough to perform its functions in the firm. it's quite expensive but its very worth it.
4. Connectivity
With the help of MIS company must implement the guidelines of using MIS as a improvement and objective to supply the needs of the company so that our work is worth it.
5. MIS is becoming one of the primary means of increasing productivity.
MIS is one of the primary means of increasing productivity because our marketing analysis and ideas effort will increasing productivity by giving extra effort to achieve the goal of the company and much easier to inform us our improvement.
6. Companies are using MIS as a competitive strategy.-
Most of the companies use MIS as the best competitive strategy because the company can conduct research in their competitors products, systems,practices and strategies. through these, they can have an advantage to their competitors.
7. MIS is becoming integral to the decision-making process.-
In decision making- process, MIS plays an important role. It influences the decisions of managers and businessman, whether tough or ease. With its help, the better and good decisions are implemented and made.
The role of a management information system is to convert data from internal and external sources into information that can be used to aid in making effective decisions for planning, directing and controlling.

8. End user is becoming the focus of MIS activity.
- through all the benefits that the MIS can give, the end user are the most benefited because they are the center of MIS activities.The MIS can be used to gather information from both formal and informal flows of information.

· A formal flow of information is one in which a procedure is adopted, e.g. the downloading of sales figures from several branches first thing on a Monday morning. External data can be collected using specialized data collection agencies such as Dun and Bradstreet who produce economic data for academic and commercial organizations. Formal flows can also come from people working on the same document at several locations, or by use of e-mail, or by use of company intra nets.

· Informal information flows come from chance meetings, reading magazines or newspapers, or watching the news on TV.



The Management and Information Systems Group aims to extend the theory and practice of information systems through the analysis of the social and technical factors that relate to them. We seek to engage with the area at both a strategic and an operational level to create Information Systems that meet the needs of both people and the organizations that use them.
MIS is the study of the interaction between groups of people, collections of machines and sets of procedures that allows the right information to be communicated to the right people at the right time.

The use of computers by people to acquire knowledge or skills. The term encompasses e-learning, distance learning and mobile learning and includes the identification of semantic detail that can lead to intelligent learning support for differing perceptual and cognitive preferences and a variety of learning styles.



CHRISTIAN B. Jakosalem

Wednesday, June 18, 2008

BLOG POST#2

1.HOW CAN THE MANAGERS & EMPLOYEES MAKE USE OF INFORMATION AS A STRATEGIC/COMPETITIVE ADVANTAGES OVER THEIR COMPETITIONS

INSIDE THE ORGANIZATION WE MUST MAKE OUR FULL POTENTIAL AND SKILLS IN USING THE BEST INFORMATION OR DATA WE GET TO HELP OUR ORGANIZATION COMPETITIVE.

informations is one of the most vital resource of a company, informations enable company to gain competitive advantages to other competitors, for example, "latest marketing trends", company can use this kind of information to improved their marketing strategy to gain more market share, this could maximize their sales which can generate more income.

what is MIS

Management Information System (MIS) is a subset of the overall internal controls of a business covering the application of people, documents, technologies, and procedures by management accountants to solving business problems such as costing a product, service or a business-wide strategy. Management Information Systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization.[1] Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making,