Transaction processing system (TPS), an information system (IS) mostly used by managers in operational management to record internal transactions, economic events that occur within an organization and external transactions where the business event took place outside the organization to make operational decision. TPS supports different tasks by setting a set of rules and guidelines that specify the ways to capture or collect, process and store any transaction in a form of data or information. Transaction Process System Activities Processing business transactions was the first application of computer of most firms. Since the 1950s, Transaction processing system (TPS) have evolved from slow, manual systems to advanced computerized system. TPS, a cross-functional information system were among the earliest computerized systems developed to record, process, validate, and store business for future use or retrieval. Transactions are the economic events or exchange between two or more business entities. Basically, TPS is an organized collection Continue reading
Information Systems Basics
Electronic Data Interchange (EDI) Standards and Specifications
Electronic Data Interchange Standards Generally speaking, Electronic Data Interchange (EDI) is considered to be a technical representation of a business conversation between two entities, either internal or external. Note, there is a perception that “EDI” consists of the entire electronic data interchange paradigm, including the transmission, message flow, document format, and software used to interpret the documents. Electronic Data Interchange (EDI) is considered to describe the rigorously standardized format of electronic documents. The Electronic Data Interchange standards were designed to be independent of communication and software technologies. EDI can be transmitted using any methodology agreed to by the sender and recipient. This includes a variety of technologies, including modem (asynchronous, and bisynchronous), FTP, Email, HTTP, AS1, AS2, WebSphere MQ, etc. It is important to differentiate between the EDI documents and the methods for transmitting them. While comparing the bisynchronous protocol 2400 bit/s modems, CLEO devices, and value-added networks used to Continue reading
Information Systems in Various Levels of Modern Organizations
The INFORMATION SYSTEM plays a major role in the organization by satisfying the diverse needs through a variety of systems such as Query systems, Analysis systems, Modeling systems and Decision support systems. It helps the Clerical personnel in transaction processing and answers their queries on data pertaining to transaction. It helps junior management by providing operational data for planning and control, and helps them in Decision-making. It helps the Middle management in short-term planning, target setting and controlling business functions. It helps Top management in goal setting, planning and evolving business plans and their implementation. OPERATIONAL-LEVEL SYSTEMS At the operational level are transactions processing systems through which products are designed, marketed, produced, and delivered. These systems accumulate information in databases that form the foundation for higher-level systems. In today’s leading organizations, the information systems that support various functional units-marketing, finance, production, and human resources-are integrated into what is known as Continue reading
Data Processing Methods
1. Batch Processing. Batch processing is a technique in which data to be processed or programs to be executed are collected into groups to permit convenient, efficient, and serial processing. It is the simplest form of data processing. With this method, data is entered to the information flow in large volumes, or batches. That is, the processing by computer is performed periodically, at specified time intervals (weekly, monthly, etc) when large volumes are accumulated. Daily transactions in a business establishment, for example, may be batch processed on a weekly basis. Instead of being processed periodically when a sufficient volume has been accumulated. Advantages of batch processing are: Economical when a large volume of data must be processed and The most appropriate method for those applications (e.g., payroll) where the delay caused by accumulating data into batches does not reduce the value of the information. Limitations of batch processing are: It Continue reading
Case Study on MIS: Information System in Restaurant
Case Summary: A waiter takes an order at a table, and then enters it online via one of the six terminals located in the restaurant dining room. The order is routed to a printer in the appropriate preparation area: the cold item printer if it is a salad, the hot-item printer if it is a hot sandwich or the bar printer if it is a drink. A customer’s meal check-listing (bill) the items ordered and the respective prices are automatically generated. This ordering system eliminates the old three-carbon-copy guest check system as well as any problems caused by a waiter’s handwriting. When the kitchen runs out of a food item, the cooks send out an ‘out of stock’ message, which will be displayed on the dining room terminals when waiters try to order that item. This gives the waiters faster feedback, enabling them to give better service to the customers. Continue reading
Data Tampering – Meaning, Types and Countermeasures
Tampering means changing or deleting a resource without authorization. A web application is an application that is accessed through a web browser over the internet. Data tampering in web applications simply means a way in which a hacker or a malicious user gets into a web site and changes, deletes or to access unauthorized files. A hacker or malicious user can also tamper indirectly by using a script exploit that is the hacker would get the script to execute by masking it as a user input from a page or as a web link. Tampering is one of the biggest security threats faced by web applications. It is used to change or edit files found in web applications which are usually used by multi-million business corporations across the world. Tampering started in the late 1980’s as a way to sabotage data or plant a malicious or destructive program to delete Continue reading