Chapter 11: Information System

Pengalaman menggunakan MIS


Pengalaman semasa menjalani latihan industri (Politeknik) selama 6 bulan di Lembaga Koko Malaysia.

 Sistem ini adalah penting memandangkan sistem maklumat pasaran adalah berhubung rapat dengan sistem pengurusan, prosedur untuk membuat keputusan, analisa maklumat perdagangan, pengendalian terhadap kaedah-kaedah dan data-data kajian pasaran, risiko pasaran dan sebagainya.

             Sistem ini boleh digunakan sebagai sistem pemprosesan data untuk kawalan pengurusan dan membuat keputusan dalam penentuan dasar dan strategi pembangunan industri dan program-program pembangunan pasaran. Sistem ini termasuklah pengumpulan data dan maklumat asas industri dan pasaran dalam negara dan juga peringkat antarabangsa di mana sistem ini terdapat dua bahagian iaitu maklumat koko tempatan dan maklumat koko antarabangsa atau dunia.


Maklumat pasaran koko terbahagi kepada:


1. Perangkaan asas koko                                                                                                                        - Perangkaan asas koko yang akan dikumpul dan dikendalikan termasuklah data-data keluasan, pengeluaran, pengisaran, harga dan gunatenaga. Sebahagian besar dari perangkaan-perangkaan ini akan melibatkan pengumpulan data-data primer dan perlu dikemaskinikan dari masa ke semasa.                 

2. Perangkaan import eksport                                                                                                   
Maklumat-maklumat ini meliputi negara-negara yang mengimport dan mengeksport koko dan produk-produk koko termasuk destinasi eksport, sumber import, kuantiti dan nilai (RM). Data ini akan dikemaskinikan setiap bulan bergantung kepada penerimaan maklumat daripada Jabatan Perangkaan Malaysia.

3.Tariff                                                                                                                                     
- Maklumat ini merangkumi tarif untuk koko dan produk-produk koko, bahan-bahan lain seperti gula, garam, susu, buah-buahan, tepung dan minyak dan juga bahan-bahan pembungkus. Maklumat mengenai tarif air dan elektrik juga akan dikumpul.                                                                               

4. Spesifikasi produk                                                                                                                   -Maklumat ini akan memasukkan spesifikasi mengenai biji koko, lemak dan serbuk koko.

5. Profil industri koko malaysia                                                                                                          -Aktiviti-aktiviti ini akan mengumpulkan dan menguruskan maklumat-maklumat utama industri koko Malaysia serta profail syarikat-syarikat pengeluar, pengeksport, pengisar dan pengilang coklat di Malaysia. Ini termasuk maklumat-maklumat asas syarikat, data pengeluaran, pemasaran dan perdagangan.

6. Insentif                                                                                                                                   
 -Aktiviti ini akan mengumpulkan maklumat-maklumat berkaitan dengan insentif yang disediakan untuk industri koko.

7. Profil perkapalan                                                                                                           
-Maklumat yang dikumpul termasuklah profail syarikat-syarikat perkapalan yang menghantar koko ke luar negara dan juga pelabuhan tempatan. 

8. Kadar pertukaran mata wang                                                                                                                   -Aktiviti ini akan mengumpulkan maklumat mengenai kadar pertukaran matawang Sterling Pound, US$, Deutsche Marks dan Yen Jepun.

9. Input                                                                                                                                               -Aktiviti ini pula akan mengumpulkan maklumat mengenai syarikat-syarikat yang membekal, menjual baja, racun dan juga mesin yang digunakan dalam industri koko.

10. Pertanyaan perdagangan                                                                                                               -Maklumat ini merangkumi pertanyaan luar negara yang berkaitan dengan industri koko Malaysia.


Maklumat koko antarabangsa / dunia

       1. Perangkaan Dunia


Maklumat yang akan dimasukkan adalah perangkaan mengenai keluasan, pengeluaran, pengisaran, anggaran kedudukan harga koko dunia dan perdagangan luar 

      2.   Profil Negara Pengeluar dan Pengguna


Berdasarkan kepada maklumat-maklumat dari negara-negara pengeluar maka ia akan membolehkan analisa perbandingan dijalankan bagi mengukur kedudukan dan tahap kemajuan industri koko di kalangan berbagai negara serta kemampuan dan dayasaing. Malaysia sebagai pengeluar koko berbanding negara-negara lain samada dari segi kos, pengurusan, kuantiti dan kualiti hasil pengeluaran, kemajuan teknologi dan pengetahuan teknikal atau penemuan-penemuan baru dalam industri koko.

Sementara maklumat-maklumat negara pengguna akan membolehkan analisa dijalankan bagi menetahui kedudukan syer Malaysia di pasaran-pasaran berkenaan, pesaing-pesaing Malaysia serta petunjuk-petunjuk pasaran yang akan membantu untuk merangka strategi bagi meluaskan lagi pasaran dan mengukuhkan kedudukan Malaysia.

Data yang dikumpul termasuklah latar belakang, perangkaan koko, input duti, perdagangan koko, profail industri, spesifikasi produk, harga dan organisasi pertubuhan.

Projek-projek yang akan dilaksanakan akan menumpukan negara-negara pengeluar dan pengguna koko Malaysia yang utama.


        3.  Standard Koko Antarabangsa
Maklumat ini merangkumi standard koko yang digunakan di pasaran antarabangsa.

Selalunya data akan dikumpul daripada kajian, surat menyurat, dan pelbagai bahan-bahan terbitan.  Data-data dan maklumat-maklumat diformatkan mengikut keperluan samada dalam bentuk jadual, graf atau ringkasan laporan. Ia juga boleh membuat analisa kuantitatif dalam bentuk jadual dan ramalan. Laporan-laporan dari sistem ini juga boleh digunakan dalam menyediakan garis panduan pelaburan dan pengeluaran laporan atau terbitan bersiri.





Read Users' Comments (0)

Chapter 11: Information System



Information system is a computer based information system that collect and use the data for organization present or future activities. There are 4 types of information systems that common use in an organization.




1. Transaction Processing System (TPS)



THE TRANSACTION PROCESSING SYSTEM

  • system that collect, store the  transaction data and process it.
  •  this system will record daily transaction and process it real time or collect the data for certain period of time then only process it in batch.
  • the most common  example real time transaction processing for that happen in our life is Automated Teller Machine (ATM) transaction. 
  • when we take money from ATM, directly the bank will record our transaction and then deduct the amount of money in our accounts. 
  • the batch processing is doing by bank when it want to generate report of cash in or out  in a certain week or certain month.
  • this process is hide from public like you and me.
  • this system only record the transaction information and is a basic for an organization and this information will help in decision making by higher management in an organization.

2. Management Information System (MIS)



  • this system will summarize all the data from Transaction Processing System.
3. Decision Support System (DSS)

  • is a tool for analyzing data and help in decision making by providing useful data for a manager in organization.


4. Executive Support System (ESS)/ Executive Information System (EIS)

  • as we know, executive is a high position in an organization and is a busy person.
  • normally this system is use for executive and will present a report in graphic form.
  • this will easier the executive to read the report by just viewing the graphic such as bar chart, pie chart that show the percentage in report but not full with text.                         


Example for Executive Support System (ESS)

  • So popular, expanded to managers, analysts and other knowledge workers
  • E.g., Firms with an EIS designed to maintain managers' "mental models" were less effective than firms with an EIS designed to build or enhance managers' knowledge (Vandenbosch and Huff (1992).













Read Users' Comments (1)comments

Chapter 10: Privacy and Security

Nowadays, privacy and security are become important issues on the Web. This is because of increased of internet crime...


PRIVACY
- Privacy is a status where an individual can work on his/her information in seclusion, resulting in a selective revelation of one's identity and information. 


- The definitions of privacy can differ across individuals and cultures. The invasion of privacy can be avoided by the issue of privacy laws. 


- Internet, which hosts an enormous information base, has given rise to the concept of information privacy.  Unauthorized access to the information is undesirable.


- Internet privacy is the control one has over what information about oneself, the person wishes to disclose. Internet privacy deals with controlling the access to information over the Internet.


the links below are some recent privacy issues: 


Private Network

- Snoopware is a software basically software for spying on someone on a computer. Snoopers typically record actions and events on a computer and then save this information in a file.
- If a snooper is installed, virtually everything that happens on the computer is being watched by someone else. 
- Snoopers are usually installed on the computer by a system administrator, a boss, a spouse, a lover, a co-worker, a competitor and others.
- Many snoopers are very careful to be invisible to computer users, so most users would have no idea if a snooper was installed.


SECURITY
i) Computer Crime

Malicious Programs



  • virus
- A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).


- Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. 



  • worms
- A worm is a small piece of software that uses computer network and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

- Examples of worms are the MS-Blaster and Sasser worms.

- Worm can destroying important files in user's system, causing some programs to stop working.

- Avoid computer worm by keeping antivirus up-to-date and installing patches provided by operating system and application vendors. 


The key difference between a virus and worm is the manner in which it reproduces and spreads. A virus is dependent upon the host file or boot sector, and the transfer of files between computers to spread, whereas a computer worm can execute completely independently and spread on its own accord through network connections.





  • trojan horse 
- A Trojan horse is simply a computer program. The program claims to do one thing but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. 

- Can spread through: a) email attachments
                                      b) chat software such as Yahoo Messenger and Skype

- There are many types of trojan:
a) Remote Access Trojans
b) Password Sending Trojans
c) Key Loggers
d) Destructive Trojans
e) Denialof Service (DoS) Trojans
 f) Proxy/ Wingate Trojans
g) FTP Trojans

Details explanation of each types of trojan can refer to: http://www.tech-faq.com/trojan-virus.html



  • E-mail viruses 
-  An e-mail virus travels as an attachment to e-mail message, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of user's e-mail software.



Video about how to protect PC against malware:


  

Internet Scams

- refers to the use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.
- can occur in chat rooms, email, message boards or on websites.

- few example of internet scams:

  • business opportunities scams
  • chain letters
  • free goods
  • vacation prize promotion

- how to avoid internet scams:
  • always use common sense
  • don't respond to bulk emails
  • always ask for references and check them carefully
  • make sure the company has a phone number and physical address
  • always make sure that you get a strong guarantee
  • pay by credit card
  • avoid falling for high pressure sales tactics
  • don't respond to bulk emails
  • always print a hard copy of any on-line offer that you're considering
  • don't participate in a pyramid scheme
  • if you're told that you have won a prize, be skeptical
  • beware of promoters who try to sell things using an anonymous email address such as non1234@anon.company.com,user@domain.com or post office box



The explanation of each scam and more example of scams can refer to: http://www.mycert.org.my/en/resources/fraud/main/main/detail/515/index.html

Theft
  • data Theft
- an individual that copy or take business or others' information without authorize
Commonly, this information is user information such as passwords, credit card information, other personal information, or other confidential corporate information

- because this information is illegally obtained, when the individual who stole this information is apprehended, it is likely he or she will be prosecuted to the fullest extent of the law

  • hardware or software theft
a)  hardware theft is an individual that stole computer equipments. Some tips to prevent hardware theft include:

   - Use physical access controls, such as locked doors, and windows

   - Use cables to lock the equipment to desk, cabinet, or floor

   - Install alarm systems for additional security

   - Never leave a notebook or handheld unattended in a public place

   - Use password, possessed objects, and biometrics as a method of security

   - Back up all the files stored on the computer regularly
b) Software theft is unauthorized duplication and/or use of computer softwareThis usually means unauthorized copying, either by individuals for use by themselves or their friends or by companies who then sell the illegal copies to users

  • computer time theft
- means that a user uses  a PC to commit a crime. For example, using someone's PC to hack into another PC. 

- or simply using their PC to upload illegal content.


Data Manipulation
 
ii) Hazards

  • natural hazards (floods, fires, earthquakes, hurricanes, tsunami)
  • civil strife and terrorism (wars, terrorist act)
  • technological failures (hard disk crashed)
  • human errors (do not install the antivirus software on PC, set password that with lower strength)


Measures to protect computer security


1. Restricting access
- is a way to limit who can access to the data or using particular equipment. Way to limit can done with:

  • Biometric scanners
- Consists of automated methods of recognizing a person based on unique physical characteristic. 

- Each type of biometric system, while different in application, contains at least one similarity: the biometric must be based upon a distinguishable human attribute such as a person's fingerprint, iris, voice pattern or even facial pattern.

- Biometrics is a very promising field of research. Finding new and foolproof ways of identification is becoming more and more valuable in the current age where identity theft is commonplace. 

i) fingerprint scanners

-  provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.
- Standard systems are comprised of a sensor for scanning a fingerprint and aprocessor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a person's name or account. In instances of security the match is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access.



Video about how secure USB thumb drive with fingerprint scanner work:  http://www.youtube.com/watch?v=qVfddmIj_zU

ii) Iris (eye) scanners
 - Iris scanning has the lowest false-accept rate of all biometrics, and unlike fingerprints, the iris does not change over time. All of this would lead one to believe that iris scanning technology will be more widely adopted over the next ten years over other biometrics. 



  • Passwords
 is a secret word or string of  characters that is used for authentication, to prove identity or gain access to a resource (example: type a password to login Facebok). The password should be kept secret from those not allowed access.
 
  • Firewalls
- firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.






2. Encrypting data
- encrypting data means converting data  to a format that cannot be read by other people. A encryption key is added to data that you choose to encrypt. This key is needed to read the data. 

3. Anticipating disasters
- get prepare before disasters by make sure physical security and data security through disasters recovery plan.

4. Preventing data loss

- save important data in secondary storage device to prevent it losing.




Ethics


1. Computer ethics
Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers.
- Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.


2. Copyright
- set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. 


3. Software piracy
 Most retail programs are licensed for use at just one computer site or for use by only one user at any time. By buying the software, user become a licensed user rather than an owner.


- Users are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.
- Software piracy is all but impossible to stop, although software companies are launching more and more lawsuits against major infractors. Originally, software companies tried to stop software piracy by copy-protecting their software.
- This strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most software now requires some sort of registration, which may discourage would-be pirates, but doesn't really stop software piracy.


4. Plagiarism
- Plagiarism is when you use someone else's words or ideas and pass them off as your own.





Read Users' Comments (0)