MIS Final Assessment EIB20203
MIS Final Assessment EIB20203
MIS Final Assessment EIB20203
INSTRUCTIONS TO CANDIDATES
3. All questions must be answered in English (any other language is not allowed).
Question 1
Maybank Berhad has been among the two largest banking service providers in Malaysia. To
stay profiting, they need to overcome the competitive forces that may affect their businesses.
Discuss in detail all the FIVE (5) Competitive Forces.
(20 marks)
The five competitive force is Competitive Rivalry In The Market. The financial
services industry is thought to be very competitive. The excellent return on investment has
drawn more market participants. Maybank's main competitors are Public Bank, CIMB, and
Hong Leong Bank. During the fiscal year 2020, Maybank earned $10.6 billion in revenue and
reported a net income of $5 billion, with an ROE of 7.8% and an excellent profit margin of
14.43%. CIMB recorded annual revenues of $6 billion, a 10.5% decrease year on year,
primarily due to the global pandemic, with a net income of $50.28 billion. Due to the
presence of megabanks, the market is intensely competitive.
Besides that, The Threat Of Substitutes is also one of the competitive forces. The
financial services industry is under enormous pressure from newly minted fintech startups
that leverage technological breakthroughs. However, the hazard is quite mild in the near
future.
The sector has developed over time, but there is still significant room for development in
order to eliminate inefficiencies and raise profitability. Many boring jobs can be automated
with little effort; there is an impending threat from fintech companies, which benefits
technology. However, in comparison to the incumbents' bundle offerings, they solely sell
one-off products. The worldwide fintech business, which is predicted to be worth $305 billion
by 2025, has enormous development potential. Despite the pressure on the business,
incumbents are capitalising on the situation and excelling on the digital front. As a result, the
threat remains low in the immediate future.
Furthermore, The Threat of New Entrants is also the main important Maybank
competitive force. In the industry, the threat is rated as moderate; it is determined by
underlying elements such as the compliance environment, the need for capital, and the
possibility for growth. The financial services business is one of the most strictly regulated in
the world in order to keep the general public secure. As a result, excessive compliance costs
limit profitability and act as a barrier to market participants. Another barrier is the lack of
differentiation in the items offered; it is difficult for a new entrant to gain market share and
penetrate a saturated market. High capital requirements, as well as limited capacity for
difference and innovation, are inescapable barriers for new entrants. Established incumbents
with a significant market share also discourage new entrants. Therefore, the threat remains
low in the short term.
In addition, The Bargaining Power Of Suppliers. Suppliers in the financial services
business have moderate bargaining strength. When there is a threat of forward integration,
suppliers congregate and supply becomes specialised. However, the danger of forward
integration is limited because suppliers cannot enter the business quickly. Risk is weighted
according to the importance of suppliers, and financial experts have little bargaining power
because they are many while vaccinations are scarce. Institutional investors inject large
sums of money into the business, but only under rigorous conditions and at a high rate of
return; additionally, they have other possibilities for investing. They are conscious of their
importance, which results in more bargaining power. When suppliers understand their value,
they have more bargaining power. Therefore, suppliers have moderate to high bargaining
power.
Question 2
To start a new organization, it is common for companies to urgently set up a new department
that will run day-to-day business organization activities. Discuss FIVE (5) departmental
Information Systems that is crucial for company expansion.
(20
Marks)
Five departmental Information Systems that are crucial for company expansion are
Transaction Processing Systems. Transaction processing systems (TPS) handle data
collection, storage, processing, and output for a company's fundamental operations. TPS
information systems gather data from user inputs and generate outputs based on the
information gathered. one online plane ticket booking system is one example of a TPS
system.
In such a system, travellers enter their flight itinerary and preferred seats (the input), and the
system refreshes the list of available seats, deleting those chosen by the traveller (the
processing). The system then generates a bill as well as a duplicate of the ticket (the output).
TPS information systems, which can be based on real-time or batch processing, can assist
business managers in meeting demand without the need for extra staff.
Secondly, Management Information System. Managers and owners of small
businesses rely on an industry-specific management information system, or MIS, to obtain
current and historical operational performance data, such as sales and inventory data. The
MIS can generate scheduled reports on a regular basis, which corporate management can
use in strategic, tactical, and operational planning and operations. An MIS report, for
example, could be a pie chart that shows product sales volume by territory or a graph that
shows the percentage growth or reduction in a product's sales over time. Small business
owners and managers rely on MIS to conduct ad hoc "what-if" studies. For example, a
manager may utilise the system to calculate the impact on delivery schedules if monthly
sales double.
Besides that, The Decision Support System. A decision-support system, or DSS,
enables small-business owners and managers to employ predefined or ad hoc reports to
assist with operations planning and problem-solving decisions. Users utilise DSS to get
answers to specific questions in order to assess the potential impact of a choice before it is
implemented. A data summary report, such as a product revenue by quarter sales report,
may be used to respond to enquiries. Business owners and managers conduct an analysis
by using an interface - a dashboard - to select a specific graphic depiction of a key
performance indicator that gauges progress towards attaining a specified goal. A
manufacturing dashboard, for example, might show a visual reflecting the number of
products made on a specific line.
Furthermore, The Executive Support System. The executive support system, or
ESS, is a collection of preconfigured reports that assist small-business owners and
managers in identifying long-term patterns to aid in strategic planning and nonroutine
decision-making. System users can examine individual preconfigured reports and graphs
based on companywide and functional department data, such as sales, scheduling, and cost
accounting, by clicking on any icon presented on the ESS screen and entering report criteria.
The ESS reports provide information to the business manager or owner on a certain topic,
such as market trends and buyer preferences. Based on current data, the ESS system also
provides analysis capabilities for predicting outcomes, assessing performance, and
calculating statistics.
Lastly, The Knowledge Work System. An organisation may use various knowledge
management systems to ensure a continual flow of fresh and updated knowledge into the company
and its activities. A knowledge work system (KWS) is a type of knowledge management system that
EIB 20203_MANAGEMENT INFORMATION SYSTEM Page PAGE 3 of
NUMPAGES 3
20 JANUARY 2023 CONFIDENTIAL
facilitates the incorporation of new information or knowledge into corporate processes. Furthermore,
KWS provides assistance and resources for a variety of knowledge generation methodologies,
artificial intelligence applications, and group collaboration platforms for knowledge sharing, among
other things. It also uses images, pictures, and other forms of media to deliver new information. Some
of the applications that work on the key concepts of KWS such like Designers often use computer-
aided design systems (CAD) to automate their design process.
Question 3
Data security is very crucial in data management. Database administrator must aware the
threat that may affect the data as well as the information. Explain FIVE (5) categories of
threats normally faced by the user.
(20 marks)
Five categories of threats normally faced by the user are Insider Threats. Insider threats
occur when someone closes to a company who has authorised access to its network
purposefully or accidentally misuses that access to harm the company's essential data or
systems. Insider dangers are created by careless employees who do not follow their
organisations' business rules and procedures. They may, for example, mistakenly provide
customer data to other parties, click on phishing links in emails, or share their login
credentials with others. Other insider dangers come from contractors, business partners, and
third-party vendors. Some insiders willfully circumvent security measures for the sake of
convenience or in an ill-conceived attempt to become more productive. Malicious insiders
deliberately circumvent cybersecurity protocols in order to erase data, steal data for later
sale or exploit, disrupt operations, or otherwise harm the firm.
Besides that, Viruses and Worms. Viruses and worms are harmful software programmes
(malware) that are designed to destroy a company's systems, data, and network. A
computer virus is a piece of harmful code that copies itself to another programme, system, or
host file. It remains dormant until it is activated, either intentionally or unintentionally,
spreading the infection without the knowledge or approval of a user or system administrator.
A computer worm is a self-replicating programme that spreads without the need for a host
programme or human involvement. Its primary function is to spread the infection to other
computers while remaining active on the afflicted system. Worms frequently spread through
automatic and unnoticed portions of an operating system. When a worm enters a system, it
immediately begins replicating itself, infecting unprotected systems and networks.
Lastly, Phishing Attacks. Phishing attacks are a type of information security threat that
uses social engineering to trick users into violating normal security practises and disclosing
sensitive information such as names, addresses, login credentials, Social Security numbers,
credit card information, and other financial information. Most of the time, hackers send out
bogus emails that appear to be from reputable sources such as financial institutions, eBay,
PayPal, and even friends and coworkers. In phishing attacks, hackers seek to persuade
users to perform a certain action, such as clicking on links in emails that direct them to
bogus websites that request personal information or install malware on their computers.
Opening attachments in emails can also install malware on users' computers, which is aimed
to collect sensitive information, sending emails to contacts, or enabling remote access to
their machines.
Question 4
corporation may face is failing to fix such vulnerabilities once they've been detected.
It's all too usual for a company or even individual network user to ignore "update
available" notifications that appear in some programmes because they don't want to
sacrifice the 5-10 minutes of productive time that running the update would need.
Most users find updating to be inconvenient. However, it is a "nuisance" that might
save a company a lot of time, money, and lost revenue in the long run. The simple
solution is to keep a regular update schedule—a day of the week when your IT staff
checks for the newest security patches for your company's software and ensures
that they are applied to all of your company's systems.
Lastly, Automated Running of Scripts without Malware Or Virus Checks. One frequent
network security vulnerability that some attackers have learnt to exploit is the tendency of
certain web browsers (such as Safari) to launch "trusted" or "safe" scripts automatically.
Cybercriminals might enable the browser software to run malware without the user's
knowledge or input by impersonating a trusted piece of code and deceiving the browser—
who, in many cases, would not know how to stop this "feature." While preventing employees
from visiting malicious websites is a good start, blocking the automated running of "safe"
files is far more reliable and required for compliance with the Centre for Internet Security's
(CIS') guidelines.
Question 5
(a) What are the challenges of managing IT infrastructure and management solutions?
(10 marks)
the challenges of managing IT infrastructure and management solutions:
1) Making IT objectives business priorities
IT, like many other departments, can find it challenging to prioritise its goals for the
greater good. Whether you need more investment or are fighting to keep particular
components of your department in-house, one of the most difficult - and oldest -
concerns are proving your worth to decision-makers.
This can be accomplished by describing your department's overall goals and how you
have met them. If you have been unable to meet all of your targets, you must explain
why and propose a strategy for doing so in the coming quarter.
2) Pricing vs. the environment
Reliability has been a major concern in IT management from the dawn of technology as
we know it. Service Level Agreements (SLAs) are utilised when a portion of the facility is
outsourced, but even if everything is kept in-house, having an equivalent to assure a
high degree of IT service is prudent.
This is directly related to customer satisfaction (CSAT), since any disruption in service
caused by infrastructure might result in dissatisfied customers who will look to move their
business elsewhere. Ensure that your organisation conducts regular surveys to better
understand your clients' IT needs and pain issues.
4) The lack of powerful computing platforms
Increased IT infrastructure increases the risk of cyberattacks and security breaches, but
such risks should not deter your organisation. According to a poll conducted by
International Data Corporation (IDC), 80% of chief information security officers (CISOs)
failed to identify instances of excessive access to confidential data within their cloud
environments.
(b) Explain FIVE (5) unique features of e-commerce, digital markets and digital goods?
(10 marks)
1. Ubiquity
E-commerce is widespread, that is, it is available everywhere always. It sets the free
market from being restricted to a physical space and makes it possible to shop from a
computer (such as a desktop, or laptop). The result is called a market space.
For consumers, ubiquity cuts transaction costs for exploring products in a market.
Consumers can acquire any information whenever and wherever they want, regardless
of their location. It is no longer necessary that buyers to spend time and money
travelling to a market. In all, it saves the cognitive energy needed to transact in a
market space.
2. Global reach
When compared to traditional commerce, e-commerce technologies allow a business
to effortlessly reach across geographic barriers all over the world. Companies all
around the world are increasing their earnings and business results by expanding their
operations using e-commerce solutions. As a result, the potential market size for
online merchants is about equivalent to the size of the online population.
3. Universal standards
Universal norms are norms that all nations across the world adhere to. These are
Internet technical standards for conducting e-commerce. It allows everyone to connect
at the same "level" and creates network externalities that benefit everyone. Universal
technical standards reduce entry and search expenses.
4. Interactivity
E-commerce technology allows for two-way contact between buyers and sellers,
making it interactive. It demonstrates a considerable advantage of e-commerce
technology over commercial traditional technologies of the twentieth century.
5. Information density
The overall volume and quality of information available to all market buyers and
sellers via the Internet is referred to as information density. The Internet significantly
enhances information density. Consumers and retailers benefit from more information
density. E-commerce technologies improve information accuracy and timeliness. For
example, the flipkart.com store offers a wide range of products and pricing.