Share
Explore BrainMass

Management Information Systems

Management information systems provide information that organizations need to manage themselves efficiently and effectively¹. Typically computer systems manage five components: hardware, software, data, procedures, and people. Management systems are different from information systems in that they are used to analyze strategic and operational activities. Academically, management information systems are used to refer to the study of how individuals, groups, and organizations evaluate, design, implement, manage, and utilize systems to generate information to improve efficiency and effectiveness².

Overall, a management information system gives business managers information to make decisions. Originally, business computers were used for simple operations; these included inventory, billing, sales, and payroll (3). Over time, the computer systems expanded and became more complex. The modern definition of management information systems includes: decision support systems, resource management, enterprise resource planning, supply chain management, and database retrieval application.

Kenneth and Jane Laudon identify five eras of MIS evolution that correspond to the five phases in the development of computing technology (4):

The first era is known as the mainframe and minicomputer-computing era. Originally, IBM dominated this era. Computers would usually take up an entire room. As the computers became more advanced they became less expensive and more accessible.

The second era is known as the personal computer era. The second era began in 1965 as computer power began to decentralize from data centers to smaller offices. This phase set the background for the upcoming Internet boom.

The third era is known as the client/server network era. This is the era where computers began to be attached on a common network where information is shared between the computers. This allowed thousands and millions of people to access the Internet and data at the same time.

The fourth era is known as the enterprise-computing era. High-speed networks that allowed access to information and management structure characterized this era.

The final era is called the cloud-computing era. This is the newest phase of management information systems and employs network technology to deliver applications and access to storage. Cellphone and Wi-Fi networks have led to even more mobility where managers can access MIS with any devices.

 

References:
1.   (May 1995). Management Information Systems. Retrieved from http://www.occ.gov/publications/publications-by-type/comptrollers-handbook/mis.pdf
2.   O’Brien, J (1999). Management Information Systems – Managing Information Technology in the Internetworked Enterprise. Boston: Irwin McGraw-Hill.
3.   Lucey, Terry (2005). Management Information Systems. London: Thomson. p. 336.
4.   Laudon, Kenneth C.; Laudon, Jane P. (2009). Management Information Systems: Managing the Digital Firm (11 ed.). Prentice Hall/CourseSmart. p. 164.

Categories within Management Information Systems

Enterprise Resource Planning

Postings: 200

Enterprise resource planning is a process where a manufacturer manages and integrates the important parts of a business.

Marketing Information Systems

Postings: 53

A marketing information system analyzes and assesses marketing information from sources inside and outside the organization.

Supply Chain Management

Postings: 468

Supply chain management will attempt to centrally control of link the production, shipment, and distribution of a product.

Customer Relationship Management

Postings: 62

Customer relationship management manages the principles, practices, and guidelines that an organization follows when interacting with its customers.

Knowledge Management

Postings: 51

Strategies and processes designed to identify, capture, structure, value, leverage, and share an organization’s intellectual assets to enhance its performance and competitiveness.

Informatics and Security

Postings: 59

Informatics and security is the practice of defending information from unauthorized access, use, and disclosure.

Qualitative and Quantitative Designs

Qualitative or quantitative designs are used in Applied Degrees such as the Doctorate of Business Administration (DBA). In an APA style document with citations compare and contrast the expectations for each approach be it qualitative or quantitative for an Applied Degree. Please send me a message if you don't fully understa

Open access portals

Open access portals have become popular where researchers may find scholarly literature at no cost. To better understand this resource, access a minimum of five (5) virtual open access journals in the area of database administration and management via the Internet. In a paper, address the following: 1. Evaluate the scope of a

Information Technology Strategy

1. What four factors must be in place for IT strategy development to be successful? Explain how these four factors contributed to the success of a company. (300 words) 2. As the IT manager, you have been tasked with convincing your company's CEO that the time has come purchase a new operating system and the latest office to

Innovative Technology

Reflect on what your background is with innovation technology. List three things that have the average business manager in the last five to ten years and what we do differently now because of these changes. Why should we learn about information technology? It is said that networked computing and the Web change the way we live

Systems Decision Making

Handing over decision making abilities to systems has its advantages and disadvantages. How may systems decision making benefit a company? What can go wrong? Outsourcing?

The Advantages and Disadvantages of Electronic Tendering

The prospect of electronic tenders is both promising and frightening. From your own personal perspective, what would be the benefits and possible disadvantages this has for you? What will need to happen to make people feel comfortable and secure when using electronic tenders?

Data Archive

1) Key activity and tasks list for the following a. Archive data from production based on thresholds to target archive repository b. Retrieve data from archive repository and release for consumption c. Purge data from a repository Please use the following template Srl No | Activity / Task | Milestone

SAP 2014: Reaching for the Cloud

Case Review Case # 9-614-052 SAP 2014: Reaching for the Cloud by Karim R. Kakhani, Marco Iansiti, and Noah Fisher 1) What is the business environment that SAP finds itself in at the beginning of the case? What changes must it make to its business model? Why must it make those changes? 2) What efficiencies for SAP are of

Credit Reporting

Q1 Describe the services provided by a credit reporting service such as Experian, Equifax, and TransUnion. How are these services provided? Q2 In the United States, information that a company collects about the customer is legally the company's property. In the European Union, this information is the individual's property.

Accounting Information Systems

Come up with three concrete recommendations for improving accounting/payroll information system. Make sure you do not just identify the problems, but that you also make very specific recommendations for how you would correct those problems. make sure you come up with three original, concrete recommendations for improving your s

Coca-Cola: Knowledge Management, IT and Competitive Advantage

Identifying the key components of information systems management. Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute. Then, select three out of the six questions below, and provide deta

Global IS Management Challenges

1) What are some of the global IS management challenges that face IS leaders today? 2) Why is it important for an organization to have an information security policy? 3) What practices help ensure that the costs of providing an IT service are aligned with the needs of business managers? 4) What is the role of a chief

The Information Systems (IS)

1) Describe the major functions of the IS department. 2) Describe any four rights of users of information systems. 3) Explain the term virus and explain the differences between Trojan horses and worms. Support your answers with examples. 4) Explain how organizations should respond to security incidents. Provide an exa

State's department of motor vehicles (DMV)

You are an employee of your state's department of motor vehicles (DMV). The people of your community come in to receive services related to driver's licenses, driver's tests, vehicle registration, personalized license plates, and so forth. The average wait time for each person is 45 to 60 minutes. As a result, complaints are com

Data Warehouse and Data Mart

Please help me with at least 200 words discussing the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data.

Social Media Crisis and Reporting Applications

1) How should organizations respond to social networking problems? Which one of them is a dangerous approach, and why? 2) What is a reporting application? Name five basic reporting operations.

Comparing and Contrasting two Off-the-Shelf Software Packages

Create a 7- to 10-slide presentation comparing and contrasting two major off-the-shelf software packages that could be implemented in an organization. Identify which functionality would be likely to be used as-is, and highlight what may need to be added or modified. Briefly describe what issues you may be likely to face in the

Business-to-business (B2B), Business-to-consumer (B2C)

1. Define and contrast the following pairs of terms: dot-com and bricks-and-clicks; intranet and extranet; B2C and B2B. 2. Define the term business process reengineering, and describe its importance to information systems work. 3. What are some of the potential benefits of B2B applications that use the Internet? 4. What are

Transition from Salesperson to Manager

After reading "A New Manager at USA Hospital Supply" (below), respond to the following questions. 1.How will Charlie's approach to quality and service affect his company's performance? 2.Which of the basic functions of management has Charlie considered? How well is he preparing to carry out these functions? 3.Which manageme

Providing information to a state or local government & entity

Write a reflection of no less than 700 words of an experience obtaining a service or providing information to a state or local government entity using information technology. Identify the experience. Assess the efficiency of the technology used. Assume the state or local government entity added mobile access applications to t

Mobile Systems, DBMS, ERP, and Information Silos

1) Why are mobile systems important? 2) Describe a DBMS and its functions. List, at minimum, three of the popular DBMS products and give a brief description of each. 3) Explain what is meant by ERP and explain the primary purpose of an ERP system. Use examples to support your answer. 4) Explain what an information silo is

Software as a Service (SaaS).

The current trend in many organizations is to use software service providers, also known as Software as a Service (SaaS). Is this a trend that should continue? What people, organization and technology factors should be considered when making this decision?

IT Systems Contracts and Couplings

1. Why is the service contract a permissible focal point for coupling in a service? What characteristics of the service contract will allow the service to evolve even when loosely coupled to logic and to customers? 2. Explain the type of coupling (and hence dependencies) that can be expected for task services, utility services,

Initial Investment in using a SOA Solution

Explain why the initial investment in using a SOA solution requires a high level of adoption to be worthwhile. What are the limitations of using SOA for short term software solutions instead of as a long-term commitment? Explain why reliance on legacy systems will limit the ability of an organization to adopt SOA on a large scal