Beruflich Dokumente
Kultur Dokumente
BA 41
Submitted by:
Rheavelle P. Adina
Wendelyn C. Bayangos
Karen M. Valenciano
Submitted to:
Instructor
DSS are used to provide support to analysts and decision makers within an
organization that are relevant to a specific problem or situation and make an
evaluation of various different outcomes. They are used by managers and other
decision-makers in both unstructured and semi-structured situations and
largely in ad-hoc situations although it may involve repetitive decisions.
Structured decisions, or programmable tasks, can be automated because a well-
defined standard operating procedure exists for these types of decisions.
Semistructured decisions include a structured aspect that benefits from
information retrieval analytical models, and information systems technology.
Unstructured decisions are typically one-time decisions, with no standard
operating procedure pertaining to them. A DSS is used in situations where
individual managerial judgment is required.
While an MIS simply gathers data, a DSS manipulates that data and helps to
develop tools that aid in the decision-making process (Management Veristy).
Reporter 2: Rheavelle P. Adina
C. COMPONENTS OF DSS
1. Data Management Component
The data management component performs the function of storing and
maintaining the information that you want your Decision Support System to
use. The data management component, therefore, consists of both the
Decision Support System information and the Decision Support System
database management system. (mis2, PAGE
The model management system stores and maintains the Decision Support
System’s models. Its function of managing models is similar to that of a
database management system. The model management component can not
select the best model for you to use for a particular problem that requires your
expertise but it can help you create and manipulate models quickly and
easily.
Ravi stated that there are four alternative and these are:
Decision Room:
Participants at the meeting sit around a large horseshoe desk facing one end of the
room. There are several of these desks tiered in such a way that no one’s view is
impaired.
Each participant is equipped with his or her own display monitor and terminal. At the
front of the room, facing the participants, are two large public screens. These screens
can display any information from internal or external databases, ideas generated by the
group or any individual’s monitor screen. A ‘Facilitator’ who sits to the side of the public
screen guides most meetings conducted in this environment.
The facilitator’s role is not to participate in the decision-making but to ensure that the
meeting progresses smoothly according to some agreed procedure. Thus, the facilitator
will have his own personal monitor and terminal: through these he can view and to a
certain extent control other participants’ monitors and the information displayed on
them. Although most communication between participants will be done through their
terminals and monitors, the facilitator may communicate with the whole group verbally.
At his disposal are two large whiteboards on which he can write. These whiteboards are
also huge photocopiers that can record everything written on them and produce hard
copy at the end of the meeting. Telecommunications tend to be of a highly sophisticated
kind. For a major multinational it will allow the company to call up information from
databases and analytical models from around the world. The setting is one of deep pile
carpets, soft lighting and monitors that are sunk into quality mahogany desks.
Surrounding this room will be other smaller rooms called ‘Breakaway Rooms’ which
may be used for smaller face-to-face discussions. These meetings clearly occur at the
same time and at the same place.
This is probably the cheapest and simplest type of GDSS based around a Local Area
Network (LAN). Although participants sit separated from one another physically, the
distances involved are so small that they may be regarded as being in the same place.
Each has his or her own personal workstation. They have access to a wide variety of
information sources, both private and public. There is specialised equipment, such as
optical scanners for document imaging, and specialised software, for example: email
and workflow management programs. The latter allow scanned documents to be sent
around a network.
These documents can be viewed and perhaps altered by those on the network. The
program can let the originator of the document know the stage in the process the
document has reached, and who has dealt with it. Thus participants can easily
communicate with one another and share information or else work privately on their own
personal matters.
Participants in this type of environment usually work closely and regularly with one
another. Group decision making can take place over a protracted period. Unlike the
previous scenario, there is no facilitator to move the action along and to get a decision
by a certain deadline. Thus, a particular issue may be left and returned to intermittently
by an individual; while in between times he deals with other work. This type of decision-
making lends itself, for example: to a head of department who wishes to stimulate
discussion on a certain topic and solicit colleagues’ opinions. On the basis of this
discussion and opinion he may take the final decision himself.
Teleconferencing:
This type of GDSS is for participants who sit geographically separated, perhaps in
different countries, and are unable to meet in the same place but can meet at the same
time: this is achieved by using telecommunications to link together two or more Decision
Rooms. This is because of the large distances between the participants, it is essential
that the telecommunications equipment is highly reliable. In this system there are large
cost savings, due to the avoidance of travel costs and productivity losses from time
spent travelling.
Remote Decision-Making:
Finally, this type of GDSS is very similar to the Local Decision Network, but the
individuals involved in the joint decision-making are geographically dispersed. Again the
telecommunications, whether they be by satellite, microwave or telephonic link, must be
of the highest standard. Unlike teleconferencing, which can take a long time to set up
and is somewhat rigid in its format, remote decision-making has the advantage of
flexibility and is on-going.
G. OFFICE AUTOMATION SYSTEM
1. Electronic Publishing
2. Electronic Communication
3. Electronic Collaboration
Electronic collaboration is made possible through electronic meeting and
collaborative work systems and teleconferencing. Electronic meeting and
collaborative work systems allow teams of coworkers to use networks of
microcomputers to share information, update schedules and plans, and
cooperate on projects regardless of geographic distance. Special software
called groupware is needed to allow two or more people to edit or otherwise
work on the same files simultaneously.
Examples: teleconferencing, videoconferencing
5. Office Management
A. COMPUTER WASTES
Computer Wastes involves the inappropriate use of computer technology and
resources (Josh Isay). According to the book Fundamental of Information
Systems, 5th Ed., these are the examples of Computer wastes:
• Discarding old software and even complete computer systems when they still
have value
• Building and maintaining complex systems that are never used to their fullest
extent
• Using corporate time and technology for personal use
• Spam
B. COMPUTER MISTAKES
Computer Mistakes are errors, failures, and other computer problems that make
computer output incorrect or not useful. Computer Mistakes are caused by failure
by users to follow proper procedures, unclear expectations and a lack of
feedback, program development that contains errors, Incorrect data entry by
data-entry clerk.
1. Keep your computer current with the latest patches and updates.
One of the best ways to keep attackers away from your computer is to
apply patches and other software fixes when they become available. By
regularly updating your computer, you block attackers from being able to take
advantage of software flaws (vulnerabilities) that they could otherwise use to
break into your system.
While keeping your computer up-to-date will not protect you from all attacks, it
makes it much more difficult for hackers to gain access to your system, blocks
many basic and automated attacks completely, and might be enough to
discourage a less-determined attacker to look for a more vulnerable computer
elsewhere.
More recent versions of Microsoft Windows and other popular software can
be configured to download and apply updates automatically so that you do
not have to remember to check for the latest software. Taking advantage of
"auto-update" features in your software is a great start toward keeping
yourself safe online.
Keep in mind that a newly purchased computer may not have the right
level of security for you. When you are installing your computer at home, pay
attention not just to making your new system function, but also focus on
making it work securely.
Choosing the right level of security and privacy depends on the individual
using the computer. Oftentimes security and privacy settings can be properly
configured without any sort of special expertise by simply using the "Help"
feature of your software or reading the vendor's Web site. If you are
uncomfortable configuring it yourself consult someone you know and trust for
assistance or contact the vendor directly.
The next line of defense many times is your antivirus software, which
monitors all online activities such as email messages and Web browsing and
protects an individual from viruses, worms, Trojan horse and other types
malicious programs. More recent versions of antivirus programs, such as
Norton AntiVirus, also protect from spyware and potentially unwanted
programs such as adware. Having security software that gives you control
over software you may not want and protects you from online threats is
essential to staying safe on the Internet. Your antivirus and antispyware
software should be configured to update itself, and it should do so every time
you connect to the Internet.
H. COMPUTER ETHICS
Ethics deals with placing a “value” on acts according to whether they are “good”
or “bad”. Every society has its rules about whether certain acts are ethical or not.
These rules have been established as a result of consensus in society and are
often written into laws.
When computers first began to be used in society at large, the absence of ethical
standards about their use and related issues caused some problems. However,
as their use became widespread in every facet of our lives, discussions
in computer ethics resulted in some kind of a consensus. Today, many of these
rules have been formulated as laws, either national or international. Computer
crimes and computer fraud are now common terms. There are laws against
them, and everyone is responsible for knowing what constitutes computer crime
and computer fraud.
1) Thou shalt not use a computer to harm other people: If it is unethical to
harm people by making a bomb, for example, it is equally bad to write a program
that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal
and destroy other people’s books and notebooks, it is equally bad to access and
destroy their files.
4) Thou shalt not use a computer to steal: Using a computer to break into the
accounts of a company or a bank and transferring money should be judged the
same way as robbery. It is illegal and there are strict laws against it.
5) Thou shalt not use a computer to bear false witness: The Internet can
spread untruth as fast as it can spread truth. Putting out false "information" to the
world is bad. For instance, spreading false rumors about a person or false
propaganda about historical events is wrong.
6) Thou shalt not use or copy software for which you have not
paid: Software is an intellectual product. In that way, it is like a book: Obtaining
illegal copies of copyrighted software is as bad as photocopying a copyrighted
book. There are laws against both. Information about the copyright owner can be
embedded by a process called watermarking into pictures in the digital format.
9) Thou shalt think about the social consequences of the program you
write: You have to think about computer issues in a more general social
framework: Can the program you write be used in a way that is harmful to
society? For example, if you are working for an animation house, and are
producing animated films for children, you are responsible for their contents. Do
the animations include scenes that can be harmful to children? In the United
States, the Communications Decency Act was an attempt by lawmakers to ban
certain types of content from Internet websites to protect young children from
harmful material. That law was struck down because it violated the free speech
principles in that country's constitution. The discussion, of course, is going on.
10) Thou shalt use a computer in ways that show consideration and
respect: Just like public buses or banks, people using computer communications
systems may find themselves in situations where there is some form of queuing
and you have to wait for your turn and generally be nice to other people in the
environment. The fact that you cannot see the people you are interacting with
does not mean that you can be rude to them.
Works Cited
Campbell, D.J. & Craig, T. (2005) Organisations & the Business Environment Retrived
at:
http://dsssystem.blogspot.com/2010/01/components-of-decision-support-
systems.html
https://www.techopedia.com/definition/27843/group-decision-support-system-gdss
https://www.reference.com/technology/difference-between-dss-mis-10ab10889dfdf245#
http://us.norton.com/cybercrime-prevention
http://www.encyclopedia.com/doc/1G2-3401200109.html
http://www.ravi.kahlon.co/2013/02/group-decision-support-systems-gdss.html