85  Information Technology in Management

Information technology (IT) is the application of computers and telecommunications to capture, store, process, transmit and retrieve data so that the data become information for decision-making. Management Information Systems (MIS) sit at the intersection of IT and the management process — Robert N. Anthony’s classic taxonomy distinguishes operational, tactical and strategic decisions, and IT supplies a corresponding hierarchy of systems: Transaction Processing Systems (TPS) at the operating level, Office Automation / Knowledge Work Systems for the knowledge tier, MIS and Decision Support Systems (DSS) for middle management, and Executive Support Systems (ESS) for top management. Laudon and Laudon (Management Information Systems) and Turban et al. are the standard textbook anchors.

TipWorking definitions
Term Working definition
Information system An interrelated set of components (people, hardware, software, data, networks, procedures) that collects, processes and disseminates information for managerial action.
Information technology The hardware-software-network-data infrastructure that supports an information system.
MIS A formal, computer-based system that provides managers with the information they need to plan, organise, lead and control.

85.1 The Data → Information → Knowledge → Wisdom (DIKW) hierarchy

Russell Ackoff’s pyramid clarifies why “data” is not “information”:

flowchart BT
A[Data: raw observations] --> B[Information: data with context and meaning]
B --> C[Knowledge: information with experience and pattern]
C --> D[Wisdom: knowledge with judgement to act]

Effective IT investments raise the value of an organisation’s information output: timeliness, accuracy, relevance, completeness, and conciseness are the canonical attributes of useful information (Davis & Olson).

85.2 A Hierarchy of Information Systems

TipPyramid of management information systems
Level System Decision type Example
Top Executive Support System (ESS) Strategic, unstructured Cockpit dashboard for the CEO
Middle Decision Support System (DSS) Tactical, semi-structured What-if pricing simulation
Middle Management Information System (MIS) Tactical, structured Monthly sales variance report
Knowledge tier Knowledge / Office systems (KMS, OAS) Domain-specific CAD systems, MS-Office, Lotus Notes
Operating Transaction Processing System (TPS) Operational, structured Point-of-sale, payroll, inventory

The hierarchy mirrors the Anthony Triangle (1965) and the Gorry-Scott Morton (1971) framework of decision support.

85.3 Enterprise-Wide Systems

Modern firms run on integrated enterprise systems that share a single database across functions, replacing the islands of automation that prevailed before the 1990s. The four landmark categories examined in UGC-NET papers are:

TipIntegrated enterprise systems
System Scope Vendors / examples
Enterprise Resource Planning (ERP) Integrates all back-office functions — finance, HR, manufacturing, supply chain, sales SAP S/4HANA, Oracle Fusion, Microsoft Dynamics
Customer Relationship Management (CRM) Front-office: sales force automation, marketing, service Salesforce, Zoho, HubSpot
Supply Chain Management (SCM) Inter-organisational logistics, planning, procurement SAP APO, Oracle SCM
Knowledge Management System (KMS) Capture, store and disseminate organisational know-how Microsoft SharePoint, IBM Watsonx

ERP descended from Material Requirements Planning (MRP) of the 1960s and Manufacturing Resource Planning (MRP II) of the 1980s; the term “ERP” was coined by Gartner in 1990. The dominant deployment is now cloud-based SaaS.

85.4 Networks, Internet, Intranet and Extranet

The communication backbone has three flavours:

TipNetwork domains
Network Audience Example
Internet Public global TCP/IP network World Wide Web
Intranet Internal-only enterprise web Employee portal
Extranet Restricted external partners and customers Supplier portal, dealer extranet

Network topologies (star, ring, bus, mesh, tree) and the seven-layer OSI model of ISO underpin enterprise data communication. The five-layer TCP/IP model (Application, Transport, Internet, Link, Physical) is the de-facto standard.

85.5 E-Business and E-Commerce

Electronic commerce is the transactional subset of electronic business. Kalakota and Whinston classified four streams by parties:

TipE-commerce categories
Category Parties Example
B2C Business → Consumer Amazon, Flipkart
B2B Business → Business IndiaMART, Ariba
C2C Consumer → Consumer OLX, eBay auctions
C2B Consumer → Business Freelance marketplaces; influencer monetisation
G2C / G2B Government to citizen / business UMANG, GeM

India’s Digital Public Infrastructure — Aadhaar (2009), UPI (2016), DigiLocker (2015), Account Aggregator (2021), ONDC (2022) — has made the country a global benchmark for citizen-scale digital services.

85.6 Cloud Computing and Service Models

The NIST definition (2011) of cloud computing identifies five essential characteristics (on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service), three service models, and four deployment models.

TipCloud service models
Service model What you rent Vendor handles Example
IaaS — Infrastructure-as-a-Service Virtual servers, storage, networks Hardware, virtualisation AWS EC2, Azure VM
PaaS — Platform-as-a-Service Development & runtime platform OS, middleware Google App Engine, Heroku
SaaS — Software-as-a-Service Ready-to-use application Everything below the application UI Salesforce, Office 365

Deployment models are public, private, community and hybrid. The shared responsibility model — vendor secures the cloud, tenant secures in the cloud — is a frequently tested concept.

85.7 Information Security and Privacy

The CIA triad — Confidentiality, Integrity, Availability — is the foundational goal set of information security. Threats include malware, phishing, ransomware, denial-of-service, insider threat, and supply-chain attack. Defences include cryptographic controls (symmetric AES, asymmetric RSA, hash functions SHA-256), identity and access management, multi-factor authentication, defence-in-depth, and zero-trust architecture (NIST SP 800-207). India’s privacy regime is the Digital Personal Data Protection Act, 2023, which aligns with global frameworks such as the EU’s GDPR (2018).

85.8 Practice Questions

Q 01 DIKW Easy

In the DIKW hierarchy, the level immediately above “information” is:

  • A. Data
  • B. Knowledge
  • C. Wisdom
  • D. Insight
View solution
Correct Option: B
The DIKW pyramid sequences Data → Information → Knowledge → Wisdom. Knowledge sits directly above Information.

Q 02 System hierarchy Medium

Which information system primarily supports the operating level of an organisation?

  • A. ESS
  • B. DSS
  • C. MIS
  • D. TPS
View solution
Correct Option: D
Transaction Processing Systems handle structured day-to-day transactions (orders, payroll, inventory) at the operational level.

Q 03 ERP origin Medium

The term “Enterprise Resource Planning” was coined by which research firm in 1990?

  • A. Forrester
  • B. McKinsey
  • C. Gartner
  • D. IDC
View solution
Correct Option: C
Gartner coined the term “ERP” in 1990 to describe the next generation of MRP-II systems integrating all enterprise functions.

Q 04 Cloud models Easy

Microsoft Office 365 is best classified under which cloud service model?

  • A. IaaS
  • B. PaaS
  • C. SaaS
  • D. XaaS
View solution
Correct Option: C
Office 365 delivers ready-to-use applications over the internet — a Software-as-a-Service offering.

Q 05 CIA triad Easy

The CIA triad of information security stands for:

  • A. Control, Integration, Authentication
  • B. Confidentiality, Integrity, Availability
  • C. Cryptography, Identity, Authorisation
  • D. Confidentiality, Integration, Audit
View solution
Correct Option: B
Confidentiality, Integrity and Availability are the three core security objectives codified in NIST and ISO 27000 standards.

Q 06 E-commerce Medium

A consumer offering freelance services to businesses on a marketplace such as Upwork is an example of:

  • A. B2C
  • B. B2B
  • C. C2C
  • D. C2B
View solution
Correct Option: D
C2B (Consumer-to-Business) e-commerce reverses the traditional flow — individuals supply value to firms, e.g. freelancers, influencers.

Q 07 Networks Medium

A web portal accessible to a firm’s vendors and dealers but not to the general public is best classified as:

  • A. Internet
  • B. Intranet
  • C. Extranet
  • D. VPN
View solution
Correct Option: C
An extranet extends a private intranet to authenticated external partners (suppliers, dealers, large customers) while remaining inaccessible to the general public.

Q 08 Match the following Hard

Match the system to its primary user group:

(P) ESS (1) Operating staff
(Q) DSS (2) Top management
(R) TPS (3) Knowledge workers
(S) KWS (4) Middle managers
  • A. P-2, Q-4, R-1, S-3
  • B. P-2, Q-1, R-4, S-3
  • C. P-4, Q-2, R-1, S-3
  • D. P-1, Q-2, R-3, S-4
View solution
Correct Option: A
ESS — top management; DSS — middle managers; TPS — operating staff; KWS — knowledge workers (engineers, designers, analysts).
ImportantQuick recall
  • DIKW pyramid: Data → Information → Knowledge → Wisdom.
  • Anthony triangle in IS: TPS (operating), KWS/OAS (knowledge), MIS/DSS (tactical), ESS (strategic).
  • “ERP” coined by Gartner in 1990; descended from MRP (1960s) → MRP-II (1980s).
  • NIST cloud: 5 characteristics, 3 service models (IaaS/PaaS/SaaS), 4 deployment models.
  • CIA triad of security; India’s privacy regime is DPDP Act, 2023.