flowchart BT A[Data: raw observations] --> B[Information: data with context and meaning] B --> C[Knowledge: information with experience and pattern] C --> D[Wisdom: knowledge with judgement to act]
85 Information Technology in Management
Information technology (IT) is the application of computers and telecommunications to capture, store, process, transmit and retrieve data so that the data become information for decision-making. Management Information Systems (MIS) sit at the intersection of IT and the management process — Robert N. Anthony’s classic taxonomy distinguishes operational, tactical and strategic decisions, and IT supplies a corresponding hierarchy of systems: Transaction Processing Systems (TPS) at the operating level, Office Automation / Knowledge Work Systems for the knowledge tier, MIS and Decision Support Systems (DSS) for middle management, and Executive Support Systems (ESS) for top management. Laudon and Laudon (Management Information Systems) and Turban et al. are the standard textbook anchors.
| Term | Working definition |
|---|---|
| Information system | An interrelated set of components (people, hardware, software, data, networks, procedures) that collects, processes and disseminates information for managerial action. |
| Information technology | The hardware-software-network-data infrastructure that supports an information system. |
| MIS | A formal, computer-based system that provides managers with the information they need to plan, organise, lead and control. |
85.1 The Data → Information → Knowledge → Wisdom (DIKW) hierarchy
Russell Ackoff’s pyramid clarifies why “data” is not “information”:
Effective IT investments raise the value of an organisation’s information output: timeliness, accuracy, relevance, completeness, and conciseness are the canonical attributes of useful information (Davis & Olson).
85.2 A Hierarchy of Information Systems
| Level | System | Decision type | Example |
|---|---|---|---|
| Top | Executive Support System (ESS) | Strategic, unstructured | Cockpit dashboard for the CEO |
| Middle | Decision Support System (DSS) | Tactical, semi-structured | What-if pricing simulation |
| Middle | Management Information System (MIS) | Tactical, structured | Monthly sales variance report |
| Knowledge tier | Knowledge / Office systems (KMS, OAS) | Domain-specific | CAD systems, MS-Office, Lotus Notes |
| Operating | Transaction Processing System (TPS) | Operational, structured | Point-of-sale, payroll, inventory |
The hierarchy mirrors the Anthony Triangle (1965) and the Gorry-Scott Morton (1971) framework of decision support.
85.3 Enterprise-Wide Systems
Modern firms run on integrated enterprise systems that share a single database across functions, replacing the islands of automation that prevailed before the 1990s. The four landmark categories examined in UGC-NET papers are:
| System | Scope | Vendors / examples |
|---|---|---|
| Enterprise Resource Planning (ERP) | Integrates all back-office functions — finance, HR, manufacturing, supply chain, sales | SAP S/4HANA, Oracle Fusion, Microsoft Dynamics |
| Customer Relationship Management (CRM) | Front-office: sales force automation, marketing, service | Salesforce, Zoho, HubSpot |
| Supply Chain Management (SCM) | Inter-organisational logistics, planning, procurement | SAP APO, Oracle SCM |
| Knowledge Management System (KMS) | Capture, store and disseminate organisational know-how | Microsoft SharePoint, IBM Watsonx |
ERP descended from Material Requirements Planning (MRP) of the 1960s and Manufacturing Resource Planning (MRP II) of the 1980s; the term “ERP” was coined by Gartner in 1990. The dominant deployment is now cloud-based SaaS.
85.4 Networks, Internet, Intranet and Extranet
The communication backbone has three flavours:
| Network | Audience | Example |
|---|---|---|
| Internet | Public global TCP/IP network | World Wide Web |
| Intranet | Internal-only enterprise web | Employee portal |
| Extranet | Restricted external partners and customers | Supplier portal, dealer extranet |
Network topologies (star, ring, bus, mesh, tree) and the seven-layer OSI model of ISO underpin enterprise data communication. The five-layer TCP/IP model (Application, Transport, Internet, Link, Physical) is the de-facto standard.
85.5 E-Business and E-Commerce
Electronic commerce is the transactional subset of electronic business. Kalakota and Whinston classified four streams by parties:
| Category | Parties | Example |
|---|---|---|
| B2C | Business → Consumer | Amazon, Flipkart |
| B2B | Business → Business | IndiaMART, Ariba |
| C2C | Consumer → Consumer | OLX, eBay auctions |
| C2B | Consumer → Business | Freelance marketplaces; influencer monetisation |
| G2C / G2B | Government to citizen / business | UMANG, GeM |
India’s Digital Public Infrastructure — Aadhaar (2009), UPI (2016), DigiLocker (2015), Account Aggregator (2021), ONDC (2022) — has made the country a global benchmark for citizen-scale digital services.
85.6 Cloud Computing and Service Models
The NIST definition (2011) of cloud computing identifies five essential characteristics (on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service), three service models, and four deployment models.
| Service model | What you rent | Vendor handles | Example |
|---|---|---|---|
| IaaS — Infrastructure-as-a-Service | Virtual servers, storage, networks | Hardware, virtualisation | AWS EC2, Azure VM |
| PaaS — Platform-as-a-Service | Development & runtime platform | OS, middleware | Google App Engine, Heroku |
| SaaS — Software-as-a-Service | Ready-to-use application | Everything below the application UI | Salesforce, Office 365 |
Deployment models are public, private, community and hybrid. The shared responsibility model — vendor secures the cloud, tenant secures in the cloud — is a frequently tested concept.
85.7 Information Security and Privacy
The CIA triad — Confidentiality, Integrity, Availability — is the foundational goal set of information security. Threats include malware, phishing, ransomware, denial-of-service, insider threat, and supply-chain attack. Defences include cryptographic controls (symmetric AES, asymmetric RSA, hash functions SHA-256), identity and access management, multi-factor authentication, defence-in-depth, and zero-trust architecture (NIST SP 800-207). India’s privacy regime is the Digital Personal Data Protection Act, 2023, which aligns with global frameworks such as the EU’s GDPR (2018).
85.8 Practice Questions
Q 01 DIKW Easy
In the DIKW hierarchy, the level immediately above “information” is:
View solution
Q 02 System hierarchy Medium
Which information system primarily supports the operating level of an organisation?
View solution
Q 03 ERP origin Medium
The term “Enterprise Resource Planning” was coined by which research firm in 1990?
View solution
Q 04 Cloud models Easy
Microsoft Office 365 is best classified under which cloud service model?
View solution
Q 05 CIA triad Easy
The CIA triad of information security stands for:
View solution
Q 06 E-commerce Medium
A consumer offering freelance services to businesses on a marketplace such as Upwork is an example of:
View solution
Q 07 Networks Medium
A web portal accessible to a firm’s vendors and dealers but not to the general public is best classified as:
View solution
Q 08 Match the following Hard
Match the system to its primary user group:
| (P) ESS | (1) Operating staff |
| (Q) DSS | (2) Top management |
| (R) TPS | (3) Knowledge workers |
| (S) KWS | (4) Middle managers |
View solution
- DIKW pyramid: Data → Information → Knowledge → Wisdom.
- Anthony triangle in IS: TPS (operating), KWS/OAS (knowledge), MIS/DSS (tactical), ESS (strategic).
- “ERP” coined by Gartner in 1990; descended from MRP (1960s) → MRP-II (1980s).
- NIST cloud: 5 characteristics, 3 service models (IaaS/PaaS/SaaS), 4 deployment models.
- CIA triad of security; India’s privacy regime is DPDP Act, 2023.