Outline of Technical-Rational, Behavioural and Cognitive management
theories. a. Outlines
i. Technical-Rational:-
The organization is perceived as a closed system in which the efficiency and effectiveness
depend on the precision of operation, the creative design and integration of the individual
parts. The managerial role is to plan, measure, control, organize, co-ordinate the parts such
as machinery, operators, jobs and tasks so that they function as efficiently as possible. This
perspective can have two variants, the scientific school which focuses on the factory floor
and the administrative-bureaucratic which focuses on the office administration.
ii. Behavioural:-
Appeared after the technical-rational perspective and considers people who work in an
organization not being automata. It considers the role of small groups, their norms and
working environment. Considers the organization as an open system and the efficiency and
effectiveness depends on how the group continually adapts to its environment and its ability
to rearrange itself internally so that it can =fit‘ the current environment in which it operates.
Here again there are two variants, one which focuses on the psychological and social-
psychological needs of the employees and the other focusing on the organization and its
structure and its ability to adapt to the rapidly changing environment in which it operates.
iii. Cognitive:-
This is concerned with the ability of an organization to =know‘ and =learn‘ from its own
environment and from the environment in which it operates. The organization‘s efficiency
and effectiveness depend on its ability to gather, create, store, classify, disseminate and use
information and knowledge that it accumulates over time. The managerial role is to make
sense of the latent information and knowledge available to them together with their own
intuition and experience, to perceive problems and design solutions and to build an
information and knowledge processing infrastructure for the organization.
b. People involved in the development of an information
system: o User
o Systems analyst- to provide system requirements.
o Programmers- to code software.
o Project manager- He is in charge of the project.
o Senior organizational management- they approve and take part in reviewing the
development effort.
o Experts in various fields to provide views needed in the feasibility study.
o Software and hardware maintenance vendors to provide maintenance and support
(if it is not carried out by the organization).
gregorymasila answered the question on February 15, 2018 at 16:29
- Computer systems which process financial data for a company should be audited to evaluate
the reliability of information and also the efficiency and effectiveness of...(Solved)
Computer systems which process financial data for a company should be audited to evaluate
the reliability of information and also the efficiency and effectiveness of the system. The
main problem with auditing a computer system is that processing operations are invisible.
Required:
a) State five systems checks and controls that should be built in the system at the design
stage to reduce the problem and weaknesses that auditors frequently detect.
b) Discuss the audit trail in computerized accounting information systems.
c) Explain each of the following computer auditing approaches and techniques:
(i.) Auditing around the computer;
(ii.) Auditing through the computer;
(iii.) Auditing packages.
Date posted: February 15, 2018. Answers (1)
- One of the current developments in information technology, which has strategic
implications for business firms, is the move towards open systems.
Required:
a) Explain the meaning of...(Solved)
One of the current developments in information technology, which has strategic
implications for business firms, is the move towards open systems.
Required:
a) Explain the meaning of the open systems concept.
b) Discuss the implications of the move towards open systems for organizations that have
already invested in proprietary information systems.
c) Outline two potential benefits to information technology due to the move towards open
systems.
Date posted: February 15, 2018. Answers (1)
- (a) A major source of errors in computer systems is errors in the input data. What controls would you install for the control of such errors?...(Solved)
(a) A major source of errors in computer systems is errors in the input data. What controls
would you install for the control of such errors?
(b) Describe four methods that would be used for fact finding during system investigation.
(c) Give the principal method of data capture in the following applications:
(i.) Banks;
(ii.) Supermarkets
(iii.) Clothing and footwear retailing.
(d) What are the functions of a systems programmer?
Date posted: February 15, 2018. Answers (1)
- In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization
b. Describe some of the ethical dilemmas...(Solved)
In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization.
b. Describe some of the ethical dilemmas that are involved with Information Systems.
Date posted: February 15, 2018. Answers (1)
- Organizations are now moving from Strategic Management systems towards Enterprise
systems and yet further to Industrial Networks and Extended Enterprise systems.
a. Describe the features of...(Solved)
Organizations are now moving from Strategic Management systems towards Enterprise
systems and yet further to Industrial Networks and Extended Enterprise systems.
a. Describe the features of Enterprise computing and industrial networks;
b. What are the business and technological reasons for this move?
c. Outline the key elements required to build an enterprise information technology structure
d. Outline potential organisational problems in the creation of these enterprises systems.
Date posted: February 15, 2018. Answers (1)
- In the context of Information Systems Security, write short notes on ALL of the following
headings:-
a. Why are computer systems more vulnerable to destruction, error,...(Solved)
In the context of Information Systems Security, write short notes on ALL of the following
headings:-
a. Why are computer systems more vulnerable to destruction, error, abuse and misuse than
manual systems?
b. What is meant by the term Risk Assessment?
c. What are Worms and Viruses?
d. Outline the process of Public Key Encryption.
Date posted: February 15, 2018. Answers (1)
- The development of powerful desktop computers coupled to telecommunication networks
has revolutionized the way organizations may carry out their business.
The following are some alternatives for...(Solved)
The development of powerful desktop computers coupled to telecommunication networks
has revolutionized the way organizations may carry out their business.
The following are some alternatives for an organization‘s internal and external
communications: -
a. Client-Server
b. Internet
c. Intranet
d. Extranet
Date posted: February 15, 2018. Answers (1)
- Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are...(Solved)
Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are faced with are: -
a. Easy product identification;
b. Fast customer processing at the cash tills;
c. Extremely efficient stock control;
d. Rapid bulk replacement of goods from suppliers.
Describe in detail how Information Systems can help supermarket chains with these specific
objectives. Your answer should outline the systems involved, the hardware that might be
required and an indication of how the various systems might interact with each other.
Date posted: February 15, 2018. Answers (1)
- Differentiate between pseudo code and flowcharts(Solved)
Differentiate between pseudo code and flowcharts.
Date posted: February 14, 2018. Answers (1)
- What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code(Solved)
What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code
Date posted: February 13, 2018. Answers (1)
- What is a predicate in a system program?(Solved)
What is a predicate in a system program?
Date posted: February 13, 2018. Answers (1)
- Give one advantage and one disadvantage of using the string data type in a computer program. (Solved)
Give one advantage and one disadvantage of using the string data type in a computer program.
Date posted: February 13, 2018. Answers (1)
- Define a container, an iterator, and an algorithm as they relate to the STL in a computer program.(Solved)
Define a container, an iterator, and an algorithm as they relate to the STL in a computer program.
Date posted: February 13, 2018. Answers (1)
- How does the STL make it easier for a programmer more reliable C++ programs?(Solved)
How does the STL make it easier for a programmer to create more reliable C++ programs.
Date posted: February 13, 2018. Answers (1)
- Describe the function of mutable in a computer program.(Solved)
Describe the function of mutable in a computer program.
Date posted: February 13, 2018. Answers (1)
- Explain the term namespace as used in a C++ program.(Solved)
Explain the term namespace as used in a C++ program.
Date posted: February 13, 2018. Answers (1)
- What is the principal restriction placed on a const member function in a C++ program?(Solved)
What is the principal restriction placed on a const member function in a C++ program?
Date posted: February 12, 2018. Answers (1)
- Explain the purpose of explicit in a C++ program.(Solved)
Explain the purpose of explicit in a C++ program.
Date posted: February 12, 2018. Answers (1)
- What does a conversion function do in a C++ program?(Solved)
What does a conversion function do in a C++ program?
Date posted: February 12, 2018. Answers (1)
- Given a function called counter(), show the statement that causes the compiler to compile this function for C language linkage.(Solved)
Given a function called counter(), show the statement that causes the compiler to compile this function for c language linkage
Date posted: February 12, 2018. Answers (1)