DESIGN AND IMPLEMENTATION OF INFORMATION MANAGEMENT SYSTEM

 

CHAPITRE ONE

 

1.0 BEGINNING

 

Most firms’ information systems have evolved into their backbone. Without the assistance of information systems, banks could not process payments, governments could not collect taxes, hospitals could not treat patients, and supermarkets could not fill their shelves. Information systems play an important part in practically every industry, including education, banking, government, health care, manufacturing, and large and small businesses. Everyday work, communication, information gathering, and decision making are all facilitated by information technology (IT). When we go to a travel agency to arrange a trip, we use a network of interconnected information systems to verify the availability of flights and hotels and to book them. We communicate with the bank’s information system rather than with bank people when we make an electronic payment.

 

Modern supermarkets utilize information technology to track stock based on inbound shipments and sales recorded at cash registers. The majority of businesses and institutions rely largely on their information systems. Given the important importance of their information systems, organizations such as banks, online travel firms, tax authorities, and electronic booksellers might be considered IT companies.

 

An information management system (IMS) is a broad word for software that facilitates the storage, organization, and retrieval of data.

 

IMS is also the name of IBM’s massive software program that was created in the 1960s to support NASA’s Apollo space program. This IMS version served as a forerunner of IBM’s leading hierarchical database management system (DBMS).

 

Electronic document and records management system (EDRMS) is a type of content management system that refers to the integration of document management and records management technology.

 

An IMS database, unlike DB2 (IBM’s relational database software), uses segments, or data blocks, as building blocks of the hierarchical model. Each segment contains many data elements called as fields. The segment at the top of the hierarchy is known as the root segment. Child segments are segments that are subsets of a larger segment. The order of the child segments represents the order in which each entry is entered into a database.

 

There are three types of hierarchical IMS databases:

 

1. Full function database: This database form, derived from the Data Language Interface (DL/I), may include more than one single access mechanism. To store and access database fields, the Overflow Sequential Access Method (OSAM) or Virtual Storage Access Method (VSAM) might be employed.

 

2. Fast path database: Designed to allow for the highest possible transaction rate. Data entry databases (DEDB) and main storage databases (MSDB) are two examples.

 

3. A high level of availability massive databases (HALDB): Handles massive amounts of data and ensures that each piece of data in the database is always available.

 

IBM introduced the IMS (Information Management System) database and transaction management system in 1968. Since then, IMS has undergone numerous revisions as it adapted to new development tools and settings. IMS is one of IBM’s two major legacy database and transaction management subsystems that run on MVS (now z/OS) mainframes. CICS is the other. Application programs that employ either (or both) IMS or CICS services are said to have handled and continue to handle the majority of the world’s banking, insurance, and order entering transactions in the past.

 

1.1 THE STUDY’S BACKGROUND

 

Paper-based data management systems are increasingly becoming obsolete. They are often misplaced, prone to wear and tear, expensive to handle, cannot be shared electronically, can be difficult to comprehend, and are inefficient. These inherent disadvantages are driving a global shift toward Electronic Health Records (EHRs).

 

This study provides a practical solution based on cryptography to protect the sensitive electronic records of students and staff at the computer science department at the Federal College of Agriculture in Ishiagu, as well as privacy control over who sees their records, details, and any other sensitive information in other units of the school.

 

1.2THE PROBLEM’S STATEMENT

 

The computer science department of the Federal College of Agriculture is operated and managed manually to some extent. The recording of admitted students and their actions is done manually in a rough-looking book. As a result, the books or files are subjected to physical harm from ants and vermin, as well as dust particle collection, causing the contents to be lost, misplaced, or even altered.

 

1.3 OBJECTIVE OF THE STUDY

 

The goal of this research is to create software that may be employed in information management systems that students receive with their activities. In addition, to promote efficient and high-quality services to individuals

 

1. Capture the fundamental data in the Federal College of Agriculture’s departmental unit: where students can access their files.

 

2. Use user login security and triple DES encryption to protect sensitive information across departments by assigning a unique decryption key to each user that works when.

 

1.4 THE STUDY’S IMPORTANCE

 

The primary goal of this research is to computerize the manual information management system utilized in FCAI departments. It will aid in a variety of ways in the process of retrieving data and records from the system.

 

This study will also emphasize the significance of an information management system to an organization and business centers.

 

1.5 THE STUDY’S OBJECTIVES

 

The primary goal of this research is to create a system for information management. Other aims include

 

i. To save time (records can be entered and accessed quickly).

 

ii. To provide management with the ability to prepare ahead

 

iii. To lessen the tiredness of the personnel

 

iv. To verify the accuracy of information records

 

v. To ensure the security of the documents/records/data/information, because the system will be password protected to limit access.

 

vi. To maintain the integrity of the records

 

vii. To maintain account consistency and the minimization of errors caused by information damage.

 

viii. To reduce forgery and information loss due to theft

 

1.6 STUDY OBJECTIVES

 

The study’s scope includes the entire polytechnic as well as merely the institution’s management and students.

 

However, the breadth is such that the study can only be carried out in one way, which is through computerizing the student information. This will aid in modernizing the underlying challenges confronted by the organization’s administration.

 

1.7 THE STUDY’S LIMITATIONS

 

Although this research is on information management systems, it is dependent on human operation and modification to function properly.

 

This research is also limited to power supply because it is the only source of energy, hence the system cannot function without it.

 

Finally, because this research effort is constrained and limited to computer literates who can successfully run a computer system and its functioning, a computer illiterate cannot make use of it as planned.

 

1.8 THE DEFINITION OF TERMS

 

Automation is the use of a control system, such as a computer, to control and process data, eliminating the need for human intervention.

 

A database is a vast store of connected data on a computer that the user may access and modify.

 

Password: A secret code that a user must enter into a computer in order to access it or its programs. This is made up of numbers, letters, special characters, or a mix of the aforementioned.

 

Record System: The act of employing a computer system to systematically store and update information/data in order to maintain file security.

 

Computerized: To begin using a computer system to control, organize, and automate something that was previously based on a based system.

 

Data Entry: This is the standard input device that the system uses to get further instructions and commands.

 

A comprehensive examination of anything, especially to find new facts or information about it.

 

System: A collection of computer components (that is, the assembly of hardware, software, and peripherals to work together).

 

IBM introduced the IMS (Information Management System) database and transaction/record management system in 1968. Since that time.

 

Information: Information (abbreviated as info or info.) is that which informs, i.e. an answer to a query, as well as that which can be used to derive knowledge and data (data represents values assigned to parameters, while knowledge represents comprehension of real things or abstract concepts).

 

A computer is an example of an information system. An information system (IS) is a group of humans and computers that processes or interprets data. The phrase is sometimes used in more limited contexts to refer just to the software used to run a computerized database or to refer exclusively to a computer system.

Leave a Comment