Management Information Systems - Laudon - Summary

May 4, 2017 | Author: Birte Gröger | Category: N/A
Share Embed Donate


Short Description

Download Management Information Systems - Laudon - Summary...

Description

Management  Information  Systems  (MIS)    

Chapter  1   Information  Systems  in  Business  today  

  NBA  makes  a  slam  dunk  with  information  technology   • Problem:  no  hard  data  usable  in  decision  making  processes,  costly  and   competitive  market   • Solutions:  new  system  designed  to  collect  and  organize  data  using  video  clips,   video  tagging  with  descriptive  categories,  streaming   • =  Innovation  and  improving     Business  Challenge  à  management  +  organization  +  technology  à  Informaton  System   à  Business  Solution    

    Role  of  IS  in  business  today     Capital  investment  in  IT,  hardware,  software,  communication  equipment,  grew  from   32%  to  52%  of  all  invested  capital  between  1980  and  2009  because  better  ROI  (return   on  investment).  As  manager  know  how  to  invest  this  money  wisely  on  IS  and  technology.       How  are  IS  transforming  business?   • Increased  wireless  technology  use,  web  sites   • Increased  business  use  of  web  2.0  tech   • Cloud  computing,  mobile  digital  platform  allow  more  distributed  word,  decision-­‐ making,  and  collaboration   • Mobile  phones,  e-­‐mail,  online  conferencing  (5  billion  cell  phone  subscribers   worldwide)     Why  are  more  parcels  distributed?   • Just  in  time  production,  Lean  production,  As  little  inventory  as  possible  

• Resond  to  rapidly  changing  customer  demand   • Get  to  market  faster,  reduce  overhead  costs   A  lot  of  digital  information  to  store  and  handle.   • Get  news  online,  reading  and  writing  blogs,  social  networking   • Connect  employees,  customers,  managers  worldwide   • Internet  advertising  and  e-­‐commerce  continue  to  expand   • Laws  requiring  to  store  this  data  for  several  years    

  3  interrelated  changes  in  technology  (accuracy,  speed,  richness  of  decision  making)   1. Emerging  mobile  digital  platform  (desktop  PC  à  mobile  device  to  coordinate   work,  communicate,  provide  info  for  decision  making)   2. Growth  of  online  software  as  a  service  /SAAS  (wikis,  Web  2.0,  collaboration  tools   à  better  and  faster  decisions,  online  teams  and  projects    

 

3. Growth  in  cloud  computing  (rely  on  telework,  remote  work,  distributed  decision   making,  outsource,  collaborate  with  suppliers  and  customers  to  create  new   products   Globalization  opportunities  and  challenges     • Internet  has  drastically  reduced  costs  of  operating  on  global  scale   • Communication  is  instant  and  virtually  free  (e.g.  price  information  24/7)   • Presents  both  challenges  and  opportunities  (outsourcing,  offshoring,  low  wages,   fight  for  jobs  and  products,  but  expanding  employment  in  IS,  accelerated   development  of  new  IS)   • “The  world  is  flat  –  The  globalized  world  in  the  21st  century”  by  Thomas  L.   Friedman  à  10  “Flatteners”  (advantage  developed  countries  =  past)   o Collapse  of  Berlin  Wall   o Netscape  (first  browser  of  this  company)  and  the  Internet  revolution,   connectivity  through  fiber-­‐optic  cables   o Workflow  software   o Uploading   o Open  sourcing   o Outsourcing   o Offshoring  (e.g.  India,  cheaper,  better  know-­‐how)   o Supply  chaining,  insourcing   o In-­‐forming   o The  Steroids   • Employee:  high  level  skills,  firm:  choice  of  markets   • IS  enables  globalization     In  the  emerging  fully  digital  firm   • Business  relationships  are  digitally  enabled  and  mediated   • Core  business  processes  are  accomplished  through  digital  networks   o Business  processes  =  logically  related  tasks/behaviors  developed  over   time  to  produce  specific  business  results,  e.g.  creating  an  marketing  plan   • Key  corporate  assets  (property,  financial,  human  assets)  are  managed  digitally     Greater  flexibility  in  organization  and  management  (time  shifting  =  24/7,  space  shifting   =  global  workplace)  =  anytime/anywhere,  flexibility    

IT  is  a  foundation  of  doing  business  in  the  21st  century.  

 

 

Growing  interdependence  between  ability  to  use  IT  and  ability  to  implement  corporate   strategies  and  achieve  corp.  goals.  (fig.  1.2)   6  strategic  business  objectives   1. Operational  excellence  (efficiency,  productivity)  à  Walmart  RetailLink     2. New  products,  services,  business  models  (how  a  company  produces,  delivers  and   sells)  à  iPod,  iPhone   3. Customer  supplier  intimacy  (engaging  à  returning,  e.g.  track  of  preferences  in  a   database,  JIT,  lowers  costs)   4. Improved  decision  making  (right  information,  right  time  instead  of   forecasts/luck  à  Verizon  digital  dashboard  for  managers   5. Competitive  advantage  (faster,  cheaper,  superior,  real  time  responses)   6. Survival  (necessity)  à  ATM     Depending  on  type  and  quality  of  IS!     IT=  All  the  hardware  +  software  to  achieve  business  objectives     IS  =     • Set  of  interrelated  components;     • Collect,  process,  store,  and  distribute  information;  produce  new  information;   • Support  decision  making,  coordination,  control;     • Solve  tasks  automatically,  create  new  products,  analyze  problems   • Information  about  significant  people,  places,  things     Information  vs.  data  (fig.  1.3)   • Data  are  streams  of  raw  facts  (supermarket  checkout  counter)   • Information  is  data  shaped  into  meaningful  form  (total  unit  sales  of  dish   detergent,  total  sales  revenue  for  specific  store)     Function  of  an  IS  (fig.  1.4)  

 

Input  (captures  raw  data)  à  Processing  (Classify,  Arrange,  Calculate)  (converts  raw   data  into  meaningful  form)à  Output  (transfers  processed  information  to  people  or   activities  that  use  it)  à  Feedback  (output  returned  to  appropriate  members  of   organization  to  help  evaluate  or  correct  input  stage)     !  Computers  and  Software  are  only  part  of  an  IS!  (  =  technical  foundation  and  tools)    

Perspectives  n  IS    (fig.  1.5)  =  IS  literacy   • 1. 2. 3.

Computer  literacy  is  only  knowledge  of  IT   Organizations   Technology   Management  

  Organizational  dimension   • IS  =  integral  part   • Key  elements:  people,  structure,  business  processes,  politics,  culture   • Different  levels/specialties,  hierarchy  or  pyramid  structure   o Upper  level:  managerial,  professional,  technical  employees   o Lower  level:  operational  personnel   o Senior  Mgt.:  long-­‐term  strategic  decisions,  financial  performance   o Middle  Mgt.:  carries  out  programs  and  plans   o Operational  Mgt.:  monitoring  daily  activities    

 

  • • • •

Separation  business  functions   Unique  business  processes  with  formal  rules,  developed  over  time  to  guide   employees  (IS  automate  many  business  processes)   Unique  culture  =  fundamental  set  of  assumptions,  values,  ways  to  do  things   IS  come  out  of  organizational  conflicts  

Management   • Make  decisions,  formulate  action  plans,  solve  organizational  problems   • Perceive  business  challenges  ,  strategy  to  respond,  allocate  resources   • Creative  work  driven  by  knowledge  and  information  (new  products,  recreate   organization))     Information  Technology  (IT)   • Computer  hardware  (input,  processing,  output,  several  linked  devices)   • Computer  software  (details,  preprogrammed  instructions  to  control/coordinate)   • Data  management  technology  (sotware  governing  organization  of  data  and   storage  media)   • Networking  and  telecommunications  technology  (devices  and  software  linking   hardware  and  transferring  data)   o Network  links  computers  to  share  data  and  resources  (e.g.  printer)   o Internet  =  network  of  networks  (technology  platform)   o WWW  =  service  provide  by  Internet   • All  these  technologies  =  resources  =  IT  infrastructure   • IT  infrastructure  =  foundation  to  build  IS  (carefully  design  and  manage)     UPS  Package  Tracking  System   • Organized  in  sales  and  production  functions  (delivery  is  the  product/service)   • Procedures  for  identifying  packages,  inventory,  tracking  en  route,  status  reports   • Also  provide  information  to  satisfy  needs  of  managers  and  workers   • Trained  to  use  the  system  =  effective  +  efficient   • Management:  monitors  service  level  and  costs  for  promoting  strategy  (low  costs,   high  service)   • Decision  to  use  computer  systems  increase  ease  for  sending  and  updating,   reducing  costs,  increasing  sales   • Technology:  handheld  computers,  bar  code  scanners,  communication  networks,   desktop  PCs,  data  center,  storage  technology,  tracking  software,  software  for   WWW  access    

Business  perspective   • • • •

Investment  because  IS  (instrument)  =  real  economic  corporate  value  to  the   business   ROI  will  be  superior  to  other  investments  (buildings,  machines  etc.)   Increases  in  productivity,  revenues  (à  stock  market  value),  long-­‐term  strategic   positioning  (à  future  revenues)   Decreases  costs  because  of  information  for  better  decisions,  better  execution  of   business  processes.  

  Business  information  value  chain   • Raw  data  acquired  and  transformed  through  stages  that  add  value  to  that   information   • Value  of  information  system  determined  in  part  by  extent  to  which  it  leads  to   better  decisions,  greater  efficiency,  and  higher  profits     An  IS  represents  an  organizational  and  management  solution,  based  on  IT,  to  a  challenge   or  problem  posed  by  the  environment.    

à  PROFITABILITY  

 

 

Complementary  assets   • • • • • • • •

   

Some  firms  achieve  better  results  with  IS  than  others   Invest  great  deal  or  little  a  amount,  receive  low  or  much  returns   IT  investments  alone  are  not  enough     Organization  and  Management:  supportive  values,  structures,  behavior  patterns   (=  complementary  assets)   Adopt  right  business  model  that  suits  the  new  technology     Complementary  assets  =  assets  required  to  derive  value  from  a  primary   investment  à  receive  superior  returns   E.g.  new  business  models,  business  processes,  management  behavior,   organizational  culture,  training   Investment  in  organizational  and  management  capital   o Organizational  assets,  e.g.   § Appropriate  business  model   § Efficient  business  processes   o Managerial  assets,  e.g.   § Incentives  for  management  innovation   § Teamwork  and  collaborative  work  environments   o Social  assets  (not  by  company,  society  in  gerneal)  e.g.   § The  Internet  and  telecommunications  infrastructure   § Technology  standards  

Contemporary  Approaches  to  IS   • •

Multidisciplinary  field     IS  =  sociotechnical  systems  (machines,  devices,  physical  tech,  social,   organizational,  intellectual  investments  

    Technical  approach   •  Emphasizes  mathematically  based  models   •  Computer  science  (computability,  data  storage  +  access),  management  science,   operations  research  (transportation,  inventory  control,  transaction  costs)      Behavioral  approach  (development,  long-­‐term  maintenance)   •  Behavioral  issues  (strategic  business  integration,  implementation,  design..)   •  Psychology  (human  perceive  and  use),  economics  (production,  dynamics   market)  ,  sociology  (groups)   o IST  stimulus  for  behavioral  problem/issue   o Changes  in  attitudes,  management,  organizational  policy,  behavior       Four  main  actors   •  Suppliers  of  hardware  and  software  (technologists)   •  Business  firms  (investments,  seeking  value)   •  Managers  and  employees   •  Firm’s  environment  (legal,  social,  cultural  context)   • à  Management  Information  Systems  (MIS)   o Combines  computer  science,  management  science,  operations  research   and  practical  orientation  with  behavioral  issues     Sociotechnical  view   • Optimal  organizational  performance  achieved  by  jointly  optimizing  both  social   and  technical  systems  used  in  production  (technic  and  behavior)   • Helps  avoid  purely  technological  approach   • Mutual  adjustment  of  both  technology  and  organization    

Chapter  2   Global  E-­‐Business  and  Collaboration    

Business  Processes  

=  Unique  manner  in  which  work  is  organized,  coordinated,  focused  to  produce  valuable   products  and  services   • Workflows  of  material,  information,  knowledge  (coordinated  by  Management   and  Organization)   • Performance  depending  on  design  and  coordination  of  bp   • Competitive  strength,  innovation  (assets)  or  liabilities   •  Sets  of  activities,  steps   •  May  be  tied  to  functional  area  or  be  cross-­‐functional  (e.g.  fulfilling  customer   order)   • Businesses:  collection  of  bp  à  information  must  flow  rapidly  between   departments,  supplier,  customer,  business  partners      

 

  •

Information  technology  enhances  business  processes  in  two  main  ways:   o Increasing  efficiency  of  existing  processes   § Automating  steps  that  were  manual   o Enabling  entirely  new  processes  that  are  capable  of  transforming  the   businesses  (new  business  models)   § Change  flow  of  information   § Replace  sequential  steps  with  parallel  steps   § Eliminate  delays  in  decision  making  

 

Types  of  IS   • • •

Typical:  different  kinds  of  systems  supporting  processes  for  each  major  business   function   Large-­‐scale  cross-­‐functional  systems,  integrate  related  activities   Different  systems  supporting  decision  making  needs  management  groups   o Transaction  processing  system   o Management  information  system   o Decision-­‐support  system   o System  for  business  intelligence  

Transaction  processing  systems  /  TPS   • Perform  and  record  daily  routine  transactions  necessary  to  conduct  business   (Examples:  sales  order  entry,  payroll,  shipping)   • Answer  routine  questions,  flow  of  transactions   • Allow  managers  to  monitor  status  of  operations  and  relations  with  external   environment   • Serve  operational  levels  (predefined  tasks,  resources,  goals)   • Serve  predefined,  structured  goals  and  decision  making   • Producing  information  for  other  business  functions    

    Management  information  systems  /  MIS   •  Specific  category  of  IS  to  serve  middle  management,  Are  things  working  well?   •  Provide  reports  on  firm’s  current  performance,  based  on  data  from  TPS,  monitor,   control,  predict  future   •  Provide  answers  to  routine  questions,  predefined  procedure  for  answering   •  Typically  have  little  analytic  capability,  low  flexibility      

 

Decision  support  systems  /  DSS   •  Serve  middle  management,  support  non-­‐routine  decision  making   •  Example:  What  is  impact  on  production  schedule  if  December  sales  doubled?   •  Often  use  external  information  as  well  from  TPS  and  MIS   o Model  driven  DSS  (Voyage-­‐estimating  systems)   o Data  driven  DSS  (Intrawest’s  marketing  analysis  systems)  

    Business  intelligence   • Class  of  software  applications  (organizing,  analyzing,  providing  access)   • Analyze  current  and  historical  data  to  find  patterns  and  trends  and  aid  decision-­‐ making  (long-­‐term)   • Used  in  systems  that  support  middle  and  senior  management   o Data-­‐driven  DSS     o Executive  support  systems  (ESS)     Executive  support  systems   • Support  senior  management  in  non-­‐routine  decisions  (portal)   • Requiring  judgment,  evaluation,  and  insight   • Incorporate  data  about  external  events  (e.g.  new  tax  laws  or  competitors)  as  well   as  summarized  information  from  internal  MIS  and  DSS   • Example:  Digital  dashboard  with  real-­‐time  view  of  firm’s  financial  performance:   working  capital,  accounts  receivable,  accounts  payable,  cash  flow,  and  inventory      

Enterprise  applications   • • • •

   

 Systems  for  linking  the  enterprise  +  span  functional  areas    Execute  business  processes  across  firm  (customer,  supplier,  business  partner)    Include  all  levels  of  management    Four  major  applications:   o  Enterprise  systems   o  Supply  chain  management  systems   o  Customer  relationship  management  systems   o  Knowledge  management  systems  

Enterprise  systems  /  ERP   • Collects  data  from  different  firm  functions  and  stores  data  in  single  central  data   repository  (serves  variety  of  groups)   • Resolves  problem  of  fragmented,  redundant  data  sets  and  systems   • Enable:  coordination  of  daily  activities,  efficient  response  to  customer  orders   (production,  inventory),  Provide  valuable  information  for  improving   management  decision  making       Supply  chain  management  (SCM)  systems     • Manage  firm’s  relationships  with  suppliers,  interorganizational  system   • Share  information  about  orders,  production,  inventory  levels,  delivery  of   products  and  services   • Goal:  right  amount  of  products  to  destination  with  least  amount  of  time  and   lowest  cost       Customer  relationship  management  systems  /  CRM   • Provide  information  to  coordinate  all  of  the  business  processes  that  deal  with   customers  in  sales,  marketing,  and  service  to  optimize  revenue,  customer   satisfaction,  and  customer  retention   • Integrate  firm’s  customer-­‐related  processes  and  consolidate  customer   information  from  multiple  communication  channels       Knowledge  management  systems  (KMS)   • Support  processes  for  acquiring,  creating,  storing,  distributing,  applying,   integrating  knowledge   • How  to  create,  produce,  distribute  products  and  services   • Collect  internal  knowledge  and  experience  within  firm     • Link  to  external  sources  of  knowledge       Alternative  tools  that  increase  integration  and  expedite  the  flow  of  information   •  Intranets:    Internal  company  Web  sites  accessible  only  by  employees   •  Extranets:  Company  Web  sites  accessible  externally  only  to  vendors  and   suppliers     E-­‐business:  Use  of  digital  technology  and  Internet  to  drive  major  business  processes   E-­‐commerce:  Subset  of  e-­‐business;  Buying  and  selling  goods  and  services  through   Internet   E-­‐government:  Using  Internet  technology  to  deliver  information  and  services  to   citizens,  employees,  and  businesses      

Systems  for  Collaboration  and  Teamwork   •



Work  with  others  to  achieve  goals   o Short-­‐lived  or  long-­‐term   o Informal  or  formal  (teams)   o Team:  specific  mission   Growing  importance  of  collaboration:   o Changing  nature  of  work  (jobs  with  interaction)   o Growth  of  professional  work  –  “interaction  jobs”  (specialists)   o Changing  organization  of  the  firm  (hierarchy  à  teams/groups)  

o Changing  scope  of  the  firm  (multiple  locations)   o Emphasis  on  innovation  (=  group  process)   o Changing  culture  of  work  (diversity,  crowdsourcing)  

    Business  benefits  of  collaboration  and  teamwork   • Investments  in  collaboration  technology  can  produce  organizational   improvements  returning  high  ROI   • Productivity,  Quality,  Innovation,  Customer  service,  Financial  performance   • Requirement:    

    Building  a  collaborative  culture  and  business  processes   • “Command  and  control”  organizations  (no  value  placed  on  teamwork  or  lower-­‐ level  participation  in  decisions,  vertical  communication)   • Collaborative  business  culture   o Senior  managers  rely  on  teams  of  employees   o Policies,  products,  designs,  processes,  systems  rely  on  teams   o Managers  purpose  is  to  build  teams,  giving  reward  to  teams,  and  indiv.     Tools  +  Technology  for  collaboration  and  teamwork    

Social  Networking     Wikis        

   

   

Virtual  Worlds  (SecondLife)    

 

Internet-­‐Based  Collaboration  Environments   • Virtual  meeting  systems  (telepresence)   • Google  Apps/Google  sites   • Microsoft  SharePoint   • Lotus  Notes       • Two  dimensions  of  collaboration  technologies   o Space  (or  location)  –  remote  or  colocated   o Time  –  synchronous  or  asynchronous    

 

  •

 Six  steps  in  evaluating  software  tools   1.  What  are  your  firm’s  collaboration  challenges?   2.  What  kinds  of  solutions  are  available?     3.  Analyze  available  products’  cost  and  benefits  (incl.  training)   4.  Evaluate  security  risks   5.  Consult  users  for  implementation  and  training  issues   6.  Evaluate  product  vendors  

 

Information  Systems  Function   • •

Responsibility  for  running  described  systems   Managing  technology  

  Information  systems  department   • Formal  organizational  unit  responsible  for  information  technology  services   • Headed  by  chief  information  officer  (CIO)  àOther  senior  positions  include  chief   security  officer  (CSO),  chief  knowledge  officer  (CKO),  chief  privacy  officer  (CPO)   • Programmers  (trained  technical,  specialists,  software  instructions)   • Systems  analysts  (translate  business  problems  into  IS)   • Information  systems  managers  (leaders  of  teams,  analysts,  project  managers,   facility  managers,  ,  database  specilists…)  

End  users   • Representatives  of  other  departments  for  whom  applications  are  developed   • Increasing  role  in  system  design,  development     IT  Governance   • Strategies  and  policies  for  using  IT  in  the  organization   • Specifies  decision  rights  and  framework  for  accountability   • Organization  of  information  systems  function  (centralized,  decentralized,  ROI,   monitoring  etc.)   • Being  able  to  use  IT  efficiently  and  effectively  has  become  more  and  more   essential  to  a  business’  success.    

Chapter  3   Information  Systems,  Organizations,  and  Strategy    

 

 

Organizations  and  Information  Systems    

 

• • • • • •

Information  technology  and  organizations  influence  one  another   IS  built  by  managers  to  serve  interest  of  business  firm   Orga  must  be  open  to  IS  to  benefit  from  technologies   Complex  interaction,  influenced  by  mediating  factors   Manager:  decide  which  systems  to  build,  what  they  will  do  +  how  they  will  be   implemented   Not  all  changes  can  be  foreseen,  results  may  or  not  meet  expectations  

  What  is  an  Organization?   • Technical  definition:     o Stable,  formal  social  structure  that  takes  resources  from  environment  and   processes  them  to  produce  outputs   o 3  elements:  Capital  +  labor  production  factors  from  environment;   transformation  from  organization  into  products/services;  outputs   consumed  by  environment   o Formal  legal  entity  with  internal  rules  and  procedures,  as  well  as  a  social   structure   • Behavioral  definition:  (more  realistic)   o Collection  of  rights,  privileges,  obligations,  and  responsibilities  that  is   delicately  balanced  over  a  period  of  time  through  conflict  and  conflict   resolution   o Working  people  develop  customary  ways  of  working,  attachments  to   existing  relationships,  arrangements  with  subordinates  and  superiors   about  how  to  work,  amount,  conditions  (informal)   • Relation  to  IS:  technical  view:  easy  to  change  arrangement  of  workers  and   machines,  substitution  capital  and  labor;  but  behavior:  IS  change  balance  of   rights,  privileges,  obligations,  responsibilities,  feelings  à  time  and  resources     technical  

behavioral  

 

Features  of  Organizations   • Use  of  hierarchical  structure  (specialists)   • Accountability,  authority  in  system  of  impartial  +  universal  decision  making   (abstract  rules  or  procedures)   • Promote  employees  on  basis  of  technical  qualification  +  professionalism   • Adherence  to  principle  of  efficiency  (may  output,  min  input)   • Routines  and  business  processes     • Organizational  politics,  culture,  environments  and  structures     • Routines  and  business  processes   o Routines  (standard  operating  procedure  –  SOP):  precise  rules,  procedures   and  practices  developed  tocope  with  all  expected  situations  à   productive/efficient   o Business  processes:  Collections  of  routines   o Business  firm:  Collection  of  business  processes   • Organizational  politics     o Divergent  viewpoints  lead  to  political  struggle,  competition,  and  conflict   o Political  resistance  greatly  hampers  organizational  change   • Organizational  culture   o Taken  for  granted,  Encompasses  set  of  assumptions  that  define  goal  and   product  (What  products  the  organization  should  produce,  how  and  where,   for  whom)   o May  be  powerful  unifying  force  as  well  as  restraint  on  change   • Organizational  Environments   o Organizations  and  environments  have  a  reciprocal  relationship   o Open  to,  and  dependent  on,  the  social  and  physical  environment   o Organizations  can  influence  their  environments   o Environments  generally  change  faster  than  organizations  (new  products,   public  tastes,  values,  political  conflict,  raised  by  changes,  threat  to  closely   held  cultural  values,  inhibit  to  make  significant  changes)   o Information  systems  can  be  an  instrument  of  environmental  scanning,  act   as  a  lens  

 

Disruptive  technologies     • Technology/business  innovation  à  radical  change  in  business  landscape  +   environment  (industries  +  markets)   • Substitute  product,  working  much  better  than  current  product  (e.g.  iPods)   • Industries  put  out  of  business,  extended  market  ,  low-­‐cost  competitors   • Riding  with  the  wave  (create  technology),  adapt  business,  others  become   obsolete,  no  firms  benefit  only  customer   • First  movers,  fast  followers     • Organizational  Structure  (5  basic  kinds)   o Entrepreneurial   o Machine  bureaucracy   o Divisionalized  bureaucracy   o Adhocracy  

 

  •

 

Other  organizational  features   o Goals  (coercive,  utilitarian,  normative)   o Constituencies  (benefiting  members,  clients,  stockholders,  public)   o Leadership  styles  (democratic,  authoritarian)   o Tasks  (routine,  nonroutine)   o Surrounding  environments  

Economic  impacts   • • • •



IT  changes  relative  costs  of  capital  and  the  costs  of  information   IS  technology  is  a  factor  of  production,  like  capital  and  labor  (also  a  substitute  for   middle  managers,  buildings,  machinery)   IT  affects  the  cost  and  quality  of  information  and  changes  economics  of   information   Firms  contract/shrink  in  size  because  IT  can  reduce  transaction  costs  (cost   participating  in  markets,  e.g.  locating  distant  suppliers)  à  outsourcing  (same  ore   more  revenues  with  less  employees)   Firms  experience  agency  costs  (cost  of  managing  +  supervising  self-­‐interested   parties  =  agents  (employees))  (nexus  of  contracts)  à  IT  analyzes  info,  easier  for   manager  to  oversee  greater  number  of  employees  à  reducing  costs  

X=  cost   Y=size  

Organizational  and  behavioral  impacts   • IT  flattens  organizations   o Decision  making  pushed  to  lower  levels  (empowering,  higher  educational   level)   o Fewer  managers  needed  (IT  enables  faster  decision  making  and  increases   span  of  control,  eliminating  middle  managers)   • Postindustrial  organizations   o Organizations  flatten  because  in  postindustrial  societies,  authority   increasingly  relies  on  knowledge  and  competence  rather  than  formal   positions  =self  management   o Decentralization  because  knowledge  also  decentralized   o IT  –>  task  force  networked  organization,  groups  of  professionals   o New  approaches  for  evaluating,  organizing,  informing  workers  required   • Organizational  resistance  to  change   o IS  bound  up  in  organizational  politics  because  influence  access  to  a  key   resource  –  information   o IS  potentially  change  organization’s  structure,  culture,  politics,  and  work   à  often  considerable  resistance   o Most  common  reason  for  failure  of  large  projects  is  due  to  organizational   and  political  resistance  to  change  

    Internet  and  organizations   • Internet  increases  accessibility,  storage,  distribution  of  information  +  knowledge   for  organizations   • Internet  can  greatly  lower  transaction  and  agency  costs  (distribution  manuals,   instant  price  info,  sales  info  +  replenishment  orders)   • Simpler  business  processes,  fewer  employees,  flatter  organizations     IS  Design  consider:   • Environment   • Structure  (hierarchy,  routines,  business  processes)   • Culture  and  politics   • Organization  type,  leadership  style   • Main  interest  groups  affected  by  system,  attitudes  of  end  users   • Tasks,  decisions,  business  process  the  system  will  assist    

Using  IS  for  competitive  advantage   • •

Firms  do  better  than  others  (revenue  growth,  profitability,  productivity)  à   higher  stock  market  valuations   Access  to  special  resources  or  use  common  resources  more  efficiently    

Porter’s  competitive  forces  model   • Provides  general  view  of  firm,  its  competitors,  and  environment   • Five  competitive  forces  shape  fate  of  firm   1. Traditional  competitors  (share  market  space  with  competitors  with  new   products,  services,  efficiencies,  switching  costs)   2. New  market  entrants  (high  barriers  to  entry,  new  companies  with  new   equipment,  younger  workers,  innovation,  little  brand  recognition)   3. Substitute  products  and  services  (when  prices  to  high,  lesser  control  about   prices  and  lower  profit  margins)   4. Customers  (ability  to  attract  and  retain  customers,  switch  to  competitors   products?,  price  alone  in  transparent  marketplace  or  product  differentiation)   5. Suppliers  (market  power,  when  firm  cannot  raise  prices  as  fast  as  suppliers)       4  strategies  for  dealing  with  competitive  forces   • Enabled  by  IT  +  IS   • Low-­‐cost  leadership     • Product  differentiation   • Focus  on  market  niche   • Strengthen  customer  and  supplier  intimacy     • Low-­‐cost  leadership   o Produce  products  and  services  at  a  lower  price  than  competitors  while   enhancing  quality  and  level  of  service   o Examples:  Walmart’s  continuous  replenishment  system,  high  speed,  no   large  inventory,  adjust  purchases  depending  on  demands  =efficient   customer  response  system   • Product  differentiation   o Enable  new  products  or  services,  greatly  change  customer  convenience   and  experience  (IS  to  customize  +  personalize  to  fit  precise  specifications   à  mass  customization   o Examples:  Google,  Nike  (NIKEiD),  Apple  (iPod  +  iTunes)   •  Focus  on  market  niche   o Use  IS  to  enable  a  focused  strategy  on  a  single  market  niche;  specialize,   analyzing,  buying  patterns,  tastes,  preferences  à  marketing  campaigns   o Example:  Hilton  Hotels  OnQ  guest  preferences    profitable  customers   additional  privileges  ,  credit  cards   • Strengthen  customer  and  supplier  intimacy   o Use  IS  to  develop  strong  ties  and  loyalty  with  customers  and  suppliers;   increase  switching  costs   o Example:  Netflix,  Amazon  (recommended  books)     Internet’s  impact  on  competitive  advantage   • Transformation,  destruction,  threat  to  some  industries,  also  opportunities   • Competitive  forces  still  at  work,  but  rivalry  more  intense   • Universal  standards  allow  new  rivals,  entrants  to  market   • New  opportunities  for  building  brands  and  loyal  customer  bases   • Easier  substitution,  bargaining  power,  positioning          

Business  value  chain  model   • Where  to  start  to  gain  operational  excellence   • Views  firm  as  series  of  activities  that  add  value  to  products  or  services  (primary   vs.  support  activities)   o Primary  act.:  Most  directly  related  to  production/distribution  create  value   for  customer  (inbound  logistics,  operations,  outbound  logistics,  sales,   marketing,  service)   o Supportive  act.:    make  delivery  of  p.a.  possible,  organization   infrastructure,  HR,  technology,  procurement)   • Highlights  activities  where  competitive  strategies  can  best  be  applied  (IS  most   strategic  impact)   • At  each  stage,  determine  how  information  systems  can  improve  operational   efficiency  and  improve  customer  and  supplier  intimacy   • Utilize  benchmarking  (comparing  efficiency,  effectiveness),  industry  best   practices  (consulting  companies,  research),  result:  SCMS,  CRMS  

• •

  Analyzing  various  stages  à  candidate  applications  of  IS     Decide  which  to  develop  first,  making  improvement  in  own  value  chain    

  Value  Web  (Extending  Value  Chain)   • Collection  of  independent  firms  using  highly  synchronized  IT  to  coordinate  value   chains  to  produce  product  or  service  collectively  (industrial  standards,  higher   entry  costs,  lesser  substitution,  increase  efficiency,  networks))   • Strategic  advantage:  link  own  value  chain  with  vc  of  other  partners  (Amazon:   Marketplace,  quick  paying,  shipment  system,  tracking)   • More  customer  driven,  less  linear  operation  than  traditional  value  chain   • Value  web  =  highly  synchronized  industry  value  chains,  flexible  +  adaptive  to   changes  in  supply/demand,  accelerate  time  to  market  +  customers  

    Synergies   • Output  of  some  units  used  as  inputs  to  others,  organizations  pool  markets  and   expertise   • Lower  costs,  generate  profits  (e.g.  merging  banks)   • IT:  tie  together  operations  of  disparate  business  units  (act  as  whole)     Enhancing  core  competencies   • Activity  for  which  firm  is  world-­‐class  leader   • Relies  on  knowledge,  experience,  and  sharing  this  across  business  units   • Enhance  existence,  help  employees  become  aware  of  external  knowledge,   leverage  to  related  markets   • Example:  Procter  &  Gamble’s  InnovationNet  and  directory  of  subject  matter   experts     Network-­‐based  strategies   • Take  advantage  of  firm’s  abilities  to  network  with  each  other   • Include  use  of:  network  economics,  virtual  company  model,  business  ecosystems   • Traditional  economics:  Law  of  diminishing  returns   o The  more  any  given  resource  is  applied  to  production,  the  lower  the   marginal  gain  in  output,  until  a  point  is  reached  where  the  additional   inputs  produce  no  additional  outputs   • Network  economics:   o Marginal  cost  of  adding  new  participant  almost  zero,  with  much  greater   marginal  gain   o Value  of  community  grows  with  size  (e.g.  communities  à  customer   loyalty,  enjoyment)  





o Value  of  software  grows  as  installed  customer  base  grows   Virtual  company  strategy   o uses  networks  to  ally  with  other  companies  to  create  and  distribute   products  without  being  limited  by  traditional  organizational  boundaries   or  physical  locations  (link  people,  assets,  ideas)   o when  cheaper  to  acquire  products,  services…,  or  when  to  move  quickly   o E.g.  Li  &  Fung  manages  production,  shipment  of  garments  for  major   fashion  companies,  outsourcing  all  work  to  over  7,500  suppliers     Business  ecosystems  (modification  Porter)   o Industry  sets  of  firms  (instead  of  only  one  industry)  providing  related   services  and  products,  loosely  coupled,  but  interdependent  networks   o Theory:  Value  web  but  with  many  industries  (not  only  firms)  –  e.g   Walmart,  Microsoft   o Keystone  firms:  Dominate  ecosystem  and  create  platform  used  by  other   firms   o Niche  firms:  Rely  on  platform  developed  by  keystone  firm   o Individual  firms  can  consider  how  IT  will  help  them  become  profitable   niche  players  in  larger  ecosystems   o Use  IS  to  develop  into  keystone  firm   o E.g.:  ecosystem  mobile  digital  platform  (device  makers,  wireless  telefirms,   application  providers,  internet  service  providers  

 

 

 

Management  Issues   •

Strategic  IS  change  organizationa,  product,  services,  procedures,  new  behavioral   patterns   Success  is  a  challenge,  requiring  precise  coordination  of  techolgy,  orga  and  mgt.  

•   Sustaining  competitive  advantage   • Because  competitors  can  retaliate  and  copy  strategic  systems,  competitive   advantage  is  not  always  sustainable;     • Systems  may  become  tools  for  survival,  required  to  stay  in  business   • Globalization:  even  more  rapid  changes,  unpredictable  

  Aligning  IT  with  business  objectives   a. The  more  successfully  a  firm  can  align  IT  with  business  goals,  the  more  profitable   it  will  be   b. Only  one  quarter  of  firms  achieve  this  alignment  because  IT  takes  life  of  its  own,   doesn’t  serve  management  interest,  instead  of  shaping  IZ  to  enterprise,  often   ignored  and  worked  around    Performing  strategic  systems  analysis   •  What  is  structure  of  industry?  à  competitive  forces,  new  entrants,  relative   power  of  suppliers,  customers,  substitute  products,  services,  prices   •  What  are  value  chains  for  this  firm,  businesses,  industry?  à  value  for  customer,   lower  prices,  better  quality,  using  best  practices,  maximum  advantage  of  SCM  +   CRM,  ERP,  leverage  core  competencies,  changes  beefit  or  harming,  strategic   partnerships,  value  webs,  where  greatest  value  of  IS   • IT  aligned  with  business  strategy  and  goals?  à  correctly  articulated,  IT   improving  right  bp,  right  metrics  to  measure  

  Managing  strategic  transitions   •

                                                       

• •

Adopting  strategic  systems  requires  changes  in  business  goals,  relationships  with   customers  and  suppliers,  and  business  processes  (=  sociotechnical  changes  =   strategic  transisions  =  movement  between  levels  of  sociotechnical  systems   Blurring  orga  boundaries  (external  +  internal)     Linked  customers  and  suppliers,  sharing  responsibilities  

Chapter  4   Ethical  and  Social  Issues  in  Information  Systems  

  Understanding  Ethical  and  Social  Issues   • Lapses  in  management  ethical  and  business  judgment   • Judges  sentence  executives  based  on  the  monetary  vale,  prevention,  hide  the   crime,  failure  to  corporate   • Past  companies  often  paid  for  employees  in  civil  charges,  now  firms  cooperate   with  prosecutors  to  reduce  charges  against  entire  firm   • Decide  as  a  manager  and  employee  about  ethical  and  legal  conduct   • Ethics  =  principles  of  right  and  wrong  to  guide  behaviors  (free  moral  agents)   • IS  opportunity  for  intense  social  change,  threatening  existing  distributions  of   power,  money,  right,  obligations,  new  kinds  of  crime   • Used  to  achieve  social  progress,  commit  crimes,  threaten  social  values  (benefits  +   costs)   • Concerns  about  appropriate  use  of  customer  information,  protection  privacy,   intellectual  property   • Accountability  for  consequences  of  IS?,  standards?     Model  for  thinking  about  ethical,  social,  political  issues   • Society  =  calm  pond  with  individuals,  institutions,  rules,  laws   • New  IT:  rock  à  ripple  effect  à  raising  issues     • 5  moral  dimensions  of  the  information  age:     o Information  rights  and  obligations  (possessing,  protecting)   o Property  rights  and  obligations  (easy  ignoring,  protecting)   o System  quality  (standards  of  data)   o Quality  of  life  (values  reserved,  protect  institutions  from  violation,  cultural   values  and  practices)   o Accountability  and  control  (when  harm  done  to  so.)   • time  to  respond  with  etiquette  and  laws  (legal  gray  area)    

 

• • • • • •

Is  for  core  production  process  à  dependence  on  system  +  vulnerability   Data  storage_  cheap  and  effective,  combine  detailed  info  from  different  sources.   Electronic  dossiers  à  profiling  (e.g.  credit  cards)   e.g  DoubleClick  (info  about  online  visitors.  Habits  spending,  computing   e.g.  ChoicePoint  (info  police,  criminal,  motor  vehicle  records)  =  data  broker   business   New  technology:  nonobvious  relationship  awareness  (NORA)  à  find  hidden   connections     Data  from  Watch  Lists,  Incident  and  Arrest  Systems,  Customer  Transactions   Systems,  Telephone  records,  Human  Resources  Systems  

  Ethics  in  Information  Society   • Ethics  =  concern  of  humans  who  have  a  freedom  of  choice   • Choosing  the  correct  moral  choice  à  responsibility  (key  element)   • Responsibility:  accept  potential  costs,  duties,  obligations   • Accountability:  feature  of  systems/social  institutions,  determine  who  is   responsible   • Liability:  feature  of  political  systems,  body  of  laws,  permits  indiv.  recover  from   damages   • Due  process:  Laws  are  well  known  and  understood,  with  an  ability  to  appeal  to   higher  authorities     • You  can/will  be  held  accountable,  recover  through  set  of  laws  by  due  process     Ethical  Analysis   1. Identify  and  describe  clearly  the  facts   2. Describe  conflict  and  dilemma  and  identify  the  higher-­‐order  values  involved   3. Identify  the  stakeholders   4. Identify  the  options  that  you  can  reasonably  take   5. Identify  the  potential  consequences  of  your  options     Ethical  Principles  (after  analysis)   • Golden  Rule:  Do  unto  others  as  you  would  have  them  do  unto  you  (putting   yourself  in  the  place  of  others)   • Categorical  Imperative  (Immanuel  Kant):  If  an  action  is  not  right  for  everyone  to   take,  it  is  not  right  for  anyone   • Rule  of  Change  (Descartes):  If  an  action  cannot  be  taken  repeatedly  it  is  not  right   to  take  at  all.   • Utilitarian  Principle:  Take  the  action  that  achieves  the  higher  or  greater  value   • Risk  Aversion  Principle:  Take  the  action  that  produces  the  least  harm  or  the  least   potential  cost  

 



Ethical  “no  free  lunch”  rule:  Assume  that  virtually  all  tangible  and  intangible   objects  are  owned  by  someone  else,  unless  there  is  a  specific  declaration   otherwise  

  Processional  Codes  of  Conduct   • Professionals:  special  rights/obligations,  because  of  special  claims  knowledge,   wisdom,  respect   • Codes  of  conduct  promulgated  (verkünden)  by  associations  of  professionals     • Codes  of  ethics  =  promises  to  regulate  themselves  in  interest  of  society   • Real  world  ethical  dilemmas:  set  of  interests  pitted  against  another    

Information  Rights:  privacy  and  freedom   •

• • •

 



• •

Privacy:  claim  of  individuals  to  be  left  alone/  free  from  surveillance/interference   from  other  individuals,  organizations,  state.  Claim  to  be  able  to  control   information  about  yourself   IT:  threaten  claims  by  making  invasion  cheap,  profitable,  effective   US  privacy:  First  Amendment  (freedom  of  speech),  Fourth  Amendment   (unreasonable  search  and  seizure),  Add.  Federal  statues  (Privacy  Act)   Most  laws  based  on  regime  Fair  Information  Practices  (FIP)  =  set  of  principles   governing  the  collection  and  use  of  information  about  individuals,  guidelines  to   drive  changes  in  privacy  legislation  (advertising,  personal  identification   numbers)    

  EU:  1998  Commissions  Data  Protection  Directive,  costumer  must  consent  before   companies  legally  can  use  data,  disclosure  how  stored  and  used,  no  transfer  to   countries  without  similar  protection   Informed  consent  =  consent  given  with  knowledge  of  all  the  facts  needed  to  make   a  rational  decision   Safe  harbor  framework  =  private  self-­‐regulating  policy  and  enforcement   mechanism,  meets  objectives  of  government  regulators  

  Internet  Challenges  to  Privacy   • Cookies  =small  text  files,  identify  web  browser,  track  visits,  updated,  customize     • Combining  data  from  different  sources  à  detailed  profile   • Web  beacons  (Web  bugs)  =  tiny  object  invisibly  embedded  in  e-­‐mail  messages,  to   monitor  behavior  (IP  address,  time,  how  long,  type  of  browser,  cookie  values   • Spyware  secretly  install  itself  ,  send  banner  ads,  report  activity  on  the  computer     • GOOGLE:  used  by  75%  of  internet  users  à  largest  collection  of  personal  info   • Behavioral  targeting:  target  ads  google  search,  gmail,  blogginh,  youtube  etc.   • US  businesses  allowed  to  gather  and  use  info  without  informed  consenst  

• • • • •

Opt-­‐out  models  permits  use  until  request  to  stop   Preferred  by  advocates:  opt-­‐in  models     Online  industry  preffering  self-­‐regulation  to  privacy  legislation,  Alliances  à   online  seals  (TRUSTe,  Network  Advertising  Initiative)   Ebusiness  do  little  to  protect  privacy,  customers  do  not  enough   Consumers  want  more  access  and  control  

  Technical  Solutions   • Technologies  to  protect  privcy  (e.g  encryption,  anonymous,  prevent  cookies,   detect  and  eliminate  spyware)   • Tools  to  determine  kind  od  extracted  date   • P3P  (Platform  for  Privacy  Preferences):     o Allows  Web  sites  to  communicate  privacy  policies  to  visitor’s  Web   browser  –  user   o User  specifies  privacy  levels  desired  in  browser  settings   o E.g.  “medium”  level  accepts  cookies  from  first-­‐party  host  sites  that  have   opt-­‐in  or  opt-­‐out  policies  but  rejects  third-­‐party  cookies  that  use   personally  identifiable  information  without  an  opt-­‐in  policy   • Policies  need  to  be  codified  according  to  P3P  rules,  only  works  with  this  web  sites      

Property  Rights:  Intellectual  Property   • • • •



Intangible  property  created  by  individuals  or  corporations   IT  difficult  to  protect,  easy  copied  and  distributed   Trade  Secrets  =  any  intellectual  work  product  (formula,  device,  pattern,   compilation)  used  for  business  purpose,  not  in  the  public  domain   Copyright:  Statutory  grant  protecting  intellectual  property  from  being  copied  for   the  life  of  the  author,  plus  70  years,  corporate  owned  95  years,  not  protecting  the   idea,  only  the  manifestation  in  a  creative  work,  ideas  and  expression  merge  =   expression  can  not  be  copyrighted   Patents:  Grants  creator  of  invention  an  exclusive  monopoly  on  ideas  behind   invention  for  20  years,  machine,  devices,  methods  à  full  rewets,  licensing;   criteria:  nonobviousness,  originality,  novelty,  years  of  waiting  

  Challenges  to  intellectual  property  rights   • Digital  media  different  from  physical  media  (e.g.  books):  Ease  of  replication,  ease   of  transmission  (networks,  Internet).  Difficulty  in  classifying  software,   Compactness,  Difficulties  in  establishing  uniqueness   • Easiy  to  share  files  online,  illegal,  piracy,  normal  for  songs  and  movies  à   developing  mechanism  to  sell  intellectual  property  legally   • Digital  Millennium  Copyright  Act  (DMCA)  makes  it  illegal  to  circumvent   technology-­‐based  protections  of  copyrighted  materials     Accountability,  Liability,  and  Control   • Computer-­‐related  liability  problems:    If  software  fails,  who  is  responsible?   • If  seen  as  part  of  machine  that  injures  or  harms,  software  producer  and  operator   may  be  liable   • If  seen  as  similar  to  book,  difficult  to  hold  author/publisher  responsible   (exception:  fraud,  defamation)   • Software  different  from  book:  expectations  of  infallibility,  inspected,  perform  a   task,  people  depend  on  services,  liability  law  extending  to  include  software  

  System  Quality:  Data  Quality  and  System  Errors   • What  is  an  acceptable,  technologically  feasible  level  of  system  quality?  Flawless   software  is  economically  unfeasible   • Three  principal  sources  of  poor  system  performance:   o Software  bugs,  errors   o Hardware  or  facility  failures   o Poor  input  data  quality  (most  common  source  of  business  system  failure)     Quality  of  life:  Equity,  access,  and  boundaries  (Negative  social  consequences  of  systems)   • Many  not  violations  of  property  crimes,  but  can  be  very  harmful,  potentially  can   destroy  valuable  elements  of  our  culture  and  society,  even  when  the  bring   benefits   • Balancing  power:  Although  computing  power  decentralizing,  key  decision-­‐ making  remains  centralized   • Rapidity  of  change:  Businesses  may  not  have  enough  time  to  respond  to  global   competition  à  just  in  time  society,  jobs,  families,  vacations   • Maintaining  boundaries:  Computing,  Internet  use  lengthens  work-­‐day,  infringes   on  family,  personal  time   • Dependence  and  vulnerability:  Public  and  private  organizations  ever  more   dependent  on  computer  systems   • Computer  crime  and  abuse   o Computer  crime:  Commission  of  illegal  acts  through  use  of  compute  or   against  a  computer  system  –  computer  may  be  object  or  instrument  of   crime   o Computer  abuse:  Unethical  acts,  not  illegal  (e.g.  Spam:  High  costs  for   businesses  in  dealing  with  spam   o Conduct  surveillance  of  employees  and  ordinary  citizens   • Employment:  Reengineering  work/redesign  business  processes)  resulting  in  lost   jobs   • Equity  and  access  –  the  digital  divide:  Certain  ethnic  and  income  groups  in  the   United  States  less  likely  to  have  computers  or  Internet  access   • Health  risks:   o Repetitive  stress  injury  (RSI):  most  common,  largest  source  is  computer   keyboards,  Carpal  Tunnel  Syndrome  (CTS)   o Back,  neck  pain,  leg  stress,  foot  pain   o Computer  vision  syndrome  (CVS)  –  eyestrain  condition   o Technostress:  aggravations,  hostility  towards  humans,  impatience,  fatigue   o Role  of  radiation,  screen  emissions,  low-­‐level  electromagnetic  fields  not   been  proved,  unknown  effects   o Digital  technologies  are  damaging  ability  to  think  clearly  and  focus,  try  to   multitask,  concentration,  interruptions                    

Chapter  5   IT  Infrastructure  and  Emerging  Technologies  

  IT  Infrastructure   • Shared  technology  resources  providing  platform  for  specific  IS  applications   • Investment  in  hardware,  software,  services  (consulting,  education,  training)   • Foundation  for  serving  customers,  working  with  vendors,  managing  business   process   • Set  of  physical  devices  and  software  required  to  operate  enterprise   • Set  of  firmwide  services   o Computing  platforms  providing  computing  services  (e.g  desktop   computer,  laptop)   o Telecommunications  services   o Data  management  services  (+analyzing)   o Application  software  services  (ERP,  CRM,  SCM,  KMS)   o Physical  facilities  management  services   o IT  management  (plan  infrastr.  Coordinate  with  BU),  standards  (policies),   education  (training)  ,  research  and  development  services  (future   investments)   • “Service  platform”  perspective  more  accurate  view  of  value  of  investments     Evolution  of  IT  Infrastructure   • General-­‐purpose  mainframe  &  minicomputer  era:  1959  to  present   o 1958  IBM  first  mainframes  introduced  (centralized)  –  support  thousands   online  remote  terminals  connected   o 1965  Less  expensive  DEC  minicomputers  (more  decentralized)   • Personal  computer  era:  1981  to  present   o 1981  Introduction  of  IBM  PC   o Proliferation  in  80s,  90s  resulted  in  growth  of  personal  software   o Wintel  PC  (95%)   • Client/server  era:  1983  to  present   o Desktop  clients  networked  to  servers,  with  processing  work  split  between   clients  and  servers   o Network  may  be  two-­‐tiered  or  multitiered  (N-­‐tiered)   o Various  types  of  servers  (network,  application,  Web)   o Smaller,  inexpensive  machines,  costs  less,  computing  power  explosion  

 

 





Enterprise  computing  era:  1992  to  present   o Move  toward  integrating  disparate  networks,  applications  using  Internet   standards  and  enterprise  applications   o Free  information  flow,  link  different  types  of  hardware,  includes  public   infrastructures,  link  applications,  web  services   Cloud  and  Mobile  Computing:  2000  to  present   o Refers  to  a  model  of  computing  where  firms  and  individuals  obtain   computing  power  and  software  applications  over  the  Internet  or  other   network  (shared  pool  of  computing  resources)   o Fastest  growing  form  of  computing  

  Technology  drivers  of  infrastructure  evolution   • Moore’s  law  and  microprocessing  power   o Computing  power(2)/microprocessing  power  (1)  doubles  every  18   months;  the  price  for  computing  falls  by  half  every  18  months  (3)   o Nanotechnology:  Shrinks  size  of  transistors  to  size  comparable  to  size  of  a   virus,  width  of  several  atoms   • Law  of  Mass  Digital  Storage   o The  amount  of  data  being  stored  each  year  doubles   o Cost  is  falling  at  an  exponential  rate  of  100%/year   • Metcalfe’s  Law  and  network  economics   o Value  or  power  of  a  network  grows  exponentially  as  a  function  of  the   number  of  network  members   o As  network  members  increase,  more  people  want  to  use  it  (demand  for   network  access  increases)   • Declining  communication  costs  and  the  Internet   o An  estimated  1.8  billion  people  worldwide  have  Internet  access   o As  communication  costs  fall  toward  a  very  small  number  and  approach  0,   utilization  of  communication  and  computing  facilities  explodes  à  fimrs   greatly  expand  Internet  connections,  power  of  their  networks…   • Technology  standards  and  network  effects   o Specifications  that  establish  the  compatibility  of  products  and  the  ability   to  communicate  in  a  network   o Unleash  powerful  economies  of  scale  and  result  in  price  declines  as   manufacturers  focus  on  the  products  built  to  a  single  standard   o E.g.  Win  OS,  Microsoft  office,  Unix  (enterprise  server),  Ethernet,  TCP/IP     7  main  IT  Infrastructure  components   1. Computer  hardware  platforms  (Dell,  IBM,  Sun,  HP;  Apple,  Linux)   o Client  machines  and  servers  (blade  servers:  ultrathin  computers  stored  in   racks)   o Mainframes:  IBM  mainframe  equivalent  to  thousands  of  blade  servers   o Top  chip  producers:  AMD,  Intel,  IBM   o Top  firms:  IBM,  HP,  Dell,  Sun  Microsystems   2. Operating  system  platforms  (Windows  –  75%  server  –  90%  clients,  Unix  +  Linux  -­‐ 25%  server,  Mac  OS  X,  Google  Chrome  –  cloud  computing,  iOs,  Android  for   handheld  devices)   3. Enterprise  software  applications  (SAP,  Oracle,  middleware  provider:  BEA,   Microsoft)  

4. Data  management  and  storage  (IBM  DB2,  Oracle,  Microsoft  SQL  Server,  Sybase,   MySQL)   o Data  management  software:  responsible  for  organizing/managing  data,   efficiently  accessed  and  used   o Physical  Data  Storage:  EMC  Corp.  (large  scale),  Seagate,  Maxtor,  WD)   o Storage  area  networks  (SANs):  Connect  multiple  storage  devices  on   dedicated  network   5. Networking/telecommunications  platforms  (Linux,  Novell,  Cisco,  Alcatel-­‐Lucent)   o Telecommunication  services  (cable,  telephones,  voice  lines,  Internet)   o Network  Operating  Systems  (Windows  Server,  Unix  …)   o Network  hardware  providers  (Cisco,  Alcatel…)   6. Internet  platforms  (Apache,  Unix,  Cisco,  Java)   o Hardware,  software,  management  services  to  support  company  Web  sites,   (including  Web  hosting  services)  intranets,  extranets   o Trend  to  server  consolidation,  reducing  number  by  increasing  power   o Internet  hardware  server  market:  Dell,  HP/Compaq,  IBM   o Web  development  tools/suites:  Microsoft    (FrontPage,  .NET)  IBM   (WebSphere)  Sun  (Java),  independent  software  developers:  Adobe,   RealMedia   7. Consulting  system  integration  services  (IBM,  EDS,  Accenture)   o Consulting  and  system  integration  services   o Even  large  firms  do  not  have  resources  for  a  full  range  of  support  for  new,   complex  infrastructure   o Software  integration:  ensuring  new  infrastructure  works  with  legacy   systems   o Legacy  systems:  older  Transaction  Processing  Systems  created  for   mainframes  that  would  be  too  costly  to  replace  or  redesign     7  Contemporary  Hardware  Platform  Trends     The  emerging  mobile  digital  platform   • Cell  phones,  smartphones  with  data  transmission,  web  surfing,  e-­‐mail,  and  IM   • Netbooks,  low-­‐cost  lightweight  notebooks  optimized  for  wireless  communication   and  core  computing  tasks   • Tablets  and  networked  e-­‐readers   Grid  computing   • Connects  geographically  remote  computers  into  a  single  network  to  combine   processing  power  and  create  virtual  supercomputer   • Provides  cost  savings,  speed,  agility   Virtualization   • Allows  single  physical  resource  to  act  as  multiple  resources  (i.e.,  run  multiple   instances  of  OS)   • Allows  multiple  physical  resources  to  appear  as  a  single  logical  resource   • Reduces  hardware  and  power  expenditures,  facilitates  hardware  centralization,   higher  utilization  rates   Cloud  computing   • On  demand  self  service  obtained  over  network   • Ubiquitous  network  access  using  standard  network  and  internet  devices   • Location  independent  resource  pooling     • Rapid  elasticity  to  meet  changing  user  demand  

Measured  service,  charged  for  amount  of  resources  used   • Infrastructure  as  a  service  à  use  spare  capacity  e.g.  Amazon  S3   • Platform  as  a  service  à  use  to  develop  own  applications  e.g.  IBM,  Salesforce.com   • Software  as  a  service  à  use  software  over  network  e.g  Google  Apps   • Cloud  can  be  public  or  private   • Allows  companies  to  minimize  IT  investments  (pay  what  you  use  =  utility   computing,  on  demand  computing),  more  flexibility   • Drawbacks:    Concerns  of  security,  reliability,  dependence   Green  computing   • Practices  and  technologies  for  manufacturing,  using,  disposing  of  computing  and   networking  hardware  to  minimize  impact  on  environment   • Reducing  computer  power  consumption  =  high  priority  (power  and  cooling)  à   energy  and  greenhouse  gases   Autonomic  computing   • Industry-­‐wide  effort  to  develop  systems  that  can  configure,  heal  themselves   when  broken,  and  protect  themselves  from  outside  intruders   • Similar  to  self-­‐updating  antivirus  software;  Apple  and  Microsoft  both  use   automatic  updates   High  performance,  power-­‐saving  processors   • Multicore  processors  (chip  more  processor  cores  enhancing  performance,   reduced  power  consumption,  efficient  simultaneous  processing  of  multiple  tasks)     4  Contemporary  Software  Platform  Trends     Linux  and  open-­‐source  software   • Open-­‐source  software:  Produced  by  community  of  programmers,  free  and   modifiable  by  user   • Linux:  Open-­‐source  software  OS,  integration,  works  on  all  major  hardware   Software  for  the  Web   • Java:  Object-­‐oriented  programming  language,  OS  and  processor-­‐independent,   works  on  all  devices,:  Java  Virtual  machine,  applets  run  on  a  web  browser   • Ajax:  Asynchronous  JavaScript  and  XML,  Allows  client  and  server  to  exchange   small  pieces  of  data  without  requiring  the  page  to  be  reloaded   Web  Services   • Software  components  that  exchange  information  using  Web  standards  and   languages,  regardless  of  OS  or  code   • XML:  Extensible  Markup  Language,  More  powerful  and  flexible  than  HTML,   Tagging  allows  computers  to  process  data  automatically,  classifying  presentation   communication  and  storage  of  data   • SOAP:  Simple  Object  Access  Protocol,  Rules  for  structuring  messages  enabling   applications  to  pass  data  and  instructions   Dollar  Rent  A   Car  Webb   • WSDL:  Web  Services  Description  Language,  Framework  for  describing  task   Services  link   performed  by  Web  service  and  capabilities   to  other  web   • UDDI:  Universal  Description,  Discovery,  and  Integration,  Directory  for  locating   sites  booking   system,  no   Web  services   new  code   • SOA:  Service-­‐oriented  architecture:  set  of  self-­‐contained  services  that   required   communicate  with  each  other  to  create  a  working  software  application,   Software  developers  reuse  these  services  in  other  combinations  to  assemble   other  applications  as  needed   •

Software  outsourcing  and  cloud  services   Three  external  sources  for  software:   • Software  packages  (pre-­‐written,  commercially  available)  and  enterprise  software   (large  scale,  single  integrated  worldwide  software  system)   • Software  outsourcing  (development,  maintenance)   o Domestic:  Primarily  for  middleware,  integration  services,  software   support   o Offshore:  Primarily  for  lower  level  maintenance,  data  entry,  call  centers,   although  outsourcing  for  new-­‐program  development  is  increasing   • Cloud-­‐based  software  services   o Software  as  a  service  (SaaS)  accessed  with  Web  browser  over  Internet   o Ranges  from  free  or  low-­‐cost  services  for  individuals  to  business  and   enterprise  software     o Users  pay  on  subscription  or  per-­‐transaction  e.g.  Salesforce.com   o Service  Level  Agreements  (SLAs):  formal  agreement  with  service   providers,  performance  measurement,  support  options   • (Web)  Mashups:  Combinations  of  two  or  more  online  applications,  such  as   combining  mapping  software  (Google  Maps)  with  local  content   • Apps:  Small  pieces  of  software  that  run  on  the  Internet,  on  computer,  or  cell   phone,  Generally  delivered  over  the  Internet   o Success  of  mobile  platform  depends  in  lage  part  on  quantity  and  quality  of   apps,  high  switching  costs     4  Management  Issues     Dealing  with  platform  and  infrastructure  change   • As  firms  shrink  or  grow,  IT  needs  to  be  flexible  and  scalable   • Scalability:  Ability  to  expand  to  serve  larger  numbers  of  users  w/o  break  down   • For  mobile  computing  and  cloud  computing:  new  policies  and  procedures  for   managing,  Contractual  agreements  with  firms  running  clouds  and  distributing   software  required  (SLA)     Management  and  governance   • Who  controls  IT  infrastructure?   • How  should  IT  department  be  organized?   o Centralized:  Central  IT  department  makes  decisions   o Decentralized:  Business  unit  IT  departments  make  own  decisions   • How  are  costs  allocated  between  divisions,  departments?     Making  wise  infrastructure  investments   • Amount  to  spend  on  IT  is  complex  question  (too  much  =  idle  times,  too  less  =  no   delivering,  outperforming  competitors  à  rent  vs.  buy,  security   • Total  cost  of  ownership  (TCO)  model     o Analyzes  direct  and  indirect  costs   o Hardware,  software  account  for  only  about  20%  of  TCO   o Other  administration  costs:  Installation,  training,  support,  maintenance,   infrastructure,  downtime,  space  and  energy   o TCO  can  be  reduced  through  better  management,  use  of  cloud  services,   greater  centralization  and  standardization  of  hardware  and  software   resources  

Competitive  forces  model  for  IT  infrastructure  investment   1. Market  demand  for  firm’s  services  (inventory  of  current  services  meet  needs  of   groups  of  customers,  suppliers,  employees,  complaining?)   2. Firm’s  business  strategy  (analyze  5  year  business  strategy,  requirement  to   achieve  strategic  goals?)   3. Firm’s  IT  strategy,  infrastructure,  and  cost  (TCO  analysis,  5  years  IT  strategy)   4. Information  technology  assessment  (behind  or  on  the  bleeding  edge  to  be   avoided,  standards  should  be  established,  multiple  cost  competing  vendors)   5. Competitor  firm  services  (quantitative  and  qualitative  measures  to  compare)   6. Competitor  firm  IT  infrastructure  investments  (benchmark  expenditures  for  IT   infrastructure)    

                                   

 

Chapter  6   Foundations  of  Business  Intelligence:  Database  and  Information   Management    

• •

Effective  IS  provides  accurate,  timely  and  relevant  information   Often:  poorly  organized  and  maintained  data  

  File  organization  concepts   • Field:  Group  of  characters  as  word(s)  or  number   o Describes  an  entity  (person,  place,  thing  on  which  we  store  information)   o Attribute:  Each  characteristic,  or  quality,  describing  entity   • Record:  Group  of  related  fields,  describing  entitiy   • File:  Group  of  records  of  same  type     • Database:  Group  of  related  files    

    Problems  with  traditional  file  environment   • Traditional  approach:  files  maintained  separately  by  different  departments  with   unique  data  files  and  own  applications   • Data  redundancy:  Presence  of  duplicate  data  in  multiple  files,  waste  storage  res.   • Data  inconsistency:  Same  attribute  has  different  values,  or  names,  coding  systems   • Program-­‐data  dependence:  When  changes  in  program  requires  changes  to  data   accessed  by  program,  other  programs  don’t  work  anymore   • Lack  of  flexibility,  only  routine  scheduled  reports,  no  ad  hoc  requests   • Poor  security,  not  knowing  who  has  access  and  changes  the  data   • Lack  of  data  sharing  and  availability  (no  trust  in  accuracy)    

Database  Approach  to  Data  Management   Database   • Serves  many  applications  by  centralizing  data  and  controlling  redundant  data   using  a  DBMS   Database  management  system  (DBMS)   • Software  to  organize,  centralize,  manage  data  efficiently,  provide  access   • Interfaces  between  applications  and  physical  data  files   • Separates  logical  and  physical  views  of  data  (user  don’t  need  to  know  where  the   data  actually  is  stored  and  organized  (physical  view),  only  see  the  data  as  they   would  be  perceived  (logical  view)  à  available  for  different  logical  views   • Solves  problems  of  traditional  file  environment   o Controls  redundancy  by  minimizing  isolated  files   o Eliminates  inconsistency   o Uncouples  programs  and  data   o Enables  organization  to  centrally  manage  data  and  data  security,  reducing   costs,  ad  hoc  queries   Relational  DBMS   • Keep  track  of  entities,  attributes,  relationships   • Represent  data  as  two-­‐dimensional  tables  called  relations  or  files   • Each  table  contains  data  on  entity  and  its  attributes   • E.g.  Microsoft  Access  =  relational  DBMS  for  desktop  systems,  MySQL   Table:  grid  of  columns  and  rows   • Rows  (tuples):  Records  for  different  entities   • Fields  (columns):  Represents  attribute  for  entity   • Key  field:  Field  used  to  uniquely  identify  each  record,     • Primary  key:  Field  in  table  used  for  key  fields,  cannot  be  duplicated   • Foreign  key:  Primary  key  used  in  second  table  as  look-­‐up  field  to  identify  records   from  original  table    

  Operations  of  a  Relational  DBMS  (Three  basic  operations  to  develop  useful  sets  of  data)   • SELECT:  Creates  subset  of  data  of  all  records  that  meet  stated  criteria   • JOIN:  Combines  relational  tables  to  provide  user  with  more  information  than   available  in  individual  tables   • PROJECT:  Creates  subset  of  columns  in  table,  creating  tables  with  only  the   information  specified    

 

Object-­‐Oriented  DBMS  (OODBMS)   • Stores  data  and  procedures  as  objects,  can  be  automatically  retrieved  and  shared   • Objects  can  be  graphics,  multimedia,  Java  applets,  not  only  structured  numbers   and  characters,  integrate  from  various  sources   • Relatively  slow  compared  with  relational  DBMS  for  processing  large  numbers  of   transactions   • Hybrid  object-­‐relational  DBMS:  Provide  capabilities  of  both  OODBMS  and   relational  DBMS     Databases  in  the  cloud   • Typically  less  functionality  than  on-­‐premises  DBs   • Now:  used  by  web-­‐focused  start-­‐ups,  lower  prices   • Amazon  Web  Services  (MySQL,  license  Oracle),  Microsoft  SQL  Azure  (integrating   with  existing  software)   • Charged  based  on  usage  time,  volume  data  stored,  input  requests,  amount  read  or   written   • Able  to  scale  computing  resources  in  response  to  real-­‐time  demand,  costs  low     Capabilities  of  Database  Management  Systems   • Organize,  Manage,  Access  data  in  the  database   • Data  definition  capability:  Specifies  structure  of  database  content,  used  to  create   tables  and  define  characteristics  of  fields   • Data  dictionary:  Automated  or  manual  file  storing  definitions  of  data  elements   and  their  characteristics  (name,  description,  size,  type,  format,  usage,  ownership,   authorization,  security,  individuals,  business  functions,  programs,  reports)   • Data  manipulation  language:  Used  to  add,  change,  delete,  retrieve  data     o Structured  Query  Language  (SQL)   o Large/midrange  computers:  DB2,  Oracle,  SQL  Server  employ  SQL   o Microsoft  Access  use  user-­‐friendly  tools  of  SQL  for  querying  databases   • Many  DBMS  have  report  generation  capabilities  for  creating  polished  reports   (Crystal  Reports  =  very  popular  report  generator),  developing  system   applications  for  data  entry  screens,  reports,  logic  for  processing  transactions     Designing  Databases   • Conceptual  (logical)  design:  Abstract  model  from  business  perspective   • Physical  design:  How  database  is  arranged  on  direct-­‐access  storage  devices   • Understand  relationship  among  data,  type  of  data,  grouping,  usage,  changes   • Relationships  among  data  elements,  redundant  database  elements   • Most  efficient  way  to  group  data  elements  to  meet  business  requirements,  needs   of  application  programs   • Normalization:  Streamlining  complex  groupings  of  data  to  minimize  redundant   data  elements  and  awkward  many-­‐to-­‐many  relationships  (small,  stable,  flexible   data  structures)   • Enforce  referential  integrity  rules,  ensure  relationships  remain  consistent  (e.g.  no   parts  from  nonexistent  suppliers)   • Entity-­‐relationship  diagram:  Used  by  database  designers  to  document  the  data   model,  Illustrates  relationships  between  entities   • Distributing  databases:  Storing  database  in  more  than  one  place   • Partitioned:  Separate  locations  store  different  parts  of  database   • Replicated:  Central  database  duplicated  in  entirety  at  different  locations    

  Understand  organizations  data  and  how  it  should  be  represented  in  a  database  to  serve   business  well  with  your  data  model,  or  the  data  will  be  inaccurate,  incomplete,  and   difficult  to  retrieve!     Using  Databases  to  improve  business  performance  and  decision-­‐making   • Keep  track  of  basic  transactions   • Provide  information  to  run  business  more  efficiently,  make  better  decisions   • Very  large  databases  and  systems  require  special  capabilities,  tools  to  analyze   large  quantities  of  data,  to  access  data  from  multiple  systems   • Data  warehousing,  data  mining,  tools  for  accessing  internal  databases  through   web     Data  warehousing   • Stores  current  +  historical  data  from  many  core  operational  transaction  systems   • Consolidates  and  standardizes  information  for  use  across  enterprise,  but  data   cannot  be  altered   • Data  warehouse  system  will  provide  query,  analysis,  and  reporting  tools   • E.g.  Catalina  Marketing  largest  loyalty  database  in  the  world,  US  Internal  Revenue   Service  (IRS)  with  Compliance  Data  Warehouse  consolidating  taxpayer  data  from   different  resources  into  relational  structure  (find  out  who  cheats)       Data  marts   • Subset  of  data  warehouse,  smaller,  decentralized   • Summarized  or  highly  focused  portion  of  firm’s  data  for  use  by  specific   population  of  users   • Typically  focuses  on  single  subject  or  line  of  business,  constructed  more  rapidly,   lower  costs   • E.g.  Barnes  and  Noble  point-­‐of-­‐sale,  college  bookstore,  online  sales     Business  Intelligence   • Tools  for  consolidating,  analyzing,  and  providing  access  to  vast  amounts  of  data   to  help  users  make  better  business  decisions  (patterns,  relationships,  insights)   • Principle  tools  include:  Software  for  database  query  and  reporting,   multidimensional  online  analytical  processing  (OLAP),  data  mining     Online  analytical  processing  (OLAP)   • Supports  multidimensional  data  analysis:  Viewing  data  using  multiple   dimensions,  each  aspect  of  information  (product,  pricing,  cost,  region,   time  period)  is  different  dimension   • OLAP  enables  rapid,  online  answers  to  ad  hoc  queries  

• •

Building  3d  cubes  of  data,  can  be  nested  within  cubes  à  complex  views   Either  multidimensional  database  or  tool  creating  multidimensional  views  in   relational  databases  

  Data  mining   • More  discovery  driven  than  OLAP:  finds  hidden  patterns,  relationships  in  large   databases  and  infers  rules  to  predict  future  behavior   • Applications  for  all  functional  areas  of  business,  government,  scientific  work   • E.g.,  Finding  patterns  in  customer  data  for  one-­‐to-­‐one  marketing  campaigns  or  to   identify  profitable  customers.   • Types  of  information  obtainable  from  data  mining   o Associations,  occurrences  linked  to  a  single  event  (coke,  chips,  promotion)   o Sequences,  events  linked  over  time  (house  à  fridge,  oven)   o Classification,  inferring  set  of  rules,  patterns  that  describe  group  item   belongs  (discover  characteristics  of  customers  who  are  likely  to  leave)   o Clustering,  similar  to  classification  where  no  groups  defined  (partitioning   database  into  groups  of  customers  based  on  demographics)   o Forecasting,  use  series  of  existing  values  to  forecast  what  other  values  will   be  (finding  patterns  to  estimate  future  value  of  continuous  variables)   • High  level  analyses  of  patterns  or  trends,  can  also  drill  down  and  provide  more   detail  when  needed   • Predictive  analysis:  Uses  data  mining  techniques,  historical  data,  and   assumptions  about  future  conditions  to  predict  outcomes  of  events  (e.g.   probability  a  customer  will  respond  to  an  offer)     Text  mining   • Extracts  key  elements  from  large  unstructured  data  sets  (e.g.,  stored  e-­‐mails)   • 80%  of  organizations  useful  information   • Discover  patterns,  relationships,  summarize   • New  myriad  ways  unstructured  data  is  generated  by  consumers  and  the  business   uses  for  this  data     Web  mining   • Discovery  and  analysis  of  useful  patterns  and  information  from  WWW  (E.g.,  to   understand  customer  behavior,  evaluate  effectiveness  of  Web  site)   • Web  content  mining  (Knowledge  extracted  from  content  of  Web  pages)   • Web  structure  mining  (E.g.,  links  to  and  from  Web  page)   • Web  usage  mining  (User  interaction  data  recorded  by  Web  server)     Databases  and  the  Web   • Companies  use  Web  to  make  some  internal  databases  available  to  customers   • Typical  configuration  includes:   o Web  server  (accessed  via  web  browser,  client  computer),     o Application  server/middleware/CGI  scripts  (compact  program  using   Common  Gateway  Interface  specification  for  processing  data  on  a  web   server),  translation  HTML  to  SQL,  transfer  information,  handling  all   application  operations  incl.  transaction  processing,  data  access  btw.   Browser  and  database,  takes  requests,  runs  logic  process  transactions,   provides  connectivity   o Database  server  (hosting  DBM)  



Advantages  of  using  Web  for  database  access:   o Ease  of  use  of  browser  software   o Web  interface  requires  few  or  no  changes  to  database   o Inexpensive  to  add  Web  interface  to  system   Creating  new  efficiencies,  opportunities,  business  models  

•   Managing  Data  Resources   Establishing  an  information  policy   • Firm’s  rules,  procedures,  roles  for  sharing,  managing  (disseminating,  acquiring,   classifying,  inventorying),  standardizing  data/information   • Specific  procedures  and  accountabilities   • Data  administration:  Firm  function  responsible  for  specific  policies  and   procedures  to  manage  data  as  a  corporate  organizational  resource  (develop  info   policy,  planning  for  data,  overseeing  logical  database  design,  data  dictionary   development,  monitoring  usage)   • Data  governance:  Policies  and  processes  for  managing  availability,  usability,   integrity,  and  security  of  enterprise  data,  especially  as  it  relates  to  government   regulations,  promoting  privacy,  security,  quality,  compliance   • Database  administration:  Defining,  organizing,  implementing,  maintaining   database;  access  rules,  security  procedures,  performed  by  database  design  and   management  group       Ensuring  data  quality   • More  than  25%  of  critical  data  in  Fortune  1000  company  databases  are   inaccurate  or  incomplete  leading  to  incorrect  decisions,  product  recalls,  financial   losses   • Most  data  quality  problems  stem  from  faulty  input,  esp.  now  when  companies   move  business  to  web  and  customers/suppliers  enter  data  directly   • Before  new  database  in  place,  need  to:   o Identify  and  correct  faulty  data     o Establish  better  routines  for  editing  data  once  database  in  operation   • Data  quality  audit:  Structured  survey  of  the  accuracy  and  level  of  completeness  of   the  data  in  an  IS  (Survey  samples/entire  from  data  files,  or  Survey  end  users  for   perceptions  of  quality)   • Data  cleansing  (scrubbing):  Software  to  detect  and  correct  data  that  are   incorrect,  incomplete,  improperly  formatted,  or  redundant   o Enforces  consistency  among  different  sets  of  data  from  separate  IS                            

Chapter  7   Telecommunications,  the  Internet  and  Wireless  Technology    

Networking  and  communication  trends   • Convergence:  Past:  telephone  networks  (voice  communication,  voice   transmission  tech)  and  computer  networks  (data  traffic)  à  now  converging  into   single  digital  network  using  Internet  standards   • Broadband  access:  more  powerful  (faster)  and  more  portable  (smaller),  less   expensive   • Broadband  wireless:  voice  and    data  communication,  cell  phones..     What  is  a  computer  network?   • Two  or  more  connected  computers   • Major  components  in  simple  network:     • Client  computer  and  Server  computer  (perform  important  network  functions,   serving  web  pages,  storing  data  and  NOS),     • Network  interfaces  (cards:  NICs)  –  build  in  motherboard,     • Connection  medium  (telephone  wire,  coaxial  cable,  radio  signal),     • Network  operating  system  (NOS,  routes  and  manages  communication,   coordinates  network  resources),  Windows  Server,  Linux,  Novell   • Hub  (simple  device,  send  data  to  all  connected  devices)  or  switch  (more   intelligence,  filter  and  forward  data  to  specific  destination)  acting  as  a  connection   point     • Routers:  Device  used  to  route  packets  of  data  through  different  networks,   ensuring  that  data  sent  gets  to  the  correct  address     Networks  in  large  companies  (problem:  coherent  system,  integrations)   • Hundreds  of  local  area  networks  (LANs)  linked  to  firmwide  corporate  network   • Various  powerful  servers  (Website,  Corporate  intranet,  extranet,  Backend)   • Mobile  wireless  LANs  (Wi-­‐Fi  networks)   • Videoconferencing  system   • Separate  Telephone  network  +  Wireless  cell  phones     Key  networking  technologies  (3)   Client/Server  computing   • Distributed  computing  model   • Powerful  Clients  linked  through  network  controlled  by  server  computer   • Server  sets  rules  of  communication,  provides  client  with  an  address   • Has  largely  replaced  centralized  mainframe  computing   • The  Internet:  Largest  implementation  of  client/server  computing     Packet  Switching   • Slicing  digital  messages  into  parcels  (packets),  sending  packets  along  different   communication  paths  as  they  become  available,  reassembling  packets  at   destination   • Previous  circuit-­‐switched  networks  required  assembly  of  complete  point-­‐to-­‐ point  circuit  (expensive,  wasting  capacity)   • More  efficient  use  of  network’s  communications  capacity    

Data  

TCP/IP  and  connectivity   • Connectivity  between  computers  (different  hardware  and  software)  enabled  by   protocols  (Rules  that  govern  transmission  of  information  between  two  points)   • Transmission  Control  Protocol/Internet  Protocol  (TCP/IP):  Common  worldwide   standard  that  is  basis  for  Internet   • TCP:  handles  movement  of  data,  establishes  connection,  sequences  transfer  of   packets   • IP:  responsible  for  delivery  of  packets,  dissembling  and  reassembling  of  packets   during  transmissions   • Four  layers  (department  of  defense  reference  model)   o Application  layer  (enables  apps  access  to  other  layers,  exchange  data   protocol  like  HTTP  (hyper  Text  Transfer  Protocol)   o Transport  layer  (provide  app  layer  with  communication  and  packet   services,  TCP  and  other  protocols)   o Internet  layer  (addressing,  routing,  IP  datagrams  (packaging  data  packets)   o Network  interface  layer  (bottom,  placing  packets,  receiving  them  from   network  medium)     Signals:  digital  vs.  analog   • Analog:  continuous  waveform,  used  for  voice  communications   • Digital:  discrete,  binary  waveform,  strings  of  two  discrete  states  (1  +  0),  on  and   off  electrical  pulses   • Modem:  translates  digital  signals  into  analog  forms  (computing  to  telephone  lines   and  cables)  –  modulator-­‐demodulator     Types  of  networks   Local-­‐area  networks  (LANs)   • Connect  personal  and  other  digital  devices  within  500m  radius   • 1  dedicated  network  file  server,  providing  access  to  shared  resources,  determine   who  gets  access,  in  which  sequence,  large:  various  dedicated  servers   • Router  connects  LAN  to  other  networks  (external  information  exchange)   • Ethernet  =  dominant  LAN  Standard,  physical   • Peer-­‐to-­‐peer  =  treat  all  processors  equally,  exchange  data  by  direct  access,  charge   peripheral  devices  without  server  (Windows:  workgroup,  not  domain  network)   • Topologies  (way  components  are  connected):  star  (single  hub),  bus  (single   transmission  segment,  both  directions,  most  common,  same  signals),  ring  (closed   loop,  ones  station  transmits  at  a  time)   • Campus-­‐area  networks  (CANs),  1000m  radius   • Wide-­‐area  networks  (WANs)  à  e.g.  Internet   • Metropolitan-­‐area  networks  (MANs)     Physical  transmission  media   • Twisted  wire  (modems),  telephone  analog  communication,  but  also  usable  for   digital  (copper)  –  100m,  up  to  1  Gbps   • Coaxial  cable,  larger  volume,  1  Gbps,  longer  distances  (insulated  copper)   • Fiber  optics  and  optical  networks  (bound  strands  glass  fiber,  pulses  of  light)   o Faster,  lighter,  more  durable  for  large  volumes,  expensive   o Dense  wavelength  division  multiplexing  (DWDM)   • Wireless  transmission  media  and  devices  (radio  signals)  



o Microwave:  high  frequencx,  high  vlume,  long  distance,  point  to  point,  fllow   straight  line  (station  every  37  miles)   o Satellites  for  TV  and  Internet   o Cellular  telephones:  radio  waves  +  protocols,  radio  antennas  (towers)  in   cells,  information  passing  from  cell  to  cell   Transmission  speed  (hertz  =  number  of  cycles  per  second,  bandwidth  =  range  of   frequencies  =  difference  between  highest  and  lowest  frequency  on  a  single   channel):  bits  per  second,  function  of  frequency  

  The  Global  Internet   • Connection  by  subscribing  to  Internet  service  provider  (ISP)  with  permanent   connection  selling  temporary  access   • Traditional  telephone  line  and  modem  (56.6  kbps),  Digital  subscriber  line  (DSL,  9   Mbps),  cable  (15  mbps),  satellite,  T  lines  (t1  =  1.54  mbps,  t3  =  45  mbps)   international  telephone  standards,  guaranteed  service  levels)     Internet  addressing  and  architecture   • Internet  Protocol  (OP)  address  unique  per  computer  (4  stings  of  number,  32  bit)   • Decomposed  message  into  packets  with  destination  address  using  TCP  protocol   • The  Domain  Name  System  (DNS)  converts  domain  names  to  IP  addresses   o Hierarchical  structure  (top:  root  domains)   o Top-­‐level  domains  (child  of  root),  .com,  .gov,  .edu,  .de   o Second  level  domain:  two  part,  addition  to  top  level   • Internet  Architecture  and  Governance   o Transcontinental  high  speed  backbone  networks  owned  by  telephone   companies  (network  service  providers)  and  national  governments   o Local  connections  owned  by  regional  telephone/cable  comp.,  leasing   o Organization  pays  for  own  networks,  local  connections  services,  part  to   long  distance  trunk  line  owners,  individuals  subscription  fee  (flat)   o Payments  not  based  on  heaviness,  volume  à  network  neutrality  debate   o Network  access  pints  (NAP),  metropolitan  are  exchanges  (MAEs)  =  hubs   ton  intersection  backbone  and  regional/local  networks     o No  formal  management  but  policies  and  influences  by  IAB  (internet   architecture  board),  ICANN  (internet  corporation  for  assigned  names  and   numbers,  assigning  IP  addresses),  W3C  (world  wide  web  consortium,   HTML  standards)   o Goal  keeping  internet  operating  efficiently,  conform  to  laws  of  the   sovereign  nation-­‐states,  technical  infrastructures   • The  Future  Internet:  IPv6  (more  possibilities,  128bit)  and  Internet2  (=  Next   Generation  Internet  NGI)  -­‐>  working  on  new  robust,  performance  internet  (200   companies,  universities,  governments)  –  developing  new  technologies  routing   practices,  levels  of  service,  importance  of  data,  distributed  computing                  

Internet  Services  and  Communication  Tools  

• • • •

• •

• • •

VoIP   VPN  

Implemented  by  one  or  more  software  programs   Run  on  single  server  computer  or  different  machine   Increase  work  productivity  but  not  always  the  case   Monitoring  or  regulating  online  activity,  ethical  and  privacy  concerns  

  VoIP  reducing  communication  costs  by  20-­‐30%   IP  network:  lowering  long  distance  costs,  eliminating  monthly  fees  for  private   lines,  single  voica  data  infrastructure  for  telecommunications  and  computing,   flexibility  (easy  adding  new  phones,  voce  and  email  combined  into  single   directory  (Bayer  did  that!))   Merge  disparate  communication  modes  into  a  single  universally  accessible   service  using  unified  communications  technology   Past:  dedicated  and  expensive  private  network     Today:  less  expensive  virtual  private  network  (VPN)  within  public  Internet   o Secure,  encrypted,  private  within  public  network   o Advantage  of  economies  of  scale     o Combining  voice  and  data  networks   o Point  to  Point  Tunneling  Protocol  (PPTP)  –  packets  encrypted  and   wrapped  inside  IP  packets  

  World  Wide  Web   • Most  popular  Internet  service,  with  universally  accepted  standards  for  storing,   retrieving,  formatting,  and  displaying  information   • Web  site  =  connection  web  pages  linked  to  a  home  page,  links  to  other  media  

 

• • • •

HTML  (Hypertext  Markup  Language):  Formats  documents  for  display  on  Web,   incorporates  dynamic  links  to  other  media   Hypertext  Transfer  Protocol  (HTTP):  Communications  standard  used  for   transferring  Web  pages   Uniform  resource  locators  (URLs):  Addresses  of  Web  pages   Web  servers:  Software  for  locating  and  managing  Web  pages,  most  common:   open  source  Apache  HTTP  Server  (54%)  

  Searching  for  Information  on  the  Web   • 100  billion  web  pages  public  available,  but  also  deep  web  à  900  billion   additional  pages  cannot  be  visited  without  access  code,  protected   • Search  engines  =  killer  app”  of  Internet  era,  sift  through  different  files   • Started  in  early  1990s  as  relatively  simple  software  programs  using  keyword   indexes,  now  Google    (page  rank  system),  Yahoo,  Bing   • Major  source  of  Internet  advertising  revenue  via  search  engine  marketing,   using  complex  algorithms  and  page  ranking  techniques  to  locate  results   • Sponsors,  paid  search  results  on  top  à  at  the  right  time  match  consumer  interes   • Search  engine  optimization:  better  search  engine  recognitions,  higher  ranks,  on   top  of  the  search  result  list,  improve  quality  and  volume  of  Web  traffic,  popularity   (links  to  that  web  site)   • Challenging  searching  videos   • Intelligent  Agent  shopping  bots:  software  agents  with  built  in  intelligence,  gather   info,  perform  tasks  to  assist  users,  making  purchase  filter,  pricing  and  availability     Web  2.0   • Collaboration,  sharing,  creating  new  services   • 4  defining  features:  Interactivity,  real-­‐time  user  control,  social  participation,   user-­‐generated  content   • Technologies/services:  Cloud  computing,  Blogs/RSS,  Mashups    &  widgets  (mix   and  match  content  or  software  components,  e.g.  Flickr),  Wikis,  Social  networks   • Blog:  chronological  entries,  blog  roll,  trackbacks,  comments,  Templates  (no  HTML   skills  needed)  à  blogosphere   • RSS:  Rich  Site  Summary,  Really  Simple  Syndication  à  syndicates  content,  feeds,   subscribe  and  automatically  receive  new  content   • Wikis:  collaborative  web  sites,  visitors  add,  modify  content,  monitoring  work  à   easy  to  share  information   • Social  networks:  build  communities,  profiles.  Interactivity,  real  time  user  control,   opinions,  how  communicate,  stay  in  touch,  advertising,  +  application   development  platforms     Web  3.0/  future  Web   • Effort  of  W3C  to  add  meaning  to  existing  Web  (woven  all  digital  information,   contacts  together  into  single  meaningful  experience)  =  Semantic  Web   • Make  searching  more  relevant  to  user,  meaningful  +  productive  (better  results)   • More  “intelligent”  computing,  analyze  and  manipulate,  reduce  amount  of  human   involvement  in  searching  and  processing  web  information   • 3D  Web  (walk  through  pages)   • Pervasive  Web  (controls  everything,  managing)   • Increase  in  cloud  computing,  SaaS,  Ubiquitous  connectivity  between  mobile  and   other  access  devices,  Make  Web  a  more  seamless  experience  

The  Wireless  Revolution   • Cell  phones,  laptops,  handheld  devices  à  portable  computing  platforms,   performing  tasks  we  used  to  do  at  our  desks   • Stay  in  touch  with  customers,  suppliers,  employees   • Flexible  arrangements  for  organizing  works   • Creation  of  new  products,  services,  sales  channels   • Smartphones:  email,  messaging,  wireless  Internet,  digital  photography,  personal   information  management  à  small  mobile  computers     Cellular  Systems   • Competing  standards  for  cellular  service   o CDMA(Code  Division  Multiple  Access):  United  States  (Verizon,  Sprint),   transmits  several  frequencies,  entire  spectrum   o GSM  (Global  System  for  Mobile  Communication):  Rest  of  world,  plus  AT&T   and  T-­‐Mobile,  international  roaming  capability   • Third-­‐generation  (3G)  networks:  Suitable  for  broadband  Internet  access  ,  144   Kbps  –  2Mbps,  special  cards  for  PCs   • 4G  networks:  Entirely    packet-­‐switched,  100  Mbps  –  1Gbps,  premium  quality,   high  security  à  Pre-­‐4G:    Long  Term  Evolution  (LTE),  mobile  WiMax     Wireless  computer  networks  and  Internet  access   • Bluetooth  (802.15)     o Links  up  to  8  devices  in  10-­‐m  area,  low  power  radio  signals   o Useful  for  personal  are  networking  (PANs)  and  in  business  to  transmit   data  from  handheld  devices  to  other  transmitters   • Wi-­‐Fi  (802.11)   o Set  of  standards:  802.11a,  802.11b  (11  mbps,  30-­‐50  m),  802.11g  (54   mbps),  802.11n  (100  mbps)   o Used  for  wireless  LAN  and  wireless  Internet  access   o Use  access  points:  bridge  device  with  radio  receiver/transmitter,  antennas   for  connecting  wireless  devices  to  a  wired  LAN,  router,  hub   o Hotspots:  Access  points  in  public  place  to  provide  maximum  wireless   coverage  for  a  specific  area   o Provide  low,  costs  wireless  LANs  and  internet  access   o Weak  security  features,  vulnerable  to  intruders   o Susceptibility  to  interference  from  nearby  systems,  solved  by  n-­‐standard:   multiple  antennas,  MIMO  (multiple  input,  multiple  output)   • WiMax  (802.16)  –  Worldwide  Interoperability  for  Microwave  Access   o Wireless  access  range  of  31  miles,  75  mbps   o Require  WiMax  antennas   o Sprint  Nextel  building  WiMax  network  as  foundation  for  4G  networks     Radio  Frequency  identification  (RFID)   • Use  tiny  tags  with  embedded  microchips  containing  data  about  an  item  and   location,  and  antenna   • Tags  transmit  radio  signals  over  short  distances  to  special  constantly   transmitting  RFID  readers,  which  send  data  over  network  to  computer  for   processing   • Active  RFID:  Tags  have  batteries,  data  can  be  rewritten,  range  is  hundreds  of  feet,   more  expensive  

• •





Passive  RFID:  Range  is  shorter,  also  smaller,  less  expensive,  powered  by  radio   frequency  energy   Common  uses:   o Automated  toll-­‐collection     o Tracking  goods  in  a  supply  chain   o E.g.  Walmart  combining  data  point  of  sale  systems  with  RFID  data    to   determine  which  items  will  soon  be  depleted,  automatically  generates  lists   Requires  companies  to  have  special  hardware  and  software,  massive  amount  of   data  à  Software  to  filter  and  aggregate,  applications  designed  to  accept  large   data  and  share  it  with  other  applications   Reduction  in  cost  of  tags  making  RFID  viable  for  many  firms  

  Wireless  sensor  networks  (WSNs)   • Networks  of  hundreds  or  thousands  of  interconnected  wireless  devices   embedded  into  physical  environment  to  provide  measurements  of  many  points   over  large  spaces   • Devices  (nodes)  have  built-­‐in  processing,  storage,  and  radio  frequency  sensors   and  antennas   • Require  low-­‐power,  long-­‐lasting  batteries  and  ability  to  endure  in  the  field   without  maintenance   • Used  to  monitor  building  security,  detect  hazardous  substances  in  air,  monitor   environmental  changes,  traffic,  or  military  activity   • Data  flowing  to  a  server  with  grater  processing  power,  gateway  to  network  based   on  Internet  technology                                                      

Chapter  8   Securing  Information  Systems  

  System  Vulnerability  and  Abuse   • Security:  Policies,  procedures  and  technical  measures  to  prevent  unauthorized   access,  alteration,  theft,  or  physical  damage   • Controls:  Methods,  policies,  and  organizational  procedures  ensure  safety  of   organization’s  assets;  accuracy  and  reliability  of  accounting  records;  and   operational  adherence  to  management  standards   • Vulnerability  through  technical,  organizational  and  environmental  factors,  poor   management  decisions,  communication  layers   • Accessibility  of  networks   • Hardware  problems  (breakdowns,  configuration  errors,  damage  from  improper   use  or  crime)   • Software  problems  (programming  errors,  installation  errors,  unauthorized   changes)   • Disasters  (fires,  floods..)   • Use  of  networks/computers  outside  of  firm’s  control   • Loss  and  theft  of  portable  devices      

  Internet  vulnerabilities   • Network  open  to  anyone,  Size:  abuses  can  have  wide  impact   • Use  of  fixed  Internet  addresses  creates  fixed  targets  hackers   • Unencrypted  VOIP  (no  use  of  VPN)   • E-­‐mail,  P2P,  IM:  Interception,  Attachments  with  malicious  software,  Transmitting   trade  secrets     Wireless  security  challenges   • Radio  frequency  bands  easy  to  scan   • SSIDs  (service  set  identifiers):  Identify  access  points,  Broadcast  multiple  times   • War  driving:  Eavesdroppers  drive  by  buildings  and  try  to  detect  SSID  and  gain   access  to  network  and  resources,  set  up  rogue  access  points   • WEP  (Wired  Equivalent  Privacy)  WPA2  (WiFi  Protected  Access)   o Security  standard  for  802.11;  use  is  optional   o Uses  shared  password  for  both  users  and  access  point  

 

Malware  (malicious  software)   • Viruses:  Rogue  software  program  that  attaches  itself  to  other  software  programs   or  data  files  in  order  to  be  executed,  deliver  “payload”,  spread  through  humans   • Worms:  Independent  computer  programs  that  copy  themselves  from  one   computer  to  other  computers  over  a  network   • Trojan  horses:  Software  program  that  appears  to  be  benign  but  then  does   something  other  than  expected,  does  not  replicate   • Computers,  mobile  devices,  web  2.0  applications   • SQL  injection  attacks:  Hackers  submit  data  to  Web  forms  that  exploits  site’s   unprotected  software  and  sends  rogue  SQL  query  to  database   • Spyware:  Small  programs  install  themselves  surreptitiously  on  computers  to   monitor  user  Web  surfing  activity  and  serve  up  advertising   • Key  loggers:  Record  every  keystroke  on  computer  to  steal  serial  numbers,   passwords,  launch  Internet  attacks     Hackers  and  computer  crime   • Hackers  vs.  crackers  (criminal  intent):  unauthorized  access,  weakness  in  security   protections   • System  intrusion  +  System  damage   • Cybervandalism:  Intentional  disruption,  defacement,  destruction  of  Web  site  or   corporate  information  system   • Spoofing   o Misrepresenting  oneself  by  using  fake  e-­‐mail  addresses  or  masquerading   as  someone  else   o Redirecting  Web  link  to  address  different  from  intended  one,  with  site   masquerading  as  intended  destination   • Sniffer   o Eavesdropping  program  that  monitors  information  traveling  over   network   o Enables  hackers  to  steal  proprietary  information  such  as  e-­‐mail,  company   files,  etc.   • Denial-­‐of-­‐service  attacks  (DoS):  Flooding  server  with  thousands  of  false  requests   to  crash  the  network.   • Distributed  denial-­‐of-­‐service  attacks  (DDoS):  Use  of  numerous  computers  to   launch  a  DoS   • Botnets:  Networks  of  “zombie”  PCs  infiltrated  by  bot  malware   • Computer  crime:  “any  violations  of  criminal  law  that  involve  a  knowledge  of   computer  technology  for  their  perpetration,  investigation,  or  prosecution”   o Computer  may  be  target  of  crime,  e.g.:  Breaching  confidentiality  of   protected  data,  Accessing  a  computer  system  without  authority   o Computer  may  be  instrument  of  crime,  e.g.:  Theft  of  trade  secrets,  Using  e-­‐ mail  for  threats  or  harassment   • Identity  theft:  Theft  of  personal  Information  (social  security  id,  driver’s  license  or   credit  card  numbers)  to  impersonate  someone  else   • Phishing:  Setting  up  fake  Web  sites  or  sending  e-­‐mail  messages  that  look  like   legitimate  businesses  to  ask  users  for  confidential  personal  data.   • Evil  twins:  Wireless  networks  that  pretend  to  offer  trustworthy  Wi-­‐Fi   connections  to  the  Internet  (e.g  log  credit  card  numbers)   • Pharming:  Redirects  users  to  a  bogus  Web  page,  even  when  individual  types   correct  Web  page  address  into  his  or  her  browser  (possible  when  they  gain  





access  to  the  Internet  Address  Information  stored  by  internet  service  providers   to  speed  up  web  browsing  and  the  ISP  companies  have  flawed  software  in  their   servers,  hack  into  and  change  addresses)   Click  fraud:  Occurs  when  individual  or  computer  program  fraudulently  clicks  on   online  ad  without  any  intention  of  learning  more  about  the  advertiser  or  making   a  purchase   Global  threats:  Cyberterrorism  and  Cyberwarfare,  targeting  software  that  runs   electrical  power  grids,  air  traffic  control  systems,  networks  of  major  banks  

  Internal  threats:  employees   • Security  threats  often  originate  inside  an  organization  leaking  Inside  knowledge   • Sloppy  security  procedures,  User  lack  of  knowledge   • Social  engineering:  Tricking  employees  into  revealing  their  passwords  by   pretending  to  be  legitimate  members  of  the  company  in  need  of  information   • End  users  entering  faulty  data,  not  following  instructions   • IS  specialists:  errors  in  design,  development,  maintenance   Software  vulnerability   • Commercial  software  contains  flaws  that  create  security  vulnerabilities   – Hidden  bugs  (program  code  defects),  Zero  defects  cannot  be  achieved   because  complete  testing  is  not  possible  with  large  programs   – Flaws  can  open  networks  to  intruders,  impede  performance   • Patches:  Vendors  release  small  pieces  of  software  to  repair  flaws  (patch   management  by  users),  However  exploits  often  created  faster  than  patches  be   released  and  implemented     Business  Value  of  Security  and  Control   • Failed  computer  systems  can  lead  to  significant  or  total  loss  of  business  function   • Confidential  personal  and  financial  data,  Trade  secrets,  new  products,  strategies   • A  security  breach  may  cut  into  firm’s  market  value  almost  immediately   • Inadequate  security  and  controls  also  bring  forth  issues  of  liability   • Strong  security:  high  ROI,  employees  productivity,  lower  operational  costs     Legal  and  regulatory  requirements  for  electronic  records  management  and  privacy   protection   • Protection  data  from  abuse,  exposure,  unauthorized  access   • HIPAA:  Medical  security  and  privacy  rules  and  procedures   • Gramm-­‐Leach-­‐Bliley  Act:  Requires  financial  institutions  to  ensure  the  security   and  confidentiality  of  customer  data   • Sarbanes-­‐Oxley  Act:  Imposes  responsibility  on  companies  and  their  management   to  safeguard  the  accuracy  and  integrity  of  financial  information  that  is  used   internally  and  released  externally   Electronic  evidence   • Evidence  for  white  collar  crimes  often  in  digital  form  Data  on  computers,  e-­‐mail,   instant  messages,  e-­‐commerce  transactions   • Proper  control  of  data  can  save  time  and  money  when  responding  to  legal   discovery  request   Computer  forensics:     • Scientific  collection,  examination,  authentication,  preservation,  and  analysis  of   data  from  computer  storage  media  for  use  as  evidence  in  court  of  law   • Includes  recovery  of  ambient  and  hidden  data,  plan  needed  

Establishing  a  Framework  for  Security  and  Control   à  Where  company  at  risk,  what  controls  must  be  in  place,  security  policy,  plans  for   keeping  business  running  if  IS  not  operational   Information  systems  controls     • Manual  and  automated  controls   • General  and  application  controls     General  controls   • Govern  design,  security,  and  use  of  computer  programs  and  security  of  data  files   in  general  throughout  organization’s  IT  infrastructure.   • Apply  to  all  computerized  applications   • Combination  of  hardware,  software,  and  manual  procedures  to  create  overall   control  environment   • Types  of  general  controls:  Software  controls,  Hardware  controls,  Computer   operations  controls,  Data  security  controls,  Implementation  controls,   Administrative  controls     Application  controls   • Specific  controls  unique  to  each  computerized  application,  such  as  payroll  or   order  processing   • Include  both  automated  and  manual  procedures   • Ensure  that  only  authorized  data  are  completely  and  accurately  processed  by   that  application   • Input  controls:  authorization,  conversion,  editing,  error  handling   • Processing  controls:  updating   • Output  controls     Risk  assessment     • Determines  level  of  risk  to  firm  if  specific  activity  or  process  is  not  properly   controlled   • Determine  value  of  info  assets,  points  of  vulnerability,  likely  frequency  of  the   problem,  potential  for  damage   • Concentration  on  the  control  points  with  greatest  vulnerability  and  potential  for   loss     Security  policy   • Ranks  information  risks,  identifies  acceptable  security  goals,  and  identifies   mechanisms  for  achieving  these  goals,  most  important  assets   • Acceptable  use  policy  (AUP):  Defines  acceptable  uses  of  firm’s  information   resources  and  computing  equipment,  unacceptable,  consequences   • Authorization  policies:  Determine  differing  levels  of  user  access  to  information   assets   Identity  management   • Business  processes  and  tools  to  identify  valid  users  of  system  and  control  access:   Identifies  and  authorizes  different  categories  of  users,  Specifies  which  portion  of   system  users  can  access,  Authenticating  users  and  protects  identities   • Identity  management  systems:  Captures  access  rules  for  different  levels  of  users     Disaster  recovery  planning:  Devises  plans  for  restoration  of  disrupted  services   Business  continuity  planning:  Focuses  on  restoring  business  operations  after  disaster  

MIS  audit   • Examines  firm’s  overall  security  environment  as  well  as  controls  governing   individual  information  systems,  data  quality   • Reviews  technologies,  procedures,  documentation,  training,  and  personnel   • Simulate  disaster  to  test  response  of  technology,  IS  staff,  other  employees   • Lists  and  ranks  all  control  weaknesses  and  estimates  probability  of  their   occurrence,  Assesses  financial  and  organizational  impact  of  each  threat     Technologies  and  Tools  for  Protecting  Information  Resources   Identity  management  software   • Automates  keeping  track  of  all  users  and  privileges   • Authenticates  users,  protecting  identities,  controlling  access   • Authentication:  Password  systems,  Tokens,  Smart  cards,  Biometric       Firewall:  Combination  of  hardware  and  software  that  prevents  unauthorized  users  from   accessing  private  networks   • Static  packet  filtering:  examines  selected  fields  in  headers  of  individual  packets   • Stateful  inspections:  track  info  over  multiple  packets,  part  of  approved   conversation,  legitimate  connection   • Network  address  translation  (NAT):  conceals  ip  addresses  of  internal  host   computers   • Application  proxy  filtering:  examines  app  content  of  packets     Intrusion  detection  systems:   • Monitor  hot  spots  on  corporate  networks  to  detect  and  deter  intruders   • Examines  events  as  they  are  happening  to  discover  attacks  in  progress   • Raises  alarm  or  shuts  down  sensitive  network  part   Antivirus  and  antispyware  software:   • Checks  computers  for  presence  of  malware  and  can  often  eliminate  it  as  well   • Require  continual  updating   Unified  threat  management  (UTM)  systems:  firewalls,  VPNs,  IDS,  web  content  filtering,   anti  spam  software     Securing  wireless  networks   • WEP  security  can  provide  some  security  by  Assigning  unique  name  to  network’s   SSID  and  not  broadcasting  SSID,  Using  it  with  VPN  technology   • Wi-­‐Fi  Alliance  finalized  WAP2  specification,  replacing  WEP  with  stronger   standards:  Continually  changing  keys,  Encrypted  authentication  system  with   central  server     Encryption   • Transforming  text  or  data  into  cipher  text  that  cannot  be  read  by  unintended   recipients,  encryption  key   • Secure  Sockets  Layer  (SSL)  and  successor  Transport  Layer  Security  (TLS)   between  2  computers   • Secure  Hypertext  Transfer  Protocol  (S-­‐HTTP)  limited  to  individual  messages   • Symmetric  key  encryption:  Sender  and  receiver  use  single,  shared  key   • Public  key  encryption:  Uses  two,  mathematically  related  keys:  Public  key  and   private  key,  Sender  encrypts  message  with  recipient’s  public  key,  Recipient   decrypts  with  private  key  

Digital  certificate:     • Data  file  used  to  establish  the  identity  of  users  and  electronic  assets  for   protection  of  online  transactions   • Uses  a  trusted  third  party,  certification  authority  (CA),  to  validate  a  user’s   identity   • CA  verifies  user’s  identity,  stores  information  in  CA  server,  which  generates   encrypted  digital  certificate  containing  owner  ID  information  and  copy  of   owner’s  public  key   Public  key  infrastructure  (PKI)   • Use  of  public  key  cryptography  working  with  certificate  authority   • Widely  used  in  e-­‐commerce     Ensuring  system  availability:  Online  transaction  processing  requires  100%  availability,   no  downtime   • Fault-­‐tolerant  computer  systems:  Contain  redundant  hardware,  software,  and   power  supply  components  that  create  an  environment  that  provides  continuous,   uninterrupted  service   • High-­‐availability  computing   o Helps  recover  quickly  from  crash,  Minimizes  not  eliminates  downtime   o Backup  servers,  multiple  server  distribution,  high  capacity  storage,  god   disaster  recovery  and  business  continuity  plans   • Recovery-­‐oriented  computing:  Designing  systems  that  recover  quickly  with   capabilities  to  help  operators  pinpoint  and  correct  of  faults  in  multi-­‐component   systems   • Controlling  network  traffic:  Deep  packet  inspection  (DPI)  Video  and  music   blocking,  using  prioritizing   • Security  outsourcing:  Managed  security  service  providers  (MSSPs)     Security  in  the  cloud   • Responsibility  for  security  resides  with  company  owning  the  data   • Firms  must  ensure  providers  provides  adequate  protection   • Service  level  agreements  (SLAs)  including  controls     Securing  mobile  platforms   • Security  policies  should  include  and  cover  any  special  requirements  for  mobile   devices   • Tools  to  authorize  all  devices  in  use,  maintain  inventory  records,  updates,  lock     Ensuring  software  quality  (software  metrics  and  testing)   • Software  metrics:  Objective  assessments  of  system  in  form  of  quantified   measurements,  identify  problems  as  they  occur   • Carefully  designed,  formal,  objective,  used  consistently     • Examples:  Number  of  transactions,  Online  response  time,  Payroll  checks  printed   per  hour,  Known  bugs  per  hundred  lines  of  code   • Early  and  regular  testing  to  uncover  errors   • Walkthrough:  Review  of  specification  or  design  document  by  small  group  of   qualified  people   • Debugging:  Process  by  which  errors  are  eliminated      

Chapter  9   Achieving  Operational  Excellence  and  Customer  Intimacy:  Enterprise   Applications  

  Enterprise  Systems  =  Enterprise  Resource  Planning  Systems  (ERP)   • Suite  of  integrated  software  modules  and  a  common  central  database   • Collects  data  from  many  divisions  of  firm  for  use  in  internal  business  activities   • Information  entered  in  one  process  is  immediately  available  for  other  processes     Enterprise  Software   • Built  around  thousands  of  predefined  business  processes  that  reflect  best   practices   • Finance/accounting,  Human  resources,  Manufacturing/production,   Sales/marketing   • To  implement,  firms:  Select  functions  of  system  they  wish  to  use,  Map  business   processes  to  software  processes,  Use  software’s  configuration  tables  for   customizing   • Leading  ES  vendors:  SAP,  Oracle,  Infor  Global  Solutions,  Microsoft   • Communicate  with  customers,  suppliers,  other  entities     Business  value  of  enterprise  systems   • Increase  operational  efficiency   • Provide  firm  wide  information  to  support  decision  making   • Enforce  standard  practices  and  data   • Enable  rapid  responses  to  customer  requests  for  information  or  products,  reduce   cycle  time  and  costs,  centralize   • Include  analytical  tools  to  evaluate  overall  organizational  performance,  improved   decision  making     Supply  Chain  Management  Systems   Supply  Chain   • Network  of  organizations  and  processes  for:   o Procuring  raw  materials  (procurement)   o Transforming  them  into  products  (manufacturing)   o Distributing  the  products  (distribution)   • Flow  of  materials,  information,  payments  in  both  directions   • Primary,  secondary,  tertiary  suppliers  (tier  1,2,3)   • Upstream  supply  chain:  Firm’s  suppliers,  suppliers’  suppliers,  processes  for   managing  relationships  with  them   • Downstream  supply  chain:  Organizations  and  processes  responsible  for   delivering  products  to  customers                    

Information  and  supply  chain  management   • Inefficiencies  caused  by  inaccurate/untimely  information  cut  into  operating  costs   • Just-­‐in-­‐time  strategy:  Components  arrive  as  they  are  needed,  Finished  goods   shipped  after  leaving  assembly  line   • Safety  stock:  Buffer  for  lack  of  flexibility  in  supply  chain   • Bullwhip  effect:  Information  about  product  demand  gets  distorted  as  it  passes   from  one  entity  to  next  across  supply  chain,  more  inventory,  ripples,  magnifying   change  à  excess  inventory,  production,  warehousing,  shipping  costs   • Tamed  by  reducing  uncertainties  by  demand  and  supply,  accurate  and  up-­‐to  date   information,  share  dynamic  info    

    Supply  chain  management  software   • Supply  chain  planning  systems:  Model  existing  supply  chain   o Demand  planning  (determine  amount  of  products  to  satisfy  demands)   o Optimize  sourcing,  manufacturing  plans   o Establish  inventory  levels   o Identifying  transportation  modes   • Supply  chain  execution  systems:  Manage  flow  of  products  through  distribution   centers  and  warehouses,  efficiency     Global  Supply  Chains  and  the  Internet   • Global  supply  chains  typically  span  greater  geographic  distances  and  time   differences   • Different  performance  standards   • More  complex  pricing  issues  (local  taxes,  transportation,  etc.)   • Foreign  government  regulations,  cultural  differences   • Internet  helps  companies  manage  many  aspects  of  global  supply  chains:  sourcing,   transportation,  communications,  international  finance  (no  slow  downs,  errors,   uncertainty)  à  outsourcing  to  third  party  logistic  providers,  contract   manufacturing     Supply  chain  management  systems   • Push-­‐based  model  (build-­‐to-­‐stock):  Schedules  based  forecasts  of  demand   • Pull-­‐based  model  (demand-­‐driven,  build-­‐to-­‐order):  Customer  orders  trigger   events  in  supply  chain   • Sequential  supply  chains:  Information  and  materials  flow  sequentially  from   company  to  company   • Concurrent  supply  chains:  Information  flows  in  many  directions  simultaneously   among  members  of  a  supply  chain  network   • Future  Internet  driven:  digital  logistics  nervous  system  

Business  value  of  SCM  systems   • Streamline  internal  and  external  supply  chain  processes   • Match  supply  to  demand   • Reduce  inventory  levels   • Improve  delivery  service   • Speed  product  time  to  market   • Use  assets  more  effectively   • Reduced  supply  chain  costs  lead  to  increased  profitability   • Increased  sales     Customer  Relationship  Management  Systems   • In  large  businesses,  too  many  customers  and  too  many  ways  customers  interact   with  firm   • Capture  and  integrate  customer  data  from  all  over  the  organization   • Consolidate  and  analyze  customer  data   • Distribute  customer  information  to  various  systems  and  customer  touch  points   (contact  point)  across  enterprise   • Provide  single  enterprise  view  of  customers  to  increase  sales  and  service     Customer  Relationship  Management  Software   • CRM  packages  range  from  niche  tools  to  large-­‐scale  enterprise  applications   • Partner  relationship  management  (PRM)   o Integrating  lead  generation,  pricing,  promotions,  order  configurations,   and  availability   o Tools  to  assess  partners’  performances   • Employee  relationship  management  (ERM)   o E.g.  Setting  objectives,  employee  performance  management,  performance-­‐ based  compensation,  employee  training   • Major  vendors:  Siebel  Systems  (Oracle),  PeopleSoft,  SAP,  Salesforce.com,   Microsoft  Dynamics  CRM     CRM  packages  typically  include  tools  for:   • Sales  force  automation  (SFA):  increase  productivity,  focusing  on  profitable   customers  E.g.  sales  prospect  and  contact  information,  and  sales  quote   generation  capabilities,  personalized  recommendations   • Customer  service:  increase  efficiency  call  center,  help  desks,  support  staff,  E.g.   assigning  and  managing  customer  service  requests;  Web-­‐based  self-­‐service   capabilities   • Marketing:  support  direct  marketing  campaigns  E.g.  capturing  prospect  and   customer  data,  opportunities  for  cross  selling  (complementary  products)                      

Operational  and  Analytical  CRM   • Operational  CRM:  Customer-­‐facing  applications,  E.g.  sales  force  automation,  call   center  and  customer  service  support,  and  marketing  automation   • Analytical  CRM:  Analyze  customer  data  output  from  operational  CRM   applications,  Based  on  data  warehouses  populated  by  operational  CRM  systems   and  customer  touch  points  (online  analytical  processing  –  OPLAP),  Customer   lifetime  value  (CLTV)    

    Business  value  of  CRM   • Increased  customer  satisfaction   • Reduced  direct-­‐marketing  costs   • More  effective  marketing   • Lower  costs  for  customer  acquisition/retention   • Increased  sales  revenue   • Reduce  churn  rate     o Number  of  customers  who  stop  using  or  purchasing  products  or  services   from  a  company.     o Indicator  of  growth  or  decline  of  firm’s  customer  base     Enterprise  Application  Challenges   • Highly  expensive  to  purchase  and  implement   • Require  Technological  changes   • Require  Business  process  changes   • Require  Organizational  changes   • Switching  costs,  dependence  on  software  vendors   • Data  standardization,  management,  cleansing     Next-­‐generation  enterprise  applications   • Move  is  to  make  applications  more  flexible,  Web-­‐enabled,  integrated  with  other   systems   • Enterprise  suites   o Software  to  enable  CRM,  SCM,  and  enterprise  systems  work  together  and   with  suppliers  and  client  systems   o Utilize  Web  services,  SOA  (Service  Oriented  Architecture)   • Open  source  &  on-­‐demand  solutions   • Mobile  compatible;  Web  2.0  capabilities   • Complementary  analytics  products    

Service  platform   • Integrates  multiple  applications  to  deliver  a  seamless  experience  for  all  parties,   E.g.  Order-­‐to-­‐cash  process   • Portal  software:  Used  to  integrate  information  from  enterprise  applications  and   legacy  systems  and  present  it  as  if  coming  from  a  single  source    

                                   

 

Chapter  10   E-­‐commerce:  Digital  Markets,  Digital  Goods  

  E-­‐commerce  today:     • Use  of  the  Internet  and  Web  to  transact  business;  digitally  enabled  transactions   • Began  in  1995  and  grew  exponentially,  still  growing  even  in  a  recession   • Companies  that  survived  the  dot-­‐com  bubble  burst  and  now  thrive   • E-­‐commerce  revolution  is  still  in  its  early  stages,  increasing  number  of  online   products,  broadband  access    

Reduced   Transaction   costs  

Lower   Market     Entry   Cost,     Search   cost  

Price     Cost   Trans   Parenc   Y   Price   Discrim   ination  

   

 

Key  concepts  in  e-­‐commerce   • Digital  markets  reduce   o Information  asymmetry   o Search  costs   o Transaction  costs   o Menu  costs  (merchants  costs  of  changing  prices)   • Digital  markets  enable   o Price  discrimination   o Dynamic  pricing  based  on  market  conditions   o Disintermediation  (removal  of  organizations,  layers  in  value  chain)   • Reduce  or  increase  switching  costs,  may  cause  extra  delay  in  gratification     Digital  goods   • Goods  that  can  be  delivered  over  a  digital  network   • Cost  of  producing  first  unit  almost  entire  cost  of  product:  marginal  cost  of  2nd   unit  is  about  zero   • Costs  of  delivery  over  the  Internet  very  low   • Marketing  costs  remain  the  same;  pricing  highly  variable   • Industries  with  digital  goods  are  undergoing  revolutionary  changes  (publishers,   record  labels,  etc.)     Types  of  e-­‐commerce   • Business-­‐to-­‐consumer  (B2C)   • Business-­‐to-­‐business  (B2B)   • Consumer-­‐to-­‐consumer  (C2C)   • Mobile  commerce  (m-­‐commerce)            

                   

Content   provider:   includes   intellectual   property,   podcasting   (subscribe),   streaming    

E-­‐commerce  revenue  models   • Advertising  (retain  user  attention  à  higher  rates)  (Google)   • Sales  (+  micropayments)  (ITunes)   • Subscription  (Netflix)   • Free/Freemium  (Flickr)   • Transaction  Fee  (Ebay)   • Affiliate  (receive  referential  fees,  Blogs)     Most  popular  Web  2.0  service:  social  networking   • Social  networking  sites  sell  banner  ads,  user  preference  information,  and  music,   videos  and  e-­‐books   • Social  shopping  sites:  Swap  shopping  ideas  with  friends  (Kaboodle,  ThisNext)   • Wisdom  of  crowds/crowdsourcing:  Large  numbers  of  people  can  make  better   decisions  about  topics  and  products  than  a  single  person   • Prediction  markets:  Peer-­‐to-­‐peer  betting  markets  on  specific  outcomes   (elections,  sales  figures,  designs  for  new  products)     E-­‐commerce  marketing   • Internet  provides  marketers  with  new  ways  of  identifying  and  communicating   with  customers   • Long  tail  marketing:  Ability  to  reach  a  large  audience  inexpensively   • Behavioral  targeting:  Tracking  online  behavior  of  individuals  on  thousands  of   Web  sites,  privacy  concerns   • Advertising  networks  à  profiling   • Advertising  formats  include  search  engine  marketing,  display  ads,  rich  media,   and  e-­‐mail     Administrative  overhead:  processing  paper,  approving  puchase  decisions,  telephone,  fax   machines,  search  for  products,  arrange  purchases,  arranging  and  shipping,  receiving   goods  à  100$  for  each  curporate  purchase  order  for  supporting  products     Business-­‐to-­‐business  e-­‐commerce   • Promise:  reduce  costs,  prices,  increase  productivity,  economic  wealth   • Challenge:  chahing  existing  patterns  and  systems  of  procurement,  designing  and   implementing  new  Internet-­‐based  B2B  solutions   Electronic  data  interchange  (EDI)   • Computer-­‐to-­‐computer  exchange  of  standard  transactions  such  as  invoices,   purchase  orders   • Major  industries  have  EDI  standards  that  define  structure  and  information  fields   of  electronic  documents  for  that  industry   • More  companies  increasingly  moving  away  from  private  networks  to  Internet  for   linking  to  other  firms  E.g.  Procurement:  Businesses  can  now  use  Internet  to   locate  most  low-­‐cost  supplier,  search  online  catalogs  of  supplier  products,   negotiate  with  suppliers,  place  orders,  etc.   Private  industrial  networks  (private  exchanges)   • Large  firm  using  extranet  to  link  to  its  suppliers,  distributors  and  other  key   business  partners   • Owned  by  buyer,  eg.  Volkswagen  Group  Supply   • Permits  sharing  of:  Product  design  and  development,  Marketing,  Production   scheduling  and  inventory  management,  Unstructured  communication    

Net  marketplaces  (e-­‐hubs)   • Single  market  for  many  buyers  and  sellers   • Industry-­‐owned  or  owned  by  independent  intermediary   • Generate  revenue  from  transaction  fees,  other  services   • Use  prices  established  through  negotiation,  auction,  RFQs,  or  fixed  prices   • May  focus  on  direct  or  indirect  goods   • May  be  vertical  or  horizontal  marketplaces   • E.g.  Exostar  long  term  contract  purchasing,  aero  defense  industry,  Elemica   serving  chemical  industry   Exchanges   • Independently  owned  third-­‐party  Net  marketplaces   • Connect  thousands  of  suppliers  and  buyers  for  spot  purchasing   • Typically  provide  vertical  markets  for  direct  goods  for  single  industry  (food,   electronics)   • Proliferated  during  early  years  of  e-­‐commerce;  many  have  failed:  Competitive   bidding  drove  prices  down  and  did  not  offer  long-­‐term  relationships  with  buyers   or  services  to  make  lowering  prices  worthwhile     M-­‐commerce   • Location-­‐based  services  (Loopt,  Wikitude)   • Software  application  sales   • Entertainment  downloads   • Mobile  display  advertising   • Banking  and  financial  services   • Wireless  advertising  and  retailing   • Games  and  entertainment     Building  an  E-­‐Commerce  Web  Site   • Developing  a  clearunderstanding  of  your  business  objectives   • Knowing  how  to  choose  the  right  technology  to  achieve  those  objectives   • Assembling  a  team  with  the  skills  required  to  make  decisions  about:   o Technology   o Site  design   o Social  and  information  policies   o Hardware,  software,  and  telecommunications  infrastructure   • Customer’s  demands  should  drive  the  site’s  technology  and  design   • Business  decisions  drive  the  technology  –  not  the  reverse   • Business  objectives:  Capabilities  the  site  should  have,  E.g.  execute  a  transaction   payment   • System  functionality  :  Technological  capability  to  achieve  this  objective,  E.g.  a   shopping  cart  or  other  payment  system   • Information  requirements,E.g.  secure  credit  card  clearing,  multiple  payment   options     The  Building  Decision   • Pre  built  template,  least  costly  and  simple  solution,  limited   • Build  yourself_  customization,  variety  of  tools,  risky  complexity,  delays   • Packages  to  customize      

The  Hosting  Decision   • Outsource,  pay  monthly  fee,  vendor  responsible   • Co-­‐location:  purchase  Web  server  and  locate  in  a  vendors  physical  facility,   • Rent  capabilities  of  cloud  computing  center   • Fees  based  on  size  of  website,  bandwidth,  storage,  support   •  

  Web  site  budgets   • Several  thousand  to  millions  /  year   • 50%  of  a  budget  is    system  maintenance  and  content  creation    

           

 

 

Chapter  11   Managing  Knowledge  

  The  Knowledge  Management  Landscape   • Knowledge  management  systems  among  fastest  growing  areas  of  software   investment   • Knowledge  and  information  related,  useful  and  actionable  when  shared,  major   source  of  wealth   • Substantial  part  of  a  firm’s  stock  market  value  is  related  to  intangible  assets:   knowledge,  brands,  reputations,  and  unique  business  processes   • Well-­‐executed  knowledge-­‐based  projects  can  produce  extraordinary  ROI,  difficult   to  measure   • Data  =  flow  of  events/transactions,  info  =  organized  data,  knowledge  =  additional   resources  to  discover  patterns,  wisdom  =  Collective  and  individual  experience  of   applying  to  solve  problems,  Involves  where,  when,  and  how  to  apply  knowledge   • Both  individual  and  collective  attribute   • Cognitive,  psychological  eent  inside  peoples  heads   • Tacit  (not  documented)  and  explicit  (documented)  knowledge   • Has  a  locations,  sticky,  not  universally  applicable,  situational,  contextual   • Important  asset  of  firm,  Knowing  how  to  do  things  effectively  and  efficiently  in   ways  others  cannot  duplicate  is  prime  source  of  profit  and  competitive  advantage    

 

Organizational  learning  (Process  in  which  organizations  learn)   • Gain  experience  through  collection  of  data,  measurement,  trial  and  error,  and   feedback   • Adjust  behavior  to  reflect  experience:  Create  new  business  processes,  Change   patterns  of  management  decision  making     The  Knowledge  Management  Value  Chain   • Knowledge  management:  Set  of  business  processes  developed  in  an  organization   to  create,  store,  transfer,  and  apply  knowledge     • Knowledge  management  value  chain:  Each  stage  adds  value  to  raw  data  and   information  as  they  are  transformed  into  usable  knowledge    

    Knowledge  acquisition   • Documenting  tacit  and  explicit  knowledge   o Storing  documents,  reports,  presentations,  best  practices   o Unstructured  documents  (e.g.,  e-­‐mails)   o Developing  online  expert  networks   • Creating  knowledge  (discover  patterns,  knowledge  workstations)   • Tracking  data  from  TPS  (sales,  payments,  inventory,  customers),  external  sources   Knowledge  storage   • Databases,  expert  systems  corporate  in  business  processes   • Document  management  systems   • Role  of  management:   o Support  development  of  planned  knowledge  storage  systems   o Encourage  development  of  corporate-­‐wide  schemas  for  indexing   documents   o Reward  employees  for  taking  time  to  update  and  store  documents   properly   Knowledge  dissemination   • Portals,  Push  e-­‐mail  reports,  Search  engines,  Collaboration  tools   • A  deluge  of  information   • Training  programs,  informal  networks,  and  shared  management  experience  help   managers  focus  attention  on  important  information  

Knowledge  application     • To  provide  return  on  investment,  organizational  knowledge  must  become   systematic  part  of  management  decision  making  and  become  situated  in   decision-­‐support  systems   • Create  New  business  practices,  New  products  and  services,  New  markets     New  organizational  roles  and  responsibilities   • Chief  knowledge  officer  executives   • Dedicated  staff  /  knowledge  managers   • Communities  of  practice  (COPs)     o Informal  social  networks  of  professionals  and  employees  within  and   outside  firm  who  have  similar  work-­‐related  activities  and  interests   o Activities  include  education,  online  newsletters,  sharing  experiences  and   techniques   o Facilitate  reuse  of  knowledge,  discussion   o Reduce  learning  curves  of  new  employees     3  major  types  of  knowledge  management  systems  (CAD  =  computer  aided  design)  

  Three  major  types  of  knowledge  in  enterprise   • Structured  documents  (formal  docs  and  rules)   • Semistructured  documents   • Unstructured,  tacit  knowledge  (+  semi  =  80%)     Enterprise  content  management  systems   • Help  capture,  store,  retrieve,  distribute,  preserve   • Corporate  repositories  ans  capabilities  to  collect  and  organize  semistructured   • Bring  in  external  sources  (News  feeds,  research)   • Tools  for  communication  and  collaboration   • Key  problem  –  Developing  taxonomy  =  classification  scheme  (Knowledge  objects   must  be  tagged  with  categories  for  retrieval)   • Digital  asset  management  systems:  Specialized  content  management  systems  for   classifying,  storing,  managing  unstructured  digital  data  like  Photographs,   graphics,  video,  audio   Knowledge  network  systems  (expertise  location  and  management  systems)   • Provide  online  directory  of  corporate  experts  in  well-­‐defined  knowledge  domains  

 

• •

Use  communication  technologies  to  make  it  easy  for  employees  to  find   appropriate  expert  in  a  company   May  systematize  solutions  developed  by  experts  and  store  them  in  knowledge   database  (Best-­‐practices,  Frequently  asked  questions  (FAQ)  repository)  

  Collaboration  Tools     • Enterprise  knowledge  portals:    Access  to  external  and  internal  information   (News  feeds,  research,  Capabilities  for  e-­‐mail,  chat..)   • Use  of  consumer  Web  technologies  (Blogs,  Wikis,  Social  bookmarking  –  user-­‐ created  taxonomies  for  shared  bookmarks  =  folksonomies)   Learning  Management  Systems  (LMS)   • Provide  tools  for  management,  delivery,  tracking,  and  assessment  of  various   types  of  employee  learning  and  training   • Support  multiple  modes  of  learning     • Automates  selection  and  administration  of  courses   • Assembles  and  delivers  learning  content   • Measures  learning  effectiveness     Knowledge  Work  Systems  =  Systems  for  knowledge  workers  to  help  create  new   knowledge  and  integrate  that  knowledge  into  business   Knowledge  workers  =  Researchers,  designers,  architects,  scientists,  engineers  who   create  knowledge  for  the  organization   1. Keeping  organization  current  in  knowledge   2. Serving  as  internal  consultants  regarding  their  areas  of  expertise   3. Acting  as  change  agents,  evaluating,  initiating,  and  promoting  change  projects     Requirements  of  knowledge  work  systems   • Hardware  Platform:  knowledge  workstation   • Substantial  computing  power  for  graphics,  complex  calculations   • Powerful  graphics  and  analytical  tools   • Communications  and  document  management   • Access  to  external  databases   • User-­‐friendly  interfaces   • Optimized  for  tasks  to  be  performed  (design  engineering,  financial  analysis)     Examples  of  knowledge  work  systems   • CAD  (computer-­‐aided  design):     o Automate  creation  and  revision  of  design   o Creation  of  engineering  or  architectural  designs   • Virtual  reality  systems:     o Simulate  real-­‐life  environments   o 3-­‐D  medical  modeling  for  surgeons   o Augmented  reality  (AR)  systems  –  additional  info  to  enhance  the   perception  of  reality,  more  interactive  and  meaningful     o VRML  (virtual  realty  modeling  language)  =  set  of  specifications  for   interactive  3D  modeling  on  the  WWW,  can  organize  multiple  media  types   • Investment  workstations  in  financial  industry    =  Streamline  investment  process   and  consolidate  internal,  external  data  for  brokers,  traders,  portfolio  managers      

Intelligent  techniques:  Used  to  capture  individual  and  collective  knowledge  and  to   extend  knowledge  base   • To  capture  tacit  knowledge:  Expert  systems,  case-­‐based  reasoning,  fuzzy  logic   • Knowledge  discovery:  Neural  networks  and  data  mining   • Generating  solutions  to  complex  problems:  Genetic  algorithms   • Automating  tasks:  Intelligent  agents   Artificial  intelligence  (AI)  technology:  Computer-­‐based  systems  that  emulate  human   behavior     Expert  systems:     • Capture  tacit  knowledge  in  very  specific  and  limited  domain  of  human  expertise   • Capture  knowledge  of  skilled  employees  as  set  of  rules  in  software  system  that   can  be  used  by  others  in  organization     • Typically  perform  limited  tasks  that  may  take  a  few  minutes  or  hours,  e.g.   Diagnose  malfunctioning  machine,  Determining  whether  to  grant  credit  for  loan   • Used  for  discrete,  highly  structured  decision-­‐making   How  expert  systems  work     • Knowledge  base:  Set  of  hundreds  or  thousands  of  interconnected  rules   • Inference  engine:  Strategy  used  to  search  knowledge  base   o Forward  chaining:  Inference  engine  begins  with  information  entered  by   user  and  searches  knowledge  base  to  arrive  at  conclusion   o Backward  chaining:  Begins  with  hypothesis  and  asks  user  questions  until   hypothesis  is  confirmed  or  disproved   • Benefits:  improved  decisions,  reduced  errors,  reduced  costs,  and  training  time,   higher  levels  of  quality  and  service   Successful  expert  systems   • Con-­‐Way  Transportation  built  expert  system  to  automate  and  optimize  planning   of  overnight  shipment  routes  for  nationwide  freight-­‐trucking  business   Most  expert  systems  deal  with  problems  of  classification   • Have  relatively  few  alternative  outcomes     • Possible  outcomes  are  known  in  advance     Many  expert  systems  require  large,  lengthy,  and  expensive  development  and   maintenance  efforts  à  Hiring  or  training  more  experts  may  be  less  expensive     Case-­‐based  reasoning  (CBR)   • Descriptions  of  past  experiences  of  human  specialists  (cases),  stored  in   knowledge  base   • System  searches  for  cases  with  problem  characteristics  similar  to  new  one,  finds   closest  fit,  and  applies  solutions  of  old  case  to  new  case   • Successful  and  unsuccessful  applications  are  grouped  with  case   • Stores  organizational  intelligence:  Knowledge  base  is  continuously  expanded  and   refined  by  users   • CBR  found  in:  Medical  diagnostic  systems,  Customer  support     Fuzzy  logic  systems   • Rule-­‐based  technology  that  represents  imprecision  used  in  linguistic  categories   (e.g.,  “cold,”  “cool”)  that  represent  range  of  values  (Doppeldeutig)   • Describe  a  particular  phenomenon  or  process  linguistically  and  then  represent   that  description  in  a  small  number  of  flexible  rules  



Provides  solutions  to  problems  requiring  expertise  that  is  difficult  to  represent   with  IF-­‐THEN  rules   o Autofocus  in  cameras   o Detecting  possible  medical  fraud   o Sendai’s  subway  system  acceleration  controls  

  Neural  networks   • Find  patterns  and  relationships  in  massive  amounts  of  data  too  complicated  for   humans  to  analyze   • “Learn”  patterns  by  searching  for  relationships,  building  models,  and  correcting   over  and  over  again  (construct  hidden  layer  of  logic)   • Humans  “train”  network  by  feeding  it  data  inputs  for  which  outputs  are  known,   to  help  neural  network  learn  solution  by  example     • Used  in  medicine,  science,  and  business  for  problems  in  pattern  classification,   prediction,  financial  analysis,  and  control  and  optimization  only  as  aids!   • E.g  Visa  Credit  Card  Fraud  monitoring  transactions   • Machine  learning:  Related  AI  technology  allowing  computers  to  learn  by   extracting  information  using  computation  and  statistical  methods   • Used  in  data  mining     Genetic  algorithms   • Useful  for  finding  optimal  solution  for  specific  problem  by  examining  very  large   number  of  possible  solutions  for  that  problem   • Conceptually  based  on  process  of  evolution:  Search  among  solution  variables  by   changing  and  reorganizing  component  parts  using  processes  such  as  inheritance,   mutation,  and  selection   • Used  in  optimization  problems  (minimization  of  costs,  efficient  scheduling,   optimal  jet  engine  design)  in  which  hundreds  or  thousands  of  variables  exist   • Able  to  evaluate  many  solution  alternatives  quickly     Hybrid  AI  systems   • Genetic  algorithms,  fuzzy  logic,  neural  networks,  and  expert  systems  integrated   into  single  application  to  take  advantage  of  best  features  of  each   • E.g.,  Matsushita  “neurofuzzy”  washing  machine  that  combines  fuzzy  logic  with   neural  networks     Intelligent  agents   • Work  in  background  to  carry  out   specific,  repetitive,  and  predictable   tasks  for  user,  process,  or  application   • Use  limited  built-­‐in  or  learned   knowledge  base  to  accomplish  tasks  or   make  decisions  on  user’s  behalf   (Deleting  junk  e-­‐mail,  Finding  cheapest   airfare)   • Agent-­‐based  modeling  applications:     o Systems  of  autonomous  agents   o Model  behavior  of  consumers,   stock  markets,  and  supply   chains;  used  to  predict  spread  of  epidemics    

Chapter  12   Enhancing  Decision  Making  

  Types  of  decisions:   • Unstructured:  Decision  maker  must  provide  judgment,  evaluation,  and  insight  to   solve  problem,  novel,  non-­‐routine  and  important  decisions  à  Senior   management   • Structured:  Repetitive  and  routine;  involve  definite  procedure  for  handling  so   they  do  not  have  to  be  treated  each  time  as  new  à  operational  management   • Semistructured:  Only  part  of  problem  has  clear-­‐cut  answer  provided  by  accepted   procedure  à  Middle  management     The  4  stages  of  the  decision  making  process   1. Intelligence:  Discovering,  identifying,  and  understanding  the  problems  occurring   in  the  organization   2. Design:  Identifying  and  exploring  solutions  to  the  problem   3. Choice:  Choosing  among  solution  alternatives   4. Implementation:  Making  chosen  alternative  work  and  continuing  to  monitor  how   well  solution  is  working     Managers  and  Decision  making  in  the  real  world   • Information  systems  can  only  assist  in  some  of  the  roles  played  by  managers   • Classical  model  of  management:  5  functions  =  Planning,  organizing,  coordinating,   deciding,  and  controlling   • More  contemporary  behavioral  models  =  less  systematic,  more  informal,  less   reflective,  more  reactive,  and  less  well  organized  than  in  classical  model   • Great  del  of  work  at  unrelenting  pace,  fragmented  activities,  prefer  current  and   specific  information,  prefer  oral  forms  of  communication,  maintain  complex  web   of  contacts     • Managerial  roles  =  expectations  of  the  activities  that  managers  should  perform  

 

3main  reasons  why  investments  in  information  technology  do  not  always  produce   positive  results   1. Information  quality:  High-­‐quality  decisions  require  high-­‐quality  information   (accuracy,  integrity,  consistency,  completeness,  validity,  timeliness,  accessibility)   2. Management  filters:  Managers  have  selective  attention  and  have  variety  of  biases   that  reject  information  that  does  not  conform  to  prior  conceptions   3. Organizational  inertia  and  politics:  Strong  forces  within  organizations  resist   making  decisions  calling  for  major  change     High  velocity  automated  decision-­‐making   • Made  possible  through  computer  algorithms  precisely  defining  steps  for  a  highly   structured  decision   • Humans  taken  out  of  decision,  E.g.  High-­‐speed  computer  trading  programs   • Require  safeguards  to  ensure  proper  operation  and  regulation     Business  intelligence:  Infrastructure  for  collecting,  storing,  analyzing  data  produced  by   business  (warehousing,  integrating,  reporting,  analyzing  data);  Databases,  data   warehouses,  data  marts   Business  analytics:  Tools  and  techniques  for  analyzing  data;  OLAP  (online  analytical   processing),  statistics,  models,  data  mining   Business  intelligence  vendors:  Create  business  intelligence  and  analytics  purchased   by  firms  (SAP,  Oracle,  IBM,  SAS  Institute,  Microsoft),  market:  10.5billion,  growing  20%    

    Business  intelligence  and  analytics  capabilities   • Goal  is  to  deliver  accurate  real-­‐time  information  to  decision-­‐makers   • Main  functionalities  of  BI  systems   1. Production  reports  (pre-­‐defined,  based  on  industry  requirements)   2. Parameterized  reports  (user  enters  different  parameters  to  filter  data)   3. Dashboards/scorecards  (visual  tools,  presenting  performance  data)   4. Ad  hoc  query/search/report  creation  (create  own  report  based  on  queries,   searches)  

5. Drill  down  (from  high-­‐level  summary  to  detailed  view)   6. Forecasts,  scenarios,  models  (analyze  using  standard  statistical  tools)  

  Business  intelligence  users   • 80%  are  casual  users  relying  on  production  reports   • Senior  executives  àUse  monitoring  functionalities   • Middle  managers  and  analysts  à  Ad-­‐hoc  analysis   • Operational  employees  à  Prepackaged  reports  (E.g.  sales  forecasts,  customer   satisfaction,  loyalty  and  attrition,  supply  chain  backlog,  employee  productivity)  

    Examples  of  BI  applications  à  mostly  pre-­‐packaged  production  reports   • Predictive  analytics:  Use  patterns  in  data  to  predict  future  behavior  (E.g.  Credit   card  companies  determine  customers  at  risk  for  leaving,  screen  potential   customers,  prediction  how  customer  respond  to  price  changes)   • Data  visualization:  Help  users  see  patterns  and  relationships  that  would  be   difficult  to  see  in  text  lists   • Geographic  information  systems  (GIS):  Ties  location-­‐related  data  to  maps,   modeling  capabilities  (e.g.  calculate  response  times  to  natural  disasters,  best   locations  for  new  ATMs     2  Management  strategies  for  developing  BI  and  BA  capabilities   Competitive  market  place  and  given  to  hyperbole   1. One-­‐stop  shopping  (totally  integrated  solution)   • Hardware  firms  sell  software  that  run  optimally  on  their  hardware   • Makes  firm  dependent  on  single  vendor  (but  on  a  global  scale)  –  switching  costs  +   pricing  power   2. Multiple  best-­‐of-­‐breed  solution   • Software  firms:  encourage  firms  to  adopt  „best  of  breed“  software,  chose  package   from  vendor  you  believe  is  best   • Greater  flexibility  and  independence   • Potential  difficulties  in  integration  with  own  hardware  and  other  software   • Must  deal  with  multiple  vendors    

Business  Intelligence  Constituencies   Operational  and  middle  managers   • Monitor  day  to  day  business  performance  (e.g  down-­‐time  machines,  hourly  sales)   • Make  fairly  structured  decisions     • Use  MIS  à  output  =  set  of  routine  production  reports  based  on  data  from   transaction  processing  systems  (TPS)   • Increased  online  usage  with  queries   „Super  user”  and  business  analysts   • Use  more  sophisticated  analysis  to  find  patterns  in  data,     • Create  customized  reports,  relying  heavily  on  modeling   • Use  DSS  (decision  support  systems)  support  semistructured  decision  making   Decision  support  systems   • Use  mathematical  or  analytical  models   • Allow  varied  types  of  analysis   o “What-­‐if”  analysis  (working  forward  from  known  conditions,  test  results   to  predict  outcomes)   o Sensitivity  analysis  (repeated  what  if  questions  to  predict  range  of   outcomes,  when  variables  changed  multiple  times)   o Backward  sensitivity  analysis  (helps  with  goal  seeking)   o Multidimensional  analysis  /  OLAP  (E.  g.  pivot  tables)   Decision-­‐support  for  senior  management   • Executive  support  systems  (ESS)  help  executives  focus  on  important   performance  information  affect  overall  profitability  and  success   • Balanced  scorecard  method:  (methodology  for  understanding  really  important   information)  à  Measures  outcomes  on  four  dimensions:     o Financial,  Business  process,  Customer,  Learning  &  growth   o Key  performance  indicators  (KPIs)  measure  each  dimension    

 

Business  performance  management  (BPM)   • Translates  firm’s  strategies    (e.g.  differentiation,  low-­‐cost  producer,  scope  of   operation)  into  operational  targets   • KPIs  developed  to  measure  progress  towards  targets   • Stronger  strategy  flavor  than  balanced  scorecard     Data  for  ESS     • Internal  data  from  enterprise  applications  (ERP,  SCM,  CRM)   • External  data  such  as  financial  market  databases,  economic  information   • Drill-­‐down  capabilities   • Enhancing  effectiveness:  organizational  performance,  track  activities  of   competitors,  recognize  changing  market  conditions,  identify  problems  and   opportunities   • Decentralized  decision  making,  taking  place  on  lower  operating  levels,  increase   span  of  control   • =  Information  driven  management  or  management  by  facts  à  real-­‐time     Group  Decision  Support  Systems  (GDSS)   • Interactive  system  to  facilitate  solution  of  unstructured  problems  by  group   • Specialized  hardware  and  software;  typically  used  in  conference  rooms   o Overhead  projectors,  display  screens   o Software  to  collect,  rank,  edit  participant  ideas  and  responses   o May  require  facilitator  and  staff   • Enables  increasing  meeting  size  and  increasing  productivity   • Promotes  collaborative  atmosphere,  guaranteeing  anonymity   • Uses  structured  methods  to  organize  and  evaluate  ideas                                                    

Chapter  13   Building  Information  Systems  

  Structural  organizational  changes  enabled  by  IT   1. Automation   • Increases  efficiency  and  effectively  à  assisting  employees   • Replaces  manual  tasks   2. Rationalization  of  procedures   • Streamlines  standard  operating  procedures   • Revealed  bottlenecks  due  to  automatization   • Often  found  in  programs  for  making  continuous  quality  improvements   o Total  quality  management  (TQM)  –  achieving  quality  as  goal  and   responsibility  of  all  employees   o Six  sigma  =  specific  measure  of  quality  (3.6  defects  per  million   opportunities)  –  usually  just  a  goal   3. Business  process  redesign  (more  powerful,  higher  risk)   • Analyze,  simplify,  and  redesign  business  processes   • Reorganize  workflow,  combine  steps,  eliminate  repetition  and  sometimes  jobs   • Ambitious  and  new  vision  how  to  organize  process   4. Paradigm  shifts  (often  fail,  high  rewards)   • Rethink  nature  of  business,  radical,  reengineering  strategies   • Define  new  business  model   • Change  nature  of  organization     Business  Process  Redesign   Business  Process  Management  (BPM)   • Variety  of  tools,  methodologies  to  analyze,  design,  optimize  processes   • Used  by  firms  to  manage  business  process  redesign   • Never  concluded  à  continual  change   • Barrier:  organizational  culture,  resisting  change,  not  simple     1. Identify  processes  for  change:  what  processes  are  important  and  how  improving   these  will  help  performance   2. Analyze  existing  processes:  modeled  and  documented,  identify  redundant  steps  and   inefficiencies,  existing  processes  measured  in  times  and  cost   3. Design  the  new  process:  improve  processes  by  designing  new  one,  “to-­‐be”  process  à   comparison  streamlined  processes,  justifying  by  reducing  time,  cost,  enhancing   service  and  value   4. Implement  the  new  process:  translation  in  new  set  of  procedures  and  rules,   implement  IS  to  support,  uncover  and  address  problems,  recommended   improvements   5. Continuous  measurement:  employees  fall  back  in  old  methods,  processes  lose   effectiveness  due  to  other  changes     Variety  of  tools  for  BPM,  to   • Identify  and  document  existing  processes,  Identify  inefficiencies   • Create  models  of  improved  processes     • Capture  and  enforce  business  rules  for  performing  processes   • Integrate  existing  systems  to  support  process  improvements  

• • •

Analytics  to  Verify  that  new  processes  have  improved   Measure  impact  of  process  changes  on  key  business  performance  indicators   Automate  some  parts  of  business  process  and  enforce  business  rules  à  perform   more  consistently  and  efficiently   Help  integrate  existing  systems  to  support  process  improvements  

•   Systems  development   Activities  that  go  into  producing  an  information  system  solution  to  an  organizational   problem  or  opportunity    

    Systems  analysis     • Analysis  of  problem  to  be  solved  by  new  system   • Defining  the  problem  and  identifying  causes,  Specifying  solutions  (Systems   proposal  report  identifies  and  examines  alternative  solutions),  Identifying   information  requirements   • Analyst:  creates  roadmap  of  existing  organization,  identifying  primary  owners  of   data,  hardware,  software  à  examining  à  problem  areas  and  objectives   • Includes  feasibility  study:  financial,  technical,  organizational  standpoint,  good   investment,  skills?   • Written  systems  proposal:  costs,  benefits,  disadvantages,  advantages  of  each   alternative     • Establishing  information  requirements   o Who  needs  what  information,  where,  when,  and  how   o Define  objectives  of  new/modified  system   o Detail  the  functions  new  system  must  perform   • Faulty  requirements  analysis  is  leading  cause  of  systems  failure  and  high  systems   development  cost     Systems  design   • Describes  system  specifications  that  will  deliver  functions  identified  during   systems  analysis  à  form  and  structure  (blueprint)   • Should  address  all  managerial,  organizational,  and  technological  components  of   system  solution  à  fulfill  user  requirements  



Role  of  end  users   o User  information  requirements  drive  system  building   o Users  must  have  sufficient  control  over  design  process  to  ensure  system   reflects  their  business  priorities  and  information  needs   o Insufficient  user  involvement  in  design  effort  is  major  cause  of  system   failure  

  Completing  System  Development  Process   Translate  solution  specifications  into  operational  info  system   • Programming:  Translate  System  specifications  into  software  program  code   • Testing:  Ensures  system  produces  right  results   o Unit  (program)  testing:  Tests  each  program  in  system  separately   o System  testing:  Test  functioning  of  system  as  a  whole     o Acceptance  testing:  system  is  ready  to  be  used  in  production  setting   (evaluated  by  users,  reviewed  by  management)   o Test  plan:  All  preparations  for  series  of  tests,  general  condition  tested  =   record  change   Conversion  =  Process  of  changing  from  old  system  to  new  system   1. Parallel  strategy:  both  old  and  new  systems  run  together  =  safe  and  expensive   2. Direct  cutover:  total  replacement  on  an  appointed  day  =  risky     3. Pilot  study:  introduction  to  limited  area   4. Phased  approach:  introduction  in  stages  (by  functions,  units)   • Requires  end-­‐user  training   • Finalization  of  detailed  documentation  showing  how  system  works  from   technical  and  end-­‐user  standpoint     Production  and  maintenance  =  System  reviewed  to  determine  if  revisions  needed   • May  include  post-­‐implementation  audit  document   • Maintenance:  Changes  in  hardware,  software,  documentation,  or  procedures  to  a   production  system  to  correct  errors,  meet  new  requirements,  or  improve   processing  efficiency   o 20%  debugging,  emergency  work   o 20%  changes  to  hardware,  software,  data,  reporting   o 60%  of  work:  User  enhancements,  improving  documentation,  recoding  for   greater  processing  efficiency  

 

Modeling  and  Designing  System   1.  Structured  Methodologies   • Structured:  Techniques  are  step-­‐by-­‐step,  progressive,  top-­‐down   • Process-­‐oriented:  Focusing  on  modeling  processes/actions  that  manipulate  data   à  data  flow  (no  well  modeling  of  data,  only  processes)   • Separate  data  from  processes  (real  world:  unnatural)   • Data  flow  diagram:  Primary  tool  for  representing  system’s  component  processes   and  flow  of  data  between  them  (ANALYSIS)   o Offers  logical  graphic  model  of  information  flow   o High-­‐level  and  lower-­‐level  diagrams  can  be  used  to  break  processes  down   into  successive  layers  of  detail   • Data  dictionary:  Defines  contents  of  data  flows  and  data  stores   • Process  specifications:  Describe  transformation  occurring  within  lowest  level  of   data  flow  diagrams  (logic  for  each  process)   • Structure  chart:  Top-­‐down  chart,  showing  each  level  of  design,  relationship  to   other  levels,  and  place  in  overall  design  structure  (DESIGN)  

    2.  Object-­‐Oriented  Development   • Object  =  basic  unit  of  systems  analysis  and  design   • Object:  Combines  data  and  the  processes  that  operate  on  those  data   • Data  encapsulated  in  object  can  be  accessed  and  modified  only  by  operations,  or   methods,  associated  with  that  object   • Object-­‐oriented  modeling  based  on  concepts  of  class  and  inheritance   o Objects  belong  to  a  certain  class  and  have  features  of  that  class   o May  inherit  structures  and  behaviors  of  a  more  general,  ancestor  class   • More  iterative  and  incremental  than  traditional  structured  development   o Systems  analysis:  Interactions  between  system  and  users  analyzed  to   identify  objects     o Design  phase:  Describes  how  objects  will  behave  and  interact;  grouped   into  classes,  subclasses  and  hierarchies   o Implementation:  Some  classes  may  be  reused  from  existing  library  of   classes,  others  created  or  inherited   • Objects  =  reusable  à  can  potentially  reduce  time  and  cost  of  development     Computer-­‐aided  software  engineering  (CASE)   • Software  tools  to  automate  development  and  reduce  repetitive  work,  including   • Facilitate  creation  of  clear  documentation  +  coordination  of  team  development   efforts  



• •

Graphics  facilities  for  producing  charts  and  diagrams,  Screen  and  report   generators,  reporting  facilities,  Analysis  and  checking  tools,  Data  dictionaries,   Code  and  documentation  generators   Increase  productivity  and  quality   Support  iterative  design  by  automating  revisions  and  changes  and  providing   prototyping  facilities   Require  organizational  discipline  to  be  used  effectively  

•   Alternative  Systems-­‐building  Approaches   Traditional  systems  lifecycle   • Oldest  method  for  building  information  systems   • Phased  approach  divides  development  into  formal  stages   • “Waterfall”  approach:    Tasks  in  one  stage  finish  before  another  stage  begins   • Formal  division  of  labor  between  end  users  and  information  systems  specialists   • Emphasizes  formal  specifications  and  paperwork   • Still  used  for  building  large  complex  systems   • Can  be  costly,  time-­‐consuming,  and  inflexible     Prototyping   • Building  experimental  system  rapidly  and  inexpensively  for  end  users  to  evaluate   • Prototype:  Working  but  preliminary  version  of  information  system  à  Approved   prototype  serves  as  template  for  final  system     • Iterative  Steps  in  prototyping  (can  be  repeated)   1. Identify  user  requirements   2. Develop  initial  prototype   3. Use  prototype   4. Revise  and  enhance  prototype     Advantages   Disadvantages   • Useful  if  some  uncertainty  in   • May  gloss  over  essential  steps   requirements  or  design  solutions   • May  not  accommodate  large   • Often  used  for  end-­‐user  interface   quantities  of  data  or  large  number   design   of  users   • More  likely  to  fulfill  end-­‐user   • May  not  undergo  full  testing  or   requirements   documentation     End-­‐user  development:   • Uses  fourth-­‐generation  languages  to  allow  end-­‐users  to  develop  systems  with   little  or  no  help  from  technical  specialists   • Fourth  generation  languages:  Less  procedural  than  conventional  programming   • Require:  cost-­‐justification  of  end-­‐user  system  projects,  Establish  hardware,   software,  and  quality  standards     Advantages   Disadvantages   • More  rapid  completion  of  projects   • Not  designed  for  processing-­‐ intensive  applications   • High-­‐level  of  user  involvement  and   satisfaction   • Inadequate  management  and   control,  testing,  documentation   • Loss  of  control  over  data  

  Application  software  packages   • Save  time  and  money:  pre-­‐written,  designed,  tested,  maintenance     • Many  offer  customization  features   • Evaluation  criteria  for  systems  analysis  include:  Functions  provided  by  the   package,  flexibility,  user  friendliness,  hardware  and  software  resources,  database   requirements,  installation  and  maintenance  efforts,  documentation,  vendor   quality,  and  cost       • Request  for  Proposal  (RFP):  Detailed  list  of  questions  submitted  to  packaged-­‐ software  vendors,  Used  to  evaluate  alternative  software  packages     Outsourcing   • Cloud  and  SaaS  providers:  Subscribing  companies  use  software  and  computer   hardware  provided  by  vendors   • External  vendors:  Hired  to  design,  create  software   o Domestic:  Driven  by  firms  need  for  additional  skills,  resources,  assets   o Offshore:  Driven  by  cost-­‐savings,  better  assets,  skills     Advantages   Disadvantages   • Allows  organization  flexibility  in  IT   • Hidden  costs,  e.g.  Identifying  and   needs   selecting  vendor,  Transitioning  to   vendor   • Usually  at  least  15%  cost  saving   even  in  worst  case  scenario   • Opening  up  proprietary  business   processes  to  third  party  

 

Application  Development  for  the  Digital  Firm   Rapid  application  development  (RAD)   • Process  of  creating  workable  systems  in  a  very  short  period  of  time  (less   sequential,  parts  occur  simultaneously   • Visual  programming  and  other  tools  for  building  graphical  user  interfaces   • Iterative  prototyping  of  key  system  elements   • Automation  of  program  code  generation   • Close  teamwork  among  end  users  and  information  systems  specialists     Joint  application  design  (JAD)   • Used  to  accelerate  generation  of  information  requirements  and  to  develop  initial   systems  design     • Brings  end  users  and  information  systems  specialists  together  in  interactive   session  to  discuss  system’s  design     • Can  significantly  speed  up  design  phase  and  involve  users  at  intense  level     Agile  development   • Focuses  on  rapid  delivery  of  working  software  by  breaking  large  project  into   several  small  sub-­‐projects   • Subprojects:  Treated  as  separate,  complete  projects,  Completed  in  short  periods   of  time  using  iteration  and  continuous  feedback   • Emphasizes  face-­‐to-­‐face  communication  over  written  documents  à  collaboration   and  faster  decision  making     Component-­‐based  development   • Groups  of  objects  that  provide  software  for  common  functions  (e.g.,  online   ordering)  and  can  be  combined  to  create  large-­‐scale  business  applications   • Web  services   o Reusable  software  components  that  use  XML  and  open  Internet  standards   (platform  independent)   o Enable  applications  to  communicate  with  no  custom  programming   required  to  share  data  and  services     o Can  engage  other  Web  services  for  more  complex  transactions   o Using  platform  and  device-­‐independent  standards  can  result  in  significant   cost-­‐savings  and  opportunities  for  collaboration  with  other  companies                                

Chapter  14   Managing  Projects  

  The  Importance  of  Project  Management   • Runaway  projects:  30%  -­‐  40%  IT  projects:  Exceed  schedule,  budget,  Fail  to   perform  as  specified,  less  benefits   • Types  of  system  failure   o Fail  to  capture  essential  business  requirements   o Fail  to  provide  organizational  benefits   o Complicated,  poorly  organized  user  interface   o Inaccurate  or  inconsistent  data     Project  management   • Project:  planned  series  of  related  activities  for  achieving  specific  business   objective   • Activities:  planning  work,  assessing  risk,  estimating  resources  required,   organizing  work,  assigning  tasks,  controlling  project  execution,  reporting   progress,  analyzing  results   • Five  major  variables   o Scope  à  what  work  to  (not)  include     o Time  à  amount  to  complete  project,  schedule   o Cost  à  hr,  hardware,  software,  work  space   o Quality  à  result  satisfies  specified  objectives   o Risk  à  potential  problems  threatening  success     Selecting  Projects  

 

Linking  Systems  Projects  to  the  Business  Plan   Information  systems  plan   • Identifies  systems  projects  that  will  deliver  most  business  value,  links   development  to  business  plan   • Corporate  goals,  milestones,  target  dates,  key  management  decisions     • Road  map  indicating  direction  of  systems  development,  includes:   o Purpose  of  plan   o Strategic  business  plan  rationale   o Current  systems/situation   o New  developments  to  consider   o Management  strategy   o Implementation  plan   o Budget   • In  order  to  plan  effectively,  firms  need  to  inventory  and  document  existing   software,  hardware,  systems     Critical  Success  Factors   • Clear  understanding  of  both  long-­‐term  and  short-­‐term  information  requirements   • Strategic  analysis  or  critical  success  factors  (CSF)  approach:  Sees  information   requirements  as  determined  by  a  small  number  of  critical  success  factors   • Shaped  by  industry,  firm,  manager,  broader  environment   • Principal  method:  personal  interviews  with  top  managers  à  identify  goals  +  CSFs   à  aggregation  to  firm  CSFs  à  systems  build  to  deliver  information  on  CSFs   • Suitable  for  top  management,  building  DSS  and  ESS   • Disadvantages:  No  clear  methods  for  aggregation,  Confusion  between  individual   and  organizational  CSFs,  Bias  towards  top  managers     Portfolio  analysis   • Used  to  evaluate  alternative  system  projects   • Inventories  all  of  the  organization’s  information  systems  projects  and  assets   • Each  system  has  profile  of  risk  and  benefit   • To  improve  return  on  portfolio,  balance  risk  and  return  from  systems   investments   • Determine  optimal  mix  of  investment  risk  and  reward   • Aligned  with  business  strategy:  superior  return  on  IT  assets,  better  alignment   with  business  objectives,  and  better  coordination  if  IT  investments  

 

 

Scoring  models   • Selecting  projects  where  many  criteria  must  be  considered   • Assigns  weights  to  various  features  of  system  and  calculates  weighted  totals   • Most  important:  not  score  but  agreement  on  criteria  to  judge  system   • Requires  experts  understanding  issue  and  technology   • Used  to  confirm,  rationalize  and  support  decisions     Establishing  the  business  value  of  Information  Systems   Information  Systems  Costs  and  Benefits   • Tangible  benefits  (cost  savings):  Can  be  quantified  and  assigned  monetary  value   • Systems  that  displace  labor  and  save  space:  Transaction  and  clerical  systems   • Intangible  benefits:  Cannot  be  immediately  quantified  but  may  lead  to   quantifiable  gains  in  the  long  run   • Systems  that  influence  decision  making:  ESS,  DSS,  collaborative  work  systems   • Capital  budgeting  models:  Measure  value  of  investing  in  long-­‐term  capital   investment  projects   • Rely  on  measures  the  firm’s   o Cash  outflows:  Expenditures  for  hardware,  software,  labor   o Cash  inflows:  Increased  sales,  Reduced  costs   • Difference  out-­‐  und  in  flows  used  for  calculating  financial  worth  of  investment   • Various  capital  budgeting  models  used  for  IT  projects:  Payback  method,   accounting  rate  of  return  on  investment,  net  present  value,  internal  rate  of  return   (IRR)     Real  options  pricing  models  (ROPM)   • Can  be  used  when  future  revenue  streams  of  IT  projects  are  uncertain  and  up-­‐ front  costs  are  high   • Use  concept  of  options  valuation  borrowed  from  financial  industry  (option  =   right  but  not  obligation  to  act  at  some  future  date,  buy  at  fixed  rate)   • Initial  expenditure  on  technology  creates  right  (not  obligation)  to  obtain  the   benefits  associated  with  further  development  and  deployment  of  the  technology   as  long  as  management  has  freedom  to  cancel,  defer,  restart,  or  expand  project   • Gives  managers  flexibility  to  stage  IT  investment  or  test  the  waters  with  small   pilot  projects  or  prototypes  to  gain  more  knowledge  about  risks  before  investing   in  entire  implementation   • Disadvantage:  estimating  all  ley  variables  affecting  option  value       Limitations  of  financial  models   • Do  not  take  into  account  social  and  organizational  dimensions  that  may  affect   costs  and  benefits   • No  consideration  costs  from  organizational  disruptions  (training,  learning   curves)   • Overlooked  benefits  like  enhanced  employee  learning  and  expertise       Dimensions  of  Project  Risk  –  level  influenced  by   • Project  size:  Indicated  by  cost,  time,  number  of  organizational  units  affected,   Organizational  complexity  also  an  issue   • Project  structure:  Structured,  defined  requirements  run  lower  risk   • Experience  with  technology  

Change  Management   • Required  for  successful  system  building   • New  information  systems  have  powerful  behavioral  and  organizational  impact   • Changes  lead  to  new  distributions  of  authority  and  power   • Internal  organizational  change  breeds  resistance  and  opposition   • Implementation:  All  organizational  activities  working  toward  adoption,   management,  and  routinization  of  an  innovation   • Change  agent:  One  role  of  systems  analyst     o Redefines  the  configurations,  interactions,  job  activities,  and  power   relationships  of  organizational  groups   o Catalyst  for  entire  change  process     o Responsible  for  ensuring  that  all  parties  involved  accept  changes  created   by  new  system   • Role  of  end  users:  With  high  levels  of  user  involvement   o System  more  likely  to  conform  to  requirements   o Users  more  likely  to  accept  system   • User-­‐designer  communication  gap:  Users  and  information  systems  specialists   o Different  backgrounds,  interests,  and  priorities   o Different  loyalties,  priorities,  vocabularies   o Different  concerns  regarding  a  new  system   • Management  support  and  commitment   o Positive  perception  by  both  users  and  technical  staff   o Ensures  sufficient  funding  and  resources   o Enforcement  of  required  organizational  changes   • Very  high  failure  rate  among  enterprise  application  and  BPR  projects  (up  to  70%   for  BPR)  à  Poor  implementation  and  change  management  practices   • Mergers  and  acquisitions:  Similarly  high  failure  rate  of  integration  projects   • Merging  of  systems  of  two  companies  requires:  Considerable  organizational   change,  Complex  systems  projects     Controlling  risk  factors   • 1st  step  in  managing  project  risk:  identifying  nature  and  level  of  risk  of  project   • Each  project  managed  with  tools  and  risk-­‐management  approaches  geared  to   level  of  risk   • Managing  technical  complexity  à  Internal  integration  tools   o Project  leaders  with  technical  and  administrative  experience   o Highly  experienced  team  members   o Frequent  team  meetings   o Securing  of  technical  experience  outside  firm  if  necessary   • Formal  planning  and  formal  control  tools:  GANTT  and  PERT  charts   o Gantt  chart  lists  project  activities  and  corresponding  start  and  completion   dates,  visually  representing  timing  and  duration  +  hr   o Pert  charts  (Program  Evaluation  and  Review  Technique)  graphically   depicts  project  task  and  interrelationships  in  a  network  diagram   o Determine  bottlenecks,  impact  problems  will  have   • External  integration  tools:  ways  to  link  work  of  implementation  team  to  users  at   all  organizational  levels  (Active  involvement  of  users,  team’s  responsiveness)   • User  resistance  to  organizational  change:  believe  change  is  detrimental  to  their   interests,  counter  implementation:  strategy  to  thwart  implementation  of  an  IS  



Strategies  to  overcome  user  resistance   o User  participation   o User  education  and  training   o Management  edicts  and  policies   o Incentives  for  cooperation   o Improvement  of  end-­‐user  interface   o Resolution  of  organizational  problems  prior  to  introduction  of  new  system  

  Designing  for  the  organization   • Information  system  projects  must  address  ways  in  which  organization  changes   with  new  system   • Planning:  Procedural  changes,  Job  functions,  Organizational  structure,  Power   relationships,  Work  structure   • Ergonomics:  Interaction  of  people  and  machines  in  work  environment  including   Design  of  jobs,  Health  issues,  End-­‐user  interfaces   • Organizational  impact  analysis:  explains  how  system  will  affect  organizational   structure,  attitudes,  decision  making,  operations   • Sociotechnical  design:  Addresses  human  and  organizational  issues   o Separate  sets  of  technical  and  social  design  solutions   o Final  design  is  solution  that  best  meets  both  technical  and  social   objectives  à  higher  job  satisfaction  and  productivity     Project  management  software   • Can  automate  many  aspects  of  project  management   • Capabilities  for  Defining,  ordering,  editing  tasks,  Assigning  resources  to  tasks,   Tracking  progress   • Microsoft  Project  2010  =  Most  widely  used  project  management  software,   capabilities  of  producing  PERT,  Gantt  Charts,  critical  path  analysis   • Increase  in  SaaS,  open-­‐source  project  management  software  à  more  flexile,   collaborative  and  user-­‐friendly     • Project  portfolio  management:  helps  organizations  manage  portfolios  of  projects   and  dependencies  among  them                                        

Chapter  15   Managing  Global  Systems  

  Growth  of  International  Information  Systems   • Global  economic  system  and  global  world  order  driven  by  advanced  networks   and  information  systems   • Growth  of  international  trade  radically  altered  domestic  economies  around  globe     Developing  an  International  Information  Systems  Architecture   1. Understand  global  environment:  Business  drivers  pushing  your  industry  toward   global  competition,  Inhibitors  creating  management  challenges   2. Develop  corporate  strategy  for  competition:  How  firm  should  respond  to  global   competition   3. Develop  organization  structure  and  division  of  labor:  Where  will  production,   marketing,  sales,  etc.,  be  located   4. Consider  management  issues:  Design  of  business  procedures,  reengineering,   managing  change   5. Consider  technology  platform     Global  drivers   General  cultural  factors  lead  toward  internationalization  and  result  in  specific  business   globalization  factors  

  Business  Challenges  

  State  of  the  art   • Most  companies  have  inherited  patchwork  international  systems  using  1960s-­‐ era  batch-­‐oriented  reporting,  manual  entry  of  data  from  one  legacy  system  to   another,  and  little  online  control  and  communication  

 

 



Significant  difficulties  in  building  appropriate  international  architectures   o Planning  a  system  appropriate  to  firm’s  global  strategy   o Structuring  organization  of  systems  and  business  units   o Solving  implementation  issues   o Choosing  right  technical  platform  

  Global  strategies  and  business  organization   • Three  main  kinds  of  organizational  structure   o Centralized:  In  the  home  country   o Decentralized/dispersed:  To  local  foreign  units   o Coordinated:  All  units  participate  as  equals   • Four  main  global  strategies   o Domestic  exporter:  heavy  centralization  of  corporate  activities  in  the   home  country  of  origin  (often  starting  point)   o Multinational:  concentrate  financial  management  and  control  out  of  home   base,  decentralizing  production,  sales,  marketing,  adapted  products  to   local  market  conditions   o Franchisers:  mix  of  old  and  new,  design  in  home  country,  further   production…  foreign  personnel   o Transnational:  stateless,  truly  globally  managed  firms  with  many  regional   headquarters,  frame  of  reference:  globe  

  Global  systems  to  fit  the  strategy   • Configuration,  management,  and  development  of  systems  tend  to  follow  global   strategy  chosen   • 4  main  types  of  systems  configuration   1. Centralized:  Systems  development  and  operation  totally  at  domestic  home  base   2. Duplicated:  Development  occurs  at  home  base  but  operations  are  handed  over  to   autonomous  units  in  foreign  locations   3. Decentralized:  Each  foreign  unit  designs  own  solutions  and  systems   4. Networked:    Development  and  operations  in  coordinated  fashion  across  all  units    

 

 

Reorganizing  the  Business   1. Organize  value-­‐adding  activities  along  lines  of  comparative  advantage  (E.g.,  Locate   functions  where  they  can  best  be  performed,  for  least  cost  and  maximum  impact)   2. Develop  and  operate  systems  units  at  each  level  of  corporate  activity—  local  (host   country  systems  units),  regional  (regional  systems  units  handle  telecommunications   and  systems  development)),  national,  and  international  (transnational  systems  units   create  link  across  major  regional  areas)   3. Establish  at  world  headquarters:  Single  office  responsible  for  development  of   international  systems  +  Global  CIO  position     Managing  Global  Systems   Principle  Management  Challenges  in  developing  global  systems  

  Typical  scenario:  Disorganization  on  a  global  scale   • Traditional  multinational  consumer-­‐goods  company  based  in  U.S.  and  operating   in  Europe  would  like  to  expand  into  Asian  markets   • World  headquarters  and  strategic  management  in  U.S.,  Only  centrally   coordinated  system  is  financial  controls  and  reporting     • Separate  regional,  national  production  and  marketing  centers   • Foreign  divisions  have  separate  IT  systems   • E-­‐mail  systems  are  incompatible   • Each  production  facility  uses  different  ERP  system,  different  hardware  and   database  platforms,  etc.     Global  systems  strategy   • Share  only  core  systems:  Core  systems  support  functionality  critical  to  firm   • Partially  coordinate  systems  that  share  some  key  elements  (Do  not  have  to  be   totally  common  across  national  boundaries,  Local  variation  desirable)   • Peripheral  systems:  Need  to  suit  local  requirements  only     1. Define  core  business  processes  (business  process  analysis)  +  best  performer   2. Identify  core  systems  to  coordinate  centrally   3. Choose  an  approach  (best:  salami  strategy)   • Piecemeal  and  grand  design  approaches  tend  to  fail   • Evolve  transnational  applications  incrementally  from  existing  applications   4. Make  benefits  clear   • Global  flexibility   • Gains  in  efficiency   • Global  markets  and  larger  customer  base  unleash  new  economies  of  scale  at   production  facilities   • Optimizing  corporate  funds  over  much  larger  capital  base  

 

The  management  solution:  Implementation   • Agreeing  on  common  user  requirements  à  Short  list  of  core  business  processes   à  Develop  common  language,  understanding  of  common  elements  and  unique   local  qualities   • Introducing  changes  in  business  processes  à  Success  depends  on  legitimacy   (extent  on  which  authority  is  accepted  =  competence,  vision  etc.),  authority,   ability  to  involve  users  in  change  design  process   • Coordinating  applications  development  à  Coordinate  change  through   incremental  steps  à  Reduce  set  of  transnational  systems  to  bare  minimum   • Coordinating  software  releases  à  Institute  procedures  to  ensure  all  operating   units  update  at  the  same  time  à  compatible   • Encouraging  local  users  to  support  global  systems  à  Cooptation:  Bringing  the   opposition  into  design  and  implementation  process  without  giving  up  control   over  direction  and  nature  of  the  change   o Permit  each  country  unit  to  develop  one  transnational  application   o Develop  new  transnational  centers  of  excellence     Technology  challenges  of  global  systems   • Global  business  model  and  strategy  à  hardware,  software,  networking   standards,  key  system  applications   • Standardization:  global  computing  platform,  international  work  teams   Computing  platforms  and  systems  integration   • How  new  core  systems  will  fit  in  with  existing  suite  of  applications  developed   around  globe  by  different  divisions     • Standardization:  Data  standards,  interfaces,  software,  etc.   Connectivity   • Ability  to  link  systems  and  people  into  single  integrated  network  (voice,  data,   image  transmissions)   • Internet  foundation  but  does  not  guarantee  any  level  of  service   • Many  firms  use  private  networks  and  VPNs   • Low  penetration  of  PCs,  outdated  infrastructures  in  developing  countries   • High  costs  and  monitored  transmissions  by  governments    

    Software  Localization   • Integrating  new  systems  with  old  (+  testing)   • Human  interface  design  issues,  languages  à  mastered  quickly   • Software  localization:  converting  software  to  operate  in  second  language  



 

Most  important  software  applications:   o TPS  and  MIS  (basic  transaction  and  management  reporting  systems)   o Increasingly,  SCM  and  enterprise  systems  to  standardize  business   processes  à  not  always  compatible  with  differences  in  languages,   heritage,  business  processes  in  other  countries   o Problems:  not  technically  sophisticated  company  units   o Applications  that  enhance  productivity  of  international  teams  like  EDI,   SCM;  Collaboration  systems,  email,  videoconferencing    

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF