Professional Documents
Culture Documents
Benefits of Budgeting Software • Reduces the time and effort needed in the budget process.
• Facilitates the integration of corporate strategic objectives with operational
plans.
• Maintains data integrity of budgets and planning.
• Makes planning an ongoing process.
• Explores and analyzes data across various planning and reporting
dimensions.
• Automatically monitors performance exceptions against plans to recognize
patterns and trends, thus supplementing management by exception.
• Explores and analyzes the implications of organizational and environmental
changes.
EXAMPLES
Edify offers multiple employee services. Edify Corporation’s employee service sys- edify.com
tem allows users to access information via PCs, voice-recognition phone, kiosks, or
faxes. The package offers intranet-based automation of company procedures, collec-
tive bargaining agreements, employees’ handbooks, phone directories, pay scales, job
banks, benefits, and training.
Oracle offers benefits enrollment. Oracle Corporation conducts its flexible benefits oracle.com
enrollment program on the intranet. The employees give the program high marks be-
cause it is simple and fast. Oracle allows new hires to input benefits data online. Fi-
nally, Oracle created links from its intranet pages to Fidelity Investments’ 401(k)
pages, so employees can learn about funds and pension plans online as well as register
for the plans.
Aetna offers health care information. Aetna Health Plan’s directory of primary aetna.com
care physicians, hospitals, medical services, and health information is available
to employees online around the clock. The company also offers insurance options
online. ●
W50 Chapter 8 Functional, Enterprise, and Interorganizational Systems
Benefits of Extreme Integration • Optimally satisfies customer demand, providing high-quality service and
quick responsiveness.
• Is comprehensive, covering all internal activities, suppliers, distributors, and
customers.
• Utilizes capacity in an optimal manner.
• Not only reacts to, but also stimulates and anticipates customer demand.
• Provides feasible and accurate plans based on those estimates of customer
demand.
• Offers wide planning breadth, covering materials, plants, labor,
transportation, constraints, demand, and distribution.
• Has a synchronous, rather than serial, planning approach.
Source: Forrester Research Inc. (forrester.com).
Table W8.2 Issues of Data Transfer Across International Borders (page 267)
Security Issues
National security. Databases may contain classified information relevant to national security.
Organizational security. France, for example, requires that every database maintained in that country be registered with
the government, so classified material can be monitored.
Personal security. Sweden, Canada, France, and Brazil require that information be processed within their borders as much
as possible. This may increase the cost of processing.
Technical Issues
Data vulnerability and accuracy. Due to global flows, the problems may be more acute.
Technical standards. There are no global technical standards for transmitting information across borders. Also,
communication infrastructures may differ from one country to another.
Sovereignty Issues
National sovereignty. Some countries prefer that hardware, software, and networks used be made in their country.
Economic sovereignty. Some countries want information to be processed within their boundaries to increase employment
and improve the balance of payments.
Cultural sovereignty. Many countries want to maintain their cultural identities. They are afraid of what is described as
“electronic colonialism.” They can control what is shown on television, but it is difficult to control what is on the Internet
or on an electronic bulletin board.
Developing Issues
Legal and regulatory issues. Every country has its own legal system regarding national, organizational, and personal flow
and use of data and information.
Intellectual property. Transfer of data may violate intellectual property laws with regard to copyrights, patents, licenses,
and copying of software. There are also different laws in different countries and modes of enforcement differ as well.
Developing countries. Many so-called Third World nations have fears regarding the use of information flowing into their
territories. Also, they lack a robust communication infrastructure.