Professional Documents
Culture Documents
IT Notes 2020
IT Notes 2020
Globalization opportunities
● Internet has drastically reduced costs of operating on global scale
● Presents both challenges and opportunities
New products, services, & ● Information systems and technology a major enabling
business models tool for new products, services, business models
1.2 IS Perspectives
Information System
● Set of interrelated components
● Collect, process, store, & distribute information
● Support decision making, coordination, & control
● Data shaped into meaningful form
Dimensions of IS
Complementary Assets
● Assets required to derive value from a primary investment
● Firms supporting technology investments with investment in complementary assets
receive superior returns
● Includes:
○ Organizational assets, e.g.
■ Appropriate business model
■ Efficient business processes
○ Managerial assets, e.g.
■ Incentives for management innovation
■ Teamwork and collaborative work environments
○ Social assets, e.g.
■ The Internet and telecommunications infrastructure
■ Technology standards
1.3 Contemporary Approaches
● Technical
○ Emphasizes mathematically based models
○ Computer science, management science, operations research
● Behavioral
○ Behavioral issues
○ Psychology, economics, sociology
○ Management Information Systems
■ Combines computer science, management science, operations research
& practical orientation with behavioral issues
○ Main actors
■ Suppliers of hardware and software
■ Business firms
■ Managers and employees
■ Firm’s environment
● Sociotechnical
○ Optimal organizational performance achieved by jointly optimizing both social &
technical systems used in production
○ Helps avoid purely technological approach
CHAPTER 2 GLOBAL E-BUSINESS & COLLABORATION
2.1 Business Process & IS
2.2 Types of IS
Enterprise systems ● Collects data from different firm functions & stores data
in single central data repository
● Resolves problem of fragmented, redundant data set &
systems
● Enables
○ Coordination of daily activities
○ Efficient response to customer orders
○ Provide valuable information for improving
management decision making
Collaboration - working with others to achieve shared & explicit goals/ short-lived or long-term/
informal or formal
Organization
Technical definition
- Stable formal social structure that takes resources from environment & processes them
to produce outputs
- Formal legal entity with internal rules & procedures, as well as a social structure
Behavioural definition
Collection of rights, privileges, obligations, & responsibilities that is delicately balanced over a
period of time through conflict resolution
Features of organizations
● Use of hierarchical structure
● Accountability, authority in system of impartial decision making
● Adherence to principle of efficiency
● Routines & business processes
● Organizational politics, culture, environments & structures
Economic impacts
● IT changes relatives costs of capital & costs of information
● \\ affects the cost & quality of information and change economics of information
● IS technology is a factor of production
Transaction cost theory
● Firms seek to economize on transaction costs (costs of participating in markets)
● IT lowers market transaction costs for a firm, making it worthwhile for firms to transact
with other firms rather than grow the number of employees
Agency theory
● Firm is nexus of contracts among self-interested parties requiring supervision
● Firms experience agency costs (costs of managing & supervising) which rise as firm
grows
● IT can reduce agency costs, making it possible for firms to grow without adding to the
costs of supervising, & without adding employees.
Focus on market niche Use information systems to enable a focused strategy on a single
market niche; specialize
Strengthen customer Use IS to develop strong ties & loyalty with customers & suppliers;
& supplier intimacy increase switching costs
Network-based strategies
Take advantage of firm’s abilities to network with each other
Include use of:
Network economics - Marginal cost of adding new participant almost zero, with
much greater marginal gain
- Value of community grows with size
- Value of software grows as installed customer base grows
Virtual company model - Uses network to ally with other companies to create &
distribute products without being limited by traditional
organizational boundaries or physical locations
Business ecosystems - Industry sets of firms providing related services & products
- Individual firms can consider how IT will help them become
profitable niche players in larger ecosystems
Performing strategic systems Structure of industry? Value chain for this firm? Aligning IT
analysis with our business strategy & goals?
5.1 IT Infra
Definition
Evolution
Technology Drivers
5.2 Infra Components
Hardware
Operating System
Enterprise Software
Data Management and Storage
Networking/Telecommunication
Internet
Consulting Firm and System Integration
5.3 Contemporary Hardware Trends
5.4 Contemporary Software Trends
5.5 Management Issues
Dealing with platform and infra changes
Management and convergence
Making wise investment
5.1 IT Infrastructure
● Set of physical devices & software required to operate enterprise
● Set of firmwide services including
○ Computing platforms providing computing services
○ Telecommunication services
○ Data management services
○ Application software services
○ Physical facilities management services
○ IT management, standards, education, research & development services
● ‘Service platform’ perspective more accurate view of value of investments
Consulting system integration ● Even large firms do not have resources for a full
services range of support for new, complex infrastructure
● Software integration: ensuring new
infrastructure works with legacy systems
● Legacy systems: older TPS created for
mainframes that would be too costly to replace
or redesign
● Accenture, IBM Global Services, EDS, Infosys,
Wipro
Security - policies, procedures & technical measures used to prevent unauthorized access,
alteration, theft,/physical damage to information systems
Controls - methods, policies & organizational procedures that ensure safety of organization’s
assets; accuracy & reliability of its accounting records; & operational adherence to management
standards
Internet vulnerabilities
- Network open to anyone
- Size of Internet means abuses can have wide impact
- Use of fixed Internet addresses with cable/DSL modems creates fixed targets g=hackers
- Unencrypted VOIP
- Email, P2P, IM
Malware
1. Viruses - rogue software program that attaches itself to other software programmes/data
files in order to be executed
2. Worms - independent computer programs that copy themselves from one computer to
another over a network
3. Trojan horses - software program that appears to be benign but then does something
other than expected
4. SQL injection attacks - hackers submit data to Web forms that exploits site’s
unprotected software & sends rogue SQL query to database
5. Spyware - small programs install themselves surreptitiously on computers to monitor
user Web surfing activity & serve up advertising
6. Keyloggers - record every keystroke on computer to steal serial numbers, passwords,
launch Internet attacks
Computer crime - any violations of criminal law that involve a knowledge of computer
technology for their perpetration, investigation/prosecution
- Identity theft - theft of personal information to impersonate someone
- Phishing - setting up fake Websites/sending fake email messages to ask users for
confidential personal data
- Evil twins - wireless networks that pretend to offer trustworthy Wi-Fi connections
- Pharming - redirect users to a bogus Web page, even when individual types correct
Web page address
- Click fraud - occurs when individual/computer program fraudulently clicks on online ad
without any intention of learning more about the advertiser/making a purchase
- Cyberterrorism & Cyberwarfare
Software vulnerabilities
- Commercial software contains flaws that create security vulnerabilities; hidden bugs
(program code defects) & flaws that can open network to intruders
- Patches - vendors release small pieces of software to repair flaws; however,exploits
often created faster than patches be released & implemented
8.2 Business Value of Security & Control
Legal & regulatory requirements for electronic records management & privacy protection
- HIPAA: medical security & privacy rules and procedures
- Gramm-Leach-Bliley Act: requires financial institutions to ensure the security &
confidentiality of customer data
- Sarbanes-Oxley Act: imposes responsibility on companies & their management to
safeguard the accuracy & integrity of financial information that is used internally &
released externally
Electronic evidence - evidence for white collar crimes often in digital form; proper control of
data can save time & money when responding to legal discovery request
Enterprise Software
– Built around thousands of predefined business processes that reflect best practices
● Finance/accounting: General ledger, accounts payable, etc.
● Human resources: Personnel administration, payroll, etc.
● Manufacturing/production: Purchasing, shipping, etc.
● Sales/marketing: Order processing, billing, sales planning, etc.
– To implement, firms:
● Select functions of system they wish to use
● Map business processes to software processes
– Use software’s configuration tables for customizing
Business Value of ES
- Increase operational efficiency
- Provide firm wide information to support decision making
- Enable rapid responses to customer requests for information/products
- Include analytical tools to evaluate overall organizational performance
CRM Software - CRM packages range from niche tools to large-scale enterprise applications
More comprehensive have modules for:
+ Partner relationship management (PRM)
+ Integrating lead generation, pricing, promotions, order configurations, &
availability
+ Tools to assess partner’s performances
+ Employee relationship management (ERM)
+ E.g. setting objectives, employee performance management, performance-based
compensation, employee training
•Operational CRM:
– Customer-facing applications
● E.g. sales force automation, call center and customer service support, and marketing
automation
•Analytical CRM:
– Analyze customer data output from operational CRM applications
– Based on data warehouses populated by operational CRM systems and customer touch
points
● Customer lifetime value (CLTV)
Challenges
•Highly expensive to purchase and implement
–$3.5 million to over $12 million
•Technological changes
•Business process changes
•Organizational changes
•Switching costs, dependence on software vendors
•Data standardization, management, cleansing
•Service platform:
– Integrates multiple applications to deliver a seamless experience for all parties
● E.g. Order-to-cash process
– Portal software
● Used to integrate information from enterprise applications and legacy systems and
present it as if coming from a single source
10.1 E-commerce and the Internet E-commerce Today
8 unique features
2 key concepts: Digital markets and digital goods
10.2 Business and Technology Type of E-commerce
3 types of e-commerce: B2C, B2B, C2C
Business models
Revenue models
Web 2.0: Social networking and wisdom of crowds
E-commerce marketing
B2B E-commerce: New efficiencies and relationship
Electronic Data Interchange
Private Exchanges
E-hubs, net marketplaces
Exchanges
10.3 M-commerce services and applications
10.4 Building an e-commerce website
CHAPTER 10 E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS
Global reach The technology reaches across national boundaries, around Earth
Effect:
● Commerce enabled across cultural and national boundaries
seamlessly and without modification
● Marketspace includes, potentially, billions of consumers &
millions of businesses worldwide
Social technology The technology promotes user content generation and social
networking
Effect:
- New Internet social and business models enable user content
creation and distribution, and support social networks
Types of e-commerce
● Business-to-consumer (B2C)
● Business-to-business (B2B)
● Consumer-to-consumer (C2C)
● Mobile commerce (m-commerce)
Web 2.0 service: social networking - Social networking sites sell banner ads, user preference
information, and music, videos and ebooks
● Social shopping sites – Swap shopping ideas with friends (Kaboodle, ThisNext)
● Wisdom of crowds/crowdsourcing – Large numbers of people can make better
decisions about topics & products than a single person
● Prediction markets – Peer-to-peer betting markets on specific outcomes (elections,
sales figures, designs for new products)
E-commerce marketing
● Internet provides marketers with new ways of identifying and communicating with
customers
● Long tail marketing: Ability to reach a large audience inexpensively
● Behavioral targeting: Tracking online behavior of individuals on thousands of Web sites
● Advertising formats include search engine marketing, display ads, rich media, and e-mail
Business-to-business e-commerce
1. Electronic data interchange (EDI)
● Computer-to-computer exchange of standard transactions such as invoices, purchase
orders
● Major industries have EDI standards that define structure and information fields of
electronic documents for that industry
● More companies increasingly moving away from private networks to Internet for linking
to other firms
- E.g. Procurement: Businesses can now use the Internet to locate most low-cost
supplier, search online catalogs of supplier products, negotiate with suppliers,
place orders, etc.
2. Private industrial networks (private exchanges)
● Large firm using extranet to link to its suppliers, distributors and other key business
partners
● Owned by buyer
● Permits sharing of:
○ Product design and development
○ Marketing
○ Production scheduling and inventory management
○ Unstructured communication (graphics and e-mail)
3. Net marketplaces (e-hubs)
● Single market for many buyers and sellers
● Industry-owned or owned by independent intermediary
● Generate revenue from transaction fees, other services
● Use prices established through negotiation, auction, RFQs, or fixed prices
● May focus on direct or indirect goods
● May be vertical or horizontal marketplaces
4. Exchanges
● Independently owned third-party Net marketplaces
● Connect thousands of suppliers and buyers for spot purchasing
● Typically provide vertical markets for direct goods for single industry (food, electronics)
● Proliferated during early years of e-commerce; many have failed
- Competitive bidding drove prices down and did not offer long-term relationships
with buyers or services to make lowering prices worthwhile
Expert systems:
● Capture tacit knowledge in very specific and limited domain of human expertise
● Capture knowledge of skilled employees as set of rules in software system that can be
used by others in organization
● Typically perform limited tasks that may take a few minutes or hours
● Used for discrete, highly structured decision-making
Hybrid AI systems
● Genetic algorithms, fuzzy logic, neural networks, and expert systems integrated into
single application to take advantage of best features of each
Intelligent agents
● Work in background to carry out specific, repetitive, and predictable tasks for user,
process, or application
● Use limited built-in or learned knowledge base to accomplish tasks or make decisions on
user’s behalf
● Agent-based modeling applications:
○ Systems of autonomous agents
○ Model behavior of consumers, stock markets, and supply chains; used to predict
spread of epidemics
•Types of decisions:
- Unstructured: Decision maker must provide judgment, evaluation, and insight to solve
problem
- Structured: Repetitive and routine; involve definite procedure for handling so they do not
have to be treated each time as new
- Semistructured: Only part of problem has clear-cut answer provided by accepted
procedure
•Information systems can only assist in some of the roles played by managers
•Classical model of management: 5 functions
- Planning, organizing, coordinating, deciding, and controlling
•More contemporary behavioral models
- Actual behavior of managers appears to be less systematic, more informal, less
reflective, more reactive, and less well organized than in classical model
•Mintzberg’s 10 managerial roles
–Interpersonal roles
1. Figurehead
2. Leader
3. Liaison
–Informational roles
4. Nerve center
5. Disseminator
6. Spokesperson
–Decisional roles
7. Entrepreneur
8. Disturbance handler
9. Resource allocator
10. Negotiator
•Three main reasons why investments in information technology do not always produce positive
results
1.Information quality
● High-quality decisions require high-quality information
2.Management filters
● Managers have selective attention and have variety of biases that reject information that
does not conform to prior conceptions
3.Organizational inertia and politics
● Strong forces within organizations resist making decisions calling for major change
•Business intelligence
- Infrastructure for collecting, storing, analyzing data produced by business
- Databases, data warehouses, data marts
•Business analytics
- Tools and techniques for analyzing data
- OLAP, statistics, models, data mining
•Business intelligence vendors
- Create business intelligence and analytics purchased by firms
•Examples of BI applications
–Predictive analytics
● Use patterns in data to predict future behavior
● E.g. Credit card companies use predictive analytics to determine customers at risk for
leaving
–Data visualization
● Help users see patterns and relationships that would be difficult to see in text lists
–Geographic information systems (GIS)
● Ties location-related data to maps