Professional Documents
Culture Documents
STUDY GUIDE
Copyright © 2015
REGENT Business School
All rights reserved; no part of this book may be reproduced in any form or by any means,
including photocopying machines, without the written permission of the publisher.
MBA Year 1
2 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
3 INFORMATION AND KNOWLEDGE MANAGEMENT
TABLE OF CONTENTS
Introduction to the Information and Knowledge Management Study
5
Guide
MBA Year 1
4 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
5 INFORMATION AND KNOWLEDGE MANAGEMENT
INTRODUCTION TO THE
INFORMATION AND KNOWLEDGE
MANAGEMENT STUDY GUIDE
This module forms a core part of the Masters in Business Administration (MBA)
programme at Regent Business School. Upon successful completion of this
module you will be able to competently and strategically support and apply
information and knowledge management practices in your role as a manager.
You will also have a thorough understanding of how the application of knowledge
and information plays a critical role in advanced markets and emerging markets.
Designed and developed for Regent Business School, this module offers
students an in-depth look at how today's business units use information
technologies and systems to achieve corporate objectives. Information systems
are one of the major tools available to business managers for achieving
operational excellence, developing new products and services, improving
decision-making, and achieving competitive advantage.
MBA Year 1
6 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
7 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
8 INFORMATION AND KNOWLEDGE MANAGEMENT
3.5 Assessments
The formal assessment of Information and Knowledge Management takes the
form of an assignment and an exam.
MBA Year 1
9 INFORMATION AND KNOWLEDGE MANAGEMENT
The high level exit level outcomes for this Information and Knowledge
Management module, and their associated assessment criteria, are listed in the
table below. Specific outcomes for each learning area are detailed at the
beginning of each learning area section that follows. The following are the
learning outcomes for the module. By the end of the module, the student should
be able to:
MBA Year 1
10 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
11 INFORMATION AND KNOWLEDGE MANAGEMENT
SECTION A
ORGANISATIONS, MANAGEMEMENT
AND THE NETWORKED ENTERPRISE
This section consists of the following chapters:
Chapter 1: Information Systems in Global business today
Chapter 2: Global E-Business and Collaboration
Chapter 3: Info. Systems, Organisations and Strategy
Chapter 4: Ethical and Social Issues in Information Systems
MBA Year 1
12 INFORMATION AND KNOWLEDGE MANAGEMENT
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Introduction Section (pp 21 – 33).
1.1 Introduction
Technology is changing every aspect of our lives from entertainment to shopping,
from the work we do and where we do it, to how we communicate with friends
and relatives. Networking technologies are pervading almost everything we do
professionally, socially, and recreationally. Many companies are remodeling their
businesses and information systems with the Internet in mind. Now more than
ever, it is important for you to understand how technology works and how current
and future digital advances affect your work life.
Information systems are the foundation for conducting business today. In many
industries, survival and even existence is difficult without extensive use of
information technology. No longer can we imagine going to work and conducting
business without them. Today, society relies extensively on the use of
information appliances such as smart phones, handheld devices, and other
hardware. Communicating and conducting business is increasingly being carried
out through the use of e-mail, online conferencing, and international
teleconferencing. Internet technologies have become essential business tools.
MBA Year 1
13 INFORMATION AND KNOWLEDGE MANAGEMENT
The three changes in management information systems are listed in Table 1.1 in
the prescribed textbook. The table assesses the impact each change has on
businesses. It may be a fun exercise to peruse the list and see how many of the
changes you have personally experienced.
According to Laudon and Laudon (2016:44), when a firm goes digital, it is not
about just adding a computer system to the mix. Throwing a computer system at
outdated business processes is exactly the wrong thing to do. A truly digital firm
has several characteristics that distinguish it from most of the firms claiming to be
digitised:
Significant business relationships with customers, suppliers, and employees
are digitally enabled and mediated.
MBA Year 1
14 INFORMATION AND KNOWLEDGE MANAGEMENT
The number one reason digital firms experience greater opportunities for success
and profits is because they view information technology as the core of the
business and a primary management tool.
Operational excellence
New products, services, and business models
Customer and supplier intimacy
Improved decision making
Competitive advantage
Survival
MBA Year 1
15 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
16 INFORMATION AND KNOWLEDGE MANAGEMENT
separate themselves from their competition. Toyota worked its way to top of its
industry with the help of its legendary information system. Walmart is the most
efficient retail store in the industry based, in large part, on how well it uses its
information resources.
1.11 Survival
Firms also invest in information systems and technologies because they are
necessities for doing business. Information systems are not a luxury. In most
businesses, information systems and technology are the core to survival. In so
doing, they had a major competitive advantage over their competitors.
If the output report does not inform management that there is a serious problem
on the factory floor, then it serves no purpose at all.
If you do not know how to analyse the information from a website to take
advantage of new sales leads, then you are losing out on key opportunities to
generate further income. Most of us think only of hardware and software when
we think of an information system. There is another component of the triangle
that should be considered, and that is the people side or “persware.” Think of it
this way:
MBA Year 1
17 INFORMATION AND KNOWLEDGE MANAGEMENT
PERSWARE
HARDWARE SOFTWARE
The feedback process is most important yet it is often overlooked. The hardware
(input and output) and the software (processing) receive the most attention
Hardware and software provide computer literacy. However, if the “persware”
side of the triangle is neglected, the feedback loop is incomplete and nothing
much is accomplished. Add the “persware” angle with good feedback and you
have the beginnings of information literacy.
MBA Year 1
18 INFORMATION AND KNOWLEDGE MANAGEMENT
Figure 1.2 shows how using feedback completes the information processing
loop. To be a good information systems manager, however, you must bring into
that loop far more than just computer data.
REFLECTION QUESTIONS
1.1 Why is it important to understand the difference between computer literacy
and information literacy?
MBA Year 1
19 INFORMATION AND KNOWLEDGE MANAGEMENT
1.15 Organisations
Organisations are complex. Each one has its own individual personality yet at the
same time shares many things in common with other organisation’s habits.
Just as every football team needs good players at different positions, a business
organisation requires different employees to help it succeed. Knowledge
MBA Year 1
20 INFORMATION AND KNOWLEDGE MANAGEMENT
workers help create new knowledge for the organisation and data workers help
process the paperwork necessary to keep an organisation functioning. Without
production or service workers, how would the company get its products and
services to the customer?
The larger the organisation, the more formal the management structure, including
the need for standardised business processes. Most of these business
processes have been developed over time and help managers and employees
properly complete their tasks in a more efficient manner. Many companies now
integrate these business processes into their information systems to ensure
uniformity, consistency, and compliance. As we will see in upcoming chapters,
many companies are even incorporating informal work processes into their
information systems in an effort to capture as much corporate knowledge as
possible.
1.16 Management
A good organisation requires good managers - pretty simple, pretty reasonable.
Take professional baseball managers, for example. They do not actually play the
game; they do not hit the home run, catch the fly ball for the last out, or hang
every decoration for the celebration party. They stay on the sidelines during the
game. Their real role is to develop the game plan by analysing their team’s
strengths and weaknesses. They also determine the competition’s strengths and
weaknesses. Every good manager has a game plan before the team emerged
from the locker room. That plan may change as the game progresses, but
MBA Year 1
21 INFORMATION AND KNOWLEDGE MANAGEMENT
managers usually know what they are going to do if they are losing or if they are
winning.
As the products and services on networks expand every day, your need for new
networking and telecommunications technology links just seems to grow and
grow. The fastest and biggest change in modern computing is the Internet. To
say that the Internet is transforming the way we live, work, and play is probably
the greatest understatement in years. Businesses can create new opportunities,
but they can also lose opportunities just as quickly. Now an organisation has to
design new systems, or transform old ones, with not just the company in mind,
but 100 million other users of the Internet, extranets, and intranets. They have
to decide how much or how little information to provide, in what way, with what
level of access, and how best to present it. The World Wide Web allows big
companies to act “small,” and small companies to act “big.” It has leveled the
playing field so entrepreneurs can break into new markets previously closed to
them.
MBA Year 1
22 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
1.3 Discuss how complementary social, managerial, and organisational assets
help optimise returns from information technology investments.
Increased productivity
Increased revenues
Superior long-term strategic positioning
There are three ways an information system can add value to a business:
Figure 1.4 depicts the business information value chain. We will examine the
elements of this figure in more detail throughout this text.
MBA Year 1
23 INFORMATION AND KNOWLEDGE MANAGEMENT
Even the executive levels of an organisation can no longer ignore the technology
as they realise the importance of managing their organisational and
management capital. As a firm becomes more digitised, its information system
continues to extend beyond the traditional role of serving the employees.
Developing the complementary assets associated with the information systems
such as developing new business models and processes, changing management
behaviour and organisational culture, emphasising employee training in
technology, and creating new partnerships with suppliers, customers, and even
MBA Year 1
24 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
25 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTION
1.5. Describe why it is becoming increasingly important to view information
systems and technology from a sociotechnical aspect.
MBA Year 1
26 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
27 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 2
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Essential Reading
Textbook:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter Two: Global E-Business and Collaboration (pp 72 – 109).
MBA Year 1
28 INFORMATION AND KNOWLEDGE MANAGEMENT
2.1 Introduction
As discussed in Chapter 1, the “digital firm” means more than just installing
computers that have all the latest bells and whistles on every desk. A digital firm
must connect each functional area and each management level to one another.
Data input to the system in manufacturing must be made available to sales,
accounting, and shipping. Managers in the human resources department must
have access to appropriate information regardless of its origin. Information
integration is the key to the digital firm. This chapter will examine the types of
information systems organisations use to bring it all together. The chapter will
also identify the types of function each one is designed to accomplish and how
they fit together.
Table 2.1 describes typical business processes for each of the functional areas
of business. Later, we will how these businesses processes are supported by
enterprise systems.
MBA Year 1
29 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
30 INFORMATION AND KNOWLEDGE MANAGEMENT
not institute change. The system should supply recommendations; people still
have the ultimate decision-making responsibility.
MBA Year 1
31 INFORMATION AND KNOWLEDGE MANAGEMENT
Prior to integrated systems, managers received periodic printed reports that gave
them lots of data, but often did not supply information that they could utilise to
make timely decisions. Planning was sometimes a wasted effort because the
information the managers needed just was not there when they needed it.
With the integration of information systems up and down the management levels,
and throughout the corporation, managers can often get information in a real-
time mode. The data is kept online, the system can gather the precise
information managers need to make a decision, and the information can be cross
integrated into all departments of the company. All divisions in the company can
see what is going on throughout the corporation. Information can be passed from
department to department so that they are all working “on the same page.”
MBA Year 1
32 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS:
2.1 How can a transaction processing system help an organisation’s
management information system and decision-support system?
2.2 Which of the four major types of information systems do you think is most
valuable to an organisation?
MBA Year 1
33 INFORMATION AND KNOWLEDGE MANAGEMENT
if at all. Accounting and finance may have a system that serves their needs very
well, but they cannot collect information from the system used by manufacturing
and production. Sales and marketing is doing its own thing with its system and
losing valuable information from the other systems, which could help it do a
better job.
The greatest enticement of enterprise systems is the chance to cut costs firm-
wide and enhance the ability to pass information throughout the organisation.
The biggest drawbacks to building enterprise information systems are time,
money, and people. Because the installation of the system is so invasive, it takes
a tremendous amount of time to install the hardware and software, train people to
use it, and rework business processes that will then inevitably change. Many
companies find it more trouble than they care to handle.
MBA Year 1
34 INFORMATION AND KNOWLEDGE MANAGEMENT
Even if you properly manage your processes, wring out excess costs from every
corner of the organisation, and above all, have the best products at the lowest
cost, if you cannot get your products to the right customers at the right time what
good is all the rest? Managing your supply chain and getting products or services
to customers efficiently and effectively is the real key to success.
MBA Year 1
35 INFORMATION AND KNOWLEDGE MANAGEMENT
customers? Does your sales and marketing department make promises to your
customers that manufacturing and production cannot possibly keep?
MBA Year 1
36 INFORMATION AND KNOWLEDGE MANAGEMENT
Even with the rising popularity of these new ways of doing business, you should
take caution. It is easy to put up a creative, colourful website that looks good and
may even be easy to use. It may be a site on the Internet, an intranet, or an
extranet. You must consider though, how you are going to incorporate that part of
your business with your other, more established methods of doing business.
What internal processes must you change or adapt?
What new processes must you establish? What training must you do with the
people who will run the e-business, both technical and nontechnical? You cannot
keep doing your job the same old way. Many businesses have tried and many
have suffered huge financial losses.
MBA Year 1
37 INFORMATION AND KNOWLEDGE MANAGEMENT
Collaboration and teamwork has grown in popularity over the last few years
because new technology has made it much easier for people to communicate
and share information, files, and documents. Imagine how difficult it would be to
collaborate with a colleague across the country if you had to pass documents
back and forth using snail-mail. Collaboration and teamwork are central to the
success of many businesses. Here are six reasons why businesses promote
collaboration and teamwork:
Changing nature of work - traditionally work was organised into silos.
Now, most new jobs require interaction among employees, suppliers,
and customers.
Growth of professional work - most professional jobs require close
coordination and sharing information and opinions with other
professionals.
Changing organisation of the firm - traditionally organisations used a
managerial hierarchy. Now, many firms have been “flattened” and
expertise and decision-making powers are pushed down to groups and
teams.
Changing scope of the firm - globalisation has created organisations
that are disbursed to many geographically separated locations that
require close coordination.
MBA Year 1
38 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
39 INFORMATION AND KNOWLEDGE MANAGEMENT
Benefit Rationale
Productivity "People interacting and working together can capture expert
knowledge and solve problems more rapidly than the same
number of people working in isolation from one another. There
will be fewer errors."
Quality "People working collaboratively can communicate errors, and
corrective actions faster than if they work in isolation.
Collaborative and take social technologies help reduce time
delays in design and production."
Innovation "People working collaboratively can come up with more
innovative ideas for products, services, and administration than
the same number working in isolation from one another.
Advantages to diversity and the “wisdom of crowds.”
Customer "People working together using collaboration and social tools can
Service solve customer complaints and issues faster and more effectively
than if they were working in isolation”.
Financial "As a result of all of the above, collaborative firms have superior
Performance sales, sales growth, and financial performance."
Table 2.3: Benefits of Collaboration
Source: (Laudon and Laudon: 2016).
MBA Year 1
40 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
41 INFORMATION AND KNOWLEDGE MANAGEMENT
However, in order for all this to work well, an organisation must have the right
tools and technologies in place.
MBA Year 1
42 INFORMATION AND KNOWLEDGE MANAGEMENT
Online file-sharing services that allow you to upload files to secure online
storage sites are called cyberlockers. Your files are available from a
multitude of other computing devices including tablet computers,
smartphones, or any networked computer.
Enterprise Social Networking Tools: These tools, such as Jive and
Yammer, help connect an organisation’s members through profiles,
updates, and notifications but are restricted to internal corporate uses.
Some include user profiles, communities, e-mail, instant messaging, Web
meetings, calendars, personal dashboards and file-sharing.
MBA Year 1
43 INFORMATION AND KNOWLEDGE MANAGEMENT
The following six questions/steps can help you select the best product for the
task at hand:
What are my challenges in terms of time and space?
What solutions are available for each of the challenges?
What are the costs and benefits of each solution?
What security risks and vulnerabilities are associated with each solution?
What are the implementation and training issues associated with each
solution?
Choose the collaboration tools and seek presentations from the vendors.
MBA Year 1
44 INFORMATION AND KNOWLEDGE MANAGEMENT
people usually assigned to the financial group, have moved into the mainstream
of most companies.
Just as most organisations have a chief financial officer, the position of chief
information officer has been created to handle the myriad of problems and
opportunities businesses face in today’s technologically-driven environment. Very
large corporations appoint a chief security officer who is responsible for
enforcing the firm’s information security policy and training users and information
systems technologists about security. The CSO informs other executives and
managers of security threats and maintains security tools and policies. The chief
privacy officer protects an organisation’s data from misuse and abuse and
makes sure the company complies with data privacy laws. Another new position,
that of chief knowledge officer, has been created in larger corporations to deal
with effectively using knowledge management systems. Perhaps the most
important role of all, though, is the end user. The responsibility for successful
integration of information systems has extended past the “techies” and become
part of everyone’s job.
MBA Year 1
45 INFORMATION AND KNOWLEDGE MANAGEMENT
information system on the other hand has similar tasks regardless of the
functional area it is supporting. Sales and marketing needs access to data as do
production and manufacturing.
REFLECTION QUESTIONS
2.3 Discuss the benefits and challenges of enterprise systems and explain why
a firm would want to build one.
2.5 Discuss the tools and technologies for collaboration and social business that
are available and how they provide value to an organisation.
MBA Year 1
46 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
47 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 3
INFORMATION SYSTEMS,
ORGANISATIONS AND STRATEGY
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Identify and discuss the features of organisations that managers need to
know about to build and use information systems successfully.
Critically analyse the impact of information systems on contemporary
organisations.
Apply Porter’s competitive forces model, the value chain model, synergies,
core competencies, and network economics to help companies develop
competitive strategies using information systems.
Identify the challenges posed by strategic information systems.
Address the challenges posed by strategic information systems.
Essential Reading
Textbook:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter Three: Information Systems, Organisations and Strategy (pp 110
- 153).
MBA Year 1
48 INFORMATION AND KNOWLEDGE MANAGEMENT
Figure 1.2 and Figure 3.1 have many similarities.. Information systems and
organisations both require inputs and some sort of processing; both have
outputs, and both depend on feedback for successful completion of the loop.
Information systems use data as their main ingredient and organisations rely on
people. However, the similarities are remarkable. Both are a structured method
of turning raw products (data/people) into useful entities (information/producers).
Many times organisations are turned upside down when new information
MBA Year 1
49 INFORMATION AND KNOWLEDGE MANAGEMENT
systems are brought in. It is not because the system is all wrong for the business.
Usually it is because the system throws the delicate balance of rights, privileges,
obligations, responsibilities and feelings out of kilter.
REFLECTION QUESTIONS
3.1 Discuss the impact new information systems may have on organisational
culture and organisational politics.
3.2 Describe the difference between the economic theory and the behavioural
theory of how information systems affect organisations.
MBA Year 1
50 INFORMATION AND KNOWLEDGE MANAGEMENT
Table 3.1 shows some common organisational structures. Think about your own
experiences in your workplace or in your daily life, and try to list some
organisations that fit into each category. They are all around you and affect you
in so many ways. Remember, just as organisations affect you in many different
ways, so too do you affect the organisations.
MBA Year 1
51 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
52 INFORMATION AND KNOWLEDGE MANAGEMENT
When personal computers were introduced in the early 1980’s, it became the
norm for most people to have individual computing islands on their desks. The
computers were not connected to one another and if you wanted to exchange
data or information, you had to somehow get the data from your desk to the other
person’s desk.
MBA Year 1
53 INFORMATION AND KNOWLEDGE MANAGEMENT
Postindustrial Organisations
Postindustrial theories also support the notion that IT should flatten hierarchies.
Here is why:
Professional workers tend to be self-managing, and decision-making
should become more decentralised as knowledge and information
become more widespread throughout the firm.
IT may encourage task force–networked organisations in which
groups of professionals come together - face-to-face or electronically -
for short periods of time to accomplish a specific task. Once the task is
accomplished, the individuals join other task forces.
Technology makes virtual organisations more feasible, cheaper and easier to set
up and tear down than before. If you had a small group representing each
functional area of the company collaborating on a new production method, you
could bring them together, decide on the new methodology, and then return them
to their regularly assigned units.
MBA Year 1
54 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
55 INFORMATION AND KNOWLEDGE MANAGEMENT
3.4 Models
Google, Amazon and eBay arethe giants of the Internet. They are successful and
make loads of money. They could easily rest on their laurels, sit back and relax.
If they are so successful, why do they keep working so hard to continually
introduce new products and services and improve the old ones? Because
someone, somewhere, is trying to take their place and become the new giant.
These companies must constantly work to keep their competitive advantage and
they are using information systems to do so.
MBA Year 1
56 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
57 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
58 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
3.3 Discuss how business ecosystems can extend a company’s products and
services and increase its competitive advantage. Give an example of a business
ecosystem for a product or service that you are using.
MBA Year 1
59 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
60 INFORMATION AND KNOWLEDGE MANAGEMENT
Because of the tremendous growth of the Internet and its influence on all five
elements of Porter’s model, businesses must continually monitor the
organisational environment, especially the external environment for potential
challenges and opportunities. Those businesses that adapt their business model
stand a chance of success. Businesses that ignore the environmental changes
and remain stagnant, risk everything they have.
MBA Year 1
61 INFORMATION AND KNOWLEDGE MANAGEMENT
Table 3.3: Primary and Support activities on the Business Value Chain
Model
Adapted: (Laudon and Laudon: 2016).
MBA Year 1
62 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
63 INFORMATION AND KNOWLEDGE MANAGEMENT
so that each participant can improve its business processes. That in turn lowers
supply costs for Ford and ensures a certain level of standardisation across the
manufacturing process.
Suppliers can collaborate with one another via the value web to enhance their
core competencies and improve the entire supply chain. Sharing information
through the value web helps not just Ford but the entire vehicle manufacturing
industry.
MBA Year 1
64 INFORMATION AND KNOWLEDGE MANAGEMENT
3.7.1 Synergies
Research demonstrates how effective synergy can be. It would be impossible, ,
for example, for the television service provider to create content for its
customers. It would be impossible for the content creator to build a delivery
system to millions of homes. By developing a synergistic relationship between
two entities, everyone wins at a much lower cost with better products and
services.
MBA Year 1
65 INFORMATION AND KNOWLEDGE MANAGEMENT
tied to suppliers and business partners located in specific geographical areas but
can find the best service provider or business partner around the world. Porter’s
competitive forces model is predicated on traditional structures in separated
industries. That is, one company built a product including content. When IBM
built its first mainframe computer, it handled all the hardware design and
manufacture and also supplied all the software programs to go with it. Apple did
basically the same with its first personal computers. However all this is changing
rapidly based on business ecosystems.
MBA Year 1
66 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
67 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTION
3.5 Ask yourself the following questions for reflection:
a. What is the structure of the industry in which your firm is located?
b. What are the business, firm, and industry value chains for your firm?
c. How your firm aligned its IT with its business strategy and goals?
MBA Year 1
68 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
69 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 4
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Identify and discuss the ethical, social and political issues are raised by
information systems.
Critically analyse the specific principles for conduct that can be used to
guide ethical decisions.
Argue why contemporary information systems technology and the Internet
pose challenges to the protection of individual privacy and intellectual
property.
Explain how have information systems has affected laws for establishing
accountability, liability and the quality of everyday life.
Essential Reading
Textbook:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter Four: Ethical and Social Issues in Information Systems (pp 154 –
196).
MBA Year 1
70 INFORMATION AND KNOWLEDGE MANAGEMENT
Even though the Internet is about 40 years old and the World Wide Web is close
to 20 years old, our society is just beginning to address the ethical issues and
dilemmas raised by these technological advances. It is difficult to measure one
person’s ethics against another person’s desire to make money or wreak havoc.
That is made much easier by the Internet.
MBA Year 1
71 INFORMATION AND KNOWLEDGE MANAGEMENT
Trend Impact
Computing power doubles More organisations depend on computer systems
every 18 months for critical operations
Data storage costs rapidly Organisations can easily maintain detailed
decline databases on individuals
Data analysis advances Companies can analyse vast quantities of data
gathered on individuals to develop detailed
profiles of individual behaviour
Networking advances The cost of moving data and making it accessible
from anywhere falls exponentially
Mobile device growth Individual cell phones may be tracked without
impact user consent or knowledge
Table 4.1: Technology Trends that raise ethical issues
Source: (Laudon and Laudon: 2016)
In addition to the technologies described in Table 4.1 you need to understand the
most recent technological threats to your privacy in cyberspace. The scenario at
the beginning of this section about profiling is possible through the technique
called data mining.
REFLECTION QUESTIONS
4.1 Discuss the personal and professional implications of so much individual
data being gathered, stored and sold. Should businesses be allowed to gather as
much as they want? Should individuals have more control over their data that are
gathered?
4.2 Briefly describe your Internet Service Provider’s e-mail usage policy. If you
are on campus, your school should have a usage policy
MBA Year 1
72 INFORMATION AND KNOWLEDGE MANAGEMENT
Figure 4.1: The Relationship between Ethical, Social, and Political Issues in
an Information Society
Source: (Laudon and Laudon: 2016).
MBA Year 1
73 INFORMATION AND KNOWLEDGE MANAGEMENT
Factor Description
Responsibility Accepting potential costs, duties, and obligations for your
decisions.
Accountability Determining who should take responsibility for decisions and
actions
Liability Legally placing responsibility with a person or group.
Due Process Ensuring the laws are applied fairly and correctly.
Table 4.2: Awareness factors when using the Internet
Adapted: (Laudon and Laudon: 2016)
Responsibility, accountability and liability are all yours when it comes to your
actions in cyberspace. Every Internet Service Provider has a “usage policy,” even
the so-called anonymous e-mailers that hide your real identity. Hotmail is a
popular Internet e-mail service that allows you to mask your real identity. You
could, for example, send out all the unethical, threatening, nasty, aberrant e-mail
you like.
MBA Year 1
74 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
4.3 Describe how your quality of life has improved or declined with the
technological advances in the last five years.
4.4 How do you think government should handle the political issue of Internet
decency and access limitations?
MBA Year 1
75 INFORMATION AND KNOWLEDGE MANAGEMENT
Software Description
Cookies By using cookies, a part of every browser program. If you have
Internet access and have ever visited a Web site, you can bet you
have a cookie file on your computer.
Web Web beacons help track users and determine what they do and do
beacons not do on the Internet.
Spyware This type of software is installed directly onto your computer and
sends data to the company about your surfing habits. Unfortunately,
this software can also cause problems with your computer and send
information that can be used in identity theft. If you have not yet
installed spyware detection software on your computer you should
consider doing so.
Table 4.3: Software that pose challenges to privacy
Adapted: (Laudon and Laudon: 2016).
MBA Year 1
76 INFORMATION AND KNOWLEDGE MANAGEMENT
Most e-commerce merchants are pushing for self-regulation and the practice of
requiring individuals to “opt-out” of data gathering. Opting out allows individuals
to instruct an organisation not to share personal information with any third party.
The South African government initially agreed with that position, but has since
realised it is not working very well for individuals. In mid-2000, the Federal Trade
Commission started seeking government regulation of information gathering and
advocates the right of individuals to “opt-in.” Opting in requires individuals to
expressly give an organisation the right to gather information before any
information can be collected.
Copyright laws and intellectual property rights cannot be violated on the Internet
any more than they can in other mediums. Although this is not a law class, you
should be aware of the fine line between acceptable and legal usage of materials
MBA Year 1
77 INFORMATION AND KNOWLEDGE MANAGEMENT
and the illegal theft of materials. When it comes to copyright material, the
underlying ideas are not protected; only the publication of the material is. On the
other hand, a patent grants a monopoly on the underlying concepts and ideas.
Before you use anything, especially any material on the World Wide Web, make
sure you are using it legally and ethically.
MBA Year 1
78 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
79 INFORMATION AND KNOWLEDGE MANAGEMENT
but one thing is clear: You will be a part of the evolution of technology for the rest
of your life.
As managers, you should be acutely aware of the health issues associated with
computer usage, especially repetitive stress injury (RSI). These cost
businesses huge amounts of money each year in medical treatment claims and
lost productivity. Carpal tunnel syndrome, a subset of RSI, is the most serious
health issue plaguing businesses. Computer vision syndrome is increasing as
people continually use computer screens and handheld devices that strain
eyesight.
It does not take much to avoid the problems associated with computer usage.
Ergonomics, the study of the relationship between humans and machines, has
helped determine that it is cheaper to purchase equipment that reduces the
health risks associated with computers, such as different keyboards, monitors
that reduce eye strain, and desks that allow proper body positions.
Too much of a good thing can be bad. You have heard of road rage. We are now
experiencing road rage on the Information Superhighway, and it is called
technostress. Managers should encourage their employees to take frequent
breaks from their computers and to recognise and understand the dangers of
isolation from people. We may be a wired nation, but we still need the human
touch.
MBA Year 1
80 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTION
4.5 To what extent should Internet Service Providers be held liable and
accountable for the use of their equipment?
MBA Year 1
81 INFORMATION AND KNOWLEDGE MANAGEMENT
SECTION B
INFORMATION TECHNOLOGY
INFRASTRUCTURE
MBA Year 1
82 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 5
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Ascertain what Information Technology infrastructure is all about.
Identify and describe the stages and drivers of the Information Technology
infrastructure evolution.
Identify and explain the functions of the various components of Information
Technology infrastructure.
Critically analyse the current trends in computer hardware platforms.
Critically analyse the current trends in computer software platforms.
Critically analyse the challenges of managing Information Technology
infrastructure and management solutions.
Essential Reading
Textbook:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter Five: Information Technology (IT) Infrastructure and Emerging
Technologies (pp 198- 246).
MBA Year 1
83 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
84 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
85 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
86 INFORMATION AND KNOWLEDGE MANAGEMENT
As you realise that each era built upon previous advances made in hardware,
software, and services, let your imagination drift for a moment to the possibilities
that the future holds. It truly is an exciting time to be involved in technology.
MBA Year 1
87 INFORMATION AND KNOWLEDGE MANAGEMENT
need the extra storage for photos, music and video. How much storage
does the average user really need?
Metcalfe’s Law and network economics: If you build a network for ten
users, one will spend the necessary money for the basic equipment. If you
already have the equipment in place, you can add one more user at
nominal costs. However, the additional user will bring value to the network
far beyond what it costs to add him/her.
Declining communications costs and the Internet: One of the biggest
drivers in the exploding use of computers is directly attributable to the
Internet. It is getting cheaper every day to connect to the Internet because
of declining communication costs. As more and more users connect to the
Internet, businesses must find ways to meet the expectations and
demands of users, especially in the area of mobile computing devices.
Standards and network effects: Nothing has helped grow the Internet
more than having technology standards in place allowing suppliers to
create and build products that work seamlessly with each other. Users
have come to rely on the interoperability of products.
Table 5.1 outlines the standards that have laid the groundwork for services we
now enjoy in technology.
Standard Significance
American Standard Made it possible for computer machines from different
Code for Information manufacturers to exchange data; later used as the
Interchange (ASCII) universal language linking input and output devices such
(1958) as keyboards and mice to computers. Adopted by the
American National Standards Institute in 1963.
Common Business An easy-to-use software language that greatly expanded
Oriented Language the ability of programmers to write business-related
(COBOL) (1959) programs and reduced the cost of software.
Unix (1969–1975) A powerful multitasking, multiuser, portable operating
MBA Year 1
88 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
89 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
90 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
5.1 Determine the total cost of ownership associated with the technology in
your workplace or classroom, even if that is your own home. Use your hourly
wage or salary as a basis to figure the persware cost.
5.2 Describe the five technology drivers of the infrastructure evolution. Which do
you think has been the most influential in helping us achieve the level of
technology we enjoy today?
Unix and Linux are often associated with large networks that require less
application overhead and faster processing. Linux open-source software is
becoming the operating system of choice for organisations looking to save
money. Businesses and governments across the globe are adopting the Linux
platform as a way to reduce IT spending and licensing costs.
MBA Year 1
91 INFORMATION AND KNOWLEDGE MANAGEMENT
Many smartphones use multi-touch technology that allows users to pinch the
screen or swipe their fingers over the screen to issue commands. The new
Windows 8 operating software and Apple’s iOS extends that technology to full-
size desktop and laptop computers.
MBA Year 1
92 INFORMATION AND KNOWLEDGE MANAGEMENT
These services become more critical as many companies merge their old legacy
systems with newer technologies such as wireless computing. The legacy
systems, some 20 or 30 years old, simply cannot be thrown away but must work
seamlessly with today’s technologies. Companies choose not to totally replace
legacy systems because it is too expensive, involves too much training, and
carries too much organisational change. It is easier to use middleware and other
technologies to merge old and new systems.
MBA Year 1
93 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
94 INFORMATION AND KNOWLEDGE MANAGEMENT
5.3.4 Virtualisation
Server computer hardware prices have fallen over the years to the point where
they are relatively cheap. Hence the problem. Rather than increase the efficiency
and utilisation of existing hardware, many companies just buy more of it and stick
it on the shelf. Not much thought is given to the total cost of ownership (TCO) of
all the hardware. As it turns out, the TCO is as much or more than the original
purchase price. Furthermore, the hardware utilisation rates are extremely low.
The concept of TCO will be further discussed at the end of this chapter.
Consider, for example, that your kitchen light is switched on for 24 hours. You
only spend around 4 hours a day in the kitchen. You end up wasting 20 hours of
electricity for those 4 hours of use. Of course this is a simplified example but you
get the idea of how computer usage is wasted running all those servers for a
fraction of the time they are actually used. It is not unusual for a company to have
MBA Year 1
95 INFORMATION AND KNOWLEDGE MANAGEMENT
one server for this application and another server for that application. The
applications are stored on separate servers using different operating systems. It
is a very wasteful configuration.
MBA Year 1
96 INFORMATION AND KNOWLEDGE MANAGEMENT
Almost any type of computing device can access data and applications from
these clouds through three types of services:
Cloud infrastructure as a service: Allows customers to process and
store data, and use networking and other resources available from the
cloud.
Cloud platform as a service: The service provider offers infrastructure
and programming tools to customers so they can develop and test
applications.
Cloud software as a service: The vendor provides software programs
on a subscription fee basis.
Cloud computing is becoming popular because customers pay only for the
computing infrastructure that they actually use. In many cases users experience
lower IT costs than if they had to buy all the equipment, hire the technical staff to
run it and maintain it, and purchase software applications.
MBA Year 1
97 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
98 INFORMATION AND KNOWLEDGE MANAGEMENT
Power consumption alone raises the TCO of servers to very high levels -
businesses spend as much running a server as they did on purchasing it.
Similarly, you can have all the computer hardware money can buy, but if you do
not have the right software, you cannot do much with the hardware Let us review
some information about software platform trends that helps get the most out of
your hardware. The is a common thread among the trends: they are not
restricted to a certain type of hardware or a certain brand of software.
MBA Year 1
99 INFORMATION AND KNOWLEDGE MANAGEMENT
More people are able to review the code, find problems and fix them more
quickly.
MBA Year 1
100 INFORMATION AND KNOWLEDGE MANAGEMENT
The original version of HTML was created when the Web was first born. It never
took into account that people would eventually want to incorporate audio, video
and pictures within a Web page. More importantly, the authors of basic HTML
language never envisioned that people would want to access the Web through
small handheld devices, smartphones, tablets and netbooks. As our computing
hardware has evolved, so too must the software that provides information to all
those devices. The next evolution of HTML is HTML5. HTML5 provides a more
robust way to incorporate images, audio and video into Web pages making them
more dynamic. It also provides better functionality of Web pages on mobile
devices such as smartphones and tablet computers.
As we use the Web for more applications, computer languages are evolving to
keep up with new and innovative uses. HTML has worked well for displaying text
and graphics. However, current computing environments demand more. XML is
designed to control data on a Web page or site and make it more manageable. A
Web service-oriented architecture combines separate applications like a
secure, third-party billing transaction with a payment system into one cohesive
unit.
MBA Year 1
101 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
102 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
5.3 Discuss how cloud computing can provide value to a business.
It is worth noting that most Apps are developed for a specific device or devices
from a specific company. Apps written for the Apple company will run on any
Apple device. However, Apps written for an Apple device will generally not run on
a device manufactured or sold by Samsung or a BlackBerry. An increasing
number of Apps are being created for business users that allows them to access
server documents, call up sales data from the corporate database or schedule
meetings with colleagues or customers.
MBA Year 1
104 INFORMATION AND KNOWLEDGE MANAGEMENT
Firms that use cloud computing and software-as-a-service need to address these
issues:
Make new contractual arrangements with remote vendors for IT
infrastructure availability.
Meet corporate standards for information security.
Determine and ensure acceptable levels of computer response time and
availability.
MBA Year 1
105 INFORMATION AND KNOWLEDGE MANAGEMENT
losing business and thousands or millions of dollars. Easy Internet access and
competition means customers can simply go elsewhere if the company does not
adjust to the new world.
MBA Year 1
106 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
107 INFORMATION AND KNOWLEDGE MANAGEMENT
infrastructure investment, your company could align its IT spending with its
needs:
Inventory the market demand for your firm’s services.
Analyse your firm’s five-year business strategy.
Examine your firm’s IT strategy, infrastructure, and cost for the 5 years.
Determine where your firm is on the bell curve between old technologies
and brand new ones.
Benchmark your service levels against your competitors.
Benchmark your IT expenditures against your competitors.
REFLECTION QUESTION
5.5 Discuss the business value of open-source software.
MBA Year 1
108 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
109 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 6
FOUNDATIONS OF BUSINESS
INTELLIGENCE: DATABASES AND
INFORMATION MANAGEMENT
Learning Outcomes
Upon completion of this chapter, the student should be able to:
MBA Year 1
110 INFORMATION AND KNOWLEDGE MANAGEMENT
Essential Reading
Textbook:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter Six: Information Technology (IT) Infrastructure and Emerging
Technologies (pp 198- 246).
6.1 Introduction
Information is becoming as important a business resource as money, material
and people. The fact that a company can collate a vast quantity of data does not
necessarily mean it can produce information that its employees, suppliers and
customers can use. Businesses are realising the competitive advantage they can
gain by compiling useful information, not just data.
MBA Year 1
111 INFORMATION AND KNOWLEDGE MANAGEMENT
An entity is basically the person, place, thing or event on which you maintain
information. Each characteristic or quality describing an entity is called an
attribute. Each column in Table 6.1 describes a characteristic (attribute) of
Sipho Mandla (who is the entity) address.
MBA Year 1
112 INFORMATION AND KNOWLEDGE MANAGEMENT
Suppose you decide to create a database for your newspaper delivery business.
To succeed, you need to keep accurate, useful information for each of your
customers. You set up a database to maintain the information. You create a
record for each customer. Within each record you have the following fields:
customer first name, customer last name, street address, city, province, postal
code, ID, and date last paid. Smith, Jones and Brooks are the records within a
file you decide to call Paper Delivery. The entities then are Smith, Jones and
Brooks, the people about whom you are maintaining information. The attributes
are customer’s name (first and last), address (street, city, province, postal code),
ID, and date last paid. This is a very simplistic example of a database, but it
should help you understand the terminology.
MBA Year 1
113 INFORMATION AND KNOWLEDGE MANAGEMENT
including your local bank. Everything is going smoothly with your monthly
statements.
All of a sudden, at the end of the year, the bank sends a Christmas card to
your new address and one to your old address. Why? Because your new
address was changed in one database, but the bank maintains a separate
database for its Christmas card list and your address was never changed
in it. That is data inconsistency. Just from these two simple examples
you can see how data redundancy and inconsistency can waste resources
and cause nightmares on a much larger scale.
Program-Data Dependence: Some computer software programs, mainly
those written for large, mainframe computers, require data to be
constructed in a particular way. Since the data is specific to that program,
it cannot be used in a different program. If an organisation wants to use
the same data elsewhere, it has to reconstruct it. Now the organisation is
spending money and time to establish and maintain separate sets of data
on the same entities because of program-data dependence.
Lack of Flexibility: The sales and marketing manager needs information
about his company’s new production schedule. However, he does not
need all the data in the same order as the production manager’s weekly
report specifies. Too bad. The company’s database system lacks the
flexibility to give the sales manager the information he needs, how he
needs it, and when he would like to receive it.
Poor Security: Traditional file environments have little or no security
controls that limit who receives data or how they use it. With all the data
captured and stored in a typical business, this is unacceptable.
Lack of Data Sharing and Availability: What if the CEO of a business
wants to compare sales of Widget A with production schedules? That
might be difficult if production data on the widgets is maintained differently
by the sales department. This problem happens far more frequently in
older traditional file environments that lack the ability to share data and
make it available across the organisation.
MBA Year 1
114 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
6.1 Describe the three capabilities of database management systems: data
definition, data dictionary and data manipulation language. Discuss the
importance of creating and using a data dictionary with a large corporate
database.
MBA Year 1
115 INFORMATION AND KNOWLEDGE MANAGEMENT
The physical view of data focuses on where the data are actually stored in the
record or in a file. The physical view is important to programmers who must
manipulate the data as they are physically stored in the database.
Does it really matter to the user that the customer address is physically stored on
the disk before the customer name? Probably not. However, when users create a
report of customers located in a city, they generally will list the customer name
first and then the address. So it is more important to the end user to bring the
data from its physical location on the storage device to a logical view in the
output device, whether It is on screen or on paper.
MBA Year 1
116 INFORMATION AND KNOWLEDGE MANAGEMENT
Data in each table is broken down into fields. A field, or column, contains a
single attribute for an entity. A group of fields is stored in a record or tuple (the
technical term for record). Figure 6.4 in the prescribed text book shows the
composition of relational database tables.
Each record requires a key field, or unique identifier. The best example of this is
your social security number—there is only one per person. That explains in part
why so many companies and organisations ask for your identity number when
you do business with them.
MBA Year 1
117 INFORMATION AND KNOWLEDGE MANAGEMENT
There are two important points about creating and maintaining relational
database tables. First, you should ensure that attributes for a particular entity
apply only to that entity. That is, you would not include fields in the customer
record that apply to products the customer orders. Fields relating to products
would be in a separate table.
Second, you want to create the smallest possible fields for each record. For
instance, you would create separate fields for a customer’s first name and last
name rather than a single field for the entire name. It makes it easier to sort and
manipulate the records later when you are creating reports.
Wrong way:
Name Address Telephone number
Sipho T Mandle 111 Main St, Cape Town, +2721442536
Western Cape, 2213
Right way:
First Middle Last Street City Province Code Telephone
Name Initial Name
Sipho T. Mandla 111 Cape Western +2721442536
Main St Town Cape
The biggest problem with these databases is the misconception that every data
element should be stored in the same table. In fact, each data element should be
MBA Year 1
118 INFORMATION AND KNOWLEDGE MANAGEMENT
analysed in relation to other data elements, with the goal of making the tables as
small in size as possible. The ideal relational database will have many small
tables, not one big one. On the surface that may seem like extra work and effort,
but by keeping the tables small, they can serve a wider audience because they
are more flexible. This setup is especially helpful in reducing redundancy and
increasing the usefulness of data.
MBA Year 1
119 INFORMATION AND KNOWLEDGE MANAGEMENT
Data dictionary: Each data element or field should be carefully analysed when
the database is first built or as the elements are later added. Determine what
each element will be used for, who will be the primary user, and how it fits into
the overall scheme of things. Then write down all the element’s characteristics
and make them easily available to all users. This is one of the most important
steps in creating a good database. Each data definition is then included in the
data dictionary.
Why is it so important to document the data dictionary? Imagine Suzy, who was
in on the initial design and building of the database, moves on and Joe takes her
place. It may not be so apparent to him what all the data elements really mean,
and he can easily make mistakes from not knowing or understanding the correct
use of the data. He will apply his own interpretation, which may or may not be
correct. Once again, it ultimately comes down to a persware problem.
Users and programmers can consult the data dictionary to determine what data
elements are available before they create new ones that are the same or similar
MBA Year 1
120 INFORMATION AND KNOWLEDGE MANAGEMENT
to those already in the data dictionary. This can eliminate data redundancy and
inconsistency.
First, you should think long and hard about how you use information in your
current situation. Think of how it is organised, stored and used. Now imagine how
this information could be better organised better and used more easily
throughout the organisation. What part of the current system would you be willing
to get rid of and what would you add? Involve as many end-users in this planning
stage as possible. They are the ones who will prosper or suffer because of the
decisions made at this point.
MBA Year 1
121 INFORMATION AND KNOWLEDGE MANAGEMENT
Whichever relationship type you use, you need to make sure the relationship
remains consistent by enforcing referential integrity. That is, if you create a
table that points to another table, you must add corresponding records to both
tables.
Determine the relationships between each data entity by using an entity-
relationship diagram like the one below.
Determine which data elements work best together and how you will organise
them in tables. Break your groups of data into as small a unit as possible
(normalisation). Even when you say it is as small as it can get, re-evaluate.
Decide what the key identifier will be for each record. See, you have done all this
and you have not even touched the computer yet!
Give it your best shot in the beginning. It costs a lot of time, money, and
frustration to go back and make changes or corrections or to live with a poorly-
designed database.
MBA Year 1
122 INFORMATION AND KNOWLEDGE MANAGEMENT
The term big data is used to describe those kinds of data that cannot be stored
and processed in typical database management systems. Although the term is
not meant to describe the quantity of data, it does reach into the exabyte and
petabyte range. Companies want and need to capture, store, process and
generate information from big data because it shows patterns in business
transactions and processes that may be useful to executives and managers.
MBA Year 1
123 INFORMATION AND KNOWLEDGE MANAGEMENT
Many times businesses store data in separate systems even though they have
made great strides in migrating everything into one large database. In some
cases, the data is structured, semi-structured or unstructured. Somehow, all this
has to come together at some point using appropriate tools and technologies.
Firms need to know how to do that effectively and efficiently.
Data warehouses are not great big buildings with shelves storing bits and bytes.-
They are huge computer files that store old and new data about anything and
everything that a company wants to maintain information on. Data comes from a
variety of sources, both internal and external to the organisation. They are t
stored together in a data warehouse from which they can be accessed and
analysed to fit the user’s needs. Because a data warehouse can be cumbersome
due to its size and sheer volume of data, a company can break the information
into smaller groups called data marts.
MBA Year 1
124 INFORMATION AND KNOWLEDGE MANAGEMENT
It is easier and cheaper to sort through data marts that tend to be more focused
on a particular subject. However, it is still useful to have a huge data warehouse,
so information is available to everyone who wants or needs it. You can let the
user determine how the data will be manipulated and used.
Using data warehouses and data marts correctly can give management a
tremendous amount of information that can be used to trim costs, reduce
inventory, put products in the right stores at the right time, attract new customers
or keep old customers happy.
6.7.4 Hadoop
For the kinds of data we discussed earlier that do not fit neatly into rows,
columns and tables, a new technology called Hadoop is better at handling
unstructured and semi structured big data. Hadoop is an open-source software
framework that uses distributed parallel processing across a network of small
computers.
The software divides huge data set problems into smaller subsets, sends the
subsets to smaller computers for processing, and then gathers the results back
into a data set that is analysed.
MBA Year 1
125 INFORMATION AND KNOWLEDGE MANAGEMENT
In-memory computing eliminates the bottlenecks and the data movement time
by moving all the data at once into the computer’s main RAM memory and
processes it all at once. That is only possible because of the advances in chip
technology, multicore processing and lower prices for main memory.
MBA Year 1
126 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
6.3 What do you see as the benefits of using a Web-like browser to access
information from a data warehouse?
6.4 What advantage do non-relational databases and cloud databases
provide to businesses?
MBA Year 1
127 INFORMATION AND KNOWLEDGE MANAGEMENT
For instance, data mining can tell you that on a hot summer day in the middle of
a city, more bottled water is sold in convenience stores than in grocery stores.
That is information managers can use to make sure more stock is targeted to
convenience stores. Data mining could also reveal that when customers
purchase white socks, they also purchase bottled water 62 percent of the time.
We seriously doubt there is any correlation between the two purchases. The
point is that you need to beware of using data mining as a sole source of
decision making and make sure your requests are as focused as possible.
There are the five types of information managers can obtain from data mining:
Many companies collect lots of data about their business and customers. The
most difficult part has been to turn that data into useful information. Firms are
using better data mining techniques to target customers and suppliers with just
the right information at the right time.
MBA Year 1
128 INFORMATION AND KNOWLEDGE MANAGEMENT
certain times of the year. Based on its predictive analysis, the retailer then tailors
its sales offers to meet that expected behaviour.
Because so much business is taking place over the Web, businesses are trying
to mine data from it also. There are three categories of Web mining processes:
Web content mining: Extract knowledge from the content of Web pages
text, images, audio, and video.
Web structure mining: Data related to the structure of a Web site links
between documents.
Web usage mining: User interaction data recorded by Web servers user
behaviour on a Web site.
MBA Year 1
129 INFORMATION AND KNOWLEDGE MANAGEMENT
One Web site, Gilt.com, sells designer clothes and other high-end items online to
“members only.” It showcases overstocked inventory from major brands at 60 to
70 percent discounts.
Figure 6.5 shows how servers provide the interface between the database
and the Web.
MBA Year 1
130 INFORMATION AND KNOWLEDGE MANAGEMENT
Ask any manager what resources are and they are likely to list people,
equipment, buildings and money. Very few managers will include information on
the list, yet it can be more valuable than some of the others. A data
administration function, reporting to senior management, emphasises the
MBA Year 1
131 INFORMATION AND KNOWLEDGE MANAGEMENT
importance of this resource. This function helps define and structure the
information requirements for the entire organisation to ensure it receives the
attention it deserves.
You need to get the non-techies talking and working with the techies, preferably
together in a group that is responsible for database administration. Users will
take on more responsibility for accessing data on their own through query
languages if they understand the structure of the database. Users need to
understand the role they play in treating information as an important corporate
resource.
MBA Year 1
132 INFORMATION AND KNOWLEDGE MANAGEMENT
It is better for the company or organisation to uncover poor quality data than to
have customers, suppliers or governmental agencies uncover the problems.
REFLECTION QUESTION
6.5 Discuss management issues associated with databases such as
information policies, data administration, data governance and data quality?
MBA Year 1
133 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
134 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 7
TELECOMMUNICATIONS, THE
INTERNET AND WIRELESS
TECHNOLOGY
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Describe the principal components of telecommunications networks and
key networking technologies.
Explain the structure and operation of the different types of network
topologies.
Discuss in detail how Internet and Internet technology works and how they
support communication and e-business.
Critically analyse and evaluate the principal technologies and standards
for wireless networking, communication, and Internet access.
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 7- Telecommunications, The Internet and Wireless
Technology (pp 247 – 286).
MBA Year 1
135 INFORMATION AND KNOWLEDGE MANAGEMENT
7.1 Introduction
Anytime, anywhere, any way, is the mantra of many computer users. Improved
telecommunications technologies, the process of electronically communicating
information, is making it possible. Looking for an example of how much this
revolution is touching every aspect of how we work, live, play and learn? Look no
further than this page - you would not be reading this if it were not for
telecommunication networks!
MBA Year 1
136 INFORMATION AND KNOWLEDGE MANAGEMENT
It is important to remember that you can continually add components to this kind
of network and expand it exponentially. You can take a simple desktop computer
and by way of a Network Interface Card (NIC), incorporate it into an existing
network. In order to share network resources such as printers, and to route
communications on a LAN, you require special software called a network
operating system (NOS). Hubs and switches help route traffic on the network
to the right computing device. When two or more networks are connected to each
other, you need a router that sends data transmissions to the correct network
device. Very large networks may require multiple routers so transmissions flow
more quickly.
MBA Year 1
137 INFORMATION AND KNOWLEDGE MANAGEMENT
Compare Figure 7.1 that depicts a simple computer network to Figure 7.2 that
highlights a corporate network infrastructure. You will see that the network you
might use in a large company is not all that different from what you might use in
your home. Obviously there will be more computing devices and servers but
basically you will have the same network infrastructure.
Most corporations, large or small, will use a combination of public and private
transmission mediums including networks built separately for voice
communication and computer transactions. Slowly, the separate networks are
converging into one that can transmit any type of data generated by any type of
device.
MBA Year 1
138 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
7.1 Discuss the advantages of a company using the TCP/IP standard to build a
network.
7.2 Discuss some of the Internet services available to businesses and how they
can provide value.
MBA Year 1
139 INFORMATION AND KNOWLEDGE MANAGEMENT
server computer and then sent to and reassembled on the client computer. It
happens so quickly and so efficiently that you do not even notice. Packet
switching also checks for transmission errors when data travel from one location
to another.
Companies can create Web-based interfaces for different databases for data
input/output and accessing information without actually combining the data
physically in one huge computer. They do so by using TCP/IP models. With
these protocols, they can reduce the disruption to the organisation and decrease
the overall costs of adding to their network. Fig 7.3 shows you how TCP/IP
works.
MBA Year 1
140 INFORMATION AND KNOWLEDGE MANAGEMENT
The most important benefit of the TCP/IP model is that it allows two computers to
communicate even if they are based on different hardware and software
platforms.
MBA Year 1
141 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
142 INFORMATION AND KNOWLEDGE MANAGEMENT
All the transmission channels discussed in this section combine to give you what
seems to be a single clear channel from one physical location to another physical
location. In fact, it is very likely that when you access the Internet and call up a
Web site you are using a combination of twisted pair wire, fiber-optic cable,
microwave stations, and satellites to transmit data from your computer to another
computer. Table 7.1 provides a description and speed of each type of
transmission medium you may use when communicating from one point to
another.
MBA Year 1
143 INFORMATION AND KNOWLEDGE MANAGEMENT
When you transmit the latest information from a Web site to your personal
computer, the speed at which it moves across all the transmission media is
measured in bits per second (BPS). The speed at which the bits are transmitted
MBA Year 1
144 INFORMATION AND KNOWLEDGE MANAGEMENT
in each cycle is referred to as hertz. If you transmit one million bits in each cycle,
you would call that rate megahertz (one million bits per a single cycle). The
bandwidth of a communication channel is measured by the difference between
the highest and lowest frequencies that can be transmitted by that channel.
The Internet consists of computer networks spread all over the world, through
wired and wireless transmission media, which contain software codes that allow
them to talk to each other. That is it. If you tried to find a single “front door” to the
Internet, you would be looking for a long, long time.
MBA Year 1
145 INFORMATION AND KNOWLEDGE MANAGEMENT
The Domain Name System was devised because it is much easier for people to
read letters and words than to work with series of numbers. The DNS uses a
hierarchical breakdown of addresses as Figure 7.5 shows.
MBA Year 1
146 INFORMATION AND KNOWLEDGE MANAGEMENT
If experts’ forecasts are correct about the increasing usage and reliance on the
Internet, and there is no reason to believe they are not, we need to improve and
change the current configuration to meet future demand. The Internet2 project
may help. The Next Generation Internet project has similar goals of advancing
the use of the Internet in ways that will enhance our lives. Here’s how the
Internet2 Web site (http://www.internet2.com ) compares the two projects:
MBA Year 1
147 INFORMATION AND KNOWLEDGE MANAGEMENT
The most useful feature of e-mail is the ability to attach files to a message and
send them to colleagues anywhere in the world. This feature alone makes it a
valuable tool for telecommuters and for collaborating with co-workers, wherever
they may be. Unfortunately the effectiveness of e-mail as a viable communication
tool is diminished by spam and junk mail. The sheer numbers of e-mail
messages sent are overwhelming some corporate e-mail servers. Some
businesses are now encouraging “no e-mail Fridays.” Companies are using chat
and instant messaging as a viable alternative to e-mail.
MBA Year 1
148 INFORMATION AND KNOWLEDGE MANAGEMENT
others.
Collaborate across any workspace: Advanced collaboration tools
make it possible to create high quality, secure, adaptive
workspaces throughout your organisation. When co-workers,
partners, vendors and customers can collaborate more effectively,
organisations can quickly adapt to market changes and build
competitive advantage.
Accelerate decision-making: Sophisticated unified
communications capabilities such as presence, instant messaging,
and rich media services help ensure that information reaches the
right person right away. This dramatically improves end-user and
enterprise productivity.
Innovate across the value chain: Embedding unified
communications capabilities into business applications allow
organisations to transform business processes and enjoy new
levels of customer satisfaction and innovation.
Integrate with other industry-leading applications: Cisco Unified
Communications is open. It integrates with other industry-leading
applications and a wide variety of endpoints, so workers can
collaborate in real time using their choice of tools and applications.
(www.Cisco.com, Nov 2008)
MBA Year 1
149 INFORMATION AND KNOWLEDGE MANAGEMENT
7.7.1 Hypertext
A discussion has already been held around protocols: the rules by which data is
transmitted over networks. The Hypertext Transfer Protocol (http) is what
allows the Web to operate. When you see a Uniform Resource Locator (URL)
address on a Web site, it will generally start with http://www. Most software
browser programs now automatically insert that for you so you can simply enter
the domain name of the Web site you want to access businessweek.com, for
instance. A URL that begins with https indicates a site using secure socket layers
that offers more secure transmission protocols than the plain http.
There is a difference between a Web site and a Web page. A Web site has the
short domain address, such as www.prenhall.com. It is the central repository for
many individual Web pages that are included at the end of the address after the
MBA Year 1
150 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
7.3 Discuss the emerging Voice over Internet Protocol (VoIP) technology and
some of the advantages it may provide to businesses.
7.4 Use your imagination and come up with ideas of how your organisation or
company can use a wireless network. What current processes will you have
to change to incorporate your idea?
MBA Year 1
151 INFORMATION AND KNOWLEDGE MANAGEMENT
When you are shopping for products in a brick-and-mortar store, how many times
have you wondered if the price on that new bicycle is the best you can get? With
mobile search capability on your smartphone or tablet, you can access other
stores or dealers and determine on-the-spot if you are getting the best deal.
Mobile search also comes in handy if you are trying to find restaurants, hotels or
popular sight-seeing spots in an unfamiliar area.
Search result listings show you which Web sites contain information related to
your search words or phrases. The listings may also include sponsored links to
sites related to your search request. Sponsored links are part of a burgeoning
business known as search engine marketing. It provides businesses a new way
to connect to potential customers through the special links at the top of the
search result list or a special box on the right side of the search result page.
MBA Year 1
152 INFORMATION AND KNOWLEDGE MANAGEMENT
Each time a user clicks on a sponsored link, the advertiser pays a fee to the
search engine. Because most people tend to stick to the first ten results of a
search list, it is important that Webmasters and site owners do what they can to
have their sites listed as close to the top of the list as possible. Search engine
optimisation is the art and science of creating Web sites and pages to enable
this to happen. For instance, if your Web site is devoted to selling African violets,
you can include keywords in your home page in such a way that your site will
rank higher than others in search results. Another trick is to link your site to
similar sites devoted to the same subject - link your site to the African Violets
Society of America’s site.
Assume you want to find the specifications online of an Apple iPad so you can
compare it to an Amazon Kindle. You enter the search term “iPad specifications”
in Google’s search engine and you get a hundred suggested sites to purchase
the product rather than the specifications themselves. Google is working hard to
fix this problem through its development of semantic search. Its goal is to build
a search engine that understands human thoughts and phrases rather than just
finding words in its database. It is also working hard to improve its search engine
results to return videos and pictures that may be relevant to your search.
Many search engine home pages such as altavista.com have shopping bots
available at a single click. Other shopping bot sites such as
www.pricingcentral.com gather information from many sources and combine it
for ease in comparing prices and availability. Bear in mind that some of the prices
available through these kinds of sites may not be the absolute lowest you could
MBA Year 1
153 INFORMATION AND KNOWLEDGE MANAGEMENT
find on your own. Some companies pay a service fee to the shopping bot sites to
have their products listed regardless of whether they are the lowest price.
You do not have to search for information at all if you do not want. Perhaps you
are an avid reader of blogs about golf. Rather than checking the entire
blogosphere every day for new information, you register your information needs
with a RSS (Real Simple Syndication) service. When new information is
available you will automatically receive a notification on your desktop similar to
the newscast ticker tapes you see on your television screen. What began as a
convenient method of receiving blog updates has now spread across a variety of
news, sports and information services to provide a convenient method of staying
connected. Twitter.com produces microblogging posts that are limited to 140
characters.
7.7.5 Wikis
Wikis are becoming a popular way to share information among employees,
managers, suppliers, partners and even customers. For instance, your
collaborative team is devising a new advertising campaign. You have lots of input
that previously was passed around the team via e-mail. However, that is
unwieldy and does not give any of your team members a convenient method of
searching for information. Who wants to sort through 83 e-mails looking for one
piece of information?
MBA Year 1
154 INFORMATION AND KNOWLEDGE MANAGEMENT
Instead your team could use a wiki to post ideas, information or details of the
latest version of your campaign in one consolidated location. All your team
members could post comments, edit comments from others, and collectively
store all the files associated with the project. Searching for a particular piece of
data is easy and fast. Wikis are much easier to use than more sophisticated
knowledge management systems and the software is much cheaper.
What started out as a way for teenagers and college students to connect to their
friends online and share photos and gossip, is now a multi-billion dollar social
networking industry embraced by the likes of IBM, Ford Motor Company and
Coca-Cola. They have gone far beyond simply staying in touch with a few dozen
- or few hundred - friends to an almost necessity in corporate life. Here are a few
tips from the Australian government for businesses who want to use social
networking and social media to reach out to their customers and users:
MBA Year 1
155 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
156 INFORMATION AND KNOWLEDGE MANAGEMENT
The old saying “a picture is worth a thousand words” is now playing out on
the Internet with popular sites such as Pinterest and Instagram. These
sites are not just for individual use but businesses can benefit from them
as well if they use the features correctly.
MBA Year 1
157 INFORMATION AND KNOWLEDGE MANAGEMENT
portals to use global positioning systems to pinpoint your location. Once the
merchants know you are in the local area, they offer you discounts on meals,
clothing and movies if you respond within the hour. As you are walking down the
sidewalk, you can use your smart phone to locate restaurants, check movie
schedules, review sports scores, take and send photographs and use maps to
find your way.
Unfortunately each world region has adopted different standards for wireless
networks and often the standards do not allow for cross transmissions. Two
major standards used in the world are:
MBA Year 1
158 INFORMATION AND KNOWLEDGE MANAGEMENT
7.4.2.1 Bluetooth
The Bluetooth wireless technology standard comes installed on some
computers, which helps create small personal area networks (PANs). It is more
appropriate to use Bluetooth technology in battery-powered devices that are
within close proximity to one another. Bluetooth technology is mostly used to
connect keyboards, printers, computers and handheld devices all within very
close range.
Even though the Bluetooth technology got off to a slow start in the early 2000’s, it
is now being used for all kinds of applications, even automobiles. Vehicles are
coming equipped with Bluetooth technology and allow the use of hands-free
cellphones, stereos, global positioning systems and security devices. Figure 7.7
demonstrates a typical Bluetooth network.
MBA Year 1
159 INFORMATION AND KNOWLEDGE MANAGEMENT
You can access Wi-Fi networks in public areas such as libraries, Internet cafes,
hotels and airports. Access points to a wireless network are called hot spots and
are proliferated in many public places. You should be aware of the dangers in
using these hot spots. They lack strong security measures typical of wireless
MBA Year 1
160 INFORMATION AND KNOWLEDGE MANAGEMENT
7.4.2.3 WiMax
Unfortunately, there are still large regions of the world must continue to rely on
old telephone systems for Internet access. That prevents users from taking
advantage of new high-speed access and many of the feature-rich applications
available on the Internet. Due to limitations in frequency ranges associated with
Wi-Fi, Bluetooth and other technologies, many users are left out of the Internet
evolution. A new technology called WiMax is being developed to help fill the
gaps all across the country. WiMax increases the range of transmissions up to
approximately 30 miles and increases the transmission speeds significantly over
that available on regular telephone lines and dial-up modems.
MBA Year 1
161 INFORMATION AND KNOWLEDGE MANAGEMENT
RFID tags offer more inventory management control over products than the
current bar code technology for several reasons:
Even though RFID tags are more expensive than bar-code technologies, costs
are dropping as they become more prevalent and the system switch-over is
completed. For example, in 2001 a single RFID tag cost approximately $2.00. An
RFID tag in 2010 costed approximately 10 cents.
warehouses and office buildings. In the long run, WSNs will be cheaper for
businesses and homes because no structural changes are needed to the
building’s walls, ceilings or floors. If you want to add equipment, you will simply
add another node to the network. You will not have to cut holes, run wires or alter
the physical structure at all.
Wireless sensor networks and other networks send their output over an “Internet
of Things” for analysis. Any object that generates data can be the focus of the
Internet of Things.
REFLECTION QUESTION
7.5 Describe the advantages of using RFID tags rather than bar code
technology.
MBA Year 1
163 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
164 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 8
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Explain in detail why information systems are so vulnerable to destruction,
error and abuse.
Critically analyse the business value of security and control.
Identify and describe the components of an organisational framework for
security and control.
Recommend the most important tools and technologies for safeguarding
information resources.
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 8 – Securing Information Systems (pp 334 - 376).
MBA Year 1
165 INFORMATION AND KNOWLEDGE MANAGEMENT
8.1 Introduction
As the reliance of society and the world on computers and information systems
increases, firms must invest more in making their systems less vulnerable and
more reliable. The systems must also be more secure when processing
transactions and maintaining data. These two issues, to be addressed in this
chapter, are the biggest hurdles facing those wanting to do business on or
expand their operations to the Internet. The threats are real, but so are the
solutions.
MBA Year 1
166 INFORMATION AND KNOWLEDGE MANAGEMENT
Businesses that partner with outside companies are more vulnerable due to the
fact that some data may be less controlled. Partnering companies may not
protect information as stringently. Hardware and software safeguards may not be
as important to outsiders. Employees of the partnering firm may not view security
as diligently as the primary business.
MBA Year 1
167 INFORMATION AND KNOWLEDGE MANAGEMENT
address, which makes it easier for hackers to find you. The smart thing to do is
keep your software up-to-date and include firewall protection.
MBA Year 1
168 INFORMATION AND KNOWLEDGE MANAGEMENT
A different type of malware called worms can also destroy data on computers or
clog network systems with software-generated electronic transmissions. Worms
are similar to viruses in that they can create additional file copies on a computer
and generate e-mails to other computers with the infected file attached. Worms
differ from viruses because they do not need human intervention to spread from
one computer to another. That helps explain why computer worms spread much
more rapidly than computer viruses.
MBA Year 1
169 INFORMATION AND KNOWLEDGE MANAGEMENT
Storm Worm/ First identified in January 2007. Spreads via e-mail spam with a fake
Trojan attachment. Infected up to 10 million computers, causing them to join
horse its zombie network of computers engaged in criminal activity.
Sasser.ftp Worm First appeared in May 2004. Spread over the Internet by attacking
random IP addresses. Causes computers to continually crash and
reboot, and infected computers to search for more victims.
MyDoom.A Worm First appeared on January 26, 2004. Spreads as an e-mail
attachment. Sends e-mail to addresses harvested from infected
machines, forging the sender’s address. At its peak, this worm
lowered global Internet performance by 10 percent and Web page
loading times by as much as 50 percent. Was programmed to stop
spreading after February 12, 2004.
Sobig.F Worm First detected on August 19, 2003. Spreads via e-mail attachments
and sends massive amounts of mail with forged sender information.
Deactivated itself on September 10, 2003, after infecting more than 1
million PCs and doing $5 to $10 billion in damage.
ILOVEYOU Virus First detected on May 3, 2000. Script virus written in Visual Basic
script and transmitted as an attachment to e-mail with the subject line
ILOVEYOU. Overwrites music, image, and other files with a copy of
itself and did an estimated $10 billion to $15 billion in damage.
Melissa Macro First appeared in March 1999. Word macro script mailing infected
virus/worm Word file to first 50 entries in user’s Microsoft Outlook address book.
Infected 15 to 29 percent of all business PCs, causing $300 million to
$600 million in damage.
MBA Year 1
170 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
8.1 Discuss why wireless networks are more susceptible to security problems
and how businesses can protect them.
8.2 Discuss the security issues associated with cloud computing and what cloud
users should do about them.
Some hackers penetrate systems just to see if they can. They use special
computer systems that continually check for password files that can be copied.
Or they look for areas of the system that have been “left open,” so to speak,
MBA Year 1
171 INFORMATION AND KNOWLEDGE MANAGEMENT
where they can enter the system. Sometimes they do not do any damage, but
often they destroy files, erase data, or steal data for their own use through
cybervandalism. Other hackers attack systems because they do not like the
company.
These are two other methods hackers and criminals use to gain improper or
illegal access to computer systems. Spoofing is becoming a common way to
steal financial information through fake Web sites. The spoofed site is almost a
mirror image of the real site and unless the unsuspecting user examines the
spoof closely, he/she may inadvertently give out important personal and financial
information.
MBA Year 1
172 INFORMATION AND KNOWLEDGE MANAGEMENT
It is very difficult for our society and our governments to keep up with the rapid
changes in the types of computer crime being committed. Many laws have to be
rewritten and many new laws must be implemented to accommodate the
changes.
MBA Year 1
173 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
174 INFORMATION AND KNOWLEDGE MANAGEMENT
upon all employees how important security is throughout the system right down
to the last person.
Password theft is the easiest way for hackers to gain access to a system. Cyber
thieves generally use specially written software programs that can build various
passwords to see if any of them will work. This is why you should use odd
combinations of letters and numbers not easily associated with your name to
create your password. The longer the password, the harder it is to replicate. The
same password should not be used for more than one access point. Using
multiple passwords limits the damage done if a hacker does manage to obtain a
single password.
MBA Year 1
175 INFORMATION AND KNOWLEDGE MANAGEMENT
Due to the fact that bugs are easy to create, most of them unintentionally, you
can reduce the number of them in your programs by using the tools discussed in
other chapters of the Laudon text to design good programs. Many bugs originate
in poorly defined and designed programs and keep infiltrating all parts of the
program.
If a business does not adequately protect its systems for any other reason, it
should just try to avoid expensive and time-consuming legal action. The national
retailer T.J. Maxx was forced to spend about $200 million in litigation and
damage costs after it experienced a serious security breach in 2008. The money
could certainly have been put to better use. Data breaches in other retailers’
systems have cost as much as $1 billion dollars.
MBA Year 1
176 INFORMATION AND KNOWLEDGE MANAGEMENT
All these laws are in response to computer crimes and abuses that businesses or
individuals have committed or experienced. It is very difficult to pass the laws and
costly for businesses that struggle to comply with them.
MBA Year 1
177 INFORMATION AND KNOWLEDGE MANAGEMENT
These are just a few examples to get you to think about the fact that the
company designs the security into the building from the beginning. It does not
wait until everything is built. You should do the same thing with an information
system. It is no different from any other system that requires planning and well-
thought-out policies and procedures before construction begins.
The two types of information system controls are:
General controls: Software, physical hardware, computer operations,
data security, implementation process and administrative. Table 8.3
describes each of these.
Application controls: Input, processing, and output.
MBA Year 1
178 INFORMATION AND KNOWLEDGE MANAGEMENT
Software controls Monitor the use of system software and prevent unauthorized access of
software programs, system software, and computer programs.
Hardware controls Ensure that computer hardware is physically secure, and check for
equipment malfunction. Organisations that are critically dependent on
their computers also must make provisions for backup or continued
operation to maintain constant service.
Computer Oversee the work of the computer department to ensure that
operations controls programmed procedures are consistently and correctly applied to the
storage and processing of data. They include controls over the setup of
computer processing jobs and backup and recovery procedures for
processing that ends abnormally.
Data security Ensure that valuable business data files on either disk or tape are not
controls subject to unauthorized access, change, or destruction while they are in
use or in storage.
Implementation Audit the systems development process at various points to ensure that
controls the process is properly controlled and managed.
MBA Year 1
179 INFORMATION AND KNOWLEDGE MANAGEMENT
loss potential. It is done all the time in other systems, so use it for your
information system as well.
MBA Year 1
180 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
8.3 Discuss the threat employees pose to information system security.
8.4 Discuss three laws recently passed by the U.S. government that created
electronic records management obligations for businesses.
MBA Year 1
181 INFORMATION AND KNOWLEDGE MANAGEMENT
and misuse. In essence, an MIS audit checks all the controls we have discussed
in this chapter.
If you allow employees to keep certain data on their machines that are not
backed up to the mainframe computer, you need to ensure that safeguards are
installed on the individual PCs. Make sure you have controls in place for access
to individual data, backing it up, and properly protecting it against corruption. Do
you even have a policy about whether employees can store data on their
individual terminals?
MBA Year 1
182 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
183 INFORMATION AND KNOWLEDGE MANAGEMENT
providing all of them in one comprehensive package. It is a great way for small-
and medium-size organisations to ensure they cover all the security
vulnerabilities in their systems.
The standard methods of making online transactions more secure are Secure
Socket Layers, Transport Layer Security (TLS) and Secure Hypertext
Transport Protocol. The next time you are on an e-commerce or e-business
Web site, look in the address text box of your browser and notice if the address
begins with https. If so, the site incorporates one of these two security measures.
The sender and recipient have special software programs they can use to
encode and decode the transaction on each end. Figure 8.2 depicts the use of
encryption keys.
MBA Year 1
184 INFORMATION AND KNOWLEDGE MANAGEMENT
This figure shows you how public key encryption works using two keys: one
public and one private. The keys are created through complicated mathematical
formulas. The longer the key, the harder it is to decipher. That is the whole point
of encryption. Encryption software programs incorporate authentication and
message integrity in its program to ensure senders and receivers are protected
against many of the computer crimes committed on networks and the Internet.
MBA Year 1
185 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
186 INFORMATION AND KNOWLEDGE MANAGEMENT
8.6 Security Issues for Cloud Computing and the Mobile Digital
Platform
The concept of cloud computing sounds like nirvana to many companies.
Someone else takes the responsibility of building and maintaining very expensive
information systems. Someone else spends the money and time to ensure the
systems are up-to-date and use the latest technology. You pay only for what you
use. Sounds great until you consider the flip side of the coin. Just how secure is
your data stored in the clouds?
MBA Year 1
187 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTION
8.5 Discuss the elements of a good security policy that every business should
have.
MBA Year 1
188 INFORMATION AND KNOWLEDGE MANAGEMENT
SECTION C:
MBA Year 1
189 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 9
ACHIEVING OPERATIONAL
EXCELLENCE AND CUSTOMER
INTIMACY: ENTERPRISE
APPLICATIONS
Learning Outcomes
Upon completion of this chapter, the student should be able to:
MBA Year 1
190 INFORMATION AND KNOWLEDGE MANAGEMENT
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 9 - Achieving Operational Excellence and Customer Intimacy:
Enterprise Applications (pp. 378 – 411).
9.1 Introduction
Over the last decade, businesses have come to realise how important it is to
totally integrate business processes across the enterprise. We have spoken
about “islands of information” many times. In today’s fast-paced world, managing
information assets is more important than ever before. This chapter discusses
how important it is for information to be available in every nook and cranny of an
enterprise.
MBA Year 1
191 INFORMATION AND KNOWLEDGE MANAGEMENT
main goal is to bridge the communication gap among all departments and all
information users within a company. If production enters information about its
processes, the data is available to accounting, sales and human resources. If
sales and marketing is planning a new advertising campaign, anyone anywhere
within the organisation will have access to that information. Enterprise systems
truly allow a company to use information as a vital resource and enhance the
bottom line.
Data integration throughout the firm is the key. Consolidated data from divisions
and departments throughout the business, including key business processes, are
immediately available to any authorised user. The greatest enticement of
enterprise systems is the chance to cut costs firm-wide and enhance the ability to
pass information throughout the organisation.
However, many times, departments fail to fully communicate with all the other
departments about every process taking place within a company. Sales sends an
order to manufacturing with a shipment date that cannot possibly be met.
Finance pays a bill for supplies that production never ordered. Human resources
holds a training class that interferes with a rush production job.
MBA Year 1
192 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
193 INFORMATION AND KNOWLEDGE MANAGEMENT
Although enterprise software can be somewhat modified, the task expensive and
can be difficult. Due to the fact that the software is so complex, changing just one
of the processes may disrupt some of the other interdependent modules.
However, manufacturers of the enterprise software programs are modifying the
software to envelop Internet services and make the data available to external
sources such as suppliers, governmental agencies and customers.
REFLECTION QUESTIONS
9.1 How does enterprise software enable a business to use industry-proven best
practices?
9.2 Explain the bull-whip effect on a supply chain and how it can be avoided.
phrase are named and shamed in the marketplace. There are no more separate
entities or distinct lines in the sand when it comes to integrating supply chains. It
is more like shifting sand.
Exactly what are all the activities involved in getting a product from conception to
delivery? There are probably many more than you can easily think of; and there
are many more people involved than you might imagine. It may be helpful to
break the supply chain into three distinct groups:
Upstream: Suppliers that deal directly with a manufacturer and their
suppliers.
Downstream: Distributors and those that deliver products to customers.
Internally: The employees that transform materials, components and
services into the actual products.
MBA Year 1
195 INFORMATION AND KNOWLEDGE MANAGEMENT
but they cannot foresee every problem. The bull-whip effect on the supply chain
is more natural than you might think and happens in virtually every industry.
MBA Year 1
196 INFORMATION AND KNOWLEDGE MANAGEMENT
ensure products are delivered when needed to the right location. It will not help a
company’s bottom line to have 1000 parkas delivered to Arizona in March when
upstate New York is suffering through a difficult winter.
The same type of internal collaboration that organisations can generate through
intranets can be extended to supply chain partners through extranets. Suppliers
can log on to a company’s extranet site and review next week’s production
schedule. The supplier can ensure enough production supplies are delivered to a
manufacturer without over- or under-extending itself. Changes to the production
schedule can be communicated easier to suppliers through Internet-enabled
applications. Long-term forecasts can be posted to an extranet and schedules
adjusted. No expensive proprietary systems are necessary because all
information is transmitted through ordinary Web-based applications. Internal and
external users can use online applications to view delivery schedules or
determine the optimal logistics for moving products.
MBA Year 1
197 INFORMATION AND KNOWLEDGE MANAGEMENT
Using the Internet helps mitigate some of these issues, but It is not a panacea for
all of them. Companies must still deal with foreign governments and cultural
differences for which there are no easy answers or Internet applications.
MBA Year 1
198 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
199 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
9.3 Describe the difference between push-based supply models and pull-based
supply models.
That is why it is a good idea to regularly take a close look at your CRM
infrastructure: With all the new functionality available in CRM tools today, you
need to determine if your existing system is still meeting the needs of your
business and customers.
Although many companies strive to be “customer-centric” very few have been
able to completely focus every functional area of the organisation on the
MBA Year 1
200 INFORMATION AND KNOWLEDGE MANAGEMENT
Many companies are overloaded with data about customers. Unfortunately, too
many companies do not have any useful information that can help them increase
customer satisfaction and retention, thereby increasing revenues and profitability.
The ability to turn raw data into useful information is where CRM systems shine.
CRM systems gather customer information from all corners of a business,
consolidate the information and then provide it to all of the organisation’s
customer touch points. By offering a consolidated viewpoint of the customer to
these touch points, a company can cater to the customer that offers the most
profitability.
Financial institutions are a prime example of how effective CRM systems can be
to help identify the customers that offer the most “bang for the buck.” Most of the
larger banks offer more than just checking and savings accounts. They provide
investment services, insurance policies and loans.
MBA Year 1
201 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
202 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
203 INFORMATION AND KNOWLEDGE MANAGEMENT
analytical CRM to focus their efforts on those customers who can offer the most
profit at the least cost.
One of the most important benefits of analytical CRM is the ability to determine
the customer lifetime value (CLTV). The text mentions that it costs six times
more to gain a new customer than to keep an old one. By measuring the CLTV of
customers, organisations can calculate customer profitability and determine
which customers they should cater to.
To reiterate, the benefits of using CRM systems are worth the challenges:
Benefits:
Increased customer satisfaction.
Reduced marketing costs.
More effective marketing.
Lower costs for customer acquisition and retention.
Increased sales revenue.
Better response to customer needs.
MBA Year 1
204 INFORMATION AND KNOWLEDGE MANAGEMENT
most improvement. The firm must allocate the organisation resources where they
are most needed.
MBA Year 1
205 INFORMATION AND KNOWLEDGE MANAGEMENT
The merits of open source software and cloud computing have been discussed in
earlier chapters. Even though these are still in the early stages of development, it
is worthwhile to note that they are being developed for enterprise applications.
Small and medium-size businesses are the ones most likely to follow this path
because It is much cheaper. Web 2.0 services that we described before are also
becoming integral parts of enterprise software.
REFLECTION QUESTION
9.5 Discuss the role of open source software and cloud computing in
enterprise applications.
MBA Year 1
206 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
207 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 10:
Learning Outcomes
Upon completion of this chapter, the student should be able to:
Essential Reading
Textbook:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 10: E-Commerce, Digital Markets, Digital Goods (pp 412- 457).
MBA Year 1
208 INFORMATION AND KNOWLEDGE MANAGEMENT
10.1 Introduction
Twenty-four/seven - the mantra of the Internet. Whether it is buying, selling,
gathering information, managing or communicating, the driving force behind the
evolutionary and revolutionary business is the Internet and its technological
advances.
The Internet has proved to be the perfect vehicle for e-commerce because of its
open standards and structure. No other methodology or technology has proven
to work as well as the Internet for distributing information and bringing people
together. It is cheap and relatively easy to use it as a conduit for connecting
customers, suppliers and employees of a firm. No other mechanism has been
created that allows organisations to reach out to anyone and everyone like the
Internet. The Internet allows big businesses to act like small ones and small
MBA Year 1
209 INFORMATION AND KNOWLEDGE MANAGEMENT
The new technologies allow companies to act local by displaying ads targeted
directly at consumers almost on a one-on-one basis. Video ads rather than static
print ads are becoming the favored way to connect with customers. Thanks to
expanding broadband of transmission media, it is much easier to send the
videos, even to mobile phones.
REFLECTION QUESTIONS
10.1 Discuss how the features of ubiquity, universal standards, and information
richness make e-commerce different from traditional retailing efforts.
MBA Year 1
210 INFORMATION AND KNOWLEDGE MANAGEMENT
Ubiquity: 24/7 365 days a year, anytime anywhere. New market spaces
change the balance of power from being business-centric to customer-
centric. Transactions costs for both businesses and customers are
reduced.
Global Reach: The Internet opens markets to new customers. If you live
in New York City and yearn for fresh Montana-grown beef, you can order it
from a Web site and receive it the next day. You benefit from new markets
previously not available, and the Montana rancher benefits from new
customers previously too expensive to reach.
Universal Standards: One of the primary reasons e-commerce has
grown so quickly and has become so wide-spread is due to the universal
standards upon which the technology is built. Businesses do not have to
build proprietary hardware, software or networks in order to reach
customers thereby keeping market entry costs to a minimum. Customers
can use the universally accepted Internet tools to find new products and
services quickly and easily thereby keeping search costs to a minimum. It
truly is a win-win situation for both sides.
Richness: The richness of information available to customers, coupled
with information that merchants are able to collect about them, is opening
up new opportunities for both businesses and consumers. Consumers can
access more information than was previously available and businesses
collect more information than they were previously able to. Now, instead of
trying to gather information about businesses or consumers from multiple
sources, both parties can use the Internet to cobble together more
information than ever, doing it easier and faster than ever before.
Interactivity: E-commerce originally presented simple, static Web sites to
customers with limited possibilities of interactivity between the two. Now,
most major retailers and even small shops, use a variety of ways to
communicate back and forth with customers and create new relationships
around the globe.
MBA Year 1
211 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
212 INFORMATION AND KNOWLEDGE MANAGEMENT
10.6.1 Disintermediation
Removing the middleman has allowed many companies to improve their profits
while reducing prices. Insurance companies, for example, are using
disintermediation to remove the local agent from the transaction between itself
and the customer. Airlines have steadily removed the travel agent from
transactions with customers thereby reducing their costs. Other industries are
following in their footsteps slowly but surely.
MBA Year 1
213 INFORMATION AND KNOWLEDGE MANAGEMENT
Digital goods are much cheaper to produce in the long run with little or no
distribution costs compared to traditional channels. Digital goods market spaces
also provide relatively cheap and efficient channels for merchants who otherwise
could not afford to reach customers on a global scale. Independent musicians
and moviemakers are finding tremendous opportunities for reaching new
audiences through the Internet that they could not reach before. This is
especially true on social networking sites and through viral marketing.
MBA Year 1
214 INFORMATION AND KNOWLEDGE MANAGEMENT
Many products and services are offered through traditional Web sites. However,
as we continue to expand the reach of the Internet to wireless devices,
businesses are figuring out how to offer more products and services through new
channels dubbed mobile commerce or m-commerce.
Not only can you purchase your airline ticket through a traditional Web site but
you can instantly find out about flight delays or cancellations through your
cellphone or handheld computer as you travel to the airport. Using your handheld
computer you can purchase and download an electronic book to read while you
wait for the airplane to take off. Retailers are continually finding ways to expand
m-commerce and find new ways to attract customers.
MBA Year 1
215 INFORMATION AND KNOWLEDGE MANAGEMENT
There are dozens of examples of each of these business models that you
probably use all the time. Some of them overlap. The idea is that you have to
create a site that gives people what they want, when they want it, and make it
convenient and easy to use. The more difficult aspect of the business model you
choose is how to generate revenue from it.
MBA Year 1
216 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
217 INFORMATION AND KNOWLEDGE MANAGEMENT
Behavioural targeting occurs on individual Web sites and also on the vast
advertising networks that track your every move on the Web. Just some of the
data collected are:
The site from which you came.
Where you go when you leave the current site.
Each page you viewed on the current site.
How long you viewed each page.
Which images you may have clicked on.
Whether you purchased anything.
The operating system you use.
The browser you use.
Personal data you may have entered such as e-mail address, home
address and credit card data.
MBA Year 1
218 INFORMATION AND KNOWLEDGE MANAGEMENT
One of the most fascinating features of Facebook and other social networks is
the ability to share with and link to friends of your friends and increase the
number of people you come into contact with on Web sites. You can continually
increase the web of people you know through your social graph. Merchants and
MBA Year 1
219 INFORMATION AND KNOWLEDGE MANAGEMENT
retailers want to tap into that social web as a way to market more goods and
services. After all, if you like a product enough to purchase it, chances are you
will tell your friends about it. They in turn will pass the information to their friends,
through the social web, who will then share it with their other friends, and so on.
Table 10.3 defines four features of social commerce that retailers are taking
advantage of. What differentiates social commerce from simply searching for
products on a search engines is the ability to provide and receive
recommendations and evaluations about products and services rather than
getting plain information.
MBA Year 1
220 INFORMATION AND KNOWLEDGE MANAGEMENT
People are social by nature so it is not surprising to find they are using the
Internet to fulfill their need to connect with other people socially and
professionally. Social networking sites such as LinkedIn.com and Facebook.com
let people make new friends, find new jobs and exchange information easily and
quickly with a larger circle of people than through any other medium. Other sites
allow users to engage in social shopping - twist on traditional trips to the mall
with friends. While some of these sites pose a slight personal danger if misused,
they fulfill the basic need people have to communicate with others.
Instead of looking at social networking sites from a personal point of view, let us
examine how they present business opportunities and how companies are using
them to improve their operations.
Here are a few other ways businesses are using social networking sites such as
Facebook and MySpace:
Interact with potential customers.
Listen to what customers are saying about their products.
Obtain feedback from customers.
Display video advertising (much more dynamic than printed ads).
MBA Year 1
221 INFORMATION AND KNOWLEDGE MANAGEMENT
Crowd sourcing is another way businesses are using the wisdom of crowds
concept on social networking sites. Present a problem or opportunity on the site
and let people provide suggestions, advice or feedback free of charge.
Prediction markets also let businesses gain insight into what customers are
really thinking. This concept allows people to bet on specific outcomes of, for
example, a new marketing campaign or the next congressional election.
MBA Year 1
222 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
223 INFORMATION AND KNOWLEDGE MANAGEMENT
Businesses, buyers and sellers are enjoying tremendous cost savings by using
net marketplaces or e-hubs. B2B e-commerce is reducing the buyers’ costs by
allowing them to shop around for the lowest prices. B2B e-commerce reduces
sellers’ costs by allowing them to automate purchasing transactions and reach a
greater number of potential buyers of direct goods used in production processes
and indirect goods such as office supplies.
The types of net marketplaces available for B2B e-commerce are divided
between vertical markets that serve specific industries and horizontal markets
that provide goods and services for various functions across all industries. Some
sell direct goods used in a production process. Other goods not directly involved
in the production process are labeled indirect goods. Exchanges allow
businesses to offer a broader range of services to other businesses. Staples, the
U.S office supply store, was restricted to offering in-store purchases of paper,
pencils, and other supplies to other, mostly local, businesses. The buyer had to
physically go to the store and wander through the aisles. Price comparison was
limited to guessing whether Staples had the lowest price. Staples now offers an
online exchange from which other businesses cannot only order office supplies
but also use business services such as payroll pricing, human resources
management, legal and insurance services, and many others that were not
profitable or possible in the past.
10.5 m-Commerce
Cellphones are not just for making phone calls anymore. Now they take
photographs, send text messages, used as tracking devices and for purchasing
goods and services. What was once a simple device has now turned in to a
personal, portable computing device that is changing the very nature of
commerce worldwide.
MBA Year 1
224 INFORMATION AND KNOWLEDGE MANAGEMENT
Location-based services are perhaps one of the most interesting growth areas
in m-commerce. There are several leaders in this technology, namely
Foursquare, Gowalla, and Loopt. Users track their friends’ locations using
geosocial services and earn points and badges for responding to special deals
from businesses they “check-in” with through geoadvertising services.
Businesses offer customers the special deals in an effort to boost sales from
immediate promotions. Geoinformation services provide mobile users instant,
on-the-spot updates on housing prices if they are shopping for a new home,
museum pieces if they are in the Louvre Museum, or special sites along a hiking
trail.
REFLECTION QUESTIONS
10.3 Discuss how businesses can use the “wisdom of crowds” to improve their
products or services.
10.4 Describe m-commerce services and applications that either you have
already used or would like to have available.
MBA Year 1
225 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
226 INFORMATION AND KNOWLEDGE MANAGEMENT
throughout the plan. This way one will know if one is on track or need to
restructure their plan.
REFLECTION QUESTION
MBA Year 1
227 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
228 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 11
MANAGING KNOWLEDGE
Learning Objectives
Upon completion of this chapter, the student should:
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 11- Managing Knowledge (pp. 458 – 495).
MBA Year 1
229 INFORMATION AND KNOWLEDGE MANAGEMENT
11.1 Introduction
As discussed in previous chapters, information, and therefore knowledge, is
becoming an important corporate resource that must be captured, protected,
preserved and grown. This chapter focuses on how this is achieved.
Table 11.1 shows that every organisation has four dimensions of knowledge:
Knowledge is a firm asset.
Knowledge has different forms.
MBA Year 1
230 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
231 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
11.1 Discuss the difference between tacit knowledge and explicit knowledge and
provide some examples of each.
Successful organisations then incorporate what they have learned into new
business processes and new management decision-making skills.
MBA Year 1
232 INFORMATION AND KNOWLEDGE MANAGEMENT
Figure 11.1 depicts the activities that go into successfully managing knowledge
from acquiring it to applying it throughout the firm. The process is more than
recognizing technology related to the activities.
In fact, as the text points out, technology applications of managing knowledge
account for only around 20 percent. The other 80 percent deals with organising
and managing the knowledge assets.
MBA Year 1
233 INFORMATION AND KNOWLEDGE MANAGEMENT
ACQUIRE
Knowledge discovery
Data mining
Neural networks
Genetic algorithms
Knowledge workstations
Expert knowledge networks
Figure 11.1a: Acquiring Knowledge
STORE
Document management systems
Knowledge databases
Expert systems
MBA Year 1
234 INFORMATION AND KNOWLEDGE MANAGEMENT
DISSEMINATE
Intranet portals
Push e-mail reports
Search engines
Collaboration
APPLY
Decision support systems
Enterprise applications
MBA Year 1
235 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
236 INFORMATION AND KNOWLEDGE MANAGEMENT
These are spread across the organisation and offer a way to systematically
complete the information system activities already discussed: acquiring, storing,
disseminating, and applying knowledge.
MBA Year 1
237 INFORMATION AND KNOWLEDGE MANAGEMENT
Before you collate all the data, information and knowledge into your enterprise
content management system, you need to create a taxonomy that will help
organise the information into meaningful categories. This makes it easy to find
things later on. For example, you have lots of digital renderings of your company
logo. Set up a taxonomy called “Logo.” Now, whenever you add another digital
file of a logo, you tag it with the taxonomy. For those firms whose knowledge is
contained in objects other than simple documents, digital asset management
systems help them collect, store and process knowledge contained in
photographs, graphic images, videos and audio files.
MBA Year 1
238 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
239 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
240 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
241 INFORMATION AND KNOWLEDGE MANAGEMENT
can instead create the parts on a computer system, saving time and
money.
c) Augmented reality allows you to keep one foot in the real world
and put one foot in an enhanced computer-generated imagery world. If
you have ever watched a professional football game you have
experienced augmented reality. You know, that yellow line across the
field that shows you where the team has to get to for a first down. With
every set of downs, the augmented reality line moves to a different
location. It is so real some people are surprised that it appears only on
televised broadcasts of American football games. Marketers are
especially enamored with the idea of interacting with customers in new
and different ways. The technology has a bright future as people
become more used to the idea that they can experience a myriad of
services in new, more fun and better ways.
MBA Year 1
242 INFORMATION AND KNOWLEDGE MANAGEMENT
Most of the problems an expert system helps resolve can, in fact, be solved by a
human. However, because the computer is faster or safer, businesses choose to
use them instead of a person.
MBA Year 1
243 INFORMATION AND KNOWLEDGE MANAGEMENT
Most expert systems require thousands of rules and frames in which to operate
in a rule-based expert system. The knowledge must be specific. In the example
above, you would not take any action if the only information you had was “It rains
350 days a year in the Amazon rain forest.” Neither would an expert system.
In our example, using a forward chaining inference engine, you would start with
the idea that it is raining. You would move through a series of decisions until you
reached a conclusion and acted on it. You would determine that it is raining; then
you would decide how much; then you would decide how wet you do not want to
be; then you would decide to take an umbrella. As long as the answer continues
to be yes, you keep moving forward.
In a backward chaining inference engine, you would start with a hypothesis and
work backward until your hypothesis is proved or disproved. You got wet
because it was raining; using an umbrella would prevent that.
You can build a transaction processing system and perhaps not update it for six
months to a year. With an expert system, you have to update the data and the
processing software almost immediately and continually so that it is never out of
date.
MBA Year 1
244 INFORMATION AND KNOWLEDGE MANAGEMENT
Most problems solved by expert systems are mundane situations. “If it is raining,
then take an umbrella.” But what happens if it is cloudy and only “looks” like it will
rain? Expert systems only do well in situations in which there are definitive
outcomes. They are not good at making decisions based on guesses or hunches.
The expert system might advise to take the umbrella along or to leave it home
based on the input. The human makes the final decision to take or leave the
umbrella.
Expert systems should not replace managers. They can aid managers in the
decision-making process, but managers have to make the final call. For instance,
you suggest to your boss that you should receive a pay raise. You have many
subjective reasons why you should receive the raise; you arrive early and stay
late, your work is always (almost always) turned in on time, you filled in for Sam
while he was on vacation, and you are a good worker. What happens if your boss
relies on an expert system that uses only facts? You submitted the last two
projects late (because the boss made last minute changes), you took an extra
week’s vacation (when your child was in the hospital), and you were late to work
three times in one month (because the subway broke down). You may or may
not get the raise. Your boss still needs to use intuition, reasoning and gut
reaction to make the final decision.
MBA Year 1
245 INFORMATION AND KNOWLEDGE MANAGEMENT
Then you give your knowledge to someone else who will combine it with
knowledge from others and continue building on “the best of the best.” That is
what a case-based reasoning (CBR) system does best.
The Help files you find in most desktop software applications are built on a case-
based reasoning model. The technical support staff combines thousands of
customer queries into a single database of problems and solutions and refines
that information into a series of IF this is the problem, THEN try this. Access the
Help files in your desktop software and try it. Figure 11.4 gives an excellent
overview of how a case-based reasoning system works.
MBA Year 1
246 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
247 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
248 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTION
11.3 Describe how an organisation can use Web 2.0 collaboration tools to
enhance enterprise content management systems.
MBA Year 1
249 INFORMATION AND KNOWLEDGE MANAGEMENT
P&G discovered through agent-based modeling that the amount of lost sales due
to of out-of-stock conditions actually cost the company more than the
transportation expenses associated with partial truckloads of supplies.
Hybrid AI Systems
These take the best parts of expert systems and the best parts of fuzzy logic, and
the best parts of neural networks, and combine them into one system that solves
a problem. You can look forward to more of this hybridisation as we continue to
expand our knowledge of technology and of human behaviour.
REFELECTION QUESTION
11.5 Discuss some potential business uses for augmented reality technology.
MBA Year 1
250 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
251 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 12
ENHANCING DECISION-MAKING
Learning Objectives
Upon completion of this chapter, the student should be able to:
What are the different types of decisions and how does the decision-
making process work?
How do information systems support the activities of managers and
management decision-making?
How do business intelligence and business analytics support decision-
making?
How do different decision-making constituencies in an organisation use
business intelligence?
What is the role of information systems in helping people working in a
group make decisions more efficiently?
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 12- Enhancing Decision Making (pp. 496– 530).
MBA Year 1
252 INFORMATION AND KNOWLEDGE MANAGEMENT
12.1 Introduction
Individuals and organizations are getting better about turning raw data into useful
information that helps improve decision-making.
Allocate support to most valuable Accounts manager 12 100 000 1 200 000
customers
Predict call centre daily demand Calls centre 4 150 000 600 000
manager
Decide parts inventory levels daily Inventory manager 365 5 000 1 825 000
Identify competitive bids from Senior manager 1 2 000 000 2 000 000
major suppliers
Schedule production to fill orders Manufacturing 150 10 000 1 500 000
manager
Allocate labour to complete a job Production floor 100 4 000 400 000
manager
MBA Year 1
253 INFORMATION AND KNOWLEDGE MANAGEMENT
Do not be misled into thinking that the dollar value of improving decision-making
processes is limited to managers. As more business flatten their organisational
structures and push decision-making to lower levels, better decisions at all levels
can lead to increased business value.
MBA Year 1
254 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
12.1 Discuss the difference between the classical model of management and
the behavioural model of management and how they affect information
systems and decision support systems.
12.2 Compare the characteristics of an MIS and a DSS. Why are decision-
support systems more suited for executive decision-making?
MBA Year 1
255 INFORMATION AND KNOWLEDGE MANAGEMENT
These four steps are not always consecutive and may well be concurrent or
repetitive.
a) Managerial Roles
Let us compare the classical model of management with the behavioural
model. The former describes the five classical functions of managers as:
Planning
Organising
Coordinating
Deciding
Controlling
MBA Year 1
256 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
257 INFORMATION AND KNOWLEDGE MANAGEMENT
Earlier mention was made to a class of decisions that are routine, very
structured, and have definite procedures for determining the solution. In these
situations, why not automate the process and have a computer make the
decision much faster than a human can?
Computers have these positive characteristics that make them ideal for high-
velocity automated decision-making:
Computer algorithms that precisely define the steps to be followed
Very large databases
Very high-speed processors
Software optimized to the task
The algorithms are structured to follow the intelligence, design, choice, and
implementation steps we discussed as part of the decision-making process.
However, just in case, the information systems used to process these kinds of
decisions should be monitored and regulated by humans.
MBA Year 1
258 INFORMATION AND KNOWLEDGE MANAGEMENT
Business analytics, on the other hand, are the tools and techniques businesses
use to analyse and understand the data in a meaningful way. It is one thing to
read a report that says sales are 10 percent ahead of last year. Business analytic
tools, such as data mining, statistics, online analytical processing and models
help managers understand that part of the cause is an increased focus on
marketing to middle-aged women with two children.
MBA Year 1
259 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
260 INFORMATION AND KNOWLEDGE MANAGEMENT
Figure 12.3 tells you how each division of the business intelligence audience
uses the capabilities of these systems.
MBA Year 1
261 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
262 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
263 INFORMATION AND KNOWLEDGE MANAGEMENT
Over the last few years, many retailers have drastically reduced the number of
catalogues they send in snail mail to potential customers. With rising postal fees
and many people using the Internet to make purchases, fewer them are waiting
for the catalogue in the mail. By using predictive analytics, companies can weed
out people who are unlikely to make catalogue purchases and concentrate on
those who will. That decreases marketing costs while increasing the ratio of
catalogues to purchasing customers.
Those extra items were not put there by chance but more as a result of big data
analytics that we discussed in earlier chapters. Rather than requiring you to
thumb through pages of skirts and pants, the retailer will do it for you and, in the
meantime, increase the chances of making an extra sale. Those
recommendations likely are a result of what other customers purchased. The
retailer captures all of its sales data, analyses it, and includes data from social
media streams to create the customized recommendations.
MBA Year 1
264 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
265 INFORMATION AND KNOWLEDGE MANAGEMENT
Single vendor: The risk is that your company becomes dependent on the
vendor’s pricing power. The reward is that a single vendor promises hardware
and software that will work together “out of the box.”
Multiple vendors: The reward is that you one will have greater flexibility and
independence in selecting your hardware and software. The risk is that one will
suffer compatibility issues, not just between the BI hardware and software but
with your other systems as well.
You are locked into your decision and the switching costs are extremely high
regardless of which way you decide to go.
MBA Year 1
266 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
267 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
12.3 Discuss the managerial uses and methods included in the business
intelligence environment.
12.4 Discuss the pros and cons of two different management strategies for
developing business intelligence and business analytics capabilities.
MBA Year 1
268 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
269 INFORMATION AND KNOWLEDGE MANAGEMENT
more options and executives gain experience using these programs, they are
turning to them as an easy way to manipulate information.
REFLECTION QUESTION
12.5 What benefits do group decision-support systems provide organisations?
MBA Year 1
270 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
271 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 13
Learning Objectives
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 13- Building Information Systems (pp. 532– 571).
MBA Year 1
272 INFORMATION AND KNOWLEDGE MANAGEMENT
13.1 Introduction
It would be nice if we could give you a precise checklist of how to smoothly
introduce a new information system, but we cannot. No one can. What we
provide in this chapter is information you can use to help plan and analyse
organisational changes associated with new systems development.
This figure shows the four degrees of organisational change. Automation is the
easiest (except for those people losing their jobs), and the most common form of
change. However, this does not mean you do not have to plan for the change
first.
MBA Year 1
273 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
274 INFORMATION AND KNOWLEDGE MANAGEMENT
First, decide which business processes you need to focus on. Sometimes it is not
the information system that is the problem but the process itself. Understanding
the difference can help prevent fixing the wrong thing. By determining what
business processes are most important to the organisation and improving them,
you can improve the overall business performance.
Second, make a diagram of how your processes work now, including inputs,
outputs, resources, and the sequence of activities. Try just a few processes to
get your feet wet and then expand it to other units or processes within the
organisation. Document how much your current processes cost. You will be able
to measure costs savings (or costs increases) better if you have a baseline for
comparison.
The third step is to design and document the new process. Does the new
process save time and money or improve customer service? Sometimes you can
accomplish all three objectives.
MBA Year 1
275 INFORMATION AND KNOWLEDGE MANAGEMENT
The tools for BPM generally fall into one of three categories:
Documenting and monitoring business processes to help identify
inefficiencies and identifying trouble spots.
Automating some parts of a business process and enforcing business
rules.
Integrating existing systems to support process improvements.
REFLECTION QUESTIONS
13.1 In the spectrum of organisational change, which is the most radical type of
change: automation, rationalisation of procedures, business process redesign or
paradigm shifts? Substantiate your response.
13.2 What are some of the reasons business process management efforts fail?
MBA Year 1
276 INFORMATION AND KNOWLEDGE MANAGEMENT
The arrow in Figure 13.2 goes in one direction. Remember that just because you
apparently completed one step does not mean you can never go back to it at
some point in the development process. In fact, many of the steps should be
revisited several times, especially if you are using the prototype method of
development.
problem. Make sure you are addressing the root cause and not just the
symptoms. Effective systems analysis, adequately determining the real
problem, is the key.
Write down everything you do in this stage, especially when it comes to what the
real problem or opportunity is. Constantly review it throughout the rest of the
system development process to remind you and others of what one is trying to do
and where one is trying to go.
It is natural to stray from the path! Most of all, determine how your objective fits in
with the rest of the current information systems and the business plan itself. Is
your idea even feasible? You might be surprised how often organisations fail to
ask this question. A feasibility study helps you determine if your proposed
solution is achievable before you spend thousands of dollars.
The study will review the technical, financial, and organisational feasibility of
hardware, software, and persware and help you decide whether your proposed
answer is the right one. Too often organisations underestimate the cost of a new
system, especially in the persware area: training, downtime, lost productivity, and
employee disruption.
You must think and then rethink the proposed solution. Make sure you thoroughly
investigate the information requirements. Decisions taken will impact on other
stages. A significant cause of system failure in development projects is because
MBA Year 1
278 INFORMATION AND KNOWLEDGE MANAGEMENT
13.2.5 Programming
The actual programming phase will in all likelihood be carried out by the IT
department. If you are using a fourth-generation language, the programming
could very well be done by the end user. Either way, make sure that the
programming supports the analysis and design phases. If not, go back and work
through them again. It could very well be that what was designed simply cannot
be programmed. The usual impulse is to program around the design flaws. Do
not! Redesign instead.
MBA Year 1
279 INFORMATION AND KNOWLEDGE MANAGEMENT
13.2.6 Testing
“Hey, it works!” But does it really work as it was designed for a real-world
situation? Was every aspect thoroughly tested by independent testers in an
actual setting? Several things that go wrong in the testing phase of the
development process can severely hamper the project’s success.
For one thing, this step is glossed over by both techies and non-techies. People
assume that because something was designed and programmed according to
the specifications in the analysis stage, it is right. So they just fly right through the
testing process. Or they run one or two tests, usually by the very people who
designed and programmed the system. Needless to say, this approach is flawed.
You need a fresh pair of eyes to look at the system according to the test plan
that was developed by the programmers and the users.
If a flaw is detected during the testing phase, it must be addressed. Return to the
analysis, design and programming stages to iron out the flaw.
Of the three types of testing, unit, system, and acceptance, the last is the one
that is most important and yet the most underrated. Managers and users must be
adamant about testing the system, measuring it against the analysis and design
requirements, and then accepting the system only when it does in fact measure
up.
Once you have been through the process of analyzing, designing, programming
and testing, the end is near. The system meets the requirements, works right, the
end users love it and the bosses are clamouring to see some results. Now you
need to figure out which conversion process will work best for you.
There is no right way or wrong way to implement the system; you have to look at
it in the context of your particular organisation.
MBA Year 1
280 INFORMATION AND KNOWLEDGE MANAGEMENT
You can use the parallel strategy, but it is expensive to run two separate
systems simultaneously. If you do not have a lot of confidence in your new
system, you might want to go with this one.
If you are confident in your development process or, if the old system
simply does not work anymore, you can use the direct cutover strategy.
For instance, Friday you are using the old system; come Monday you are
using the new one.
If neither of the above describes your organisation or your new information
system, you might want to consider the pilot study strategy. You can
introduce the new system into a single area of the organisation. If all goes
well there, you can install the new system in other areas. You are still
going to have to determine how to run two systems at once and also work
out how to integrate the new system with the old one.
The phased approach is similar to the pilot strategy, however now you
install parts of the new system slowly into specific areas of the
organisation. Again, two systems, two methods, integration problems,
support problems, and so on.
However you convert, make sure everyone knows what is going on. Inform them
through documentation of a formal conversion plan. Use the information you
gathered in the earlier stages of the development process to help guide the
implementation plan. Make sure you determine how to convert the data and train
the users. User resistance through fear of the unknown can destroy all your hard
work and planning.
MBA Year 1
281 INFORMATION AND KNOWLEDGE MANAGEMENT
new air filter. Sooner or later, the new car will become an old car. The same is
true with an information system.
After you install the new system and it is in production, you want to go back one
more time and make sure it is meeting your needs through a post-
implementation audit. Eventually you are going to have to perform
maintenance on the system no matter how well you designed and built it.
Someday you will have to make major changes or replace it altogether.
MBA Year 1
282 INFORMATION AND KNOWLEDGE MANAGEMENT
The advantage of using data flow diagrams is that they can be used to show a
very general, high-level process or very minute detail using the same tools.
Anyone can view the overall system and then easily drill down through the
diagrams to lower levels of the system. Couple the DFDs with a data dictionary
and you can develop process specifications that describe how the data is
transformed into useable information. Hierarchical structure charts complete the
structured methodology by providing top-down charts that show each level and
how they interrelate.
MBA Year 1
283 INFORMATION AND KNOWLEDGE MANAGEMENT
have built up a library of them. It also makes it easier to create new software,
because you are not continually starting from scratch.
The terms used in this section, class and inheritance, describe how object-
oriented modeling uses objects to develop a program. It may sound complicated,
but it really is not. Figure 13.4 shows you how classes inherit the common
features of their superclass.
MBA Year 1
284 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
13.4 What is the advantage of using an application software package? What
types of application software packages could you use in your organisation?
MBA Year 1
285 INFORMATION AND KNOWLEDGE MANAGEMENT
13.5 What advantages lie in using Web services instead of proprietary, closed
systems?
13.4.2 Prototyping
Fast, cheap, user-centered. Prototyping may be the best way to develop a new
system if end users do not have a clue about what they really want the system to
look like. Even if they have a few clues, prototypes work well because the user
can guide the process based on what they see as the system is built.
Have you ever watched a television show where a police artist draws an identikit
of a suspect as the victim looks on? The artist draws the eyes and gets approval
from the onlooker. Then the mouth is sketched in and approved. Soon a
composite drawing is completed, and the detectives are off and running. This
process sums up the iterative process used in building a prototype system.
MBA Year 1
286 INFORMATION AND KNOWLEDGE MANAGEMENT
Steps in Prototyping
There are four steps you use when developing a prototype. The important thing
to keep in mind is that these steps should be repeated many times over. If you
work through them just once, you might be in trouble. Some additional tips:
Step 1: Ask lots of questions.
Step 2: Sketch an informal flowchart with a pencil and paper. Pay attention to
the decision trees.
Step 3: Have users try every part of the new system.
Step 4: Repeat, repeat, repeat.
MBA Year 1
287 INFORMATION AND KNOWLEDGE MANAGEMENT
Just as you would for any piece of equipment, you would seek requests for
proposal (RFP) from several vendors to fully evaluate the software package
according to your needs. Remember, you give up a lot of control when you
choose to go with a prewritten software package.
13.4.5 Outsourcing
What happens if an organisation decides it does not have the in-house expertise
to support the system development process or any of the system maintenance
required? The answer lies in outsourcing. There are hundreds of outside
companies that will do the job. These companies offer expertise and experience,
often at a lower cost than in-house staff. That is the primary reason companies
choose offshore outsourcing. They can also offer smaller organisations
economies of scale that make overall information processing cheaper.
MBA Year 1
288 INFORMATION AND KNOWLEDGE MANAGEMENT
13.5 New approaches for system building in the digital firm era
Up until a few years ago, it was common for system development to take months
if not years. That time-frame has shortened to days or weeks. Pundits refer to
“Internet time” as a reference for the much more rapid development of systems
that some companies experience now. Unfortunately, some of the more
important steps of development may be slighted or overlooked altogether in the
rush to get a product out the door.
There just is not enough time. Rapid application development (RAD) reduces the
time it takes to build systems by using many of the tools that we have discussed.
You can choose from prototyping or fourth-generation tools to developing
systems much more quickly. End users and techies can work hand-in-hand with
joint application design (JAD) tools to reduce the development time for new
applications.
13.5.2 Mobile Application Development: Designing for a Multi-Screen World
People are moving away from total dependence on desktop and laptop
computing to mobile computing access on iPads, iPhones, smartphones and
tablet mobile devices. Obviously the screens are much smaller on the handheld
devices so they must react and interact differently than those on larger screens.
It is not enough nowadays to simply design one Web site and hope it works
across multiple devices. You can choose from three different technologies:
Mobile Web site: a scaled-down version of a regular Web site.
MBA Year 1
289 INFORMATION AND KNOWLEDGE MANAGEMENT
Smaller smartphone screens make better use of multi-touch gestures than larger
desktop screens although the new Windows 8 operating system brought touch
computing to the desktop. Still, smartphone apps must be optimised for specific
tasks but not too many at one time. They need to be designed for usability. Other
features that are top priorities for smartphone screens and Apps are:
Saving resources and optimizing bandwidth usage
Reducing screen space
Reducing the amount of memory necessary
Improving processing speed
Optimising and reducing data entry
Reducing the number of user gestures required
REFLECTION QUESTION
13.6 Why is it important to pay close attention to mobile application
development and why is it better to use responsive Web design for mobile Apps?
MBA Year 1
290 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
291 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 14
MANAGING PROJECTS
Learning Objectives
Upon completion of this chapter, the student should be able to:
Explain in detail the objectives of project management and why project
management is so essential in developing information systems.
Utilise various methods when using, selecting and evaluating information
systems projects and aligning them with the firm’s business goals.
Assess the business value of information systems.
Identify and mitigate the principal risk factors in information systems
projects.
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 14- Managing Projects (pp. 574– 605).
MBA Year 1
292 INFORMATION AND KNOWLEDGE MANAGEMENT
According to Laudon and Laudon (578-581), projects first require the effective
use of project management tools and technologies that help keep the project on
time, within budget and meet objectives. Every project includes the same five
variables:
Scope: What work is or is not included in a project?
Time: Establish timeframes for each component of a project.
Cost: The amount of time multiplied by the cost of human resources
required of a project.
Quality: Does the project improve organisational performance and
decision-making?
Risk: Potential problems that may threaten the project’s success.
REFLECTION QUESTIONS
14.1 Why should you consider the intangible benefits of a new system when
they are difficult to factor into a capital budgeting model?
14.2 Discuss the difference between a portfolio analysis and a scoring model
for evaluating projects from a strategic standpoint?
MBA Year 1
293 INFORMATION AND KNOWLEDGE MANAGEMENT
As you review this list, take heed that there are business specialists and end-
user involvement in every level of management. Too many companies fail to
include non-techies in systems planning and management, much to their dismay
later on (Laudon and Laudon, 581-582).
MBA Year 1
294 INFORMATION AND KNOWLEDGE MANAGEMENT
systems plan and their people know how to use them ((Laudon and Laudon,
582).
The portfolio analysis shown in figure 14.1 allows a company to objectively rate
multiple alternative projects for their risk and potential benefits. Companies too
often get locked into one idea without understanding that multiple choices exist.
There is always more than one way to meet the organisation’s goals.
MBA Year 1
295 INFORMATION AND KNOWLEDGE MANAGEMENT
The ideal situation is to choose a system with the highest benefit and the lowest
risk while ignoring systems with the lowest benefit and highest risk. This method
of rating projects helps companies align their IT assets with their business
strategy and results in a better organisation-wide coordination of IT investments.
MBA Year 1
296 INFORMATION AND KNOWLEDGE MANAGEMENT
cost half a million dollars to implement. The immediate cost savings of not having
employees interface directly with customers may be only $250,000. On the
surface you could say that the new system is not worth the cost - the bank will
lose $250,000. However, the intangible benefits the bank customers may enjoy
could potentially be worth a million dollars. In that case, the new system’s
intangible benefits will far exceed the tangible benefits. Table 14.3 in the text
explains some of the tangible and intangible benefits of information systems.
MBA Year 1
297 INFORMATION AND KNOWLEDGE MANAGEMENT
solely on numbers. Real options pricing models offer strategic planners the
ability to bring other factors into the evaluation and place a value on them. It uses
these factors:
Value of the underlying IT asset
Volatility of the value
Cost of converting the option investment into the underlying asset
The risk-free interest rate
The options’ time to maturity
MBA Year 1
298 INFORMATION AND KNOWLEDGE MANAGEMENT
Experience with technology: Will the project team and information system
staff have to learn new skills associated with the new system? If so, that
will expose the project to technical problems and probably take more time
to implement (Laudon and Laudon, 2016:589).
MBA Year 1
299 INFORMATION AND KNOWLEDGE MANAGEMENT
Table 14.1 gives a good insight into the user-designer communications gap. A
manager’s job is to bridge that gap to help ensure success of the new system.
Too little discussion and communication between the techies and the non-techies
will be apparent through design flaws and a poorly implemented project.
Understand where both sides are coming from, and one will do a better job of
getting them to work together. You can never have too much communication.
REFLECTION QUESTIONS
14.3 What are some of the causes of implementation success and failure?
Which one(s) do you think are the most important?
14.4 Use one of the capital budgeting models discussed in the text to
determine the cost of implementing a new system in your organisation.
MBA Year 1
300 INFORMATION AND KNOWLEDGE MANAGEMENT
Management support and commitment for new projects is required for these
reasons:
Creates a positive perception for both users and technical information
services staff.
Ensures sufficient funding and resources are devoted to the project.
Implementing changes in work habits and procedures are easier.
Enforcing organisational realignments.
Some of the strategies you can use to overcome user resistance include:
User participation
User education and training
Management edicts and policies
Better incentives for users who cooperate
Improve the end-user interface
Solve organisational problems before introducing a new system
MBA Year 1
301 INFORMATION AND KNOWLEDGE MANAGEMENT
tool to explain to people how their jobs will be affected, to explain the changes
required, and to help them plan the individual efforts required for a successful
new system. How will the new system fit into the human element? That is the
idea behind ergonomics; getting human and machine to agree and complement
each other. (Laudon and Laudon, 2016:596).
REFLECTION QUESTION
14.5 Discuss how the user-designer communications gap can cause a good
project to go bad.
MBA Year 1
302 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
303 INFORMATION AND KNOWLEDGE MANAGEMENT
CHAPTER 15
Learning Objectives
Upon completion of this chapter, the student should be able to:
Explain in detail the major factors that are driving the internationalisation
of business.
Recommend alternative strategies for developing global businesses.
Identify and discuss the challenges posed by global information systems.
Recommend management solutions for the challenges posed by
globalisation.
Identify and discuss the global issues and technical alter.
Essential Reading
Textbooks:
Laudon, K.C & Laudon, J.C (2016) Management Information Systems
Managing the Digital Firm. Boston: Pearson Education.
Chapter 15 – Managing Global Systems (pp 606- 635).
MBA Year 1
304 INFORMATION AND KNOWLEDGE MANAGEMENT
15.1 Introduction
The world just keeps getting smaller and smaller. No company can afford to
ignore foreign markets or the impact of foreign competition on the domestic
business environment. You have to adapt to the changing faces, literally, of your
competition and devise a plan to bring your organisation into a worldwide view.
MBA Year 1
305 INFORMATION AND KNOWLEDGE MANAGEMENT
Notice that the last issue one will have to contend with is the technology. As
previously discussed, every information system implementation plan must be in
harmony with the basic business plan. In fact, you must first develop the overall
business strategy for entering the global arena. Only then can you begin to think
about how the information system will be synchronised with the basic strategy.
REFLECTION QUESTIONS
15.1 Discuss the cultural factors organisations must understand in order to do
business on a global scale.
15.2 Discuss the differences in the four global strategies organisations can use
to organise their global business. What information system strategies work best
for each business strategy?
MBA Year 1
306 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
307 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
308 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
309 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
310 INFORMATION AND KNOWLEDGE MANAGEMENT
seem irrational. Although determining how and where to establish your core
processes is the first step, part of the analysis must include the implications of
building an information system to support them. For instance, if you decide to
create a transnational unit to handle customer technical support, how will your
information system support the data storage associated with customer
information? What laws will affect your decision? How will you handle the
political and cultural influences that determine access and distribution of the
personal information associated with your customers? Although it may make
sense to create this unit on a transnational basis, you might decide that an
information system to support it is not feasible.
Choose an Approach: Incremental, Grand Design, Evolutionary. If you try to
fulfill your development and implementation plan all at once, combining every
task into one huge project, you are setting yourself up for failure. It may
indeed be cheaper to do it that way, but you have lots of considerations other
than cost. There are political, cultural, and historical biases to overcome.
Remember, change is extremely difficult for people to accept. You have to
convince everyone, especially the executive branch, that your plan is possible
and best for the company.
MBA Year 1
311 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
312 INFORMATION AND KNOWLEDGE MANAGEMENT
MBA Year 1
313 INFORMATION AND KNOWLEDGE MANAGEMENT
REFLECTION QUESTIONS
15.3 What are the benefits of co-optation when managers are building new
information systems to support global businesses?
MBA Year 1
314 INFORMATION AND KNOWLEDGE MANAGEMENT
Bibliography
Baker, S. (2007) Google and the Wisdom of Clouds. (Online) Available at:
http://www.bloomberg.com/bw/stories/2007-12-12/google-and-the-wisdom-of-
clouds [Accessed: 14/11/2015]
MBA Year 1