Professional Documents
Culture Documents
Lecture 1. –
Improved decision making eg. which products are popular fact-based decisions
Competitive advantage eg. bol.com if you order something today you can have it
delivered tomorrow
Survival in today’s competitive environment
Negative side of IT
Omnipresence
IT productivity paradox chance to fail, more investments don’t necessarily lead to
higher productivity. The reason behind:
Measurement errors eg. doesn’t show in GDP, because it aims at
customers’ satisfaction
Time lags eg. they may be long term returns
Mismanagement
IT is not a one-time investment TCO (Total Cost Ownership)
IT tools are more and more complex
IT and business alignment has been among the top 3 problems for firms.
IT becomes a product software, converted product eg. music, film, embedded eg.
intelligent furniture
Prone to failure
Software: instructions that can be performed on the processor of a computer. It uses data as
its input it performs instructions in forms of software and deliver data as output.
Programming language compiled into machine language that is translated in bits 1 and 0. The
programming language provide means to code instructions into a structured way by using:
sequences (of instruction eg. Hello world), iterations (repeats the same task in different
variations), selections (execute tasks based on their values).
Instructions can be grouped into modules
to simplify them eg. large problems into several subproblems
re-use: an existing good module can be used again.
Evolvability: modify or change module and leave the rest unchanged.
BUT even modules are too complex to maintain (eg. Lehman’s law)
Value of Software: it processes data in short time frame and can repeat it, low processing
costs, error free, they can communicate over large physical distances automatization
They are crucial for enterprises. Data can be created, read, updated, deleted.
Data is input and output of software processing.
Databases are Oracle, DB2, MySQL, etcetera
Allows critical reflection on data.
IT doesn’t matter:
IT is not a CA, but a KSF. It can be seen as the broadly adapted technologies before: steam
engine, railroad, telegraph, telephone, electric generator. At the beginning they offer
advantage, but once their availability increased and cost decreased they become fundamental
inputs.
A distinction needs to be made between proprietary technologies and what might be called
infrastructural technologies.
Proprietary technologies can be owned, actually or effectively, by a single company.
Eg. A pharmaceutical firm, for example, may hold a patent on a particular compound that
serves as the basis for a family of drugs.
proprietary technologies can be the foundations for longterm strategic advantages,
enabling companies to reap higher profits than their rivals.
Infrastructural technologies offer far more value when shared than when used in isolation.
Eg: railroads or telegraph lines or power generators become part of the general business
infrastructure.
the window for gaining advantage from an infrastructural technology is open only
briefly
The only meaningful advantage most companies can hope to gain from an infrastructural
technology after its buildout is a cost advantage
IT is also highly replicable. The near-infinite scalability of many IT functions most
business activities and processes have come to be embedded in software, they become
replicable, too.
Bill Joy, the chief scientist and cofounder of Sun Microsystems, posed what for him must
have been a painful question: “What if the reality is that people have already bought most of
the stuff they want to own?”
IT is close to complete buildout:
IT’s power is outstripping most of the business needs it fulfils
Low price
Capacity of the Internet network meets demand
IT vendors are rushing to position themselves as commodity suppliers or even as
utilities
the investment bubble has burst
What should be done: Yet few companies have done a thorough job of identifying and
tempering their vulnerabilities
The greatest IT risk is, simply, overspending.
What’s important is to be able to separate essential investments from ones that are
discretionary, unnecessary, or even counterproductive.
At a high level, stronger cost management requires more rigor in evaluating expected returns
from systems investments, more creativity in exploring simpler and cheaper alternatives, and
a greater openness to outsourcing and other partnerships. But most companies can also reap
significant savings by simply cutting out waste.
Spend less
Follow don’t lead
Focus on vulnerabilities not opportunities
Lecture 2.
Computer networks: allow communication and exchange data between information systems.
Internet can be seen as the largest computer network in the world. There are different types of
networks: geographical, organization, transmission media etc.
They are crucial in the life of an organization to homogenise information in
contrast to “stove pipe” stand alone systems.
Functionality can be accessible from other computer and you don’t have install
data, eg. mailing server.
Interorganizational connections: Vendor Managed Inventory (VMI), Electronic
Data Interchange (EDI) useful for supply chain management.
You can connect to external software and databases.
Servers: offer services in a network eg. mail servers, web servers, application server, database
server.
Business process: is a set of steps to produce a product or service. It defines the way how
things are done in the organization.
Socio-technical approach: Human decision making is required in the process to align IT and
Business and human factors such as employees and their IT requirements need to be taken
into account. It is important that people adapt them into their tasks.
The technology acceptance model (Davis, 1985):
Perceived usefulness – when a person believes that using a particular system
enhances his/her performance.
Perceived ease of use – when a person believes that using a particular system
would be free from effort.
How do we choose the right business model? By taking into account:
Skills
Financial resources: ROI, which project is more profitable
Competitors
Risks
Part 2: Enterprise applications
Traditional office software tools are not sufficient for organizational purposes eg. Excel
failure to measure corona virus cases.
Porter’s value chain: a company is a set of types of activities which all add value to the final
product delivered to the customer. It contains: primary activities, and secondary /support
activities. Information systems support these diverse activities and make the process more
efficient, improve customer satisfaction, supplier intimacy.
Limitation of the model: it is mainly concerned by product producing. Eg. consulting and
service companies are not covered by it. Support activities are really only supportive ones?
UPS example: how many delivery services we sold in a certain period of time, area,
ESS: assist strategic decision making eg. which market to enter, which product to launch,
impact of new competitor
directed towards the CxO level,
combined information from many sources (TPS, DSS, MIS, + external databases)
highly summarised and aggregated information on the performance of the organization
in forms of eg. KPIs.
It doesn’t suggest what action should be performed high dependence on human
decision making
UPS example: what is the current cash flow, stock price, account receivable, market share,
inventory, online customer base.
These systems and the information flow among them should be well integrated, in reality we
see integration issues.
Group Decision Support Systems (GDSS): help groups to take complex decisions in a
structured way while involving a broad set of stakeholders.
Free-brainstorming opportunities, honest voting
Can be used in several phases of the decision-making: relevance of problems, possible
solutions
Has evolved with the requirement for conference rooms, from diverse locations to
collaborate and participate
Importance of a good moderator
Eg. pollev.com
ERP systems aim to support all administrative and data processes in the organization. It
combines all value chain activities in an integrated way.
They are very complex
Expensive
Long implementation time eg. 2-3 years
High potential benefits and returns
It integrates the company: no duplication of data, global optimization instead of a local
one, one system can automatically trigger activities in another process eg. customer
places an order and the financial department receives the information and reacts
Standardization / best practices: sometimes companies outsource these systems
these systems are proven, domain knowledge
To overcome the ordering cost dilemma: the predecessor of ERP was Material Requirement
Planning (MRP) system is created.
MRP: determines the amount of raw materials required for a product
It performs the calculations of the parts of Bill of material (BOM) eg. table consists of
a table leaf, 4 legs, 8 crews
Limitations of MRP: client demand unknown, production capacity is not taken into account
MRP 2 overcomes these shortcomings still not a complete ERP system, as the
focus was limited on manufacturing process and no integration with other
functional domains.
First real ERP system was developed in the late ‘70ies. higher efficiency, one time data
input, real time processing, better production planning and lower safety inventory, better
arrangements with suppliers, better financial overview.
Integration among the functional domains were further increased during the ‘80ies with
support activities:
Personnel & finance administration (HR administration)
Personnel & production (planning)
Technology & production (maintenance)
Procurement for indirect goods as well
The added value becomes clear in terms of non-production companies.
In later stages, the system improved: available to promise (ATP), capable to produce (CTP).
These systems were introduced in other domains: marketing – to calculate customer lifetime
value, HR to provide their career development, finance – cost profit ratio analysis.
ERP systems become specialised in practices within different industries, languages,
currencies.
Automatized orders, invoices, etc. supplier to customer operation via Electronic
Data Interchange,
Organization and financial institutions via Electronic Fund Transfer
Exchange of information via extensible markup language.
SCM system: inbound &outbound logistics
places orders
alignment with production schedule
alignment with inventory level
delivery orders
Adoption of advanced inventory management systems eg. Vendor Managed Inventory
(Supplier needs to make sure there’s always enough product in our stock), Just in time
Shift in SCM from push based to pull based model, avoidance of bull-whip effect.
These systems facilitate SCM planning (demand) and execution (tracking of items).
Communication is key in order to avoid bull-whip effect. Holding inventory has a cost, stock
break and late delivery also.
CRM system: primary activity in the value chain, it can replace the standard ERP, it deals
with specific functionalities regarding customers.
Operational CRM: managing customer sales, customer service, marketing approaches
Analytical CRM: analysing customer segments and profiles,
360 degree view on customer thanks to integrated data from other departments
Well-known CRM providers include: Salesforce.com (Oracle), SAP AG, Sage CRM, Siebel
(Oracle), Microsoft Dynamics CRM.
Nurture the adaptation: At this stage, managers’ main responsibility is to help create the
complements that will maximize IT’s value.
FIT doesn’t bring its complements with it, so managers must find ways of identifying them.
Because the use of NIT is voluntary rather than mandatory, they make users feel more, rather
than less, in control of their work. As a result, their adoption isn’t difficult
Enterprise IT is hard for companies to adopt. The benefits look great to people at the top, but
employees usually dislike EIT technologies.
Lecture 3.
ERP systems have high adoption, but uncertain effects: lower relative costs and higher ROI of
other systems, 70% of ERP are successful, 50% overrun budget, on average 3 years
implementation. If a project is huge and the systems fails it may have a catastrophic result eg.
bankruptcy.
ERP vendors: own development, SAP, Oracle, Microsoft.
Implementer: it can take the 60% of the project, own implementation, ERP vendor provides
specialist, consultants eg. Deloitte.
Maintainer: own deployment, specialised provider (CSC, IBM, EDS)
There are 4 important phases in the implementation of ERP package:
1. Ex ante evaluation:
What are my business goals
To what extent the system fits to my business goals
2. Implementation & testing: even if you go for vanilla implementation there are still
some configurations to be done
Configuration
Customization: companies want to adapt the system to their specificities
Specification per location
Migration of previously existing data and conversion into the new system
Users should be trained as well
3. Go live: system is put into production
4. Maintenance:
Make small adjustments, implement updates and new versions
Support of users
Drawback of ERP:
Huge and complex projects
Encompassing the whole organisation change of software, processes, people
Requiring advanced skills
Requiring top-management’s vision and budget, and operational change management
– buy-in
Risky projects
Most project implementation exceed 3 years
Horror stories
Costly
More than 50% overrun projects
Vendor lock-in in case of external ERP
Management decision:
Sourcing (make or buy)
Software
Infrastructure
Assuring Business IT alignment
Architecture and integration
Functionality
Variability
Maintenance, evolvability, adaptability
Sourcing:
Software: outsourcing or developing in-house?
In-house:
Maintains idiosyncrasy (your own way of working): core competencies, competitive
position, innovativeness, organizational culture. It does not include built-in predefined
vendor processes
Con: neither it includes best practices, in-house responsibility now and in the future in
terms of maintenance, new technological trends, and IT skills
Pro: It maintains independence, avoid vendor lock-in
Buying it:
Software vendor/implementer has a lot of technical knowledge, experience, resources
It takes care of updates and follow-up new technologies
Con: potential vendor lock-in which is important on the long term
IT Business alignment:
a. If the external vendor specifically develops it for you, then there’s no issues,
it should maintain idiosyncrasy
con: requires customization high cost now and in the future at every updates
con: it doesn’t incorporate best practices from the industry
b. When buying a licence of an existing package, it raises concerns of IT-Business
alignment
Minimize customization lower costs
It’s called vanilla implementation – no or very limited customization to the system
Project implementation is short
Adopts best practices
Con: idiosyncrasy and uniqueness of processes at risk
Possible employee resistance
The way in-between: functional-fit analysis
Planning
Planning is crucial even if it’s a not 100% correct one. IT planning is complex.
Need to define the scope of the project
Ensure IT Business alignment
Cost benefit analysis
Feasibility analysis including risk and mitigation
Planning of tasks and resources
1. First step in planning is having a clear view on business goals, then the IT goals can
support them.
One way is to map IT goals and business goals and see whether they match (can be
differentiated by primary and secondary goals)
-
2. Second step is defining the scope of the project
Scope document: short description why you need the IT project
problem to solve by the project
how does it fit into my company
main functionalities/capabilities of the system: what will it do, who’s involved,
budget/timing?
Expected benefits from the project: how does it solve the problem, how does it
contribute to reach the IT/Business goals, why this project is better than alternatives
What is IN the scope of the project what is out avoid scope creeping – when the
scope gets larger and larger
1. Use case:
There are also use case descriptions that describes the steps which happen when an external
actor and a system interact. It mentions pre-conditions, the outcomes, possible scenarios, and
exceptions.
2. Data model: describes the things (entities) of which information should be stored in
the information system.
Eg. customers, products, employees
The entities have several instances – which are the rows of a table in the
database
For each instances the system keeps track of attributes eg. name, age, street
columns of a table
See an example of it later on
3. Process model: it describes how processes are done in a company. example later
on
This is often the first time someone studies how the organization works, therefore it may
reveal inefficiencies. This is an opportunity to resolve them. Since a new IT system already
requires change management.
Hammer and Champy (1993): don’t automate, obliterate: (Ford)
The three way match in accounting: (1) purchase order (what have we ordered), (2) receiving
report (what have we received), (3) vendor’s invoice match (and the payment) the invoice
can be paid. It was a really inefficient process, so they reengineered it and then automate the
process.
Is your project turning into a black hole?
Black holes get there one day at a time through a process known as escalating commitment to
a failing course of action.1 While escalation of commitment can occur in any type of project,
it is particularly common in large technology-intensive projects, such as those with a strong
IT component. The complex and uncertain nature of these projects makes them particularly
prone to escalation. Without executive intervention, projects of this type will almost
inevitably turn into black holes.
In the NDS project, divergent opinions on both the project approach and the charter meant
that design decisions were repeatedly revisited and requirements were unclear, which led to
confusion and drifting.
The NDS project manager is replaced, but the new project manager is not up to the task, and
the project charter is not clarified or changed. 18 months into the project, the steering
committee and corporate management approve a revised project plan exceeding the initial
budget by 120%.
In response to criticism, the project manager argues that the project is no longer in need of
fixing. He also presents a well-devised, detailed strategy for migration from the old to the new
system that quells some of the criticism.
Solution: Two approaches are particularly effective: using intelligent project reporting and
developing a culture that encourages problem disclosure.
Using intelligent project reporting: Dashboard reporting—which often signals project status
as green, yellow, or red—can also be effective in providing busy executives with early
indicators of escalation. Objective third party should review the reporting.
To supplement these practices, there is the use of alarm bells—predefined thresholds for time
and budget overruns with predefined actions that need to be taken when these thresholds have
been reached. By predefining levels and actions, executives are relieved from being perceived
as playing “bad cop” with project managers
Develop a Culture that Encourages Problem Disclosure: An organization that fails to root out
the mum effect is fertile ground for project escalation to take hold and grow. Executives need
to demonstrate that reporting bad news is rewarded and that problems are dealt with openly
and forthrightly. The Toyota-inspired corporate norms is to “love deviations” because of the
learning opportunities they offer.
Drifting solution: Freeze or Reduce Headcount in the Project Temporarily, Get a Small, Good
Team to Reassess and Re-Plan, Make a Clear Go/No-Go Decision
Stop treating symptoms: Break the Habit of Solving Problems by Throwing Money at Them,
Stop any Futile Attempts to Fix the Project One Symptom at a Time, Put Your Best People on
the Project and Resolve the Root Causes
Stop Rationalizing Continuation: Cultivate Suspicion Towards New Rationales for Projects,
Bring in Outside Expertise for a Review, Halt the Project Temporarily, Create Transparency
and Visibility for a Broader Set of Stakeholders, Conduct a Series of Hearings
The three underlying themes for the actions we propose are: creating transparency, countering
skewed and biased thinking, and reducing or stopping momentum. In addition, it is useful to
ask for how long a specific pattern has been present. Consequently, in later stages of
escalation, the first priority should be to slow the momentum of the project. This takes a
measure of determination and political will, because strong forces that favor persistence will
need to be overcome.
Lecture 4.
Ford: we have 500 people doing the 3 way check, while competitors like Mazda they have 5.
The department spent most of its time on mismatches among these 3 operations.
Invoiceless processing: Ford simplified the process before including information technology,
1. Sending the order - registering it in the database – no hard copy of it 2. Accepting only
those goods that are corresponding to the order in the database (check the goods
immediately), 3. Sending the payment directly for the correctly received goods instead of
invoice. They used database for the purchase orders, but the purpose was not only automating
the process with IT, but reengineer it.
Results: Headcount went down with 75%, no invoices and hard copies of purchase, higher
accuracy
Hammer and Champy referred to BPR Business Process Reengineering. BPR means the
fundamental redesign of business processes in order to achieve critical improvement in
performance such as costs, quality, service and speed.
They don’t automate inefficiencies, but asking difficult questions. Link with IT paradox
it’s not IT itself that makes things efficient, the process should be efficient first.
It concentrates on a limited set of strategically important process, it makes radical changes not
small changes. Don’t automate, obliterate start everything from scratch.
Consequences: risky all or nothing with an uncertain result, expensive, high potential
impact. Assess effectiveness by measuring the performance before and after the intervention.
2 approaches in BPR:
- Clean state approach: start from scratch, concern about what would be the efficient
way to achieve this goal.
- Systematic redesign: you don’t have a new canvas, concerned about how can we
redesign it in a fundamental way.
Design
At this stage:
1. Defining the overall architecture of the application. We don’t ask ourselves anymore
what are the benefits of the application, but how can we execute it in order to
materialize its benefits?
Which building blocks / modules should we have?
How to integrate these different modules?
How the application integrates with external applications?
Which technologies we will use?
It is not a simple 1:1 mapping problem.
Implementation
The programming part happens at this stage. It can be done in several ways:
In-house programmers or hired consultants
Through external consultants
Buying and modifying an off-the-shelf application
Testing
At this stage the application is tested whether it matches with the requirements and promises.
Types of tests:
Validation: Does the application meet the actual needs of the end users? Does our
costumer happy? Was it the right application to build? this is the most critical
testing
Verification: Does the application work according to requirements formulated
during the analysis phase?
Unit test, system test, whole application and interactions
Security application controls: application can only process authorised data, input
(right format) processing (correct calculation) output (correctly presented)
Artefacts as testing plans.
Go-live
Different go-live strategies:
Big bang: all users need to make use of the system as of the same moment
risky, possible mitigation (back up with old system until the new system proved its
value)
Parallel strategy: less risky, more secure. Running both old and new systems in
parallel. It’s secure, but expensive.
Pilot study: a part of the organization tries the system out and when it works the
rest follows it.
Gradual way: functionalities are gradually introduced per business processes,
departments etc.
Implemented artefact.
Maintenance
Adapt the application, add new features, allow compliance with new technological
frameworks.
Types:
Corrective: fixing identified problems, correct bugs
Perfective: adding new functionalities (eg. higher performance)
Adaptive: need to change the software because of other items are changing in the
technological environment eg. browser changes
Preventive: refactoring the structure in order to have benefits in future, so that you
don’t have to correct it in the future.
Updated and revised software.
Remember maintenance can be a huge part of the total cost of ownership.
Law of increased complexity (Manny Lehman): As an evolving programme is continually
changed, its complexity is increased and it becomes more difficult to adapt and maintain it.
A software that was initially well designed may become very complex, this situation is even
worse when the initial design is not that simple and straightforward. It highlights the
importance of high quality design. Preventive measures are important from time to time
restructure the system.
Artefacts refer to things that need to be delivered at the end of each of the phases.
Relation to the IT paradox increasing maintenance costs?
If it becomes too complex, its maintenance cost raise as well and at the end it will take more
costs than provide benefits. At one point it is rather worthy to develop a new programme than
using the old one due to its complexity and then consider it as a sunk cost (cannot use
anymore). IT paradox says it’s not because you invest more and more you get more value.
Lehman’s law: the more complex the programme, the more difficult to adapt it and the
costlier it becomes.
Project management:
Iterative modelling (agile): go through each of the phases several times. It often
starts with the riskiest phase. It works with prototypes you can show some
result to the end user during the project, if it’s not working properly you can adapt
it throw away (drawings) or evolutionary prototypes (application).
Pros: end user involvement is high as they are involved in each of the phases, risk
management eg. outdatedness is reduced, you can deliver partly earlier than the
full project terminates.
Cons: coordination is more difficult as more things may be executed in parallel
Standish group publication 1994: Chaos report studying the success of IT projects:
From 9 to 16% successful
32% is cancelled
42% achieves its planned scope and functionality
50% has budget overrun of almost 100%
Project failure factors are related to human factors. When we take a look at project critical
success factors, they are mostly human related as well eg. user involvement, support from
upper management, clear system requirement definitions.
Sunk costs: All the investments that you made earlier should not be taken into account in
future investment decision you cannot recover the costs.
How to be successful:
Apply the suitable development methodology
Apply best practices and be aware of escalation and failure factors
Have experienced project manager who don’t underestimate the job
Build the bridge between IT and Business
Transaction cost theory: states that organizations tend to reduce their transaction costs.
Transaction costs refer to costs of buying products or services on the market due to looking
for suppliers, setting up communications, negotiating. One way for reducing transaction cost
is increasing the firm size.
IT allows to move the transaction curve and reduce the cost without changing the firm’s size,
because it allows to do all the operations in an easier and cheaper way. Eg. network
technology might allow car manufacturers to find the right supplier for each parts of their
operations.
Agency theory: considers a company as a web of contracts between individuals with their
own interest. Employee and employer have different interests, and the employer need to
invest more if his firm grows because there are more people to monitor.
IT allows to monitor large number of employees in an easier way, so that it lowers the agency
costs allows to increase the turnover of a company without increasing the number of
middle-management people. Eg. automatic processing of online orders via a webshop allows
companies to grow without having to hire additional employees for this task.
Rise of E-business
The real benefits occur when the different sources of data are combined. 3 phases: 1. phase:
stovepipe systems, 2. Phase interdepartmental, intra-organisational integration eg. ERP,
agency theory, 3. Phase interorganisational integration eg. transaction theory.
Electronic integration between different systems inside and outside of the company by using
Internet infrastructure has given rise to e-business and e-commerce.
E-business: includes all electronic information exchange inside and outside of the company to
support business process.
E-commerce: includes all electronic information exchange between a firm and external
stakeholders eg. buy & sell products via the Internet.
Typical properties of e-commerce:
Omnipresence:
- Market place is created and there’s no need for physical presence, overcomes temporal
and special limitations.
- Transactions costs are lowered
Worldwide reach:
- Customers around the world can be reached
- Market = online world population eg. long tail
Universal standards:
- Technical standards used for e-commerce (internet) are generally accepted
- Each computer with Internet connection can be connected
- Lowers offering cost (business) and searching costs (customer)
Information richness: (complexity of information)
- Online channels allow shops to be both rich in personal communication and in their
large offering.
Interactivity: (direction of communication)
- Online channels allow interactivity and mass communication eg. bots, social media,
pattern recognition,
Information density: (amount and quality of information)
- Low costs for gathering, storing, distributing high amount of information
- Possibility for price differentiation
Personalization / customization
- Messages can be adapted to personal profiles eg. names, interest
- Have notifications of things you find important, information wall be adapted based on
your clicking behaviour.
User generated content:
- Social networks allow to create texts, videos, audio
- Reviews on websites
- Even if it’s only personal, it affects commercial offerings
4. How Should I Charge Users? The functionality of digital platforms offers increased
flexibility in making these choices
Pay-as-you-go eg. Groupon charged restaurants only when a consumer bought a
voucher
User subsidies: Whether it’s launching a cereal brand or opening a restaurant,
marketers widely use discounts and promotions to encourage consumers to try new
offerings. Eg. Having already paid drivers to be on call, Lyft could provide free
rides to promote the service at no additional cost. Subsidizing both sides of a
platform like this implies significant expenditures
5. Can I Make My Platform Compatible with Legacy Systems? Building in compatibility
with legacy systems is often key to a successful launch, though it may involve
marrying yourself to outdated technology
Paytrust made itself compatible with billers’ legacy systems, so the service was
useful to consumers even before billers “signed up.”
Platforms typically rely on interoperability, data conversions, and information
synchronization to reduce the costs of switching. For example, a new Gmail user
often has an existing e-mail account that will continue to receive messages.
Google’s MailFetcher feature pulls those messages into Gmail, thereby reducing
the barrier to switching.
It’s a delicate balance: Platforms must offer enough compatibility to showcase
potential benefits, yet not so much that users delay switching to reap those
benefits.
Lecture 5
E-commerce market positions:
- Manufacturer/ primary service provider: a company producing goods and directly
selling them to customers. Eg. physical products, media, services.
- Online reseller/ retailer: products of other manufacturers are provided through an
online channel.
- Online marketplace: a digital online environment in which sellers and buyers are
connected. It can be B2B, B2C, C2C
- Information and transaction broker: offering customers / companies products, price
and availability information. They aggregate and integrate underlying information,
critical point = user friendliness, eg. which company offers the cheapest vacuum
cleaner? It offers the functionality of transaction with these companies.
- Portal: first point of access eg. Yahoo
Dot com Bubble: Internet is great potential for businesses, but the online presence does not
embed success directly. Many new small businesses were created as hardware, software
infrastructure, internet tools eg. browsers, e-commerce websites. e-commerce was hyped:
they did not have solid business plans – they weren’t user friendly, customers’ lack of trust at
the beginning
Around 2000 decline of the shares due to declining trust:
- Microsoft accused from monopolist practices
- Y2K problems
- Huge capital spending of companies and lack of profits,
Problems:
- Too high ambitions
- Overconfidence due to well-known wealthy investors
- Lack of cash inflow and huge costs, lack of proper requirement analysis and risk
management business issues
- Unknown technology and lack of experience of this magnitude several markets,
languages, currencies, integration with other platforms.. only in 6 months?
- Even if it was technologically feasible, current Internet users could not always use it
loading and downloading speed was low.
Results: bad user experience, few orders, low incoming cash flow. Global big launch the
project was too complex, impossible to succeed in 6 months.
Platform Economy:
Almost all e-commerce marketplaces are platforms
- The most valuable companies in 2019: Microsoft, Apple, Amazon, Facebook
- Bring together 2 market sides: generate value from network effect: Innovation
platforms eg. Android, iOS; Transaction platforms eg. Airbnb; or combination
Current trends in IT
Blockchain: non-typical type of database. Blockchain allows you to store a list of items in a
decentralised way.
- No central controlling entity, but shared (public) register that can be seen by anyone in
the network.
- Verification happens via solving complex algorithms and hashcodes on the blocks and
their preceeding chain, so that hacking the chain becomes difficult.
First figure – regular database; Second figure – blockchain
Black points: people who want to get access to data. In the first option everyone can get
access to a central controlling entity, while the second option allows everyone to access it
individually. Everyone has a complete ledger.
Artificial Intelligence:
A computer exhibits behaviour that is perceived as a human by another human. They are data
intensive and they use advanced statistical algorithms (often correlation based) in order to
take decisions. It generates and recognises things:
- Vision
- Speech & Sound: Automatic announcements of trains departing and arriving.
Recognise: Shazam.
- Text generation & recognition: Automatic press releases based on AI. Tweet about
your company – is it negative or positive?
- Advanced reasoning: corporate data is used for pattern recognition next purchase of
the customer, chance of a particular client to be profitable, good way to segment client
base
- Sub-branches: machine learning, deep learning.
- Abundant data availability allows AI to work.
Challenges: transparency, privacy, representativeness of data, degree of autonomy, liability
(self-driving car hitting someone),
Web 2.0. = The Information web, for hobbyists, or professionals. Easy way to store and
exchange reading information.
The user can deliver content himself in a user-friendly way. Social media is considered as
internet applications making use of the ideology and technology of Web 2.0.
The information Social web
Maybe Web 3.0 semantic, intelligent. Giving meaning to books, images etc.
Underlying trends:
- Higher level of data gathering
- Distributed way
- Higher degree of connectedness
- Software itself is also created and distributed
- Business models: Low cost and distributedness
New opportunities:
- Monitoring and controlling devices remotely
- Advanced customer insight
- New / disappearing players
Threats:
- Security and privacy
To help employees retain their sense of control in phase 2, we advise managers and systems
designers to involve them in design: Engage them as experts to define the data that will be
used and to determine ground truth; familiarize them with models during development; and
provide training and interaction as those models are deployed.
Phase 3: The Coach
In a recent PwC survey nearly 60% of respondents said that they would like to get
performance feedback on a daily or a weekly basis. The trouble is that the only way to
discover strengths and opportunities for improvement is through a careful analysis of key
decisions and actions. Thus the feedback employees get usually comes from hierarchical
superiors during a review—not at a time or in a format of the recipient’s choosing.
The capabilities we’ve already mentioned could easily generate feedback for employees,
enabling them to look at their own performance and reflect on variations and errors. A
monthly summary analyzing data drawn from their past behavior might help them better
understand their decision patterns and practices.
The data can reveal interesting and varying biases among PMs. Some may be more loss-
averse than others, holding on to underperforming investments longer than they should.
Others may be overconfident, possibly taking on too large a position in a given investment.
The analysis identifies these behaviors and—like a coach—provides personalized feedback
that highlights behavioral changes over time, suggesting how to improve decisions.
If employees can relate to and control exchanges with artificial intelligence, they are more
likely to see it as a safe channel for feedback that aims to help rather than to assess
performance. Choosing the right interface is useful to this end. At MBAM, for example,
trading enhancement tools—visuals, for instance—are personalized to reflect a PM’s
preferences.
As Beane suggests, companies could use their artificial intelligence to create different and
better learning opportunities for their employees while improving the system by making it
more transparent and giving employees more control. Because future entrants to the
workforce will have grown up in a human-plus-machine workplace, they will almost certainly
be faster than their pre-AI colleagues at spotting opportunities to innovate and introduce
activities that add value and create jobs—which brings us to the final phase.
Phase 4: The Teammate
Edwin Hutchins, a cognitive anthropologist, developed what is known as the theory of
distributed cognition. It is based on his study of ship navigation, which, he showed, involved a
combination of sailors, charts, rulers, compasses, and a plotting tool. The theory broadly
relates to the concept of extended mind, which posits that cognitive processing, and associated
mental acts such as belief and intention, are not necessarily limited to the brain, or even the
body.
We believe that as AI improves through its interactions with individual users, analyzing and
even modeling expert users by drawing on data about their past decisions and behaviors, a
community of experts (humans and machines) will naturally emerge in organizations that
have fully integrated AI coachbots. For example, a purchasing manager who—with one click
at the moment of decision—could see what price someone else would give could benefit from
a customized collective of experts.
Although understanding has historically been a basis for building trust in human relationships,
it is potentially well suited to cultivating human–AI partnerships as well, because employees’
fear of artificial intelligence is usually grounded in a lack of understanding of how AI works.
Some practical AI examples are cited in the paper. Reflect on the potential “fears” they
might be associated with and how they relate to the proposed onboarding process.
Unfortunately, many AI systems are set up to usurp that autonomy. Once an algorithm has
flagged a bank transaction as possibly fraudulent, for example, employees are often unable to
approve the transaction without clearing it with a supervisor or even an outside auditor.
Sometimes undoing a machine’s choice is next to impossible—a persistent source of
frustration for both customers and customer service professionals.
Privacy is another big issue when machines collect data on the decisions people make. In
addition to giving humans control in their exchanges with AI, we need to guarantee that any
data it collects on them is kept confidential. A wall ought to separate the engineering team
from management; otherwise employees may worry that if they freely interact with the system
and make mistakes, they might later suffer for them.
As in phase 2, involving employees in designing the system is essential. When AI is a coach,
people will be even more fearful of disempowerment. It can easily seem like a competitor as
well as a partner—and who wants to feel less intelligent than a machine? Concerns about
autonomy and privacy may be even stronger. Working with a coach requires honesty, and
people may hesitate to be open with one that might share unflattering data with the folks in
HR.
Although the technology to create this kind of collective intelligence now exists, this phase is
fraught with challenges. For example, any such integration of AI must avoid building in old or
new biases and must respect human privacy concerns so that people can trust the AI as much
as they would a human partner. That in itself is a pretty big challenge, given the volume of
research demonstrating how hard it is to build trust among humans.
What is meant with the “black boxes” of AI, and what are “counterfactual explana-
tions”?
In building understanding, a particular challenge is defining what “explanation” means—let
alone “good explanation.” This challenge is the focus of a lot of research. For example, one of
us (Evgeniou) is working to open up machine-learning “black boxes” by means of so-called
counterfactual explanations. A counterfactual explanation illuminates a particular decision of
an AI system (for example, to approve credit for a given transaction) by identifying a short list
of transaction characteristics that drove the decision one way or another. Had any of the
characteristics been different (or counter to the fact), the system would have made a different
decision (credit would have been denied).
Evgeniou is also exploring what people perceive as good explanations for AI decisions. For
example, do they see an explanation as better when it’s presented in terms of a logical
combination of features (“The transaction was approved because it had X,Y,Z
characteristics”) or when it’s presented relative to other decisions
What type of potential ethical issues related to AI do you see after reading the paper?
Transparency, privacy, decision autonomy
Lecture 6 – Expressing and understanding functional
requirements: Entity Relationship Diagrams (ERD)
In order to clarify the ambiguity of requirements, a set of models are created in the analysis
phase of the development of an information system. simplification of reality (easier to
grasp) abstraction of reality (focus on the relevant properties) specific (concepts need to
be defined)
Lecture 7.
BPMN concentrates on the business processes. Business process is a set of steps in order to
produce a product. It defines how things are done in an organization, which tasks are done by
people or by machines.
The analysis phase is aimed to model the requirements of an application such as data and
processes, there are often inefficiencies occurring at this point which need to be reengineered
Business process reengineering. BPMN can aid this process.
Business Process Modelling can also serve as a communication tool for new employees to
understand how the organization works. It enables a clear view on operations.
This is the most widely accepted standard for modelling business processes in organizations.
It is managed by Object Management Group, so no commercial vendor.
It should allow less technical people to build transactional applications by drawing simple
flow chart business orientation
Good practice: read it from the left to the right.
A gateway has one incoming path and one or two outgoing path of which only one is
activated. The decision is taken one step before the gateway, not at the gateway.
Annotation can provide some additional information.
Adding an option of potentially purchasing the stamp add another gateway to the process.
Artefacts
Groups can highlight a set of objects. They are highly optional, no real fixed meaning.
Annotations aim to express information that is not presented by any other item of the
diagram eg. it clarifies gateways, conditions.
A data object may represent data used as an input or produced as an output for an activity.
Connecting objects
Flow objects
Events indicate that something has happened.
It can be used to:
Start the process “start event” represented by a thin circle if there’s an image in
the circle, it indicates what is triggering the process (catches something)
End process “end event” represented by bold circle in case an image is inside
the circle, it indicates what signal is sent at the end of the process (throws
something)
Happen during the process “intermediate event” which either pauses the process
“interrupting intermediate event” represented by full double circle or not “non-
interrupting intermediate event” represented by striped double circle may be
throwing (dark) or catching (white).
Good practices: a process can have multiple end events clearly label them.
The + gateway activates both branch lines.
Exclusive and parallel gateways cannot be used in the same process. The gateways should
match with each other.
For the inclusive gateway, it’s parallel gateway that closes the process.
Lecture 8 Structured Query Language
Turning data into information
SQL turns output data into information. It is a 4th generation language. 1st generation language
consists of 1 and 0, 2nd generation has a correlation with computer architecture but translated
into 1st gl, 3rd generation: how should the programme do something – procedural
Fourth generation – what a programme should do? It’s close to human language.
SQL allows us to answer typical management questions: What was our revenue for January
2015? Which is the most popular product in each city we sell? Who is our most profitable
customers?
We mainly consult DQL.
= Sort them by alphabets.
=2
=5