Professional Documents
Culture Documents
1. Operational excellence
● Cost benefit analysis
● Improvement in efficiency to attain higher profits
● Information systems and technologies
○ Most important tools in achieving greater productivity
● Ex. Walmart
○ Over $524 billion in sales for 2019
○ Retail Link System
■ Links suppliers to stores for superior replenishment system
5. Competitive Advantage
● Delivering better performance
● Charging less for a superior product
● Responding to consumers and suppliers in real time
● Ex. Industry leaders (apple, walmart, UPS)
○ Use information systems for this purpose
● Competitive advantage results from achieving previous business objectives
6. Survival
● Information technologies is a necessity of business - Competitive Necessity
● Keeping up with competitors (ex. Industry level changes)
○ Citibank’s introduction of the ATM
○ Blockbuster didn’t survive Netflix (streaming over video rental)
○ Kodak didn’t survive digital cameras
○ Nokia didn’t survive smartphones
○ Sears didn’t survive e-commerce
● Governmental regulations requiring record keeping
○ Toxic substance Control Act
○ Sarbanes-Oxley Act
○ Dodd-Frank Act
Business Processes
● Business Processes
○ Flows of material, information, knowledge
○ Sets of activities/steps
○ It may be tied to a functional area or be cross-functional
● Businesses
○ Seen as a collection of business processes
○ Business processes can be assets or liabilities
Examples:
● Manufacturing and production
○ Assemblings the product
● Sales and Marketing
○ Identifying customers
● Finance and Accounting
○ Fundamental to business processes
○ Creating financial statements, paying suppliers
● Human Resources
○ Fundamental to business processes
○ Paying or hiring employees
Enterprise Applications
● Systems for linking the enterprise
● Span functional areas
● Execute business processes across the firm
● Include all levels of management
● Learning Management Systems (LMS)
○ Ex. D2L Brightspace
● Four major enterprise applications
○ Enterprise Resource Planning (ERP)
○ Supply Chain Management (SCM)
○ Customer Relationship Management (CRM)
○ Knowledge Management System (KMS)
Checklist for Managers: Evaluating and Selecting Collaboration and Social Software Tools
● Six steps in evaluating software tools
1. Identifying your firm’s collaboration challenges
2. Identify what kinds of solutions are available
3. Analyze available products' costs and benefits
4. Evaluate security risks
5. Consult users for implementation and training issues
6. Evaluate product vendors
Lecture 3 - IT Infrastructure
IT Infrastructure:
● Set of physical devices and software required to operate an enterprise
● Set of firm-wide services including:
○ Computing platforms providing computing services
○ Physical facilities & management services
○ IT management, education, and other services
● “Service platform” perspective
○ More accurate view of value of investments
○ Internet value?
Stages in IT Infrastructure:
● Purpose of the creation of the internet was to create a line of connection for US military
communication
Software Categories:
● System Software (OS)
○ Software that manages a computer system at a fundamental level
● Application Software
○ Software written to address specific needs – to solve problems in the real world
Networking/Telecommunications Platforms:
● Network operating systems
○ Windows Server, Linux, Unix
● Network hardware providers
○ Cisco, Juniper Networks
● Telecommunication services
○ Telecommunications, cable, telephone company charges for voice lines and Internet
access
○ AT&T, Verizon
Internet Platforms:
● Hardware, software, management services to support company websites, intranets
○ Web-hosting services
○ Routers
○ Cabling or wireless equipment
● Internet hardware server market
○ IBM, Dell, Oracle, HP
● Web development tools/suites
○ Microsoft (Visual Studio and .NET), Oracle-Sun (Java), Adobe
Management Issues:
● Dealing with platform and infrastructure change
○ As firms shrink or grow, IT needs to be flexible and scalable
○ Scalability
■ Ability to expand to serve larger number of users
■ With cloud services businesses are able to expand or shrink their services with
the cloud (Operating expense)
■ Capital expenses - can’t scale it (depreciates over time)
○ For mobile computing and cloud computing
■ New policies and procedures for managing these new platforms
■ Contractual agreements with firms running clouds and distributing software
required
● Management and governance
○ Who controls IT infrastructure?
○ How should the IT department be organized?
■ Centralized
● Central IT department makes decisions
■ Decentralized
● Business unit IT departments make own decisions
○ How are costs allocated between divisions, departments, etc
● Making wise infrastructure investments
○ Under-investment and over-investment can hamper firm performance
○ Rent vs. Buy
○ Cloud computing
■ Security requirements
■ Impact on business processes and workflow
○ Outsourcing
Enterprise Software:
● Built around thousands of predefined business processes that reflect best practices
○ Finance and accounting
○ Human resources
○ Manufacturing and production
○ Sales and marketing
● To implement, firms:
○ Select functions of system they wish to use
○ Map business processes to software processes
■ Use software’s configuration tables for customizing
Demand-Driven Supply Chains: From Push to Pull Manufacturing and Efficient Customer Response:
● Push-based model (build-to-stock)
○ Earlier SCM systems
○ Schedules based on best guesses of demand
○ Manufacturer starts to produce product based on what they think the consumer would
want
● Pull-based model (demand-driven)
○ Web-based
○ Customer orders trigger events in supply chain
○ Start the production process when a customer orders to product
● Internet enables move from sequential supply chains to concurrent supply chains
○ Complex networks of suppliers can adjust immediately
Social CRM
● Incorporating social networking technologies
● Company social networks
● Monitor social media activity; social media analytics
● Manage social and web-based campaigns
Business Intelligence
● Inclusion of BI with enterprise applications
● Flexible reporting, ad hoc analysis, “what-if” scenarios, digital dashboards, data visualization, AI
machine learning
Relational DBMS:
● Represent data as two-dimensional tables
● Each table contains data on entity and attributes
● Table: grid of columns and rows
○ Rows (tuples): records for different entities
○ Fields (columns): represents attribute for entity
○ Key field: field used to uniquely identify each record
○ Primary key: field in table used for key fields
○ Foreign key: primary key used in second table as look-up field to identify records from
original table
Figure 6.4 Relational Database Table:
Designing Databases:
● Conceptual design vs. Physical design
○ Conceptual
■ Least detail, establishes the entities, attributes, and their relationship
○ Physical
■ More detailed, specific implementation of the data model
● Normalization
○ Streamlining complex groupings of data to minimize redundant data elements and
awkward many-to-many relationships
● Referential Integrity
○ Rules used by RDBMS to ensure relationships between tables remain consistent
● Entity-relationship diagram (ERD)
○ Illustrates how “entities” such as people, objects or concepts relate to each other
● A correct data model is essential for a system serving the business well
Blockchain:
● Distributed ledgers in a peer-to-peer distributed database
● Maintains a growing list of records and transactions shared by all
● Encryption used to identify participants and transactions
● Used for financial transactions, supply chain, and medical records
● Foundation of Bitcoin, and other crypto currencies
Figure 6.12 How Blockchain Works:
Data Mining:
● Finds hidden patterns, relationships in datasets
○ Ex. customer buying patterns
● Infers rules to predict future behaviour
● Types of information obtainable from data mining:
○ Associations
○ Sequences
○ Classifications
○ Clustering
○ Forecasting
What are the Different Types of Decisions, and How does the Decision-Making Process Work?
● Business value of improved decision making
○ Improving hundreds of thousands of “small” decisions adds up to large amount value for
the business
● Types of decisions
○ Unstructured: Decision maker must provide judgement, evaluation, and insight to solve
problem
■ Ex. Should we build a new TRSM building? Same location or new location?
○ Structured: Repetitive and routine; involve definite procedure for handling so they do not
have to be treated each time as new
■ Ex. Who should get a passing grade in ITM100? Who should get an A, who
should get a D?
○ Semi-Structured: Only part of problem has clear-cut answer provided by accepted
procedure
■ Ex. Who should be admitted into the co-op program?
● Senior Managers
○ Make many unstructured decisions
● Middle Managers
○ Make more structured decisions but these may include unstructured components
● Operational managers and employees
○ Make more structured decisions
Figure 12.1 Information requirements of Key Decision-Making Groups in a Firm (University Example)
Managerial Roles
● Information systems can only assist in some of the roles played by managers
● Classical model of management: five functions
○ Planning, organizing, coordinating, deciding, and controlling
● More contemporary behavioural models
○ Actual behaviour of managers appears to be less systematic, more informal, less
reflective, more reactive, and less well organized than in classical model
Predictive Analytics
● Uses variety of data, techniques to predict future trends and behaviour patterns
○ Statistical analysis
○ Data mining
○ Historical data
○ Assumptions
● Incorporated into numerous BI applications for sales, marketing, fiance, fraud detection, health
care
○ Credit scoring
○ Predicting responses to direct marketing campaigns
Types of Networks
● Signals: Digital vs. Analog
○ Modem: translates digital signals into analog form (and vice versa)
● Types of networks
○ LANs
■ Ethernet
■ Client/server vs. Peer-to-peer
○ Wide area network (WANs)
○ Metropolitan area networks (MANs)
○ Campus area networks (CANs)
The Web
● The most popular Internet service, with universally accepted standards for storing, retrieving,
formatting and displaying information by using a client/server architecture
● Hypertext
○ Hypertext Markup Language (HTML)
○ Hypertext Transfer Protocol (HTTP):
■ Primary protocol used to send data between web browser and server
○ Uniform resource locator (URL): domain name/directory path/webpage name
● Web servers
○ Software for locating and managing web pages
Cellular Systems
● Competing Standards
○ CDMA: United States only
○ GSM: Rest of world, AT&T, T-Mobile
● Third-generation (3G) networks
○ 144 Kbps
○ Suitable for e-mail access, web browsing
● Fourth-generation (4G) networks
○ Up to 100 Mbps
○ Suitable for Internet video
○ LTE and WiMax
● 5G Networks
○ Gigabit capacity
○ Currently under development and early test deployments
○ IPhone 12 is 5G capable , Bell, Telus, Rogers offer 5G connectivity in some cities
E-Commerce Today
● E-Commerce: use of the Internet and Web to transact business
● Began in 1995 and grew exponentially; still stable even in a recession
● Companies that survived the dot-com bubble now thrive
● The new e-commerce: social, mobile, local
● Move from desktop to smartphone
● E-commerce keeps growing year-to-year
Key Concepts in E-Commerce – Digital Markets and Digital Goods in a Global Marketplace
● Internet and digital markets have changed the way companies conduct business
● Information asymmetry reduced
● Menu costs, search and transaction costs reduced
● Dynamic pricing enabled
● Switching costs
● Delayed gratification
● Disintermediation
○ Elimination of the middle man
Figure 10.2 The Benefits of Disintermediation to the Consumer
● Disintermediation
○ Taking out the middle distributor/retailer to reduce the prices of products
Digital Goods
● Goods that can be delivered over a digital network
● Cost of producing first unit is almost entire cost of product
● Costs of delivery over the Internet very low
● Marketing costs remain the same; pricing highly variable
● Industries with digital goods are undergoing revolutionary changes
○ Book publishers, Music labels, Movie and TV production
○ Future possibilities
■ Sports?
■ Education?
Types of E-Commerce
● Three major types
○ Business-to-consumer (B2C)
■ Ex. Amazon
■ Retail
○ Business-to-Business (B2B)
■ Ex. ChemConnect
■ A business buying materials from a business
○ Consumer-to-Consumer (C2C)
■ Ex. ebay, Kijiji
■ Person selling to another person
● E-commerce can be categorized by platform
○ Mobile commerce (m-commerce) has become common
● Basic Business Model definition
○ What and how you will make a business profitable
What is the Role of M-Commerce in Business, and What are the Most Important M-Commerce
Applications?
● M-commerce in 2017 is 35% of all e-commerce
● Fastest growing form of e-commerce
○ Growing at 30% or more per year
● Main areas of growth
○ Mass market retailing (Amazon, eBay, etc.)
○ Sales of digital content (music, TV, etc.)
○ In-app sales to mobile devices
System Security
● Information systems are mission critical for many organizations
● Without proper security measures, these systems would be next to impossible to use and take
advantage of
● Security
○ Policies, procedures, and technical measures prevent unauthorized access, alteration,
theft, damage to information systems
Internet Vulnerabilities
● Network open to anyone
● Size of Internet means abuses can have wide impact
● Use of fixed Internet addresses with cable / DSL modems creates fixed targets for hackers
● Unencrypted VOIP
● E-mail, P2P, IM
○ Interception
○ Attachments with malicious software
○ Transmitting trade secrets
Malware:
● Any type of malicious software designed to harm or exploit
Software Vulnerability
● Commercial software contains flaws that create security vulnerabilities
○ Bugs (program code defects)
○ Zero defects cannot be achieved because complete testing is not possible with large
program
○ Flaws can open networks to intruders
● Patches
○ Small pieces of software to repair flaws
○ Exploits often created faster than patches can be released and implemented
Security Policy
● Ranks information risks, identifies acceptable security goals, and identifies mechanisms for
achieving these goals
● Drives other policies
○ Acceptable use policy (AUP)
■ Defines acceptable uses of firm’s information resources and computing
equipment
● Identity Management
○ Identifying valid users
○ Controlling access
Building Organizational and Management Capital: Collaboration, Communities of Practice, and Office
Environments
● Developing new organizational roles and responsibilities for the acquisition of knowledge
● Chief knowledge officer executives
● Dedicated staff / knowledge managers
● Communities of practice (COPs)
○ Informal social network of professionals and employees
○ Activities include education, online newsletters, sharing knowledge
○ Reduce learning curves of new employees
Machine Learning
● How computer programs improve performance without explicit programming
○ Recognize patterns
○ Experience
○ Prior learnings (database)
○ Supervised vs. unsupervised learning
● Contemporary examples
○ Google searches
○ Recommender systems (Amazon, Netflix)
● Examples
○ Ametros: uses IBM Waston (learns from each semester of student interaction)
Neural Networks
● Find patterns and relationships in massive amounts of data too complicated for humans to
analyze
● “Learn” patterns by searching for relationships, building models, and correcting over and over
again
● Human “train” network by feeding it data inputs for which outputs are known, to help neural
network learn solution from human experts
● Used in medicine, science, and business for problems in pattern classification, prediction,
financial analysis, control & optimization
● Example: Weather & Climate
○ Humans are very good at predicting weather
○ Humans train neural networks to learn how to predict weather
○ Weather models become foundation for climate change models
Genetic Algorithms
● Useful for finding optimal solution for specific problem by examining very large number of
possible solutions for that problem
● Conceptually based on process of evolution
○ Search among solution variables by changing and reorganizing component parts using
processes such as inheritance, mutation, and selection
● Used in optimization problems (minimization of costs, efficient scheduling, optimal jet engine
design) in which hundreds or thousands of variables exist
● Able to evaluate many solution alternatives quickly
Intelligent Agents
● Works without direct human intervention to carry out repetitive, predictable tasks
○ Deleting junk emails
○ Finding cheapest airfare
● Use limited built-in or learned knowledge base
○ Some are capable of self-adjustment
■ Ex. Siri
● Chatbots
● Agent-based modelling applications
○ Model behaviour of consumers, stock markets, and supply chains
○ Used to predict spread of epidemics
3D Printing:
● Using printer that produces objects from a computer into real life
What Are the Business Benefits of Using Intelligent Techniques for Knowledge Management?
● Intelligence techniques: used to capture individual and collective knowledge and to extend
knowledge base
○ To capture tacit knowledge: expert systems, case-based reasoning, fuzzy logic
○ Knowledge discovery: neural networks and data mining
○ Generating solutions to complex problems: genetic algorithms
○ Automating tasks: intelligent agents
● Artificial intelligence (AI) technology:
○ Computer-based systems that emulate human behaviour
Wearable Devices
● Transforms the way we live
○ Fitness, wellness & healthcare
○ Infotainment (information & entertainment): smart glasses
○ Fashion and Military
Virtualization
● Presents computing resources so that they can be accessed in ways that are not restricted by
configuration
● Allows single physical resources to act as multiple resources
○ Ex. Run multiple instances of OS
● Reduces hardware and power expenditures
● Facilitates hardware centralization
● Software-defined storage (SDS)
Cloud Computing
● Off-load peak demand for computing power to remote, large-scale data processing centers
● Pay only for the computing power they use, as with an electrical utility
● Excellent for firms with spiked demand curves caused by seasonal variations in consumer
demand
○ Ex. Holiday shopping
● Saves firms from purchasing excessive levels of infrastructure
● Data permanently stored in remote servers, accessed and updated over the Internet by users
Cloud Computing
● A loud can be private or public
○ Amazon Web Service (AWS)
● A private cloud is operated only for an organization
● Concerns include
○ Security
○ Availability
○ Users become dependant not he cloud provider
Green Computing
● Practices and technologies for manufacturing, using, disposing of computing and networking
hardware
● Reducing power consumption a high priority
● Data centers use as much energy as the output of 30 nuclear power plants
Quantum Computing
● Uses quantum physics to represent and operate on data
● Dramatic increases in computing speed
● While conventional computers handle bits of data either as 0 or 1, quantum computing can
process bits as 0,1 or both simultaneously
○ Allows to solve business and scientific problems millions of times faster
Open-source Software
● Open-source software is free and can be modified by users
● Developed and maintained by a worldwide network of programmers and designers under the
management of user communities
● Examples
○ Apache web server, Mozilla Firefox, OpenOffice
○ Linux is the most widely used open-source software program. (An OS derived from Unix)
Product differentiation:
● Characteristics that make your product stand out to the target audience
Market Niche:
● Promote their products to small specific audience
● Serving a unique market with specific needs and preferences
Synergies
● When output of some units are used as inputs to others, or organizations pool markets and
expertise
● Ex. Merger of Bank of NY and JP Morgan Chase
● Purchase of YouTube by Google
Core Competencies
● Activity for which firm is world-class leader
● Relies on knowledge, experience, and sharing this across business units
● Ex. Procter & Gamble’s intranet and directory of subject matter experts
Network-Based Strategies
● Take advantage of firm’s abilities to network with one another
● Include use of:
○ Network economics
○ Virtual company model
○ Business ecosystems
Network Economics
● Marginal cost of adding new participant almost zero, with much greater marginal gain
● Value of community grows with size
● Value of software grows as installed customer base grows
● Compare to traditional economics and law of diminishing returns
What are the business, firm, and industry value chains for this particular firm?
1. How is the company creating value for the customer – through lower prices and transaction costs
or higher quality? Are there any places in the value chain where the business could create more
value for the customer and additional profit for the company?
2. Does the firm understand and manage its business processes using the best practices available?
Is it taking maximum advantage of supply chain management, customer relationship
management, and enterprise systems?
3. Does the firm leverage its core competencies?
4. Is the industry supply chain and customer base changing in ways that benefit or harm the firm?
5. Can the firm benefit from strategic partnerships, value webs, ecosystems, or platforms?
6. Where in the value chain will information systems provide the greatest value to the firm?
What Ethical, Social, and Political Issues are Raised by Information Systems?
● Recent cases of failed ethical judgment in business
○ Wells Fargo, Volkswagen, General Motors, Takata Corporation
○ Lifelabs, Cadillac Fairview, Tim Hortons, Indigo
○ In many, information systems used to bury decisions from public scrutiny
● Ethics
○ Principles of right and wrong that individuals, acting as free moral agents, use to make
choices to guide their behaviours
● Information systems raise new ethical questions because they create opportunities for:
○ Intense social change, threatening existing distributions of power, money, rights, and
obligations
● New opportunities for crime
○ New kinds of crime
Surveillance Capitalism:
“Describes a dystopian business model, predicated on turning the details of our lives into corporate profit.
This is most famously or notoriously demonstrated by Facebook and Google.”
● “Information capitalism aims to predict and modify human behavior as a means to produce
revenue and market control.”
● “Google has not been subject to any meaningful public oversight”
● “Anticipatory conformity”
● “Google knows far more about its populations than they know about themselves” .. “Surveillance
capitalism thrives on the public’s ignorance.”
1. Information systems are filtered through social institutions, organizations and individuals.
Systems do not have impacts themselves
2. Responsibility for the consequence of technology falls clearly on the institutions, organizations
and individual managers who choose to use the technology
3. In an ethical, political society, individuals and others can recover damages done to them through
a set of laws characterized by due process
Ethical Analysis
● Five-step process for ethical analysis
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the higher-order values involved. (ex. Privacy,
Protection of property, etc)
3. Identify the stakeholders
4. Identify the options that you can reasonably take
5. Identify the potential consequences of your options
● Never decide on your own! – work with specialist such as lawyers, police and senior executives
Technical Solutions
● Solutions include:
○ Email encryption
○ Anonymity tools
○ Any-spyware tools
● Overall, technical solutions have failed to protect users from being tracked from one site to
another
○ Browser features
■ “Private” browsing
■ “Do not track” options
Property Rights: Intellectual Property
● Intellectual Property (IP)
○ Tangible and intangible products of the mind created by individuals or corporations
● Protected in four main ways:
1. Copyright - protects creators of intellectual property
2. Patents - protects inventors
3. Trademarks - protects consumer and firms
4. Trade secret - protects ideas not in the public domain