Professional Documents
Culture Documents
كتاب نظم معلومات أداريةpdf
كتاب نظم معلومات أداريةpdf
Introduction
We live in the “digital age”. The average American relies daily on more than 250
computers. Every part of your life depends on technology. Your TV, Kindle Fire, iPad,
DVD player, car, and cell phone are not able without technology.
Your generation, specifically the group of people born in the mid-to-late 1980s and early
1990’s was born into the digital age. Society refers to them as digital natives, while those
born before that are referred to as digital immigrants.
The pace at which technology is changing is far faster now than for previous technologies
and generations of people.
1. Information Technology
Any type of computer technology (hardware or software) and telecommunications
technology (data, image, and voice networks) used to handle information.
2. Information Systems
Integrated or interrelated components used to collect, process, store and distribute
information to mainly support decision makings in an organization.
MIS deal with the coordination of the three main organizational resources:
Information, people, and information technology.
MIS help people to use available technology to support the goals and objectives of their
organization as driven by the competitive pressures and determined by appropriate
business strategies of the organization.
Information can take many forms depending on the context in which it is used.
Data are raw facts that describe a particular phenomenon such as the current temperature,
customers ages, etc. (Actually, the term data is plural; datum is singular.)
Figure 1.2
Data and Information
Youngest age: 21
Oldest age: 25
Page 2 of 8
o Business intelligence extends information (e.g. based on the age or gender of the
customer and his or her purchases the company can suggest tailored items for his
or her).
Notice that data, information, and business intelligence all build on each other.
o Information is a more complete picture of multiple data points; in our example, an
age was a single piece of data while information was the collective ages of all
customers.
o Business intelligence extends that information to include gender behavior, the use
of coupons, preferred salespersons, and total purchases.
Knowledge: You acquire knowledge in a business or field through practice over time
using information and intelligence
o Knowledge would address what marketing strategy, for instance, should be
undertaken to get more customers on Plan B to increase total purchases.
o Knowledge is a broad term that can describe many things:
1. It can provide contextual explanation for business intelligence
2. It can point toward actions to take to affect business intelligence
3. It can include intellectual assets such as patents and trademarks
4. It includes organizational know-how for things such as best practices.
Below are some information attributes that help define its quality:
o Timeliness—There are two aspects here:
First, do you have access to information when you need it? If you’re
preparing to make a stock trade, for example, you need access to the price
of the stock right now.
Page 3 of 8
Second, does the information describe the time period or periods you’re
considering? A snapshot of sales today may be what is relevant. Or for
some important decisions, you really need other information as well—
sales yesterday, sales for the week, today’s sales compared to the same day
last week, today’s sales compared to the same day last year, and so on.
2. Downward. Strategies, goals, and directives that originate at a higher level are
passed to lower levels in downward information flows. The upper level of an
organization develops strategies; the middle levels of an organization convert
those strategies into tactics; and the lower levels of an organization deal with the
operational details.
Consider a bank that faces the decision about what interest rate to offer on a daily
interest savings account. That bank will use internal information (how many
customers have such accounts), external information (what rate other banks are
offering), objective information (what is today’s prime interest rate), and
subjective information (what the prime interest rate is expected to be in the
future).
People set goals, carry out tasks, make decisions, serve customers, and, in the case of IT
specialists, provide a stable and reliable technology environment so the organization can
run smoothly and gain a competitive advantage in the marketplace.
IT is simply a set of tools that help you work with and process information. Technology
such as spreadsheet software can help you determine whether you should show sales by
territory or sales by salesperson.
EXAMPLE:
1. A manager in a store received an information that baby diapers were sold for a
larger than expected percentage on Thursday night compared to the rest of the
week.
2. If the manager were to depend only on this information, her strategy would be to
guarantee that the shelves would always be full of diapers on Thursday nights or
do special offers on diapers on those nights to increase the sales.
3. However, not our information-literate knowledge worker. She first looked at the
information and decided that she needed more information to create business
intelligence. She simply needed to know more before she could act.
4. She decided the business intelligence she needed was why diaper sales spiked on
Friday evenings and who was buying the diapers. That intelligence was not stored
within the computer system
5. So, she stationed an employee in the diaper aisle on Friday evening to record any
information pertinent to the situation (i.e., she knew how and where to obtain the
information).
Page 6 of 8
6. The store manager learned that young employers purchased the most diapers on
Friday evenings—obviously stocking up for the weekend on their way home from
work.
7. The manager’s response was to stock premium domestic and imported juices near
the diapers. Since then, Friday evening has been a big sales time not only for
diapers but also for premium juice.
Lessons learnt
1. IT helps us. It is not the goal
2. You have to distinguish between information and business intelligence
3. So, when you receive information and need to make a decision ask yourself
questions that start with who, what, when, why, where, and how. Answers to those
questions will help you create business intelligence and make better decisions.
Page 7 of 8
All hardware technology falls into one of the following six basic categories:
1. An input device is a tool you use to enter information and commands. Input
devices include such tools as keyboard, mouse, touch screen, game controller, and
bar code reader.
2. An output device is a tool you use to see, hear, or otherwise recognize the results
of your information-processing requests. Output devices include such tools as
printer, monitor, and speakers.
3. A storage device is a tool you use to store information for use at a later time.
Storage devices include such tools as USB keys, flash memory cards, and DVDs.
4. The central processing unit (CPU) is the hardware that interprets and executes the
system and application software instructions and coordinates the operation of all
the hardware. RAM, or random access memory, is a temporary holding area for
the information you’re working with as well as the system and application
software instructions that the CPU currently needs.
5. A telecommunications device is a tool you use to send information to and receive
it from another person or computer in a network. If you connect to the Internet
using a modem, the modem is a telecommunications device.
6. Connecting devices include such things as a USB port into which you connect a
printer, connector cables to connect your printer to the USB port, and internal
connecting devices on the motherboard.
If this is your first exposure to technology hardware and software, we suggest you explore
Extended Learning Module A (Computer Hardware and software).
Finally: MIS is about getting the right technology and the right information into the hands
of the right people at the right time.
Page 8 of 8
Week 2, Lecture 4
o What sort of financial impact will this resource have on the organization?
The above kind of questions addresses the financial impact of a resource. Technology is
NO deferent; you must be able to financially justify the use of technology.
A simple, yet very powerful, tool for assessing the financial impact of a resource is called
“break-even analysis”. In the break-even analysis, you consider and chart the following
financial information (See Figure 1.7 in the textbook):
o Fixed cost: The total of all costs that you incur whether or not you sell anything.
For example, rent for office or retail of space is a fixed cost; even if you don’t sell
a single thing, you still have to pay the monthly rent. Other fixed costs might
include utilities, insurance, employee salaries, and so on.
o Variable cost: The amount it costs to acquire/produce once unit that you well
eventually sell to your customers.
Page 1 of 4
Let us assume that you sell movie posters. Each poster you buy for $4 from studios. You
then sell the poster online for $9.
Your online store, product catalog, credit card processing, domain name registration, and
search engine placement are all provided by GoDaddy (www.godaddy.com) for a cost of
$1,500 per year. So your financial information then is this:
o Fixed costs: $1,500 per year for GoDaddy services. Whether you sell or not. This
cost remains fixed.
o Variable costs: $6, which is $4 the cost of the poster when you buy it and $2 the
cost of shipping the poster to a customer.
Using break-even analysis, you answer an important question: “How many posters do I
have to sell to break even?”
o You make a net profit of $3 per poster ($9 sale price - $6 variable cost).
To cover your costs and your $1,500 of fixed costs, you have to sell 500 posters.
If you sell less than 500 then you lose money. If you sell more than 500 then you gain
money.
Why this is important from a technology point of view? Because technology can help you
and your organization do one or any combination of the following three:
1. Digital storefronts: Companies like Amazon and eBay that only have
presence in the virtual world have significantly lower fixed costs in terms of
retail space than companies that have to pay for retail space, like retail store
you would find in a mall.
3. VoIP (Voice over IP): Again, this is another one of those initiatives gaining in
popularity. VoIP allows you to use the Internet for making phone calls instead
of leasing traditional telephone lines from the phone company. A popular
variation on VoIP is Skype.
4. Cloud Computing: One of the hottest topics in the business world right now
and one that’ll we explore more in Chapter 7. With cloud computing, you
don’t buy hardware infrastructure like servers or perhaps software site
licenses. Instead, you rent them on an as-needed basis “in the cloud”.
1. Virtual goods: As the name implies they don’t exist in the physical world.
These are the best types of goods to sell in financial terms because you have
no variable costs. Examples are items sold in virtual worlds such as weapons
on World of Warcraft online game. What you get is a virtual good that has no
variable cost associated with it because it is purely digital. So, the organization
might charge you $1 and that $1 was pure profit.
Page 3 of 4
[Page 17] Increase Revenue
You can also impact your break-even point by increasing revenue. When you increase
revenue or price per unit, your break-even point comes earlier. In over movie poster
example, if you increased the price from $9 to $11 for a poster, your break-even point
would be 300 units instead of 500. Of course, if you rise prices too much, your
competition will undercut you, and then you are in real trouble.
Page 4 of 4
Week 3, Lecture 5
In your personal life, you may choose to buy the latest piece of technology because it is
cool. Not so in the business world.
Business carefully scrutinize (test and evaluate) their technology purchases, seeking to
find and justify a competitive advantage. A competitive advantage is providing a
product or a service in a way that customers value more than what your competition is
able to do.
To assess technology and the competitive advantage it can yield, many people choose to
use Michael Porter’s Five Forces Model. The Model helps business people understand the
relative attractiveness of an industry and the industry’s competitive pressures in terms of
the following five forces:
1. Buyer power
2. Supplier power
3. Threat of substitute products or services
4. Threat of new entrants
5. Rivalry among existing competitors.
1- BUYER POWER
Buyer power in the Five Forces Model is high when buyers have many choices from
which to buy, and low when their choices are few.
Providers of products and services in a particular industry wish to reduce buyer power.
They create a competitive advantage by making it more attractive for customers to buy
from them than from their competition.
Below are a few of the many companies using IT–enabled processes to reduce buyer
power:
Page 1 of 4
1. NetFlix: Set up your movie list. After you watch a movie and return it. NetFlix
will send you the next movie on your list. You can also rent videos through the
mail, stream them to your computer, or stream them to your TV.
2. United Airlines: When you enroll in the Mileage Plus program you accumulate
miles for free air travel, upgrades, and hotel stays when you travel. Programs like
this one, which reward customers based on the amount of business they do with a
particular organization, are called loyalty programs.
3. Apple iTunes— Create an iTunes account and buy and download whatever music
you want. Then, you can organize and manage your music, move it to your iPod,
and burn CDs. You can also store all your music in Apple’s iCloud.
What’s interesting about each of these examples is that the competitors in those industries
have responded by creating similar programs.
NetFlix was the first to offer movie rentals using the Internet the primary platform.
Therefore, it had first-mover advantage, a significant impact on gaining market share by
being the first to market with a competitive advantage.
The lesson learned here—and for all strategies that result in a competitive advantage—is
that a competitive advantage is only temporary and your organization must constantly
innovate to find new competitive advantages.
2- SUPPLIER POWER
Supplier power in the Five Forces Model is high when buyers have few choices from
which to buy, and low when their choices are many.
In a typical supply chain (see Figure), your organization will probably be both a supplier
(to customer organizations) and a buyer, or customer (of other supplier organizations).
o As a customer of other supplier organizations, you want to increase your buyer
power.
o As a supplier to other organizations, you want to increase your supplier power,
thus reducing your customer’s buyer power.
Page 2 of 4
In the quest for increasing supplier power, organizations use many tools at their disposal,
not just IT.
o Companies obtain patents and trademarks to minimize the extent to which
products and services can be duplicated and offered by other organizations.
The De Beers Group for many years has fought fiercely to tightly control
the supply and distribution of diamonds.
OPEC (the Organization of the Petroleum Exporting Countries) has
organized 13 oil-producing nations to better control the distribution of the
world’s most popular energy resource (reportedly to ensure the
stabilization of oil prices).
Switching costs can of course be real monetary costs, too (e.g. contracts with mobile
phone companies).
Page 3 of 4
4- THREAT OF NEW ENTRANTS
The threat of new entrants in the Five Forces Model is high when it is easy for new
competitors to enter a market, and low when there are significant entry barriers to
entering a market.
An entry barrier is a product or service feature that customers have come to expect from
organizations in a particular industry and that must be offered by an entering organization
to compete and survive.
Such barriers are erected, and overcome, and then new ones are created again. This is that
vicious business cycle of build a competitive advantage, enjoy first-mover advantage, and
then watch your competition develop similar initiatives— thereby nullifying your
competitive advantage.
If you cell phone providers, for example in Jordan, you cannot take your telephone
number with you (i.e., you had to get a new phone number). This created a significant
entry barrier because new cell phone providers entering the industry were mainly limited
to obtaining new customers who did not currently have a cell phone. This has changed
now with LNP, Local Number Portability, your ability to take your cell number with you
to a new provider.
Page 4 of 4
Week 3, Lecture 6
There are literary hundreds of approaches and strategies to the development of business
strategy. Here we will focus on Porter’s three generic strategies and two other
approaches:
Wall-Mart’s “Always Low Prices!” and “Every Day Low Price” accurately describes the
strategy of the overall cost leadership.
2. Sophisticated business intelligence to predict what customers will want and when.
Dell has a famous model with its sell-source-ship model of customizing computer
purchases.
Hyundai and Kia similarly attempt to sell reliable low-cost vehicles to a wide audience, in
contrast to Audi or BMW which have no overall cost leadership strategy.
Companies under the overall cost leadership often offer loss leaders just to get customers
into the store.
Loss leader is a product sold at or below cost to entice customers into a store in a
hope that they will buy more profitable products.
Page 1 of 4
Loss leaders are often placed in the back of the store so customers will have to
walk by products with higher profit margins.
IT can help in tightening the SCMs, help the company to capture customer information to
better understand buying patterns in an effort to better predict product inventory and shelf
placement, and enable customers to easily order products through web-enabled e-
commerce systems.
Another example is Lunds & Byerly’s in the grocery retail industry. While other
competitors compete mainly on price, Byerly’s focuses on the shopping experience for
differentiation. All of the Byerly’s stores have carpeted floors instead of tiles and some
even have chandeliers instead of fluorescent lighting.
Apple Computer also focuses on differentiation as a business strategy. Not only do Apple
computers look different, they have a different screen interface and focus more on
nontextual information processing such as photos, music, and videos than any of the
competition.
Both Audi and Michelin have successfully created a differentiation strategy based on
safety.
Differentiation is not about being different based on lower price–that’s the strategy of
overall cost leadership–but the two are interrelated.
o While people are willing to pay extra for a product or service, they are not willing
to pay too much extra. Organizations focusing on differentiation must still be
concerned about price in relation to the competition.
Page 2 of 4
Many restaurants focus on only a certain type of food.
o If you wanted to transform your business in some way, you would allocate a
certain percentage of your IT dollars to a “transformation” strategy.
As you can see, the RGT framework is similar in many ways to both Porter’s three
generic strategies as follows:
o Run = overall cost leadership
o Grow = focus and differentiation
o Transform = (new) differentiation
Page 3 of 4
In Figure 1.13, you can see RGT data gathered by the Gartner Group over a seven-year
period.
Note that the general trend toward allocating more IT dollars to run initiatives and less to
transform initiatives. Is that good or bad? It is hard to answer, but it is not a favorable
trend. All organizations must focus to some extent on the transformation aspect.
In the business world, as is often said, if you are standing still, you are falling behind. It is
a simple fact, your competition is always trying to do something better than you are.
Therefore, your organization must constantly seek to evolve and, in most cases, to
transform itself.
Many times, your organization can take a proactive approach to using technology to
transform itself. Apple is perhaps the most widely discussed organization that is
constantly in a state of transformation.
Page 4 of 4
Week 3, Lecture 7, 21-01-2013
In chapter 1, we explore how a company can use tools such as Porter’s Five Forces
Model and Porter’s three generic strategies, and the run-grow-transform framework to
develop business strategies to addresses the ever-changing competitive environment.
Distribution chain – the path a product or a service follows from the originator of the
product or service to the end consumer.
o Holding into inventory costs money because you have to pay for warehouses
or stores while waiting for someone to buy it.
Page 1 of 4
o In the retailing of computers ( )قطاع التجزئة وبيع الكمبيوتراتnot only the inventory
costs money but computers can become obsolete (get old), requiring retailers
to slash prices in an effort to sell older models before new ones arrive.
o Dell’s model is different. It depends on selling its computer directly from its
Website, so there is no inventory in the distribution chain.
o Dell has enhanced its supply chain by using i2 SCM software to send orders
for parts to suppliers every two hours. This enables Dell to manufacture and
deliver exactly what the customer wants with almost little or no inventory in
its supply chain. See Figure 2.1.
Most companies use Just-in-time manufacturing processes, which ensure that the
right parts are available as products in process move down the assembly line.
Just-in-time is a method for producing and delivering a product or service just at the
time the customer wants it.
o SCM systems also focus on making sure that the right number of parts or
products is available. Not too many and not too few.
Too many products mean that too much money is tied up and increased
risk of obsolescence.
Too few products could force an assembly line to shutdown, or lose
sales because an item is not in stock when a customer is ready to buy.
Page 2 of 4
Companies with suppliers around the globe often employ inter-modal
transportation.
o This further complicates the logistics of SCM because companies are required
to carefully schedule, monitor, and track parts from different suppliers
worldwide and as they move among different models of transportation.
Of course, lower costs in the supply chain lead to lower prices for consumers, which
in turn increase market share and top-line revenue.
Page 3 of 4
Previously specialized providers (i2, Manugistics, etc.) were supplying solutions to
SCM systems. Now the market dominated by Enterprise Resource Planning (ERP)
software providers, such as SAP, Oracle/PeopleSoft, SSA Global, and Microsoft.
Page 4 of 4
Week 4, Lecture 8
The bank tracks and analyses every transaction made by 10 million customers at its
branches, at its ATMs, and through its web-based online banking system.
The bank became so good that it started to predict customer behaviour, knowing what
they want before many even realize they need it.
The bank's CRM collects every transaction made by the customer and combines it
with the personal information provided by the customer. The system is then able to
provide tailored offerings that will appeal to individual customers (e.g. money saving
accounts, second mortgage) at just the right time.
CRM uses information about customers to gain insights into needs, wants, and
behaviors in order to serve them better.
o To gain insight from customers, their interaction experience with the company
should be easy, enjoyable and error free.
o Companies now offer Multi-channel service delivery that describes the ways
a customer can interact with the company.
Examples: emails, fax, telephone, website, face-to-face
o A fundamental goal of CRM system is then to track and manage all of these
interactions:
The communications within these various channels must be organize
and carefully recorded for each customer. If this doesn’t happen then it
is most likely that you would switch to another competitor or perhaps
return the product for a refund.
Page 1 of 4
CRM is not just about software, it is a total business objective that encompasses many
different business aspects, such as software, hardware, services, support and strategic
business goals.
Many companies usually begin with a sales force automation (SFA) application and
then progress to the other three functions.
Sales force automation (SFA) systems – automatically track all the steps in the sales
process, which could contain many steps, such as:
o Contact management
o Sales lead tracking
o Sales forecasting
o Order management
o Product knowledge.
Customer service and support are functions that support CRM after the sale. They
have to be multi-channel attempting to meet the service needs of customers by phone,
e-mail, Web, text message, Facebook presence, and so on.
Analytics is tightly interwoven into any effective CRM system. Analytics are hard-
core, numerical data that allow people to analyze operations and processes and make
better decisions. Business today act on quantifiable data that allow them unique
insight into the success or failure of their initiatives.
Page 2 of 4
Analytics
Analytics
Analytics
Back office systems - used to fulfill and support customer orders. They also send their
customer information to the database.
The CRM system analyses and distributes the customer information and provides the
company with a complete view about each customer’s experience with the business.
Today most CRM systems are hosted by the software publishers. This is known as
SaaS, or software-as-a-service. Software-as-a-service (SaaS) is a delivery model for
software in which you pay for software on a pay-per-use basis instead of buying the
software.
Using SaaS, often associated with cloud computing which was introduced in Chapter
1 and will be explored more in Chapter 7. Your organization does not need to buy a
site license; instead you typically pay by the month per user for use of the software.
Salesforce.com was one of the first to offer such a model for CRM software.
Why your organization choose to use a hosted or SaaS software model? The answer
lies in the break-even analysis that we learned in Chapter 1. All the associated costs of
having software in-house–hardware infrastructure, training, maintenance, security,
tech support, and the like–represent fixed costs. Whether you have 1 or 10,000
customers these costs remain the same. With SaaS, you pay based on how many sales
representatives you have, which to a large extent is determined by how many
customers you have. If you have customer base grows and you have to add additional
sales reps, then you pay by the month for those new people, making your costs
variable.
Several companies today provide two access methods to their software. Your
organization can still buy the software license and host it in-house. Many large
organizations with thousands of sales reps may choose to do this because it is more
economical than the SaaS model. Second, you can use a SaaS model.
Page 4 of 4
Week 4, Lecture 9
The main idea behind ERPs is that they include all technology systems and software
in your organization.
ERP systems are big business. At the top of the IT spending list is the ERP market. For
instance, the U.S. Federal government spent about $7.7 billion on ERP products and
services in fiscal year 2009, up about 37 percent from 2004 spending of $5.6 billion.
More than 60% of the Fortune 1000 companies (the biggest 1000 companies in the world)
have installed or are in the process of implementing ERP systems to support their
business activities. These packages implemented by the Fortune 1000 companies also run
well over the IT budget for most small-to-medium size enterprises (SME enterprises), and
ERP vendors are targeting this untapped market with scaled-back systems suitable for
smaller firms by offering simple, cheaper, preconfigured solutions easy to install within
budget and time constraints. For instance, Microsoft now offers an ERP solution called
Microsoft Great Plains geared toward SME companies.
The dominating ERP software suppliers are SAP, Oracle/PeopleSoft, Infor, and Microsoft
(see Chapter 2, Page 46). Together they control more than 70% of the multibillion-dollar
global market.
Each vendor, for historical reasons, has a specialty in one particular module are, such as
SAP in logistics, Oracle/PeopleSoft in financials, Infor in manufacturing, and Microsoft
in retail management.
Page 1 of 6
There are also about 50 established smaller and mid-size ERP vendors, including 3rd party
developers for a very lucrative market.
The vendors are continuously updating their products and adding new technology-based
features.
Long-term vision, commitment to service and support, specialty features, experience, and
financial strength for research and development are considered the major vendor qualities
for product selection and implementation.
ERP market has been growing at a rate of more than 30% per year. The growth has been
boosted by both business and technical factors.
Knowing the history of ERP systems is essential to understanding its current application
and its future development (See Figure 2.8).
Page 2 of 6
1. The early stage of ERP was carried out in the 1970s through a system called Materials
Requirement Planning (MRP). The focus of MRP was on internal production planning,
calculating time requirements components, procurement, and materials planning.
The MRP did not focus on any type of service orientation, but rather was developed to
provide the right materials at the right time.
The MRP, or as it called little MRP, represented a huge step forward in the planning
process. For the first time, based on a schedule of what was going to be produced,
which was supported by a list of materials that were needed for that finished item, the
computer that could calculate the total needed and compare it to what was already on
hand or committed to arrive.
o This comparison could suggest an activity–to place an order, cancel orders that
were already placed, or simple move the timing of these existing orders.
The real significant of MRP was, for the first time, management was able to answer
the question “when?”
2. The next generation was introduced by the early 1980s under the name of Manufacturing
Resources Panning or MRPII.
MRPII did not mean that MRP was wrong but it just evolved.
MRPII closed the loop with the accounting and financial management systems.
MRPII systems crossed the boundaries of the production functionality and started
serving as decision support systems (DSS) as well as executive information systems
(EIS) (in the modern day many people refer to implementations of these as digital
dashboards).
For the first time, a company could have an integrated business system that provided
visibility for the requirements of material and capacity.
Good information leads to good decision, and therefore these IT systems provided a
competitive advantage.
3. By the time each functional area of a company had developed its own software program,
the need for tightly integrating them became obvious. The next major shift during the late
1980s and early 1990s was that “time to market” was becoming increasingly short.
Lead times expected by the market continued to shorten and customers were no
longer satisfied with the service level that was considered world class only a few
years earlier.
Page 3 of 6
The need to develop a tightly integrated systems that would use data stored in
common databases and would be used enterprisewide became the highest priority
for IT professionals. This common-database, companywide integrated system
appeared at the beginning of the 1990s and was named Enterprise-Resource
Planning (ERP).
ERP encompasses all the resource planning for the enterprise including product
design, warehousing, material planning, capacity planning, and communication
systems.
ERP systems help companies become leaner and more agile by integrating the
basic transaction programs for all departments, allowing quick access to timely
information.
4. ERP systems have evolved now into ERPII. During that last few years, the functional
perimeter of ERPII systems expanded to include things like SCM, CRM, data
warehousing/business intelligence (DWBI), and e-business.
Page 4 of 6
ERP systems are configurable information systems packages that seamlessly integrate all
the information processes in the company (e.g. financial, human resources, SC, customer
information). The result:
1. Integrated information across the board (data, information, business intelligence).
2. One suite of applications.
3. Unified interface across the entire enterprise.
Different ERP vendors (e.g. SAP, Oracle/PeopleSoft, Infor, and Microsoft) provide some
degree of specialty. However the core functions are the same for all of them:
o Accounting
o Financials
o Manufacturing
o Production
o Transportation
o Sales and distribution
o Human resources.
o Supply chain
o Customer relationship
o E-business
Organizations choose and deploy ERP systems for many different benefits and reasons. In
many cases the calculation of return on investment (ROI) is weighted against the many
benefits expected.
Page 5 of 6
Businesses in the private sector attempt to do the same thing on a grander scale. See
Figure 2.10.
Microsoft Dynamics SL
Sage ERP X3
Microsoft Dynamics AX
Oracle
SAP
Page 6 of 6
Week 4, Lecture 10 and Lecture 11
Social media is fueled by Web 2.0 technologies. The Web 2.0 is the so-called second
generation of the Web and focuses on online collaboration, users as both creators and
modifiers of content, dynamic and customized information feeds, and many other
engaging Web-based services.
The progress of Web can be described as moving from push to pull technologies and fro
static to dynamic information (See Figure 2.11, Page 52 in the book).
The early Web, what some people called Web 1.0, was characterized by pulling static
information. That is, you started your Web browser and searched for (i.e. pulled)
information you wanted. Most of that information was built into the Webpage your found,
making it static.
The Web moved quickly then into a short-lived environment of pushing static
information. This opened the door unfortunately for spam. In those days of Web, your
email box was littered with spam, or junk mail, for everything ranging from phony lottery
winnings, enhancing drugs, to diapers, to pet food. The senders had no idea if you needed
any of those, but your email address made a list and you were on it.
After that, the Web characterized by pulling dynamic information (probably started in the
mid-late 1990s). This opened the door to explore, for example, stock-trading Websites
like E*TRADE and Scottrade, and travel sites like Expedia and Travelocity. Then, you
could search for (i.e. pull) real-time information about flights and stock quotes. This was
the real birth of e-commerce on the Web.
Today, we are in Web 2.0, a time of active participation by consumers. It is also a time
when businesses are getting good at pushing dynamic information to you, and it is
information tailored to your needs. These include things like RSS feeds, recommendation
engines on Amazon and iTunes, and even Facebook alerting you to people you might
want to friend.
Page 1 of 4
A social networking site is a site on which you post information about yourself, create a
network of friends, read about other people, share content such as photos and videos, and
communicate with people.
Facebook has now over 1 billion users. Of those, 50% are on Facebook at least once a
day. The average Facebook user has 130 friends. In total, users spend over 700 billion
minutes per month on Facebook. In any given minute of any day, there are more than 16
million people on Facebook. On Facebook, you basically share everything you want
about your life (storied, videos, photos, thoughts), make friends and get rid of friends
(called unfriend), connect with other people have similar interests, follow artists,
musicians, and the like, and even visit the Facebook pages of retailers where you can buy
merchandise.
Facebook has only a few competitors but they are not nearly so big. StumbleUpon, the
closest, is a form of social networking that recommends videos, photos, and Webpages to
people based on their likes and the likes of other people similar to them. You have
YouTube for sharing and commenting on videos. Twitter handled over 200 million tweets
per day in mid-2011. A tweet is a form of a microblog and allows you to send and receive
text messages of roughly 140 characters or fewer.
The only real competitor to Facebook is LinkedIn. LinkedIn is the professional equivalent
of Facebook. While you use Facebook to share your personal life, you would use
LinkedIn to share your professional life, including making contacts for potential
employment, joining interests groups like international finance, making connections to
other companies for sales purposes, and so on. In early 2011, LinkedIn announced that it
has surpassed 100 million users.
Within social media, those are still the same, only greatly amplified and augmented by
other activities. Almost all retailers sell their products and services on Facebook. On a
user’s Facebook, he or she can talk about purchases and even send recommendations to a
friend. These are typical shopping activities, but now you can perform them with
hundreds or even thousands of friends watching your every move.
Pepsi has developed a unique social shopping experience with its social vending
machines. Using one of these machines, you can enter another person’s information–
mobile number, name, and optional message–and then buy them a beverage. The other
person receives a code via text message that he or she can use at a Pepsi social vending
machine to redeem a beverage. Senders of beverage gifts can even participate in what
Page 2 of 4
Pepsi called “Random Acts of Kindness”. In this, the senders sends a beverage to an
unknown person, for example, in an area struck by bad weather.
What truly makes these games “social” is the fact that it is more than just a game. Users
can virtually gather and meet in groups, they can trade treasures they’ve earned in the
game, they can spend real dollars to buy WoW gold in the game and then use the gold to
buy better equipment for an avatar.
Second Life is not exactly a game; it is a virtual world in which you can live a virtual life.
You have an avatar. You can buy and sell property. both residential and commercial. You
can open a business to sell products and services. Like the WoW gold, Second Life has
currency called Linden dollars. You use these in the game and can convert them into real
cash.
To achieve the three P’s there is an emerging aspect to social networking that encourages
people to create sustainable ideas. Many organizations have turned these into games,
complete with prize money for the top innovators. Some of the more popular are:
o The Pepsi Refresh Project–contests in the areas of education, arts and music, and
communities. Pepsi provides funding for the winners to implement their ideas.
o Toyota Ideas for Good–contests that require entrants to apply existing Toyota
technologies to other environments (nonautomotive environments) for the
betterment of people or the planet. For example, one contest winner applied
Toyota’s crash-test dummy technology to the head injuries that can occur in
football to design better helmets and shoulder pads.
Page 3 of 4
stairs, with each step playing a musical note when stepped on. This encouraged
people to take the stairs instead of a nearby escalator.
o TOMS One-for-One–buy a pair of shoes and TOMS will give away a pair to a
person in need. Also, buy a pair of sunglasses and TOMS will pay for the surgery
to repair the sight of an individual in a third-world country.
o Epic Win–a proposition by Jane McGonigal that all the world’s problems should
be converted into social-media type games. Gamers would compete to solve a
problem, just as they compete in World of Warcraft, for example, to complete a
quest.
Popular social Locationing systems include Geoloqi, Facebook Places, SCVNGR, Google
Latitude, Foursquare, and Gowalla.
Most social Locationing systems allow you to explore the area around you. You can
search for different types of restaurants, read other’s review of entertainment events, and
explore the physical world around you in many other ways via your smartphone.
These types of systems have come under close scrutiny because of the amount of
information they provide about a person. Other people can see instantly when you check
in at a location. And there have been reported stories of criminals using Locationing
systems to determine when a home is empty (by knowing that you have checked in
someplace else). Still others are concerned about companies like Foursquare are gathering
too much information about a person, namely their Locationing habits.
The above are just a few of many dimensions of social media and social networking.
Almost every commercial on TV is uploaded now to YouTube to get more views. Many
companies now advertise their Facebook pages instead of their own Websites. You may
use social media to gather information on potential universities to attend for your Master.
Finally, the business world is frantically moving into the social media space hoping to
avoid FOMO, the fear of missing out.
Page 4 of 4
Week 4, Lecture 11
To create BI you need data and information and is extracts the meaning of information
To obtain BI you need first to gather and organize you data and
information.
Then, you need to have the right IT tools to define and analyse
relationships within the collected information.
People (knowledge workers) use IT tools (databases, database
management systems (DBMSs), data warehouse and data-mining tools) to
create BI from information. This is what analytics is all about. The
technology by itself won’t do it for you, but they help you build and use
BI.
This chapter is about the technologies of databases, DBMSs, data warehouses and data
mining tools, which all have a place in an organisation as tools for working with
information.
When working with these IT tools, you’ll be performing the two types of information
processing:
1. Online transaction processing (OLTP) is the:
1. Gathering of input information;
2. Processing that information; and
3. Updating existing information to reflect the gathered and processed
information.
o Databases and DBMS are the IT tools that directly support OLTP.
Databases that support OLTP are referred to as operational databases.
These databases hold information that forms the basis for BI.
Page 1 of 5
o You can query operational databases to gather basic BI (e.g. how many products
individually sold over JD500 last month? How much money was spent on radio
advertising last month? Who are delinquent in paying their bill?). While the
results of these queries may be helpful, you really need to combine products and
adverting information (with several other types of information including
customer demographics) to perform online analytical processing.
Through the creation and use of data warehouses, a company can know all the products a
customer has purchases, determine cross-selling opportunities, and what marketing
campaigns a given customer is likely to respond to.
When you build a data warehouse and use data-mining tools to manipulate the data
warehouse’s information, you only goal is to create BI for the purpose of analytics.
Page 2 of 5
For organizing and storing basic and transaction-oriented information (that is eventually
used in analytics to create business intelligence), businesses today use databases.
There are four primary models for creating a database. The object-oriented database
model is the newest. For more about this model see the Extended Learning Module G.
But, we will focus from the four models on the most popular database model: the
relational database model.
A database is a collection of information that you organize and access according to the
logical structure of that information. Relational database is a database that uses a series
of logically related two-dimensional tables of files in the relational model to store
information. Relational database is actually composed of two parts (See Figure 3.2):
1. The information itself.
2. The logical structure of that information.
Page 3 of 5
In the relation database model the data dictionary contains the logical structure of the
information in a database (e.g. Order Number is a number of 6-digit field).
When you create a database, you first create the data dictionary.
RDBs are quite different from other ways of organizing information (e.g. Excel) where
you need sometimes to take into consideration the row and column numbers of
information.
In RDBs you only need to know the field name of the column and its logical row (not the
physical row).
Before creating the relationships, you must specify the primary key of each table.
Primary key is a field (or group of fields in some cases) that uniquely describes each
record.
Primary key cannot be blank (which is again different from working with
spreadsheets)
Foreign key is a primary key of one file that appears in another table.
Foreign keys are so important. Without them you cannot create logical ties among the
tables. Relationships allow us to create BI because they enable us to create logical ties
within many types of information. See Figure 3.3.
Page 4 of 5
By defining logical structure of information in a relational database, you are also
developing integrity constraints.
Integrity constraints are rules that help ensure the quality of information.
o Example: by saying that customer_no is the primary key of table Customer and a
foreign key in the Order table you are actually saying:
No two customers can have the same customer number.
You cannot create new order for a customer that doesn’t exist.
Page 5 of 5
Week 5, Lectures 12
1. DBMS engine
It accepts logical requests from the other DMBS subsystems, converts them into their
physical equivalent, and actually accesses the database and data dictionary as they exist
on a storage device.
o The logical view of information focuses on how you as a knowledge worker need
to arrange and access information to meet your particular business needs.
Databases and DBMSs two important advantages in separating the logical from the
physical view of information:
2. Although there is only one physical view of information, there may be numerous
knowledge workers who have different logical views of the information in a
database. The engine can process virtually any logical view or request into its
physical equivalent.
When you create a database, you must first use the data definition subsystem to create the
data dictionary and define the structure of the files.
o This is very different from using something like spreadsheets (e.g. Excel).
o When you create a workbook you can immediately begin typing information and
creating formulas and functions.
o You can’t do that with a database. You must first define its logical structure
before you can begin typing in any information. (See XLM C for the logical
structure of a SCM).
You use the data definition subsystem to add, delete, or modify a field in the data
dictionary
As you create the data dictionary, you’re essentially defining the logical properties of the
information that the database will contain. Logical structure of information include the
following:
Data manipulation tools within a DBMS allow you to specify your logical information
requirements which are used by the DBMS engine to access the information physically.
Several data manipulation tools are found in the DMBSs. These include: views, report
generator, query-by-example, and structured query language.
A. Views
A window from it you can see the contents of a database file, make changes, delete, sort
information, or query for information.
Performs the same task as a QBE tool, but uses a sentence structure instead of point,
click, and drag interface.
They include tools to create easy-to-use data entry screens (forms) and interfaces that are
usually independent of any DBMS.
o Security management allows you to control who has access to what information
and what type of access these people have.
CRUD Create, Read, Update, Delete are the rules that are defined to the
users.
o Query optimization takes queries from a user (in the form of SQL statements or
QBEs) and restructures them to minimize response times. It finds the shortest
route to the information.
But what if you wanted to know, for example, “By actual versus budgeted, how many
size 40 shirts in white CJC sold last week in Zarqa and Amman, compared with the same
month over the last five years?” That task is quite difficult even with the aid of
technology.
If you were actually able to build a QBE query for it, you would probably bring the
organization’s operational database environment to its knees! (Will be very slow to you
and your work colleagues).
This example illustrates the two primary reasons so many organizations are opting to
build data warehouses.
1. First: while operational databases may have the needed information, the
information is not organized in a way that lends itself to building business
intelligence within the database or using various data manipulation tools.
2. Second: if you could build such a query, your operational databases, which are
probably already supporting the processing of hundreds of transactions per
second, would seriously suffer in performance when you hit the Start button to
perform the query.
To support such necessary and complex queries to create business intelligence, many
organizations are building data warehouses and providing data-mining tools.
A data warehouse is simply the next step (beyond databases) in the progression of
building business intelligence.
Data-mining tools are the tools you use to mine a data warehouse and extrapolate (infer,
guess) the business intelligence you need to make a decision, solve a problem, or
capitalize on an opportunity to create a competitive advantage.
For this reason, most data warehouses are really multidimensional databases. The layers
in a data warehouse represent information according to different dimensions.
In Figure 3.8 you can see a hypercube that represents product information by product line
and region (columns and rows), by year (the first layer), by customer segment (the second
layer), and by the timing of advertising media (the third layer).
o The information you would receive from that query constitutes business
intelligence.
o Any specific sub-cube within the larger hypercube can contain a variety of
summarized information gathered from the various operational databases.
o For example, the forward most and top-left sub-cube contains information for the
North territory, by year, for product line 1. So, it could contain totals, average,
counts, and distributions summarizing in some way that information.
The sub-cubes within a data warehouse contain summarized information. So, while a data
warehouse may contain the total sales for a year by product line, it does not contain a list
of each individual sale to each individual customer for a given product.
Therefore, you simply cannot process transactions with a data warehouse. Instead, you
process transactions with your operational databases and then use the information
contained within the operational databases to build the summary information in a data
warehouse.
Essentially, data-mining tools are to data warehouse users what data manipulation
subsystem tools are to database users.
1. Query-and-Reporting Tools
Query-and-reporting tools are similar to QBE tools, SQL, and report generators in the
typical database environment.
In fact, most data warehousing environments support simple and easy-to-use data
manipulation subsystem tools such as QBE, SQL, and report generators. Most often, data
warehouse users use these types of tools to generate simple queries and reports.
2. Artificial Intelligence
Artificial Intelligence (AI) includes tools such as neural networks and fuzzy logic to form
the basis of “information discovery” and build business intelligence in OLAP.
AI represents the growing convergence of various IT tools for working with information.
Today, you can find AI being used not only for OLAP in a data warehouse environment
but also for searching for information on the Web (more in Chapter 4).
This turning of the cube allows you to quickly see information in different sub-cubes.
In Figure 3.8, you’ll notice that information by customer segment and timing of
advertising is actually hidden. Using MDA tools, you can easily bring this to the front of
the data warehouse for viewing.
What you’ve essentially done is to slice the cube vertically by layer and bring some of the
background layers to the front. As you do this, the values of the information are not
affected.
The key items of information are called key performance indicators (KPIs), the most
essential and important quantifiable measures used in analytics initiatives to monitor
success of a business activity.
KPIs can obviously be different for different people in the same organization. The good
thing is that the digital dashboard is designed uniquely for each individual user:
o For a sales manager, key performance indicators would include measures related
to sales–new contacts per month, conversions, sell-through rates, upsell
percentages, and so on.
Digital dashboards can also work in real time, providing minute-by-minute changes to
KPI data.
You can set a digital dashboard to send you a text or email message if a certain KPI falls
below a certain level.
While digital dashboards certainly will not tell you what action to take, they can and do
alert you to the presence of opportunities and problems.
For example, you can perform a time-series analysis to project future trends. You can also
perform a regression analysis to determine the effect of one variable on another.
Sega of America, one of the largest publishers of video games, uses a data warehouse and
statistical tools to effectively distribute its advertising budget of more than $50 million a
year.
o With its data warehouse, product line specialists and marketing strategists “drill”
into trends of each retail store chain.
o Their goal is to find buying trends that will help them better determine which
advertising strategies are working best (and at what time of the year) and how to
reallocate advertising resources by media, territory, and time.
Now, analytics professional must design and implement and analytics system that
provides the decision maker with the information he or she needs.
o First, you would interview the decision maker to determine what key performance
indicators need to be present in the reports. You would ask about preference of
different types of graphs or tables and perhaps even the most suitable colors.
o Second, equipped with the analytics requirements, you would then set out to find
the data needed to generate the KPIs. The data could be located internally in
operational databases such as financial and manufacturing data. You may also
need external data such as demographics and perhaps even economics data
provided by the government.
o Third, you would have to execute a process known as ETL. ETL stands for
(extraction, transformation, and loading) is a three-step process that includes:
1. Extracting needed data from its sources.
2. Transforming the data into a standardized format.
3. Loading the transformed data into a data warehouse.
o Finally, you would apply whatever data-mining tools are necessary to generate the
analytics reports. You would want to write some basic software to generate the
analytics reports, so that the software could be run the decision maker any time he
or she wanted.
However, some people need access to only a portion of that data warehouse information
as opposed to all of it. In this case, an organization can create one or more data marts.
Data mart is a subset of a data warehouse in which only a focused portion of the data
warehouse information is kept (see the Figure).
Employees wouldn’t use the data warehouse because it was simply too big, too
complicated, and included information they didn’t need access to.
This can be solved by creating several smaller data marts. For example, a data mart just
for the merchandising department. That data mart contains only merchandising-specific
information and not any information, for instance, which would be unique to the finance
department.
Because of the smaller, more manageable data marts, knowledge workers can make better
use of information.
You have to need the technology and the technology has to fit your needs.
With respect to data warehouse and data-mining tools, consider your answers to the
following questions:
1. Do you need a data warehouse? Although great IT tools, they are not
necessarily the best technologies for all businesses because:
a. They are expensive
b. They may not be necessary since some businesses can easily extract all the
business intelligence they need from databases, and
c. They require extensive and often expensive support.
2. Do all your employees need an entire data warehouse? If not, consider building
data marts.
3. How up-to-date must the information be? To create a data warehouse, you take
“snapshots” of database information and load it into a data warehouse. If crucial
information changes every second, this may not be possible.
4. What data-mining tools do you need? User needs should always drive the
answer to this question. Whichever you choose, training will be key. If your users
can fully exploit all the features of their chosen data-mining tools, your entire
organization will reap the benefits.
All these C-level positions are strategic in nature, at the tactical level, you will find an
additional two important functions or positions that oversee technology and information:
data administration and database administration:
o Data administration is the function in an organization that plans for, oversees the
development of, and monitors the information resources. This function must be
completely in tune with the strategic direction of the organization to assure that all
information requirements can be and are being met.
Someone must accept full responsibility for providing specific pieces of information and
ensuring the quality of that information.
If you find the wrong information is stored in the organization’s data warehouse, you
must be able to determine the source of the problem and whose responsibility it is.
Information Cleanliness
Information “cleanliness” (an aspect of information ownership). Have you ever received
the same piece of advertising mail multiple times from the same company on the same
day?
The reason may be your name may appear twice in a database, once with your middle
initial and once without it. Or your name may appear twice in a database with two
different spellings of your last name.
In all popular business-oriented DBMSs, such as Oracle, you can find utilities to help you
“clean” your information.
In the case of having your information twice in a database with two different spellings of
your last name, the utility would probably determine that the two records actually belong
to the same person (you) because of the identical nature of other associated information
such as your address and phone number.
Always remember GIGO—garbage in, garbage out (from Chapter 1). If bad information
—such as duplicate records for the same customer—goes into the decision-making
process, you can rest assured that the decision outcome will not be optimal.
In business, decision making has four phases (proposed by Herbert Simon).They are:
1. Intelligence (Find what to fix)
This is the diagnostic phase of decision making
This phase involves detecting and interpreting signs that indicate a situation which
needs your attention. These “signs” come in many forms, examples:
Consistent customer requests for new products features
The threat of new competition
Declining sales
Rising costs
An offer from another company to outsource part of your operations (e.g.
distribution or packaging).
Here you can use analytics tools to build models of many proposed solutions.
These models–like break-even analysis–allow you to create many solutions “on
paper”. In this way, you can review the outcomes of proposed solutions without
having to implement them.
The best solution may depend on factors, such as cost, ease of implementation,
staffing requirements, and times.
Analytics still plays a role here, by allowing you to perhaps as spreadsheet that
shows the outcomes of each solution and rank orders according to whatever
criteria you choose.
Here, analytics takes on the role of quality control, allowing you to gather
information regarding your solution to ensure that it is staying on target.
The 4 stages (Figure 4.1) are not necessarily linear. You might find it useful or necessary
to cycle back to an earlier phase:
When choosing a solution, in the Choice phase, you might become aware of
another possible solution. Then you would go back to the Design phase, include
the new solution and then return to the Choice phase and compare all the solutions
to choose one to implement.
The term comes from the combination of the two words Satisfied and Sufficient
or from the two words of Satisfying and Sacrificing.
Organizations, in the public and private sectors, are satisficing in setting goals, such “fair
price” or “reasonable profit”.
There is a fundamental difference between setting a goal of High growth and Maximum
growth:
Maximum growth is an optimizing strategy. High growth is a satisficing strategy.
Usually High growth is precisely defined. It may be, for example, 13 – 30 percent,
but the idea that when you reach that level you can say that your strategy is
working.
1. Structured decision
Processing a certain kind of information in a specified way so that you will always get the
right answer.
These are the kinds of decision you usually program, using a certain input and process
them in a precise way will always arrive at the correct result (e.g. calculating gross pay
for each working hour).
No Feel or Intuition is necessary.
You can easily automate these types of decisions with IT.
2. Unstructured decision
The decision for which there may be several “right” answers, without a sure way to get
the right answer.
No rules of criteria to guarantee a good solution.
Examples of decisions with unstructured elements can be: New marketing campaign,
introduce a new product line, or change the corporate image.
In reality, most decisions fall somewhere between structured and unstructured. For
example, choosing a job has:
Structural elements, such as the salary and bonuses.
Unstructured elements, such as the potential for advancement.
EASIEST
MOST
DIFFICULT
In reality, any technology-based system that helps you make decisions could be classified
as decision support system; even something as simple as inventory report that highlights
inventory with low stock can be called a decision support system. However, in the IT
field there is a long-standing definition of what constitutes a decision support system.
A Decision Support System (DSS) is a highly flexible and interactive system that is
designed to support decision making when the situation included nanostructured
elements. Thus, a DSS is definitely a part of the analytics professional’s tool set. The
primary objective of a DSS include providing you with:
1. A simple and easy-to-use graphical user interface (GUI)
2. Access to large amounts of information
3. Models and tools (statistical and analytical) that you can use to massage the
information.
So, DSS typically has three components, with each focusing on one of the three
objectives above. See Figure 4.4. As we discuss these components, think of Microsoft
Excel. Excel is perhaps the most powerful and easy-to-use analytics tools you can use.
It is the part of the DDS you see. Through it you enter the commands, information, and
models.
For Excel, the user interface management component includes things like buttons, menu
options, formulas and functions, your ability to enter information into cells, and your
ability to manipulate and change the properties of a graph or table.
In a digital dashboard, a type of DSS, you can easily click on a graph of sales by year and
see further detail that might include a graphical depiction of sales by month.
Whatever the case, the user interface of a DSS should be easy-to-use and intuitive.
In Excel, you can build, store, and retrieve workbooks, and each workbook can contain
many worksheets. Also, you can import data from a variety of other resources like a
database or perhaps external information in an XML format, common what is find now
on the Web.
Information is key in the world of analytics, as it is the basis from which you will
generate business intelligence. Information you use in your DSS comes from one or more
of three sources:
1. Organizational information: Comes from your company’s databases, data
warehouses, and a host of specialized systems such as CRM and SCM.
2. External information: Input that comes from external sources, such as government
or Internet.
3. Personal information: Decision maker’s own insights, experience into your DSS.
The tools, techniques, and models you choose to use will vary greatly depending of the
decision-making at hand.
You can even create your own models by writing macros in Visual Basic directly in
Excel.
Business uses GIS to analyze information, generate BI, and make decisions.
When business uses GIS to generate maps showing information of interest, we call it
business geography. Business geography has many dimensions or layers called themes.
With themes, you can show any combination of layers you need according to the decision
at hand.
In Figure 4.5, you can see a GIS through Google Earth showing Eiffel Tower in Paris. In
The bottom left corner, you can see various options (like Places), all of which represent
themes. By selecting or unselecting the various options, information will appear or
disappear on the screen.
GIS information is becoming increasingly interesting to the business world, especially for
those companies that have individual consumers like you and me. Recall social
locationing and location-based services in Chapter 2. Social locationing systems are in
fact GIS systems that use GPS technology to gather information regarding people’s
location.
When knowing where you are, companies can offer you discounts and special deals in
surrounding area.
Companies employ GIS and other sophisticated analytics to predict consumer movement,
indentify the best places for new stores, and a host of other GIS-related activities.
We are already familiar with the first five, as we covered them in Chapter 3. Also, you
have probably already completed a course in statistics which included things like
descriptive statistics, probability, hypothesis testing, ANOVA, regression, and chi-square
tests. In the rest of this section we will cover predictive analytics and text analytics, two
highly specialized analytics tools that the business world is quickly embracing.
In terms of decision making, each and all of the data-mining tolls and models in the list
above are designed to help you with intelligence-related tasks such as:
3. Classification – also known as prediction (although the two are not the same).
Here, you attempt to evaluate historical, known data to derive future inferences
that can be applied to newly gathered or perhaps future data.
4. Regression– the goal here is to find corollary and often causal relationships
between sets of data.
5. Summarization– this is the most basic, yet often the most powerful, form of data
mining. Sums, averages, standard deviations, histograms, frequency distributions,
and many other forms of descriptive statistics can be very revealing, often
eliminating the need to perform any further data mining.
So, predictive analytics is all about using historical information to predict future events
and outcomes.
Defining the right prediction goal is key. If you build a predictive analytics model for a
prediction goal that is in some way wrong, you can expect your subsequent activities to
be erroneous (i.e., a failure) as well.
The best way to understand prediction goals and prediction indicators is to give example
about them. Let us focus on the second prediction goal listed above (i.e. what customers
are mostly likely…). This is a CRM application which will use customer profile
information, customer history information, and campaign history information (see Figure
4.6).
In the end, the predictive analytics engine produces a predictive model as a formula for
each customer that provides a single predictive value by which customers can be ranked
from most to least likely to respond to a social-media campaign within 30 days by
purchasing at least two products in the advertised product line.
Then, the predictive analytics engine will assign weights to each prediction indicator that
represent the relative significance of each indicator a compared to the other indicators.
This is the “highly computational” aspect of predictive analytics and something certainly
beyond the scope of this book.
As you can see, the predictive analytics engine determined that the indicators of Presence
on Facebook and Number of Multiple Purchases were most important, with each
receiving a weight of 0.3 (Note that all of the weights sum = 1).
Once the formula is applied to all customers, each customer receives an overall predictive
indicator score, allowing you to rank order them. Then, it is up to you to determine where
to draw the line (i.e. the cutoff point in the list) and identify the subset of customers on
whom you will focus your social-media campaign.
Text analytics most definitely falls within the categories of analytics in general and more
specifically decision support systems because it works primarily with nonstructured
elements, that is, natural languages.
Let us consider an example: Gaylord Hotels is using text analytics to better understand
the thousands of customer satisfaction surveys it receives every day. The surveys are
digitized and fed into a text analytics engine. The engine can identify negative and
positive comments, which are then quickly correlated to structured information such as
the specific hotel, facilities, amenity services, the room, and employee shifts. With that
correlation, employees of Gaylord Hotels can follow up with customers by phone or letter
to acknowledge the problem and to offer and apology and even discounts for a return
stay.
Text analytics is even more complicated and technical than predictive analytics. While
predictive analytics relies mainly on statistical models to build predictive models, text
analytics makes use of statistical models and also linguistic models. Some of these
include:
o Lexical analysis–the study of word frequency distributions.
o Named entity recognition–the identification of names for people, places, and
things.
All of the above fall within the category of linguistic processing of what is often referred
to as natural language processing. Professionals in the field of natural language
processing have expertise in both linguistics and computer science.
AI lends itself into diverse areas, such as ticket pricing, food preparation, oil exploration,
child protection, meteorology, engineering, and aerospace industries.
AI are usually classified into one of the following four main categories:
1. Expert systems
2. Neural networks and fuzzy logic
3. Genetic algorithms
4. Agent-based technologies
Prescriptive problems ( )وصفare those that require an answer to the question: “What to
do?”, and correspond to the choice phase of decision making.
An expert system is usually built for a specific applications area called a domain ()نطاق.
Examples of domains and their expert systems:
In the example above, there is a recurring problem and to solve it you need a well-defined
set of steps. An expert system is well-suited for such kinds of problems.
You’ve probably gone through the question-and-answer set hundreds of times if you are a
driver without even realizing it.
Expert systems use rules, very similar to the association of rule or dependency modeling
concept we discussed earlier.
An expert system can be a stand-alone application like the one a doctor would use to aid
in the diagnosis of a problem, or it may be embedded into an analytics system.
NNs are widely used for visual pattern and speech recognition systems:
o Example: Smartphones and PDA that decipher your handwriting are probably a
NN that analyzed the characters you wrote.
o Chicago Police Department use NNs to detect corruption ( )فسادwithin its ranks.
o In business, NNs are used for securities trading, fraud detection, evaluating loan
applications, target marketing, and real estate appraisal ()تقييم.
o NNs are used to adjust temperature settings, control machinery, and detect
malfunctioning machinery.
NNs are most useful for identification, classification, and prediction when a vast amount
of information is available.
o Then you would construct rules and processes called algorithms to describe the
interdependence among variables.
o A fuzzy logic algorithm is a set of steps that relate variables representing inexact
information or personal perceptions.
Fuzzy logic is an important part of most text analytics systems. If you remember, text
analytics converts textual information into structured information. Here, fuzzy logic is
often employed to assign numerical values to comment data on a s survey form.
Fuzzy logic is also very good at disambiguation, the ability to specifically identify a
named entity recognition based on surrounding text.
A Genetic algorithm is an optimizing system that finds the combination of inputs that
give the best outputs. Here are a few examples of genetic algorithms in action:
1. Staples used a genetic algorithm to evaluated consumer responses to over 22,000
package designs to determine the optimal set of package design characteristics.
2. Boeing uses genetic algorithms in its design of aircraft parts such as the fan blades
on its 777 jet. Rolls Royce and Honda also use genetic algorithms in their design
processes.
3. Retailers such as Marks and Spencer, a British chain than has 320 stores, use
genetic algorithms technology to better manage inventory and to optimize display
areas.
Genetic algorithms are important part of the analytics professional’s tool set. And because
genetic algorithms are best suited for problems with millions and millions of possible
outcomes, they facilitate the evaluation of all those outcomes with great speed and
efficiency.
Agent-Based Technologies
o An agent-based technology, or a software agent, is small piece of software that acts on
your behalf (or on behalf of another piece of software) in performing tasks assigned to it.
o There are five main types of agent-based technologies (see Figure 4.8). They include:
1. Autonomous agent–software agent that can adapt and alter the manner in
which it attempts to achieve its assigned task.
2. Distributed agent–software agent that works on multiple distinct computer
systems.
3. Mobile agent–software agent that can relocate itself onto different computer
systems.
4. Intelligent agent–software agent that incorporates artificial intelligence
capabilities such as learning and reasoning.
5. Multi-agent-system–group of intelligent agents that have the ability to work
independently but must also work with each other in order to achieve their
assigned task.
o Our focus will be on the last two–intelligent agents and multi-agent systems, both of
which incorporate some form of artificial intelligence (AI).
We will focus on data-mining agents because of their use in the field of analytics. But, we
will define the other three as well to be familiar with them:
o Information agents– are intelligent agents that search for information of some kind
and bring you the information back. The best known information agents are buyer
agents (also known as shopping agents), agents on a Website that help you, the
customer, find products and services you need.
o Monitoring-and-surveillance-agents–intelligent agents that constantly observe and
report on some entity of interest, a network, or manufacturing equipment, etc. to warn
of possible trouble before it happens, including bottlenecks and failures.
o User agents (personal agent)– intelligent agents that take action on your behalf, such
as sorting your emails by priority, dumping unsolicited email into your spam folder,
and playing computer games as your opponent.
Data mining is the process of looking through the data warehouse to find information that
you can use to take some action, such as ways to increase sales.
o It called “data mining” because you need to sift through a lot of information for
unknown-before key knowledge piece of information or indicators.
One of the most common types of data mining is classification, which find patterns in
information and categorize items into those classes (exactly as the work of neural
networks). That is why neural networks are usually part of many data-mining systems.
Data-mining agents are another integral part, since these intelligent agents search for
information in a data warehouse.
A data-mining agent may detect a major shift in a trend or key indicator. It can also detect
the presence of new information and alert you. For example, Volkswagen uses an
intelligent agent system that acts as an early-warning system about market conditions.
By observing parts of an ecosystem ()النظييام البيييئي, like ant or bee colonies, artificial
intelligence (AI) scientists can use hardware and software models that incorporate insect
characteristics and behavior to:
1. Learn how people-based systems behave;
2. Predict how they will behave under a given set of circumstances; and
3. Improve human systems to make them more efficient and effective.
This concept of learning from ecosystems and adapting their characteristics to human and
organizational situations is called biomimicry.
In the last few years, AI research has made much progress in modeling complex
organizations as a whole with the help of multi-agent systems.
A multi-agent system, is a group of intelligent agents that have the ability to work
independently but must also work with each other in order to achieve their assigned task.
Again, think about ants. Each has a specific task and works throughout the day on that
task without any management oversight. But, no ant alone can build a colony of canals,
an ant hill structure, and so on. That takes all the ants working together.
The “social” term implies that all the members of a colony work together to establish and
maintain a global system that is efficient and stable. So, even though the ants are
autonomous, each ant contributes to the system as a whole.
Ants’ extraordinary evolutionary success (been on Earth for 40 million years) is the result
of ants’ collective behavior, known as swarm ( مجموعة، سرب، )حشدintelligence.
So, how are the workings of ant colonies related to IT in modern business?
Swarm intelligence gives us a way to examine collective systems where groups of
individuals have certain goals, solve problems, and make decisions without
centralized control or a common plan.
o In an ant colony, the forager ants have the sole responsibility of providing food to
the colony. They don’t form committees and discuss strategies or look to a central
authority for direction; they just find food and bring it back to the colony, and in
doing so they follow a simple procedure.
o Say two ants (A and B) leave the same point to search for food, the shortest path is
the one that will be selected. A trail of pheromones (a biological smell from the
ant) is left by the ant to indicate the path to the food so as other ants can use the
same short path to find food.
o So the ants’ approach is straightforward but effective, and can be expressed in the
following three simple rules:
1. Rule 1: Follow the trail if one exists, otherwise create one.
2. Rule 2: Find food.
3. Rule 3: Return to the nest, making a pheromone trail.
The problem that the ants just solved is one of the oldest problems in business world
and it is very similar to the one solved by the ants. It is known as “the shortest path
AI researchers built sets of small robots and incorporated software that allowed the
robots to follow rules and interact with each other in the same basic ways as the ants.
They also dispensed with the physical forms altogether, creating virtual ants in the
form of small autonomous blocks of code that we call intelligent agents. And each
code block could follow certain rules, interact, and adapt. These virtual ants were then
arranged into multi-agent systems that were further refined into agent-based models.
Chapter 5
Electronic Commerce: Strategies for the New Economy
Electronic commerce (e-commerce) is commerce, but it is commerce accelerated and
enhanced by IT, in particular the Internet.
o E-commerce breaks down barriers, such as time, geography, language, currency,
and culture.
o In a few short hours you can set your online shop which can be accessed by
millions, but you need to have a clear path-to-profitability.
Path-to-profitability (P2P) is a formal business plan that outlines key business issues,
such as customer targets (by demographic, industry, etc.), marketing strategies, operations
strategies (e.g. production, transportation, and logistics) and projected targets for income
statement and balance sheet items.
o Running an e-commerce operation is no different from a traditional brick-and-
mortar business.
o You must identify your customers; determine how to reach them with a
compelling story.
The major error that most dot-com businesses made in the late 1990s–and they no longer
in existence today–is that they never develop a clear path-to-profitability.
SUPPLY
Business originating from….
Business Consumer Government
Business B2B C2B G2B
Consumer B2C C2C G2C
Government B2G C2G G2G
There are nine major e-commerce business models. We will start by defining and briefly
describing some of lesser known and used e-commerce models and then move to the
more prominent e-commerce models:
A good example is Lockheed Martin, a company that generates almost 80% of its revenue
by providing products and services to the U.S. Department of Defense (DoD).
To sell products and services to the U.S. federal government, you must register yourself
as a formal business, so you are not really an individual anymore but rather individual
“doing business as” (DBA) some organization or business.
Some examples are: Small Business Administration www.sba.gov which provides small
business loan, surety guarantees, disaster assistance, ombudsman (شششكاوى الشششركات على
)الحكومة, etc.
B2B is actually where all the money is right now in the e-commerce world.
Businesses are taking full advantage of e-commerce by creating and using B2B e-
marketplaces.
B2B e-marketplaces are virtual marketplaces in which businesses buy from and sell
products to each other, share information, and perform other important activities, such as:
B2B e-marketplaces are one of the fastest growing trends in B2B e-commerce model.
B2C is the business model that fueled the early growth of e-commerce in the 1990s.
In B2C model, consumers interact directly with business via the Web.
o While businesses prefer to enter into long-term partnerships with other businesses
in B2B e-commerce, consumers are fickle (ش ال يقنع بسهوله، )مترددand purchase the
same types of products and services from many different sites.
The C2B e-commerce is a true inversion of the B2C e-commerce business model.
o In B2C: demand is driven by the consumer and supply is driven by the business.
o In C2B: business drives demand and consumer drives supply.
Affiliation programs are example of the C2B e-commerce business model. Through an
affiliation program relationship with Amazon, you can post links on your personal
website to Amazon for products and services Amazon sells. If a visitor to your site clicks
on one of those links and eventually buys the product or service from Amazon, Amazon
will pay you a commission fee.
o With this program, you are selling advertising space to Amazon on you website.
Currently, C2B represents only a fraction of the total revenues in the e-commerce space,
but it is expected to grow as businesses realize that individuals are more than consumers
of products and services. Blogging, for example, can easily become a C2B e-commerce
business model.
C2C e-commerce usually takes place through an intermediary organization, such as eBay.
eBay is a hybrid of both B2C e-commerce site and C2C e-commerce site.
Many C2C websites don’t really support any sort of e-commerce (i.e. money
exchanging). Rather, they facilitate the gathering of people with common interests and
something to share.
www.kazaa.com is an example of a C2C website as people share their MP3 files on it.
Blogs might also fall into the category of C2C as they support people sharing and
discussing common interests.
Many of the C2C websites are ad-supported meaning that they derive their revenue by
selling advertising space, much like the concept of an affiliate program.
The main thing to understand that you can’t be all things to all customers. A business
must answer two main questions:
o Who are your target customers?
o What is the value of your products and services a perceived by your customers?
Your products and services would define who your customers are. Examples:
o Gates Rubber Company which produces rubber and synthetic products primarily
for sale to the automotive industry and manufacturers of such products as boats
and bicycles, you would almost focus on the B2B e-commerce model with other
business as your target customers
o If you selling resume writing and job placement services to individuals looking for
your customers would be B2C.
What is the value of your products and services as perceived by your customers?
If a customer orders a product or service from your organization, it is because that
customer perceives some value in what you provide.
Examining wants and needs, the distinctions between end consumers and businesses as
customers become increasingly important and clearly evident.
Figure 5.3 provides a look at product/service categories needed by each customer group.
Consumers usually spend more time shopping around to find the best
price and value perceived in terms of customization, warranty, service,
and other after-sale features.
Commoditylike merchandise is the same to the customers regardless where they purchase
it.
o It is similar to convenient items.
o Books are a good example.
o Commoditylike business environments are easy to enter (they have low barriers to
entry) and thus the buyer power is high (from Porter’s Five Forces Model).
Digital merchandises are also important in the B2C e-commerce model. The goal here is
to eliminate the shipping costs by delivering the digital product over the internet once the
customer made the purchase.
o Music is a good example (e.g. Apple’s iTunes website).
o Digital merchandises are highly customizable as the customer can buy one
song instead of buying the whole CD.
Clothing stores allow you to select from among various styles, colors, and sizes.
MRO are similar to convenience and commoditylike items in the B2C e-commerce
model.
Office supplies, repair parts, lubricating oils are examples of MRO materials
Because of its volume of MRO buyers in their purchases can demand a discount (not true
in B2C).
Demand aggregation – combining purchase requests from multiple buyers into single
large order, which justifies a larger discount.
o A supplier of MRO materials competes mostly on price (including discounts),
delivery, and ease of ordering.
Quality, quantity, and delivery and timing of direct materials are important.
For direct material acquisition, some businesses can participate in reverse auctions
(through electronic marketplaces).
Reverse auction – is the process in which a buyer posts its interests in buying items
(including quantities, deliver timing, specifications) and sellers compete by submitting
successively lower bids.
The lowest bidder wins.
Reverse auction creates great power to the buyer because multiple sellers are competing
for the same business.
Horizontal e-marketplace – connects buyers and sellers across many industries and
primarily for MRO materials, such as office supplies, travel, shipping and some financial
services.
Vertical e-marketplace – connects buyers and sellers in a given industry (e.g. oil and gas,
automotive, textiles) primarily for direct materials.
To Summarize
B2C
o E-commerce works best for commoditylike and digital products and services.
B2B
o Distinction between products and services by MRO materials versus direct materials.
Business to Consumer
With about 1 billion persons on the internet, you would think it would be easy to find and
attract customers to your website but that is not necessarily true because all competitors
are trying to do the same.
First, you need to determine your appropriate marketing mix–the set of marketing tools
that company uses to pursue its marketing objectives in reaching and attracting potential
customers.
In B2C, your marketing mix would probably include some or all of: registering with
search engines, online ads, viral marketing, and affiliate programs.
Many people use search engines to find information and products and services. While
some search engines will include your company’s website for free (e.g. FreeSearch.com),
most of search engines require you to pay a fee.
a. Most of popular search engines (e.g. Bing, Yahoo! or Google) will
guarantee that your site appears in the top portion of a search engine list
for an additional fee.
1. Online ads (called also banner ads) are small advertisements that appear on other
sites.
a. There are variations of the online ads, including pop-up and pop-under
ads.
c. A pop-under ad is a form of a pop-up that you do not see until you close
or minimize your current browser window.
c. If a sale results, Amazon pays if a sale results, Amazon pays you a fee, a
percentage of the sale.
d. You can pay for a website to direct traffic to yours through online ads.
In general, you want your market mix to attract as many potential customers as possible:
o However, the business needs to focus more on the conversion rate. A conversion
rate is the percentage of potential customers who visit your website who actually
buy something.
o Once a formal business relationship has been established, the goal is to use IT to
streamline the ordering and procurement processes to create tight supply chain
management systems and drive out costs.
Financial cybermediary
1. Financial cybermediary is an internet-based company that makes it easy for one person
to pay another person or company over the internet.
2. Electronic check a mechanism for sending money from your checking or savings account
to another person’s or organization’s account:
o Many implementations for electronic checks but the most prominent being online
banking.
3. Electronic Bill Presentment and Payment (EBPP)– a system that sends bills over the
internet and provides an easy-to-use mechanism (such as a click) to pay for them if the
amount looks correct
o Available through local banks (BPay)
o Checkfree (www.checkfree.com)
o Quicken (www.quicken.com)
4. Smart cards–Plastic cards the size of the credit cards with embedded chip on which
digital information can be stored and updated.
o The chip can have information on how much money you have.
o Some debit cards are implementations of the smart card concept.
Payment process encompasses more than accepting a form of payment; it also includes
determining the shipping address of your customer.
A business can create a competitive advantage if you have a way of asking each customer
only once for his or her delivery information and storing it, thus creating a switching cost
o The information includes payment information (for example credit card number
and expiration date) and delivery information.
o A server-side digital wallet (called sometimes a thin wallet) is the one that an
organization creates for and about the customer and maintains on its server.
Many credit card issuers use this type of digital wallet to verify your credit
card transactions.
E-payment systems are significant because your customers in the B2C e-commerce model
exhibit some common characteristics when paying for your products and services:
1. Customers tend to make numerous purchases for small amounts.
Using a VAN, businesses can easily, for example, order products and services and send
invoices electronically.
Financial electronic data interchange (Financial EDI) is the electronic process used
primarily within the B2B e-commerce model of the payment of purchases.
o The actual reconciliation make occur through a bank or an automated clearing
house (ACH) support site, such as National Cash Management System (ACH is an
electronic fund transfer system used to process large volume of credit and debit
transactions in batches).
You need to consider issues such as encryption, Secure Socket Layers (SSL), and Secure
Electronic Transactions.
Encryption
Encryption scrambles the content of a file so that you can’t read it without having the
right decryption key.
Some encryption technologies use multiple keys. For example, you would be using
public key encryption (PKE)–an encryption system that uses two keys:
o A public key that every can have and a private key for only the recipient (see
Figure 5.8).
The customer uses the originating business’s public key to encrypt information and send
it along the internet.
When information arrives to the destination, the originating business would use its private
key to unscramble the encrypted information.
SSLs provide good security for transferring information and are used widely by B2C e-
commerce websites.
You call tell if information is being transferred via SSL if you see either
1. The website’s address starts with https:// (notice the “S” for Secure)
2. The presence of a lock icon in the bottom of the web browser or next to https.
Like SSL, SET encrypts information before sending it over the Internet, but with one step
further. SET enables you as a merchant to verify a customer’s identity by securely
transmitting credit card information to the business that issued the credit card for
verification.
Long-tail economics
Crowdsourcing
Virtual goods
Mobile commerce
1- Long-Tail Economics
Long tail is a way of explaining e-commerce profitability–actually refers to the tail of a
sales curve.
Figure 5.10 shows most song titles, ranked by popularity, for Wall-Mart and Rhapsody.
Because of the cost of shelf placement in retailing environment, you can see only about
25,000 songs in Wall-Mart.
Rhapsody, and because everything is digital and shelf costs are irrelevant, carries 1.5
million tracks.
o A 40% of Rhapsody’s total sales come from song in the Long Tail of the sales
distributions.
E-commerce business than can reach the audience in the Long Tail is a real mass-
customization business. It also called slivercasting (opposed to broadcasting) and
massclusivity (combination of mass and exclusivity).
Traditional business thinking looks at sales in terms of economies of scale, seeking to sell
as many of one item as possible to offset fixed costs (including the shelf placement costs).
In the Long Tail, and because the fixed costs are so minimal, Rhapsody and iTunes can
afford to sell only one or two downloads of a given song and still make a profit. Wall-
Mart can’t do that, so it doesn’t carry niche (particular or focused) products. Rhapsody
and iTunes can.
2- Crowdsourcing
Crowdsourcing is when businesses provide enabling technologies that allow people (i.e.
crowds)–instead of designated paid employees (i.e. developers or programmers) –to
create, modify, and oversee the development of a product or a service.
Businesses now provide customers with enabling technologies and allow them to create
value. Because value exists, other customers become a part of the community as well.
Crowdsourcing isn’t limited to only the Internet. Think of the show Arab Idol. It uses a
variant of crowdsourcing called contribution-defined. Millions of viewers cast their votes
for the best singer. Think carefully here, if millions of people vote for the top singer,
don’t you think that a record album by that singer will sell really well?!
There are many examples of virtual goods such as your music in your iTunes account,
digital seeds in emails that bloom into flowers when you click on them, toys, clothes,
accessories, and so forth that you buy for use in online communities and games like
Farmville, World of Warcraft, and the like. Think about apps of your smartphone.
Technically each app is a virtual good.
Virtual goods is definitely an emerging e-business trend that you cannot ignore.
A large portion of virtual goods purchases occur in online games like World of Warcraft
and those offered by Zynga.
4- M-Commerce
Mobile computing is a broad general term describing the ability to use technology to
wirelessly connect to and user centrally located information and/or application software.
The future is for wireless applications and commercial websites are recasting of their
websites capabilities to fit on the small screen of the handheld devices.
Mobile commerce revenues rose by some 600 percent in just two years, from $396
million in 2008 to $2.4 billion in 2010. By 2015, it is predicted that worldwide mobile
commerce will exceed $119 billion.
The ongoing need for safe, secure, and reliable systems solutions is a result of companies’
increasing dependence on information technology (IT) to provide services and develop
products, administer daily activities, and perform short- and long-term management
functions.
Systems developers must ensure that all the business’s needs and requirements are met
when developing ISs, establish uniform privacy and security practices for system users,
and develop acceptable implementation strategies for the new systems.
o It includes seven key phases and numerous activities within each. See Figure 6.2.
Because there are many activities and these activities may vary depending on the system
developed, we shall focus on the most important SDLC activities under each phase that
you might perform on a system development project as an end-user.
o Organizations typically track all the proposed systems and prioritize them based
on business impact or critical success factors.
o Project scoping is important for many reasons; most important it helps you to
avoid:
Scope creep occurs when the scope of the project increases beyond its
original intentions.
Feature creep occurs when developers (and end-users) add extra features
that were not part of the initial requirements.
o The Project plan defines what, when, and who questions of systems development,
including all activities to be performed, the individuals, resources, who will
perform the activities, and the time required to complete each activity.
o The project plan is the guiding force behind ensuring the on-time delivery of a
complete and successful information system (See Figure 6.3).
o Project milestones represent key dates by which a certain group of activities must
be performed.
o The two creeps can throw off (delay or fail) a project plan.
The analysis phase involves end-users and IT specialists working together to gather,
understand, and document the business requirements for the proposed system.
2. Prioritize the requirements: Once you define all the business requirements you
prioritize them in order of business importance and place them in a formal
comprehensive document, the requirements definition document.
The users receive the document for their sign-off. Sign-off is the users’
actual signatures indicating they approve the entire business requirements
(Sign-off is one of the major milestones in the project).
A key thing when reviewing business requirements is the cost to the company of
fixing errors if business requirements are unclear or inaccurate:
An error found in the analysis phase is relatively inexpensive to fix; all
you have to do is change the description in a Word document.
An error found during later phases, is expensive to fix because you have to
change things in the actual system.
Figure 6.4 displays how the cost to fix an error grows exponentially the
later the error is found in the SDLC.
It is at the point of the design phase in the SDLC that the end-user begins to divert his or
her attention to only “quality control”. That is IT specialists perform most of the functions
in the design phase through to maintenance phase. End-user’s responsibility is to review
their work, verifying that the models of screens, reports, software, and databases
encapsulate all of the business requirements.
Phase 4: Development
In this phase, you transform all the detailed design documents, from the design phase,
into an actual system:
o You go from the physical design to the physical implementation.
IT specialists are responsible for completing most of the activities in this phase.
1. Build the technical architecture: Here you build the platform on which the
system is going to operate. In the development phase you purchase and
implement equipment necessary to support the technical architecture you
designed in the design phase.
2. Build the database and programs: Once the technical architecture is ready,
you start to create databases and software required for the system. These tasks
are taken by IT specialists and may take long time (months or even years) to
design and create the databases and write all the software.
Testing is critical. The following are the primary activities that are performed in the
Testing phase:
Each time the actual result is different from the expected one, a “bug”
is generated, and the system goes back to development for a “bug fix”.
2. Perform the testing of the system: You must perform many different types of
tests when begin testing the new system. These may include:
1. Unit testing: Testing individual units or pieces of code for a system.
2. System testing: Verifying that units or pieces of code for a system
function correctly when integrated into the total system.
3. Integration testing: verifies that separate systems can work together.
4. User acceptance testing (UAT): determines if the system satisfies the
business requirements and enables users to perform their jobs
correctly.
Phase 6: Implementation
In this phase you distribute the system to all end-users and they begin using the system.
There are two primary activities in this phase:
1. Write detailed user documentation: When installing the system you must
provide employees with user documentation that highlights how to use the
system. Users find it extremely frustrating to have a new system without
documentation.
2. Provide training for the system users: Training must be provided to users who
are going to use the system. The two most popular types of trainings are:
Online training: runs over the internet or off a CD or DVD.
Employees perform the training at any time they like.
Workshop training: Held in a classroom environment and is led by an
instructor. This type is most suitable for difficult systems for which
employees need one-on-one time with individual instructor.
When implementing a new system there are four implementation methods you can choose
from:
3. Pilot implementation: Has only a small group of people using the new system
until the organization knows it works correctly and then the rest of the staff are
added to the system.
4. Phased implementation: Installs the new system in phases until you are sure
each phase is working correctly and then the remaining phases of the system
are implemented.
Phase 7: Maintenance
During this phase you monitor and support the new system to ensure it continues to meet
the business goals.
Monitoring and supporting the system involves making minor changes (e.g. new reports
or information retrieval). There are two primary activities during this phase:
1. Build a help desk to support the system users: A help desk is a group of people
who respond to users’ questions, usually through a call via telephone number.
SDLC does not allow the development team to search the software library and find
existing code that can be reused for the new system under consideration.
This issue has raised the notion ( فككككرة، )مفهكككومof component-based development.
Component-based development (CBD) is a general approach to systems development
that focuses on building small self-contained blocks of code (components) that can be
reused across a variety of applications within an organization.
o The goal here is to write, for example, the customer view screen and updating
software only once, place it in a library of software components, and then allow
software development teams to plug in that component into whatever system
needs to be developed.
CBD dramatically changed the systems development lifecycle. It requires teams to:
1. Look through the software library for reusable code that already exists and
2. Build new software in the form of components that can be reused later in other
software development projects
The CBD approach paved ( )مهكككدتthe way for several systems development
methodologies, such as rapid application development, extreme programming, and agile.
2. Review the software library to determine if components already exist that can be
used as part of the new system.
3. Create prototypes (i.e. working models of software components) that look and act
like aspects of the desired system. Design, develop, and test the prototypes until
they become fully functional software components.
4. Integrate the software components from the previous two steps and test them as a
complete system.
5. Implement the new system, following many of the guidelines found in the
traditional SDLC.
You want to actively involve end users in the analysis phase and in the interactive
approach of the design, development, and testing of the new software components:
o This end user involvement and the use of prototyping tend to greatly accelerate
the collection of business requirements and the development of the software
components.
o Moreover, if you can find reusable software components in the software library,
this would accelerate the development process.
In XP, there are many small pieces that don’t make sense, but when they are combined
together an organization can gain visibility into the entire system.
The primary difference between the traditional SDLC and XP methodologies is that XP
divides its phases into iterations (repetitions). For example, the SDLC approach develops
the entire system, whereas XP develops the system in iterations (see Figure 6.6).
Many organizations in different industries have developed successful software using the
XP methodology (e.g. Mercedes Benz, Microsoft with the Internet Explorer, and
Netscape with the Communicator).
Agile is similar to XP, but with less focus on team coding and more on limiting project
scope.
An agile project sets a minimum number of requirements and turns them into a
deliverable product.
Agile means what it sounds like: Fast and efficient; small and nimble (light and quick);
lower cost; fewer features; shorter projects.
The Agile Alliance, a group of software developers, has made its mission to improve
software development processes. Its manifesto includes the following tenets:
1. Satisfy the customer early and continuous delivery of valuable software.
These services within the SOA architecture perspective are exactly the same as
components in any of the component-based development methodologies.
If adopted, your organization would, in essence, be saying that all software will be
developed and managed as a series of reusable services (blocks of code that provide
serves).
From within your SoA architecture perspective, you would then choose from the among
the different component-based development methodologies that support the concept of
reusable services (components), such as the RAD, XP, or agile.
Rapidly gaining acceptance is the idea that selfsourcing can be potent (strong)
source of stress relief rather than a cause of stress:
o Rather than combating ( )ننننزاعthe trend toward end-user application
development, IT staff should leverage it to offload solution building to end
users.
o IT then frees its own scarce (very few) resources for complex, visible,
infrastructure management tasks.
Selfsourcing process is similar to the phases in the SDLC (see Figure 6.7),
however, selfsourcing encompasses prototyping (i.e. model building: steps 3 - 6).
This is a key in selfsourcing—when developing a system for yourself, you will
most often go through the process of prototyping, continually building on and
refining your model or prototype until your system is complete.
Page 1 of 5
Figure 6.7: The Prototyping process
Page 2 of 5
Advantages of selfsourcing
Improves requirement determination––In selfsourcing users usually know exactly
what they want out of a system and, therefore, can capture the needed business
requirements in their new system.
Reduces the invisible backlog–No organization has all the sources to develop
every system that end users need. If end users can take on the development of
some of the smaller projects, the end result is the reduction of the backlog of the
systems that an organization needs to develop. The invisible backlog is the list of
all systems an organization needs to develop, but because of the prioritizing of
systems development needs, never get funded because of the lack of
organizational resources.
Page 3 of 5
Lack of documentation and external support leads to short-lived systems–When
users develop a system, they often forgo documentation of how the system works
and fail to realize that they can expect little or no support from IT.
1. Infrastructure-related.
Any other application (not from the above three categories) may be a good candidate
for selfsourcing.
3. Offer low cost of ownership: Cost factors not only include the tool’s
purchase price, but also training time, speed of application development,
and required skill level.
Page 4 of 5
4. Support a wide range of data types: Data is dynamic. Therefore, the
toolset should support all the features normally found in DBMS products.
Page 5 of 5
Outsourcing [Page 178] Week 11, Lecture 28
Outsourcing is the delegation of specific work to a third party for a specific length of
time, at a specified cost, and at a specified level of service.
With competitive pressure to cut costs and reduce time-to-market, many organizations are
looking to outsource their IT systems development, ongoing operations, maintenance, and
support. In a recent survey by the Outsourcing Research Council:
o 50% surveyed said they were already outsourcing some or all of their payroll
processing, and another 38% said they were considering it.
The main reasons for the rapid growth of the outsourcing industry included:
2. The Internet: Barriers to entry into the outsourcing market (e.g. because of lack
of capital) reduced in the world of e-business.
IT outsourcing for software development can take one of four forms (see Figure 6.10)
3. Purchasing existing software and paying the publisher for the right to make
modifications yourself.
4. Outsourcing the development of an entirely new and unique system for which no
software exists.
These are large software packages that most cost millions of dollars. An example for such
software is financial software packages (e.g. Oracle Financial).
o If Oracle Financial meets your organizational needs of tracking all the financial
information, then you can act on Option 1.
o If your needs are unique then you need to act based on option 4.
o It’s different in that you turn over much of the design, development, testing,
implementation, and maintenance steps to another organization.
It’s during one of these first two phases that the organization may come to
understand that it needs a particular system but cannot develop it in-house.
o Remember always that identification of the business requirements drives the entire
business development effort.
o If the business requirements are not accurate or complete, there is no way the
system will be successful.
If you choose to outsource, part of the gathering the business requirements becomes step
5, your request for proposal (RFP).
RFP is one of the two most important documents in the outsourcing process. The second
is the service level agreement (SLA).
It’s important that you take all the time needed to create a complete and thorough RFP.
Eventually, the RFP will become the foundation for a legal and binding contract into
which your organization and the vendor will enter.
This legal and binding contract is often called a service level agreement.
You’ll need to develop detailed test plans and test conditions that test the entire system.
1. This alone may involve months of running and testing the new system while
continuing to operate the old one (parallel method of implementation),
When you accept a solution, you’re saying that the system performs to your expectations
and that the vendor has met its contractual obligations thus far according to the SLA.
1. Accepting a solution involves granting your sign-off on the system, which will
release the vendor from any further development efforts or modifications to the
system.
In outsourcing you have to reassess your working relationship with the vendor:
1. Is the vendor providing maintenance when you need it and according to the SLA?
In the context of systems development, an SLA defined the work to be done, the time
frame, the metrics that will be used to measure the success of the systems development
effort, and the costs.
If the vendor agrees to provide post-development maintenance and support, then the SLA
would outline in detail the terms of the maintenance and support activities, their costs,
and key metrics by which you can measure the success of these activities.
The metrics you include in an SLA are described in more detail in Chapter 7.
Today, when we talk about outsourcing, then it is usually offshore outsourcing that is
being references.
Offshore Outsourcing
Offshore outsourcing is very successful business model that provide cost-effective,
sophisticated, and highly efficient quality services.
According to International Data Corporation (IDC), U.S. based companies tripled their
offshore outsourcing spending from $5.5 billion in 2000 to more than $17.6 billion in
2005.
Offshoring outsourcing has overcome all barriers of political turmoil, language problems,
and cultural differences.
Since the mid-1990s, major U.S. companies have been sending significant portion of their
software development work offshore-primarily to India, but also to vendors in China,
Eastern Europe, Ireland, Israel, and the Philippines.
The big selling point for offshore outsourcing to these countries is “Good work done
cheap”.
o A programmer who earns $63,000 per year in the U.S. is paid as little as
$5,000 per year overseas.
4. Help desk and call centers can be offshored with the right communication
infrastructure available.
Acquire leading-edge technology: you can acquire leading-edge technology without the
need to acquire technical expertise and bear the inherent risks of choosing the wrong
technology.
Reduce costs.
Disadvantages
Reduces degree of control: No matter what you choose to outsource, you are in a way
giving up control over that function.
Prototyping - the process of building a model that demonstrates the features of a proposed
product, service, or system.
Prototyping is an iterative process in which you build a model from basic business
requirements, have users see, work with, review the prototype, and suggest changes, and
further refine and enhance the prototype to include suggestions. This all to increase the
likelihood of success of proposed system.
You can use the prototyping to perform a variety of functions in the systems development
process:
1. Gathering requirements: You can start by prototyping basic system requirements.
Then allow end users to add more requirements (information and processes) as
you revise the prototype.
2. Helping determining requirements: In many instances end users aren’t sure what
they really want. They simply know that the current system doesn’t meet their
needs. In this sense, you can use prototyping to help end users determine their
exact requirements.
3. Proving that a system is technically feasible: If you uncertain that some system
can be done or a technology can be implemented prototype it first. A prototype
use to prove the technical feasibility of a proposed system is a proof-of-concept
prototype.
4. Selling the idea of proposed system: Many people resist change in IT. The current
system seems to work fine and they can see no reason to go through the process of
developing and learning to use a new system. In this case you have to convince
them that the proposed system will be better. Because prototyping is relatively
fast, you won’t have to invest a lot of time to develop a prototype that convinces
people of the worth of the proposed system. This type of prototype is a selling
prototype.
1. Identify basic requirements: You gather basic requirements that include input and output
information desired, and some simple processes.
2. Develop initial prototype: Your initial prototype will include only user interfaces, such as
data entry screens and reports.
3. End user reviewing: This is the true start of the iterative process of prototyping. Users
evaluate the system and suggest changes or additions. In subsequent return to this step
(after step 4) they evaluate new versions of the prototype. It is important to involve as
many users as possible to resolve any discrepancies in such areas as terminology and
operational processes.
4. Revise and enhance the prototype: The final step in the prototyping in which you make
changes to the current prototype and add any new requirements. Next you return to step 3
and have the end users review the new prototype; then step 4 again, and so on.
For insourcing and selfsourcing you continue the iterative processes of steps 3 and 4 until end
users are happy with the prototype. What happens to the prototype after that, however,
differs.
In insourcing and using the traditional SDLC, IT specialists develop prototypes using
special development tools. Many of these tools don’t support the creation of a final
system but you use them to build prototypes. The finished prototype becomes a blueprint
or technical design for the final system.
Helps resolve discrepancies among end users–During prototyping many users participate
in defining requirements for and reviewing the prototype.
Gives end users a feel for the final system–Prototyping, especially for user interfaces,
provides a feel for how the final system will look and work. When they see that they are
more likely to see its potential for success.
Helps sell the idea of a proposed system–Selling prototypes can help break down
resistance for change. Many people are afraid the new system won’t meet their
expectations and work properly. If you provide them with a working prototype, they will
be more inclined to buy into it.
Leads the project team to forgo proper testing and documentation–Many people believe
that they can forgo testing and documentation when using prototyping. After all, they’ve
tested the prototype with users, so why documentation? Don’t make this mistake!
In the past years, with respect to IT systems and information, the business continuity plan
went by other names, disaster recovery plan, and contingency plan. Given the number of
natural disasters and terrorist attacks worldwide, along with businesses’ increasing
dependency on all their processes and resources (not just IT and information), however,
the general trend has been to develop a more all-encompassing business continuity plan
that includes all aspects of the organization.
The BCP methodology looks very similar to the systems development life cycle (see
Figure 7.12).
It starts with the organizations’ strategic plan and moves through various phases including
analysis, design, implementation, testing, and maintenance.
We will focus the following discussion of BCP on information technology and IT-related
issues only.
Page 1 of 4
Phase 1: Organizational Strategic Plan [Page 213]
BCP starts with your organization’s strategic plan, which informs you of the relative
importance of resources, processes, systems, and other organizational assets.
It is very important to understand and develop a ranking of the importance of these assets
because you cannot (and should not) develop a business continuity plan that enables you
to recover every asset within minutes of some sort of disaster. That would extremely
expensive and unnecessary.
Your organization can afford to live without some assets (i.e. systems and information)
for several days or even weeks. Payroll software may be an example here. For other
assets, such as customer ordering and supply chain applications, it may be critical that
your organization gets those up and running with minimal interruption. Data centers are
also typically identified as high priorities for most organizations.
Phase 2: Analysis
In the BCP analysis phase, you perform impact analysis, threat analysis, and impact
scenario analysis, and then build a requirement recovery document.
(1) Impact analysis–Here you seek to differentiate between critical, core IT applications
and information and those that are noncritical. Key factors supporting your analysis
include:
o The financial impact to the organization for the loss of IT applications and
information over time.
o Implications for stakeholders (e.g. customer loss of power if you provide utilities).
o Cost estimates of recovery.
Impact analysis is often called risk assessment, the process of evaluating IT assets, their
importance to the organization, and their susceptibility to threats.
(2) Threat analysis–In step 2 of BCP analysis, you document the possible threats to your
organization and its assets. These can include disease, earthquake, fire, flood, cyber
attack, terrorism, and utility outages.
Page 2 of 4
(3) Impact scenario analysis–In step 3, you consider each threat (from step 2) and build a
worst-case scenario for each. This provides further definition and detail concerning the
scope and magnitude of each possible disaster.
This document becomes the basis for the design phase which follows.
Phase 3: Design
Using the requirement recovery document, you design a formal, technical, and detailed
plan for recovering from a disaster–a disaster recovery plan.
A good disaster recovery plan takes into consideration the location of the backup
information. Many organizations choose to store backup information in an off-site storage
facility, or a place that is located separate from the company and often owned by another
company, such as a collocation facility. A collocation facility is available to a company
that rents space and telecommunications equipment from another company.
A good disaster recovery plan also considers the actual facility where employees will
work:
o A hot site is a separate and fully equipped facility where the company can move
immediately after a disaster and resume business.
o A cold site is a separate facility that does not have any computer equipment but is
a place where employees can move after a disaster.
A disaster recovery plan should be based on a disaster recovery cost curve (Figure 7.13).
A disaster recovery cost curve charts the following:
1. The cost to your organization of the unavailability of information and technology;
and
2. The cost to your organization of recovering from a disaster over time.
Where the two curves intersect is the best recovery plan in terms of cost and time.
Page 3 of 4
Phase 4: Implementation
At this point, business continuity planning diverges somewhat from the SDLC. In the
SDLC, you would develop and test the solution before implementing it. In business
continuity planning, you must begin to implement your disaster recovery plan before
testing it. That is, you need to engage any businesses that will be providing collocation
facilities, hot sites, and/or cold sites, and implement the necessary procedures for
recovering from a disaster.
You train your employees concerning what to do in case of any of the disasters. You also
evaluate each IT system and ensure that it is configured optimally for recovering from a
disaster. You can now test the disaster recovery plan.
Phase 5: Testing
This involves simulated scenarios of disasters and having employees execute on the
disaster recovery plan to ensure that the solution satisfies your organization’s recovery
requirements. If notable deficiencies are identified, your organization should return to
steps 3 and 4 (Design and Implementation) and reconfigure and reimplement the disaster
recovery plan accordingly.
The sort of testing does not stop once you believe you have developed an optimal plan.
The environment in which your organization operates changes almost daily. You should
test your disaster recovery plan on at least an annual basis, and more realistically several
times a year.
Phase 6: Maintenance
Finally, you need to continually assess new threats and reevaluate your IT systems and
related assets to determine their changing importance to the organization. As with the
SDLC, no “system” is ever complete; it needs constant monitoring, support, and
maintenance.
Page 4 of 4