Professional Documents
Culture Documents
SmartBook®
Proven to help students improve grades and
study more efficiently, SmartBook contains the
same content within the print book, but actively
tailors that content to the needs of the individual.
SmartBook’s adaptive technology provides precise,
personalized instruction on what the student
should do next, guiding the student to master
and remember key concepts, targeting gaps in
knowledge and offering customized feedback,
and driving the student toward comprehension
and retention of the subject matter. Available on
tablets, SmartBook puts learning at the student’s
fingertips—anywhere, anytime.
www.mheducation.com
information
systems Paige Baltzan
4e
www.mhhe.com
brief
contents
module one
BUSINESS DRIVEN MIS 3
chapter 1 Management Information Systems: Business
Driven MIS 5
chapter 2 Decisions + Processes: Value Driven
Business 33
chapter 3 Ebusiness: Electronic Business Value 63
chapter 4 Ethics + Information Security: MIS Business
Concerns 91
module two
TECHNICAL FOUNDATIONS OF MIS 113
chapter 5 Infrastructures: Sustainable Technologies 115
chapter 6 Data: Business Intelligence 147
chapter 7 Networks: Mobile Business 183
module three
ENTERPRISE MIS 209
chapter 8 Enterprise Applications: Business
Communications 211
chapter 9 Systems Development and Project
Management: Corporate Responsibility 249
GLOSSARY 277
NOTES 292
INDEX 298
v
contents
module one BUSINESS DRIVEN
THE THREE GENERIC STRATEGIES—CHOOSING A BUSINESS
FOCUS 26
MIS 3 SHOW ME THE MONEY Death of a Product 27
LIVING THE DREAM One Laptop per Child 28
VALUE CHAIN ANALYSIS—EXECUTING BUSINESS
CHAPTER 1 MANAGEMENT INFORMATION STRATEGIES 28
SYSTEMS: BUSINESS DRIVEN BUSTED Listen to Spider-Man; He Knows What He’s
MIS 5 Talking About! 29
SECTION 1 .1 >> Business Driven MIS 6
COMPETING IN THE INFORMATION AGE 6
CHAPTER 2 DECISIONS + PROCESSES:
LIVING THE DREAM Sensors and Bears—A Perfect VALUE DRIVEN BUSINESS 33
Match 7 SECTION 2.1 >> Decision Support Systems 34
Data 7
MAKING BUSINESS DECISIONS 34
FYI People in China and India Are Starving for Your The Decision-Making Process 35
Jobs 9 Decision-Making Essentials 35
Information 9
MEASURING BUSINESS DECISIONS 37
Business Intelligence 10
Efficiency and Effectiveness Metrics 39
Knowledge 11
The Interrelationship Between Efficiency and Effectiveness
THE CHALLENGE: DEPARTMENTAL COMPANIES 12 MIS Metrics 39
SYSTEMS THINKING AND MANAGEMENT INFORMATION SHOW ME THE MONEY Is It Effective or Is It
SYSTEMS 13 Efficient? 39
BUSTED The Interent of Things Is Wide Open—For DUE DILIGENCE Get the Cow Out of the Ditch 40
Everyone! 14 USING MIS TO MAKE BUSINESS DECISIONS 40
Systems Thinking 15 Operational Support Systems 41
SHOW ME THE MONEY Who Really Won the 2014 Managerial Support Systems 41
Winter Olympics? 15 Strategic Support Systems 42
MIS Department Roles and Responsibilities 16
USING AI TO MAKE BUSINESS DECISIONS 43
SHOW ME THE MONEY Is Technology Making Us
Dumber or Smarter? 17 BUSTED The Criminal in the Cube Next Door 45
Expert Systems 45
SECTION 1 .2 >> Business Strategy 19 Neural Networks 46
DUE DILIGENCE Safekeeping Data 19 FYI Got Junk? Get a Hunk! 47
IDENTIFYING COMPETITIVE ADVANTAGES 19 LIVING THE DREAM Track Your Life 48
MY NOT TO-DO LIST What Happens on YouTube Genetic Algorithms 48
Stays on YouTube—FOREVER 21 Intelligent Agents 49
THE FIVE FORCES MODEL—EVALUATING INDUSTRY
SHOW ME THE MONEY If It Ain’t Broke,
ATTRACTIVENESS 22
Don’t Fix It 49
Virtual Reality 49
Buyer Power 22
SHOW ME THE MONEY SWOT Your Student 23 SECTION 2.2 >> Business Processes 50
Supplier Power 24 FYI Long-Distance Hugs 50
Threat of Substitute Products or Services 24
MANAGING BUSINESS PROCESSES 50
Threat of New Entrants 25
Rivalry among Existing Competitors 25 BUSINESS PROCESS MODELING 52
Analyzing the Airline Industry 25 USING MIS TO IMPROVE BUSINESS PROCESSES 53
FYI Cool College Start-Ups 26 Operational Business Processes—Automation 54
Managerial Business Processes—Streamlining 55 Social Tagging 82
Strategic Business Processes—Reengineering 57 MY NOT TO-DO LIST Viral Foxes and Devil
MY NOT TO-DO LIST You Accidently Sent Your Babies 83
Confidential Email to Your Significant Other to Your DUE DILIGENCE Anti-Social Networking 83
Grandmother—Ouch! 59 BUSINESS 2.0 TOOLS FOR COLLABORATING 84
SHOW ME THE MONEY Streamlining Your Email 59 Blogs 84
Wikis 84
FYI Don’t You Just Love Mötley Crüe? 85
CHAPTER 3 EBUSINESS: ELECTRONIC Mashups 85
BUSINESS VALUE 63 LIVING THE DREAM Kiva Collaboration` 86
SECTI ON 3.1 >> Web 1.0: Ebusiness 64 THE CHALLENGES OF BUSINESS 2.0 86
DISRUPTIVE TECHNOLOGIES 64 Technology Dependence 86
Disruptive versus Sustaining Technology 64 Information Vandalism 86
The Internet and World Wide Web—The Ultimate Business FYI Using Hashtags 87
Disruptors 65 Violations of Copyright and Plagiarism 87
DUE DILIGENCE Unethical Disruption 65 WEB 3.0: DEFINING THE NEXT GENERATION OF ONLINE
WEB 1.0: THE CATALYST FOR EBUSINESS 65 BUSINESS OPPORTUNITIES 87
Web 1.0: The Catalyst for Ebusiness 65 BUSTED Connectivity Break-Down 87
Expanding Global Reach 67 Egovernment: The Government Moves Online 88
Opening New Markets 68 Mbusiness: Supporting Anywhere Business 89
Reducing Costs 68
Improving Effectiveness 69
SHOW ME THE MONEY Nasty-Gal: 8 Years Old and CHAPTER 4 ETHICS + INFORMATION
Worth $100 Million 70 SECURITY: MIS BUSINESS
THE FOUR EBUSINESS MODELS 70 CONCERNS 91
Business-to-Business (B2B) 71 SECTION 4.1 >> Ethics 92
Business-to-Consumer (B2C) 71
Consumer-to-Business (C2B) 72 INFORMATION ETHICS 92
Consumer-to-Consumer (C2C) 72 Information Does Not Have Ethics; People Do 93
Ebusiness Forms and Revenue-Generating Strategies 72 BUSTED Information—Does It Have Ethics? 94
LIVING THE DREAM Crazy over Access 73 MY NOT TO-DO LIST Do You Really Want
EBUSINESS TOOLS FOR CONNECTING AND to Risk It? 95
COMMUNICATING 74 DEVELOPING INFORMATION MANAGEMENT POLICIES 95
Email 74 Ethical Computer Use Policy 95
Instant Messaging 75 Information Privacy Policy 96
Podcasting 75 DUE DILIGENCE The Right to Be Forgotten 97
Videoconferencing 75 Acceptable Use Policy 97
Web Conferencing 76 SHOW ME THE MONEY 15 Million Identity Theft
Content Management Systems 76 Victims 97
THE CHALLENGES OF EBUSINESS 76 Email Privacy Policy 98
Identifying Limited Market Segments 76 FYI Monitoring Employees 99
Managing Consumer Trust 76 Social Media Policy 99
BUSTED Virtual Abandonment 77 Workplace Monitoring Policy 100
Ensuring Consumer Protection 77 BUSTED I’m Being Fired for Smoking, but I Was at
Adhering to Taxation Rules 77 Home and It Was Saturday 101
SECTI ON 3.2 >> Web 2.0: Business 2.0 77 SECTION 4.2 >> Information Security 101
WEB 2.0: ADVANTAGES OF BUSINESS 2.0 77 PROTECTING INTELLECTUAL ASSETS 101
Content Sharing through Open Sourcing 78 Security Threats Caused by Hackers and Viruses 103
User-Contributed Content 78 SHOW ME THE MONEY Beyond Passwords 104
Collaboration inside the Organization 79 THE FIRST LINE OF DEFENSE–PEOPLE 105
SHOW ME THE MONEY Analyzing Websites 79 MY NOT TO-DO LIST Lifelock: Keeping Your Identity
Collaboration outside the Organization 80 Safe 106
NETWORKING COMMUNITIES WITH BUSINESS 2.0 80 THE SECOND LINE OF DEFENSE–TECHNOLOGY 106
MY NOT TO-DO LIST Social Not Working 81 People: Authentication and Authorization 106
Contents | vii
DUE DILIGENCE Doodling Passwords 109 Virtualized Computing 132
Data: Prevention and Resistance 109 Cloud Computing 137
SHOW ME THE MONEY Hackers Love Phish, FYI Virtualization for Your Cell Phone 137
and I Don’t Mean the Band 110 BUSTED Hack Attack 141
Attack: Detection and Response 111 Utility Computing 143
module two
SHOW ME THE MONEY Upcycle Your Old PC 144
TECHNICAL
FOUNDATIONS OF MIS 113 CHAPTER 6 DATA: BUSINESS
INTELLIGENCE 147
CHAPTER 5 INFRASTRUCTURES: SECTION 6.1 >> Data, Information, and
SUSTAINABLE Databases 148
TECHNOLOGIES 115 THE BUSINESS BENEFITS OF HIGH-QUALITY
SECTION 5 .1 >> MIS Infrastructures 116 INFORMATION 148
Information Type: Transactional and Analytical 148
THE BUSINESS BENEFITS OF A SOLID MIS Information Timeliness 149
INFRASTRUCTURE 116 Information Quality 150
SUPPORTING OPERATIONS: INFORMATION MIS SHOW ME THE MONEY Determining Information
INFRASTRUCTURE 117 Quality Issues 151
Backup and Recovery Plan 118 Information Governance 152
DUE DILIGENCE I Don’t Have a Temperature, but I’m STORING INFORMATION USING A RELATIONAL DATABASE
Positive I Have a Virus 119 MANAGEMENT SYSTEM 153
Disaster Recovery Plan 119 Storing Data Elements in Entities and Attributes 154
Business Continuity Plan 121 Creating Relationships through Keys 155
SHOW ME THE MONEY Recovering from DUE DILIGENCE That’s Not My Mother in the
Disaster 122 Casket! 155
DUE DILIGENCE Zombies Attack the University of Coca Cola Relational Database Example 155
Florida 123
USING A RELATIONAL DATABASE FOR BUSINESS
FYI Creating a BCP Plan 124 ADVANTAGES 155
SUPPORTING CHANGE: AGILE MIS INFRASTRUCTURE 124 Increased Flexibility 157
Accessibility 124 MY NOT TO-DO LIST Yes, I Started the Internet 157
Availability 125 Increased Scalability and Performance 158
Maintainability 125 Reduced Information Redundancy 158
Portability 126 Increased Information Integrity (Quality) 158
Reliability 126 SHOW ME THE MONEY Excel or Access? 158
SHOW ME THE MONEY Ranking the -ilities 126 Increased Information Security 159
Scalability 127 DUE DILIGENCE Sorry, I Didn’t Mean to Post Your
Usability 127 Social Security Number on the Internet 159
SECTION 5 .2 >> Building Sustainable MIS DRIVING WEBSITES WITH DATA 160
Infrastructures 127
SECTION 6.2 >> Business Intelligence 162
MIS AND THE ENVIRONMENT 128
DATA WAREHOUSING 162
DUE DILIGENCE Laptop? Notebook? Netbook?
History of the Data Warehouse 162
Tablet? 128
Data Mart 163
Increased Electronic Waste 128
LIVING THE DREAM Solving the Ewaste FYI Butterfly Effects 164
Information Cleansing (or Scrubbing) 164
Problem 129
FYI Ewaste and the Environment 129 BUSINESS INTELLIGENCE 166
LIVING THE DREAM Smart Cities 130 SHOW ME THE MONEY Clean My Data! 167
Increased Energy Consumption 130 The Problem: Data Rich, Information Poor 168
Increased Carbon Emissions 131 The Solution: Business Intelligence 168
BUSTED Follow the Data 169
SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS
INFRASTRUCTURE 131 THE POWER OF BIG DATA 170
Grid Computing 131 Virtualization 170
SHOW ME THE MONEY How Big Is Your Carbon Analyzing Big Data 170
Footprint? 131
viii | Contents
module three
LIVING THE DREAM 2 Trillion Rows of Data
Analyzed Daily—No Problem 172 ENTERPRISE
DATA MINING 172 MIS 209
Data Mining Process Model 173
Data Mining Analysis Techniques 173
DUE DILIGENCE Unethical Data Mining 175 CHAPTER 8 ENTERPRISE
Data Mining Modeling Techniques for Predictions 176 APPLICATIONS: BUSINESS
DATA ANALYSIS 178 COMMUNICATIONS 211
Advanced Data Analytics 178 SECTION 8.1 >> Supply Chain Management 212
Data Visualization 179
BUILDING A CONNECTED CORPORATION THROUGH
FYI News Dots 181
INTEGRATIONS 212
Integration Tools 213
CHAPTER 7 NETWORKS: MOBILE SUPPLY CHAIN MANAGEMENT 214
BUSINESS 183 Visibility into the Supply Chain 216
SECTI ON 7.1 >> Connectivity: The Business Value of a TECHNOLOGIES REINVENTING THE SUPPLY CHAIN 218
Networked World 184 3D Printing Supports Procurement 219
THE CONNECTED WORLD 184 RFID Supports Logistics 220
Network Categories 185 LIVING THE DREAM 3D Printing for Poverty 220
Network Providers 185 Drones Support Logistics 221
Network Access Technologies 186 Robotics Supports Materials Management 221
Network Protocols 188 DUE DILIGENCE 3D Printing Weapons 222
BUSTED Never Run with Your iPod 190 DUE DILIGENCE Robots Took My Job 223
Network Convergence 190 MY NOT TO-DO LIST Fixing the Post Office 223
The Extended Supply Chain 223
SHOW ME THE MONEY Net Neutrality 192
BENEFITS AND CHALLENGES OF A CONNECTED WORLD 193 SECTION 8.2 >> Customer Relationship Management
and Enterprise Resource Planning 224
FYI Music in the Clouds 193
Security 194 CUSTOMER RELATIONSHIP MANAGEMENT 224
My Not To-Do List Should Airlines Allow Cellphones on FYI Ruby Receptionists 225
Flights? 195 The Power of the Customer 226
DUE DILIGENCE Teddy the Guardian 195 Operational and Analytical CRM 228
Social, Ethical, and Political Issues 196 Marketing and Operational CRM 228
SECTI ON 7.2 >> Mobility: The Business Value of a SHOW ME THE MONEY Nice Emotions 228
Wireless World 196 BUSTED I’m Stuck in London and I’ve Been
Robbed—Help Me! 230
WIRELESS NETWORKS 196 Sales and Operational CRM 230
Personal Area Networks 197 Customer Service and Operational CRM 231
Wireless LANs 197 DUE DILIGENCE Customer Power to the
Wireless MANs 198 Rescue 232
SHOW ME THE MONEY Wireless Networks and Analytical CRM 233
Streetlamps 198 SHOW ME THE MONEY Straight Jacket Customer
Wireless WAN—Cellular Communication System 199 Service 233
Wireless WAN—Satellite Communication System 201 The Future of CRM 234
LIVING THE DREAM Saving the World One Phone at
ENTERPRISE RESOURCE PLANNING 234
a Time 201
The Benefits of ERP 237
Protecting Wireless Connections 201
Core ERP Components 237
Managing Mobile Devices 202
Extended ERP Components 239
FYI Sports Sensors 202
SHOW ME THE MONEY Classic Cars 241
BUSINESS APPLICATIONS OF WIRELESS NETWORKS 203 Measuring ERP Success 242
Radio-Frequency Identification (RFID) 203
ORGANIZATIONAL INTEGRATION WITH ERP 243
Global Positioning System (GPS) 204
On-Premise ERP 243
Geographic Information Systems (GIS) 205
Cloud ERP 243
LIVING THE DREAM Wi-Fi for Fishes 205 Hybrid ERP 245
BUSTED Snapping a Theftie 206
FYI Bean Integration 247
Contents | ix
CHAPTER 9 SYSTEMS DEVELOPMENT DEVELOPING A SERVICE-ORIENTED ARCHITECTURE 263
AND PROJECT Service 263
Interoperability 264
MANAGEMENT: CORPORATE Loose Coupling 265
RESPONSIBILITY 249 SHOW ME THE MONEY Scratch 265
SECTION 9 .1 >> Developing Enterprise SECTION 9.2 >> Project Management 266
Applications 250
USING PROJECT MANAGEMENT TO DELIVER SUCCESSFUL
THE SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) 250 PROJECTS 266
Phase 1: Planning 250 Unclear or Missing Business Requirements 267
FYI Have You Met Ted? If Not, You Need To! 252 Skipped Phases 267
Phase 2: Analysis 252 Changing Technology 268
Phase 3: Design 253 The Cost of Finding Errors in the SDLC 268
Phase 4: Development 254 Balance of the Triple Constraint 268
Phase 5: Testing 254 FYI Sharepoint 268
MY NOT TO-DO LIST Flawed Development 256
PRIMARY PROJECT PLANNING DIAGRAMS 269
Phase 6: Implementation 256
LIVING THE DREAM CharityFocus.org 272
FYI Reducing Ambiguity in Business
Requirements 257 OUTSOURCING PROJECTS 272
Phase 7: Maintenance 258 MY NOT TO-DO LIST Honestly, It Cost $7,500 for a
Steak Dinner 272
SOFTWARE DEVELOPMENT METHODOLOGIES 259
Outsourcing Benefits 273
SHOW ME THE MONEY Planning for the Outsourcing Challenges 274
Unexpected 260 DUE DILIGENCE DUI in a Golf Cart 274
Agile Software Development Methodologies 260
SHOW ME THE MONEY Death March 275
Rapid Application Development (RAD) Methodology 261
Extreme Programming Methodology 262
GLOSSARY 277
BUSTED Faking Your Own Death 262
Rational Unified Process (RUP) Methodology 263 INDEX 298
Scrum Methodology 263
x | Contents
information
systems 4e
© Fry Design Ltd/Getty Images
coming
M
ost companies today rely heavily on the use of
management information systems (MIS) to run
various aspects of their businesses. Whether they
need to order and ship goods, interact with customers, or
conduct other business functions, management information
systems are often the underlying infrastructure performing the
activities. Management information systems allow companies
to remain competitive in today’s fast-paced world and especially
when conducting business on the Internet. Organizations must adapt
to technological advances and innovations to keep pace with today’s
rapidly changing environment. Their competitors certainly will!
No matter how exciting technology is, successful companies do
not use it simply for its own sake. Companies should have a solid
BUSINESS
business reason for implementing technology. Using a technological DRIVEN MIS
solution just because it is available is not a good business strategy.
The purpose of Module 1 is to raise your awareness of the vast
opportunities made possible by the tight correlation between busi- module one
BUSINESS DRIVEN MIS
ness and technology. Business strategies and processes should
chapter 1: Management Information Systems: Business Driven MIS
always drive your technology choices. Although awareness of an chapter 2: Decisions + Processes: Value Driven Business
chapter 3: Ebusiness: Electronic Business Value
emerging technology can sometimes lead us in new strategic direc- chapter 4: Ethics + Information Security: MIS Business Concerns
module two
tions, the role of information systems, for the most part, is to support
existing business strategies and processes. ■
TECHNICAL FOUNDATIONS OF MIS
module three
ENTERPRISE MIS
T
his chapter sets the stage for the CHAPTER OUTLINE
continued from p. 5 before the information age. Now, it’s not at all unusual to read
about a business student starting a multimillion-dollar com-
business and technology. You must first recognize informa- pany from his or her dorm room. Think of Mark Zuckerberg,
tion’s role in daily business activities, and then understand who started Facebook from his dorm, or Michael Dell (Dell
Computers) and Bill Gates (Microsoft), who both founded their
how
information supports and helps implement global busi- legendary companies as college students.
ness strategies and competitive advantages. After reading this You may think only students well versed in advanced technol-
chapter, you should have a solid understanding of business ogy can compete in the information age. This is simply not true.
Many business leaders have created exceptional opportunities
driven information systems and their role in managerial decision
by coupling the power of the information age with traditional
making and problem solving. ■ business methods. Here are just a few examples:
∙ Amazon is not a technology company; its original business
focus was to sell books, and it now sells nearly everything.
{SECTION 1.1} ∙ Netflix is not a technology company; its primary business
Business Driven MIS focus is to rent videos.
of the roughly 50 petabytes (a petabyte is 1,024 terabytes) of behaviors. Our primary goal in this course is to arm you with
data available on the Internet were first captured and created the knowledge you need to compete in the information age.
by human beings by typing, pressing a record button, taking a The core drivers of the information age include:
digital picture or scanning a bar code. ∙ Data
The problem is, people have limited time, attention and ∙ Information
accuracy—all of which means they are not very good at captur-
∙ Business intelligence
ing data about things in the real world. If we had computers that
knew everything there was to know about things—using data ∙ Knowledge (see Figure 1.1)
they gathered without any help from us—we would be able to
track and count everything and greatly reduce waste, loss and LO1.1 Describe the information age and the differences among
cost. We would know when things needed replacing, repairing data, information, business intelligence, and knowledge.
or recalling and whether they were fresh or past their best.”2
IoT is transforming our world into a living information system
as we control our intelligent lighting from our smart phone to Data
a daily health check from our smart toilet. Of course with all Data are raw facts that describe the characteristics of an event
great technological advances come unexpected risks and you or object. Before the information age, managers manually col-
have to be prepared to encounter various security issues with lected and analyzed data, a time-consuming and complicated
IoT. Just imagine if your devices are hacked by someone who task without which they would have little insight into how to
now has the ability to shut off your water, take control of your run their business. Structured data has a defined length, type,
car, or unlock the doors of your home from thousands of miles and format and includes numbers, dates, or strings such as Cus-
away. We are just beginning to understand the security issues tomer Address. Structured data is typically stored in a tradi-
associated with IoT and M2M and you can be sure that sensi- tional system such as a relational database or spreadsheet and
tive data leakage from your IoT device is something you will accounts for about 20 percent of the data that surrounds us. The
most likely encounter in your life. sources of structured data include:
Students who understand business along with the power asso- ∙ Machine-generated data is created by a machine with-
ciated with the information age and IoT will create their own out human intervention. Machine-generated structured data
opportunities and perhaps even new industries. Realizing the includes sensor data, point-of-sale data, and web log data.
value of obtaining real-time data from connected “things” will ∙ Human-generated data is data that humans, in interaction
allow you to make more informed decisions, identify new with computers, generate. Human-generated structured data
opportunities, and analyze customer patterns to predict new includes input data, click-stream data, or gaming data.
Raw facts that Data converted Information collected The skills, experience,
describe the into a meaningful from multiple sources and expertise, coupled
characteristics and useful that analyzes patterns, with information and
of an event context trends, and relationships intelligence, that create
or object for strategic decision a person’s intellectual
making resources
Order date Best-selling Lowest sales per week Choosing not to fire a
Amount sold product compared with the sales representative
Best customer economic interest rates who is underperforming
Customer
Best-selling product by knowing that person is
number Worst-selling
month compared to experiencing family
Quantity product
sports season and city problems
ordered Worst
team wins and losses Listing products that are
customer
about to expire first on
the menu or creating
them as a daily special
to move the product
People in China next-door neighbors.” The video of Thomas ∙ What can students do to prepare them-
Friedman’s lecture at MIT discussing the flat selves for competing in a flat world?
and India Are world is available at
Starving for http://mitworld.mit.edu/
Your Jobs3 video/266. If you want
to be prepared to com- © Terry Vine/Blend Images/Getty Images
“When I was growing up in Minneapolis, my par- pete in a flat world, you
ents always said, ‘Tom, finish your dinner. There must watch this video
are people starving in China and India.’ Today and answer the follow-
I tell my girls, ‘Finish your homework, because ing questions:
people in China and India are starving for your ∙ Do you agree or
jobs.’ And in a flat world, they can have them, disagree with Fried-
because there’s no such thing as an American man’s assessment
job anymore.” Thomas Friedman. that the world is flat?
In his book, The World Is Flat, Thomas ∙ What are the poten-
Friedman describes the unplanned cascade of tial impacts of a flat
technological and social shifts that effectively world for a student
leveled the economic world and “acciden- performing a job
tally made Beijing, Bangalore, and Bethesda search? © Terry Vine/Blend Images/Getty Images
F I G U R E 1 . 3 Tony’s Data Sorted by Customer “Walmart” and Sales Representative “Roberta Cross”
Sales
Order Date Customer Representative Product Quantity Unit Price Total Sales Unit Cost Total Cost Profit
26-Apr Walmart Roberta Cross Fritos 86 $19 $1,634 $17 $1,462 $172
29-Aug Walmart Roberta Cross Fritos 76 $19 $1,444 $17 $1,292 $152
7-Sep Walmart Roberta Cross Fritos 20 $19 $380 $17 $340 $40
22-Nov Walmart Roberta Cross Fritos 39 $19 $741 $17 $663 $78
30-Dec Walmart Roberta Cross Fritos 68 $19 $1,292 $17 $1,156 $136
7-Jul Walmart Roberta Cross Pringles 79 $18 $1,422 $8 $632 $790
6-Aug Walmart Roberta Cross Pringles 21 $12 $252 $6 $126 $126
2-Oct Walmart Roberta Cross Pringles 60 $18 $1,080 $8 $480 $600
15-Nov Walmart Roberta Cross Pringles 32 $12 $384 $6 $192 $192
21-Dec Walmart Roberta Cross Pringles 92 $12 $1,104 $6 $552 $552
28-Feb Walmart Roberta Cross Ruffles 67 $15 $1,005 $10 $670 $335
6-Mar Walmart Roberta Cross Ruffles 8 $15 $120 $10 $80 $40
16-Mar Walmart Roberta Cross Ruffles 68 $15 $1,020 $10 $680 $340
23-Apr Walmart Roberta Cross Ruffles 34 $15 $510 $10 $340 $170
4-Aug Walmart Roberta Cross Ruffles 40 $15 $600 $10 $400 $200
18-Aug Walmart Roberta Cross Ruffles 93 $15 $1,395 $10 $930 $465
5-Sep Walmart Roberta Cross Ruffles 41 $15 $615 $10 $410 $205
12-Sep Walmart Roberta Cross Ruffles 8 $15 $120 $10 $80 $40
28-Oct Walmart Roberta Cross Ruffles 50 $15 $750 $10 $500 $250
21-Nov Walmart Roberta Cross Ruffles 79 $15 $1,185 $10 $790 $395
29-Jan Walmart Roberta Cross Sun Chips 5 $22 $110 $18 $90 $20
12-Apr Walmart Roberta Cross Sun Chips 85 $22 $1,870 $18 $1,530 $340
16-Jun Walmart Roberta Cross Sun Chips 55 $22 $1,210 $18 $990 $220
1,206 $383 $20,243 $273 $14,385 $5,858
Sorting the data reveals the information that Roberta Cross’s total sales to Walmart were $20,243 resulting in a profit of $5,858.
(Profit $5,858 = Sales $20,243 - Costs $14,385)
F I G U R E 1 . 4 Information Gained after Analyzing Tony’s Data ehavioral analytics uses data
B
about people’s behaviors to under-
Tony’s Business Information Name Total Profit stand intent and predict future
actions. Tony will set the strategic
Who is Tony’s best customer by total sales? Walmart $560,789
direction for his firm, which might
Who is Tony’s least-valuable customer by total sales? Walgreens $45,673 include introducing new flavors
Who is Tony’s best customer by profit? 7-Eleven $324,550 of potato chips or sports drinks as
Who is Tony’s least-valuable customer by profit? King Soopers $23,908 new product lines or schools and
What is Tony’s best-selling product by total sales? Ruffles $232,500 hospitals as new market segments
What is Tony’s weakest-selling product by total sales? Pringles $54,890 based on both predictive and
behavioral analytics.
What is Tony’s best-selling product by profit? Tostitos $13,050
What is Tony’s weakest-selling product by profit? Pringles $23,000 Knowledge
Who is Tony’s best sales representative by profit? R. Cross $1,230,980 Knowledge includes the skills,
Who is Tony’s weakest sales representative by profit? Craig Schultz $98,980 experience, and expertise, coupled
What is the best sales representative’s best-selling product by total Ruffles $98,780 with information and intelligence,
profit? that creates a person’s intel-
Who is the best sales representative’s best customer by total profit? Walmart $345,900 lectual resources. Knowledge
What is the best sales representative’s weakest-selling product by Sun Chips $45,600 workers are individuals valued
total profit? for their ability to interpret and
Who is the best sales representative’s weakest customer by total profit? Krogers $56,050 analyze information. Today’s
workers are commonly referred
to as knowledge workers and they
multiple variables and in some cases even hundreds of vari- use BI along with personal experience to make decisions based
ables including such items as interest rates, weather conditions, on both information and intuition, a valuable resource for any
and even gas prices. Tony could use BI to analyze internal company.
data, such as company sales, along with external data about the Imagine that Tony analyzes his data and finds his weakest
environment such as competitors, finances, weather, holidays, sales representative for this period is Craig Schultz. If Tony
and even sporting events. Both internal and external variables considered only this information, he might conclude that firing
affect snack sales, and analyzing these variables will help Tony Craig was a good business decision. However, because Tony
determine ordering levels and sales forecasts. For instance, BI has knowledge about how the company operates, he knows
can predict inventory requirements for Tony’s business for the Craig has been out on medical leave for several weeks; hence,
week before the Super Bowl if, say, the home team is playing, his sales numbers are low. Without this additional knowledge,
average temperature is above 80 degrees, and the stock mar- Tony might have executed a bad business decision, delivered
ket is performing well. This is BI at its finest, incorporating all a negative message to the other employees, and sent his best
types of internal and external variables to anticipate business sales representatives out to look for other jobs.
performance.
The key point in this scenario is that it is simply impossible to
Analytics is the science of fact-based decision making. A big collect all the information about every situation, and yet with-
part of business intelligence is called predictive analytics, out that, it can be easy to misunderstand the problem. Using
which extracts information from data and uses it to predict data, information, business intelligence, and knowledge to
future trends and identify behavioral patterns. Top managers make decisions and solve problems is the key to finding suc-
use predictive analytics to define the future of the business, ana- cess in business. These core drivers of the information age are
lyzing markets, industries, and economies to determine the stra- the building blocks of business systems. Figure 1.5 offers a few
tegic direction the company must follow to remain profitable. different examples of data through knowledge.
INFORMATION: The item I have is a product that has the most sales during the
month of December.
BUSINESS INTELLIGENCE: The month of December this year is going to see interest
rates rise by 10 percent and snow stores are expected to cause numerous problems
throughout the East coast.
KNOWLEDGE: Given the unexpected financial issues caused by the storms and the
interest rate hike we will offer a discount on purchase in November and December
to ensure sales levels increase by 10 percent.
COMPANIES LO1.2 resources focuses on hiring and training people and main-
tains employee data. Although each department has its own
Companies are typically organized by department or functional focus and data, none can work independently if the company
area such as: is to operate as a whole. It is easy to see how a business deci-
∙ Accounting: Records, measures, and reports monetary
sion made by one department can affect other departments.
transactions. Marketing needs to analyze production and sales data to
come up with product promotions and advertising strategies.
∙ Finance: Deals with strategic financial issues including Production needs to understand sales forecasts to determine
money, banking, credit, investments, and assets. the company’s manufacturing needs. Sales needs to rely on
∙ Human resources: Maintains policies, plans, and procedures information from operations to understand inventory, place
for the effective management of employees. orders, and forecast consumer demand. All departments
∙ Marketing: Supports sales by planning, pricing, and promot-
need to understand the accounting and finance departments’
ing goods or services. information for budgeting. For the firm to be successful, all
departments must work together as a single unit sharing com-
∙ Operations management: Manages the process of converting mon information and not operate independently or in a silo
or transforming or resources into goods or services. (see Figure 1.7).
∙ Sales: Performs the function of selling goods or services (see
Figure 1.6).
LO1.2 Identify the different departments in a company and why
Each department performs its own activities. Sales and mar-
they must work together to achieve success.
keting focus on moving goods or services into the hands of
FIGURE 1.6
Departments Working Independently
Accounting
Records, measures, and
reports monetary
transactions.
Finance
Sales Tracks strategic financial
Performs the function of issues including money,
selling goods or services. banking, credit,
investments, and assets.
Operations
management Human resources
Manages the process of Maintains policies, plans,
converting or transforming and procedures for the
resources into goods or effective management of
services. employees.
Marketing
Supports sales by
planning, pricing, and
promoting goods or
services.
FIGURE 1.7
Departments Working Together
Accounting
• Transactional data
• Purchasing data
• Payroll data
• Tax data
Sales
Finance
• Potential customer data
• Investment data
• Sales report data
• Monetary data
• Commission data
• Reporting data
• Customer support data
Business Decisions
I
oT is transforming our world into a living home from thousands of miles away. We are or even smart vacuum cleaners. If you are not
information system as we control our intel- just beginning to understand the security issues using any IoT devices today, brainstorm a few
ligent lighting from our smart phone to a associated with IoT and M2M, and you can be you might purchase in the future. How could a
daily health check from our smart toilet. Of sure that sensitive data leakage from your IoT criminal or hacker use your IoT to steal your sen-
course, with all great technological advances device is something you will most likely encoun- sitive data? What potential problems or issues
come unexpected risks, and you have to be pre- ter in your life.5 could you experience from these types of illegal
pared to encounter various security issues with In a group, identify a few IoT devices you are data thefts? What might be some of the signs
IoT. Just imagine if your devices are hacked by using today. These can include fitness trackers that someone had accessed your IoT data ille-
someone who now can shut off your water, take that report to your iPhone, sports equipment gally? What could you do to protect the data in
control of your car, or unlock the doors of your that provides immediate feedback to an app, your device?
Who Really Won the 2014 Winter Olympics? In a group, take a look at the following two
If you were watching the 2014 Winter Olympics, I bet you were excited charts and brainstorm the reasons each
to see your country and its amazing athletes compete. As you were fol- internationally recognized source has a
lowing the Olympics day by day, you were probably checking different different listing for the top five winners.
websites to see how your country ranked. And depending on the web- What measurement is each chart using to
site you visited, you could get a very different answer to this seemingly determine the winner? Who do you believe
easy question. On the NBC and ESPN networks, the United States ranked is the winner? As a manager, what do you
second, and on the official Sochie Olympic website, the United States need to understand when reading or listen-
ranked fourth. The simple question of who won the 2014 Winter Olym- ing to business forecasts and reports?
4
pics changes significantly, depending on whom you asked.
Winter Olympics 2014 Medal Ranking According to Official
Winter Olympics 2014 Medal Ranking According to NBC News Sochie Olympic Website
Rank Country Gold Silver Bronze Total Rank Country Gold Silver Bronze Total
1 Russian Fed. 13 11 9 33 1 Russian Fed. 13 11 9 33
2 United States 9 7 12 28 2 Norway 11 5 10 26
3 Norway 11 5 10 26 3 Canada 10 10 5 25
4 Canada 10 10 5 25 4 United States 9 7 12 28
5 Netherlands 8 7 9 24 5 Netherlands 8 7 9 24
chief privacy
officer
(CPO) Responsible for
Feedback ensuring the ethical and
• Controls to ensure legal use of information
correct processing within a company.
chief knowledge
of an organization’s information technology. CTOs are similar effectiveness of the hospital’s officer (CKO)
to CIOs, except that CIOs take on the additional responsibility care. Shaw started by building a Responsible for
for effectiveness of ensuring that MIS is aligned with the organi- series of small, integrated infor- collecting, maintaining,
zation’s strategic initiatives. CTOs have direct responsibility for mation systems that quickly dem- and distributing
ensuring the efficiency of MIS systems throughout the organiza- onstrated value. He then gradually company knowledge.
tion. Most CTOs possess well-rounded knowledge of all aspects built on those successes, creating
of MIS, including hardware, software, and telecommunications. a knowledge-enabled organization one layer at a time. Shaw’s
information systems have enabled administrative and clinical
The chief security officer (CSO) is responsible for ensur-
operational analyses.
ing the security of MIS systems and developing strategies and
MIS safeguards against attacks from hackers and viruses. The With the election of President Barack Obama comes the
role of a CSO has been elevated in recent years because of the appointment of the first-ever national chief technology offi-
number of attacks from hackers and viruses. Most CSOs pos- cer (CTO). The job description states that the first CTO must
sess detailed knowledge of networks and telecommunications “ensure the safety of our networks and lead an interagency
because hackers and viruses usually find their way into MIS effort, working with chief technology and chief information
systems through networked computers. officers of each of the federal agencies, to ensure that they use
best-in-class technologies and share best practices.” A federal-
The chief privacy officer (CPO) is responsible for ensuring
level CTO demonstrates the ongoing growth of technology
the ethical and legal use of information within an organiza-
positions outside corporate America. In the future expect to see
tion. CPOs are the newest senior executive position in MIS.
many more technology positions in government and nonprofit
Recently, 150 of the Fortune 500 companies added the CPO
organizations.
position to their list of senior executives. Many CPOs are law-
yers by training, enabling them to understand the often com-
plex legal issues surrounding the use of information.
The chief knowledge officer (CKO) is responsible for
collecting, maintaining, and distributing the organiza-
tion’s knowledge. The CKO designs programs
and systems that make it easy for people to reuse
knowledge. These systems create repositories
Is Technology Making Us Dumber or Smarter?
of organizational documents, methodologies,
tools, and p ractices, and they establish methods Choose a side and debate the following:
for filtering the information. The CKO must con- ∙ Side A Living in the information age has made us smarter
tinuously encourage employee contributions to because we have a huge wealth of knowledge at our fingertips
keep the systems up-to-date. The CKO can contrib-
whenever or wherever we need it.
ute directly to the organization’s bottom line by
reducing the learning curve for new employees or ∙ Side B Living in the information age has caused people to
employees taking on new roles. become lazy and dumber because they are no longer building
Danny Shaw was the first CKO at Children’s Hospital in up their memory banks to solve problems; machines give them
Boston. His initial task was to unite information from dis- the answers they need to solve problems.
parate systems to enable analysis of both the efficiency and
All the above MIS positions and responsibilities are critical ∙ Chief automation officer determines if a person or business
to an organization’s success. While many organizations may process can be replaced by a robot or software. As we con-
not have a different individual for each of these positions, they tinue to automate jobs a member of the core leadership team
must have leaders taking responsibility for all these areas of of the future will be put in charge of identifying opportunities for
concern. The individuals responsible for enterprisewide MIS companies to become more competitive through automation.
and MIS-related issues must provide guidance and support to ∙ Chief user experience officer will create the optimal rela-
the organization’s employees. According to Fast Company tionship between user and technology. User experience used
magazine a few executive levels you might see created over the to be an afterthought for hardware and software designers.
next decade include: Now that bulky instruction manuals are largely (and thank-
fully) a thing of the past, technology companies need to
∙ Chief intellectual property officer will manage and defend ensure that their products are intuitive from the moment they
intellectual property, copyrights, and patents. The world of are activated.
intellectual property law is vast and complicated as new inno-
vations continually enter the market. Companies in the near MIS skills gap is the difference between existing MIS work-
future will need a core leadership team member who can not place knowledge and the knowledge required to fulfill the
only wade through the dizzying sea of intellectual property laws business goals and strategies. Closing the MIS skills gap by
and patents to ensure their own compliance, but also remain aligning the current workforce with potential future business
vigilant to protect their own company against infringement. needs is a complicated proposition. Today, employers often
FIGURE 1.11
The Roles and Responsibilities of MIS