You are on page 1of 54

Information Technology for

Management Driving Digital


Transformation to Increase Local and
Global Performance Growth and
Sustainability 12th Edition Turban
Visit to download the full and correct content document:
https://textbookfull.com/product/information-technology-for-management-driving-digita
l-transformation-to-increase-local-and-global-performance-growth-and-sustainability-1
2th-edition-turban/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Social Commerce Marketing Technology and Management 1st


Edition Efraim Turban

https://textbookfull.com/product/social-commerce-marketing-
technology-and-management-1st-edition-efraim-turban/

New Trends in Business Information Systems and


Technology: Digital Innovation and Digital Business
Transformation Rolf Dornberger

https://textbookfull.com/product/new-trends-in-business-
information-systems-and-technology-digital-innovation-and-
digital-business-transformation-rolf-dornberger/

Management Information Systems: Managing the Digital


Firm, Global Edition Laudon

https://textbookfull.com/product/management-information-systems-
managing-the-digital-firm-global-edition-laudon/

Digital Technologies for Global Sourcing of Services:


14th International Workshop on Global Sourcing of
Information Technology and Business Processes, ...
Business Information Processing Book 410) Oshri
https://textbookfull.com/product/digital-technologies-for-global-
sourcing-of-services-14th-international-workshop-on-global-
sourcing-of-information-technology-and-business-processes-
Digital Transformation and Knowledge Management 1st
Edition Lucia Marchegiani

https://textbookfull.com/product/digital-transformation-and-
knowledge-management-1st-edition-lucia-marchegiani/

Actioning the Global Goals for Local Impact Towards


Sustainability Science Policy Education and Practice
Isabel B. Franco

https://textbookfull.com/product/actioning-the-global-goals-for-
local-impact-towards-sustainability-science-policy-education-and-
practice-isabel-b-franco/

Engineering, Information and Agricultural Technology in


the Global Digital Revolution-Proceedings of the 1st
International Conference on Civil Engineering,
Electrical Engineering, Information Systems,
Information Technology, and Agricultural Technology (S
https://textbookfull.com/product/engineering-information-and-
agricultural-technology-in-the-global-digital-revolution-
1st Edition Aria Hendrawan (Editor)
proceedings-of-the-1st-international-conference-on-civil-
engineering-electrical-engineering-information-systems/

Business in Real-Time Using Azure IoT and Cortana


Intelligence Suite: Driving Your Digital Transformation
1st Edition Bob Familiar

https://textbookfull.com/product/business-in-real-time-using-
azure-iot-and-cortana-intelligence-suite-driving-your-digital-
transformation-1st-edition-bob-familiar/

Digital Fluency Understanding the Basics of Artificial


Intelligence Blockchain Technology Quantum Computing
and Their Applications for Digital Transformation
Volker Lang
https://textbookfull.com/product/digital-fluency-understanding-
the-basics-of-artificial-intelligence-blockchain-technology-
quantum-computing-and-their-applications-for-digital-
Information Technology
for Management
Driving Digital Transformation to Increase Local and
Global Performance, Growth and Sustainability

Twelfth Edition
Information Technology
for Management
Driving Digital Transformation to Increase Local and
Global Performance, Growth and Sustainability

Twelfth Edition

EFRAIM TURBAN

CAROL POLLARD
Appalachian State University

GREGORY WOOD
Canisius College
VP AND EDITORIAL DIRECTOR Mike McDonald
PUBLISHER Lise Johnson
EDITOR Jennifer Manias
EDITORIAL ASSISTANT Kali Ridley
SENIOR MANAGING EDITOR Judy Howarth
PRODUCTION EDITOR Umamaheswari Gnanamani
COVER PHOTO CREDIT © Yuichiro Chino/Getty Images

This book was set in 9.5/12.5 pt Source Sans Pro by SPi Global.

Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding
for more than 200 years, helping people around the world meet their needs and fulfill their aspira-
tions. Our company is built on a foundation of principles that include responsibility to the communi-
ties we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a
global effort to address the environmental, social, economic, and ethical challenges we face in our
business. Among the issues we are addressing are carbon impact, paper specifications and procure-
ment, ethical conduct within our business and among our vendors, and community and charitable
support. For more information, please visit our website: www.wiley.com/go/citizenship.

Copyright © 2021, 2018, 2015, 2013, 2011, 2010 John Wiley & Sons, Inc. All rights reserved. No part
of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy
fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923 (Web site: www.
copyright.com). Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax
(201) 748-6008, or online at: www.wiley.com/go/permissions.

Evaluation copies are provided to qualified academics and professionals for review purposes only,
for use in their courses during the next academic year. These copies are licensed and may not be sold
or transferred to a third party. Upon completion of the review period, please return the evaluation
copy to Wiley. Return instructions and a free of charge return shipping label are available at: www.
wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please
accept this book as your complimentary desk copy. Outside of the United States, please contact your
local sales representative.

ISBN: 978-1-119-70290-0 (PBK)


ISBN: 978-1-119-71379-1 (EVALC)

Library of Congress Cataloging in Publication Data

Names: Turban, Efraim, author. | Pollard, Carol (Carol E.), author. | Wood,
Gregory R., author.
Title: Information technology for management : on-demand strategies for
performance, growth and sustainability / Efraim Turban, Carol Pollard,
Appalachian State University, Gregory Wood, Canisius College.
Description: Twelfth edition. | Hoboken : Wiley, 2021. | Includes indexes.
Identifiers: LCCN 2020025488 (print) | LCCN 2020025489 (ebook) | ISBN
9781119713807 (cloth) | ISBN 9781119702900 (pbk) | ISBN 9781119713791
(evalc) | ISBN 9781119713784 (adobe pdf) | ISBN 9781119702917 (epub)
Subjects: LCSH: Management information systems.
Classification: LCC T58.6 .T765 2021 (print) | LCC T58.6 (ebook) | DDC
658.4/038011—dc23
LC record available at https://lccn.loc.gov/2020025488
LC ebook record available at https://lccn.loc.gov/2020025489

The inside back cover will contain printing identification and country of origin if omitted from this
page. In addition, if the ISBN on the back cover differs from the ISBN on this page, the one on the
back cover is correct.

Turban12e_ffirs.indd 4 19-02-2021 22:13:15


Brief Contents
PREFACE xiii PART 3 Optimizing Performance and Growth
ACKNOWLEDGMENTS xviii with Business-Driven Systems, Artificial
Intelligence and IT Strategy
PART 1 Emphasizing Local and Global 9 Functional Business Systems 330
Sustainability in the on-Demand and Sharing
economies 10 Enterprise Systems 363

1 Digital Transformation Disrupts Companies, 11 Artificial Intelligence, Robotics,


Competition, and Careers Locally and and Quantum Computing Technology 409
Globally 1
12 IT Strategy, Sourcing, and Strategic
2 Information Systems, IT Infrastructure, and Technology Trends 444
the Cloud 31
PART 4 Building, Operating and Managing
3 Data Management, Data Warehouses,
Systems to Support Sustainable Business
and Data Governance 66
Practices During and After the COVID-19
4 Networks, the Internet of Things (IoT), and Pandemic
Edge Computing 107
13  ystems Development, IT Service
S
5 Data Privacy and Cyber Security 149 Management and Project, Program and
Portfolio Management 490
PART 2 Maximizing Growth with Data 14 IT Ethics and Local and Global
Analytics, Social Media and Omni-Channel Sustainability 537
Technology

6 Business Intelligence, Data Science, GLOSSARY G-1


ORGANIZATION INDEX I-1
and Data Analytics 199
NAME INDEX I-3
SUBJECT INDEX I-4
7 Social Media and Semantic Web
Technology 249

8 Omnichannel Retailing, E-commerce,


and Mobile Commerce Technology 294

v
Contents
PREFACE xiii
2 Information Systems, IT
ACKNOWLEDGMENTS xviii
Infrastructure, and the Cloud 31
Case 2.1 Opening Case: The Amazing Story
PART 1 Emphasizing Local and of Tommy Flowers—Creator of the First
Programmable Computer 32
Global Sustainability in the on-Demand
Introduction 33
and Sharing economies 2.1 IS Concepts and Classification 34
IT Adds Value 34
1 Digital Transformation Six Components of an IS 35
Disrupts Companies, Data, Information, Knowledge, and Wisdom 36
Competition, and Careers Locally Types of Information Systems 37
Transaction Processing System 38
and Globally 1 Management Information System 40
Decision Support Systems 40
Case 1.1 Opening Case: Uber and Airbnb Innovative Executive Information System 41
Digital Business Models Facilitate Global ISs Exist within Corporate Culture 43
Expansion and Operational Resilience During the 2.2 IT Infrastructure, IT Architecture, and Enterprise
COVID-19 Pandemic 2 Architecture 43
Introduction 4 Adding Value with an EA 44
1.1 Doing Business in the On-Demand and Sharing Measuring EA Success 45
Economies 5 EA and Sustainability 46
Disruptive Digital Business Models 7 Developing an EA 47
IT’s Role in the On-Demand and Sharing EA Must Be Dynamic and Evolving 48
Economies 8 2.3 Data Centers and Cloud Computing 48
IT—Business Objectives 8 Data Centers 49
1.2 Business Process Improvement Data Virtualization 50
and Competition 10 Cloud Computing 53
What Is a Business Process? 11 Cloud Infrastructure 53
Improving Business Processes 12 Moving Workloads from the Enterprise to the
Don’t Automate, Obliterate! 12 Cloud 53
Competition 13 Cloud Services 54
1.3 IT Innovation and Disruption 15 Anything-as-a-Service (XaaS) Models 54
Social–Mobile–Analytics–Cloud (SMAC) Model 15 Selecting a Cloud Vendor 57
Technology Mega Trends 16 2.4 Virtualization and Virtual Machines 59
COVID-19 Accelerates Digital Transformation 18 Case 2.2 Business Case: Grupo AGORA Upgrades
Lessons Learned 19 IT to Quench the Thirst of Millions
1.4 IT and You 20 Throughout Spain   64
On-Demand ‘Gig’ Workers 21
IT Adds Value to Your Performance and Career 22
Managing and Interpreting Big Data Are High
3 Data Management, Data
Demand Skills 23 Warehouses, and Data
Becoming an Informed IT User 26 Governance 66
Case 1.2 Business Case: The IoT Comes to Sports 29
Case 1.3 Video Case: Creating a Digital Vision to Case 3.1 Opening Case: ThyssenKrupp Elevator Saves $1.5
Transform a Company and Improve the Customer Million and 900 Trees by Digitizing Documents 67
Experience   30 Introduction 68
vi
   Conten ts vii

3.1 Data Management 69 Local Area Network (LAN) 111


Database Technologies 69 Wide Area Network (WAN) 112
Databases 70 Intranets, Extranets, and Virtual Private Networks 113
Centralized Databases 71 Transmission Media and Speed 114
Distributed Databases 72 Network Components 115
Database Management System (DBMS) 73 Circuit Switching vs. Packet Switching 115
Elements of a DBMS 73 Network Applications 116
Benefits of a DBMS 79 4.2 Wireless Networks and Standards 117
DBMS Vendor Rankings 80 Differences Between 4G and 5G Networks 118
3.2 Data Warehouses and Data Marts 81 Advantages and Disadvantages of 5G 118
Moving Data from a Database to a Data Warehouse There Is a Growing Need for 5G 118
or a Data Mart 81 Wireless Network Standards 119
Building and Using a Data Warehouse 82 Wireless Connectivity 120
Real-Time Support from an Active Data Wireless Networks Use Different Transmission
Warehouse 83 Media 122
Data Lakes 85 Wireless Network Technologies 123
3.3 Data Governance and Master Data Management 4.3 Mobile Computing and the Internet of
(MDM) 85 Things (IoT) 127
Data Governance 85 Mobile Network Drivers 127
Master Data and Master Data Management (MDM) 87 More Smartphone Use 128
Benefits of Data Governance and Master Data More High-Capacity Networks 128
Management 89 Faster Broadband Speeds 128
Information Management 90 More Mobile Video 129
Data Life Cycle and Data Principles 90 Benefits of Mobile Computing 129
Harnessing Scattered Data 91 Mobile Technologies 129
Breaking Down Data Silos 91 Examples of NFC Applications and Their Potential
Culture Must Change 92 Business Value 131
Garbage In, Garbage Out 93 The Internet of Things 132
The Cost of Dirty Data 94 Factors Driving IoT 133
3.5 Electronic Document, Record, and Content IoT Architecture 133
Management 96 The Growth of IoT 134
Electronic Document Management 97 Advantages and Disadvantages of IoT 136
Electronic Document Management Systems 97 Edge Computing 137
Electronic Records Management 97 Edge Architecture and Apps 138
Legal Duty to Retain Business Records 98 Industry Applications of Edge
Electronic Records Management Systems 99 Computing 138
Enterprise Content Management 100 Choosing Mobile Computing Solutions 138
Enterprise Content Management Systems 100 Networks Support Communication, Search,
Choosing an EDMS, ERMS, or ECMS 100 Collaboration and Relationships 139
Case 3.2 Business Case: Dirty Data Jeopardize 4.4 Network Quality of Service 142
University Fundraising Efforts 104 Net Neutrality 142
Quality of Service Models 143
4 Networks, the Internet of Things Case 4.2 Business Case: Carnival Seeks to Keep
Passengers Happier at Sea with IoT, NFC,
(IoT), and Edge Computing 107 and Edge Computing 147

Case 4.1 Opening Case: Cedar Park, Texas Improves


Customer Communications to Empower Them 5 Data Privacy and Cyber
to Conserve Water through Its New Smart Water Security 149
Network 108
Introduction 109 Case 5.1 Opening Case: Yahoo Is Fined $117.5 Million
4.1 Network Fundamentals 109 for Worst Data Hacks in History 150
Business Functions Supported by Computer Introduction 151
Networks 110 5.1 Data Privacy Concerns and Regulations 152
Types of Networks 111 Confused, Concerned, and Out of Control 152
viii Co n ten ts

The Privacy Paradox 154 Four Phases of Decision-Making 202


Privacy Rights Are Civil Rights 154 Data Driven Decision-Making with Data Analytics 203
U.S. Consumer Protection Data Privacy Traditional and Modern Business
Regulations 154 Intelligence (BI) 204
U.S. State-Level Privacy Laws 155 Adding Value with Traditional and Modern BI 206
European Union’s General Data Protection Rules Finding and Hiring BI Professionals 207
(GDPR) 156 Software to Support BI Professionals 208
The EU-U.S. Privacy Shield 157 Data Science 210
Public Lack of Understanding 157 Adding Value with Data Science 212
5.2 Extent and Cost of Cyberattacks and Cyber Building a Data Science Team 213
Threats 158 Software to Support the Data Science Team 215
Unintentional Cyber Threats 161 6.2 Big Data and Advanced Data Analytics 217
Intentional Cyber Threats 161 Big Data 217
How Much Does a Cyberattack Really Cost The Four Vs of Big Data 218
an Organization? 169 Big Data Goals and Challenges 220
Cyberattack Targets and Consequences 170 Predictive Data Analytics 221
Most Prevalent and Deadly Cyber attack Prescriptive Data Analytics 223
Targets 170 6.3 Descriptive Data Analytics Tools 224
5.4 Defending Against Cyberattacks and Managing Adding Value with Data Mining 224
Risk 176 Adding Value through Learning, Exploration,
Cyber Defense Strategies 177 and Discovery with Data Visualization 226
Managing Risk 178 Dashboards Are Real Time 231
Securing Systems 179 Adding Value with Digital Dashboards 231
Backup and Recovery 181 Enterprise Mashup Architecture 233
Business Continuity Planning 182 Adding Value with Mashups 233
Disaster Recovery Services 183 6.4 Predictive and Prescriptive Data Analytics Methods
5.5 Regulatory Controls, Frameworks, and Techniques 234
and Models 184 Adding Value with Text Mining 235
General Defense Controls 185 Spatial Data Mining 235
Application Defense Controls 186 Geocoding 236
Auditing Information Systems 186 GIS Is Not Your Grandfather’s Map 237
Government Regulations 187 Infrastructure and Location-Aware Collection
Risk Management and IT Governance of Geospatial Data 238
Frameworks 187 Adding Value with Spatial Data Mining 238
Industry Security Standards 189 Geospatial Data Analysis Software 238
IT Security Defense-In-Depth Model 189 Regression Modeling 238
Case 3.2 Business Case: Multi-National Marriott Hotels Time-Series Regression 239
Could Face Consumer Backlash and up to $1 Adding Value with Regression 240
Billion in Regulatory Fines and Litigation Costs Adding Value with Optimization and Rules-Based
for Massive Data Breach 195 Decision-Making 241
Adding Value with Machine Learning 241
Case 6.2 Business Case: London Heathrow Airport
PART 2 Maximizing Growth with Data Launches BI and Machine Learning to Improve
Analytics, Social Media and Omni- Airfield Management, Predict Passenger Flow,
Channel Technology and Transform Airport Security 245
Case 6.3 Video Case: The Beauty of Data
6 Business Intelligence, Data Visualization 246
Science, and Data Analytics 199
7 Social Media and Semantic Web
Case 6.1 Opening Case: NASCAR Pushes the Envelope Technology 249
by Combining Big Data with Augmented Reality
in the World of Live Customer Engagement 200 Case 7.1 Opening Case: The Darkside of Digital
Introduction 201 Campaigns: Disinformation and Foreign
6.1 Business Intelligence and Data Science 202 Influence 250
  Contents ix

Introduction 251 Semantic Web for Business 282


7.1 Web 2.0—The Social Web Technologies 252 7.5 Recommendation Engines 283
The Constantly Changing Web 252 Case 7.2 Business Case: Facebook Helps Songkick Rock
A Platform for Services and Social Interaction 252 the Ticket Sales Industry 290
Emergence of Social Applications, Networks, Case 7.3 Video Case: Power Searching
and Services 253 with Google 291
Why Managers Should Understand Web
Technology 255
Communicating on the Web 255 8 Omnichannel Retailing,
Challenges and Opportunities for Business 257 E-commerce, and Mobile
7.2 Social Web Tools and Applications 258
Social Networking Services (SNS) 259
Commerce Technology 294
How Businesses Use Social Networking Services 260
Case 8.1 Opening Case: Amazon Pioneers New In-Store
E-commerce 2.0 and Social Commerce 261
Retail Concept 295
Private Social Networks 262
Engaging Consumers with Blogs Introduction 296
and Microblogs 262 8.1 Omnichannel Retailing 297
What Is the Purpose of a Blog? 262 Keeping Up with Consumer Demands
Blogging and Public Relations 262 and Behavior 297
Reading and Subscribing to Blogs 263 Digital Connections 299
Blogging Platforms 263 Consumers Still Love to Shop in Stores 299
Microblogs 263 Supply Chain Is More Important
Twitter 263 Than Ever 300
Consumer Mashups and RSS Technology 264 The Omnichannel Retailing Concept 301
RSS Technology 264 8.2 In-Store Retail Technology 303
Social Metrics and Monitoring Tools 264 Changes in Consumer Shopping
Enterprise 2.0: Workplace Collaboration Behavior 303
and Knowledge Sharing 266 In-Store Retailing Trends 303
Collaboration Tools 266 In-Store Tech Improves Convenience and Enhances
Social Tools for Information Retrieval, Knowledge the Shopping Experience 304
Management, and Sharing 266 8.3 E-commerce—Online Retailing 306
Social Bookmarking Tools 267 Types of E-commerce Markets 306
Content Creation and Sharing 267 Challenges to E-commerce 312
Shared Content Creation with Wikis 267 E-commerce Business and Strategic
Leveraging the Power of the Crowd: Crowdsourcing Planning 313
and Crowdfunding 268 8.4 Mobile Commerce 313
Crowdfunding 268 Mobile Advertising 314
Social Media Is More Than Facebook, YouTube, and Mobile Apps 315
Twitter 269 Information: Competitive Advantage in Mobile
7.3 Using Search Technology for Business Commerce 315
Success 270 QR Codes in Mobile Marketing 316
How Search Engines Work 270 Mobile Entertainment 317
How Crawler Search Engines Work 271 Hotel Services and Travel Go Wireless 317
Why Search Is Important for Business 274 Mobile Social Networking 318
Enterprise Search 274 8.5. Mobile Payment and Financial
Recommendation Engines 275 Services 319
Search Marketing 275 Mobile Payment Systems 319
Web Search for Business 276 Mobile Banking and Financial Services 320
Emerging Search Technologies 277 Short Codes 321
7.4 A Search for Meaning—Web 3.0 and Semantic Security Issues Questions 322
Technology 278 Case 8.2 Business Case: eBay—An E-commerce Pioneer
What Is the Semantic Web? 278 Faces New Challenges 326
The Language(s) of Web 3.0 279 Case 8.3 Video Case: Searching with Pictures Using
Semantic Web and Semantic Search 280 Mobile Visual Search 327
x Con ten ts

PART 3 Optimizing Performance and Introduction 365


10.1 Intro to Enterprise Systems 366
Growth with Business-Driven Systems, Types of Enterprise Systems 366
Artificial Intelligence and IT Strategy Integrating Legacy Systems 368
10.2 Enterprise Resource Planning 370
9 Functional Business Systems 330 Automating ERP 370
ERP and the IT Infrastructure 371
Case 9.1 Opening Case: Business Case: Equifax ERP Implementation Critical Success
Data Breach Highlights Need for Regulatory Factors 373
Compliance Changes in Financial Lessons Learned 374
Management 331 What’s New in ERP Systems? 375
Introduction 332 Selecting an ERP Vendor, Value-Added Reseller
9.1 Functional and Cross-Functional Business or Consultant 376
Processes 332 10.3 Supply Chain Management 378
Information Systems to Support Functional Business Automating the Supply Chain 378
Units 333 Managing the Three Supply Chain Flows 379
9.2 Production and Operations Management Electronic Data Interchange in the Order Fulfillment
Systems 336 and Logistics Process 380
Inventory Control Systems 337 Virtual Collaboration in the Supply Chain 382
Quality Management Systems (QMS) 339 Achieving a Fully Digitized Supply Chain 382
Computer-Integrated Manufacturing Systems 340 Four Technology Stages of Digital
Manufacturing Execution Systems 341 Adoption 383
Transportation Management Systems 342 Lessons Learned 386
Other POM Technologies 343 Leading SCM Systems Developers 387
9.3 Sales and Marketing Management Systems 344 10.4 Customer Relationship Management 387
Sales Management Systems 345 The CRM Process 388
Marketing Management Systems 346 Automating CRM 390
Social Media as a Marketing Management Customer Acquisition and Retention 390
Strategy 347 CRM for a Competitive Edge 391
9.4 Accounting, Finance, and Regulatory Compliance Implementing a CRM System 391
Systems 348 Lessons Learned 392
Accounting Systems 349 10.5 Communicating and Collaborating with Enterprise
Financial Planning and Budgeting Systems 349 Knowledge Management Systems, Enterprise
Regulatory Compliance Systems 351 Content Management Systems, and Enterprise
9.5 Human Resource Information Systems (HRIS) 355 Social Platforms 393
Employee Development 356 What Is Knowledge Management? 393
HR Planning, Control, and Management 356 Koenig’s Three Stages of
HRIS Move to the Cloud 357 KM Development 394
Case 9.2 Business Case: MAHLE GmbH Automating EKM 394
Partners with SAP and MHP to Digitalize Benefits of EKM System 395
Its Logistics and Product Development Techniques for Managing Knowledge in Group
Processes 361 Work 396
Enterprise Content Management (ECM) 398
Case 9.3 Video Case: Fuze Increases Its Sales
Purpose and Benefits of an ECM System 398
and Marketing Success with an Account-Based
Using an ECM System 399
Marketing System 361
Enterprise Social Platforms 399
Growth in the ESP Market 400
10 Enterprise Systems 363 Evolution of ESPs 401
Case 10.2 Business Case: Lowe’s Integrates Augmented
Case 10.1 Opening Case: High-Profile Food Recalls Reality and Robot Assistants into Its SCM and CRM
Prompt Walmart to Create a Safer, More Programs 406
Transparent, and More Efficient Global Food Case 10.3 Video Case: P&G—Creating Conversations
Supply Chain 364 with Global Consumers 407
  Contents xi

11 Artificial Intelligence, Robotics, IT-Enabled Service-Based Comparative


Advantage 456
and Quantum Computing 12.2 IT Strategic Planning, Process, and Tools 457
Technology 409 The Five Components of an IT Strategy 457
Identifying Value Drivers 458
Case 11.1 Opening Case: HSBC Adopts Machine A Reactive Approach to IT Investments Will Fail 458
Learning Artificial Intelligence to Fight Money Developing an IT Strategic Plan 458
Laundering 410 IT Strategic Planning Process and Tools 459
Introduction 411 Strategic Planning Tools 461
11.1 How AI Works 411 12.3 IT Sourcing Strategies and IT Service
Stages of Artificial Intelligence Development 412 Management 468
Types of Artificial Intelligence Machines 413 IT Offshoring 468
The Six Branches of Artificial Intelligence 414 IT Onshoring 469
11.2 AI Applications in Business and Society 419 Cloud Services 469
Adoption of AI Business Applications 419 IT Service Management 470
AI Maturity in Organizations 419 Levels and Types of IT Services 471
Current AI Use in Business and Society 421 Benefits of Using a Structured ITSM Strategy 475
Do All Businesses Need to Invest in AI? 423 The Outsourcing Life Cycle 476
AI Use in the Public Sector 424 Ask for “Proof of Concept” or a Trial Run 478
Barriers to AI Adoption and Use 425 Establishing and Managing IT Vendor
11.3 AI and Society (Ethics) 426 Relationships 478
Major Issues of Concern 426 Outsourcing Benefits 480
Work Automation and Job Loss 426 Outsourcing Risks and Hidden Costs 480
Privacy, Civil Rights, and Government Use of Artificial 12.4 Strategic Technology Trends 481
Intelligence 427 Scanning for Strategic Technology Trends 482
Unexpected Results When Bias Creeps Case 12.2 Business Case: Department of Defense (DOD)
into the Learning Process 428 Evaluates Technology to Gain Help for Crisis
11.4 Robotics 430 Victims and Protect First Responders 487
Types of Robotic Machines 430
11.5 Quantum Computing (QC) 436 PART 4 Building, Operating and
What Is Quantum Mechanics? 436 Managing Systems to Support
Quantum Computers 436
Challenges in Quantum Computing 437 Sustainable Business Practices During
Case 11.2 Business Case: Recommendation and After the COVID-19 Pandemic
Systems Powered by AI—Still Room for
Improvement 441 13 Systems Development, IT Service
Management and Project, Program
12 IT Strategy, Sourcing, and Strategic and Portfolio Management 490
Technology Trends 444
Case 13.1 Opening Case: VELCO Outsources Project
Case 12.1 Opening Case: San Diego County’s 20-Year Management and Brings in Politically Sensitive
Outsourcing Journey 445 Capital Project $6 Million Under Budget 491
Introduction 446 Introduction 492
12.1 IT Strategy and Competitive Advantage 447 13.1 Systems Development 493
Aligning IT Strategy and Business Strategy 447 The Systems Development Life Cycle 494
The Open Group Architecture Framework 13.2 Systems Development Methodologies 497
(TOGAF) 448 Waterfall Model 497
Resistance to Business–IT alignment 449 Object-Oriented Analysis and Design 498
Achieving and Sustaining a Competitive Agile Systems Development Methodology 499
Advantage—Locally and Globally 449 The DevOps Approach to Systems Development 501
Competitive Advantage Tools 450 Systems Development Tools and Techniques 503
Competing Globally 453 Choosing a Systems Methodology or Tool 505
xii Co n ten ts

13.3 Project, Program and Portfolio Management Code of Ethics 542


(PPPM) 506 IT Professionals’ Code of Ethics 543
Project Management 506 Developing an Ethics and Compliance
The Role of the Project Manager 507 Program 544
Program Management 509 Ethics Training in the Workplace 545
Portfolio Management 510 IT-Related Unethical Behavior 545
Putting It All Together 511 Discrimination in Social Media Recruiting 552
Why Projects Fail 512 Recruiting Regulations 554
The Project Management Office 513 Proving Social Media Discrimination 555
PPPM Frameworks 514 Protecting Companies and Candidates from Social
The Project Triple Constraint 515 Media Discrimination 556
Five Phases of the Project Management Life Providing a Secure and Respectful Workplace 557
Cycle 516 The Ethical Dilemma of Competing
13.4 Initiating, Planning, and Executing Projects 517 Responsibilities 558
Phase One: Project Initiating 517 14.2 ICT and Local Sustainability 559
Phase Two: Project Planning 520 The Triple Bottom Line and Sustainable
Phase Three: Project Execution 521 Development 560
13.5 Monitoring/Controlling and Closing Projects 522 Profits: “Green IT” Trumps Greenbacks 561
Phase Four: Project Monitoring People: Preserving Quality of Life 562
and Controlling 523 14.3 ICT and Global Sustainability 569
Phase Five: Project Closing 526 The Link between ICT and Climate Change 573
Achieving a High PMTQ 527 Climate Change Mitigation 574
Case 13.2 Business Case: It Took 10 Years and More Formal Climate Change Initiatives
Than $600 Million to Realize That Big Muscles, Not and Agreements 575
Computer, Can Best Move Baggage 532 Beyond Climate Change 576
Case 13.3 Demo Case: Mavenlink Project Management ICT and Sustainability in Developing Countries 577
and Planning Software 533 Barriers to ICT Acquisition, Implementation, and Use
in Developing Countries 582
Taking a People-First Approach to Technology 583
14 IT Ethics and Local and Global Sustaining Business in a Post-COVID-19 World 583
Sustainability 537 Case 14.2 Business Case: Spies vs. Pirates—La Liga
Fined Over Mobile App That Spied on Illegal Match
Case 14.1 Opening Case: Royal Bank of Scotland Screenings 588
Leverages Technology to Fulfill Its Strategy Case 14.3 Video Case: IT Ethics in the Workplace 589
to Build a More Sustainable Bank 538
Introduction 539 GLOSSARY G-1
14.1 An Introduction to Ethics 540 ORGANIZATION INDEX I-1
The Three Basic Tenets of Business and IT NAME INDEX I-3
Ethics 541 SUBJECT INDEX I-4
Preface
Information Technology for Management discusses the impor- yet easy-to-understand format by actively engaging students
tance of aligning business-IT strategies and explains how com- through a wider selection of case studies, interactive figures,
panies rely on data, digital technology, and mobile devices to chapter summaries, 34 whiteboard animations, tech notes,
support them in the on-demand and sharing economies and help self-check quizzes, online and interactive exercises, critical
them address the challenges of the COVID-19 pandemic. Our goal thinking questions, and crossword puzzles. We have enhanced
is to provide students from any business discipline with a strong the twelfth edition in the following ways:
foundation for understanding digital technology concepts and
terminology and the critical role that it plays in facilitating busi- Diverse Audience. Information Technology for Management
ness sustainability, profitability, and growth locally and globally. is directed toward undergraduate, introductory MBA courses,
The text also seeks to equip students with the information they and Executive Education courses in Management Informa-
need to become “informed users of IT.” Enabling technologies tion Systems and General Business programs. Concepts are
and related concepts, discussed in this text include the following: explained in a straightforward way, and interactive elements,
tools, and techniques provide tangible resources that appeal
• Sustainability. Cloud services, artificial intelligence, block- to all levels of students.
chain technologies, edge computing, and other disruptive
Strong Pedagogical Approach. To encourage improved
technologies are fundamental to sustaining business profit-
learning outcomes, we continue to employ a blended learn-
ability and growth in today’s on-demand and sharing econ-
ing approach, in which different types of delivery and learning
omies. These technologies play a critical role in developing
methods, enabled and supported by technology, are blended
and managing projects and sourcing agreements, address-
with traditional learning methods. For example, case study and
ing personal privacy, encouraging social responsibility and
theoretical content are presented visually, textually, and/or
attracting, connecting with and engaging employees, cus-
interactively to enable different groups of students to use differ-
tomers, and partners across omnichannel technologies to
ent learning strategies in different combinations to fit their indi-
promote sustainable business performance and growth.
vidual learning style and enhance their learning. Throughout
• Performance and Profitability. Combining the latest the book, general content has been reorganized and updated to
capabilities in descriptive, predictive, and prescriptive reflect the current state of new and previously included topics
data analytics, reporting, collaboration, search, and digital and 100 new informative static or interactive figures and 29 new
communication helps enterprises be more agile and cuts tables have been added to effectively visually demonstrate new
costs to optimize business performance and profitability. and expanded concepts. In addition, all cases and IT at Work
• Growth. Strategic technologies enable business to create vignettes have been updated or replaced, and learning objec-
new core competencies, expand their markets, and move tives have been updated to be more succinct and consistent
into new markets to experience exponential growth in the with new content. Finally, a chapter summary linked directly
on-demand and sharing economies locally and globally. to each learning objective has been added at the end of each
chapter.
In this twelfth edition, students learn, explore, and understand
Leading-Edge Content. Prior to and during the writing pro-
technology concepts and terminology and the importance of IT’s
cess, we consulted with a number of vendors, IT professionals,
role in supporting the three essential components of business
and managers who are hands-on users of leading technologies,
performance improvement: technology, business processes, and
to learn about their IT/business successes, challenges, experi-
people. This edition has a greater focus on the global impacts of IT
ences, and recommendations. To integrate the feedback of
and includes discussions of the impact of the COVID-19 pandemic
these business and IT professionals, new or updated chapter
on the ways technology is enabling organizations to connect with
opening and closing cases have been added to many of the
employees, customers, and partners and to use disruptive tech-
chapters along with the addition of relevant, leading-edge con-
nologies in new and innovative ways to get the job done!
tent in the body of the chapters.
New Technologies and Expanded Topics. New to this edition
What’s New in the Twelfth are the topics of artificial intelligence, quantum computing,
edge computing, cognitive knowledge management and block-
Edition? chain technology. Also included are updates to the IT frame-
work, expanded coverage of data science and advanced data
In the twelfth edition of Information Technology for Manage- analytics and the tools and techniques that support them, the
ment, we present and discuss concepts in a comprehensive, newest systems developments methodologies, and expanded

xiii
xiv P r eface

coverage of the Project, Program, and Portfolio Management Learning Aids. Each chapter contains various learning aids,
framework. Table P-1 provides a detailed list of new and which include the following:
expanded topics.
• Learning Objectives are listed at the beginning of each
Useful Tools and Techniques. The “IT Toolbox” feature pro- chapter and repeated at the beginning of each relevant
vides a skills-based takeaway tool or technique that the stu- section to help students focus their efforts and alert
dents can use in future courses and their upcoming career. them to the important concepts that will be discussed.
In the twelfth edition, it has been revised and/or updated to
• IT at Work boxes spotlight real-world cases and innova-
reflect new content in the text. New to this edition is a fea-
tive uses of IT.
ture we call “Did You Know?” This feature appears at the
beginning of the main text of each chapter and delivers some • Tech Note boxes explore topics such as “Key Performance
interesting and often “fun” facts related to the technologies Indicators” and “Six Basic Systems Development Guide-
discussed within the chapter content and is designed to more lines.”
effectively capture the students’ interest at the beginning of • Career Insight boxes highlight different jobs in the IT
each chapter. for management field.
• Chapter Summary directly tied to learning objectives is
included to close out each chapter.
Engaging Students to Assure • Key Terms definitions appear in the margins throughout
the book and listed at the end of each chapter.
Learning End of Chapter Activities. At the end of each chapter,
features designed to assure student learning include the
The twelfth edition of Information Technology for Manage- following:
ment engages students with up-to-date coverage of the most
important IT trends today. Over the years, this IT textbook has • Critical Thinking Questions are designed to facilitate
distinguished itself with an emphasis on illustrating the use of student discussion.
cutting-edge business technologies for supporting and achiev- • Online and Interactive Exercises encourage students
ing managerial goals and objectives. The twelfth edition contin- to explore additional topics.
ues this tradition with more interactive activities and analyses.
• Analyze and Decide questions help students apply IT
Real-World Case Studies. Each chapter contains numer- concepts to business decisions.
ous real-world examples illustrating how businesses use IT to • Reinforce Your Learning A crossword puzzle is available
increase productivity, improve efficiency, enhance commu- for each chapter in the online resources to reinforce and
nication and collaboration, and gain a competitive edge. Fac- test the students’ understanding of key terms.
ulty will appreciate a variety of options for reinforcing student
• Concept Check Questions in the enhanced e-book
learning, that include three different types of Case Studies
test student comprehension of each learning objective
(opening case, business case, and video case), along with IT at
within a chapter. To ensure that the students are “clear
Work vignette.
on the concepts” and provide immediate feedback on
Interactive Figures. The unique presentation of interactive their performance.
figures enhances the students’ comprehension of concepts by
actively engaging the students in their own learning to effec-
tively reinforce concepts and learning objectives.
Whiteboard Animations. These features tied to chapter learn- Details of New and Enhanced
ing objectives reinforce understanding of the textual content of
the book and provide a clearer path to understanding key con- Features of the Twelfth
cepts through a multimedia overview of each learning objec-
tive. The 34 whiteboard animations fit particularly well with the Edition
“flipping the classroom” model that has become increasingly
important during the COVID-19 pandemic and complement The textbook consists of 14 chapters organized into 4 modules.
additional functionality and assets offered throughout the All chapters have new or updated cases and content, as shown
twelfth edition. in Table P-1.
  Preface xv

TA B LE P- 1 Summary of New and Expanded IT Topics, Cases, and IT at Work Vignettes

New and Updated Cases and


Chapter New and Expanded IT and Business Topics IT at Work
1. D
 igital Transformation Disrupts • IT’s role in the sharing economy • Uber
Companies, Competition, and • IT impact on global economy • Airbnb
Careers Locally and Globally
• Technology mega trends • Coca-Cola
• Costa Coffee
• Creating a Digital Vision
• IoT
• Kroger
• Netflix

2. I nformation Systems, IT Infra- • IS concepts and framework • Tommy Flowers, Father of Computing
structure, and the Cloud • Information, information, knowledge, wisdom model • Lufthansa Technik
• Software-defined data center • Grupo AGORA

3. D
 ata Management, Data Ware- • Data lifecycle • ThyssenKrupp Elevator
houses, and Data Governance • Genomics and big data • PwC and Energy Sector
• Blockchain technology • Master Data in Healthcare
• Cognitive knowledge management • Predictive Policing Systems
• ERMS in Action
• University of Washington

4. N
 etworks, the Internet of Things • Net neutrality status • Cedar Park Smart Water
(IoT), and Edge Computing • Mobile networks and near-field communication • Minnesota Twins Audio Network
• Internet of things • Ericsson in Africa
• Edge computing • Salvation Army
• States Take on Net Neutrality
• Carnival Cruise Lines

5. D
 ata Privacy and Cyber Security • Data breaches • Yahoo
• Major sources of cyberthreats • Google
• Cryptojacking • Oregon DHS
• Man-in-the middle attacks • Bayer
• SQL injection • Kenya protects citizen data
• Data privacy • Marriott

6. B
 usiness Intelligence, Data • Social search technologies • NASCAR
Science, and Advanced • Descriptive data analytics
Data Analytics
• Predictive data analytics
• Prescriptive data analytics
• Tools and techniques to support all levels of
data analytics

7. S
 ocial Media and Semantic Web • Social bookmarking • Digital Campaigns
Technology • Social customer service moves from optional • Google
to essential • Amazon Neptune
• Role of APIs in development of new Web applications • Best Buy
and functionality
• Facebook
• The dominance of Facebook and the demise
of Google+ • Power Searching with Google

• Semantic Web and semantic search technologies


• Social commerce, video conferencing, and remote
work during COVID-19

(Continued)
xvi P r eface

TA BLE P- 1 Summary of New and Expanded IT Topics, Cases, and IT at Work Vignettes (Continued)

New and Updated Cases and


Chapter New and Expanded IT and Business Topics IT at Work
8. Omnichannel Retailing, E-Com- • Role of convenience in shaping retail markets • Amazon
merce, and Mobile Commerce • Direct and marketplace B2B ecommerce • Kroger
Technology
• Grab and go retailing • Macy’s
• Subscription-based retailing • Personalizing E-commerce
• In-store retail technology • Dunkin Donuts
• Omnichannel retailing • Bay Area Relief
• Growth of mobile commerce • eBay
• Fulfillment as a service (FaaS) • MVS
• Mobile payment methods
• Impact of 5G networks on retailing
• Expanded use of digital voice assistants (DVAs) for
retail search, research, and ordering

9. Functional Business Systems • Cross-functional coordination and integration • Equifax


of systems • MAHLE and SAP
• Chatbot Marketing
• THULE
• SaaS and Global HR
• MAHLE
• FUZE

10. Enterprise Systems • Always-on supply chain • Walmart


• Enterprise social platforms • FUZE
• UPS
• 1-800-Flowers.com
• CISCO
• Lowes

11. Artificial Intelligence, Robotics, • Artificial intelligence (AI) • HSBC


and Quantum Computing • Ethical issues associated with AI • Facebook
Technology
• Robotics • HUBSPOT
• Work automation • Facial Recognition
• AI-powered sentiment analysis, predictive analytics • Hanson Robotics
and content management systems • Recommendation Systems
• Quantum computing

12. IT Strategy, Sourcing, and Stra- • IT sourcing strategies • San Diego County
tegic Technology Trends • Strategic technology trends • Nations and Comparative Advantage
• Balanced Scorecard
• ESSA Academy
• DOD and CBRN Technology

13. Systems Development, IT • New systems development methodologies • VELCO


Service Management and • DevOps • Oakley
Project, Program and Portfolio
Management • IT service management • Target
• Project, program, and portfolio • Steve Jobs
management Framework • BER
• Denver International Airport
  Preface xvii

TA B LE P- 1 Summary of New and Expanded IT Topics, Cases, and IT at Work Vignettes (Continued)

New and Updated Cases and


Chapter New and Expanded IT and Business Topics IT at Work
14. I T Ethics and Local and Global • Sustainability in developing countries • Royal Bank of Scotland
Sustainability • Climate change update • Facebook
• Access to clean water • Users Leaving Social Media
• Food security • Blockchain and Sustainability
• Impact of technology on various aspects of quality of • La Liga
life before, during, and after the COVID-19 pandemic
• Tech-Clash and an increased need for a ‘People First’
approach to technology amid the COVID-19 pandemic
• Disruptive Technologies to address the challenges of
the COVID-19 pandemic

Supplemental Materials • Respondus Test Bank. This electronic test bank is a pow-
erful tool for creating and managing exams that can be
printed on paper or published directly to Blackboard,
An extensive package of instructional materials is available ANGEL, Desire2Learn, Moodle, and other learning systems.
to support this twelfth edition. These materials are accessible Exams can be created offline using a familiar Windows
from the book companion website at www.wiley.com/go/turban/ environment, or moved from one LMS to another.
infotechformgmt12E
• PowerPoint Presentations. A series of slides designed
around the content of the text incorporates key points
• Instructor’s Manual. The Instructor’s Manual presents from the text and illustrations where appropriate.
objectives from the text with additional information to
• Chapter Summary Whiteboard Animations. A library of
make them more appropriate and useful for the instructor.
34 video animations—“chunked” by learning objectives in
The manual also includes practical applications of con-
each chapter—summarizes the content of each chapter in
cepts, case study elaboration, answers to end-of-chapter
an entertaining visual way to engage the students in grasp-
questions, questions for review, questions for discussion, ing the subject matter and providing an easily accessible
and Internet exercises. audio track for those who are visually impaired.
• Test Bank. The test bank contains over 1,000 ques- • Crossword Puzzles. A set of online crossword puzzles that
tions and problems (about 75 per chapter) consisting test and reinforce student understanding of key terms in a
of multiple-choice, short answer, fill-ins, and critical fun and interactive way.
thinking/essay questions.
xviii P r eface

Acknowledgments
No book is produced through the sole efforts of its authors, and Robert Goble, Dallas Baptist University
this book is no exception. Many people contributed to its crea- Eileen Griffin, Canisius College
tion, both directly and indirectly, and we wish to acknowledge
Binshan Lin, Louisiana State University in Shreveport
their contributions.
First, a special thank you goes to the team at John Wiley, Thomas MacMullen, Eastern Illinois University
including Lise Johnson, Business Publisher and ­ Jennifer James Moore, Canisius College
Manias, Editor, who shared their expert and encouraging Beverly S. Motich, Messiah College
editorial insights, Judy Howarth, Sr. Managing Editor, who
Barin Nag, Towson University
provided much appreciated project management leadership,
Padmapriya Soundarajan, Senior Production Editor, who L uis A. Otero, Inter-American University of Puerto Rico,
offered valuable guidance throughout the production process, Metropolitan Campus
and Aarthi Ramachandran, Permissions Specialist, whose John Pearson, Southern Illinois University
extensive and expert research into the images used in the text Daniel Riding, Florida Institute of Technology
greatly enhanced the overall “look” of this edition.
Josie Schneider, Columbia Southern University
Many thanks also to our talented graphic designer and
Appalachian State University alumni, Nathan Sherrill, who cre- Derek Sedlack, South University
ated the innovative Whiteboard Animations for Chapters 7, 8, Eric Weinstein, The University of La Verne
and 11. Patricia White, Columbia Southern University
Their combined skill, patience, humor, and support during Gene A. Wright, University of Wisconsin–Milwaukee
the development and production of this most recent version of
the text made the process much easier. Last, but by no means least, we extend our very special
Our sincere thanks go to the following reviewers of the thanks to our families, friends, and colleagues who provided
twelfth edition whose valuable feedback, insights, and sugges- enormous encouragement, support, and understanding as
tions were invaluable in ensuring the accuracy and readability we dedicated the necessary time and effort to create this new
of the book: edition amid the turmoil of the COVID-19 pandemic. Their
unfailing support and the power of information and communi-
Joni Adkins, Northwest Missouri State University cations technology enabled us to bring the twelfth edition in on
Ahmad Al-Omari, Dakota State University time and on budget!
Rigoberto Chinchilla, Eastern Illinois University
CAROL POLLARD
Michael Donahue, Towson University GREGORY WOOD
Samuel Elko, Seton Hill University
CHAPTER 1

Digital Transformation Disrupts


Companies, Competition,
and Careers Locally and Globally
CHAPTER OUTLINE LEARNING OBJECTIVES

Case 1.1 Opening Case: Uber and Airbnb I­ nnovative


Digital Business Models Facilitate Global Expan-
sion and Operational Resilience ­During the COVID-
19 Pandemic

1.1 Doing Business in the On-Demand and 1.1 Define the differences between the on-demand and sharing
Sharing Economies ­economies and the six business objectives IT should focus on
to enhance organizational performance, growth, and sus-
tainability.

1.2 Business Process Improvement and 1.2 Explain the role of IT in improving business processes.
Competition ­Understand the concepts of business process reengineering
and competitive advantage.

1.3 IT Innovation and Disruption 1.3 Describe how IT is disrupting the way that companies operate,
the IT megatrends that are driving organizational performance,
growth, and sustainability and how COVID-19 is accelerating
digital transformation.

1.4 IT and You 1.4 Discuss what it means to be an “informed user” of IT and the
ways in which IT can add value to your career path and job
performance.

Case 1.2 Business Case: The IoT Comes to Sports

Case 1.3 Video Case: Creating a Digital Vision to


Transform a Company and Improve the Customer
Experience

1
2 CHA PT E R 1 Digital Transformation Disrupts Companies, Competition, and Careers Locally and Globally

Case 1.1 Opening Case

Mr.Whiskey/Shutterstock.com

hh5800/iStock/Getty Images

© 2020 Airbnb, Inc


Uber and Airbnb Innovative Digital Business Models and pressing the middle button for several seconds (a long press), cus-
tomers can order a ride to their current location, selecting the kind of
Facilitate Global Expansion and Operational car they want. Payment is automatically charged to the credit card on
Resilience During the COVID-19 Pandemic file with receipts via e-mail.
The Uber concept developed in response to scarcity of taxies. It
Almost every new startup wants to disrupt some traditional industry
started on a snowy Paris night in 2008 when the two founders could
with a digital solution. Two of the most ingenious and most-valuable
not get a cab. They wanted a simple app that could get them a car
startups to achieve this goal are Uber and Airbnb. For example, most
with a tap. On June 1, 2015, the entrepreneurs celebrated Uber’s fifth
consumers who tap an Uber app to get a ride would never consider
anniversary and announced that the company had grown into a trans-
dialing an 800 number for a taxi. With all transactions performed by
portation network covering 311 cities in 58 countries in North and
apps and automated processes, the entire process from hailing to pay-
South Americas, Europe, Africa, Asia Pacific, and the Middle East. By
ing for a ride is slick, quick, and easy and eliminates the use of cash or
mid-­2018, their global presence had grown tremendously over the past
credit cards at the time of service. Similarly, Airbnb provides an easy-­
few years, and to achieve this phenomenal growth Uber has invested in
to-­use digital platform to offer accommodations, dining, and leisure
new and developing technologies and partnerships. For example, the
activities to guests worldwide with the click of a couple of buttons.
company partnered with Carnegie Mellon University to build robotic
New Economies and COVID-19 Require New Digital cars and purchased deCarta, a 40-person mapping start-up to reduce
Business Models its dependence on Google Maps.
Uber and Airbnb are popular examples of companies that devel- Airbnb Access-over-Ownership Business Model
oped new digital business models to transform slow-to-innovative
Another disruption to a traditional industry occurred when Airbnb
industries. A simple definition of a business model is the way a com-
blindsided the hotel industry. Airbnb—probably the most global of
pany generates revenue and makes a profit. On-demand and sharing
the new startups—allows anyone with a spare apartment or room to
(access-over-ownership) business models provide real-time fulfill-
run their own bed and breakfast by giving them a technology plat-
ment of goods and services, which have attracted millions of users
form to market themselves to a global market. Just click a few buttons
worldwide. These models fit best when speed and/or convenience
on Airbnb’s website and type up a brief description of your property
matter the most. The ground transportation, grocery, and restaurant
and its amenities, and your spare room can become a new source of
industries are examples of hyper-growth categories in the on-demand
income! By 2016, Airbnb hosts had accommodated 40 million guests
world. The home-based accommodation and bicycle/scooter rental
in its 1.5 million listings in 34,000 cities in 190 countries. In mid-2018,
industries are good examples of high-growth categories in the sharing
Airbnb had accommodated over a whopping 150 million guests in 4
economy. Currently, forward-thinking companies that have reaped the
million listings—including 1,400 castles—in 65,000 cities and 191 coun-
benefits of rethinking their business models by applying digital solu-
tries around the globe. In comparison, Hilton, InterContinental, and
tions to reshape their industries are now adapting their business mod-
Marriott, the largest hotel chains in the world, have less than one mil-
els by utilizing technology in even more new and creative ways to meet
lion rooms each.
the demands and uncertainties of the COVID-19 pandemic. The sharing
economy has been severely impacted by COVID-19 causing companies
Business Success of Uber and Airbnb in terms of Company
like Uber and Airbnb to make creative adjustments and develop new
strategies to ensure their customers feel safe and how they will need to Valuation, Growth, and Globalization
operate in the ‘new normal.’ The ride-hailing app Uber and the housing rental app Airbnb are two
of the most valuable start-­ups, as displayed in Figure 1.1. Valua-
Uber On-Demand Business Model tion of a company at its early stages is based heavily on its growth
Uber disrupted the taxi industry with a workforce that is essentially any potential and future value. In contrast, the valuation of an estab-
person with a smartphone and a car. Location-aware smartphone apps lished company is based on its present value, which is calculated
bring drivers and passengers together, while in-app accounts make the using traditional financial ratios and techniques related to revenues
cashless payment process effortless. By simply opening the Uber app or other assets.
   Digital Transformation Disrupts Companies, Competition, and Careers Locally and Globally  3

Airbnb Uber

Started in 2008
Founders Nathan Blecharczyk, Started in 2009 as UberCab
Brian Chesky and Joe Gebbia
Founder Garrett Camp wanted
couldn't pay their rent so they
rented out space in their to tackle taxi shortage in
apartmentto travelers. First San Francisco
venture funding was $20,000 USD

Uber epitomizes disruption


Leading Disrupter in the global
Changed the way customers
accommodation rental market
think about grabbing a ride

By 2019, Uber was valued at


As of April 2019, Airbnb was
62 billion USD and 3.9 million
valued at $38 billion USD and
Uber drivers had driven 99
had hosted 500 million guests
million active users in 700
in 6 million listings worldwide.
cities worldwide

In 2019, Uber had a 87.6%


By end of 2020 projected
market share of rideshare
revenue will be approximately
drivers in the US and revenue
$8.5 billion USD
was 11.3 billion USD

FIGURE 1.1    Innovative business models of Airbnb and Uber have been extremely successful.

Uber’s massive market value—estimated at $60 billion—is greater China, Russia, and Southeast Asia. Despite setbacks, it has been able
than 80% of all Standard & Poor (S&P) 500 companies, many of which to salvage market share in these countries by retaining a substantial
have been around for 25, 50, or 100 years. Currently, investors value share in joint ventures with local rivals such as Yandex.Taxi (https://
Airbnb at $31 billion—rivaling that of hotel giant Marriott International. taxi.yandex.ru) and Grab (https://www.grab.com/sg). More recently,
To achieve their phenomenal local and global growth, both Uber Uber has shifted its focus to countries where it is convinced it can win,
and Airbnb have used some interesting technology-enabled strategies. including India, Middle East, and North Africa, and has a particular
For example, Uber has been aggressive in going global. It uses “Ambas- interest in Saudi Arabia where Uber is focusing on recruiting female
sadors” who are paid to recruit new drivers from its competitor Lyft drivers who have only recently been allowed to drive there. Despite its
using an automated hiring, recruitment, and onboarding system that is optimism that its business model will be successful in these parts of
far more efficient than the process used by traditional taxi companies. the world, local competitors there also present undisputed barriers to
Ambassadors also offer free rides to new customers to advertise Uber Uber’s ultimate success. For example, Uber sold its Chinese business to
by word of mouth in new cities, and drones are used to recruit new driv- Didi Chuxing in 2016, putting an end to its very expensive, high-stakes
ers and customers around the globe! Once a customer base has been battle over the lucrative Chinese market.
established, Uber founder, Travis Kalanick, then actively lobbies gov- On the other hand, Airbnb growth strategies include develop-
ernors worldwide to write new laws that favor Uber’s business model. ing new services to enhance their guests’ travel experience, such as
However, globalization hasn’t all been plain sailing for Uber. creating “Airbnb Plus - a listing of homes verified for quality and com-
Since 2011, when Uber first expanded its services outside of the United fort” and identifying “Superhosts” who have consistently been rated
States, Uber has encountered resistance in several countries such as highly by previous guests. They have also added “Travel Experiences”
4 CHA PT E R 1 Digital Transformation Disrupts Companies, Competition, and Careers Locally and Globally

to allow their guests insider access to unexpected places together 2020 Airbnb reported that bookings for entire homes and cabins and
with a list of restaurants that have been recommended by many of cottages in secluded areas increased significantly causing their gross
their guests. But, Airbnb’s most effective growth strategy has been booking value to grow for the first time since February 2020 and on
increasing the number of countries where its services are offered. August 19, 2020 it filed with the Security Exchange Commission (SEC)
For example, since Airbnb unveiled its French platform in 2012, it has to ‘go public’. In another creative move, Uber transformed itself from
gone from strength to strength with a staggering 8.5 million French a solely ridesharing venture to a food delivery service. Consequently,
people using Airbnb properties between June 1 and August 31, 2019. their new mobile app ‘Uber Eats’ has become their key revenue gener-
This strategy, however, has presented Airbnb organizers with ator amidst COVID-19. In creating Uber Eats, Uber offered restaurants
some very interesting challenges that include handling a total of 65 dif- a new way to connect with their customers and inject a modicum of
ferent currencies, translating host listings between countries, dealing positivity among the bad news plaguing the world during and after
with foreign law agencies, and offering country-specific sign-up meth- COVID-19. In quickly reacting to the unforeseen events of COVID-19,
ods. For example, although Facebook or Google accounts work in the Uber and Airbnb have demonstrated the power of on-demand and
United States, these are not the best sign-up methods in other parts of sharing economy companies to make swift and significant adjust-
the world, and just by allowing travelers to use Weibo (https://www. ments to their business models by digitally transforming themselves.
weibo.com/us) and WeChat (https://www.wechat.com/en), Airbnb is At the end of the day, it is clear that technology plays a huge part
able to grow its customer base in China by 700%. in both enabling innovative products and services to facilitate local
and global success by allowing gig workers and consumers in the on-
Uber and Airbnb Retool their Digital Business Models to demand and sharing economies to seamlessly connect with business
Build Resilience during the COVID-19 Pandemic services 24 hours a day, 365 days a year despite important cultural dif-
While globalization has presented highly valued start-ups like Uber and ferences and the challenges of COVID-19.
Airbnb with huge opportunities for growth, the COVID-19 pandemic
presented them with some daunting business challenges as people Questions
around the globe were told to stay home. In the early days of the pan- 1. In what ways are the Uber and Airbnb business models similar
demic, both Uber and Airbnb were faced with a significant downturn in and different?
demand as far fewer people took rides or sought accommodations for 2. What challenges did Uber and Airbnb face when they
vacation or business, during COVD-19 lockdowns and Airbnb’s plans to went “global”?
file a request to ‘go public’ were waylaid by pandemic-related turmoil
3. What growth strategies are benefiting the global success of Uber
in the stock market. This initial reaction has been followed by ongoing
and Airbnb? How do they differ?
government and customer concerns about general health and safety
issues associated with the pandemic. As a result, on-demand and shar- 4. How has technology helped or hindered Uber and Airbnb in the
ing economy companies have been forced to make significant adjust- growth of their global business?
ments in response to unforeseen events and recent data show that 5. In what ways has the COVID-19 pandemic impacted Uber
their businesses are growing again thanks to agile thinking and crea- and Airbnb?
tive adjustments they have made to their business models. For exam-
ple, Airbnb made efforts to increase the variety of the accommodations Sources: Compiled from Solomon (2016), Hawkins (2017), Henshall (2017),
they offer and use technology to broadcast their new offerings. In June Domat (2018), Ledsom (2019), Airbnb.com, and Uber.com, Overstreet (2020).

DID YOU KN OW ?
That gig economy is a new buzzword that refers to the rise in contracted work—or “gigs”—that
aren’t traditional jobs. Examples of these are ridesharing, home and apartment rentals, and
food delivery and are made possible using apps and mobile devices. As many as one in every five
jobs are currently contracted and it is estimated that over half of the U.S. workforce could find
themselves doing contract or freelance work over the next decade. An example of “gig” work and
how it affects the economy was offered in our opening case.

IT architectures guide the


process of planning, acquiring,
building, modifying, and interfac-
Introduction
ing with deployed IT resources
Many forward-thinking managers and entrepreneurs are digitally transforming their existing
in a single department within an
organization. business models and reinventing their businesses. In a recent industry study, 87% of senior busi-
ness leaders said digital transformation is a company priority and 79% of corporate strategists
Legacy systems are older infor- said they are reinventing their business and creating new revenue streams in new ways (Gartner,
mation systems that have been
2019). By no longer operating and maintaining outdated and complex IT architectures with a
maintained over several decades
because they fulfill critical needs. mix of legacy systems that can delay or prevent the release of innovative new products and
   Doing Business in the On-Demand and Sharing Economies 5

services and absorb large portions of the information technology (IT) budget, companies can
add value, increase their customer base, expand their business capabilities, and increase profits.
Companies such as Uber (https://www.uber.com), Airbnb (https://www.airbnb.com)
Shyp (http://shyp.com), TaskRabbit (https://www.taskrabbit.com), and Lyft (https://www.
lyft.com) are leveraging IT to create exciting new business models and revolutionize the
way workers, businesses, and customers interact and compete. Peter Hinssen, a well-known
business author, university lecturer, and digital consultant, described the change in digital
technology as follows:

Technology used to be nice. It used to be about making things a little bit better, a little
bit more efficient. But, technology stopped being nice: it’s disruptive. It’s changing our
business models, our consumer markets, our organizations. (MacIver, 2015)

As businesses continue to change their business models to accommodate the needs of


the on-demand and sharing economies, IT professionals must constantly scan for innovative
new technologies to provide business value, help shape the future of the business, and facili-
tate performance and growth in local and global markets. For example, smart devices, mobile
apps, sensors, and technology platforms—along with increased customer demand for digital
­interactions and on-demand and shared services—have moved commerce in fresh new direc-
tions. We’ve all heard the phrase “there’s an app for that,” and that kind of consumer thinking
drives the on-demand and sharing economies.
Business leaders today need to know what steps to take to get the most out of mobile,
social, cloud, big data, analytics, visualization technologies, artificial intelligence and the Inter-
net of Things (IoT) to move their business forward and enable new on-demand and sharing
business models. Faced with opportunities and challenges, managers need to know how to
leverage IT earlier and more efficiently than their competitors.
A goal of this book is to empower you to improve your use and management of IT by
raising your understanding of IT terminology, practices, and tools and developing your IT skills
to transform you into an informed IT user. Throughout this book, you will learn how digital
technology is transforming business and society at all levels as the IT function takes on a key
strategic role that determines an enterprise’s success or failure. You will also be provided with
an in-depth look at IT trends that have immediate and future capacity to influence products,
services, competition, and business relationships. Along the way, we’ll describe many ways in
which IT is being used and can be used in business and provide you with the some of the termi-
nology, techniques, and tools that enable organizations to leverage IT to improve their growth,
performance, and sustainability.
In this opening chapter, you will learn about the powerful impacts of digital technology on
people, business, government, entertainment, and society that are occurring today. You will also
discover how leading companies are deploying digital technology and changing their business
models, business processes, customer experiences, and ways of working. We will present exam-
ples of innovative products, services, and distribution channels to help you understand the
digital revolution that is currently shaping the future of business, economy, and society and
changing management careers. And, we’ll explain why IT is important to you and how becoming
an “informed user” of IT will add significant value to your career and overall quality of life.

Doing Business in the On-Demand


1.1

and Sharing Economies


LO1.1 Define the differences between the on-demand and sharing economies and the six business
objectives IT should focus on to enhance organizational performance, growth, and sustainability.

The on-demand and sharing economies are revolutionizing commercial activities in businesses
around the world. The businesses in these new economies are fueled by years of technology
innovation and a radical change in consumer behavior. As companies become more highly digi-
tized, it becomes more and more apparent that what companies can do depends on what their
6 CHA PT E R 1 Digital Transformation Disrupts Companies, Competition, and Careers Locally and Globally

IT and data management systems can do. For over a decade, powerful new digital approaches
to doing business have emerged. And there is sufficient proof to expect even more rapid and
dramatic changes due to IT breakthroughs and advances.
In market segment after market segment, mobile communications and technology stacks
On-­demand economy is the make it financially feasible for companies to bring together consumers and providers to pur-
economic activity created by chase or share products and services. These capabilities have created the on-demand economy
technology companies that fulfill and the sharing economy. As Ev Williams, cofounder of Twitter (https://twitter.com/home) says,
consumer demand through the
immediate provisioning of prod- The internet makes human desires more easily attainable. In other words, it offers
ucts and services.
convenience. Convenience on the internet is basically achieved by two things: speed,
Sharing economy is an eco- and cognitive ease. If you study what the really big things on the internet are, you
nomic system in which goods or realize they are masters at making things fast and not making people think.
services are shared between pri-
vate individuals, either free or for a The proliferation of smartphone-connected consumers, simple and secure purchase flows,
fee, typically arranged through an and location-based services are a few of the market conditions and technological innovations
online company or organization. that are propelling the explosion of on-demand and shared services.
Just as the rapid growth of online-only Amazon (https://www.amazon.com) and eBay trans-
formed retail, the even faster growth of app-driven companies, such as Uber, Airbnb, and Grubhub
(https://www.grubhub.com), has disrupted the taxi, hotel, and restaurant markets. As you read in
the opening case, in six short years, Uber changed the taxi industry as it rose from start-up to the
world’s most valuable private technology company, and Airbnb tackled the fiercely competitive
hotel market and attracted more than 60 million customers to become the third most valuable
venture-capital-backed company in the world. Another example is Grubhub who became No. 1
in online food ordering, controlling over 20% of that $9 billion market. What today’s successful
technology businesses have in common are platform-based business models. Platforms consist
of hardware, software, and networks that provide the connectivity for diverse transactions, such
as ordering, tracking, user authentication, and payments. These business models are designed to
serve today’s on-demand economy, which is all about time (on-demand), convenience (tap an app),
and personalized service (my way). For example, millennials want the ease of online payment over
cash and insist on efficiency for all aspects of their lives, including shopping, delivery, and travel.
Key strategic and tactical questions that determine an organization’s profitability and
management performance are shown in Figure 1.2. Answers to each question require an
understanding of the capabilities of mundane to complex IT, which ones to implement and
how to manage them.

• What do we do?
Strategic direction: • What is our direction?
industry, markets,
and customers
• What markets & customers should
we be targeting and how do we
prepare for them?

• How do we do it?
Business model • How do we generate revenues &
profits to sustain ourselves and
build our brand?

Business
• How well do we do it?
processes,
producers, • How can we be more
and technology efficient?

FIGURE 1.2    Key strategic and tactical questions.


   Doing Business in the On-Demand and Sharing Economies 7

Disruptive Digital Business Models


Digital transformation drives radical changes in business models to enable organizations to Business model is a company’s
provide goods and services to customers in the way they want them delivered, when they want core strategy for making a profit.
them, and where they want to have access to them. It defines the products and/or ser-
vices it will sell, its target market,
Companies that adopt digital business models are better positioned to take advantage of costs associated with doing busi-
business opportunities and survive. Figure 1.3 describes seven highly disruptive business ness, and the company’s ongoing
models and some of the companies that use them to differentiate their products and services. plans for achieving its goals.
Today, a top concern of well-established corporations, global financial institutions, born-­
Digital business model presc­
on-­the-­Web retailers, and government agencies is how to design their digital business model to
ribes how businesses make money
and meet their goals using digital
• Deliver an incredible customer experience
technology, such as websites,
• Turn a profit social media, and mobile devices.
• Increase market share
• Engage their employees

Business Model • Description/Examples

• Customer pays monthly payment for continued access to a specific


Subscription product/service
• Netflix
• Apple Music

• Customer gets 'basic' or free version of a product/service or a free


trial. Has option to upgrade to a paid version of the product/service
Freemium • Linkedin
• Dropbox

• Customer is the "product". Customer data is the most valuable part


of the business along with his/her attention for advertisiing purposes
Free • Google
• Facebook

• Customer pays for temporary access to the product/service, but does


Access-over- not own it
Ownership • Zipcar
• AirBnb

• Customer is given a unique experience for which they are willing to


pay a high price
Experience • Tesla
• Apple

• Customer pays for a service they don't have time to do themselves,


but is fulfilled by people with time, but short on money
On-Demand • Uber
• Taskrabbit

• Customer is sold an interdependent suite of products/services that


when purchased, increase in value based on how many are owned
Ecosystem • Apple
• Google

FIGURE 1.3    Disruptive digital business models enable companies to engage customers to create
value via websites, social channels, and mobile devices.
8 CHA PT E R 1 Digital Transformation Disrupts Companies, Competition, and Careers Locally and Globally

Customer experience describes In the digital (online) space, the customer experience must measure up to the very best
the cumulative impact of multiple the Web has to offer. Stakes are high for those who get it right—or wrong. There is a strong rela-
interactions over the course of tionship between the quality of a firm’s customer experience and loyalty, which, in turn,
a customer’s contact with an
increases revenue. As a result, a firm’s IT business objectives should be carefully and
organization.
clearly defined.

IT’s Role in the On-Demand and Sharing Economies


The 2018 IT Trends survey conducted by the Society of Information Management (SIM)
reflects that the current state of IT management remains stable despite the massive
changes present in the IT world today. Responses were analyzed from IT leaders in 793
highly digitized and tightly connected organizations. Results showed that companies are
investing heavily in analytics, cybersecurity, cloud, application software development and
maintenance, enterprise resource planning (ERP), and customer relationship management
(CRM). These levels of investment are consistent with the top ten IT management concerns
shown in Table 1.1, which clearly demonstrate a need for companies to continue to focus
on strategic and organizational priorities such as cybersecurity, business–IT alignment,
Data analytics is the process and data analytics.
of examining data sets to draw
conclusions about the informa-
TA B L E 1. 1 Top Ten IT Management Issues
tion they contain, usually with
the aid of specialized informa-
IT Management Issues
tion systems.
1 Security, Cybersecurity and Privacy

2 Technology Alignment with the Business

3 Data Analytics

4 Compliance and Regulations

5 IT Cost Reduction & Controls

6 Business Cost Reduction & Controls

7 Innovation

8 Digital Transformation

9 Business Agility and Flexibility

10 IT Agility and Flexibility

Source: Adapted from Kappelman et al. (2019).

Respondents also indicated that in addition to cybersecurity, their most worrisome


personal IT concerns centered around the skills shortage that has led to difficulties in find-
ing and retaining highly skilled IT talent, the credibility of IT, and perception of IT leadership
within an organization. On the business side, they listed alignment of business goals with IT
goals, business continuity, and compliance/regulations as areas of concern. Once again, these
findings point to one clear message—IT in the on-demand and sharing economies is all about
safeguarding data and identifying and meeting customer needs. Each of these concerns will
be addressed throughout the following chapters to help you understand how IT is managed to
ensure corporate performance, growth, and sustainability goals are met.

IT—Business Objectives
Now, more than ever, IT must be responsive to the needs of consumers who are demanding a
radical overhaul of business processes in companies across diverse industry sectors. Intuitive
interfaces, around-the-clock availability, real-time fulfillment, personalized treatment, global
   Doing Business in the On-Demand and Sharing Economies 9

consistency, and zero errors—this is the world to which customers have become increasingly
accustomed. And, it’s not just about providing a superior user or customer experience—when
companies get it right, they can also offer more competitive prices because of lower costs, bet-
ter operational controls, and open themselves up to less risk.
According to Chirantan Basu of Chron (Basu, 2017), to stay abreast of the ever-­changing
business landscape and customer needs, IT today must concentrate on the following six
business objectives to enhance an organization’s performance, growth, and sustainability:

1. Product development From innovations in microprocessors to efficient drug-delivery


systems, IT helps businesses respond quickly to changing customer demands.
2. Stakeholder integration Companies use their investor relations websites to communi-
cate with shareholders, research analysts, and others in the market.
3. Process improvement An ERP system replaces dozens of legacy systems for finance,
human resources, and other functional areas to increase efficiency and cost-effectiveness
of internal business processes.
4. Cost efficiencies IT allows companies to reduce transaction and implementation costs,
such as costs of duplication and postage of e-mail versus snail mail.
5. Competitive advantage Companies can use agile development, prototyping, and other
systems methodologies to bring a product to market cost-effectively and quickly.
6. Globalization Companies can outsource most of their noncore functions, such as HR
and finance, to offshore companies and use Information Communication Technology (ICT)
to stay in contact with its global employees, customers, and suppliers 24/7.

Every technology innovation triggers opportunities and threats to business models and
strategies. With rare exceptions, every business model depends on a mix of IT, knowledge of its
potential, requirements for success, and, equally important, its limitations.
Decades of technological innovation have given us smartphone apps, mobile payment
platforms, GPS and map technology, and social authentication. These technologies are needed
to build the infrastructure needed for on-demand services and sharing services.
This infrastructure—also referred to as a technology platform or technology stack—­ Technology platform is the
supports the exchange and coordination of staggering amounts of data. operating system and com-
In many consumer markets today, companies that do not have these mobile apps (Apple puter hardware used as a base
or Android) or other technology platforms that support the exchange of goods and services—no upon which other applications,
processes, or technologies are
matter how useful their website—may find themselves losing their competitive edge. This often
developed.
leads to customer dissatisfaction, which results in a considerably smaller customer base and
inevitably leads to an inability to sustain performance and growth followed by decline and, in Technology stack is the multi-
extreme cases, extinction. ple layers of hardware, software,
These and many other technologies and their impact on how companies operate and com- network connectivity, and data
analytics capability that comprise
pete will be discussed in the following chapters to enable you to understand the importance of a technology platform.
IT for management and become a more informed user of IT.
Another random document with
no related content on Scribd:
previously passed a prohibitory constitutional amendment, in itself
defective, and as no legislation had been enacted to enforce it, those
who wished began to sell as though the right were natural, and in
this way became strong enough to resist taxation or license. The
Legislature of 1882, the majority controlled by the Republicans,
attempted to pass the Pond liquor tax act, and its issue was joined.
The liquor interests organized, secured control of the Democratic
State Convention, nominated a ticket pledged to their interests,
made a platform which pointed to unrestricted sale, and by active
work and the free use of funds, carried the election and reversed the
usual majority. Governor Foster, the boldest of the Republican
leaders, accepted the issue as presented, and stumped in favor of
license and the sanctity of the Sabbath; but the counsels of the
Republican leaders were divided, Ex-Secretary Sherman and others
enacting the role of “confession and avoidance.” The result carried
with it a train of Republican disasters. Congressional candidates
whom the issue could not legitimately touch, fell before it, probably
on the principle that “that which strikes the head injures the entire
body.” The Democratic State and Legislative tickets succeeded, and
the German element, which of all others is most favorable to freedom
in the observance of the Sabbath, transferred its vote almost as an
entirety from the Republican to the Democratic party.
Ohio emboldened the liquor interests, and in their Conventions
and Societies in other States they agreed as a rule to check and, if
possible, defeat the advance of the prohibitory amendment idea. This
started in Kansas in 1880, under the lead of Gov. St. John, an
eloquent temperance advocate. It was passed by an immense
majority, and it was hardly in force before conflicting accounts were
scattered throughout the country as to its effect. Some of the friends
of temperance contended that it improved the public condition; its
enemies all asserted that in the larger towns and cities it produced
free and irresponsible instead of licensed sale. The latter seem to
have had the best of the argument, if the election result is a truthful
witness. Gov. St. John was again the nominee of the Republicans, but
while all of the remainder of the State ticket was elected, he fell
under a majority which must have been produced by a change of
forty thousand votes. Iowa next took up the prohibitory amendment
idea, secured its adoption, but the result was injurious to the
Republicans in the Fall elections, where the discontent struck at
Congressmen, as well as State and Legislative officers.
The same amendment had been proposed in Pennsylvania, a
Republican House in 1881 having passed it by almost a solid vote
(Democrats freely joining in its support), but a Republican Senate
defeated, after it had been loaded down with amendments. New York
was coquetting with the same measure, and as a result the liquor
interests—well organized and with an abundance of money, as a rule
struck at the Republican party in both New York and Pennsylvania,
and thus largely aided the groundswell. The same interests aided the
election of Genl. B. F. Butler of Massachusetts, but from a different
reason. He had, in one of his earlier canvasses, freely advocated the
right of the poor to sell equally with those who could pay heavy
license fees, and had thus won the major sympathy of the interest.
Singularly enough, Massachusetts alone of all the Republican States
meeting with defeat in 1882, fails to show in her result reasons which
harmonize with those enumerated as making up the elements of
discontent. Her people most do favor high tariffs, taxes on liquors
and luxuries, civil service reforms, and were supposed to be more
free from legal and political abuses than any other. Massachusetts
had, theretofore, been considered to be the most advanced of all the
States—in notions, in habit, and in law—yet Butler’s victory was
relatively more pronounced than that of any Democratic candidate,
not excepting that of Cleveland over Folger in New York, the
Democratic majority here approaching two hundred thousand. How
are we to explain the Massachusetts’ result? Gov. Bishop was a high-
toned and able gentleman, the type of every reform contended for.
There is but one explanation. Massachusetts had had too much of
reform; it had come in larger and faster doses than even her
progressive people could stand—and an inconsistent discontent took
new shape there—that of very plain reaction. This view is confirmed
by the subsequent attempt of Gov. Butler to defeat the re-election of
Geo. F. Hoar to the U. S. Senate, by a combination of Democrats with
dissatisfied Republicans. The movement failed, but it came very near
to success, and for days the result was in doubt. Hoar had been a
Senator of advanced views, of broad and comprehensive
statesmanship, but that communistic sentiment which occasionally
crops out in our politics and strikes at all leaders, merely from the
pleasure of asserting the right to tear down, assailed him with a vigor
almost equal to that which struck Windom of Minnesota, a
statesman of twenty-four years’ honorable, able and sometimes
brilliant service. To prejudice the people of his State against him, a
photograph of his Washington residence had been scattered
broadcast. The print in the photograph intended to prejudice being a
coach with a liveried lackey. It might have been the coach and lackey
of a visitor, but the effect was the same where discontent had run
into a fever.
Political discontent gave unmistakable manifestations of its
existence in Ohio, Massachusetts, New York (where Ex-Governor
Cornell’s nomination had been defeated by a forged telegram),
Michigan, Nebraska, Kansas, Iowa, Connecticut, California,
Colorado, Pennsylvania, and Indiana. The Republican position was
well maintained in New Hampshire, Vermont, Rhode Island,
Minnesota, Illinois, and Wisconsin. It was greatly improved in
Virginia, where Mahone’s Republican Readjuster ticket carried the
State by nearly ten thousand, and where a United States’ Senator and
Congressman at large were gained, as well as some of the District
Congressmen. The Republicans also improved the situation in North
Carolina and Tennessee, though they failed to carry either. They also
gained Congressmen in Mississippi and Louisiana, but the
Congressional result throughout the country was a sweeping
Democratic victory, the 48th Congress, beginning March 4, 1883,
showing a Democratic majority of 71 in a total membership of 325.
In Pennsylvania alone of all the Northern States, were the
Republican elements of discontent organized, and here they were as
well organized as possible under the circumstances. Charles S. Wolfe
had the year previous proclaimed what he called his “independence
of the Bosses,” by declaring himself a candidate for State Treasurer,
“nominated in a convention of one.” He secured 49,984 votes, and
this force was used as the nucleus for the better organized
Independent Republican movement of 1882. Through this a State
Convention was called which placed a full ticket in the field, and
which in many districts nominated separate legislative candidates.
The complaints of the Independent Republicans of Pennsylvania
were very much like those of dissatisfied Republicans in other
Northern States where no adverse organizations were set up, and
these can best be understood by giving the official papers and
correspondence connected with the revolt, and the attempts to
conciliate and suppress it by the regular organization. The writer
feels a delicacy in appending this data, inasmuch as he was one of the
principals in the negotiations, but formulated complaints, methods
and principles peculiar to the time can be better understood as
presented by organized and official bodies, than where mere
opinions of cotemporaneous writers and speakers must otherwise be
given. A very careful summary has been made by Col. A. K. McClure,
in the Philadelphia Times Almanac, and from this we quote the data
connected with the—
The Independent Republican Revolt In
Pennsylvania.

The following call was issued by Chairman McKee, of the


committee which conducted the Wolfe campaign in 1881:
Headquarters State Committee,
Citizens’ Republican Association, Girard House,
Philadelphia, December 16, 1881.

To the Independent Republicans of Pennsylvania:


You are earnestly requested to send representatives from each county to a State conference, to be held at Philadelphia,
Thursday, January 12th, 1882, at 10 o’clock A.M., to take into consideration the wisdom of placing in nomination proper
persons for the offices of Governor, Lieutenant-Governor, Secretary of Internal Affairs and Supreme Court Judge, and such
other matters as may come before the conference, looking to the overthrow of “boss rule,” and the elimination of the
pernicious “spoils system,” and its kindred evils, from the administration of public affairs. It is of the utmost importance that
those fifty thousand unshackled voters who supported the independent candidacy of Hon. Charles S. Wolfe for the office of
State Treasurer as a solemn protest against ring domination, together with the scores of thousands of liberty-loving citizens
who are ready to join in the next revolt against “bossism,” shall be worthily represented at this conference.

I. D. McKee, Chairman.

Frank Willing Leach, Secretary.


Pursuant to the above call, two hundred and thirteen delegates, representing thirty-three of the sixty-
six counties, met at the Assembly Building, January 12th, 1882, and organized by the election of John J.
Pinkerton as chairman, together with a suitable list of vice-presidents and secretaries. After a general
interchange of views, a resolution was adopted directing the holding of a State Convention for the
nomination of a State ticket, May 24th. An executive committee, with power to arrange for the election
of delegates from each Senatorial district, was also appointed, consisting of Messrs. I. D. McKee, of
Philadelphia; Wharton Barker, of Montgomery; John J. Pinkerton, of Chester; F. M. Nichols, of Luzerne;
H. S. McNair, of York, and C. W. Miller, of Crawford. Mr. Nichols afterwards declining to act, George E.
Mapes, of Venango, was substituted in his place. Before the time arrived for the meeting of the
convention of May 24th, several futile efforts were made to heal the breach between the two wings of the
Republican party. At a conference of leading Independents held in Philadelphia, April 23d, at which
Senator Mitchell was present, a committee was appointed for the purpose of conferring with a similar
committee from the regular organization, upon the subject of the party differences. The members of the
Peace Conference, on the part of the Independents, were Charles S. Wolfe, I. D. McKee, Francis B.
Reeves, J. W. Lee, and Wharton Barker. The committee on the part of the Stalwarts were M. S. Quay,
John F. Hartranft, C. L. Magee, Howard J. Reeder, and Thomas Cochran. A preliminary meeting was
held at the Continental Hotel, on the evening of April 29th, which adjourned to meet at the same place
on the evening of May 1st; at which meeting the following peace propositions were agreed upon:
Resolved, That we recommend the adoption of the following principles and methods by the
Republican State Convention of May 10th.
First. That we unequivocally condemn the use of patronage to promote personal political ends, and
require that all offices bestowed within the party shall be upon the sole basis of fitness.
Second. That competent and faithful officers should not be removed except for cause.
Third. That the non-elective minor offices should be filled in accordance with rules established by law.
Fourth. That the ascertained popular will shall be faithfully carried out in State and National
Conventions, and by those holding office by the favor of the party.
Fifth. That we condemn compulsory assessments for political purposes, and proscription for failure to
respond either to such assessments or to requests for voluntary contributions, and that any policy of
political proscription is unjust, and calculated to disturb party harmony.
Sixth. That public office constitutes a high trust to be administered solely for the people, whose
interests must be paramount to those of persons or parties, and that it should be invariably conducted
with the same efficiency, economy, and integrity as are expected in the execution of private trusts.
Seventh. That the State ticket should be such as by the impartiality of its constitution and the high
character and acknowledged fitness of the nominees will justly commend itself to the support of the
united Republican party.
Resolved, That we also recommend the adoption of the following permanent rules for the holding of
State Conventions, and the conduct of the party:
First. That delegates to State Conventions shall be chosen in the manner in which candidates for the
General Assembly are nominated, except in Senatorial districts composed of more than one county, in
which conferees for the selection of Senatorial delegates shall be chosen in the manner aforesaid, and
the representation of each county shall be based upon its Republican vote cast at the Presidential
election next preceding the convention.
Second. Hereafter the State Convention of the Republican party shall be held on the second
Wednesday of July, except in the year of the Presidential election, when it shall be held not more than
thirty days previous to the day fixed for the National Convention, and at least sixty days’ notice shall be
given of the date of the State Convention.
Third. That every person who voted the Republican electoral ticket at the last Presidential election
next preceding any State Convention shall be permitted to participate in the election of delegates to State
and National Conventions, and we recommend to the county organizations that in their rules they allow
the largest freedom in the general participation in the primaries consistent with the preservation of the
party organization.

M. S. Quay,
J. F. Hartranft,
Thomas Cochran,
Howard J. Reeder,
C. L. Magee,

On the part of the Republican State Committee, appointed by Chairman Cooper.

Charles S. Wolfe,
I. D. McKee,
Francis B. Reeves,
Wharton Barker,
J. W. Lee,

On the part of Senator Mitchell’s Independent Republican Committee.


The following resolution was adopted by the joint conference:
Resolved, That we disclaim any authority to speak or act for other persons than ourselves, and simply
make these suggestions as in our opinion are essential to the promotion of harmony and unity.
In order, however, that there might be no laying down of arms on the part of the Independents, in the
false belief that the peace propositions had ended the contest, without regard to whether they were
accepted in good faith, and put in practice by the regular convention, the following call was issued by the
Independent Executive Committee:
Executive Committee,
Citizens’ Republican Association of
Pennsylvania, Girard House.

Philadelphia, May 3d, 1882.

To the Independent Republicans of Pennsylvania:


At a conference of Independent Republicans held in Philadelphia, on January 12th, 1882, the following resolution was
adopted, to wit:
Resolved, That a convention be held on the 24th day of May, 1882, for the purpose of placing in nomination a full
Independent Republican ticket for the offices to be filled at the general election next November.
In pursuance and by the authority of the above resolution the undersigned, the State Executive Committee appointed at the
said conference, request the Independent Republicans of each county of the Commonwealth of Pennsylvania to send
delegates to the Independent Convention of May 24th, the basis of representation to be the same as that fixed for Senators
and Representatives of the General Assembly of Pennsylvania.
Should the convention of May 10th fail to nominate as its candidates men who in their character, antecedents and
affiliations are embodiments of the principles of true Republicanism free from the iniquities of bossism, and of an honest
administration of public affairs free from the evils of the spoils system, such nominations, or any such nomination, should be
emphatically repudiated by the Independent Convention of May 24th, and by the Independent Republicans of Pennsylvania
in November next.
The simple adoption by the Harrisburg Convention of May 10th of resolutions of plausible platitudes, while confessing the
existence of the evils which we have strenuously opposed, and admitting the justice of our position in opposing them, will not
satisfy the Independent Republicans of this Commonwealth. We are not battling, for the construction of platforms, but for the
overthrow of bossism, and the evils of the spoils system, which animated a despicable assassin to deprive our loved President
Garfield of his life, and our country of its friend and peacemaker.
The nomination of slated candidates by machine methods, thereby tending to the perpetuation of boss dominion in our
Commonwealth, should never be ratified by the Independent Republicans in convention assembled or at the polls. Upon this
very vital point there should be no mistake in the mind of any citizen of this State. The path of duty in this emergency leads
forward, and not backward, and forward we should go until bossism and machinism and stalwartism—aye, and Cameronism
—are made to give way to pure Republicanism. The people will not submit to temporizing or compromising.
We appeal to the Independent Republicans of Pennsylvania to take immediate steps toward perfecting their organization in
each county, and completing the selection of delegates to the Independent State Convention. Use every exertion to secure the
choice as delegates of representative, courageous men, who will not falter when the time arrives to act—who will not desert
into the ranks of the enemy when the final time of testing comes. Especially see to it that there shall not be chosen as
delegates any Pharisaical Independents, who preach reform, yet blindly follow boss leadership at the crack of the master’s
whip. Act quickly and act discreetly.
A State Campaign Committee of fifty, comprising one member from each Senatorial district, has been formed, and any one
desiring to co-operate with us in this movement against the enemies of the integrity of our State, who shall communicate with
us, will be immediately referred to the committeeman representing the district in which he lives. We urgently invite a
correspondence from the friends of political independence from all sections of the State.
Again we say to the Independent Republicans of Pennsylvania in the interest of justice and the Commonwealth’s honor,
leave no stone unturned to vindicate the rights of the people.

I. D. McKee, Chairman.
Wharton Barker.
John J. Pinkerton.
Geo. E. Mapes.
H. S. McNair.
Charles W. Miller.
Frank Willing Leach, Secretary.

In pursuance of the above call, the Independent Convention met, May 24th, in Philadelphia, and
deciding that the action of the regular Republican Convention, held at Harrisburg on May 10th, did not
give the guarantee of reform demanded by the Independents, proceeded to nominate a ticket and adopt
a platform setting forth their views.
Although the break between the two wings of the party was thus made final to all appearances, yet all
efforts for a reconciliation were not entirely abandoned. Thos. M. Marshall having declined the
nomination for Congressman at Large on the Republican ticket, the convention was reconvened June
21st, for the purpose of filling the vacancy, and while in session, instructed the State Central Committee
to use all honorable means to secure harmony between the two sections of the party. Accordingly, the
Republican State Committee was called to meet in Philadelphia, July, 13th. At this meeting the following
propositions were submitted to the Independents:
Pursuant to the resolution passed by the Harrisburg Convention of June 21st, and authorizing the
Republican State Committee to use all honorable means to promote harmony in the party, the said
committee, acting in conjunction with the Republican candidates on the State ticket, respectfully submit
to the State Committee and candidates of the Independents the following propositions:
First. The tickets headed by James A. Beaver and John Stewart, respectively, be submitted to a vote of
the Republican electors of the State, at primaries, as hereinafter provided for.
Second. The selection of candidates to be voted for by the Republican party in November to be
submitted as aforesaid, every Republican elector, constitutionally and legally qualified, to be eligible to
nomination.
Third. A State Convention to be held, to be constituted as recommended by the Continental Hotel
Conference, whereof Wharton Barker was chairman and Francis B. Reeves secretary, to select
candidates to be voted for by the Republican party in November, its choice to be limited to the
candidates now in nomination, or unlimited, as the Independent State Committee may prefer.
The primaries or convention referred to in the foregoing propositions to be held on or before the
fourth Wednesday of August next, under regulations or apportionment to be made by Daniel Agnew,
Hampton L. Carson, and Francis B. Reeves, not in conflict, however, with the acts of Assembly
regulating primary elections, and the candidates receiving the highest popular vote, or the votes of a
majority of the members of the convention, to receive the united support of the party.
Resolved, That in the opinion of the Republican State Committee the above propositions fully carry
out, in letter and spirit, the resolution passed by the Harrisburg Convention, June 21st, and that we
hereby pledge the State Committee to carry out in good faith any one of the foregoing propositions
which may be accepted.
Resolved, That the chairman of the Republican State Committee be directed to forward an official
copy of the proceedings of this meeting, together with the foregoing propositions, to the Independent
State Committee and candidates.
Whereupon, General Reeder, of Northampton, moved to amend by adding a further proposition, as
follows.
Fourth. A State Convention, to be constituted as provided for by the new rules adopted by the late
Republican State Convention, to select candidates to be voted for by the Republican party in November,
provided, if such convention be agreed to, said convention shall be held not later than the fourth
Wednesday in August. Which amendment was agreed to, and the preamble and resolutions as amended
were agreed to.
This communication was addressed to the chairman of the Independent State Committee, I. D.
McKee, who called the Independent Committee to meet July 27th, to consider the propositions. In the
meantime the Independent candidates held a conference on the night of July 13th, and four of them
addressed the following propositions to the candidates of the Stalwart wing of the party:
Philadelphia, July 13th, 1882.
To General James A. Beaver, Hon. William T. Davies, Hon. John M. Greer, William Henry Rawle, Esq., and Marriott
Brosius, Esq.
Gentlemen: By a communication received from the Hon. Thomas V. Cooper, addressed to us as candidates of the
Independent Republicans, we are advised of the proceedings of the State Committee, which assembled in this city yesterday.
Without awaiting the action of the Independent State Committee, to which we have referred the communication, and
attempting no discussion of the existing differences, or the several methods proposed by which to secure party unity, we beg
to say that we do not believe that any of the propositions, if accepted, would produce harmony in the party, but on the
contrary, would lead to wider divisions. We therefore suggest that the desired result can be secured by the hearty co-
operation of the respective candidates. We have no authority to speak for the great body of voters now giving their support to
the Independent Republican ticket, nor can we include them by any action we may take. We are perfectly free, however, to act
in our individual capacity, and desire to assure you that we are not only willing, but anxious to co-operate with you in the
endeavor to restore peace and harmony to our party. That this can be accomplished beyond all doubt we feel entirely assured,
if you, gentlemen, are prepared to yield, with us, all personal considerations, and agree to the following propositions:
First. The withdrawal of both tickets.
Second. The several candidates of these tickets to pledge themselves not to accept any subsequent nomination by the
proposed convention.
Under these conditions we will unite with you in urging upon our respective constituencies the adoption of the third
proposition submitted by your committee, and conclude the whole controversy by our final withdrawal as candidates. Such
withdrawal of both tickets would remove from the canvass all personal as well as political antagonisms, and leave the party
united and unembarrassed.
We trust, gentlemen, that your judgment will approve the method we have suggested, and that, appreciating the
importance of concluding the matter with as little delay as possible, you will give us your reply within a week from this date.

Very respectfully, your obedient servants,

John Stewart.
Levi Bird Duff.
George W. Merrick.
George Junkin.

William McMichael, Independent candidate for Congressman at Large, dissented from the
proposition of his colleagues, and addressed the following communication to Chairman Cooper:
Philadelphia, July 13th, 1882.

Hon. Thomas V. Cooper, Chairman, etc.


Dear Sir: Your letter of July 12th is received, addressed to the chairman of the State Committee of the Independent
Republicans and their candidates, containing certain propositions of your committee. I decline those propositions, because
they involve an abandonment of the cause of the Independent Republicans.
If a new convention, representing all Republicans, had nominated an entirely new ticket, worthy of popular support, and
not containing the name of any candidate on either of the present tickets, and sincerely supporting the principles of the
Independent Republicans, the necessity for a separate Independent Republican movement would not exist. Your proposition,
however, practically proposes to re-nominate General Beaver, and reaffirm the abuse which we oppose.
The convention of Independent Republicans which met in Philadelphia on May 24th, announced principles in which I
believe. It nominated me for Congressman at Large, and I accepted that nomination. It declared boldly against bossism, the
spoils system, and all the evils which impair Republican usefulness, and in favor of popular rule, equal rights of all, national
unity, maintenance of public credit, protection to labor, and all the great principles of true Republicanism. No other ticket
now in the field presents those issues. The people of Pennsylvania can say at the polls, in November, whether they approve of
those principles, and will support the cause which represents them. I will not withdraw or retire unless events hereafter shall
give assurance that necessary reform in the civil service shall be adopted; assessments made upon office-holders returned,
and not hereafter exacted; boss, machine, and spoils methods forever abandoned; and all our public offices, from United
States Senator to the most unimportant officials, shall be filled only by honest and capable men, who will represent the
people, and not attempt to dictate to or control them.
I shall go on with the fight, asking the support of all my fellow-citizens who believe in the principles of the Independent
Republican Convention of May 24th.

Yours truly,
William McMichael.

To these propositions General Beaver and his colleagues replied in the following communication:
Philadelphia, July 15th, 1882.
Hon. Thomas V. Cooper, Chairman Republican State Committee, Philadelphia, Pa.
Sir: We have the honor to acknowledge the receipt through you of a communication addressed to us by the Hon. John
Stewart, Colonel Levi Bird Duff, Major G. W. Merrick, and George Junkin, Esq.; in response to certain propositions submitted
by the Republican State Committee, representing the Republican party of Pennsylvania, looking to an amicable and
honorable adjustment of whatever differences there may be among the various elements of the party. Without accepting any
of the propositions submitted by your committee, this communication asks us, as a condition precedent to any
recommendation on the part of the writers thereof, to declare that in the event of the calling of a new convention, we will
severally forbid the Republicans of Pennsylvania to call upon us for our services as candidates for the various positions to be
filled by the people at the coming election. To say that in the effort to determine whether or not our nomination was the free
and unbiased choice of the Republican party we must not be candidates, is simply to try the question at issue. We have no
desire to discuss the question in any of its numerous bearings. We have placed ourselves unreservedly in the hands of the
Republicans of Pennsylvania. We have pledged ourselves to act concurrently with your committee, and are bound by its
action. We therefore respectfully suggest that we have no power or authority to act independently of the committee, or make
any declaration at variance with the propositions submitted in accordance with its action. There ought to be and can be no
such thing as personal antagonism in this contest. We socially and emphatically disclaim even the remotest approach to a
feeling of this kind toward any person. We fraternize with and are ready to support any citizen who loves the cause of pure
Republicanism, and with this declaration we submit the whole subject to your deliberate judgment and wise consideration.

James A. Beaver.
William Henry Rawle.
Marriott Brosius.
W. T. Davies.
John M. Greer.

At the meeting of the Independent State Committee, July 27th, the propositions of the Regular
Committee were unanimously rejected, and a committee appointed to draft a reply, which was done in
the following terms:
Thomas V. Cooper, Esq., Chairman Republican State Committee.
Dear Sir: I am instructed to advise you that the Independent Republican State Committee have considered the four
suggestions contained in the minutes of the proceedings of your committee, forwarded to me by you on the 12th instant.
I am directed to say that this committee find that none of the four are methods fitted to obtain a harmonious and honorable
unity of the Republican voters of Pennsylvania. All of them are inadequate to that end, for the reason that they afford no
guarantee that, being accepted, the principles upon which the Independent Republicans have taken their stand would be
treated with respect or put into action. All of them contain the probability that an attempt to unite the Republicans of the
State by their means would either result in reviving and strengthening the political dictatorship which we condemn or would
permanently distract the Republican body, and insure the future and continued triumph of our common opponent, the
Democratic party.
Of the four suggestions, the first, second and fourth are so inadequate as to need no separate discussion: the third, which
alone may demand attention, has the fatal defect of not including the withdrawal of that “slated” ticket which was made up
many months ago, and long in advance of the Harrisburg Convention, to represent and to maintain the very evils of control
and abuses of method to which we stand opposed. This proposition, like the others, supposing it to have been sincerely put
forward, clearly shows that you misconceive the cause of the Independent Republican movement, as well as its aims and
purposes. You assume that we desire to measure the respective numbers of those who support the Harrisburg ticket and
those who find their principles expressed by the Philadelphia Convention. This is a complete and fatal misapprehension. We
are organized to promote certain reforms, and not to abandon them in pursuit of votes. Our object is the overthrow of the
“boss system” and of the “spoils system.”
In behalf of this we are willing and anxious to join hands with you whenever it is assured that the union will be honestly
and earnestly for that purpose. But we cannot make alliances or agree to compromises that in their face threaten the very
object of the movement in which we have engaged. Whether your ticket has the support of many or few, of a majority or a
minority of the Republican voters, does not affect in the smallest degree the duty of every citizen to record himself against the
abuses which it represents. Had the gentlemen who compose it been willing to withdraw themselves from the field, as they
were invited to join in doing, for the common good, by the Independent Republican candidates, this act would have
encouraged the hope that a new convention, freely chosen by the people, and unembarrassed by claims of existing candidates,
might have brought forth the needed guarantee of party emancipation and public reform.
This service, however, they have declined to render their party; they not only claim and receive your repeated assurances of
support, but they permit themselves to be put forward to secure the use of the Independent Republican votes at the same
time that they represent the “bossism,” the “spoils” methods, and the “machine” management which we are determined no
longer to tolerate. The manner in which their candidacy was decreed, the means employed to give it convention formality, the
obligations which they incur by it, the political methods with which it identifies them, and the political and personal plans for
which their official influence would be required, all join to make it the most imperative public duty not to give them support
at this election under any circumstances.
In closing this note, this committee must express its regret, that, having considered it desirable to make overtures to the
Independent Republicans, you should have so far misapprehended the facts of the situation. It is our desire to unite the
Republican party on the sure ground of principle, in the confidence that we are thus serving it with the highest fidelity, and
preserving for the future service of the Commonwealth that vitality of Republicanism which has made the party useful in the
past, and which alone confers upon it now the right of continued existence. The only method which promises this result in the
approaching election is that proposed by the Independent Republican candidates in their letter of July 13th, 1882, which was
positively rejected by your committee.
On behalf of the Independent Republican State Committee of Pennsylvania,

I. D. McKee, Chairman.

With this communication ended all efforts at conciliation.

The election followed, and the Democratic ticket, headed by Robert E. Pattison of Philadelphia,
received an average plurality of 40,000, and the Independent Republican ticket received an average vote
of about 43,000–showing that while Independence organized did not do as well in a gubernatorial as it
had in a previous off-year, it yet had force enough to defeat the Republican State ticket headed by Gen.
James A. Beaver. All of the three several State tickets were composed of able men, and the force of both
of the Republican tickets on the hustings excited great interest and excitement; yet the Republican vote,
owing to the division, was not out by nearly one hundred thousand, and fifty thousand more
Republicans than Democrats remained at home, many of them purposely. In New York, where
dissatisfaction had no rallying point, about two hundred thousand Republicans remained at home, some
because of anger at the defeat of Gov. Cornell in the State nominating convention—some in protest
against the National Administrations, which was accused of the desire for direct endorsement where it
presented the name of Hon. Chas. J. Folger, its Secretary of the Treasury, as the home gubernatorial
candidate,—others because of some of the many reasons set forth in the bill of complaints which
enumerates the causes of the dissatisfaction within the party.
At this writing the work of Republican repair is going on. Both the Senate and House at Washington
are giving active work to the passage of a tariff bill, the repeal of the revenue taxes, and the passage of a
two-cent letter postage bill—measures anxiously hastened by the Republicans in order to anticipate
friendly and defeat unfriendly attempts on the part of the Democratic House, which comes in with the
first session of the 48th Congress.
In Pennsylvania, as we close this review of the struggle of 1882, the Regular and Independent
Republican State Committees—at least the heads thereof—are devising a plan to jointly call a Republican
State Convention to nominate the State ticket to be voted for in November, 1883. The groundswell was
so great that it had no sooner passed, than Republicans of all shades of opinion, felt the need of
harmonious action, and the leaders everywhere set themselves to the work of repair.
The Republicans in the South differed from those of the North in the fact that their complaints were
all directed against a natural political enemy—the Bourbons—and wherever there was opportunity they
favored and entered into movements with Independent and Readjuster Democrats, with the sole object
of revolutionizing political affairs in the South. Their success in these combinations was only great in
Virginia, but it proved to be promising in North Carolina, Mississippi, and Louisiana, and may take more
definite and general shape in the great campaign of 1884.
The Democratic party was evidently surprised at its great victory in 1882, and has not yet formally
resolved what it will do with it. The Congress beginning with December, 1883, will doubtless give some
indication of the drift of Democratic events.
The most notable law passed in the closing session of the 47th Congress, was the Civil Service Reform
Bill, introduced by Senator Geo. H. Pendleton of Ohio, but prepared under the direction of the Senate
Judiciary Committee. The Republicans, feeling that there was some public demand for the passage of a
measure of the kind, eagerly rushed to its support, at a time when it was apparent that the spoils of office
might slip from their hands. From opposite motives the Democrats, who had previously encouraged,
now ran away from it, but it passed both Houses with almost a solid Republican vote, a few Democrats in
each House voting with them. President Arthur signed the bill, but at this writing the Commission which
it creates has not been appointed, and of course none of the rules and constructions under the act have
been formulated. Its basic principles are fixed tenure in minor places, competitive examinations, and
non-partisan selections.
POLITICAL CHANGES—1883.

In the fall of 1883 nearly all of the States swept by the tidal wave of 1882 showed that it had either
partially or completely receded, and for the first time since the close of the Hayes administration (always
excepting the remarkable Garfield-Hancock campaign), the Republican party exhibited plain signs of
returning unity and strength. Henry Ward Beecher has wittily said that “following the war the nation
needed a poultice, and got it in the Hayes administration.” The poultice for a time only drew the sores
into plainer view, and healing potions were required for the contests immediately following. The
divisions of 1882 were as much the result of the non-action of the Hayes administration, as of the
misunderstandings and feuds which later on found bitter manifestation between the Stalwarts and Half-
Breeds of New York.
The Independents took no organized form except in New York and Pennsylvania, and yet the
underlying causes of division for the time swept from their Republican moorings not only the States
named, but also Massachusetts, Connecticut, Ohio, Indiana, Michigan, Kansas, Colorado and California.
The year 1882 seemed the culmination of every form of Republican division, and then everything in
the States named gave place to faction. Very wisely the Republican leaders determined to repair the
mischief, as far as possible, in the otherwise uneventful year of 1883. Their efforts were in most
instances successful, especially in Massachusetts where Robinson overthrew Gen. Butler’s State
administration by 20,000 majority; in Pennsylvania, where the Republican State ticket received about
20,000 majority, after the reunion of the Regular and independent factions. In Pennsylvania the efforts
at reconciliation made in the Continental Conference, and in subsequent conventions, gave fruit in 1883,
and at this writing in July, 1884 there is no mark of division throughout the entire State, if we except
such as must inevitably follow the plain acceptance of Free Trade and Protective issues. Very few of the
Republicans of Pennsylvania favor Free Trade, and only in the ranks of this few could any division be
traced after the close of the elections of 1883.
Ohio was an exception to the Republican work of reconciliation. Division still continued, and Judge
Hoadly, a leading and very talented Democrat, was elected Governor by about 15,000 majority, after a
contest which involved the expenditure of large sums of money. In the Convention which nominated
Hoadly, Senator Pendleton was practically overthrown because of his attachment to the Civil Service law
which takes his name, and later on he was defeated for U. S. Senator by Mr. Payne, the McLean and
Bookwalter factions uniting for his overthrow, which was accomplished despite the efforts of Thurman,
Ward and other leaders of the older elements of the party. Both the Hoadly and Payne battles were won
under the banners of the “Young Democracy.”
Any compilation of the returns of 1883 must be measurably imperfect, for in only a few of the States
were important and decisive battles waged. Such as they were, however, are given in the table on the
next page:
State Elections of 1882 and 1883, compared with the Presidential Election of 1880.
1880.[67]
STATES. Garfield, Hancock, Weaver, Dow,
Rep. Dem. Gbk. Pro.
Alabama 56,221 91,185 4,642
Arkansas 42,436 60,775 4,079
California 80,348 80,426 3,392
Colorado 27,450 24,647 1,435
[68]Connecticut 67,071 64,415 868 40
Delaware 14,133 15,275 120
Florida 23,654 27,964
Georgia 54,086 102,470 969
Illinois 318,037 277,321 26,358 443
Indiana 232,164 225,522 12,986
Iowa 183,927 105,845 32,701 592
Kansas 121,549 59,801 19,851 25
Kentucky 106,306 149,068 11,499 258
Louisiana 38,637 65,067 439
Maine 74,039 65,171 4,408 93
Maryland 78,515 93,706 818
Massachusetts 165,205 111,960 4,548 682
Michigan 185,341 131,597 34,895 942
Minnesota 93,903 53,315 3,267 286
Mississippi 34,854 75,750 5,797
Missouri 153,567 200,699 35,135
Nebraska 54,979 28,523 3,950
Nevada 8,732 9,613
New Hampshire 44,852 40,794 528 180
New Jersey 120,555 122,565 2,617 191
New York 555,544 534,511 12,373 1,517
North Carolina 115,874 124,208 1,126
Ohio 375,048 340,821 6,456 2,616
Oregon 20,619 19,948 249
Pennsylvania 444,704 407,428 20,668 1,939
Rhode Island 18,195 10,779 236 20
South Carolina 58,071 112,312 556
Tennessee 107,677 128,191 5,917 43
Texas 57,893 156,428 27,405
Vermont 45,567 18,316 1,215
Virginia 84,020 128,586
West Virginia 46,243 57,391 9,079
Wisconsin 144,400 114,649 7,986 69
Total 4,454,416 4,444,952 308,578 10,305

Plurality 9,464

Total vote 9,219,947

1882.[69]
STATES.
Rep. Dem. Gbk. Pro.
Alabama 46,386 100,591
Arkansas 49,352 87,675 10,142
California 67,175 90,694 1,020 5,772
Colorado 27,552 29,897
[68]Connecticut 54,853 59,014 607 1,034
Delaware 10,088 12,053
Florida 20,139 24,067 3,553
Georgia 24,930 81,443 68
Illinois 254,551 249,067 11,306 11,202
Indiana 210,234 220,918 13,520
Iowa 149,051 112,180 30,817
Kansas [70]98,166 [70]61,547 [70]23,300

Kentucky 79,036 110,813 736


Louisiana 33,953 49,892
Maine 72,724 63,852 1,302 395
Maryland 74,515 80,725 1,833
Massachusetts [70]134,358 [70]116,678 [70]4,033 [70]2,141

Michigan [70]157,925 [70]149,443 [70]1,572 [70]4,440

Minnesota 92,802 46,653 3,781 1,545


Mississippi 30,282 48,159
Missouri 128,239 198,620 33,407
Nebraska 43,495 28,562 16,991
Nevada [69]7,362 [69]6,906

New Hampshire 38,299 36,879 449 338


New Jersey 97,860 99,962 6,063 2,004
New York [70]409,422 [71]482,822 [71]10,527 [71]16,234

North Carolina 111,320 111,763


Ohio 297,759 316,874 5,345 12,202
Oregon 21,481 20,069
Pennsylvania [72]359,232 [72]355,791 [72]23,996 [72]5,196

Rhode Island 10,056 5,311 120


South Carolina 67,458 17,719
Tennessee [73]91,693 [73]123,929 [73]9,538

Texas 41,761 142,087 41,825


Vermont 35,839 14,466 1,535
Virginia 100,690 94,184
West Virginia 43,440 46,661
Wisconsin 94,606 103,630 2,496 13,800
Total 3,620,844 4,051,035 277,691 76,303

Plurality 130,195

Total vote 8,025,975

1883.[68]
STATES.
Rep. Dem. Gbk. Pro.
Alabama
Arkansas
California
Colorado [68]

Connecticut 51,749 46,146


Delaware
Florida
Georgia 23,680
Illinois
Indiana
Iowa 164,182 139,093 23,089
Kansas
Kentucky 89,181 133,615
Louisiana
Maine
Maryland 80,707 92,694 1,881
Massachusetts 160,092 150,228 13,950
Michigan 122,330 127,376
Minnesota 72,404 57,859
Mississippi
Missouri
Nebraska 52,305 47,795
Nevada
New Hampshire
New Jersey 97,047 103,856 2,960 4,153
New York 429,252 445,817 7,187 19,368
North Carolina
Ohio 347,164 359,793 2,937 8,362
Oregon
Pennsylvania 319,106 302,031 4,452 6,602
Rhode Island 13,068 10,907
South Carolina
Tennessee
Texas
Vermont
Virginia
West Virginia
Wisconsin
Total 1,998,587 2,040,890 40,629 54,316

Plurality 42,303

Total vote 4,134,458


POLITICAL CHANGES—1884.

The Republican National Convention met at Chicago, in the Exposition Building, on Tuesday, June 3d,
1884. It was called to order by Senator Sabin, the Chairman of the National Committee, who at the
conclusion of his address, at the request of his Committee, presented the name of Hon. Powell Clayton,
of Arkansas, for temporary President. Gen. Clayton, as a friend of Blaine, was antagonized by the field,
which named Hon. John R. Lynch for the place. An exciting debate followed, at the close of which Mr.
Lynch received 431 votes to 387 for Clayton. Ex-Senator Henderson of Missouri was made permanent
President without a contest. The contested seats were amicably settled, the most notable being that of
the straight-out Republicans of Virginia against Gen. Mahone’s delegation. The latter was admitted, the
only contest being in the Committee. The Blaine leaders did not antagonize, but rather favored Mahone’s
admission, as did the field generally, for the State Convention which elected this delegation had openly
abandoned the name of the Readjuster Party and taken that of the Republican. None of the Straightouts
expressed dissatisfaction at what appeared to be the almost universal sentiment.
Candidates for the Nomination.

On the third day the following candidates were formally placed in nomination, after eloquent eulogies,
the most notable being those of Judge West of Ohio, in behalf of Blaine; Gen. H. H. Bingham, of Penna.,
for President Arthur; and Geo. W. Curtis for Senator Edmunds:

James G. Blaine, of Maine.


Chester A. Arthur, of New York.
John Sherman, of Ohio.
George F. Edmunds, of Vermont.
John A. Logan, of Illinois.
Joseph R. Hawley, of Connecticut.

On the adjoining page is given the result of the ballots.


The convention sat four days, completed its work harmoniously, and adopted a platform without a
negative vote. [We give it in full in our Book of Platforms, and compare its vital issues with that of the
Democratic in our comparison of Platform Planks.]
The Democratic National Convention.

This body assembled at Chicago, in the Exposition Building, on Tuesday, July 8th, 1884, and was
called to order by Ex-Senator Barnum, the Chairman of the National Committee. The Committee
presented Governor Richard B. Hubbard, of Texas, for temporary chairman. After his address a notable
contest followed on the adoption of the unit rule, the debate being participated in by many delegates.
Mr. Fellows, of New York, favored the rule, as did all of the advocates of Governor Cleveland’s
nomination for President, while John Kelly opposed it with a view to give freedom of choice to the
twenty-five delegates from New York who were acting with him. The contest was inaugurated by Mr.
Smalley, of Vermont, who was instructed by the National Committee to offer the following resolution:
Resolved, that the rules of the last Democratic Convention govern this body until otherwise ordered,
subject to the following modification: That in voting for candidates for President and Vice-President no
State shall be allowed to change its vote until the roll of the States has been called, and every State has
cast its vote.
Mr. Grady, of New York, offered the following amendment to the resolution:
When the vote of a State, as announced by the chairman of the delegation from such State is
challenged by any member of the delegation, then the Secretary shall call the names of the individual
delegates from the State, and their individual preferences as expressed shall be recorded as the vote of
such State.
After discussion the question was then put, the chairman of each State delegation announcing its vote
as follows:
THE VOTE IN DETAIL.
First Ballot.
States. No. Sherman, Sherma
Delegates. Blaine. Arthur. Edmunds. Logan. John. Hawley. Lincoln. W. T.
[74]Alabama 20 1 17 1
Arkansas 14 8 4 2
California 16 16
Colorado 6 6
Connecticut 12 12
Delaware 6 5 1
Florida 8 1 7
Georgia 24 24
Illinois 44 3 1 40
Indiana 30 18 9 1 2
Iowa 26 26
Kansas 18 12 4 1 1
Kentucky 26 5½ 16 2½ 1 1
[74]Louisiana 16 2 10 3
Maine 12 12
Maryland 16 10 6
Massachusetts 28 1 2 25
Michigan 26 15 2 7
Minnesota 14 7 1 6
Mississippi 18 1 17
Missouri 32 5 10 6 10 1
Nebraska 10 8 2
Nevada 6 6
New
Hampshire 8 4 4
New Jersey 18 9 6 1 2
New York 72 28 31 12 1
North
Carolina 22 2 19 1
Ohio 46 21 25
Oregon 6 6
Pennsylvania 60 47 11 1 1
Rhode Island 8 8
South
Carolina 18 1 17
Tennessee 24 7 16 1
Texas 26 13 11 1
Vermont 8 8
Virginia 24 2 21 1
West Virginia 12 12
Wisconsin 22 10 6 6
Territories.
Arizona 2 2
Dakota 2 2
Idaho 2 2
Montana 2 1 1
New Mexico 2 2
Utah 2 2
Washington 2 2
Wyoming 2 2
Dist. of
Columbia 2 1 1
Total 820 334½ 278 93 63½ 30 13 4

You might also like