Professional Documents
Culture Documents
Business
Lecture 2
Ronald Wong
2020
SISB Update
Lecture 2 2
快速支付啟動 大型銀行不收費
今登記月底用 跨行轉帳由數日縮至數秒
支援全天候跨行即時轉帳的快速支付系統( Faster Payment System ,簡稱 FPS )今日
啟動,大部分銀行即日起接受客戶登記,本月底可以正式開始使用服務,屆時跨行轉帳的
到帳時間,將由以往的數日,縮短至數秒內完成。
未因颱風影響啟動時間
金管局原定於今早率參與機構舉行啟動儀式,但因颱風關係,當局決定取消活動。發言人
表示,曾考慮是否推遲系統啟動,惟現階段暫停將涉及極為複雜的技術問題,經審慎考慮
並徵詢其他參與機構意見後,決定按計劃啟動 FPS 。
據了解, FPS 啟動初期先開放予銀行職員及部分客戶試用,其他客戶則可於即日起登入手
機或網上銀行,以手機號碼或電郵地址登記及連接銀行戶口,待 9 月 30 日起即可隨時從
不同銀行、儲值支付工具之間實時調撥港元及人民幣,打破過往跨行轉帳需時最少 2 日,
並要收費的障礙。
https://fps.hkicl.com.hk/eng/fps/index.php
https://www.youtube.com/watch?v=PDwkADGn9PM
Lecture 2 3
交銀收費 5 元起 將推優惠
綜合所得銀行資料,包括滙豐、恒生、東亞、花旗及華僑永亨等大部分銀行均未就個人客戶使用
FPS 跨行轉帳收費,暫時只有交銀香港需要徵費。據交銀香港的客戶通知書上列明,收費分特快及
一般兩種,按照款項的幣種,徵收每筆 50 元及 5 元的費用。記者曾致電客戶熱綫查詢,職員表示
不論涉款多少亦須支付手續費。
交行發言人回應指,雖然會對零售客戶使用 FPS 訂立收費,但服務推出後會立即推出推廣優惠,
吸引客戶使用服務,並會不時檢討有關收費。
有銀行界人士坦言,銀行接入 FPS 需承擔系統建設及資金等成本,但業界普遍傾向先觀望市場反
應,同時金管局亦不鼓勵銀行於個人層面徵費,因此大部分銀行均未擬收費。他續指,大部分銀行
均免費提供服務,收費或導致客戶流失,相信短期內不會有其他銀行跟隨。
另有業內人士以自動櫃員機比喻,雖然提供服務要承擔一定成本,但隨着 FPS 將被廣泛應用,
「估計(個人層面)在可見的將來都不會收費」。
FPS 由香港銀行同業結算有限公司( HKICL )營運,並會以 7x24 的方式運作,屆時已登記的用
戶只需透過手機號碼、電郵地址或經 FPS 產生的獨有系統識別碼收付款,支援港幣及人民幣結
算。
https://invest.hket.com/article/2162280/%E5%BF%AB%E9%80%9F%E6%94%AF%E4%BB%98%E5%95%9F%E5%8
B%95%20%E5%A4%A7%E5%9E%8B%E9%8A%80%E8%A1%8C%E4%B8%8D%E6%94%B6%E8%B2%BB
Assessed by 18/9/2018
Lecture 2 4
Lecture 2 5
Lecture 2 6
What is Blockchain Technology
“The blockchain is an incorruptible digital ledger of economic
transactions that can be programmed to record not just financial
transactions but virtually everything of value.”
https://www.mckinsey.com/industries/high-tech/our
-insights/how-blockchains-could-change-the-world
Lecture 2 7
Lecture 2 8
4 Key features
Decentralized validation. When a transaction such as a ticket sale occurs, new data blocks describing it are
added to a chain only after consensus is reached among the relevant participants on the validity of the action –
for example, when the seller is validated as the owner of a ticket that is sold
Redundancy. The blockchain is continuously replicated on all or at least a group of nodes in a network. As a
result, no single point of failure exists.
Immutable storage. Blockchain confounds hackers because to tamper with data they would have to alter not just
one block in a chain but also all successive blocks and the majority of their replications. In addition, data is
registered in the blockchain with a digital fingerprint that includes a date and time stamp; any attempt to change
data would be apparent because the new digital fingerprint would not match the old one.
Encryption. Digital signatures based on pairs of cryptographic private and public keys enable network participants
to authenticate which participant owns an asset, initiated a transaction, signed a smart contract, or registered
data in the blockchain. Click to
open an
article
Adobe Acrobat
¤å¥ó
Lecture 2 9
Transparent and incorruptible
The blockchain network lives in a state of consensus, one that automatically checks in
with itself every ten minutes. A kind of self-auditing ecosystem of a digital value, the
network reconciles every transaction that happens in ten-minute intervals. Each group of
these transactions is referred to as a “block”. Two important properties result from this:
In theory, this could be possible. In practice, it’s unlikely to happen. Taking control of the
system to capture Bitcoins, for instance, would also have the effect of destroying their
value
Lecture 2 10
The Blockchain & Enhanced security
By storing data across its network, the blockchain eliminates the risks that come with data being held centrally.
Its network lacks centralized points of vulnerability that computer hackers can exploit. Today’s internet has
security problems that are familiar to everyone. We all rely on the “username/password” system to protect our
identity and assets online. Blockchain security methods use encryption technology.
The basis for this are the so-called public and private “keys”. A “public key” (a long, randomly-generated string
of numbers) is a users’ address on the blockchain. Bitcoins sent across the network gets recorded as belonging
to that address. The “private key” is like a password that gives its owner access to their Bitcoin or other digital
assets.
Store your data on the blockchain and it is incorruptible. This is true, although protecting your digital assets will
also require safeguarding of your private key by printing it out, creating what’s referred to as a paper wallet.
Lecture 2 11
Web 3.0
The blockchain gives internet users the ability to create value and authenticates digital
information. What will new business applications result?
Lecture 2 12
Lecture 2 13
Lecture 2 14
Evolution Of Information Resources
IS strategy from the 1960s to the 1990s was driven by internal organizational
needs
– Lower existing transaction costs
– Provide support for managers by collecting and distributing information
– Redesign business processes
In the 2010 era IS strategy was driven by social IT platforms and new capabilities
– A new evolution of applications, processes, and strategic opportunities
Lecture 2 15
Figure 2.1 – Mission statements of computer companies
Era I Era II Era III Era IV Era V Era VI
1960s 1970s 1980s 1990s 2000+ 2100+
Lecture 2 16
Figure 2.1 – Mission statements of computer companies (Cont.)
Lecture 2 17
The Strategic Role for IS – Value
Creation
IS help firms address their internal and external circumstances
Enable managers to identify and use information resources strategically
IS enable firms to gain advantage over the competition.
Firms draw on modern and innovative applications
Lecture 2 18
Information Resources as Strategic
Tools
The manager need to combine all the available firm’s resources:
Internal resources -
– Financial, production, human, and information resources,
External resources -
– The Internet and various global opportunities
Information resources is defined as the available data, technology, people, and
processes available to perform business processes and tasks.
Lecture 2 19
Information Resources
Information resources can be either assets or capabilities.
– IT asset is anything, tangible or intangible, that can be used by a firm in its
processes for creating, producing and/or offering its products, goods or
services. (i.e. IT infrastructure).
– IT capability is something that is learned or developed over time for the firm
to create, produce or offer it products.
Lecture 2 20
IT Assets
IS infrastructure:
– Includes data, technology, people, and processes.
– The infrastructure provides the foundation for the delivery of a firm’s products or services.
Information repository
– Logically-related data that is captured, organized and retrievable by the firm.
– Designed to improve the firm’s efficiency.
Lecture 2 21
IT Assets (Cont.)
Web 2.0 space include resources used but not owned by the firm (eBay,
Facebook, Linked-In etc.).
– Available as a service such as Internet-based software (Software as a Service, or SAAS)
– Managers can manage customer information with an externally based IT resource
– Managers can find expertise or an entire network of individuals ready to participate in the
innovation processes of the corporate using relatively little capital or expense. (i.e. Facebook,
Linked-In).
Lecture 2 22
Categories of IT Capabilities
Technical skills - applied to
designing, developing and
implementing information systems.
IT management skills - critical for
managing the IT function and IT
projects.
Relationship skills - can either
be externally-focused or spanning
across departments.
Committing and developing
information resources require
substantial financial resources.
Lecture 2 23
Figure 2.2 Information resources
IT management skills Ability to managing IT function and IT Being knowledgeable about business processes
projects and managing systems to support them;
evaluating technology options; envisioning creative
IS solutions to business problems
Relationship skills Ability of IS specialists to work with Spanning: having a good relationship between IT
parties outside the IS department. and business managers
Externally-forced: have a good relationship with an
outsourcing vendor
Lecture 2 24
Advantages of Information Resource
Information resource value :
– Eras I through III – value was derived from scarcity reflected in the cost to produce the
information.
– Era IV – value was derived from plenitude
Network effects is the value of a network node to a person or organization, it
increases when others join the network. (i.e. e-mail)
– Rather than use production costs to guide the determination of price, information products
might be priced to reflect their value to the buyer.
Lecture 2 25
Advantages of Information Resource
(Cont.)
Information resource appropriation:
– Determining where a resource’s value lies and how it can be improved in a
firm’s favor.
– The attributes of information resources that impact the value make it
possible to create and sustain competitive advantage (i.e. Zara).
Information resource distribution across firms:
– Early adopters may experience a competitive advantage from using an
information resource.
– The experience gained may lead to inequities between firms.
– Different experiences with a resource creates value, and a create strategic
advantage.
Lecture 2 26
Advantages of Information Resource
(Cont.)
– The value of information mushrooms under conditions of information asymmetries.
– Possessor of information may use it against, or sell it to, companies or individuals who are not
otherwise able to access the information.
Mobility of Information resource:
– Reliance on the individual skills of IT professional
– Risky as key individuals will leave the firm, taking their experience with them.
– Development of unique knowledge-sharing processes, and creation of an organizational memory.
Lecture 2 27
Advantages of Information Resource
(Cont.)
Capturing of lessons learned from all team members after the completion of each
project.
Using social technologies to record interactions and activity streams.
Information resource become obsolete:
– Information resources lose value over time.
Understanding the nature of the information resources at hand is a prerequisite to
using them effectively.
Aligning IS strategy with business strategy enables the general manager
maximizes its profit potential.
Lecture 2 28
Using Information Resources to
Influence Competitive Forces
Porter’s five forces model show the major forces that shape the competitive
environment of the firm (figure 2.3 and 2.4).
1. Threat of New Entrants: new firms that may enter a companies market.
2. Bargaining Power of Buyers: the ability of buyers to use their market
power to decrease a firm’s competitive position
3. Bargaining Power of Suppliers: the ability suppliers of the inputs of a
product or service to lower a firm’s competitive position
4. Threat of Substitutes: providers of equivalent or superior alternative
products
5. Industry Competitors: current competitors for the same product.
Lecture 2 29
Figure 2.3 Five competitive forces with potential strategic
use of information resources.
Lecture 2 30
Figure 2.4 Application of five competitive forces model for Zara.
Threat of New Zara’s IT supports its tightly-knit group of designers, market specialists, production managers and production
planners. New entrants are unlikely to provide IT to support relationships that have been built over time. Further it
Entrants has a rich information repository about customers that would be hard to replicate.
Bargaining Power of With its constant infusion of new products, buyers are drawn to Zara stores. Zara boasts more than 11,000 new
designs a year, whereas competitors typically offer only 2,000 – 4,000. Further, because of the low inventory that
Buyers the Zara stores stock, the regulars buy products they like when they see them because they are likely to be gone
the next time they visit the store. More recently Zara has employed laser technology to measure 10,000 women
volunteers so that it can add the measurements of ‘real’ customers into its information repositories. This means
that the new products will be more likely to fit Zara customers.
Bargaining Power of Its computer-controlled cutting machine cuts up to 1000 layers at a time. It then sends the cut materials to
suppliers who sew the pieces together. The suppliers’ work is relatively simple and many suppliers can do the
Suppliers sewing. Thus, the pool of suppliers is expanded and Zara has greater flexibility in choosing the sewing
companies. Further, because Zara dyes 50% of the fabric in its plant, it is less dependent on suppliers and can
respond more quickly to mid-season changes in customer color preferences.
Threat of Substitute Industry competitors long marketed the desire of durable, classic lines. Zara forces on meeting customer
preferences for trendy, low-cost fashion. It has the highest sales per square foot of any of its competitors. It does
Products so with virtually no advertising and only 10% of stock is unsold. It keeps its inventory levels very low and offers
new products at an amazing pace for the industry (i.e., 15 days from idea to shelves). Zara has extremely
efficient manufacturing and distribution operations.
Industrial Competitors Zara offers extremely fashionable lines that are only expected to last for approximately 10 wears. It offers trendy,
appealing apparel at a hard-to-beat price.
Lecture 2 31
Porter’s Value Chain Model
Value chain model addresses the activities that create, deliver, and
support a company’s product or service (see Figure 2.5).
Two broad categories:
– Primary activities – relate directly to the value created in a product or service.
– Support activities – make it possible for the primary activities to exist and remain
coordinated.
Lecture 2 32
Figure 2.5 Value chain of the firm.
Lecture 2 33
Case Study: TAL
Lecture 2 34
Lecture 2 35
Lecture 2 36
Lecture 2 37
Lecture 2 38
Resources to Attain Competitive
Advantage
A resource is considered valuable when it enables the firm to become more
efficient or effective.
A resource is rare when other firms do not possess it.
– Stakes or resources required just to be in the business.(i.e. banks and ATMs)
– Initially rare and valuable resources were the communities many companies
implemented using social IT.
– These communities were a valuable resource for the firms that sponsored
them, and only a few existed.
Lecture 2 39
Resources to Sustain Competitive
Advantage
Many firms who invested in systems learned that gaining a competitive
advantage does not automatically mean that you can sustain it over the long
term.
Need to continue to innovate and to protect against resource imitation,
substitution, or transfer.
Technical knowledge, especially that relates to the firm’s operation, a gung-ho
company culture, and managerial experience in the firm’s environment is less
easy to obtain and, hence, considered harder to transfer to other firms.
Lecture 2 40
Strategic Alliances
An interorganizational relationship that affords one or more companies in the
relationship a strategic advantage.
E.g., the alliance between Zynga and Facebook helped Zynga benefit from the
revenue resulting from its gamers on Facebook community.
IS can be the platform upon which a strategic alliance functions.
E.g., The alliance between Delta and e-Travel helped Delta reduce agency
reservation fees and offered e-Travel new corporate leads.
Linking value chains through SCM is another way firms build an IT-facilitated
strategic alliance.
Lecture 2 41
Types of Strategic Alliances
Co-opetition: a new strategy whereby companies cooperate and compete at the
same time with companies in their value net.
Value net includes a company and its competitors and complementors, as well
as its customers and suppliers, and the interactions among all of them.
Complementor is a company whose product or service is used in conjunction
with a particular product or service to make a more useful set for the customer.
Co-opetition is the strategy for creating the best possible outcome for a
business by optimally combining competition and cooperation.
Lecture 2 42
Co-Creating IT and Business Strategy
Information is increasingly a core component of the product or service offered by
the firm.
IT strategy is business strategy – they cannot be created without each other.
https://www.100open.com/six-ways-to-co-create-with-your-customers/
Lecture 2 43
Airbnb Co-creation
Lecture 2 44
Other Strategic analytical tools
Lecture 2 45
What is a SWOT analysis and why should
you use one?
A SWOT analysis guides you to
identify the positives and negatives
inside your organization (Strength &
Weakness) and outside of it, in the
external environment (Opportunity &
Threat). Developing a full awareness
of your situation can help with both
strategic planning and decision
-making.
Lecture 2 46
Product Portfolio (Boston) Matrix
HIGH
Star Wildcat
Market
Growth
& Cash
Use Cash Cow
$$ $ Dog
LOW
HIGH Relative Market Share LOW
& Cash Generation
Adapted from Ray Trygstad, Illinois Institute of Technology, 2003 Adapted from Ward & Peppard, Strategic Planning for Information Systems, John Wiley & Sons 2002
Lecture 2 47
Product Portfolio Model
Useful in Growth & Maturity stages of four stage product cycle
– Emergence
– Growth
– Maturity
– Decline
Lecture 2 48
IT Support for Wildcat Products
Low market share, high growth market
Focus on:
– Product and/or process development
or
– Customer identification, segmentation, communication
Lecture 2 49
IT Support for Star Products
High market share, high growth market
Focus on:
– Identifying customers & requirements
and/or
– Business innovation to meet market requirements & differentiate
Lecture 2 50
IT Support for Cash Cow Products
High market share, low growth market
Focus on:
– Keeping costs low
and
– Control of business relationships
& activities
$$$
Adapted from Ray Trygstad, Illinois Institute of Technology, 2003
Lecture 2 51
IT Support for ‘Dog’ Products
Low market share, low growth market
Focus on:
– Reducing costs or securing customers to improve profit performance
– Very little innovation as line may be discontinued
Lecture 2 52
Balanced Scorecard
GOALS & PERFORMANCE MEASURES
– Financial perspective
• How do we look to shareholders?
– Customer perspective
• How do customers see us?
– Internal Business perspective (BPR)
• What must we excel at?
– Innovation & Learning perspective
• Can we continue to improve & create value?
Lecture 2 53
An Example
Lecture 2 54
Generic IS strategies
Lecture 2 55
Parson’s Strategies for IT Management
Centrally Planned
Leading edge
Free Market
Monopoly
Scarce resource
Lecture 2 56
Centrally Planned - Star
A believe that management would facilitates uncovering the whole picture and
that this larger, overall, view makes for better decisions
Senior management fully aware of developments
Emphasis upon the strategy planning process, using them as a path towards
business value from IS
Most appropriate for strategic systems
The planning cycle of business and IS are closely integrated
Normally spans a number of business areas or business units
Task force approach is best suited
Centrally planned does not equal centrally controlled
Lecture 2 57
Leading Edge - Wildcat
Adopted because of a belief that innovation technology use can create business
gains and therefore highly risks the organization can generate huge payback
Senior management believes this will yield competitive advantage
Willing to fund experimentation & recognize that not all will succeed
Evaluation should be in relation to potential business idea
New technology confined to ‘high potential’ are until proven
Lecture 2 58
Free Market – Wildcat & Dog
Adopted out of a belief that the Market makes the best decision and since users
are responsible for business results they are the most equipped to make these
best decisions
Line managers responsible for performance
– Able to make beneficial decisions about IT unhindered by other groups
Business problems resolved by IS/IT solutions close to the problem
Most effective in producing support systems
May also be used for ‘high potential’ systems
Lecture 2 59
Monopoly – Cash Cow
Information is corporate assets and only be across functionally available if
controlled by a single service sources
Centralized IT management standardizes solutions
Often will use best overall cost, long-term best set of solutions rather than optimal
solutions
If well directed ensures high quality, integrated, maintainable systems
Required for ‘key operational’ systems
Lecture 2 60
Scarce Resource - Dog
A belief that information is a finite and hence limited resource whose
development requires a clear justification
Controls IT through budget limitations
Investments with greatest return will get priority
Promotes local solutions, discourages flexible or integrated solutions
Forces users & IT to find lowest-cost solution
Very appropriate for ‘support’ applications
Lecture 2 61
How information gives you competitive
advantage
Based on M. Porter “How information gives you competitive advantage”, Harvard Business Review, 2001
Lecture 2 62
Strategic Significance of Information
Technology
How to link your IS/IT planning in accordance to the value chain – to create value
of each key business process
Looking at the competitive scope of your organization
– Segment group
– Vertical scope [degree of vertical integration]
– Geographic scope
– Industry scope [ranges of related industries that the company competes]
Based on M. Porter “How information gives you competitive advantage”, Harvard Business Review, 2001
Lecture 2 63
Strategic Significance of Information
Technology
Technological transformation
– Transforming the product. Example: GE application service data base supports a consumer
hotline that helps differentiate GE services support
– Changing the industry structure
– Strategic innovation to create competitive advantages
– Spin off to be a new business
Link up your upstream suppliers to downstream customers
Based on M. Porter “How information gives you competitive advantage”, Harvard Business Review, 2001
Lecture 2 64
How to Create Competitive Advantages
Lowering cost
Enhancing differentiation
– bundling information with the physical product package sold to the buyer
Changing competitive scope
– increase its ability to coordinate and create interrelationships among industries that separate
before;
– decentralization;
– introduce new pricing system
Create new business
– Create derived demand of new products
Based on M. Porter “How information gives you competitive advantage”, Harvard Business Review, 2001
Lecture 2 65
Amazon Go
ON MONDAY, AMAZON took the wraps off Amazon Go, a real-world grocery store that
comes with a twist: there’s no checkout process. You just grab the stuff you want and
walk out; the order posts to your Amazon account afterwards. There are no cashiers, no
lines, no fumbling for a credit card. And while experts agree that Go looks very much like
the future of retail, it’s less clear whether Amazon has all of the pieces in place.
It runs the entire ecosystem. “Amazon controls what gets stocked in the store,”
Luan says. “So Amazon can choose things that they are very good at identifying, and it
can skip all the hard problems for a long time.” It’s hard for Amazon to go wrong when
Amazon itself is controlling who’s going into the space, the infrastructure of the space,
and the products in the space. And even if it does still have lots left to figure out, that’s
what betas are for.
https://www.youtube.com/watch?v=NrmMk1Myrxc https://www.wired.com/2016/12/amazon-go-grocery-store/
Accessed 11 January 2017
Adobe Acrobat
Lecture 2 Document 66
How IS/IT affected competitive forces
1. How can IS/IT build barrier of entry
2. How can IS/IT build in switching cost for customers
3. How can IS/IT change the basis of competition
4. How can IS/IT change the balance of power in supplier / customer
relationship
5. How can IS/IT generate new product/ service
Lecture 2 67
Steps to build up your IS/ IT competitive
advantage
1. Assess information intensity
– potential importance of information
– Identify priority business units for investment in IT/IS both on breath and depth
2. Determine the role of information technology in industry structure
– In reference to the 5 forces model
3. Identify and rank the ways in which information technology might create
competitive advantage
– How to leverage to expand the business globally
– How flexible of the system
– Will it help to create new segment
Based on M. Porter “How information gives you competitive advantage”, Harvard Business Review, 2001
Lecture 2 68
Steps to build up your IS/ IT competitive
advantage
4. Investigate how information technology might spawn new business
5. Develop a plan for taking advantage of information technology
• Rank the strategic investment on both hardware and software
• Ensure cross functional link
• IS mgr to provide leadership to coordinate the system and coaching in system development
Based on M. Porter “How information gives you competitive advantage”, Harvard Business Review, 2001
Lecture 2 69
Case Study
Lecture 2
AlipayHK 星爍無人店
AlipayHK 聯手信和集團旗下商場奧海城,攜手將科技融入生活,希望為港人帶來全新升
級新零售購物體驗,帶來了全港首間「 AlipayHK 星爍無人店」,整個空間佔地逾 4,000
平方呎。
由即日起至 10 月 1 日,用戶可以在無人店閘門旁的電子螢幕,透過鏡頭識別用戶的臉部
表情,系統偵測笑容成功後,就可以電子錢包掃碼進入無人店,並應用科技全自動掃描手
上所挑選商品,拿著商品直接走向自助支付區,系統即時就可以感應到商品及價錢,用手
機掃瞄一下,就可完成支付了!
https://www.youtube.com/watch?v=aSyJYZa5bL8
https://unwire.hk/2018/09/05/alipayhkstore/life-tech/
Lecture 2 71
The Workflow
Lecture 2 72
Quick Questions
How information technology transform the business and society?
Do you agree the GPS attendance system may cause privacy issue? Why? Do
you like it – in personal and in a company perspective.
Do you think the unmanned shop can replace the traditional shops? Why or Why
not?
What are the advantages of the unmanned shop?
Lecture 2
Lecture 2 74
~ The End ~
Thank you!
Lecture 2 75