INFORMATION SYSTEMS IN BUSINESS

CHAPTER 1
Information Systems
and Business
Strategy
Opening Case:
Apple – Merging
Systems, Business, and
Entertainment
McGraw-Hill-Ryerson
©2011 The McGraw-Hill Companies, All Rights Reserved
1-2
Chapter One Overview
• SECTION 1.1 – INFORMATION SYSTEMS IN
BUSINESS
–
–
–
–
Information Systems’ Role in Business
Information Systems Basics
Roles and Responsibilities in Information Systems
Measuring Information Systems’ Success
• SECTION 1.2 – BUSINESS STRATEGY
–
–
–
–
Identifying Competitive Advantages
The Five Forces Model – Evaluating Business Segments
Value Chain Analysis – Targeting Business Processes
The Three Generic Strategies – Creating a Business Focus
Copyright © 2011 McGraw-Hill Ryerson Limited
1-3
LEARNING OUTCOMES
1.
Explain the role information systems have in business.
2.
Understand information systems basics, and the
responsibilities of senior IS personnel.
3.
Explain the importance of measuring information
systems’ success and the methods by which
information systems’ success is measured.
Copyright © 2011 McGraw-Hill Ryerson Limited
1-4
LEARNING OUTCOMES
4.
5.
Explain the various ways organizations can assess
their competitive advantage (e.g. the Five Forces
Model, three generic strategies, and value chain
analysis).
Describe how business-driven information systems
can increase a company’s competitive business
strategy.
Copyright © 2011 McGraw-Hill Ryerson Limited
SECTION 1.1
INFORMATION SYSTEMS
IN BUSINESS
McGraw-Hill-Ryerson
©2011 The McGraw-Hill Companies, All Rights Reserved
1-6
INFORMATION SYSTEMS’ ROLE
IN BUSINESS
• Information systems are everywhere in business
Copyright © 2011 McGraw-Hill Ryerson Limited
1-7
Information Systems’ Impact on
Business Operations
Copyright © 2011 McGraw-Hill Ryerson Limited
1-8
Information Systems’ Impact on
Business Operations
Copyright © 2011 McGraw-Hill Ryerson Limited
1-9
Information Systems’ Impact on
Business Operations
Copyright © 2011 McGraw-Hill Ryerson Limited
1-10
Information Systems’ Impact on
Business Operations
• Organizations
typically operate by
functional areas or
functional silos
• Functional areas
are interdependent
Copyright © 2011 McGraw-Hill Ryerson Limited
1-11
INFORMATION SYSTEMS BASICS
• Information systems (IS) – any
computer-based tool that people use to
work with information and that supports
the information and informationprocessing needs of an organization
• An information system can be an
important enabler of business success
and innovation
Copyright © 2011 McGraw-Hill Ryerson Limited
1-12
INFORMATION SYSTEMS BASICS
• Management information systems (MIS) – the
function that plans for, develops, implements,
and maintains IS hardware, software, and
applications that people use to support the
goals of an organization
• MIS is a business function, similar to
Accounting, Finance, Operations, and Human
Resources
Copyright © 2011 McGraw-Hill Ryerson Limited
1-13
INFORMATION SYSTEMS BASICS
• When beginning to learn about
information systems it is important to
understand the following:
– The difference between data, information and
knowledge
– IS resources
– IS cultures
Copyright © 2011 McGraw-Hill Ryerson Limited
1-14
Data – Information - Knowledge
• Data - raw facts that describe the
characteristic of an event
• Information - data converted into a
meaningful and useful context
• Knowledge - information that can be
enacted upon i.e “actionable information”
Copyright © 2011 McGraw-Hill Ryerson Limited
1-15
IS Resources
• People use
Information
systems to work
with Information
Copyright © 2011 McGraw-Hill Ryerson Limited
1-16
IS Cultures
• Organizational information cultures
include:
– Information-functional culture
– Information-sharing culture
– Information-inquiring culture
– Information-discovery culture
Copyright © 2011 McGraw-Hill Ryerson Limited
1-17
ROLES AND RESPONSIBILITIES IN IS
• Information systems is a relatively new
functional area, having only been around
formally for about 40 years
• Recent IS strategic positions include:
– Chief Information Officer (CIO)
– Chief Technology Officer (CTO)
– Chief Security Officer (CSO)
– Chief Privacy Officer (CPO)
– Chief Knowledge Office (CKO)
Copyright © 2011 McGraw-Hill Ryerson Limited
1-18
ROLES AND RESPONSIBILITIES IN IS
• Chief Information Officer (CIO) – oversees all
uses of IS and ensures the strategic alignment
of IS with business goals and objectives
• Broad CIO roles include:
– Manager – ensuring the delivery of all IS projects, on
time and within budget
– Leader – ensuring the strategic vision of IS is in line
with the strategic vision of the organization
– Communicator – building and maintaining strong
executive relationships
Copyright © 2011 McGraw-Hill Ryerson Limited
1-19
ROLES AND RESPONSIBILITIES IN IS
• What concerns CIOs the most
Copyright © 2011 McGraw-Hill Ryerson Limited
1-20
ROLES AND RESPONSIBILITIES IN IS
• Chief Technology Officer (CTO) – responsible for
ensuring the throughput, speed, accuracy, availability, and
reliability of IS
• Chief Security Officer (CSO) – responsible for ensuring
the security of information systems
• Chief Privacy Officer (CPO) – responsible for ensuring
the ethical and legal use of information
• Chief Knowledge Office (CKO) - responsible for
collecting, maintaining, and distributing the organization’s
knowledge
Copyright © 2011 McGraw-Hill Ryerson Limited
1-21
ROLES AND RESPONSIBILITIES IN IS
• Skills pivotal for success in executive IS roles
Copyright © 2011 McGraw-Hill Ryerson Limited
1-22
The Gap Between Business
Personnel and IS Personnel
• Business personnel possess expertise in
functional areas such as marketing,
accounting, and sales
• IS personnel have the technological
expertise
• This typically causes a communications
gap between the business personnel and
IS personnel
Copyright © 2011 McGraw-Hill Ryerson Limited
1-23
Improving Communications
• Business personnel must seek to increase
their understanding of IS
• IS personnel must seek to increase their
understanding of the business
• It is the responsibility of the CIO to ensure
effective communication between
business personnel and IS personnel
Copyright © 2011 McGraw-Hill Ryerson Limited
1-24
MEASURING INFORMATION
SYSTEMS’ SUCCESS
• Key performance indicator (KPI) – measures
that are tied to business drivers
• Metrics are detailed measures that feed KPIs
• Performance metrics fall into the nebulous area
of business intelligence that is neither
information systems, nor business centred, but
requires input from both IS and business
professionals
Copyright © 2011 McGraw-Hill Ryerson Limited
1-25
Efficiency and Effectiveness
Metrics
• Efficiency IS metric – measures the
performance of the information system itself
including throughput, speed, and availability
• Effectiveness IS metric – measures the impact
IS has on business processes and activities
including customer satisfaction, conversion
rates, and sell-through increases
Copyright © 2011 McGraw-Hill Ryerson Limited
1-26
Benchmarking – Baselining
Metrics
• Regardless of what is measured, how it is
measured, and whether it is for the sake of
efficiency or effectiveness, there must be
benchmarks – baseline values the system seeks
to attain
• Benchmarking – a process of continuously
measuring system results, comparing those
results to optimal system performance
(benchmark values), and identifying steps and
procedures to improve system performance
Copyright © 2011 McGraw-Hill Ryerson Limited
1-27
The Interrelationships of Efficiency
and Effectiveness IS Metrics
• Efficiency IS metrics focus on information
systems and include:
– Throughput
– Transaction speed
– System availability
– Web traffic
– Response time
Copyright © 2011 McGraw-Hill Ryerson Limited
1-28
The Interrelationships of Efficiency
and Effectiveness IS Metrics
Copyright © 2011 McGraw-Hill Ryerson Limited
1-29
The Interrelationships of Efficiency
and Effectiveness IS Metrics
• Security is an issue for any organization offering
products or services over the Internet
• It is inefficient for an organization to implement
Internet security, since it slows down processing
– However, to be effective it must implement Internet
security
– Secure Internet connections must offer encryption
and Secure Sockets Layers (SSL denoted by the lock
symbol in the lower right corner of a browser)
Copyright © 2011 McGraw-Hill Ryerson Limited
1-30
The Interrelationships of Efficiency
and Effectiveness IS Metrics
Copyright © 2011 McGraw-Hill Ryerson Limited
1-31
OPENING CASE QUESTIONS
Apple - Merging Information Systems, Business and
Entertainment
1. What might have happened to Apple if its top executives
had not supported investment in iPods?
2.
Formulate a strategy for how Apple can use efficiency IS
metrics to improve its business.
3.
Formulate a strategy for how Apple can use
effectiveness IS metrics to improve its business.
4.
Why would it be unethical for Apple to sell its iTunes
customer information to other businesses?
5.
Evaluate the effects on Apple’s business if it failed to
secure its customer information and it was accidentally
posted to an anonymous Web site.
Copyright © 2011 McGraw-Hill Ryerson Limited
SECTION 1.2
BUSINESS STRATEGY
McGraw-Hill-Ryerson
©2011 The McGraw-Hill Companies, All Rights Reserved
1-33
IDENTIFYING COMPETITIVE
ADVANTAGES
• To survive and thrive an organization
must create a competitive advantage
– Competitive advantage – a product or
service that an organization’s customers
place a greater value on than similar offerings
from a competitor
– First-mover advantage – occurs when an
organization can significantly impact its
market share by being first to market with a
competitive advantage
Copyright © 2011 McGraw-Hill Ryerson Limited
1-34
IDENTIFYING COMPETITIVE
ADVANTAGES
• Organizations watch their competition through
environmental scanning
– Environmental scanning – the acquisition and
analysis of events and trends in the environment
external to an organization
• Three common tools used in industry to analyze
and develop competitive advantages include:
– Porter’s Five Forces Model
– Porter’s three generic strategies
– Value chains
Copyright © 2011 McGraw-Hill Ryerson Limited
1-35
THE FIVE FORCES MODEL –
EVALUATING BUSINESS SEGMENTS
• Porter’s Five Forces Model determines the
relative attractiveness of an industry
Copyright © 2011 McGraw-Hill Ryerson Limited
1-36
Buyer Power
• Buyer power – high when buyers have
many choices of whom to buy from and
low when their choices are few
• One way to reduce buyer power is
through loyalty programs
– Loyalty program – rewards customers
based on the amount of business they do
with a particular organization
Copyright © 2011 McGraw-Hill Ryerson Limited
1-37
Supplier Power
• Supplier power – high when buyers have few
choices of whom to buy from and low when their
choices are many
– Supply chain – consists of all parties involved in the
procurement of a product or raw material
Copyright © 2011 McGraw-Hill Ryerson Limited
1-38
Supplier Power
• Organizations that are buying goods and
services in the supply chain can create a
competitive advantage by locating
alternative supply sources (decreasing
supplier power) through B2B marketplaces
– Business-to-Business (B2B) marketplace –
an Internet-based service that brings together
many buyers and sellers
Copyright © 2011 McGraw-Hill Ryerson Limited
1-39
Supplier Power
• Two types of business-to-business (B2B)
marketplaces
– Private exchange – a single buyer posts its
needs and then opens the bidding to any
supplier who would care to bid
– Reverse auction – an auction format in
which increasingly lower bids are solicited
from organizations willing to supply the
desired product or service at an increasingly
lower price
Copyright © 2011 McGraw-Hill Ryerson Limited
1-40
Value Creation
• Once an organization chooses its
strategy, it can use tools such as the
value chain to determine the success or
failure of its chosen strategy
– Business process – a standardized set of
activities that accomplish a specific task, such
as processing a customer’s order
– Value chain – views an organization as a
series of processes, each of which adds
value to the product or service for each
customer
Copyright © 2011 McGraw-Hill Ryerson Limited
1-41
Value Creation
Value Chain
Copyright © 2011 McGraw-Hill Ryerson Limited
1-42
Value Creation
• Value chains with Porter’s Five Forces
Copyright © 2011 McGraw-Hill Ryerson Limited
1-43
Threat of Substitute Products or
Services
• Threat of substitute products or
services – high when there are many
alternatives to a product or service and
low when there are few alternatives from
which to choose
– Switching cost – costs that can make
customers reluctant to switch to another
product or service
Copyright © 2011 McGraw-Hill Ryerson Limited
1-44
Threat of New Entrants
• Threat of new entrants – high when it is
easy for new competitors to enter a
market and low when there are significant
entry barriers to entering a market
– Entry barrier – a product or service feature
that customers have come to expect from
organizations in a particular industry and
must be offered by an entering organization
to compete and survive
Copyright © 2011 McGraw-Hill Ryerson Limited
1-45
Rivalry Among Existing
Competitors
• Rivalry among existing competitors –
high when competition is fierce in a
market and low when competition is more
complacent
• Although competition is always more
intense in some industries than in others,
the overall trend is toward increased
competition in just about every industry
Copyright © 2011 McGraw-Hill Ryerson Limited
1-46
THE THREE GENERIC STRATEGIES –
CREATING A BUSINESS FOCUS
• Organizations typically
follow one of Porter’s
three generic
strategies when
entering a new market
– Broad cost
leadership
– Broad
differentiation
– Focused strategy
Copyright © 2011 McGraw-Hill Ryerson Limited
1-47
THE THREE GENERIC STRATEGIES –
CREATING A BUSINESS FOCUS
Copyright © 2011 McGraw-Hill Ryerson Limited
1-48
OPENING CASE QUESTIONS
6.
Apple - Merging Information Systems, Business
and Entertainment
Did Apple gain a competitive advantage from its
decision to invest in an online music business?
7.
How can Apple use environmental scanning to gain
business intelligence?
8.
Using Porter’s Five Force Model, analyze Apple’s buyer
power and supplier power.
9.
Which of the three generic strategies is Apple following?
10. Which of Porter’s Five Forces did Apple address
through its introduction of the iPod?
Copyright © 2011 McGraw-Hill Ryerson Limited
1-49
CLOSING CASE ONE
Say “Charge It” with Your Cell Phone
1. Do you view this technology as a
potential threat to traditional telephone
companies? If so, what
counterstrategies could traditional
telephone companies adopt to prepare
for this technology?
2. Using Porter’s Five Forces describe the
barriers to entry for this new technology.
Copyright © 2011 McGraw-Hill Ryerson Limited
1-50
CLOSING CASE ONE
Say “Charge It” with Your Cell Phone
3. Which of Porter’s three generic
strategies is this new technology
following?
4. Describe the value chain of using cell
phones as a payment method.
5. What types of regulatory issues might
occur due to this type of technology?
Copyright © 2011 McGraw-Hill Ryerson Limited
1-51
CLOSING CASE TWO
Innovative Business Managers
1. Choose one of the companies listed above and
explain how it could use a CIO, CTO, and CPO
to improve business.
2. Why is it important for all of G.A.P. Adventures’
functional business areas to work together?
Provide an example of what might happen if the
G.A.P. Adventures marketing department failed
to work with its sales department.
3. Why are information systems important to an
organization like G.A.P. Adventures?
Copyright © 2011 McGraw-Hill Ryerson Limited
1-52
CLOSING CASE TWO
Innovative Business Managers
4. Which of Porter’s Five Forces is most
important to Nike’s business?
5. Which of the three generic strategies is
PepsiCo following? Which strategy is
TransForce following?
6. Explain the value chain and how a
company like GE can use it to improve
operations.
Copyright © 2011 McGraw-Hill Ryerson Limited
1-53
CLOSING CASE THREE
The World is Flat – Thomas Friedman
1. Do you agree or disagree with Friedman’s
assessment that the world is flat? Be sure to
justify your answer.
2. What are the potential impacts of a flat world for
a student performing a job search?
3. What can students do to prepare themselves for
competing in a flat world?
4. Identify a current flattener not mentioned on
Friedman’s list.
Copyright © 2011 McGraw-Hill Ryerson Limited