IS 223 Introduction to Information Systems Fall 2020 Custom Edition for Boston University Taken from: Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Management Information Systems: Managing the Digital Firm, Sixteenth Edition by Kenneth C. Laudon and Jane P. Laudon IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Cover Art: Courtesy of kentoh/Shutterstock Taken from: Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Copyright © 2020, 2017, 2016 by Pearson Education, Inc. New York, New York 10013 Management Information Systems: Managing the Digital Firm, Sixteenth Edition by Kenneth C. Laudon and Jane P. Laudon Copyright © 2020, 2018, 2016, by Pearson Education, Inc. New York, NY 10013 Copyright © 2020 by Pearson Education, Inc. All rights reserved. Pearson Custom Edition. This copyright covers material written expressly for this volume by the editor/s as well as the compilation itself. It does not cover the individual selections herein that first appeared elsewhere. Permission to reprint these has been obtained by Pearson Education, Inc. for this edition only. Further reproduction by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, must be arranged with the individual copyright holders noted. All trademarks, service marks, registered trademarks, and registered service marks are the property of their respective owners and are used herein for identification purposes only. Pearson Education, Inc., 330 Hudson Street, New York, New York 10013 A Pearson Education Company www.pearsoned.com Printed in the United States of America ScoutAutomatedPrintCode 000200010272231114 SB/MB ISBN 10: 0-136-83983-5 ISBN 13: 978-0-136-83983-5 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Grateful acknowledgment is made to the following sources for permission to reprint material copyrighted or controlled by them: Copyright Acknowledgments “Improving Clinical care pathway of an Ayurvedic hospital: a teaching case for developing process improvement capabilities,” by Wasana Bandara, Dharshani Thennakoon, and Rehan Syed, reprinted from Journal of Information Technology Teaching Cases (January 1, 2016), by permission of Palgrave Macmillan. “BKASH: Financial Technology Innovation for Emerging Markets” (2017), by Ishtiaq P. Mahmood, Marleen Dieleman, and Narmin T. Banu, by permission of Ivey Publishing. “Netflix Inc.: The Disruptor Faces Disruption” (2017), by Chris F. Kemerer and Brian K. Dunn, by permission of Ivey Publishing. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Brief Contents Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Information Systems in Global Business Today 2 E-commerce: Digital Markets, Digital Goods 40 Hardware, Software, and Mobile Systems 115 The Cloud 161 Database Processing 219 Processes, Organizations, and Information Systems 259 Managing Knowledge and Artificial Intelligence 300 Information Systems Development 341 Securing Information Systems 388 Glossary 432 Glossary 442 Index 447 v IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Detailed Contents Chapter 1 Information Systems in Global Business Today 2 Opening Case: PCL Construction: The New Digital Firm 3 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today? 5 How Information Systems Are Transforming Business 6 • What’s New in Management Information Systems? 7 Interactive Session | Management Can You Run the Company with Your iPhone? 9 Globalization Challenges and Opportunities: A Flattened World 11 • The Emerging Digital Firm 12 • Strategic Business Objectives of Information Systems 13 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? 16 What Is an Information System? 16 • Dimensions of Information Systems 18 Interactive Session | Technology UPS Competes Globally with Information Technology 23 It Isn’t Just Technology: A Business Perspective on Information Systems 24 • Complementary Assets: Organizational Capital and the Right Business Model 26 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? 28 Technical Approach 28 • Behavioral Approach 29 • Approach of This Text: Sociotechnical Systems 29 1-4 How will MIS help my career? 30 The Company 30 • Position Description 31 • Job Requirements 31 • Interview Questions 31 • Author Tips 31 Review Summary 32 • Key Terms 33 • Review Questions 33 • Discussion Questions 34 Hands-On MIS Projects 34 Collaboration and Teamwork Project 35 Case Study: Did Information Systems Cause Deutsche Bank to Stumble? 36 References: 39 Chapter 2 E-commerce: Digital Markets, Digital Goods 40 Opening Case: Youtube Transforms the Media Landscape 41 2-1 What are the unique features of e-commerce, digital markets, and digital goods? 43 vi IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Contents vii E-commerce Today 44 • The New E-commerce: Social, Mobile, Local 45 • Why E-commerce Is Different 47 • Key Concepts in E-commerce: Digital Markets and Digital Goods in a Global Marketplace 50 2-2 What are the principal e-commerce business and revenue models? 53 Types of E-commerce 53 • E-commerce Business Models 54 Interactive Session | Organizations Uber: Digital Disruptor 57 E-commerce Revenue Models 58 2-3 How has e-commerce transformed marketing? 60 Behavioral Targeting 61 • Social E-commerce and Social Network Marketing 64 Interactive Session | Management “Socializing” with Customers 67 2-4 How has e-commerce affected business-to-business transactions? 68 Electronic Data Interchange (EDI) 69 • New Ways of B2B Buying and Selling 70 2-5 What is the role of m-commerce in business, and what are the most important m-commerce applications? 72 Location-Based Services and Applications 73 • Other Mobile Commerce Services 74 2-6 What issues must be addressed when building an e-commerce presence? 74 Develop an E-commerce Presence Map 74 • Develop a Timeline: Milestones 75 2-7 How will MIS help my career? 76 The Company 76 • Job Description 76 • Job Requirements 77 • Interview Questions 77 • Author Tips 77 Review Summary 78 • Key Terms 78 • Review Questions 79 • Discussion Questions 80 Hands-On MIS Projects 80 Collaboration and Teamwork Project 81 Case Study: A Nasty Ending for Nasty Gal 82 References: 84 BKASH: FINANCIAL TECHNOLOGY INNOVATION FOR EMERGING MARKETS 87 NETFLIX INC.: THE DISRUPTOR FACES DISRUPTION 103 Chapter 3 Hardware, Software, and Mobile Systems 115 Q3-1 What Do Business Professionals Need to Know About Computer Hardware? 117 Hardware Components 118 • Types of Hardware 118 • Computer Data 119 Q3-2 How Can New Hardware Affect Competitive Strategies? 121 Internet of Things 121 • Digital Reality Devices 123 • Self-Driving Cars 125 • 3D Printing 127 • Cryptocurrencies 127 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. viii Contents Q3-3 What Do Business Professionals Need to Know About Software? 128 What Are the Major Operating Systems? 129 • Virtualization 131 • Own Versus License 133 • What Types of Applications Exist, and How Do Organizations Obtain Them? 133 • What Is Firmware? 134 Q3-4 Is Open Source Software a Viable Alternative? 135 Why Do Programmers Volunteer Their Services? 135 So What? New from CES 2018 136 How Does Open Source Work? 137 • So, Is Open Source Viable? 138 Q3-5 What Are the Differences Between Native and Web Applications? 138 Developing Native Applications 138 • Developing Web Applications 139 • Which Is Better? 140 Q3-6 Why Are Mobile Systems Increasingly Important? 140 Hardware 141 • Software 142 • Data 142 Ethics Guide: Free Apps for Data 143 Procedures 145 • People 146 Q3-7 What Are the Challenges of Personal Mobile Devices at Work? 146 Advantages and Disadvantages of Employee Use of Mobile Systems at Work 146 Survey of Organizational BYOD Policy 147 Q3-8 2029? 149 Security Guide: Poisoned App-les 150 Career Guide: Senior Software Engineer 152 Case Study 3: The Apple of Your i 156 Chapter 4 The Cloud 161 Q4-1 Why Are Organizations Moving to the Cloud? 163 Cloud Computing 164 • Why Do Organizations Prefer the Cloud? 165 • When Does the Cloud Not Make Sense? 167 Q4-2 How Do Organizations Use the Cloud? 167 Resource Elasticity 167 • Pooling Resources 168 • Over the Internet 169 • Cloud Services from Cloud Vendors 169 • Content Delivery Networks 172 • Using Web Services Internally 173 Q4-3 What Network Technology Supports the Cloud? 174 What Are the Components of a LAN? 175 Ethics Guide: Reverse Engineering Privacy 176 Connecting Your LAN to the Internet 178 Q4-4 How Does the Internet Work? 180 The Internet and the U.S. Postal System 181 • Step 1: Assemble Package (Packets) 181 • Step 2: Put Name on Package (Domain Names) 181 • Step 3: Look Up Address (IP Address) 181 • Step 4: Put Address on Package (IP Address on Packet) 182 • Step 5: Put Registered Mail Sticker on Package (TCP) 182 • Step 6: Ship Package (Packets Transported by Carriers) 183 Q4-5 How Do Web Servers Support the Cloud? 184 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Contents ix Three-Tier Architecture 185 • Watch the Three Tiers in Action! 185 • Service-Oriented Architecture (SOA) 186 • A SOA Analogy 186 • SOA for Three-Tier Architecture 188 • Internet Protocols 189 • TCP/IP Protocol Architecture 189 Q4-6 How Can eHermes Use the Cloud? 191 SaaS Services at eHermes 191 • PaaS Services at eHermes Security 192 • IaaS Services at eHermes 192 Q4-7 How Can Organizations Use Cloud Services Securely? 192 Virtual Private Networks (VPNs) 193 • Using a Private Cloud 193 • Using a Virtual Private Cloud 195 So What? Quantum Learning 196 Q4-8 2029? 197 Security Guide: IRS Systems Overtaxed 198 Career Guide: Senior Network Manager 201 Case Study 4: Salesforce.com 205 Improving the Clinical-Care Pathway of an Ayurvedic Hospital: a Teaching Case for Developing Process Improvement Capabilities 209 Chapter 5 Database Processing 219 Q5-1 What Is the Purpose of a Database? 211 Q5-2 What Is a Database? 223 Relationships Among Rows 224 • Metadata 225 Ethics Guide: Mining at Work 226 Q5-3 What Is a Database Management System (DBMS)? 228 Creating the Database and Its Structures 228 • Processing the Database 229 • Administering the Database 229 So What? Slick Analytics 230 Q5-4 How Do Database Applications Make Databases More Useful? 232 Traditional Forms, Queries, Reports, and Applications 232 • Browser Forms, Reports, Queries, and Applications 234 • Multi-User Processing 235 Q5-5 How Are Data Models Used for Database Development? 236 What Is the Entity-Relationship Data Model? 237 Q5-6 How Is a Data Model Transformed into a Database Design? 240 Normalization 240 • Representing Relationships 242 • Users’ Role in the Development of Databases 245 Q5-7 How Can eHermes Benefit from a Database System? 245 Q5-8 2029? 247 Security Guide: Big Data . . . Losses 248 Career Guide: Director of Data Engineering 250 Case Study 5: Searching for Pianos . . . 253 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. x Contents Chapter 6 Processes, Organizations, and Information Systems 259 Q6-1 What Are the Basic Types of Processes? 261 How Do Structured Processes Differ from Dynamic Processes? 262 • How Do Processes Vary by Organizational Scope? 263 Q6-2 How Can Information Systems Improve Process Quality? 265 How Can Processes Be Improved? 266 • How Can Information Systems Improve Process Quality? 266 Q6-3 How Do Information Systems Eliminate the Problems of Information Silos? 267 What Are the Problems of Information Silos? 268 • How Do Organizations Solve the Problems of Information Silos? 269 • An Enterprise System for Patient Discharge 270 Q6-4 How Do CRM, ERP, and EAI Support Enterprise Processes? 270 The Need for Business Process Engineering 271 • Emergence of Enterprise Application Solutions 271 • Customer Relationship Management (CRM) 272 • Enterprise Resource Planning (ERP) 273 So What? Digital Dining 274 Ethics Guide: Paid Deletion 276 Enterprise Application Integration (EAI) 278 Q6-5 What Are the Elements of an ERP System? 280 Hardware 280 • ERP Application Programs 280 • ERP Databases 281 • Business Process Procedures 281 • Training and Consulting 281 • Industry-Specific Solutions 283 • Which Companies Are the Major ERP Vendors? 283 Q6-6 What Are the Challenges of Implementing and Upgrading Enterprise Information Systems? 284 Collaborative Management 284 • Requirements Gaps 284 • Transition Problems 285 • Employee Resistance 285 • New Technology 285 Q6-7 How Do Inter-Enterprise IS Solve the Problems of Enterprise Silos? 286 Q6-8 2029? 287 Security Guide: It’s Not Me . . . It’s You 288 Career Guide: Software/Platform Engineer 290 Case Study 6: A Tale of Two Interorganizational IS 296 Chapter 7 Managing Knowledge and Artificial Intelligence 300 Opening Case: Machine Learning Helps Akershus University Hospital Make Better Treatment Decisions 301 7-1 What is the role of knowledge management systems in business? 303 Important Dimensions of Knowledge 304 • The Knowledge Management Value Chain 305 • Types of Knowledge Management Systems 308 7-2 What are artificial intelligence (AI) and machine learning? How do businesses use AI? 309 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Contents xi Evolution of AI 309 • Major Types of AI 310 • Expert Systems 310 • Machine Learning 312 • Neural Networks 314 • Genetic Algorithms 317 • Natural Language Processing, Computer Vision Systems, and Robotics 318 • Intelligent Agents 319 7-3 What types of systems are used for enterprise-wide knowledge management, and how do they provide value for businesses? 320 Enterprise Content Management Systems 321 • Locating and Sharing Expertise 322 • Learning Management Systems 323 7-4 What are the major types of knowledge work systems, and how do they provide value for firms? 323 Knowledge Workers and Knowledge Work 323 Interactive Session | Management Sargent & Lundy Learns to Manage Employee Knowledge 324 Requirements of Knowledge Work Systems 325 • Examples of Knowledge Work Systems 326 Interactive Session | Technology The Reality of Virtual Reality 328 7-5 How will MIS help my career? 329 The Company 329 • Position Description 330 • Job Requirements 330 • Interview Questions 330 • Author Tips 330 Review Summary 331 • Key Terms 332 • Review Questions 332 • Discussion Questions 333 Hands-On MIS Projects 333 Collaboration and Teamwork Project 334 Case Study: Can Cars Drive Themselves—And Should They? 335 References: 338 Chapter 8 Information Systems Development 341 Q8-1 How Are Business Processes, IS, and Applications Developed? 343 How Do Business Processes, Information Systems, and Applications Differ and Relate? 344 • Which Development Processes Are Used for Which? 345 Q8-2 How Do Organizations Use Business Process Management (BPM)? 347 Why Do Processes Need Management? 347 • What Are BPM Activities? 348 Q8-3 How Is Business Process Modeling Notation (BPMN) Used to Model Processes? 350 Need for Standard for Business Processing Notation 350 • Documenting the As-Is Business Order Process 350 Q8-4 What Are the Phases in the Systems Development Life Cycle (SDLC)? 353 Define the System 355 Ethics Guide: Engineered Slowdown 356 Determine Requirements 358 • Design System Components 360 • System Implementation 361 • Maintain System 362 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. xii Contents Q8-5 What Are the Keys for Successful SDLC Projects? 363 Create a Work Breakdown Structure 363 • Estimate Time and Costs 364 • Create a Project Plan 365 • Adjust Plan via Trade-Offs 366 • Manage Development Challenges 368 Q8-6 How Can Scrum Overcome the Problems of the SDLC? 369 So What? Banking on IoT 370 What Are the Principles of Agile Development Methodologies? 371 • What Is the Scrum Process? 373 • How Do Requirements Drive the Scrum Process? 374 Q8-7 2029? 376 Fetch! 377 • User-Driven Systems 377 • Industry Will Push Change 377 Security Guide: IoT and Mirai 378 Career Guide: Developing Your Personal Brand 380 Case Study 12: When Will We Learn? 385 Chapter 9 Securing Information Systems 388 Opening Case: Hackers Target the U.S. Presidential Election: What Happened? 389 9-1 Why are information systems vulnerable to destruction, error, and abuse? 391 Why Systems are Vulnerable 392 • Malicious Software: Viruses, Worms, Trojan Horses, and Spyware 393 • Hackers and Computer Crime 396 • Internal Threats: Employees 400 • Software Vulnerability 401 9-2 What is the business value of security and control? 402 Legal and Regulatory Requirements for Electronic Records Management 402 Interactive Session | Technology Meltdown and Spectre Haunt the World’s Computers 403 Electronic Evidence and Computer Forensics 405 9-3 What are the components of an organizational framework for security and control? 406 Information Systems Controls 406 • Risk Assessment 407 • Security Policy 408 • Disaster Recovery Planning and Business Continuity Planning 409 • The Role of Auditing 409 9-4 What are the most important tools and technologies for safeguarding information resources? 410 Identity Management and Authentication 410 • Firewalls, Intrusion Detection Systems, and Anti-malware Software 412 • Securing Wireless Networks 414 • Encryption and Public Key Infrastructure 414 • Securing Transactions with Blockchain 416 • Ensuring System Availability 417 • Security Issues for Cloud Computing and the Mobile Digital Platform 417 Interactive Session | Management How Secure Is the Cloud? 418 Ensuring Software Quality 420 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Contents 9-5 xiii How will MIS help my career? 421 The Company 421 • Position Description 421 • Job Requirements 421 • Interview Questions 421 • Author Tips 422 Review Summary 422 • Key Terms 423 • Review Questions 424 • Discussion Questions 424 Hands-On MIS Projects 424 Collaboration and Teamwork Project 426 Case Study: Is the Equifax Hack the Worst Ever—and Why? 427 References: 430 Glossary 432 Glossary 442 Index 447 Chapter 1 is taken from Chapter 1 of Management Information Systems, Managing the Digital Firm, 16th Edition by Kenneth C. Laudon and Jane P. Laudon Chapter 2 is taken from Chapter 10 of Management Information Systems, Managing the Digital Firm, 16th Edition by Kenneth C. Laudon and Jane P. Laudon Chapter 3 is taken from Chapter 4 of Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Chapter 4 is taken from Chapter 6 of Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Chapter 5 is taken from Chapter 5 of Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Chapter 6 is taken from Chapter 8 of Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Chapter 7 is taken from Chapter 11 of Management Information Systems, Managing the Digital Firm, 16th Edition by Kenneth C. Laudon and Jane P. Laudon Chapter 8 is taken from Chapter 12 of Using MIS, Eleventh Edition by David M. Kroenke and Randall J. Boyle Chapter 9 is taken from Chapter 8 of Management Information Systems, Managing the Digital Firm, 16th Edition by Kenneth C. Laudon and Jane P. Laudon IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAP TER 1 Information Systems in Global Business Today LEARNING OBJECTIVES CHAPTER CASES After reading this chapter, you will be able to answer the following questions: PCL Construction: The New Digital Firm Can You Run the Company with Your iPhone? UPS Competes Globally with Information Technology Did Information Systems Cause Deutsche Bank to Stumble? 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today? 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? VIDEO CASES Business in the Cloud: Facebook, Google, and eBay Data Centers UPS Global Operations with the DIAD and Worldport Instructional Video: Tour IBM’s Raleigh Data Center 1-4 How will MIS help my career? MyLab MIS Discussion Questions: 1-4, 1-5, 1-6; Hands-on MIS Projects: 1-7, 1-8, 1-9, 1-10; Writing Assignments: 1-16, 1-17; eText with Conceptual Animations 2 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. PCL Construction: The New Digital Firm M any people think the most widely used tool in a construction project is a hammer, but it is more likely a filing cabinet or fax machine. The construction industry has traditionally been very paper-intensive and manual. A complex project such as a large building requires hundreds of architectural drawings and design documents, which can change daily. Costly delays because of difficulty locating and accessing the documents and other project information could make or break a project. Now that’s changing, and PCL Construction is at the forefront. Information technology has transformed the way this business works, and it is a prime example of the new digital firm. PCL is a group of independent general contracting construction companies, with over 4,400 employees in the United States, Canada, and Australia. The organization is active in the commercial, institutional, multifamily residential, renewable energy, heavy industrial, historical restoration, and civil construction sectors. PCL has corporate headquarters in Edmonton, Alberta, Canada and a United States head office in Denver, Colorado. At a PCL job site, you’ll now see employees using mobile devices, including smartphones, tablets, and laptops, to access important information from PCL systems or input data. Electronic touch-screen kiosks throughout the job site and electronic plan rooms provide access to digitized, updated blueprints so team members don’t have to waste time tracking down paper versions. In the past, on-site trailers used to house large paper blueprints for a project. Each time a project team member wanted to view plans, that person had to visit a trailer. With up to 800 active construction projects running simultaneously, PCL had trouble keeping project documentation up to date. Information on paper forms to track small changes to project specifications or work requirements might not reach project decision makers until 30–40 days from the time it was recorded. By then, it was too late—decisions were made “from the gut” rather than based on facts. PCL Construction plans are now in digital form, or the paper versions are scanned for digital storage. Digitized plans can be revised much more rapidly. By performing much of the design and planning work on the computer, PCL is able to identify and resolve conflicts and constructability issues early in the construction process to help keep projects ahead of schedule and within budget. © Ndoeljindoel/123RF 3 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 4 Chapter 1 Information Systems in Global Business Today PCL implemented Project Document Controls (PDC) to facilitate collaboration among project team members. A secure project-based website provides real-time storage and management of information in a single shared accessible location. Construction contractors, subcontractors, consultants, suppliers, and clients can work from the same documents wherever they are. PCL uses its own proprietary project management system for budgeting, costing, forecasting, subcontractor tracking, production, and reporting. The project management system is linked to other PCL systems, including the People and Projects database, client management and accounting systems, and the BEST Estimating system. BEST Estimating is PCL’s in-house estimating program for creating lump sum and unit price estimates and providing accurate resource and cost information. PCL started moving its computing work to Microsoft Azure Cloud, which hosts the hardware and software for running some of PCL’s applications in remote computing centers managed by Microsoft. Staff working on PCL projects can access information from cloud-based systems at any time and location using mobile devices as well as conventional desktop machines and an Internet connection. PCL saves 80 percent of the cost of backing up its corporate data by using the Azure platform. Azure Cloud also hosts a real-time analytics dashboard to monitor project performance in terms of quality, safety, schedule, and cost. The data are displayed visually as bar graphs or pie charts to construction field staff, project managers, and executives, and colors ranging from red to orange to green display performance ratings. Sources: “Technology and Innovation,” pcl.com, accessed February 9, 2018; “PCL: Capitalizing on the Cloud,” itworldcanada.com, accessed February 9, 2018; Brian Jackson, “PCL Constructors Reach New Heights with Real-time Analytics Solution in the Cloud,” IT World Canada, November 9, 2017. P CL Construction’s experience shows how essential information systems are today. PCL operates construction projects in numerous distributed locations in an industry that has been traditionally very paper-intensive. Processing and accessing the large number of documents and other information required by construction projects was excessively costly and time-consuming, driving up costs. PCL used leading-edge information technology to digitize documents and streamline business processes for documenting, tracking, and analyzing projects. The information flows that drive PCL’s business have become largely digital, making use of mobile tools and a cloud computing infrastructure. PCL Construction has become a leading example of a digital firm. The chapter-opening diagram calls attention to important points raised by this case and this chapter. To reduce time and costs and improve customer service in a heavily paper-based industry, PCL management chose to use information technology to increase the precision and efficiency of key business activities for designing, costing, budgeting, and monitoring a construction project. These technologies include mobile devices (phones, tablets, laptops), touch screen kiosks, cloud computing services, the Internet, and software for creating models, managing documents, monitoring project progress, budgeting, estimating costs, and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today Business Challenges • Widespread operations • Paper-intensive processes • Devise technology • strategy Monitor projects • Revise job functions • Revise business processes • • • • • Mobile devices Touch screen kiosks Microsoft Azure Cloud Virtual design and project management software Analytics dashboard Management Organization Information System Project Management System • Support budgeting, costing, forecasting, subcontractor tracking, and production Technology Business Solutions • Reduce costs • Improve service Virtual Design • Create digital models of structures Analytics Dashboard • Monitor project performance displaying key project performance indicators on a digital dashboard. The use of leading-edge digital technologies to drive business operations and management decisions is a key topic today in the MIS world and will be discussed throughout this text. It is also important to note that deploying information technology has changed the way PCL Construction runs its business. To effectively use all of its new digital tools, PCL had to redesign jobs and procedures for gathering, inputting, and accessing information, for designing, budgeting, and calculating costs, and for monitoring project progress. These changes had to be carefully planned to make sure they enhanced efficiency, service, and profitability. Here are some questions to think about: How did information technology change operations at PCL construction? What was the role of mobile technology and cloud computing? 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today? It’s not business as usual in the United States or the rest of the global economy anymore. In 2017, American businesses spent nearly $1 trillion on information systems hardware, software, and telecommunications equipment. In addition, they spent another $143 billion on business and management consulting and services—much of which involves redesigning firms’ business operations to take advantage of these new technologies. In fact, most of the business value of IT investment derives from these organizational, management, and cultural changes inside firms (Saunders and Brynjolfsson, 2016). Figure 1.1 shows that between 1999 and 2017, private business investment in information technology consisting of hardware, software, and communications equipment grew from 21 to 33 percent of all invested capital. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 5 Chapter 1 Information Systems in Global Business Today INFORMATION TECHNOLOGY CAPITAL INVESTMENT FIGURE 1. 1 Information technology capital investment, defined as hardware, software, and communications equipment, grew from 21 to 33 percent of all invested capital between 1999 and 2017. Source: Based on data in U.S. Department of Commerce, Bureau of Economic Analysis, National Income and Product Accounts, Table 5.3.6. Real Private Fixed Investment by Type, Chained Dollars (2018). 3000 Total Investment 2500 Investment (billions) 2000 1500 1000 IT Investment 33% 21% 500 16 17 20 15 20 14 20 12 13 20 20 11 20 10 20 09 20 08 20 07 20 06 20 05 20 03 04 20 20 02 20 20 01 20 00 20 99 0 19 6 As managers, most of you will work for firms that are intensively using information systems and making large investments in information technology. You will certainly want to know how to invest this money wisely. If you make wise choices, your firm can outperform competitors. If you make poor choices, you will be wasting valuable capital. This book is dedicated to helping you make wise decisions about information technology and information systems. How Information Systems Are Transforming Business You can see the results of this large-scale spending around you every day by observing how people conduct business. Changes in technology and new innovative business models have transformed social life and business practices. More than 269 million Americans have mobile phones (81 percent of the population), and 230 million of these people access the Internet using smartphones and tablets. Fifty-five percent of the entire population now uses tablet computers, whose sales have soared. Two hundred million Americans use online social networks; 175 million use Facebook, while 54 million use Twitter. Smartphones, social networking, texting, e-mailing, and webinars have all become essential tools of business because that’s where your customers, suppliers, and colleagues can be found (eMarketer, 2018). By June 2017, more than 140 million businesses worldwide had dot-com Internet sites registered. Today, 220 million Americans shop online, and 190 million will purchase online. In 2017, FedEx moved about 16 million packages daily in 220 countries and territories around the world, mostly overnight, and the United Parcel Service (UPS) moved more than 28 million packages daily. Businesses are using information technology to sense and respond to rapidly changing customer demand, reduce inventories to the lowest possible levels, and achieve higher IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today levels of operational efficiency. Supply chains have become more fast-paced, with companies of all sizes depending on just-in-time inventory to reduce their overhead costs and get to market faster. As newspaper print readership continues to decline, in 2017 more than 180 million people read a newspaper online, and millions more read other news sites. Online digital newspaper readership is growing at 10 percent annually, about twice as fast as the Internet itself. About 128 million people watch a video online every day, 85 million read a blog, and 30 million post to blogs, creating an explosion of new writers and new forms of customer feedback that did not exist five years ago (eMarketer, 2018). Social networking site Facebook attracted 214 million monthly visitors in 2018 in the United States and more than 2 billion worldwide. Businesses are using social networking tools to connect their employees, customers, and managers worldwide. Most Fortune 500 companies now have Facebook pages, Twitter accounts, and Tumblr sites. E-commerce and Internet advertising continue to expand. Google’s U.S. online ad revenues surpassed $32 billion in 2017, and Internet advertising continues to grow at more than 20 percent a year in the United States, reaching more than $107 billion in revenues in 2018 (eMarketer, 2018). New federal security and accounting laws requiring many businesses to keep e-mail messages for five years, coupled with existing occupational and health laws requiring firms to store employee chemical exposure data for up to 60 years, are spurring the annual growth of digital information at the estimated rate of 5 exabytes annually, equivalent to 37,000 new Libraries of Congress. What’s New in Management Information Systems? Plenty. In fact, there’s a whole new world of doing business using new technologies for managing and organizing. What makes the MIS field the most exciting area of study in schools of business is the continuous change in technology, management, and business processes. Five changes are of paramount importance. IT Innovations. A continuing stream of information technology innovations is transforming the traditional business world. Examples include the emergence of cloud computing, the growth of a mobile digital business platform based on smartphones and tablet computers, big data and the Internet of Things (IoT), business analytics, machine learning systems, and the use of social networks by managers to achieve business objectives. Most of these changes have occurred in the past few years. These innovations are enabling entrepreneurs and innovative traditional firms to create new products and services, develop new business models, and transform the day-to-day conduct of business. In the process, some old businesses, even industries, are being destroyed while new businesses are springing up. New Business Models. For instance, the emergence of online video services for streaming or downloading, such as Netflix, Apple iTunes, and Amazon, has forever changed how premium video is distributed and even created. Netflix in 2018 attracted more than 125 million subscribers worldwide to what it calls the “Internet TV revolution.” Netflix has moved into premium TV show production with nearly 1,000 original shows such as American Vandal, Suburra, The Crown, Friends From College, No Country For Old Men, House of Cards, and Orange Is the New Black, challenging cable IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 7 8 Chapter 1 Information Systems in Global Business Today and broadcast producers of TV shows, and potentially disrupting cable network dominance of TV show production. Apple’s iTunes now accounts for 67 percent of movie and TV show downloads and has struck deals with major Hollywood studios for recent movies and TV shows. A growing trickle of viewers are unplugging from cable and using only the Internet for entertainment. E-commerce Expansion. E-commerce generated about $700 billion in revenues in 2017 and is estimated to grow to nearly $950 billion by 2020. E-commerce is changing how firms design, produce, and deliver their products and services. E-commerce has reinvented itself again, disrupting the traditional marketing and advertising industry and putting major media and content firms in jeopardy. Facebook and other social networking sites such as YouTube, Twitter, and Tumblr, along with Netflix, Apple Music, and many other media firms, exemplify the new face of e-commerce in the twenty-first century. They sell services. When we think of e-commerce, we tend to think of selling physical products. While this iconic vision of e-commerce is still very powerful and the fastest-growing form of retail in the United States, growing up alongside is a whole new value stream based on selling services, not goods. It’s a services model of e-commerce. Growth in social commerce is spurred by powerful growth of the mobile platform: 85 percent of Facebook’s users access the service from mobile phones and tablets. Information systems and technologies are the foundation of this new services-based e-commerce. Mobile e-commerce hit $229 billion in 2017 and is growing at 30 percent a year. Management Changes. The management of business firms has changed: With new mobile smartphones, high-speed wireless Wi-Fi networks, and tablets, remote salespeople on the road are only seconds away from their managers’ questions and oversight. Management is going mobile. Managers on the move are in direct, continuous contact with their employees. The growth of enterprise-wide information systems with extraordinarily rich data means that managers no longer operate in a fog of confusion but instead have online, nearly instant access to the really important information they need for accurate and timely decisions. In addition to their public uses on the web, social networking tools, wikis, and blogs are becoming important corporate tools for communication, collaboration, and information sharing. Changes in Firms and Organizations. Compared to industrial organizations of the previous century, new fast-growing twenty-first-century business firms put less emphasis on hierarchy and structure and more emphasis on employees taking on multiple roles and tasks and collaborating with others on a team. They put greater emphasis on competency and skills rather than position in the hierarchy. They emphasize higher-speed and more-accurate decision making based on data and analysis. They are more aware of changes in technology, consumer attitudes, and culture. They use social media to enter into conversations with consumers and demonstrate a greater willingness to listen to consumers, in part because they have no choice. They show better understanding of the importance of information technology in creating and managing business firms and other organizations. To the extent organizations and business firms demonstrate these characteristics, they are twenty-firstcentury digital firms. You can see some of these trends at work in the Interactive Session on Management. Millions of managers rely heavily on the mobile digital platform to coordinate suppliers and shipments, satisfy customers, and manage their employees. A business day without these mobile devices or Internet access would be unthinkable. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 9 Part Two Information Technology Infrastructure INTERACTIVE SESSION Chapter 1 Information Systems in Global Business Today MANAGEMENT Can You Run the Company with Your iPhone? Can you run the company just by using your iPhone? Perhaps not entirely, but there are many business functions today that can be performed using an iPhone, iPad, or Android mobile device. Smartphones and tablets have become all-in-one tools that help managers and employees work more efficiently, packing a powerful, networked computer into a pocket-size device. With a tap or flick of a finger, these mobile devices can access the Internet or serve as a telephone, camera, music or video player, an e-mail and messaging machine, and, increasingly, a gateway into corporate systems. New software applications for document sharing, collaboration, sales, order processing, inventory management, scheduling, and production monitoring make these devices even more versatile business tools. Network Rail runs, maintains, and develops the rail tracks, signaling, bridges, tunnels, level crossings, and many key stations for most of the rail network in England, Scotland, and Wales. Keeping trains running on time is one of its top priorities. To maintain 20,000 miles of track safely and efficiently, skilled workers must be equipped with appropriate tools and work across thousands of sites throughout the rail network, 24 hours a day. Network Rail uses a group of custom apps for its 22,000 iPhone and iPad devices to streamline maintenance operations, quickly capture incident data, and immediately share critical information. Several apps help Network Rail improve railway performance and safety. The Close Call app helps employees report hazards as they are found so problems can be addressed quickly. The MyWork app gives maintenance teams all the information they need to start and complete repair tasks. The Sentinel app allows field managers to electronically scan ID cards to verify that workers are qualified to perform specific tasks. The iPhone and iPad apps provide maintenance technicians with current technical data, GPS locations, and streamlined reports, replacing cumbersome reference books and rain-soaked paperwork that slowed the repair process. Many service calls start with hazardous conditions reported by Network Rail employees themselves. Rather than waiting hours to fill out a report at the depot, workers can take pictures of dangerous situations right away, using the Close Call app to describe situations and upload photos to the call center. Once provided with the hazard’s GPS coordinates, the call center will usually schedule repairs within 24 hours. MyWork gives maintenance workers a simple overview of all of the jobs each team needs to complete during a specific shift. This mobile app clusters jobs by location, skills required, and opening and closing times. Using precise map coordinates, workers can find sites easily and finish jobs more quickly. By electronically delivering daily job schedules to over 14,000 maintenance staff members, MyWork has enabled them to complete over a half a million work orders to date while minimizing interruptions. British Airways is the largest airline in the United Kingdom, with operations in more than 200 airports worldwide. The airline has found many ways to use the iPad to improve customer service and operational efficiency. The airline has created more than 40 custom apps for over 17,000 iPads for its workforce that have transformed the way it does business. Unforeseen disruptions can create long lines of passengers seeking flight information and rebooking. The FlightReact app used by British Airways mobilizes agents to scan a boarding pass, review the customer’s booking, look up alternate flight options, and rebook and reticket passengers—all within four minutes. iBanner allows agents to identify passengers transferring onto a specific flight, while iTranslate enables staff to communicate easily with travelers speaking any language. Inside the airport, iPads and iPhones communicate with low-energy wireless Bluetooth signals from iBeacon, notifying customers of Wi-Fi access, gate locations, and flight updates. Beyond the terminal, mobile apps are helping British Airways to improve the aircraft turnaround process. British Airways has more than 70 planes at London Heathrow Terminal, five turning around at once, and each requiring a team of around 30 people. To shorten and streamline this process can generate huge business benefits. Loading luggage and cargo onto an aircraft is one of the most complex parts of the turnaround process, requiring detailed communications between the turnaround manager (TRM), who coordinates and manages the services around the aircraft during IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 9 10 Chapter 1 Information Systems in Global Business Today departure and arrival, the offsite Centralized Load Control (CLC) team, and the pilot. With iPads running the iLoad Direct app, turnaround managers are able to monitor the aircraft loading process and share data with pilots and back-office staff in real time. TRMs can receive and input real-time data about the aircraft load’s contents, weight, and distribution. These data are essential to help the pilot calculate the right amount of fuel and position the plane for take-off. By streamlining communications between the ground crew, the CLC team, and the pilot, iLoad Direct and iPad speed up the pace at which aircraft become airborne. These mobile tools have helped British Airways achieve an industry-leading benchmark for aircraft turnaround. In addition to facilitating managerial work, mobile devices are helping rank-and-file employees manage their work lives more effectively. Shyft is one of several smartphone apps that allow workers to share information, make schedule changes, and report labor violations. Thousands of employees at chains like Starbucks and Old Navy are using these apps to view their schedules and swap shifts when they’ve got a scheduling conflict or need extra work. Sources: “British Airways: Transforming the Travel Experience from Start to Finish,” Apple at Work, www.apple.com, accessed February 7, 2018; www.networkrail.co.uk,accessed September 2, 2018; “Network Rail,” iPhone in Business, www.apple.com, accessed January 4, 2017; and Lauren Weber, “Apps Empower Employees, Ease Scheduling,” Wall Street Journal, January 3, 2017. CASE STUDY QUESTIONS 1. What kinds of applications are described here? What business functions do they support? How do they improve operational efficiency and decision making? 2. Identify the problems that the business in this case study solved by using mobile digital devices. 3. What kinds of businesses are most likely to benefit from equipping their employees with mobile digital devices such as iPhones and iPads? 4. One company deploying iPhones has stated, “The iPhone is not a game changer, it’s an industry changer. It changes the way that you can interact with your customers” and “with your suppliers.” Discuss the implications of this statement. iPhone and iPad Applications for Business 1. Salesforce 2. Cisco WebEx Meetings 3. SAP Business One 4. iWork 5. Evernote 6. Adobe Acrobat Reader 7. Oracle Business Intelligence Mobile 8. Dropbox © Mama_mia/Shutterstock Whether it’s attending an online meeting, checking orders, working with files and documents, or obtaining business intelligence, Apple's iPhone and iPad offer unlimited possibilities for business users. A stunning multitouch display, full Internet browsing, and capabilities for messaging, video and audio transmission, and document management make each an all-purpose platform for mobile computing. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today Globalization Challenges and Opportunities: A Flattened World In 1492, Columbus reaffirmed what astronomers were long saying: the world was round and the seas could be safely sailed. As it turned out, the world was populated by peoples and languages living in isolation from one another, with great disparities in economic and scientific development. The world trade that ensued after Columbus’s voyages has brought these peoples and cultures closer. The “industrial revolution” was really a worldwide phenomenon energized by expansion of trade among nations and the emergence of the first global economy. In 2005, journalist Thomas Friedman wrote an influential book declaring the world was now “flat,” by which he meant that the Internet and global communications had greatly reduced the economic and cultural advantages of developed countries. Friedman argued that the United States and European countries were in a fight for their economic lives, competing for jobs, markets, resources, and even ideas with highly educated, motivated populations in low-wage areas in the less-developed world (Friedman, 2007). This “globalization” presents both challenges and opportunities for business firms. A significant percentage of the economy of the United States and other advanced industrial countries in Europe and Asia depends on imports and exports. In 2017, about 30 percent of the $20 trillion U.S. economy resulted from foreign trade, both imports and exports. In Europe and Asia, the number exceeded 50 percent. Many Fortune 500 U.S. firms derive more than half their revenues from foreign operations. Tech companies are particularly dependent on offshore revenue: 80 percent of Intel’s revenues in 2017 came from overseas sales of its microprocessors, while Apple got 60 percent of its revenue outside of the United States. Eighty percent of the toys sold in the United States are manufactured in China, while about 90 percent of the PCs manufactured in China use American-made Intel or Advanced Micro Design (AMD) chips. The microprocessor chips are shipped from the United States to China for assembly into devices. It’s not just goods that move across borders. So too do jobs, some of them high-level jobs that pay well and require a college degree. In the past decade, the United States lost 7 million manufacturing jobs to offshore, low-wage producers. But manufacturing is now a very small part of U.S. employment (less than 12 percent of the labor force and declining). In a normal year, about 300,000 service jobs move offshore to lower-wage countries. Many of the jobs are in less-skilled information system occupations, but some are “tradable service” jobs in architecture, financial services, customer call centers, consulting, engineering, and even radiology. Yet at the same time the United States has lost so many jobs, it has added 33 million new service jobs. The U.S. economy creates more than 3.5 million new jobs in a normal, non-recessionary year. Although only 1.1 million private sector jobs were created in 2011 due to slow economic recovery, by 2017, the U.S. economy was adding more than 2 million new jobs annually for the third straight year. Employment in information systems and the other service occupations is expanding rapidly, and wages are stable. Outsourcing may have accelerated the development of new systems worldwide, as these systems could be maintained and developed in lowwage countries. In part this explains why the job market for MIS and computer science graduates is growing rapidly in the United States. The challenge for you as a business student is to develop high-level skills through education and on-the-job experience that cannot be outsourced. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 11 12 Chapter 1 Information Systems in Global Business Today The challenge for your business is to avoid markets for goods and services that can be produced offshore much less expensively. The opportunities are equally immense. Throughout this book you will find examples of companies and individuals who either failed or succeeded in using information systems to adapt to this new global environment. What does globalization have to do with management information systems? That’s simple: everything. The emergence of the Internet into a full-blown international communications system has drastically reduced the costs of operating and transacting on a global scale. Communication between a factory floor in Shanghai and a distribution center in Rapid City, South Dakota, is now instant and virtually free. Customers can now shop in a worldwide marketplace, obtaining price and quality information reliably 24 hours a day. Firms producing goods and services on a global scale achieve extraordinary cost reductions by finding low-cost suppliers and managing production facilities in other countries. Internet service firms, such as Google and eBay, are able to replicate their business models and services in multiple countries without having to redesign their expensive fixed-cost information systems infrastructure. Briefly, information systems enable globalization. The Emerging Digital Firm All of the changes we have just described, coupled with equally significant organizational redesign, have created the conditions for a fully digital firm. A digital firm can be defined along several dimensions. A digital firm is one in which nearly all of the organization’s significant business relationships with customers, suppliers, and employees are digitally enabled and mediated. Core business processes are accomplished through digital networks spanning the entire organization or linking multiple organizations. Business processes refer to the set of logically related tasks and behaviors that organizations develop over time to produce specific business results and the unique manner in which these activities are organized and coordinated. Developing a new product, generating and fulfilling an order, creating a marketing plan, and hiring an employee are examples of business processes, and the ways organizations accomplish their business processes can be a source of competitive strength. Key corporate assets—intellectual property, core competencies, and financial and human assets—are managed through digital means. In a digital firm, any piece of information required to support key business decisions is available at any time and anywhere in the firm. Digital firms sense and respond to their environments far more rapidly than traditional firms, giving them more flexibility to survive in turbulent times. Digital firms offer extraordinary opportunities for more-flexible global organization and management. In digital firms, both time shifting and space shifting are the norm. Time shifting refers to business being conducted continuously, 24/7, rather than in narrow “work day” time bands of 9 a.m. to 5 p.m. Space shifting means that work takes place in a global workshop as well as within national boundaries. Work is accomplished physically wherever in the world it is best accomplished. Many firms, such as Cisco Systems, 3M, and GE, are close to becoming digital firms, using the Internet to drive every aspect of their business. Most other companies are not fully digital, but they are moving toward close digital integration with suppliers, customers, and employees. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today Strategic Business Objectives of Information Systems What makes information systems so essential today? Why are businesses investing so much in information systems and technologies? In the United States, more than 25 million business and financial managers, and 36 million professional workers in the labor force rely on information systems to conduct business. Information systems are essential for conducting day-to-day business in the United States and most other advanced countries as well as achieving strategic business objectives. Entire sectors of the economy are nearly inconceivable without substantial investments in information systems. E-commerce firms such as Amazon, eBay, Google, and E*Trade simply would not exist. Today’s service industries— finance, insurance, and real estate as well as personal services such as travel, medicine, and education—could not operate without information systems. Similarly, retail firms such as Walmart and Target and manufacturing firms such as General Motors and GE require information systems to survive and prosper. Just as offices, telephones, filing cabinets, and efficient tall buildings with elevators were once the foundations of business in the twentieth century, information technology is a foundation for business in the twenty-first century. There is a growing interdependence between a firm’s ability to use information technology and its ability to implement corporate strategies and achieve corporate goals (see Figure 1.2). What a business would like to do in five years often depends on what its systems will be able to do. Increasing market share, becoming the high-quality or low-cost producer, developing new products, and increasing employee productivity depend more and more on the kinds and quality of information systems in the organization. The more you understand about this relationship, the more valuable you will be as a manager. Specifically, business firms invest heavily in information systems to achieve six strategic business objectives: operational excellence; new products, services, FIGURE 1. 2 THE INTERDEPENDENCE BETWEEN ORGANIZATIONS AND INFORMATION SYSTEMS In contemporary systems, there is a growing interdependence between a firm’s information systems and its business capabilities. Changes in strategy, rules, and business processes increasingly require changes in hardware, software, databases, and telecommunications. Often, what the organization would like to do depends on what its systems will permit it to do. Hardware Business Strategic Objectives Business Processes Software Data Management Business Firm Information System Telecommunications IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 13 14 Chapter 1 Information Systems in Global Business Today and business models; customer and supplier intimacy; improved decision making; competitive advantage; and survival. Operational Excellence Businesses continuously seek to improve the efficiency of their operations in order to achieve higher profitability. Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations, especially when coupled with changes in business practices and management behavior. Walmart, the largest retailer on earth, exemplifies the power of information systems coupled with state-of-the-art business practices and supportive management to achieve world-class operational efficiency. In fiscal year 2018, Walmart achieved over $500 billion in sales—nearly one-tenth of retail sales in the United States—in large part because of its Retail Link system, which digitally links its suppliers to every one of Walmart’s stores. As soon as a customer purchases an item, the supplier monitoring the item knows to ship a replacement to the shelf. Walmart is the most efficient retail store in the industry, achieving sales of more than $600 per square foot, compared with its closest competitor, Target, at $425 per square foot and other large general merchandise retail firms producing less than $200 per square foot. New Products, Services, and Business Models Information systems and technologies are a major enabling tool for firms to create new products and services as well as entirely new business models. A business model describes how a company produces, delivers, and sells a product or service to create wealth. Today’s music industry is vastly different from the industry a decade ago. Apple Inc. transformed an old business model of music distribution based on vinyl records, tapes, and CDs into an online, legal distribution model based on its own iPod technology platform. Apple has prospered from a continuing stream of innovations, including the iTunes music service, the iPad, and the iPhone. Customer and Supplier Intimacy When a business really knows its customers and serves them well, the customers generally respond by returning and purchasing more. This raises revenues and profits. Likewise with suppliers, the more a business engages its suppliers, the better the suppliers can provide vital inputs. This lowers costs. How to really know your customers or suppliers is a central problem for businesses with millions of offline and online customers. The Mandarin Oriental in Manhattan and other high-end hotels exemplify the use of information systems and technologies to achieve customer intimacy. These hotels use computers to keep track of guests’ preferences, such as their preferred room temperature, check-in time, frequently dialed telephone numbers, and television programs, and store these data in a large data repository. Individual rooms in the hotels are networked to a central network server computer so that they can be remotely monitored and controlled. When a customer arrives at one of these hotels, the system automatically changes the room conditions, such as dimming the lights, setting the room temperature, or selecting appropriate music, based on the customer’s digital profile. The hotels also analyze their customer data to identify their best customers and to develop individualized marketing campaigns based on customers’ preferences. JCPenney exemplifies the benefits of information systems–enabled supplier intimacy. Every time a dress shirt is bought at a JCPenney store in the IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today United States, the record of the sale appears immediately on computers in Hong Kong at the TAL Apparel Ltd. supplier, a contract manufacturer that produces one in eight dress shirts sold in the United States. TAL runs the numbers through a computer model it developed and then decides how many replacement shirts to make and in what styles, colors, and sizes. TAL then sends the shirts to each JCPenney store, bypassing completely the retailer’s warehouses. In other words, JCPenney’s shirt inventory is near zero, as is the cost of storing it. Improved Decision Making Many business managers operate in an information fog bank, never really having the right information at the right time to make an informed decision. Instead, managers rely on forecasts, best guesses, and luck. The result is over- or underproduction of goods and services, misallocation of resources, and poor response times. These poor outcomes raise costs and lose customers. In the past decade, information systems and technologies have made it possible for managers to use real-time data from the marketplace when making decisions. For instance, Verizon Corporation, one of the largest telecommunications companies in the United States, uses a web-based digital dashboard to provide managers with precise real-time information on customer complaints, network performance for each locality served, and line outages or storm-damaged lines. Using this information, managers can immediately allocate repair resources to affected areas, inform consumers of repair efforts, and restore service fast. Competitive Advantage When firms achieve one or more of these business objectives—operational excellence; new products, services, and business models; customer/supplier intimacy; and improved decision making—chances are they have already achieved a competitive advantage. Doing things better than your competitors, charging less for superior products, and responding to customers and suppliers in real time all add up to higher sales and higher profits that your competitors cannot match. Apple Inc., Walmart, and UPS, described later in this chapter, are industry leaders because they know how to use information systems for this purpose. Survival Business firms also invest in information systems and technologies because they are necessities of doing business. Sometimes these “necessities” are driven by industry-level changes. For instance, after Citibank introduced the first automated teller machines (ATMs) in the New York region in 1977 to attract customers through higher service levels, its competitors rushed to provide ATMs to their customers to keep up with Citibank. Today, virtually all banks in the United States have regional ATMs and link to national and international ATM networks, such as CIRRUS. Providing ATM services to retail banking customers is simply a requirement of being in and surviving in the retail banking business. There are many federal and state statutes and regulations that create a legal duty for companies and their employees to retain records, including digital records. For instance, the Toxic Substances Control Act (1976), which regulates the exposure of U.S. workers to more than 75,000 toxic chemicals, requires firms to retain records on employee exposure for 30 years. The Sarbanes-Oxley Act (2002), which was intended to improve the accountability of public firms and their auditors, requires certified public accounting firms that audit public companies to retain audit working papers and records, including all e-mails, for five IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 15 16 Chapter 1 Information Systems in Global Business Today years. The Dodd-Frank Wall Street Reform and Consumer Protection Act (2010), which was intended to strengthen regulation of the banking industry, requires firms to retain all records for 10 years. Many other pieces of federal and state legislation in health care, financial services, education, and privacy protection impose significant information retention and reporting requirements on U.S. businesses. Firms turn to information systems and technologies to provide the capability to respond to these challenges. 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? So far we’ve used information systems and technologies informally without defining the terms. Information technology (IT) consists of all the hardware and software that a firm needs to use in order to achieve its business objectives. This includes not only computer machines, storage devices, and handheld mobile devices but also software, such as the Windows or Linux operating systems, the Microsoft Office desktop productivity suite, and the many thousands of computer programs that can be found in a typical large firm. “Information systems” are more complex and can be best understood by looking at them from both a technology and a business perspective. What Is an Information System? An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization. In addition to supporting decision making, coordination, and control, information systems may also help managers and workers analyze problems, visualize complex subjects, and create new products. Information systems contain information about significant people, places, and things within the organization or in the environment surrounding it. By information we mean data that have been shaped into a form that is meaningful and useful to human beings. Data, in contrast, are streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use. A brief example contrasting information and data may prove useful. Supermarket checkout counters scan millions of pieces of data from bar codes, which describe each product. Such pieces of data can be totaled and analyzed to provide meaningful information, such as the total number of bottles of dish detergent sold at a particular store, which brands of dish detergent were selling the most rapidly at that store or sales territory, or the total amount spent on that brand of dish detergent at that store or sales region (see Figure 1.3). Three activities in an information system produce the information that organizations need to make decisions, control operations, analyze problems, and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today FIGURE 1. 3 DATA AND INFORMATION Raw data from a supermarket checkout counter can be processed and organized to produce meaningful information, such as the total unit sales of dish detergent or the total sales revenue from dish detergent for a specific store or sales territory. Da ta I 331 Brite Dish Soap 1.29 863 BL Hill Coffee 4.69 173 Meow Cat .79 331 Brite Dish Soap 1.29 663 Country Ham 3.29 524 Fiery Mustard 1.49 113 Ginger Root .85 331 Brite Dish Soap 1.29 . . . rm nfo ati on Sales Region: Northwest Store: Superstore #122 Information System ITEM NO. DESCRIPTION UNITS SOLD 331 7,156 Brite Dish Soap YTD SALES $9,231.24 create new products or services. These activities are input, processing, and output (see Figure 1.4). Input captures or collects raw data from within the organization or from its external environment. Processing converts this raw input into a meaningful form. Output transfers the processed information to the people who will use it or to the activities for which it will be used. Information systems also require feedback, which is output that is returned to appropriate members of the organization to help them evaluate or correct the input stage. In PCL’s project management system, input includes the names and addresses of contractors and subcontractors, project names and identification numbers, project activities, labor costs, materials costs, and start and completion dates for project activities. Computers store these data and process them to calculate how much each project activity and the entire project will cost and estimated completion time. The system provides meaningful information such as the size, cost, and duration of all projects under PCL management, projects over and under budget, and projects and project activities that are late or on time. Although computer-based information systems use computer technology to process raw data into meaningful information, there is a sharp distinction between a computer and a computer program on the one hand and an information system on the other. Computers and related software programs are the technical foundation, the tools and materials, of modern information systems. Computers provide the equipment for storing and processing information. Computer programs, or software, are sets of operating instructions that direct and control computer processing. Knowing how computers and computer programs work is important in designing solutions to organizational problems, but computers are only part of an information system. A house is an appropriate analogy. Houses are built with hammers, nails, and wood, but these do not make a house. The architecture, design, setting, landscaping, and all of the decisions that lead to the creation of these features are part of the house and are crucial for solving the problem of putting a roof over one’s head. Computers and programs are the hammers, nails, and lumber of computer-based information systems, but alone they cannot produce the information a particular organization needs. To understand information systems, you IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 17 18 Chapter 1 Information Systems in Global Business Today FIGURE 1. 4 FUNCTIONS OF AN INFORMATION SYSTEM An information system contains information about an organization and its surrounding environment. Three basic activities—input, processing, and output—produce the information organizations need. Feedback is output returned to appropriate people or activities in the organization to evaluate and refine the input. Environmental actors, such as customers, suppliers, competitors, stockholders, and regulatory agencies, interact with the organization and its information systems. ENVIRONMENT Customers Suppliers ORGANIZATION INFORMATION SYSTEM Input Processing Classify Arrange Calculate Output Feedback Regulatory Agencies Stockholders Competitors must understand the problems they are designed to solve, their architectural and design elements, and the organizational processes that lead to the solutions. Dimensions of Information Systems To fully understand information systems, you must understand the broader organization, management, and information technology dimensions of systems (see Figure 1.5) and their power to provide solutions to challenges and problems in the business environment. We refer to this broader understanding of information systems, which encompasses an understanding of the management and organizational dimensions of systems as well as the technical dimensions of systems, as information systems literacy. Computer literacy, in contrast, focuses primarily on knowledge of information technology. The field of management information systems (MIS) tries to achieve this broader information systems literacy. MIS deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm. Let’s examine each of the dimensions of information systems—organizations, management, and information technology. Organizations Information systems are an integral part of organizations. Indeed, for some companies, such as credit reporting firms, there would be no business without an information system. The key elements of an organization are its people, structure, IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today FIGURE 1. 5 INFORMATION SYSTEMS ARE MORE THAN COMPUTERS Using information systems effectively requires an understanding of the organization, management, and information technology shaping the systems. An information system creates value for the firm as an organizational and management solution to challenges posed by the environment. Organizations Technology Information Systems Management business processes, politics, and culture. We introduce these components of organizations here. Organizations have a structure that is composed of different levels and specialties. Their structures reveal a clear-cut division of labor. Authority and responsibility in a business firm are organized as a hierarchy, or a pyramid structure. The upper levels of the hierarchy consist of managerial, professional, and technical employees, whereas the lower levels consist of operational personnel. Senior management makes long-range strategic decisions about products and services as well as ensures financial performance of the firm. Middle management carries out the programs and plans of senior management, and operational management is responsible for monitoring the daily activities of the business. Knowledge workers, such as engineers, scientists, or architects, design products or services and create new knowledge for the firm, whereas data workers, such as secretaries or clerks, assist with scheduling and communications at all levels of the firm. Production or service workers actually produce the product and deliver the service (see Figure 1.6). Experts are employed and trained for different business functions. The major business functions, or specialized tasks performed by business organizations, consist of sales and marketing, manufacturing and production, finance and accounting, and human resources (see Table 1.1). An organization coordinates work through its hierarchy and through its business processes. Most organizations’ business processes include formal rules that have been developed over a long time for accomplishing tasks. These rules guide employees in a variety of procedures, from writing an invoice to responding to customer complaints. Some of these business processes have been written down, but others are informal work practices, such as a requirement to return telephone calls from coworkers or customers, that are not formally documented. Information systems automate many business processes. For instance, how a IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 19 20 Chapter 1 Information Systems in Global Business Today FIGURE 1. 6 LEVELS IN A FIRM Business organizations are hierarchies consisting of three principal levels: senior management, middle management, and operational management. Information systems serve each of these levels. Scientists and knowledge workers often work with middle management. Senior Management Middle Management Scientists and knowledge workers Operational Management Production and service workers Data workers customer receives credit or how a customer is billed is often determined by an information system that incorporates a set of formal business processes. Each organization has a unique culture, or fundamental set of assumptions, values, and ways of doing things, that has been accepted by most of its members. You can see organizational culture at work by looking around your university or college. Some bedrock assumptions of university life are that professors know more than students, that the reason students attend college is to learn, and that classes follow a regular schedule. Parts of an organization’s culture can always be found embedded in its information systems. For instance, UPS’s first priority is customer service, which is an aspect of its organizational culture that can be found in the company’s package tracking systems, which we describe in this section. Different levels and specialties in an organization create different interests and points of view. These views often conflict over how the company should TABLE 1. 1 MAJOR BUSINESS FUNCTIONS FUNCTION PURPOSE Sales and marketing Selling the organization’s products and services Manufacturing and production Producing and delivering products and services Finance and accounting Managing the organization’s financial assets and maintaining the organization’s financial records Human resources Attracting, developing, and maintaining the organization’s labor force; maintaining employee records IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today be run and how resources and rewards should be distributed. Conflict is the basis for organizational politics. Information systems come out of this cauldron of differing perspectives, conflicts, compromises, and agreements that are a natural part of all organizations. Management Management’s job is to make sense out of the many situations faced by organizations, make decisions, and formulate action plans to solve organizational problems. Managers perceive business challenges in the environment, they set the organizational strategy for responding to those challenges, and they allocate the human and financial resources to coordinate the work and achieve success. Throughout, they must exercise responsible leadership. The business information systems described in this book reflect the hopes, dreams, and realities of real-world managers. But managers must do more than manage what already exists. They must also create new products and services and even re-create the organization from time to time. A substantial part of management responsibility is creative work driven by new knowledge and information. Information technology can play a powerful role in helping managers design and deliver new products and services and redirecting and redesigning their organizations. Information Technology Information technology is one of many tools managers use to cope with change. Computer hardware is the physical equipment used for input, processing, and output activities in an information system. It consists of the following: computers of various sizes and shapes (including mobile handheld devices); various input, output, and storage devices; and telecommunications devices that link computers together. Computer software consists of the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. Data management technology consists of the software governing the organization of data on physical storage media. Networking and telecommunications technology, consisting of both physical devices and software, links the various pieces of hardware and transfers data from one physical location to another. Computers and communications equipment can be connected in networks for sharing voice, data, images, sound, and video. A network links two or more computers to share data or resources, such as a printer. The world’s largest and most widely used network is the Internet. The Internet is a global “network of networks” that uses universal standards to connect millions of networks in more than 230 countries around the world. The Internet has created a new “universal” technology platform on which to build new products, services, strategies, and business models. This same technology platform has internal uses, providing the connectivity to link different systems and networks within the firm. Internal corporate networks based on Internet technology are called intranets. Private intranets extended to authorized users outside the organization are called extranets, and firms use such networks to coordinate their activities with other firms for making purchases, collaborating on design, and other interorganizational work. For most business IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 21 22 Chapter 1 Information Systems in Global Business Today firms today, using Internet technology is both a business necessity and a competitive advantage. The World Wide Web is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format on the Internet. Web pages contain text, graphics, animations, sound, and video and are linked to other web pages. By clicking on highlighted words or buttons on a web page, you can link to related pages to find additional information and links to other locations on the web. The web can serve as the foundation for new kinds of information systems such as UPS’s web-based package tracking system described in the Interactive Session. All of these technologies, along with the people required to run and manage them, represent resources that can be shared throughout the organization and constitute the firm’s information technology (IT) infrastructure. The IT infrastructure provides the foundation, or platform, on which the firm can build its specific information systems. Each organization must carefully design and manage its IT infrastructure so that it has the set of technology services it needs for the work it wants to accomplish with information systems. Chapters of this book examine each major technology component of information technology infrastructure and show how they all work together to create the technology platform for the organization. The Interactive Session on Technology describes some of the typical technologies used in computer-based information systems today. UPS invests heavily in information systems technology to make its business more efficient and customer oriented. It uses an array of information technologies, including bar code scanning systems, wireless networks, large mainframe computers, handheld computers, the Internet, and many different pieces of software for tracking packages, calculating fees, maintaining customer accounts, and managing logistics. Let’s identify the organization, management, and technology elements in the UPS package tracking system we have just described. The organization element anchors the package tracking system in UPS’s sales and production functions (the main product of UPS is a service—package delivery). It specifies the required procedures for identifying packages with both sender and recipient information, taking inventory, tracking the packages en route, and providing package status reports for UPS customers and customer service representatives. The system must also provide information to satisfy the needs of managers and workers. UPS drivers need to be trained in both package pickup and delivery procedures and in how to use the package tracking system so that they can work efficiently and effectively. UPS customers may need some training to use UPS in-house package tracking software or the UPS website. UPS’s management is responsible for monitoring service levels and costs and for promoting the company’s strategy of combining low cost and superior service. Management decided to use computer systems to increase the ease of sending a package using UPS and of checking its delivery status, thereby reducing delivery costs and increasing sales revenues. The technology supporting this system consists of handheld computers, bar code scanners, desktop computers, wired and wireless communications networks, UPS’s data center, storage technology for the package delivery data, UPS in-house package tracking software, and software to access the World Wide Web. The result is an information system solution to the business challenge IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter Chapter1 5Information IT Infrastructure Systems andinEmerging Global Business Technologies Today INTERACTIVE SESSION TECHNOLOGY UPS Competes Globally with Information Technology United Parcel Service (UPS) started out in 1907 in a closet-sized basement office. Jim Casey and Claude Ryan—two teenagers from Seattle with two bicycles and one phone—promised the “best service and lowest rates.” UPS has used this formula successfully for more than a century to become the world’s largest ground and air package-delivery company. It’s a global enterprise with more than 454,000 employees, over 112,000 vehicles, and the world’s ninth-largest airline. Today, UPS delivers 5.1 billion packages and documents in more than 220 countries and territories. The firm has been able to maintain leadership in small-package delivery services despite stiff competition from FedEx and the U.S. Postal Service by investing heavily in advanced information technology. UPS spends more than $1 billion each year to maintain a high level of customer service while keeping costs low and streamlining its overall operations. It all starts with the scannable bar-coded label attached to a package, which contains detailed information about the sender, the destination, and when the package should arrive. Customers can download and print their own labels using special software provided by UPS or by accessing the UPS website. Before the package is even picked up, information from the “smart” label is transmitted to one of UPS’s computer centers in Mahwah, New Jersey, or Alpharetta, Georgia, and sent to the distribution center nearest its final destination. Dispatchers at this center download the label data and use special routing software called ORION to create the most efficient delivery route for each driver that considers traffic, weather conditions, and the location of each stop. Each UPS driver makes an average of 100 stops per day. In a network with 55,000 routes in the United States alone, shaving even one mile off each driver’s daily route translates into big savings: $50 million per year. These savings are critical as UPS tries to boost earnings growth as more of its business shifts to less-profitable e-commerce deliveries. UPS drivers who used to drop off several heavy packages a day at one retailer now make many stops scattered across residential neighborhoods, delivering one lightweight package per household. The shift requires more fuel and more time, increasing the cost to deliver each package. The first thing a UPS driver picks up each day is a handheld computer called a Delivery Information Acquisition Device (DIAD), which can access a wireless cell phone network. As soon as the driver logs on, his or her day’s route is downloaded onto the handheld. The DIAD also automatically captures customers’ signatures along with pickup and delivery information. Package tracking information is then transmitted to UPS’s computer network for storage and processing. From there, the information can be accessed worldwide to provide proof of delivery to customers or to respond to customer queries. It usually takes less than 60 seconds from the time a driver presses “complete” on the DIAD for the new information to be available on the web. Through its automated package tracking system, UPS can monitor and even reroute packages throughout the delivery process. At various points along the route from sender to receiver, bar code devices scan shipping information on the package label and feed data about the progress of the package into the central computer. Customer service representatives are able to check the status of any package from desktop computers linked to the central computers and respond immediately to inquiries from customers. UPS customers can also access this information from the company’s website using their own computers or mobile phones. UPS now has mobile apps and a mobile website for iPhone, BlackBerry, and Android smartphone users. Anyone with a package to ship can access the UPS website to track packages, check delivery routes, calculate shipping rates, determine time in transit, print labels, and schedule a pickup. The data collected at the UPS website are transmitted to the UPS central computer and then back to the customer after processing. UPS also provides tools that enable customers, such Cisco Systems, to embed UPS functions, such as tracking and cost calculations, into their own websites so that they can track shipments without visiting the UPS site. UPS is now leveraging its decades of expertise managing its own global delivery network to manage logistics and supply chain activities for other companies. It created a UPS Supply Chain Solutions division that provides a complete bundle of standardized services to subscribing companies at a fraction of what it would cost to build their own systems and infrastructure. These services include supply chain design and management, freight forwarding, customs IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 23 24 Chapter 1 Information Systems in Global Business Today brokerage, mail services, multimodal transportation, and financial services in addition to logistics services. CandleScience, based in Durham, North Carolina, is an industry leader in the candle and soap supply industry, providing raw materials such as waxes, wicks, and fragrances to candle makers around the world. UPS worked with CandleScience to accurately model shipping rates for the company and its customers and to add a freight shipping option capability to its website. UPS also helped CandleScience identify the optimal location for a new warehouse for its West Coast customers. The new West Coast warehouse in Sparks, Nevada lets the company reach some of its largest customers faster, more efficiently and less expensively. UPS provides both financial and shipping advice and services to Flags of Valor, a small business based in Ashton, Virginia, which sells hundreds of hand-crafted wooden flags each day to online customers. Using UPS Quantum View Manage® technology, the staff can view and monitor outbound packages and immediately respond to customer questions about order status. UPS Capital®, the financial service division of UPS, showed the company how to protect its cash flow and assets by moving to a comprehensive insurance plan. Sources: Paul Ziobro, “UPS’s $20 Billion Problem: Operations Stuck in the 20th Century,” Wall Street Journal, June 15, 2018; www.ups.com, accessed February 7, 2018; “Igniting Growth with CandleScience,” UPS Compass, May 2017; and “Stars and Stripes Flying High,” UPS Compass, December 2017. CASE STUDY QUESTIONS 1. What are the inputs, processing, and outputs of UPS’s package tracking system? 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? 3. What strategic business objectives do UPS’s information systems address? 4. What would happen if UPS’s information systems were not available? of providing a high level of service with low prices in the face of mounting competition. It Isn’t Just Technology: A Business Perspective on Information Systems Managers and business firms invest in information technology and systems because they provide real economic value to the business. The decision to build or maintain an information system assumes that the returns on this investment will be superior to other investments in buildings, machines, or other assets. These superior returns will be expressed as increases in productivity, as increases in revenues (which will increase the firm’s stock market value), or perhaps as superior long-term strategic positioning of the firm in certain markets (which will produce superior revenues in the future). We can see that from a business perspective, an information system is an important instrument for creating value for the firm. Information systems enable the firm to increase its revenue or decrease its costs by providing information that helps managers make better decisions or that improves the execution of business processes. For example, the information system for analyzing supermarket checkout data illustrated in Figure 1.3 can increase firm profitability by helping managers make better decisions as to which products to stock and promote in retail supermarkets. Every business has an information value chain, illustrated in Figure 1.7, in which raw information is systematically acquired and then transformed IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today FIGURE 1. 7 THE BUSINESS INFORMATION VALUE CHAIN From a business perspective, information systems are part of a series of value-adding activities for acquiring, transforming, and distributing information that managers can use to improve decision making, enhance organizational performance, and, ultimately, increase firm profitability. Business Processes Supply Chain Management Data Collection and Storage Enterprise Customer Management Management Knowledge Management Firm Profitability and Strategic Position TransforDissemination mation into Business Systems Planning Information Processing Activities Coordinating Controlling Modeling and Decision Making Management Activities Business Value through various stages that add value to that information. The value of an information system to a business, as well as the decision to invest in any new information system, is, in large part, determined by the extent to which the system will lead to better management decisions, more efficient business processes, and higher firm profitability. Although there are other reasons why systems are built, their primary purpose is to contribute to corporate value. The business perspective calls attention to the organizational and managerial nature of information systems. An information system represents an organizational and management solution, based on information technology, to a challenge or problem posed by the environment. Some chapters in this book begins with a short case study that illustrates this concept. A diagram at the beginning of some chapters illustrates the relationship between a business challenge and resulting management and organizational decisions to use IT as a solution to challenges generated by the business environment. You can use this diagram as a starting point for analyzing any information system or information system problem you encounter. Review the diagram at the beginning of this chapter. The diagram shows how PCL’s systems solved the business problem of inefficiencies created by a far-flung, highly paper-intensive business. These systems provided a solution that takes advantage of opportunities provided by new wireless digital technology and the Internet. PCL digitally enabled its key business processes for planning, designing, and monitoring its construction projects. These systems have been essential in improving PCL’s overall business performance. The diagram also illustrates how management, technology, and organizational elements work together to create the systems. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 25 26 Chapter 1 Information Systems in Global Business Today FIGURE 1. 8 VARIATION IN RETURNS ON INFORMATION TECHNOLOGY INVESTMENT Although, on average, investments in information technology produce returns far above those returned by other investments, there is considerable variation across firms. Source: Brynjolfsson, Erik and Lorin M. Hitt. “Beyond Computation: Information Technology, Organizational Transformation, and Business Performance.” Journal of Economic Perspectives 14, No. 4 (2000). 4.0 1 2 3 4 2.0 Productivity (relative to industry average) 1.0 .5 .25 .12 .25 1.0 4.0 8.0 IT Capital Stock (relative to industry average) Complementary Assets: Organizational Capital and the Right Business Model Awareness of the organizational and managerial dimensions of information systems can help us understand why some firms achieve better results from their information systems than others. Studies of returns from information technology investments show that there is considerable variation in the returns firms receive (see Figure 1.8). Some firms invest a great deal and receive a great deal (quadrant 2); others invest an equal amount and receive few returns (quadrant 4). Still other firms invest little and receive much (quadrant 1), whereas others invest little and receive little (quadrant 3). This suggests that investing in information technology does not by itself guarantee good returns. What accounts for this variation among firms? The answer lies in the concept of complementary assets. Information technology investments alone cannot make organizations and managers more effective unless they are accompanied by supportive values, structures, and behavior patterns in the organization and other complementary assets. Business firms need to change how they do business before they can really reap the advantages of new information technologies. Complementary assets are those assets required to derive value from a primary investment (Teece, 1998). For instance, to realize value from automobiles requires substantial complementary investments in highways, roads, gasoline stations, repair facilities, and a legal regulatory structure to set standards and control drivers. Research indicates that firms that support their technology investments with investments in complementary assets, such as new business models, new business processes, management behavior, organizational culture, or training, receive superior returns, whereas those firms failing to make these complementary investments receive less or no returns on their information technology investments (Brynjolfsson, 2005; Brynjolfsson and Hitt, 2000; Laudon, 1974). These investments in organization and management are also known as organizational and management capital. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today TABLE 1. 2 COMPLEMENTARY SOCIAL, MANAGERIAL, AND ORGANIZATIONAL ASSETS REQUIRED TO OPTIMIZE RETURNS FROM INFORMATION TECHNOLOGY INVESTMENTS Organizational assets Supportive organizational culture that values efficiency and effectiveness Appropriate business model Efficient business processes Decentralized authority Distributed decision-making rights Strong IS development team Managerial assets Strong senior management support for technology investment and change Incentives for management innovation Teamwork and collaborative work environments Training programs to enhance management decision skills Management culture that values flexibility and knowledge-based decision making. Social assets The Internet and telecommunications infrastructure IT-enriched educational programs raising labor force computer literacy Standards (both government and private sector) Laws and regulations creating fair, stable market environments Technology and service firms in adjacent markets to assist implementation Table 1.2 lists the major complementary investments that firms need to make to realize value from their information technology investments. Some of this investment involves tangible assets, such as buildings, machinery, and tools. However, the value of investments in information technology depends to a large extent on complementary investments in management and organization. Key organizational complementary investments are a supportive business culture that values efficiency and effectiveness, an appropriate business model, efficient business processes, decentralization of authority, highly distributed decision rights, and a strong information system (IS) development team. Important managerial complementary assets are strong senior management support for change, incentive systems that monitor and reward individual innovation, an emphasis on teamwork and collaboration, training programs, and a management culture that values flexibility and knowledge. Important social investments (not made by the firm but by the society at large, other firms, governments, and other key market actors) are the Internet and the supporting Internet culture, educational systems, network and computing standards, regulations and laws, and the presence of technology and service firms. Throughout the book, we emphasize a framework of analysis that considers technology, management, and organizational assets and their interactions. Perhaps the single most important theme in the book, reflected in case studies and exercises, is that managers need to consider the broader organization and management dimensions of information systems to understand current problems as well as to derive substantial above-average returns from their information technology investments. As you will see throughout the text, firms that IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 27 28 Chapter 1 Information Systems in Global Business Today can address these related dimensions of the IT investment are, on average, richly rewarded. 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? The study of information systems is a multidisciplinary field. No single theory or perspective dominates. Figure 1.9 illustrates the major disciplines that contribute problems, issues, and solutions in the study of information systems. In general, the field can be divided into technical and behavioral approaches. Information systems are sociotechnical systems. Though they are composed of machines, devices, and “hard” physical technology, they require substantial social, organizational, and intellectual investments to make them work properly. Technical Approach The technical approach to information systems emphasizes mathematically based models to study information systems as well as the physical technology and formal capabilities of these systems. The disciplines that contribute to the technical approach are computer science, management science, and operations research. Computer science is concerned with establishing theories of computability, methods of computation, and methods of efficient data storage and access. Management science emphasizes the development of models for decision-making and management practices. Operations research focuses on mathematical techniques for optimizing selected parameters of organizations, such as transportation, inventory control, and transaction costs. FIGURE 1. 9 CONTEMPORARY APPROACHES TO INFORMATION SYSTEMS The study of information systems deals with issues and insights contributed from technical and behavioral disciplines. Technical Approaches Computer Science Management Science Operations Research MIS Psychology Sociology Economics Behavioral Approaches IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today Behavioral Approach An important part of the information systems field is concerned with behavioral issues that arise in the development and long-term maintenance of information systems. Issues such as strategic business integration, design, implementation, utilization, and management cannot be explored usefully with the models used in the technical approach. Other behavioral disciplines contribute important concepts and methods. For instance, sociologists study information systems with an eye toward how groups and organizations shape the development of systems and also how systems affect individuals, groups, and organizations. Psychologists study information systems with an interest in how human decision makers perceive and use formal information. Economists study information systems with an interest in understanding the production of digital goods, the dynamics of digital markets, and how new information systems change the control and cost structures within the firm. The behavioral approach does not ignore technology. Indeed, information systems technology is often the stimulus for a behavioral problem or issue. But the focus of this approach is generally not on technical solutions. Instead, it concentrates on changes in attitudes, management and organizational policy, and behavior. Approach of This Text: Sociotechnical Systems Throughout this book, you will find a rich story with four main actors: suppliers of hardware and software (the technologists); business firms making investments and seeking to obtain value from the technology; managers and employees seeking to achieve business value (and other goals); and the contemporary legal, social, and cultural context (the firm’s environment). Together these actors produce what we call management information systems. The study of management information systems (MIS) arose to focus on the use of computer-based information systems in business firms and government agencies. MIS combines the work of computer science, management science, and operations research with a practical orientation toward developing system solutions to real-world problems and managing information technology resources. It is also concerned with behavioral issues surrounding the development, use, and impact of information systems, which are typically discussed in the fields of sociology, economics, and psychology. Our experience as academics and practitioners leads us to believe that no single approach effectively captures the reality of information systems. The successes and failures of information systems are rarely all technical or all behavioral. Our best advice to students is to understand the perspectives of many disciplines. Indeed, the challenge and excitement of the information systems field are that it requires an appreciation and tolerance of many different approaches. The view we adopt in this book is best characterized as the sociotechnical view of systems. In this view, optimal organizational performance is achieved by jointly optimizing both the social and technical systems used in production. Adopting a sociotechnical systems perspective helps to avoid a purely technological approach to information systems. For instance, the fact that information technology is rapidly declining in cost and growing in power does not IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 29 30 Chapter 1 Information Systems in Global Business Today FIGURE 1. 10 A SOCIOTECHNICAL PERSPECTIVE ON INFORMATION SYSTEMS In a sociotechnical perspective, the performance of a system is optimized when both the technology and the organization mutually adjust to one another until a satisfactory fit is obtained. TECHNOLOGY ORGANIZATION Alternative 1 Alternative 1 Alternative 2 Alternative 2 Alternative 3 Final Design of Technology Alternative 3 Final Design of Organization necessarily or easily translate into productivity enhancement or bottom-line profits. The fact that a firm has recently installed an enterprise-wide financial reporting system does not necessarily mean that it will be used, or used effectively. Likewise, the fact that a firm has recently introduced new business procedures and processes does not necessarily mean employees will be more productive in the absence of investments in new information systems to enable those processes. In this book, we stress the need to optimize the firm’s performance as a whole. Both the technical and behavioral components need attention. This means that technology must be changed and designed in such a way as to fit organizational and individual needs. Sometimes, the technology may have to be “de-optimized” to accomplish this fit. For instance, mobile phone users adapt this technology to their personal needs, and as a result manufacturers quickly seek to adjust the technology to conform to user expectations. Organizations and individuals must also be changed through training, learning, and planned organizational change to allow the technology to operate and prosper. Figure 1.10 illustrates this process of mutual adjustment in a sociotechnical system. 1-4 How will MIS help my career? Here is how Chapter 1 and this text can help you find an entry-level job as a financial client support and sales assistant. The Company Power Financial Analytics Data Services, a data and software company serving the financial industry with offices in New York City, Atlanta, Los Angeles, and Chicago, is looking to fill an entry-level position for a financial client support and sales assistant. The company has 1,600 employees, many of whom are consultants showing clients how to work with its powerful financial analytics software and data products. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today Position Description The financial client support and sales assistant will be part of a team in the company’s consulting services. Consulting teams combine a thorough understanding of finance and technology with specific expertise in Power Financial Analytics Data Services software and assist clients in a variety of ways. The company provides on-the-job training in its software and consulting methods. Job responsibilities include: • • • • Supporting Financial Analytics Data Services applications. Helping the team create custom models and screens. Training clients in their offices and at seminars. Providing expert consultation to clients by telephone and on-site. Job Requirements • Recent college graduate or investment professional with one to two years of experience. Applicants with backgrounds in finance, MIS, economics, accounting, business administration, and mathematics are preferred • Knowledge of or interest in learning about financial markets • Sound working knowledge of spreadsheets • Very strong communication and interpersonal skills • Strong desire to learn in rapidly changing environment Interview Questions 1. What is your background in finance? What courses did you take? Have you ever worked in the financial industry? What did you do there? 2. What is your proficiency level with spreadsheet software? What work have you done with Excel spreadsheets? Can you show examples of your work? 3. Are you able to discuss current trends in the financial industry and how they impact Power Financial’s business model and client base? 4. Did you ever work with clients? Can you give examples of how you provided client service or support? 5. Can you give us an example of a finance-related problem or other business problem that you helped solve? Did you do any writing and analysis? Can you provide examples? Author Tips 1. Use the web to learn about financial markets and the financial industry. 2. Use the web to research the company, its financial products, and the tools and services it offers customers. Learn what you can about its consulting services. Additionally, examine the company’s social medial channels, such as LinkedIn and Facebook, for trends and themes. 3. Inquire exactly how you would be using spreadsheets for this job. Provide examples of how you used spreadsheets to solve problems in the classroom or for a job assignment. Show the spreadsheet work you did in finance. 4. Bring examples of your writing (including some from your Digital Portfolio described in MyLab MIS) demonstrating your analytical skills and project experience. Be prepared to discuss how you helped customers solve a business problem or the business problem solving you did for your courses. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 31 32 Chapter 1 Information Systems in Global Business Today REVIEW SUMMARY 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today? E-mail, online conferencing, smartphones, and tablet computers have become essential tools for conducting business. Information systems are the foundation of fast-paced supply chains. The Internet allows many businesses to buy, sell, advertise, and solicit customer feedback online. Organizations are trying to become more competitive and efficient by digitally enabling their core business processes and evolving into digital firms. The Internet has stimulated globalization by dramatically reducing the costs of producing, buying, and selling goods on a global scale. New information system trends include the emerging mobile digital platform, big data, and cloud computing. Information systems are a foundation for conducting business today. In many industries, survival and the ability to achieve strategic business goals are difficult without extensive use of information technology. Businesses today use information systems to achieve six major objectives: operational excellence; new products, services, and business models; customer/supplier intimacy; improved decision making; competitive advantage; and day-to-day survival. 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? From a technical perspective, an information system collects, stores, and disseminates information from an organization’s environment and internal operations to support organizational functions and decision making, communication, coordination, control, analysis, and visualization. Information systems transform raw data into useful information through three basic activities: input, processing, and output. From a business perspective, an information system provides a solution to a problem or challenge facing a firm and represents a combination of management, organization, and technology elements. The management dimension of information systems involves issues such as leadership, strategy, and management behavior. The technology dimension consists of computer hardware, software, data management technology, and networking/telecommunications technology (including the Internet). The organization dimension of information systems involves issues such as the organization’s hierarchy, functional specialties, business processes, culture, and political interest groups. In order to obtain meaningful value from information systems, organizations must support their technology investments with appropriate complementary investments in organizations and management. These complementary assets include new business models and business processes, supportive organizational culture and management behavior, and appropriate technology standards, regulations, and laws. New information technology investments are unlikely to produce high returns unless businesses make the appropriate managerial and organizational changes to support the technology. 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? The study of information systems deals with issues and insights contributed from technical and behavioral disciplines. The disciplines that contribute to the technical approach focusing on formal models and capabilities of systems are computer science, management science, and operations research. The disciplines contributing to the behavioral approach focusing on the design, implementation, management, and business impact of systems are psychology, sociology, and economics. A sociotechnical view of systems considers both technical and social features of systems and solutions that represent the best fit between them. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today 33 Key Terms Business functions, 19 Business model, 14 Business processes, 12 Complementary assets, 26 Computer hardware, 21 Computer literacy, 18 Computer software, 21 Culture, 20 Data, 16 Data management technology, 21 Data workers, 19 Digital firm, 12 Extranets, 21 Feedback, 17 Information, 16 Information system, 16 Information systems literacy, 18 Information technology (IT), 16 Information technology (IT) infrastructure, 22 Input, 17 Internet, 21 Intranets, 21 Knowledge workers, 19 Management information systems (MIS), 18 Middle management, 19 Network, 21 Networking and telecommunications technology, 21 Operational management, 19 Organizational and management capital, 26 Output, 17 Processing, 17 Production or service workers, 19 Senior management, 19 Sociotechnical view, 29 World Wide Web, 22 MyLab MIS To complete the problems with MyLab MIS, go to the EOC Discussion Questions in MyLab MIS. Review Questions 1-1 • • • • • 1-2 • Distinguish between data and information and between information systems literacy and computer literacy. • Explain how the Internet and the World Wide Web are related to the other technology components of information systems. • Define complementary assets and describe their relationship to information technology. • Describe the complementary social, managerial, and organizational assets required to optimize returns from information technology investments. How are information systems transforming business, and why are they so essential for running and managing a business today? Describe how information systems have changed the way businesses operate and their products and services. Identify three major new information system trends. Describe the characteristics of a digital firm. Describe the challenges and opportunities of globalization in a “flattened” world. List and describe six reasons why information systems are so important for business today. What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? • • Define an information system and describe the activities it performs. List and describe the organizational, management, and technology dimensions of information systems. 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? • List and describe each discipline that contributes to a technical approach to information systems. • List and describe each discipline that contributes to a behavioral approach to information systems. • Describe the sociotechnical perspective on information systems. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 34 Chapter 1 Information Systems in Global Business Today Discussion Questions 1-4 Information systems are too important to be left to computer specialists. Do you agree? Why or why not? MyLab MIS 1-5 If you were setting up the website for a Major League Baseball team, what management, organization, and technology issues might you encounter? 1-6 What are some of the organizational, managerial, and social complementary assets that help make UPS’s information systems so successful? MyLab MIS MyLab MIS Hands-On MIS Projects The projects in this section give you hands-on experience in analyzing financial reporting and inventory management problems, using data management software to improve management decision making about increasing sales, and using Internet software for researching job requirements. Visit MyLab MIS to access this chapter’s Hands-On MIS Projects. Management Decision Problems 1-7 1-8 Snyders of Hanover, which sells about 80 million bags of pretzels, snack chips, and organic snack items each year, had its financial department use spreadsheets and manual processes for much of its data gathering and reporting. Snyder’s financial analyst would spend the entire final week of every month collecting spreadsheets from the heads of more than 50 departments worldwide. She would then consolidate and reenter all the data into another spreadsheet, which would serve as the company’s monthly profit-and-loss statement. If a department needed to update its data after submitting the spreadsheet to the main office, the analyst had to return the original spreadsheet, then wait for the department to resubmit its data before finally submitting the updated data in the consolidated document. Assess the impact of this situation on business performance and management decision making. Dollar General Corporation operates deep-discount stores offering housewares, cleaning supplies, clothing, health and beauty aids, and packaged food, with most items selling for $1. Its business model calls for keeping costs as low as possible. The company has no automated method for keeping track of inventory at each store. Managers know approximately how many cases of a particular product the store is supposed to receive when a delivery truck arrives, but the stores lack technology for scanning the cases or verifying the item count inside the cases. Merchandise losses from theft or other mishaps have been rising and now represent more than 3 percent of total sales. What decisions have to be made before investing in an information system solution? Improving Decision Making: Using Databases to Analyze Sales Trends Software skills: Database querying and reporting Business skills: Sales trend analysis 1-9 In this project, you will start out with raw transactional sales data and use Microsoft Access database software to develop queries and reports that help managers make better decisions about product pricing, sales promotions, and inventory replenishment. In MyLab MIS, you can find a Store and Regional Sales Database developed in Microsoft Access. The database contains raw data on weekly store sales of computer equipment in various sales regions. The database includes fields for store identification number, sales region, item number, item description, unit price, units sold, and the weekly sales period when the sales were made. Use Access to develop some reports and queries to make this information more useful for running the business. Sales and production managers want answers to the following questions: • Which products should be restocked? • Which stores and sales regions would benefit from a promotional campaign and additional marketing? • When (what time of year) should products be offered at full price, and when should discounts be used? You can easily modify the database table to find and report your answers. Print your reports and results of queries. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today 35 Improving Decision Making: Using the Internet to Locate Jobs Requiring Information Systems Knowledge Software skills: Internet-based software Business skills: Job searching 1-10 Visit a job-posting website such as Monster.com. Spend some time at the site examining jobs for accounting, finance, sales, marketing, and human resources. Find two or three descriptions of jobs that require some information systems knowledge. What information systems knowledge do these jobs require? What do you need to do to prepare for these jobs? Write a one- to two-page report summarizing your findings. Collaboration and Teamwork Project Selecting Team Collaboration Tools 1-11 Form a team with three or four classmates and review the capabilities of Google Drive and Google Sites for your team collaboration work. Compare the capabilities of these two tools for storing team documents, project announcements, source materials, work assignments, illustrations, electronic presentations, and web pages of interest. Learn how each works with Google Docs. Explain why Google Drive or Google Sites is more appropriate for your team. If possible, use Google Docs to brainstorm and develop a presentation of your findings for the class. Organize and store your presentation using the Google tool you have selected. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 36 Chapter 1 Information Systems in Global Business Today Did Information Systems Cause Deutsche Bank to Stumble? CASE STUDY D eutsche Bank AG, founded in 1870, is one of the world’s top financial companies, with 2,425 branches worldwide. It offers a range of financial products and services, including retail and commercial banking, foreign exchange, and services for mergers and acquisitions. The bank provides products for mortgages, consumer finance, credit cards, life insurance, and corporate pension plans; financing for international trade; and customized wealth management services for wealthy private clients. Deutsche Bank is also the largest bank in Germany, and plays a central role in German economic life. In many ways, Deutsche Bank is the embodiment of the global financial system. Deutsche Bank has the world’s largest portfolio of derivatives, valued at about $46 trillion. A financial derivative is a contract between two or more parties whose value is dependent upon or derived from one or more underlying assets, such as stocks, bonds, commodities, currencies, and interest rates. Although Deutsche Bank had survived the 2008 banking crisis, which was partly triggered by flawed derivatives, it is now struggling with seismic changes in the banking industry, including recent regulatory change. The bank was forced to pay $7.2 billion to resolve U.S. regulator complaints about its sale of toxic mortgage securities that contributed to the 2008 financial crisis. In addition, the Commodity Futures Trading Commission (CFTC) charged that Deutsche Bank submitted incomplete and untimely credit default swap data, failed to properly supervise employees responsible for swap data reporting, and lacked an adequate business continuity and disaster recovery plan. (A credit default swap is a type of credit insurance contract in which an insurer promises to compensate an insured party [such as a bank] for losses incurred when a debtor [such as a corporation] defaults on a debt and that can be purchased or sold by either party on the financial market. Credit default swaps are very complex financial instruments.) The CFTC complained that on April 16, 2016, Deutsche Bank’s swap data reporting system experienced a system outage that prevented Deutsche Bank from reporting any swap data for multiple asset classes for approximately five days. Deutsche Bank’s subsequent efforts to end the system outage repeatedly exacerbated existing reporting problems and led to the discovery and creation of new reporting problems. For example, Deutsche Bank’s swap data reported before and after the system outage revealed persistent problems with the integrity of certain data fields, including numerous invalid legal entity identifiers. (A legal entity identifier [LEI] is an identification code to uniquely identify all legal entities that are parties to financial transactions.) The CFTC complaint alleged that a number of these reporting problems persist today, affecting market data that is made available to the public as well as data that is used by the CFTC to evaluate systemic risk throughout the swaps markets. The CFTC complaint also alleged that Deutsche Bank’s system outage and subsequent reporting problems occurred in part because Deutsche Bank failed to have an adequate business continuity and disaster recovery plan and other appropriate supervisory systems in place. In addition to incurring high costs associated with coping with regulators and paying fines, Deutsche Bank was a very unwieldy and expensive bank to operate. U.S. regulators have identified Deutsche Bank’s antiquated technology as one reason why the bank was not always able to provide the correct information for running its business properly and responding to regulators. Poor information systems may have even contributed to the 2008 financial crisis. Banks often had trouble untangling the complex financial products they had bought and sold to determine their underlying value. Banks, including Deutsche Bank, are intensive users of information technology, and they rely on technology to spot misconduct. If Deutsche Bank was such an important player in the German and world financial systems, why were its systems not up to the job? It turns out that Deutsche Bank, like other leading global financial companies, had undergone decades of mergers and expansion. When these banks merged or acquired other financial companies, they often did not make the requisite (and often far-reaching) changes to integrate their information systems with IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today those of their acquisitions. The effort and costs required for this integration, including coordination across many management teams, were too great. So the banks left many old systems in place to handle the workload for each of their businesses. This created what experts call “spaghetti balls” of overlapping and often incompatible technology platforms and software programs. These antiquated legacy systems were designed to handle large numbers of transactions and sums of money, but they were not well suited to managing large bank operations. They often did not allow information to be shared easily among departments or provide senior management with a coherent overview of bank operations. Deutsche Bank had more than 100 different booking systems for trades in London alone and no common set of codes for identifying clients in each of these systems. Each of these systems might use a different number or code for identifying the same client, so it would be extremely difficult or impossible to show how the same client was treated in all of these systems. Individual teams and traders each had their own incompatible platforms. The bank had employed a deliberate strategy of pitting teams against each other to spur them on, but this further encouraged the use of different systems because competing traders and teams were reluctant to share their data. Yet the bank ultimately had to reconcile the data from these disparate systems, often by hand, before trades could be processed and recorded. This situation has made it very difficult for banks to undertake ambitious technology projects for the systems that they need today or to comply with regulatory requirements. U.S. regulators criticized Deutsche Bank for its inability to provide essential information because of its antiquated technology. Regulators are demanding that financial institutions improve the way they manage risk. The banks are under pressure to make their aging computer systems comply, but the IT infrastructures at many traditional financial institutions are failing to keep up with these regulatory pressures or with changing consumer expectations. Deutsche Bank and its peers must also adapt to new innovative technology competitors such as Apple that are muscling into banking services. In July 2015, John Cryan became Deutsche Bank’s CEO. He tried to reduce costs and improve efficiency, laying off thousands of employees. He focused on overhauling Deutsche Bank’s fragmented, antiquated information systems, which are a major impediment to controlling costs and finding new sources of profit and growth. Cryan noted that the bank’s cost base was swollen by poor and ineffective business processes, inadequate technology, and too many tasks being handled manually. He has called for standardizing the bank’s systems and procedures, eliminating legacy software, standardizing and enhancing data, and improving reporting. Cryan appointed technology specialist Kim Hammonds as chief operating officer to oversee reengineering the bank’s information systems and operations. Hammonds had been Deutsche Bank’s global chief information officer and, before that, chief information officer at Boeing. Hammonds observed that Deutsche Bank’s information systems operated by trial and error, as if her former employer Boeing launched aircraft into the sky, watched them crash, and then tried to learn from the mistakes. In February 2015, Deutsche Bank announced a 10-year, multibillion-dollar deal with Hewlett-Packard (HP) to standardize and simplify its IT infrastructure, reduce costs, and create a more modern and agile technology platform for launching new products and services. Deutsche Bank would migrate to a cloud computing infrastructure where it would run its information systems in HP’s remote computer centers. HP would provide computing services, hosting, and storage. Deutsche Bank would still be in charge of application development and information security technologies, which it considers as proprietary and crucial for competitive differentiation. Deutsche Bank is withdrawing from high-risk client relationships, improving its control framework, and automating manual reconciliations. To modernize its IT infrastructure, the bank is reducing the number of its individual operating systems that control the way a computer works from 45 to four, replacing scores of outdated computers, and replacing antiquated software applications. Thousands of applications and functions will be shifted from Deutsche Bank’s mainframes to HP’s cloud computing services. Automating manual processes will promote efficiency and better control. These improvements are expected to reduce “run the bank” costs by 800 million euros. Eliminating 6,000 contractors will create total savings of 1 billion euros. Deutsche Bank has also opened four technology centers to work with financial technology startups to improve its technology. Despite all of these efforts, Deutsche Bank has struggled to regain profitability and stability. In early April 2018 the bank’s supervisory board replaced Cryan with Christian Sewing, a longtime IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 37 38 Chapter 1 Information Systems in Global Business Today insider who had been in charge of the bank’s wealth management division and its branch network in Germany. During his tenure, Cryan was unable to restore profitability. In February 2018 the bank reported a loss of €735 million, or about $900 million, for 2017, which represented its third consecutive annual loss. Deutsche Bank has not been the only major bank to be hampered by system problems. IT shortcomings were one reason Banco Santander’s U.S. unit in 2016 failed the U.S. Federal Reserve’s annual “stress tests,” which gauge how big banks would fare in a new financial crisis. A 2015 Accenture consultants’ report found that only 6 percent of board of director members and 3 percent of CEOs at the world’s largest banks had professional technology experience. Financial technology innovations, security, IT resilience, and technology implications of regulatory changes are now all critical issues for bank boards of directors, but many lack the knowledge to assess these issues and make informed decisions about strategy, investment, and how best to allocate technology resources. Sources: Jack Ewing, “Deutsche Bank Replaces CEO Amid Losses and Lack of Direction,” New York Times, April 8, 2018; Charles Riley, “Deutsche Bank Hasn’t Made a Profit in Three Years,” CNN Money, February 2, 2018; Anna Irrera, “Deutsche Bank Launches Tech Startup Lab in New York City,” Reuters, March 21, 2017; Geoffrey Smith, “Things You Should Know About the Deutsche Bank Train Wreck,” Fortune, September 28, 2016; Hayley McDowell, “System Outage Sees Deutsche Bank Charged over Reporting Failures,” The Trade News, August 19, 2016; Derek du Preez, “US Regulator Charges Deutsche Bank over Multiple Systems Failures,” Diginomica, August 19, 2016; Kat Hall, “Deutsche Bank’s Creaking IT Systems Nervously Eyeing Bins,” The Register, October 27, 2015; Martin Arnold and Tom Braithwaite, “Banks’ Ageing IT Systems Buckle Under Strain,” Financial Times, June 18, 2015; Martin Arnold, “Deutsche Bank to Rip Out IT Systems Blamed for Problems,” Financial Times, October 26, 2015; Ben Moshinsky, “Deutsche Bank Has a Technology Problem,” Business Insider, October 20, 2015; Edward Robinson and Nicholas Comfort, “Cryan’s Shakeup at Deutsche Bank Sees Tech Restart,” Bloomberg, December 20, 2015; and Accenture, “Bank Boardrooms Lack Technology Experience, Accenture Global Research Finds,” October 28, 2015. CASE STUDY QUESTIONS 1-12 Identify the problem described in this case study. What management, organization, and technology factors contributed to this problem? 1-13 What was the role of information technology at Deutsche Bank? How was IT related to the bank’s operational efficiency, decision-making capability, and business strategy? 1-14 Was Deutsche Bank using technology effectively to pursue its business strategy? Explain your answer. 1-15 What solution for Deutsche Bank was proposed? How effective do you think it will be? Explain your answer. MyLab MIS Go to the Assignments section of MyLab MIS to complete these writing exercises. 1-16 What are the strategic objectives that firms try to achieve by investing in information systems and technologies? For each strategic objective, give an example of how a firm could use information systems to achieve that objective. 1-17 Describe the complementary assets that firms need in order to optimize returns from their information system investments. For each type of complementary asset, give an example of a specific asset a firm should have. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 1 Information Systems in Global Business Today 39 Chapter 1 References Baldwin, Richard. The Great Convergence: Information Technology and the New Globalization. Cambridge, MA: Harvard University Press (2016.) Brynjolfsson, Erik. “VII Pillars of IT Productivity.” Optimize (May 2005). Brynjolfsson, Erik, and Lorin M. Hitt. “Beyond Computation: Information Technology, Organizational Transformation, and Business Performance.” Journal of Economic Perspectives 14, No. 4 (2000). Bureau of Economic Analysis. National Income and Product Accounts. www.bea.gov, accessed June 19, 2018. Chae, Ho-Chang, Chang E. Koh, and Victor Prybutok. “Information Technology Capability and Firm Performance: Contradictory Findings and Their Possible Causes.” MIS Quarterly 38, No. 1 (March 2014). Dedrick, Jason, Vijay Gurbaxani, and Kenneth L. Kraemer. “Information Technology and Economic Performance: A Critical Review of the Empirical Evidence.” Center for Research on Information Technology and Organizations, University of California, Irvine (December 2001). eMarketer. “Number of Bloggers in the United States from 2014 to 2020 (in Millions).” eMarketer (2018). ___________. “Average Daily Time Spent with Media According to US Internet Users, 2012 & 2017 (Hours),” March 14, 2018. eMarketer Chart. “US Digital Ad Spending, by Format, 2014–2020 (billions and % change),” June 17, 2018. FedEx Corporation. “SEC Form 10-K for the Fiscal Year Ended May 31, 2018.” Friedman, Thomas. The World Is Flat. New York: Picador (2007). Gartner Inc. “Gartner Identifies the Top 10 Strategic Technology Trends for 2018.” (October 4, 2017). Hughes, Alan, and Michael S. Scott Morton. “The Transforming Power of Complementary Assets.” MIT Sloan Management Review 47, No. 4 (Summer 2006). Lamb, Roberta, Steve Sawyer, and Rob Kling. “A Social Informatics Perspective of Socio-Technical Networks.” http://lamb.cba. hawaii.edu/pubs (2004). Laudon, Kenneth C. Computers and Bureaucratic Reform. New York: Wiley (1974). Lev, Baruch. “Intangibles: Management, Measurement, and Reporting.” The Brookings Institution Press (2001). McKinsey Global Institute. “Digital America: A Tale of the Haves and Have-Mores” (December 2015). Mithas, Sunil, and Roland T. Rust. “How Information Technology Strategy and Investments Influence Firm Performance: Conjecture and Empirical Evidence.” MIS Quarterly (March 2016). Morris, Betsy. “From Music to Maps: How Apple’s IPhone Changed Business.” Wall Street Journal (June 27, 2017). Nevo, Saggi, and Michael R. Wade. “The Formation and Value of IT-Enabled Resources: Antecedents and Consequences of Synergistic Relationships.” MIS Quarterly 34, No. 1 (March 2010). Otim, Samual, Kevin E. Dow, Varun Grover, and Jeffrey A. Wong. “The Impact of Information Technology Investments on Downside Risk of the Firm: Alternative Measurement of the Business Value of IT.” Journal of Management Information Systems 29, No. 1 (Summer 2012). Ren, Fei, and Sanjeev Dewan. “Industry-Level Analysis of Information Technology Return and Risk: What Explains the Variation?” Journal of Management Information Systems 21, No. 2 (2015). Ross, Jeanne W., and Peter Weill. “Four Questions Every CEO Should Ask About IT.” Wall Street Journal (April 25, 2011). Sabherwal, Rajiv, and Anand Jeyaraj. “Information Technology Impacts on Firm Performance: An Extension of Kohli and Devaraj (2003).” MIS Quarterly (December 2015). Sampler, Jeffrey L., and Michael J. Earl. “What’s Your Information Footprint?” MIT Sloan Management Review (Winter 2014). Saunders, Adam, and Erik Brynjolfsson. “Valuing Information Technology Related Intangible Assets.” MIS Quarterly (March 2016). Shanks, Ryan, Sunit Sinha, and Robert J. Thomas. “Managers and Machines, Unite!” Accenture (2015). Teece, David. Economic Performance and Theory of the Firm: The Selected Papers of David Teece. London: Edward Elgar Publishing (1998). U.S. Bureau of Labor Statistics. Occupational Outlook Handbook. 2018–2019 (April 19, 2018). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAP TER 2 E-commerce: Digital Markets, Digital Goods LEARNING OBJECTIVES CHAPTER CASES After reading this chapter, you will be able to answer the following questions: YouTube Transforms the Media Landscape Uber: Digital Disruptor “Socializing” with Customers A Nasty Ending for Nasty Gal 2-1 What are the unique features of e-commerce, digital markets, and digital goods? 2-2 What are the principal e-commerce business and revenue models? 2-3 How has e-commerce transformed marketing? 2-4 How has e-commerce affected business-to-business transactions? 2-5 What is the role of m-commerce in business, and what are the most important m-commerce applications? 2-6 What issues must be addressed when building an e-commerce presence? VIDEO CASES Walmart Takes On Amazon: A Battle of IT and Management Systems Groupon: Deals Galore Etsy: A Marketplace and Community Instructional Videos: Walmart’s E-commerce Fulfillment Center Network Behind the Scenes of an Amazon Warehouse 2-7 How will MIS help my career? MyLab MIS Discussion Questions: 2-7, 2-8, 2-9; Hands-on MIS Projects: 2-10, 2-11, 2-12, 2-13; eText with Conceptual Animations 40 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Youtube Transforms the Media Landscape T he first video posted on YouTube was a 19-second clip from 2005 of one of the company’s founders standing in front of the San Diego Zoo elephant cage. Who would have thought that the online video-sharing service would mushroom into the world’s second most popular website, with more than 1.8 billion monthly users? YouTube viewers worldwide now watch more than 5 billion YouTube videos per day. Three hundred hours of video are uploaded to YouTube every minute. YouTube allows users to view, rate, share, add to favorites, report, and comment on videos and subscribe to other users’ video channels. Although hundreds of millions of people love to post YouTube videos of their growing children, dogs, and cats, YouTube offers much more: clips from major motion pictures and TV shows, music videos, sports videos, videos from companies promoting their brands, and numerous “how-to” videos about home repair, gardening, and computer troubleshooting. Most YouTube content has been uploaded by individuals, but media corporations such as CBS, the BBC, Vevo, and Hulu offer some of their material via YouTube as part of a partnership program. YouTube maintains very large databases for video content and tracking the behavior of its users. It carefully mines data to give each user personalized video recommendations that will entice that person to watch longer. There are so many eyeballs affixed to YouTube—it’s a gold mine for marketers, and YouTube content gets richer by the minute. More than half of YouTube views come from mobile devices. YouTube was purchased by Google in 2006 and benefits from Google’s enormous reach, since Google handles about 80 percent of global Internet searches. YouTube revenue comes from ads accompanying videos that are targeted to site content and audiences. YouTube also offers subscription-based premium channels, film rentals, and a subscription service called YouTube Red that provides ad-free access to the website and some exclusive content. It is unclear if YouTube is actually profitable at this point. Experts believe that annual costs for running and maintaining YouTube exceed $6 billion. Once known as a magnet for pirated video, YouTube has been embraced by Hollywood and the entertainment world. Almost every movie trailer or music © Bloomicon/Shutterstock 41 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 42 Chapter 2 E-commerce: Digital Markets, Digital Goods video is released onto YouTube; all major sports leagues upload highlights there; and networks supplement traditional programming with videos that can be shared, like the talk show host James Corden’s “Carpool Karaoke” series. YouTube has become a major destination entertainment site, and it is about to alter the media landscape even further. YouTube has joined services targeting consumers who want to give up cable or satellite TV without losing access to live television. In early 2017, YouTube announced a subscription service called YouTube TV. For $40 per month, the service offers more than 60 channels, including the major networks, FX, ESPN, and the Disney Channel, as well as the ability to store an unlimited number of programs on a cloud-based digital video recorder for up to six accounts. YouTube TV subscribers will be able to watch content on any platform, including PCs, tablets, smartphones, and big-screen TVs. After the cost of acquiring all this television content is considered, Google may not make much on YouTube TV subscription revenue. That’s fine right now, because Google is using YouTube TV to break into the television advertising market, selling targeted advertising in ad slots that typically went to cable operators. In the long term, that could be significant: Roughly $70 billion is spent annually in the United States on TV ads. Sources: David Pierce, “Why You Should Cut Cable—and What You’ll Miss,” Wall Street Journal, February 14, 2018; Douglas MacMillan, “Investors Want More Transparency about YouTube’s Sales, Profit,” Wall Street Journal, April 10, 2018; “37 Mind Blowing YouTube Facts, Figures and Statistics—2018,” MerchDope, August 4, 2018; www.tv.youtube.com, accessed July 30, 2018; Jack Nicas, “YouTube Tops 1 Billion Hours of Video a Day, on Pace to Eclipse TV,” Wall Street Journal, February 27, 2017; Jack Nicas and Shalini Ramachandran, “Google’s YouTube to Launch $35-a-Month Web-TV Service,” Wall Street Journal, February 28, 2017; and Peter Kafka and Rani Molla, “2017 Was the Year Digital Ad Spending Finally Beat TV,” Recode, December 4, 2017. Y ouTube exemplifies some of the major trends in e-commerce today. It does not sell a product, it sells an innovative service, as e-commerce businesses are increasingly trying to do. YouTube’s service delivers streaming video content either for free (supported by advertising) or by subscription, and also enables users to upload and store their own videos. YouTube makes use of advanced data mining and search technology to generate revenue from advertising. YouTube is “social,” linking people to each other through their shared interests and fascination with video. And it is mobile: YouTube can be viewed on smartphones and tablets as well as conventional computers and TV screens, and more than half of YouTube views are on mobile devices. The chapter-opening diagram calls attention to important points raised by this case and this chapter. YouTube’s primary business challenge is how to take advantage of opportunities presented by the Internet and new developments in search and data mining technology to wring profits from the billions of videos it streams to viewers. Obviously YouTube had to make major investments in technology to support video uploads and downloads, gigantic databases of videos and users, tagging images, and social networking tools. YouTube generates revenue from ads targeted to video viewers and from subscriptions to its streaming content services, including its new lineup of major TV channels. It is unclear IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods Business Challenges • Design business and revenue model • Opportunities presented Management • Maintain social networks • Partner with Organization content providers • Databases • Social networking tools • Data mining • Video streaming Technology by new technology Information System Business Solutions Video Content Serving Platform • Increase revenue • Personalize streaming video • Piggyback advertising • Provide content subscription service whether YouTube has achieved long-term profitability, but it is very valuable to Google as another outlet for its advertising. Here are some questions to think about: How does YouTube provide value? Why is YouTube an expensive business to operate? Is it a viable business model? Why or why not? 2-1 What are the unique features of e-commerce, digital markets, and digital goods? In 2019, purchasing goods and services online by using smartphones, tablets, and desktop computers is ubiquitous. In 2019, an estimated 224 million Americans (about 92 percent of the Internet population) will shop online, and 195 million will purchase something online, as did millions of others worldwide. Although most purchases still take place through traditional channels, e-commerce continues to grow rapidly and to transform the way many companies do business (eMarketer, 2018h). E-commerce is composed of three major segments: retail goods, travel and services, and online content. In 2019, e-commerce consumer sales of goods ($598 billion), travel and services ($213 billion), and online content ($23 billion) will total about $830 billion. Sales of retail goods alone will be about 11 percent of total U.S. retail sales of $5.9 trillion, and are growing at 12 percent annually (compared with 3.3 percent for traditional retailers) (eMarketer, 2018e; 2018c). E-commerce is still a small part of the much larger retail goods market that takes place in physical stores. E-commerce has expanded from the desktop and home computer to mobile devices, from an isolated activity to a new social commerce, and from a Fortune 1000 commerce with a national audience to local merchants and consumers whose location is known to mobile devices. At the top 100 e-commerce retail sites, more than half of online shoppers arrive from their smartphones, and 48 percent of e-commerce sales are now mobile, while 52 percent of purchases occur on the desktop. The key words for understanding this new e-commerce in 2019 are “social, mobile, local” (eMarketer, 2018d). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 43 Chapter 2 E-commerce: Digital Markets, Digital Goods E-commerce Today E-commerce refers to the use of the Internet and the web to transact business. More formally, e-commerce is about digitally enabled commercial transactions between and among organizations and individuals. For the most part, this refers to transactions that occur over the Internet and the web. Commercial transactions involve the exchange of value (e.g., money) across organizational or individual boundaries in return for products and services. E-commerce began in 1995 when one of the first Internet portals, Netscape. com, accepted the first ads from major corporations and popularized the idea that the web could be used as a new medium for advertising and sales. No one envisioned at the time what would turn out to be an exponential growth curve for e-commerce retail sales, which doubled and tripled in the early years. E-commerce grew at double-digit rates until the recession of 2008– 2009, when growth slowed to a crawl and revenues flattened (see Figure 2.1), which is not bad considering that traditional retail sales were shrinking by 5 percent annually. Since then, offline retail sales have increased only a few percentage points a year, whereas online e-commerce has been a stellar success. The very rapid growth in e-commerce in the early years created a market bubble in e-commerce stocks, which burst in March 2001. A large number of e-commerce companies failed during this process. Yet for many others, such as Amazon, eBay, Expedia, and Google, the results have been more positive: soaring revenues, fine-tuned business models that produce profits, and rising stock prices. By 2006, e-commerce revenues returned to solid growth and have continued to be the fastest-growing form of retail trade in the United States, Europe, and Asia. • Online consumer sales (including travel and digital content) will grow to an estimated $830 billion in 2019, an increase of more than 12 percent over 2018 with 195 million people purchasing online and an additional 224 million shopping and gathering information but not purchasing (eMarketer, 2017b). FIGURE 2.1 THE GROWTH OF E-COMMERCE Retail e-commerce revenues grew 15–25 percent per year until the recession of 2008–2009, when they slowed measurably. In 2018, e-commerce revenues grew at an estimated 12 percent annually. Sources: Based on data from eMarketer, “US Retail Ecommerce Sales, 2018–2022,” 2018c; eMarketer, “US Digital Travel Sales, 2018–2022,” 2018a; and eMarketer chart, “US Mobile Downloads and In-App Revenues, 2013–2017,” 2017a. Growth in E-Commerce B2C Revenue (billions) 1200.0 1000.0 800.0 600.0 400.0 200.0 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 0.0 1995 B2C Revenues (Billions USD) 44 Year IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods • • • • The Internet influences more than $2 trillion in retail commerce that takes place in physical stores, about 40 percent of all retail sales. The number of individuals of all ages online in the United States is expected to grow to 279 million in 2018, up from 147 million in 2004. In the world, more than 3.7 billion people are now connected to the Internet. Growth in the overall Internet population has spurred growth in e-commerce (Internet World Stats, 2018). Approximately 106 million U.S. households will have broadband access to the Internet in 2018, representing about 82 percent of all households. About 232 million Americans will access the Internet by using a smartphone in 2019. Mobile e-commerce has begun a rapid growth based on apps, ringtones, downloaded entertainment, and location-based services. Mobile e-commerce will account for about $267 billion in 2019, 44 percent of all e-commerce. Mobile phones and tablets are becoming the most common Internet access device. Currently, more than 80 percent of all mobile phone users access the Internet using their phones, although they also use their desktops (eMarketer, 2018b). B2B e-commerce (use of the Internet for business-to-business commerce and collaboration among business partners) expanded to more than $7.7 trillion. Table 2.1 highlights these new e-commerce developments. The New E-commerce: Social, Mobile, Local One of the biggest changes is the extent to which e-commerce has become more social, mobile, and local. Online marketing once consisted largely of creating a corporate website, buying display ads on Yahoo, purchasing search-related ads on Google, and sending email messages. The workhorse of online marketing was the display ad. It still is, but it’s increasingly being replaced by video ads, which are far more effective. Display ads from the very beginning of the Internet were based on television ads, where brand messages were flashed before millions of users who were not expected to respond immediately, ask questions, or make observations. If the ads did not work, the solution was often to repeat the ad. The primary measure of success was how many eyeballs (unique visitors) a website produced and how many impressions a marketing campaign generated. (An impression was one ad shown to one person.) Both of these measures were carryovers from the world of television, which measures marketing in terms of audience size and ad views. From Eyeballs to Conversations: Conversational Commerce After 2007, all this changed with the rapid growth of Facebook and other social sites, the explosive growth of smartphones beginning with the Apple iPhone, and the growing interest in local marketing. What’s different about the new world of social-mobile-local e-commerce is the dual and related concepts of conversations and engagement. In the popular literature, this is often referred to as conversational commerce. Marketing in this new period is based on firms engaging in multiple online conversations with their customers, potential customers, and even critics. Your brand is being talked about on the web and social media (that’s the conversation part), and marketing your firm, building, and restoring your brands require you to locate, identify, and participate in these conversations. Social marketing means all things social: listening, discussing, interacting, empathizing, and engaging. The emphasis in online marketing has shifted from a focus on eyeballs to a focus on participating in customer-oriented conversations. In this sense, social marketing is not simply a new ad channel IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 45 46 Chapter 2 E-commerce: Digital Markets, Digital Goods TABLE 2.1 THE GROWTH OF E-COMMERCE BUSINESS TRANSFORMATION E-commerce remains the fastest-growing form of commerce when compared to physical retail stores, services, and entertainment. Social, mobile, and local commerce have become the fastest-growing forms of e-commerce. The breadth of e-commerce offerings grows, especially in the services economy of social networking, travel, entertainment, retail apparel, jewelry, appliances, and home furnishings. The online demographics of shoppers broaden to match that of ordinary shoppers. Pure e-commerce business models are refined further to achieve higher levels of profitability, and traditional retail firms, such as Walmart, JCPenney, L.L.Bean, and Macy’s, are developing omnichannel business models to strengthen their dominant physical retail assets. Walmart, the world’s largest retailer, has decided to take on Amazon with a more than $1 billion investment in its e-commerce efforts. Small businesses and entrepreneurs continue to flood the e-commerce marketplace, often riding on the infrastructures created by industry giants, such as Amazon, Apple, and Google, and increasingly taking advantage of cloud-based computing resources. Mobile e-commerce has taken off in the United States with location-based services and entertainment downloads, including e-books, movies, music, and television shows. Mobile e-commerce will generate more than $267 billion in 2019. TECHNOLOGY FOUNDATIONS Wireless Internet connections (Wi-Fi, WiMax, and 4G smartphones) continue to expand. Powerful smartphones and tablet computers provide access to music, web surfing, and entertainment as well as voice communication. Podcasting and streaming take off as platforms for distribution of video, radio, and user-generated content. Mobile devices expand to include wearable computers such as Apple Watch and Fitbit trackers. The Internet broadband foundation becomes stronger in households and businesses as communication prices fall. Social networking apps and sites such as Facebook, Twitter, LinkedIn, Instagram, and others seek to become a major new platform for e-commerce, marketing, and advertising. Facebook has 2.2 billion users worldwide and 214 million in the United States (Facebook, 2018). Internet-based models of computing, such as smartphone apps, cloud computing, software as a service (SaaS), and database software greatly reduce the cost of e-commerce websites. NEW BUSINESS MODELS EMERGE More than 70 percent of the Internet population has joined an online social network, created blogs, and shared photos and music. Together, these sites create an online audience as large as that of television that is attractive to marketers. In 2018, social networking will account for an estimated 15 percent of online time. Social sites have become the primary gateway to the Internet in news, music, and, increasingly, products and services. (eMarketer, 2018f) The traditional advertising industry is disrupted as online advertising grows twice as fast as TV and print advertising; Google, Yahoo, and Facebook display more than 1 trillion ads a year. On-demand service e-commerce sites such as Uber, Lyft, and Airbnb extend the market creator business model (on-demand model) to new areas of the economy. Newspapers and other traditional media adopt online, interactive models but are losing advertising revenues to the online players despite gaining online readers. The New York Times succeeds in capturing more than 2.8 million subscribers, growing at 25 percent annually and adding 400,000 new digital subscribers in 2018. Book publishing continues to grow slowly at 5 percent because of the growth in e-books and the continuing appeal of traditional books. Online entertainment business models offering television, movies, music, and games grow with cooperation among the major copyright owners in Hollywood and New York and with Internet distributors such as Apple, Amazon, Google, YouTube, and Facebook. Increasingly, the online distributors are moving into movie and TV production. Cable television is in modest decline, as some viewers cut or reduce their cable subscriptions and rely on Internet-based alternatives such as Roku or YouTube TV. but a collection of technology-based tools for communicating with shoppers. The leading social commerce platforms are Facebook, Instagram, Twitter, and Pinterest. In the past, firms could tightly control their brand messaging and lead consumers down a funnel of cues that ended in a purchase. That is not true of social marketing. Consumer purchase decisions are increasingly driven by the IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods 47 conversations, choices, tastes, and opinions of their social network. Social marketing is all about firms participating in and shaping this social process. From the Desktop to the Smartphone Traditional online marketing (browser-based, search, display ads, video ads, email, and games) still constitutes the majority (58 percent) of all online marketing ($107 billion), but it’s growing much more slowly than social-mobile-local marketing. Mobile marketing now constitutes 70 percent of all online marketing. The marketing dollars are following customers and shoppers from the PC to mobile devices (eMarketer, 2018g) Social, mobile, and local e-commerce are connected. As mobile devices become more powerful, they are more useful for accessing Facebook and other social sites. As mobile devices become more widely adopted, customers can use them to find local merchants, and merchants can use them to alert customers in their neighborhood of special offers. Why E-commerce Is Different Why has e-commerce grown so rapidly? The answer lies in the unique nature of the Internet and the web. Simply put, the Internet and e-commerce technologies are much richer and more powerful than previous technology revolutions such as radio, television, and the telephone. Table 2.2 describes the unique features of the Internet and web as a commercial medium. Let’s explore each of these unique features in more detail. Ubiquity In traditional commerce, a marketplace is a physical place, such as a retail store, that you visit to transact business. E-commerce is ubiquitous, meaning TABLE 2.2 EIGHT UNIQUE FEATURES OF E-COMMERCE TECHNOLOGY E-COMMERCE TECHNOLOGY DIMENSION BUSINESS SIGNIFICANCE Ubiquity. Internet/web technology is available everywhere: at work, at home, and elsewhere by desktop and mobile devices. Mobile devices extend service to local areas and merchants. The marketplace is extended beyond traditional boundaries and is removed from a temporal and geographic location. Marketspace is created; shopping can take place anytime, anywhere. Customer convenience is enhanced, and shopping costs are reduced. Global Reach. The technology reaches across national boundaries, around the earth. Commerce is enabled across cultural and national boundaries seamlessly and without modification. The marketspace includes, potentially, billions of consumers and millions of businesses worldwide. Universal Standards. There is one set of technology standards, namely Internet standards. With one set of technical standards across the globe, disparate computer systems can easily communicate with each other. Richness. Video, audio, and text messages are possible. Video, audio, and text marketing messages are integrated into a single marketing message and consumer experience. Interactivity. The technology works through interaction with the user. Consumers are engaged in a dialogue that dynamically adjusts the experience to the individual and makes the consumer a participant in the process of delivering goods to the market. Information Density. The technology reduces information costs and raises quality. Information processing, storage, and communication costs drop dramatically, whereas currency, accuracy, and timeliness improve greatly. Information becomes plentiful, cheap, and more accurate. Personalization/Customization. The technology allows personalized messages to be delivered to individuals as well as to groups. Personalization of marketing messages and customization of products and services are based on individual characteristics. Social Technology. The technology supports content generation and social networking. New Internet social and business models enable user content creation and distribution and support social networks. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 48 Chapter 2 E-commerce: Digital Markets, Digital Goods that it is available just about everywhere all the time. It makes it possible to shop from your desktop, at home, at work, or even from your car, using smartphones. The result is called a marketspace—a marketplace extended beyond traditional boundaries and removed from a temporal and geographic location. From a consumer point of view, ubiquity reduces transaction costs—the costs of participating in a market. To transact business, it is no longer necessary to spend time or money traveling to a market, and much less mental effort is required to make a purchase. Global Reach E-commerce technology permits commercial transactions to cross cultural and national boundaries far more conveniently and cost effectively than is true in traditional commerce. As a result, the potential market size for e-commerce merchants is roughly equal to the size of the world’s online population (estimated to be more than 3 billion). In contrast, most traditional commerce is local or regional—it involves local merchants or national merchants with local outlets. Television, radio stations, and newspapers, for instance, are primarily local and regional institutions with limited, but powerful, national networks that can attract a national audience but not easily cross national boundaries to a global audience. Universal Standards One strikingly unusual feature of e-commerce technologies is that the technical standards of the Internet and, therefore, the technical standards for conducting e-commerce are universal standards. All nations around the world share them and enable any computer to link with any other computer regardless of the technology platform each is using. In contrast, most traditional commerce technologies differ from one nation to the next. For instance, television and radio standards differ around the world, as does cellular telephone technology. The universal technical standards of the Internet and e-commerce greatly lower market entry costs—the cost merchants must pay simply to bring their goods to market. At the same time, for consumers, universal standards reduce search costs—the effort required to find suitable products. Richness Information richness refers to the complexity and content of a message. Traditional markets, national sales forces, and small retail stores have great richness; they can provide personal, face-to-face service, using aural and visual cues when making a sale. The richness of traditional markets makes them powerful selling or commercial environments. Prior to the development of the web, there was a trade-off between richness and reach; the larger the audience reached, the less rich the message. The web makes it possible to deliver rich messages with text, audio, and video simultaneously to large numbers of people. Interactivity Unlike any of the commercial technologies of the twentieth century, with the possible exception of the telephone, e-commerce technologies are interactive, meaning they allow for two-way communication between merchant and consumer and peer-to-peer communication among friends. Television, for instance, cannot ask viewers any questions or enter conversations with them, and it cannot request customer information to be entered on a form. In contrast, all these activities are possible on an e-commerce website or mobile app. Interactivity IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods allows an online merchant to engage a consumer in ways similar to a faceto-face experience but on a massive, global scale. Information Density The Internet and the web vastly increase information density—the total amount and quality of information available to all market participants, consumers, and merchants alike. E-commerce technologies reduce information collection, storage, processing, and communication costs while greatly increasing the currency, accuracy, and timeliness of information. Information density in e-commerce markets make prices and costs more transparent. Price transparency refers to the ease with which consumers can find out the variety of prices in a market; cost transparency refers to the ability of consumers to discover the actual costs merchants pay for products. There are advantages for merchants as well. Online merchants can discover much more about consumers than in the past. This allows merchants to segment the market into groups that are willing to pay different prices and permits the merchants to engage in price discrimination—selling the same goods, or nearly the same goods, to different targeted groups at different prices. For instance, an online merchant can discover a consumer’s avid interest in expensive, exotic vacations and then pitch high-end vacation plans to that consumer at a premium price, knowing this person is willing to pay extra for such a vacation. At the same time, the online merchant can pitch the same vacation plan at a lower price to a more price-sensitive consumer. Information density also helps merchants differentiate their products in terms of cost, brand, and quality. Personalization/Customization E-commerce technologies permit personalization. Merchants can target their marketing messages to specific individuals by adjusting the message to a person’s clickstream behavior, name, interests, and past purchases. The technology also permits customization—changing the delivered product or service based on a user’s preferences or prior behavior. Given the interactive nature of e-commerce technology, much information about the consumer can be gathered in the marketplace at the moment of purchase. With the increase in information density, a great deal of information about the consumer’s past purchases and behavior can be stored and used by online merchants. The result is a level of personalization and customization unthinkable with traditional commerce technologies. For instance, you may be able to shape what you see on television by selecting a channel, but you cannot change the content of the channel you have chosen. In contrast, online news outlets such as the Wall Street Journal Online allow you to select the type of news stories you want to see first and give you the opportunity to be alerted when certain events happen. Social Technology: User Content Generation and Social Networking In contrast to previous technologies, the Internet and e-commerce technologies have evolved to be much more social by allowing users to create and share with their friends (and a larger worldwide community) content in the form of text, videos, music, or photos. By using these forms of communication, users can create new social networks and strengthen existing ones. All previous mass media, including the printing press, use a broadcast model (one-to-many) in which content is created in a central location by experts IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 49 50 Chapter 2 E-commerce: Digital Markets, Digital Goods (professional writers, editors, directors, and producers), with audiences concentrated in huge numbers to consume a standardized product. The new Internet and e-commerce empower users to create and distribute content on a large scale and permit users to program their own content consumption. The Internet provides a unique many-to-many model of mass communications. Key Concepts in E-commerce: Digital Markets and Digital Goods in a Global Marketplace The location, timing, and revenue models of business are based in some part on the cost and distribution of information. The Internet has created a digital marketplace where millions of people all over the world can exchange massive amounts of information directly, instantly, and free. As a result, the Internet has changed the way companies conduct business and increased their global reach. The Internet reduces information asymmetry. An information asymmetry exists when one party in a transaction has more information that is important for the transaction than the other party. That information helps determine their relative bargaining power. In digital markets, consumers and suppliers can see the prices being charged for goods, and in that sense, digital markets are said to be more transparent than traditional markets. For example, before automobile retailing sites appeared on the web, there was significant information asymmetry between auto dealers and customers. Only the auto dealers knew the manufacturers’ prices, and it was difficult for consumers to shop around for the best price. Auto dealers’ profit margins depended on this asymmetry of information. Today’s consumers have access to a legion of websites providing competitive pricing information, and three-fourths of U.S. auto buyers use the Internet to shop around for the best deal. Thus, the web has reduced the information asymmetry surrounding an auto purchase. The Internet has also helped businesses seeking to purchase from other businesses reduce information asymmetries and locate better prices and terms. Digital markets are very flexible and efficient because they operate with reduced search and transaction costs, lower menu costs (merchants’ costs of changing prices), greater price discrimination, and the ability to change prices dynamically based on market conditions. In dynamic pricing, the price of a product varies depending on the demand characteristics of the customer or the supply situation of the seller. For instance, online retailers from Amazon to Walmart change prices on thousands of products based on time of day, demand for the product, and users’ prior visits to their sites. Using big data analytics, some online firms can adjust prices at the individual level based on behavioral targeting parameters such as whether the consumer is a price haggler (who will receive a lower price offer) versus a person who accepts offered prices and does not search for lower prices. Prices can also vary by zip code. Uber, along with other ride services, uses surge pricing to adjust prices of a ride based on demand (which always rises during storms and major conventions). These new digital markets can either reduce or increase switching costs, depending on the nature of the product or service being sold, and they might cause some extra delay in gratification due to shipping times. Unlike a physical market, you can’t immediately consume a product such as clothing purchased over the web (although immediate consumption is possible with digital music downloads and other digital products). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods FIGURE 2.2 THE BENEFITS OF DISINTERMEDIATION TO THE CONSUMER The typical distribution channel has several intermediary layers, each of which adds to the final cost of a product, such as a sweater. Removing layers lowers the final cost to the customer. Price per Sweater Manufacturer Manufacturer Manufacturer Distributor Retailer Customer $48.50 Retailer Customer $40.34 Customer $20.45 Digital markets provide many opportunities to sell directly to the consumer, bypassing intermediaries such as distributors or retail outlets. Eliminating intermediaries in the distribution channel can significantly lower purchase transaction costs. To pay for all the steps in a traditional distribution channel, a product may have to be priced as high as 135 percent of its original cost to manufacture. Figure 2.2 illustrates how much savings result from eliminating each of these layers in the distribution process. By selling directly to consumers or reducing the number of intermediaries, companies can raise profits while charging lower prices. The removal of organizations or business process layers responsible for intermediary steps in a value chain is called disintermediation. E-commerce has also given rise to a completely new set of new intermediaries such as Amazon, eBay, PayPal, and Blue Nile. Therefore, disintermediation differs from one industry to another. Disintermediation is affecting the market for services. Airlines and hotels operating their own reservation sites online earn more per ticket because they have eliminated travel agents as intermediaries. Table 2.3 summarizes the differences between digital markets and traditional markets. Digital Goods The Internet digital marketplace has greatly expanded sales of digital goods— goods that can be delivered over a digital network. Music tracks, video, Hollywood movies, software, newspapers, magazines, and books can all be expressed, stored, delivered, and sold as purely digital products. For the most part, digital goods are intellectual property, which is defined as “works of the mind.” Intellectual property is protected from misappropriation by copyright, patent, trademark, and trade secret laws. Today, all these products are delivered as digital streams or downloads while their physical counterparts decline in sales. In general, for digital goods, the marginal cost of producing another unit is about zero (it costs nothing to make a copy of a music file). However, the cost of producing the original first unit is relatively high—in fact, it is nearly the total cost of the product because there are few other costs of inventory and distribution. Costs of delivery over the Internet are very low, marketing costs often IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 51 52 Chapter 2 E-commerce: Digital Markets, Digital Goods TABLE 2.3 DIGITAL MARKETS COMPARED WITH TRADITIONAL MARKETS DIGITAL MARKETS TRADITIONAL MARKETS Information asymmetry Asymmetry reduced Asymmetry high Search costs Low High Transaction costs Low (sometimes virtually nothing) High (time, travel) Delayed gratification High (or lower in the case of a digital good) Lower: purchase now Menu costs Low High Dynamic pricing Low cost, instant High cost, delayed Price discrimination Low cost, instant High cost, delayed Market segmentation Low cost, moderate precision High cost, less precision Switching costs Higher/lower (depending on product characteristics) High Network effects Strong Weaker Disintermediation More possible/likely Less possible/unlikely remain the same, and pricing can be highly variable. On the Internet, the merchant can change prices as often as desired because of low menu costs. The impact of the Internet on the market for these kinds of digital goods is nothing short of revolutionary, and we see the results around us every day. Businesses dependent on physical products for sales—such as bookstores, music stores, book publishers, music labels, and film studios—face the possibility of declining sales and even destruction of their businesses. Newspaper and magazine subscriptions to hard copies are declining, while online readership and subscriptions are expanding. Total record label industry revenues fell nearly 50 percent from $14 billion in 1999 to about $7.7 billion in 2016, due almost entirely to the rapid decline in CD album sales and the growth of digital music services (both legal and illegal music piracy). But revenues increased in 2017 by 16 percent to $8.7 billion primarily through the growth of paid subscriptions (RIAA.com, 2018). The Apple iTunes Store has sold more than 50 billion songs for 99 cents each since opening in 2003, providing a digital distribution model that has restored some of the revenues lost to digital music channels. Yet the download business is rapidly fading at Apple, down more than 25 percent in recent years, as streaming becomes the dominant consumer path to music. Since iTunes, illegal downloading has been cut in half, and legitimate online music sales (both downloads and streaming) amounted to $5.7 billion in 2017. As cloud streaming services expand, illegal downloading will decline further. Digital music sales, both digital download and streaming, account for more than 80 percent of all music revenues. The music labels make only about 32 cents from a single track download and only 0.5 cents for a streamed track. Although the record labels make revenue from ownership of the song (both words and music), the artists who perform the music make virtually nothing from streamed music. Artists’ earnings on a streamed song on an ad-supported platform like Spotify are pennies per million streams. Hollywood has been less severely disrupted than the music industry by illegal digital distribution platforms, because it is more difficult to download high-quality, pirated copies of full-length movies and because of the availability of low-cost, high-quality legal movies. Hollywood has struck lucrative distribution deals with Netflix, Google, Hulu, Amazon, and Apple, making it convenient to download and pay for high-quality movies and television series. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods TABLE 2.4 HOW THE INTERNET CHANGES THE MARKETS FOR DIGITAL GOODS DIGITAL GOODS TRADITIONAL GOODS Marginal cost/unit Zero Greater than zero, high Cost of production High (most of the cost) Variable Copying cost Approximately zero Greater than zero, high Distributed delivery cost Low High Inventory cost Low High Marketing cost Variable Variable Pricing More variable (bundling, random pricing games) Fixed, based on unit costs These arrangements are not enough to compensate entirely for the loss in DVD sales, which fell 60 percent from 2006 to 2017. Digital format streaming and downloads grew by 20 percent in 2017 and, for the first time, consumers viewed more downloaded movies than DVDs or related physical products. As with television series, the demand for feature-length Hollywood movies appears to be expanding, in part because of the growth of smartphones, tablets, and smart TVs, making it easier to watch movies in more locations. In 2019, about 258 million Internet users are expected to view movies, about 82 percent of the adult Internet population. There is little doubt that the Internet is becoming a major movie distribution and television channel that rivals cable television, and someday may replace cable television entirely (see the chapter-opening case). Table 2.4 describes digital goods and how they differ from traditional physical goods (eMarketer, 2018i) 2-2 What are the principal e-commerce business and revenue models? E-commerce is a fascinating combination of business models and new information technologies. Let’s start with a basic understanding of the types of e-commerce and then describe e-commerce business and revenue models. Types of E-commerce There are many ways to classify electronic commerce transactions—one is by looking at the nature of the participants. The three major electronic commerce categories are business-to-consumer (B2C) e-commerce, business-to-business (B2B) e-commerce, and consumer-to-consumer (C2C) e-commerce. • Business-to-consumer (B2C) electronic commerce involves retailing products and services to individual shoppers. Amazon, Walmart, and iTunes are examples of B2C commerce. BarnesandNoble.com, which sells books, software, and music to individual consumers, is an example of B2C e-commerce. • Business-to-business (B2B) electronic commerce involves sales of goods and services among businesses. Elemica’s website for buying and selling chemicals and energy is an example of B2B e-commerce. • Consumer-to-consumer (C2C) electronic commerce involves consumers selling directly to consumers. For example, eBay, the giant web auction site, IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 53 54 Chapter 2 E-commerce: Digital Markets, Digital Goods enables people to sell their goods to other consumers by auctioning their merchandise off to the highest bidder or for a fixed price. eBay acts as a middleman by creating a digital platform for peer-to-peer commerce. Craigslist is the platform most consumers use to buy from and sell directly to others. Another way of classifying electronic commerce transactions is in terms of the platforms participants use in a transaction. Until recently, most e-commerce transactions took place using a desktop PC connected to the Internet over a wired network. Several wireless mobile alternatives have emerged, such as smartphones and tablet computers. The use of handheld wireless devices for purchasing goods and services from any location is termed mobile commerce or m-commerce. All three types of e-commerce transactions can take place using m-commerce technology, which we discuss in detail in Section 2.3. E-commerce Business Models Changes in the economics of information described earlier have created the conditions for entirely new business models to appear while destroying older business models. Table 2.5 describes some of the most important Internet business models that have emerged. All, in one way or another, use the Internet (including apps on mobile devices) to add extra value to existing products and services or to provide the foundation for new products and services. Portal Portals are gateways to the web and are often defined as those sites that users set as their home page. Some definitions of a portal include search engines such as TABLE 2.5 INTERNET BUSINESS MODELS CATEGORY DESCRIPTION EXAMPLES E-tailer Sells physical products directly to consumers or to individual businesses. Amazon Blue Nile Transaction broker Market creator Content provider Saves users money and time by processing online sales transactions and generating a fee each time a transaction occurs. ETrade.com Provides a digital environment where buyers and sellers can meet, search for products, display products, and establish prices for those products; can serve consumers or B2B e-commerce, generating revenue from transaction fees. eBay Creates revenue by providing digital content, such as news, music, photos, or video, over the web. The customer may pay to access the content, or revenue may be generated by selling advertising space. WSJ.com Expedia Priceline.com Exostar Elemica GettyImages.com iTunes.com MSN Games Community provider Provides an online meeting place where people with similar interests can communicate and find useful information. Facebook Portal Provides initial point of entry to the web along with specialized content and other services. Yahoo Twitter MSN AOL Service provider Provides applications such as photo sharing, video sharing, and user-generated content as services; provides other services such as online data storage and backup. Google Docs Photobucket.com Dropbox IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods Google and Bing even if few make these sites their home page. Portals such as Yahoo, Facebook, MSN, and AOL offer web search tools as well as an integrated package of content and services such as news, email, instant messaging, maps, calendars, shopping, music downloads, video streaming, and more all in one place. The portal business model now provides a destination site where users start their web searching and linger to read news, find entertainment, meet other people, and, of course, be exposed to advertising. Facebook is a very different kind of portal based on social networking, and in 2018 Americans will spend more than half their online time at Facebook, about two hours per day! Portals generate revenue primarily by attracting very large audiences, charging advertisers for display ad placement (similar to traditional newspapers), collecting referral fees for steering customers to other sites, and charging for premium services. In 2019, portals (not including Google, Facebook, or Bing) will generate an estimated $10 billion in display ad revenues. Although there are hundreds of portal/search engine sites, the top portals (Yahoo, MSN, and AOL) gather more than 80 percent of the Internet portal traffic because of their superior brand recognition. E-tailer Online retail stores, often called e-tailers, come in all sizes, from giant Amazon with 2017 retail sales revenues of more than $178 billion to tiny local stores that have websites. An e-tailer is similar to the typical brick-and-mortar storefront, except that customers only need to connect to the Internet to check their inventory and place an order. Altogether, online retail (the sale of physical goods online) will generate about $598 billion in revenues in 2019. The value proposition of e-tailers is to provide convenient, low-cost shopping 24/7; large selections; and consumer choice. Some e-tailers, such as Walmart.com or Staples.com, referred to as bricks-and-clicks, are subsidiaries or divisions of existing physical stores and carry the same products. Others, however, operate only in the virtual world, without any ties to physical locations. Ashford.com and eVitamins.com are examples of this type of e-tailer. Several other variations of e-tailers—such as online versions of direct-mail catalogs, online malls, and manufacturer-direct online sales—also exist. Content Provider E-commerce has increasingly become a global content channel. Content is defined broadly to include all forms of intellectual property. Intellectual property refers to tangible and intangible products of the mind for which the creator claims a property right. Content providers distribute information content— such as digital video, music, photos, text, and artwork—over the web. The value proposition of online content providers is that consumers can conveniently find a wide range of content online and purchase this content inexpensively to be played or viewed on multiple computer devices or smartphones. Providers do not have to be the creators of the content (although sometimes they are, like Disney.com) and are more likely to be Internet-based distributors of content produced and created by others. For example, Apple sells music tracks at its iTunes Store, but it does not create or commission new music. The phenomenal popularity of Internet-connected mobile devices such as the iPhone, iPod, and iPad has enabled new forms of digital content delivery from podcasting to mobile streaming. Podcasting is a method of publishing audio or video broadcasts through the Internet, allowing subscribing users to download audio or video files onto their personal computers, smartphones, tablets, or portable music players. Streaming is a publishing method for music and video files that flows a continuous stream of content to a user’s device without being stored locally on the device. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 55 56 Chapter 2 E-commerce: Digital Markets, Digital Goods Estimates vary, but total online content will generate about $23 billion in 2019, one of the fastest-growing e-commerce segments, growing at an estimated 18 percent annual rate. Transaction Broker Sites that process transactions for consumers normally handled in person, by phone, or by mail are transaction brokers. The largest industries using this model are financial services and travel services. The online transaction broker’s primary value propositions are savings of money and time and providing an extraordinary inventory of financial products or travel packages in a single location. Online stockbrokers and travel booking services charge fees that are considerably less than traditional versions of these services. Fidelity Financial Services and Expedia are the largest online financial and travel service firms based on a transaction broker model. Market Creator Market creators build a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices. The value proposition of online market creators is that they provide a platform where sellers can easily display their wares and purchasers can buy directly from sellers. Online auction markets such as eBay and Priceline are good examples of the market creator business model. Another example is Amazon’s Merchants platform (and similar programs at eBay), where merchants are allowed to set up stores on Amazon’s website and sell goods at fixed prices to consumers. The so-called on-demand economy (mistakenly often referred to as the sharing economy), exemplified by Uber (described in the Interactive Session on Organizations) and Airbnb, is based on the idea of a market creator building a digital platform where supply meets demand; for instance, spare auto or room rental capacity finds individuals who want transportation or lodging. Crowdsource funding markets such as Kickstarter.com bring together private equity investors and entrepreneurs in a funding marketplace. Service Provider Whereas e-tailers sell products online, service providers offer services online. Photo sharing and online sites for data backup and storage all use a service provider business model. Software is no longer a physical product with a CD in a box but, increasingly, software as a service (SaaS) that you subscribe to online rather than purchase from a retailer, such as Office 365. Google has led the way in developing online software service applications such as G Suite, Google Sites, Gmail, and online data storage services. Salesforce.com is a major provider of cloud-based software for customer management. Community Provider (Social Networks) Community providers are sites that create a digital online environment where people with similar interests can transact (buy and sell goods); share interests, photos, and videos; communicate with like-minded people; receive interest-related information; and even play out fantasies by adopting online personalities called avatars. Social networking sites Facebook, Tumblr, Instagram, LinkedIn, and Twitter and hundreds of other smaller, niche sites all offer users community-building tools and services. Social networking sites have been the fastest-growing websites in recent years, often doubling their audience size in a year. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods INTERACTIVE SESSION ORGANIZATIONS Uber: Digital Disruptor You’re in New York, Paris, Chicago, or another major city and need a ride. Instead of trying to hail a cab, you pull out your smartphone and tap the Uber app. A Google map pops up displaying your nearby surroundings. You select a spot on the screen designating an available driver, and the app secures the ride, showing how long it will take for the ride to arrive and how much it will cost. Once you reach your destination, the fare is automatically charged to your credit card. No fumbling for money. Rates take into account the typical factors of time and distance but also demand. Uber’s software predicts areas where rides are likely to be in high demand at different times of the day. This information appears on a driver’s smartphone so that the driver knows where to linger and, ideally, pick up customers within minutes of a request for a ride. Uber also offers a higher-priced town car service for business executives and a ride-sharing service. Under certain conditions, if demand is high, Uber can be more expensive than taxis, but it still appeals to riders by offering a reliable, fast, convenient alternative to traditional taxi services. Uber runs much leaner than a traditional taxi company does. Uber does not own taxis and has no maintenance and financing costs. It does not have employees, so it claims, but instead calls the drivers independent contractors, who receive a cut of each fare. Uber is not encumbered with employee costs such as workers’ compensation, minimum wage requirements, background checks on drivers, driver training, health insurance, or commercial licensing costs. Uber has shifted the costs of running a taxi service entirely to the drivers and to the customers using their cell phones. Drivers pay for their own cars, fuel, and insurance. What Uber does is provide a smartphone-based platform that enables people who want a service—like a taxi—to find a provider who can meet that need. Uber relies on user reviews of drivers and the ride experience to identify problematic drivers and driver reviews of customers to identify problematic passengers. It also sets standards for cleanliness. It uses the reviews to discipline drivers. Uber does not publicly report how many poorly rated drivers or passengers there are in its system. Uber also uses software that monitors sensors in drivers’ smartphones to monitor their driving behavior. Uber is headquartered in San Francisco and was founded in 2009 by Travis Kalanick and Garrett Camp. In 2018, it had more than 3 million drivers working in 600 cities worldwide, generating revenue of 2.6 billion in the first quarter of 2018. After paying for drivers, marketing, and other operating expenses, Uber still operated at a loss. More than 75 million people use Uber. However, Uber’s over-the-top success has created its own set of challenges. By digitally disrupting a traditional and highly regulated industry, Uber has ignited a firestorm of opposition from existing taxi services in the United States and around the world. Who can compete with an upstart firm offering a 40 percent price reduction when demand for taxis is low? (When demand is high, Uber prices surge.) What city or state wants to give up regulatory control over passenger safety, protection from criminals, driver training, and a healthy revenue stream generated by charging taxi firms for a taxi license? If Uber is the poster child for the new on-demand economy, it’s also an iconic example of the social costs and conflict associated with this new kind of business model. Uber has been accused of denying its drivers the benefits of employee status by classifying them as contractors, violating public transportation laws and regulations throughout the United States and the world, abusing the personal information it has collected on ordinary people, increasing traffic congestion, undermining public transportation, and failing to protect public safety by refusing to perform sufficient criminal, medical, and financial background checks on its drivers. Uber’s brand image has been further tarnished by negative publicity about its aggressive, unrestrained workplace culture and the behavior of CEO Kalanick. Uber has taken some remediating steps. It enhanced its app to make it easier for drivers to take breaks while they are on the job. Drivers can now also be paid instantly for each ride they complete rather than weekly and see on the app’s dashboard how much they have earned. Uber added an option to its app for passengers to tip its U.S. drivers, and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 57 58 Chapter 2 E-commerce: Digital Markets, Digital Goods Kalanick resigned as head of Uber in June 2017. (He was replaced by Dara Khosrowshahi.) Critics fear that Uber and other on-demand firms have the potential for creating a society of part-time, low-paid, temp work, displacing traditionally fulltime, secure jobs—the so-called Uberization of work. According to one study, half of Uber drivers earn less than the minimum wage in their state. Uber responds by saying it is lowering the cost of transportation, expanding the demand for ride services, and expanding opportunities for car drivers, whose pay is about the same as other taxi drivers. Does Uber have a sustainable business model? The company is still not profitable, and continues to subsidize the cost of many of its rides. Uber has competitors, including Lyft in the United States and local firms in Asia and Europe. New, smaller, competing firms offering app-based cab-hailing services are cropping up, such as Sidecar and Via. Established taxi firms in New York and other cities are launching their own hailing apps and trumpeting their fixed-rate prices. Uber is pressing on, with new services for same-day deliveries, business travel accounts, and heavy investments in self-driving cars, which management believes will be key to lowering labor costs and ensuring long-term profitability. After a self-driving Uber car struck and killed a woman in Tempe, Arizona in March 2018, Arizona suspended autonomous vehicle testing in the state, and Uber stopped testing autonomous cars in California, Pittsburgh, and Toronto. Even before the accident, Uber’s self-driving cars were having trouble driving through construction zones and next to tall vehicles like big truck rigs. Test drivers had to take over the car almost every mile. It is still too early to tell whether Uber and other on-demand businesses will succeed. Sources: Steven Hill, “New Leadership Has Not Changed Uber,” New York Times, March 26, 2018; Bloomberg, “Uber Revenue Spiked 70% Last Quarter, But It Still Lost Tons of Money,” May 24,2018; Daisuke Wakabashai, “Uber’s Self-Driving Cars Were Struggling Before Arizona Crash,” New York Times, March 23, 2018; Craig Smith, “100 Amazing Uber Statistics, Demographics and Facts (July 2018),” DMR, July 29, 2018; “Rob Berger, “Uber Settlement Takes Customers for a Ride,” Forbes, April 22, 2016; and Mike Isaac and Noam Scheiber, “Uber Settles Cases with Concessions, But Drivers Stay Freelancers,” New York Times, April 21, 2016. CASE STUDY QUESTIONS 1. Analyze Uber using the competitive forces and value chain models. What is its competitive advantage? 2. What is the relationship between information technology and Uber’s business model? Explain your answer. 3. How disruptive is Uber? 4. Is Uber a viable business? Explain your answer. E-commerce Revenue Models A firm’s revenue model describes how the firm will earn revenue, generate profits, and produce a superior return on investment. Although many e-commerce revenue models have been developed, most companies rely on one, or some combination, of the following six revenue models: advertising, sales, subscription, free/freemium, transaction fee, and affiliate. Advertising Revenue Model In the advertising revenue model, a website generates revenue by attracting a large audience of visitors who can then be exposed to advertisements. The advertising model is the most widely used revenue model in e-commerce, and arguably, without advertising revenues, the web would be a vastly different experience from what it is now because people would be asked to pay for IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods access to content. Content on the web—everything from news to videos and opinions—is free to visitors because advertisers pay the production and distribution costs in return for the right to expose visitors to ads. Companies will spend an estimated $125 billion on online advertising in 2019 (in the form of a paid message on a website, paid search listing, video, app, game, or other online medium, such as instant messaging). About $90 billion of this will be for mobile ads. Mobile ads will account for 72 percent of all digital advertising. In the past five years, advertisers have increased online spending and cut outlays on traditional channels such as radio and newspapers. In 2019, online advertising will grow at 18 percent and constitute about 53 percent of all advertising in the United States (eMarketer, 2018g). Websites with the largest viewership or that attract a highly specialized, differentiated viewership and are able to retain user attention (stickiness) can charge higher advertising rates. Yahoo, for instance, derives nearly all its revenue from display ads (banner ads), video ads, and, to a lesser extent, search engine text ads. Google and Facebook derive well over 90 percent of their revenue from advertising, including selling keywords (AdWords), selling ad spaces (AdSense), and selling display ad spaces to advertisers. Facebook alone displays one-third of the trillion display ads shown on all sites in 2019. Sales Revenue Model In the sales revenue model, companies derive revenue by selling goods, information, or services to customers. Companies such as Amazon (which sells books, music, and other products), LLBean.com, and Gap.com all have sales revenue models. Content providers make money by charging for downloads of entire files such as music tracks (iTunes Store) or books or for downloading music and/or video streams (Hulu.com TV shows). Apple has pioneered and strengthened the acceptance of micropayments. Micropayment systems provide content providers with a cost-effective method for processing high volumes of very small monetary transactions (anywhere from 25 cents to $5.00 per transaction). The largest micropayment system on the web is Apple’s iTunes Store, which has more than 1 billion customers worldwide who purchase individual music tracks for 99 cents and feature-length movies for various prices. Subscription Revenue Model In the subscription revenue model, a website offering content or services charges a subscription fee for access to some or all of its offerings on an ongoing basis. Content providers often use this revenue model. For instance, the online version of Consumer Reports provides access to premium content, such as detailed ratings, reviews, and recommendations, only to subscribers for a $35.00 annual fee. Netflix is one of the most successful subscriber sites with over 100 million customers worldwide in 2018. To be successful, the subscription model requires the content to be perceived as differentiated, having high added value, and not readily available elsewhere or easily replicated. Other companies offering content or services online on a subscription basis include Match.com (dating services), Ancestry.com (genealogy research), and Microsoft Xbox Live. Free/Freemium Revenue Model In the free/freemium revenue model, firms offer basic services or content for free and charge a premium for advanced or special features. For example, Google offers free applications but charges for premium services. Pandora, the subscription radio service, offers a free service with limited play time and advertising and a premium service with unlimited play. The idea is to attract IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 59 60 Chapter 2 E-commerce: Digital Markets, Digital Goods very large audiences with free services and then convert some of this audience to pay a subscription for premium services. One problem with this model is converting people from being freeloaders into paying customers. “Free” can be a powerful model for losing money. None of the freemium music streaming sites have earned a profit to date. Nevertheless, they are finding that free service with ad revenue is more profitable than the paid subscriber part of their business. Transaction Fee Revenue Model In the transaction fee revenue model, a company receives a fee for enabling or executing a transaction. For example, eBay provides an online auction marketplace and receives a small transaction fee from a seller if the seller is successful in selling an item. E*Trade, an online stockbroker, receives transaction fees each time it executes a stock transaction on behalf of a customer. The transaction revenue model enjoys wide acceptance in part because the true cost of using the platform is not immediately apparent to the user. Online financial services, from banking to payment systems, rely on a transaction fee model. While online banking and services are dominated by large banks with millions of customers, start-up financial technology firms, also known as FinTech firms, have grown rapidly to compete with banks for peer-to-peer (P2P), bill payment, money transfer, lending, crowdsourcing, financial advice, and account aggregation services. The largest growth in FinTech has involved P2P payment services, such as Venmo and Square, two among hundreds of FinTech firms competing in this space with banks and online payment giants such as PayPal (PayPal purchased Venmo in 2013). FinTech firms are typically not profitable and are often bought out by larger financial service firms for their technology and customer base. Affiliate Revenue Model In the affiliate revenue model, websites (called affiliate websites) send visitors to other websites in return for a referral fee or percentage of the revenue from any resulting sales. Referral fees are also referred to as lead generation fees. For example, MyPoints makes money by connecting companies to potential customers by offering special deals to its members. When members take advantage of an offer and make a purchase, they earn points they can redeem for free products and services, and MyPoints receives a referral fee. Community feedback sites such as Epinions and Yelp receive much of their revenue from steering potential customers to websites where they make a purchase. Amazon uses affiliates that steer business to the Amazon website by placing the Amazon logo on their blogs. Personal blogs often contain display ads as part of affiliate programs. Some bloggers are paid directly by manufacturers, or receive free products, for speaking highly of products and providing links to sales channels. 2-3 How has e-commerce transformed marketing? Although e-commerce and the Internet have changed entire industries and enabled new business models, no industry has been more affected than marketing and marketing communications. The Internet provides marketers with new ways of identifying and communicating with millions of potential customers at costs far lower than traditional IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods 61 TABLE 2.6 ONLINE AD SPENDING BY FORMATS (BILLIONS) MARKETING FORMAT 2018 REVENUE DESCRIPTION Search engine $53.3 Text ads targeted at precisely what the customer is looking for at the moment of shopping and purchasing. Sales oriented. Display ads $67.1 Banner ads (pop-ups and leave-behinds) with interactive features; increasingly behaviorally targeted to individual web activity. Brand development and sales. Includes social media and blog display ads. Video $21.2 Fastest-growing format, engaging and entertaining; behaviorally targeted, interactive. Branding and sales. Classified $2.1 Job, real estate, and services ads; interactive, rich media, and personalized to user searches. Sales and branding. Rich media $18.3 Animations, games, and puzzles. Interactive, targeted, and entertaining. Branding orientation. Lead generation $2.3 Marketing firms that gather sales and marketing leads online and then sell them to online marketers for a variety of campaign types. Sales or branding orientation. Sponsorships $2.1 Online games, puzzles, contests, and coupon sites sponsored by firms to promote products. Sales orientation. Email $0.47 Effective, targeted marketing tool with interactive and rich media potential. Sales oriented. Source: Based on eMarketer, “Digital Ad Spending by Format,, 2018” eMarketer, March 2018. media, including search engine marketing, data mining, recommender systems, and targeted email. The Internet enables long tail marketing. Before the Internet, reaching a large audience was very expensive, and marketers had to focus on attracting the largest number of consumers with popular hit products, whether music, Hollywood movies, books, or cars. In contrast, the Internet allows marketers to find potential customers inexpensively for products where demand is very low. For instance, the Internet makes it possible to sell independent music profitably to very small audiences. There’s always some demand for almost any product. Put a string of such long tail sales together and you have a profitable business. The Internet also provides new ways—often instantaneous and spontaneous— to gather information from customers, adjust product offerings, and increase customer value. Table 2.6 describes the leading marketing and advertising formats used in e-commerce. Behavioral Targeting Many e-commerce marketing firms use behavioral targeting techniques to increase the effectiveness of banners, rich media, and video ads. Behavioral targeting refers to tracking the clickstreams (history of clicking behavior) of individuals on thousands of websites to understand their interests and intentions and expose them to advertisements that are uniquely suited to their online behavior. Marketers and most researchers believe this more precise understanding of the customer leads to more efficient marketing (the firm pays for ads only to those shoppers who are most interested in their products) and larger sales and revenues. Unfortunately, behavioral targeting of millions of web users also leads to the invasion of personal privacy without user consent. When consumers lose trust in their web experience, they tend not to purchase anything. Backlash is growing against the aggressive uses of personal information as consumers seek out safer havens for purchasing and messaging. Snapchat offers IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 62 Chapter 2 E-commerce: Digital Markets, Digital Goods FIGURE 2.3 WEBSITE VISITOR TRACKING E-commerce websites and advertising platforms like Google’s DoubleClick have tools to track a shopper’s every step through an online store and then across the web as shoppers move from site to site. Close examination of customer behavior at a website selling women’s clothing shows what the store might learn at each step and what actions it could take to increase sales. Courtesy of Google Inc. Click 1 Click 2 Click 3 Click 4 The shopper clicks on the home page. The store can tell that the shopper arrived from the Yahoo portal at 2:30 PM (which might help determine staffing for customer service centers) and how long she lingered on the home page (which might indicate trouble navigating the site). Tracking beacons load cookies on the shopper’s browser to follow her across the Web. The shopper clicks on blouses, then clicks to view a woman’s pink blouse. The shopper clicks to select this item in a size 10 in pink and clicks to place it in her shopping cart. This information can help the store determine which sizes and colors are most popular. If the visitor moves to a different site, ads for pink blouses will appear from the same or a different vendor. Click 5 Click 6 From the shopping cart page, the shopper clicks to close the browser to leave the website without purchasing the blouse. This action could indicate the shopper changed her mind or that she had a problem with the website’s checkout and payment process. Such behavior might signal that the website was not well designed. disappearing messages, and even Facebook has retreated by making its default for new posts “for friends only.” Behavioral targeting takes place at two levels: at individual websites or from within apps and on various advertising networks that track users across thousands of websites. All websites collect data on visitor browser activity and store it in a database. They have tools to record the site that users visited prior to coming to the website, where these users go when they leave that site, the type of operating system they use, browser information, and even some location data. They also record the specific pages visited on the particular site, the time spent on each page of the site, the types of pages visited, and what the visitors purchased (see Figure 2.3). Firms analyze this information about customer interests and behavior to develop precise profiles of existing and potential customers. In addition, most major websites have hundreds of tracking programs on their home pages, which track your clickstream behavior across the web by following you from site to site and re-target ads to you by showing you the same ads on different sites. The leading online advertising network is Google’s DoubleClick. This information enables firms to understand how well their website is working, create unique personalized web pages that display content or ads for products or services of special interest to each user, improve the customer’s experience, and create additional value through a better understanding of the shopper (see Figure 2.4). By using personalization technology to modify the web pages presented to each customer, marketers achieve some of the benefits of using individual salespeople at dramatically lower costs. For instance, General Motors will show a Chevrolet banner ad to women emphasizing safety and utility, whereas men will receive ads emphasizing power and ruggedness. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods FIGURE 2.4 WEBSITE PERSONALIZATION Firms can create unique personalized web pages that display content or ads for products or services of special interest to individual users, improving the customer experience and creating additional value. User Website Based on your portfolio and recent market trends, here are some recommendations. Welcome back, Steve P. Munson. Check out these recommended titles: One Minute Manager Leading Change Results-Based Leadership Sarah, Here are the items you want to bid on: Halogen reading lamp Portable reading lamp LED book reading lamp It’s a short step from ad networks to programmatic ad buying. Ad networks create real-time bidding platforms (RTB) where marketers bid in an automated environment for highly targeted slots available from web publishers. Here, ad platforms can predict how many targeted individuals will view the ads, and ad buyers can estimate how much this exposure is worth to them. What if you are a large national advertising company or global manufacturer trying to reach millions of consumers? With millions of websites, working with each one would be impractical. Advertising networks solve this problem by creating a network of several thousand of the most popular websites millions of people visit, tracking the behavior of these users across the entire network, building profiles of each user, and then selling these profiles to advertisers in a real-time bidding environment. Popular websites download dozens of web-tracking cookies, bugs, and beacons, which report user online behavior to remote servers without the users’ knowledge. Looking for young, single consumers with college degrees, living in the Northeast, in the 18–34 age range who are interested in purchasing a European car? Advertising networks can identify and deliver thousands of people who fit this profile and expose them to ads for European cars as they move from one website to another. Estimates vary, but behaviorally targeted ads are generally 10 times more likely to produce a consumer response than a randomly chosen banner or video ad (see Figure 2.5). So-called advertising exchanges use this same technology to auction access to people with very specific profiles to advertisers in a few milliseconds. In 2016, about 50 percent of online display ads were IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 63 64 Chapter 2 E-commerce: Digital Markets, Digital Goods FIGURE 2.5 HOW AN ADVERTISING NETWORK SUCH AS DOUBLECLICK WORKS Advertising networks and their use of tracking programs have become controversial among privacy advocates because of their ability to track individual consumers across the Internet. MERCHANT SITE ADVERTISING NETWORK DoubleClick.Net Merchant server connects to DoubleClick ad server Ad server reads cookie; checks database for profile Ad server selects and serves an appropriate banner ad based on profile Consumer requests Web page from ad network member site User profile Database Network Member Firms DoubleClick follows consumer from site to site through use of tracking programs CONSUMER targeted ads developed by programmatic ad buys, and the rest depended on the context of the pages shoppers visited—the estimated demographics of visitors, or so-called blast-and-scatter advertising—which is placed randomly on any available page with minimal targeting, such as time of day or season. It’s another short step to native advertising. Native advertising involves placing ads in social network newsfeeds or within traditional editorial content, such as a newspaper article. This is also referred to as organic advertising, where content and advertising are in very close proximity or integrated together. Two-thirds (68 percent) of Internet users disapprove of search engines and websites tracking their online behavior to aim targeted ads at them. Twenty-eight percent of those surveyed approve of behavioral targeting because they believe it produces more relevant ads and information. A majority of Americans want a Do Not Track option in browsers that will stop websites from collecting information about their online behavior. More than 50 percent are very concerned about the wealth of personal data online; 86 percent have taken steps to mask their online behavior; 25 percent of web users use adblocking software (Rainie, 2016). Social E-commerce and Social Network Marketing In 2019, one of the fastest-growing media for branding and marketing is social media. Companies will spend an estimated $30 billion in 2019 using social networks such as Facebook, Instagram, Twitter, and LinkedIn to reach millions of consumers who spend hours a day on social sites. Expenditures for social media marketing are much smaller than for television, magazines, and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods even newspapers, but this will change in the future. Social networks in the offline world are collections of people who voluntarily communicate with one another over an extended period of time. Online social networks, such as Facebook, Instagram, Pinterest, LinkedIn, Twitter, and Tumblr, along with other sites with social components, are websites that enable users to communicate with one another, form group and individual relationships, and share interests, values, and ideas. Social e-commerce is commerce based on the idea of the digital social graph, a mapping of all significant online social relationships. The social graph is synonymous with the idea of a social network used to describe offline relationships. You can map your own social graph (network) by drawing lines from yourself to the 10 closest people you know. If they know one another, draw lines between these people. If you are ambitious, ask these 10 friends to list and draw in the names of the 10 people closest to them. What emerges from this exercise is a preliminary map of your social network. Now imagine if everyone on the Internet did the same and posted the results to a very large database with a website. Ultimately, you would end up with Facebook or a site like it. According to small world theory, you are only six links away from any other person on earth. If you entered your personal address book, which has, say, 100 names in it, in a list and sent it to your friends, and they in turn entered 50 new names of their friends, and so on, five times, the social network created would encompass 31 billion people! The social graph is therefore a collection of millions of personal social graphs (and all the people in them). If you understand the interconnectedness of people, you will see just how important this concept is to e-commerce: The products and services you buy will influence the decisions of your friends, and their decisions will in turn influence you. If you are a marketer trying to build and strengthen a brand, you can take advantage of the fact that people are enmeshed in social networks, share interests and values, and communicate and influence one another. As a marketer, your target audience is not a million isolated people watching a TV show but the social network of people who watch the show and the viewers’ personal networks. Moreover, online social networks are where the largest Internet audiences are located. Table 2.7 describes the features of social commerce that are driving its growth. Facebook, with 74 percent of all social marketing in the United States and 208 million U.S. monthly visitors in 2018, receives most of the public attention given to social networking. The other top four social sites are also growing, though at far slower rates than in the past. LinkedIn had 93 million visitors a month in 2018. Twitter grew to reach 146 million active users in 2018, with stronger offshore growth than in the United States. Pinterest hit the top 50 websites with 110 million users, a 25 percent increase from 2017. According to analysts, 25 percent of the total time spent online in the United States was spent on social network sites (about 56 minutes a day), and social networking is the most common online activity. The fastest-growing smartphone applications are social network apps; nearly half of smartphone users visit social sites daily. More than 70 percent of all visits to Facebook in 2018 came from smartphones. At social shopping sites such as Pinterest you can swap shopping ideas with friends. Facebook offers the “like” button to let your friends know you admire a product, service, or content and, in some cases, purchase something online. Facebook processes around 5 billion likes a day worldwide. Online communities are also ideal venues to employ viral marketing techniques. Online viral marketing is like traditional word-of-mouth marketing except that the word can IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 65 66 Chapter 2 E-commerce: Digital Markets, Digital Goods TABLE 2.7 FEATURES OF SOCIAL COMMERCE SOCIAL COMMERCE FEATURE DESCRIPTION Newsfeed A stream of notifications from friends and advertisers that social users find on their home pages. Timelines A stream of photos and events in the past that create a personal history for users, one that can be shared with friends. Social sign-on Websites allow users to sign into their sites through their social network pages on Facebook or another social site. This allows websites to receive valuable social profile information from Facebook and use it in their own marketing efforts. Collaborative shopping An environment where consumers can share their shopping experiences with one another by viewing products, chatting, or texting. Friends can chat online about brands, products, and services. Network notification An environment where consumers can share their approval (or disapproval) of products, services, or content or share their geolocation, perhaps a restaurant or club, with friends. Facebook’s ubiquitous “like” button is an example, as are Twitter’s tweets and followers. Social search (recommendations) An environment where consumers can ask their friends for advice on purchases of products, services, and content. Although Google can help you find things, social search can help you evaluate the quality of things by listening to the evaluations of your friends or their friends. For instance, Amazon’s social recommender system can use your Facebook social profile to recommend products. spread across an online community at the speed of light and go much further geographically than a small network of friends. The Wisdom of Crowds Creating sites where thousands, even millions, of people can interact offers business firms new ways to market and advertise and to discover who likes (or hates) their products. In a phenomenon called the wisdom of crowds, some argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts. Obviously, this is not always the case, but it can happen in interesting ways. In marketing, the wisdom of crowds concept suggests that firms should consult with thousands of their customers first as a way of establishing a relationship with them and, second, to understand better how their products and services are used and appreciated (or rejected). Actively soliciting the comments of your customers builds trust and sends the message to your customers that you care what they are thinking and that you need their advice. Beyond merely soliciting advice, firms can be actively helped in solving some business problems by using crowdsourcing. For instance, BMW launched a crowdsourcing project to enlist the aid of customers in designing an urban vehicle for 2025. Kickstarter.com is arguably one of the most famous e-commerce crowdfunding sites where visitors invest in start-up companies. Other examples include Caterpillar working with customers to design better machinery, IKEA for designing furniture, and Pepsico using Super Bowl viewers to build an online video. Marketing through social media is still in its early stages, and companies are experimenting in hopes of finding a winning formula. Social interactions and customer sentiment are not always easy to manage, presenting new challenges for companies eager to protect their brands. The Interactive Session on Management provides specific examples of companies’ social marketing efforts using Facebook and Twitter. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods INTERACTIVE SESSION MANAGEMENT “Socializing” with Customers More than 3 billion people worldwide use social media, making it an obvious platform for companies seeking to engage consumers, amplify product messages, discover trends and influencers, build brand awareness, and take action on customer requests and recommendations. More than 80 million businesses have Facebook brand pages, enabling users to interact with the brand through blogs, comment pages, contests, and offerings on the brand page. The “like” button gives users a chance to share with their social network their feelings about content they are viewing and websites they are visiting. With like buttons on many millions of websites, Facebook can track user behavior on other sites and then sell this information to marketers. Facebook also sells display ads to firms that appear on users’ home pages and most other pages in the Facebook interface such as photos and apps. Twitter features such as “promoted tweets” and “promoted trends” enable advertisers to have their tweets displayed more prominently when Twitter users search for certain keywords. Mack Trucks, a leading U.S. truck manufacturer, used a social marketing campaign to attract customers, drivers, and dealers when it launched its new Anthem model. Mack had traditionally used print ads in trucking publications, brochures, and industry trade shows as its primary marketing channels when rolling out a new product. However, these channels did not enable Mack to tailor and deliver different messages for different customers. For example, a manager of a large fleet might be most interested in fuel efficiency, while an owner-operator might be more attracted to design style. Mack’s marketing team continued to use traditional channels for broad awareness and relied on social marketing to focus on segmentation and metrics. Starting in July 2017 Mack launched a series of biweekly YouTube videos to build excitement for the Anthem model, followed by a live stream of the Anthem unveiling on YouTube and Facebook in September of that year. Mack netted 7,000 email addresses from the teaser campaign, with 3,700 people viewing the live stream of the launch event. These are considered significant numbers for a product costing over U.S. $100,000. Mack’s marketing team also launched a comprehensive social media campaign directing the company’s 174,000 Facebook followers, 24,000 Twitter followers, 15,000 LinkedIn followers, 15,000 YouTube subscribers, and other social communities to photos, videos, text summaries, and other content describing every aspect of the new Anthem line. These activities were credited with attracting more than 40,000 new social followers to the Mack brand. Mack uses Oracle Eloqua Marketing Cloud Service and Oracle Social Cloud to link social activity to 175,000 profiles in its Oracle Eloqua database of customers and prospects. The digital marketing team thus knows if a person in the database clicked on a Facebook post to view an Anthem-related video or looked for other information on the company’s website. Compelling personalized content helps engage prospects and move them further along the sales process until they ask to talk to a Mack dealer. At that point, the prospect is considered a qualified lead. Oracle Social Cloud alerts team members when the Mack Anthem is mentioned on various social sites, and they can respond where appropriate. Mack also enlisted celebrity influencers for the Anthem campaign. Country music artist Steve Moakler recorded a road song called Born Ready for the Anthem launch and dedicated it to drivers. More than 55,000 people viewed Moakler’s performance on YouTube. The marketing team also produced a YouTube video with the Oakland Raiders’ Khalil Mack called What Makes a Mack, and it attracted over 75,000 viewers. Mack is developing a broad-based influence program identifying customers and drivers who will be among the first to view new products and serve as active advocates on social media. More than 9,300 people opted into some aspect of the Mack Anthem campaign, generating about 1,700 qualified leads. The Anthem landing page has attracted over 146,000 visitors, who can watch the Moakler video and obtain information on every aspect of the new truck line. Mack’s senior management is very pleased with the results and the detail and precision of digital marketing information. Vice President of Marketing John Walsh can see what happens with every dollar Mack spends. An estimated 90 percent of customers are influenced by online reviews, and nearly half of U.S. social media users actively seek customer service through social media. As a result, marketing is now IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 67 68 Chapter 2 E-commerce: Digital Markets, Digital Goods placing much more emphasis on customer satisfaction and service. Social media monitoring helps marketers and business owners understand more about buyers’ likes, dislikes, and complaints concerning products, additional products or product modifications customers want, and how people are talking about a brand (positive or negative sentiment). Prompted by customer social media comments about meats other than roast beef, fast-food sandwich restaurant chain Arby’s launched a “Meat Mountain” campaign poster showing various meats other than roast beef. Arby’s customers mistakenly thought the poster displayed a new sandwich and, through social media, indicated they were anxious to try it. Arby’s then responded with a new $10 Meat Mountain sandwich. Social media campaigns can be tricky to orchestrate, and the results are not always predictable. When social followers of Donald Trump called for boycotting Nordstrom for dropping Ivanka Trump’s clothing line from its stores, Nordstrom’s stock price rose, and the company outperformed many of its retail industry rivals in the months that followed. Nordstrom customers remained loyal to the brand. Previous Trump tweets calling out other brands such as Lockheed Martin had hurt stock share prices. In September 2016, San Antonio–based Miracle Mattress provoked angry social media backlash when it posted a Facebook video advertising a “Twin Towers Sale.” The video encouraged customers to “remember 9/11” and “get any size mattress for a twin price.” Miracle Mattress removed the video from its Facebook timeline, and owner Mike Bonanno posted an apology letter. Sources: Rob Preston, “Open Road,” Profit Magazine, Spring 2018; Melody Hahm, “26-Year-Old Launches Instagram-Fueled Fast Fashion Brand,” Yahoo Finance, July 25, 2018; Craig Smith, “844 Amazing Facebook Statistics (July 2018) by the Numbers,” Dmr, July 30, 2018; www.Macktrucks.com, accessed July 29, 2018; Janet Morrissey, “Brands Heed Social Media. They’re Advised Not to Forget Word of Mouth,” New York Times, November 26, 2017; Farhad Manjoo “How Battling Brands Online Has Gained Urgency, and Impact,” New York Times, June 21, 2017; and Lindsay Friedman, “The 12 Worst Social-Media Fails of 2016,” www.entrepreneur.com, September 22, 2016. CASE STUDY QUESTIONS 1. Assess the management, organization, and technology issues for using social media technology to engage with customers. 2. What are the advantages and disadvantages of using social media for advertising, brand building, market research, and customer service? 3. Give an example of a business decision in this case study that was facilitated by using social media to interact with customers. 4. Should all companies use social media technology for customer service and marketing? Why or why not? What kinds of companies are best suited to use these platforms? 2-4 How has e-commerce affected business-to-business transactions? Trade between business firms (business-to-business commerce, or B2B) represents a huge marketplace. The total amount of B2B trade in the United States in 2019 is estimated to be about $13.5 trillion, with B2B e-commerce (online B2B) contributing about $6.2 trillion of that amount (U.S. Bureau of the Census, 2018; authors’ estimates). By 2020, B2B e-commerce is expected to grow to about $6.9 trillion in the United States. The process of conducting trade among business firms is complex and requires considerable human intervention; therefore, it consumes significant resources. Some firms estimate that each corporate purchase order for support products costs them, on average, at least $100 in administrative overhead, including processing paper, approving purchase decisions, using the telephone and fax machines to search for products and arrange for purchases, arranging IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods for shipping, and receiving the goods. Across the economy, this adds up to trillions of dollars annually spent for procurement processes that could be automated. If even just a portion of inter-firm trade were automated and parts of the entire procurement process were assisted by the Internet, literally trillions of dollars might be released for more productive uses, consumer prices potentially would fall, productivity would increase, and the economic wealth of the nation would expand. This is the promise of B2B e-commerce. The challenge of B2B e-commerce is changing existing patterns and systems of procurement and designing and implementing new Internet and cloud-based B2B solutions. Electronic Data Interchange (EDI) B2B e-commerce refers to the commercial transactions that occur among business firms. Increasingly, these transactions are flowing through a variety of Internet-enabled mechanisms. About 80 percent of online B2B e-commerce is still based on proprietary systems for Electronic Data Interchange (EDI). EDI enables the computer-to-computer exchange between two organizations of standard transactions such as invoices, bills of lading, shipment schedules, or purchase orders. Transactions are automatically transmitted from one information system to another through a network, eliminating the printing and handling of paper at one end and the inputting of data at the other. Each major industry in the United States and much of the rest of the world has EDI standards that define the structure and information fields of electronic transactions for that industry. EDI originally automated the exchange of documents such as purchase orders, invoices, and shipping notices. Although many companies still use EDI for document automation, firms engaged in just-in-time inventory replenishment and continuous production use EDI as a system for continuous replenishment. Suppliers have online access to selected parts of the purchasing firm’s production and delivery schedules and automatically ship materials and goods to meet prespecified targets without intervention by firm purchasing agents (see Figure 2.6). Although many organizations still use private networks for EDI, they are increasingly web-enabled because Internet technology provides a much more flexible and low-cost platform for linking to other firms. Businesses can extend digital technology to a wider range of activities and broaden their circle of trading partners. FIGURE 2.6 ELECTRONIC DATA INTERCHANGE (EDI) Companies use EDI to automate transactions for B2B e-commerce and continuous inventory replenishment. Suppliers can automatically send data about shipments to purchasing firms. The purchasing firms can use EDI to provide production and inventory requirements and payment data to suppliers. Shipping data Supplier Systems Payment data Production/inventory requirements Firm Systems Continuous replenishment IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 69 70 Chapter 2 E-commerce: Digital Markets, Digital Goods Procurement, for example, involves not only purchasing goods and materials but also sourcing, negotiating with suppliers, paying for goods, and making delivery arrangements. Businesses can now use the Internet to locate the lowest-cost supplier, search online catalogs of supplier products, negotiate with suppliers, place orders, make payments, and arrange transportation. They are not limited to partners linked by traditional EDI networks. New Ways of B2B Buying and Selling The Internet and web technology enable businesses to create electronic storefronts for selling to other businesses using the same techniques as used for B2C commerce. Alternatively, businesses can use Internet technology to create extranets or electronic marketplaces for linking to other businesses for purchase and sale transactions. Private industrial networks typically consist of a large firm using a secure website to link to its suppliers and other key business partners (see Figure 2.7). The buyer owns the network, and it permits the firm and designated suppliers, distributors, and other business partners to share product design and development, marketing, production scheduling, inventory management, and unstructured communication, including graphics and email. Another term for a private industrial network is a private exchange. An example is VW Group Supply, which links the Volkswagen Group and its suppliers. VW Group Supply handles 90 percent of all global purchasing for Volkswagen, including all automotive and parts components. Net marketplaces, which are sometimes called e-hubs, provide a single, digital marketplace based on Internet technology for many buyers and sellers (see Figure 2.8). They are industry-owned or operate as independent intermediaries between buyers and sellers. Net marketplaces generate revenue from purchase FIGURE 2.7 A PRIVATE INDUSTRIAL NETWORK A private industrial network, also known as a private exchange, links a firm to its suppliers, distributors, and other key business partners for efficient supply chain management and other collaborative commerce activities. Firm Suppliers Distributors IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods FIGURE 2.8 A NET MARKETPLACE Net marketplaces are online marketplaces where multiple buyers can purchase from multiple sellers. Net Marketplace • Catalogs • Sourcing • Automated purchasing • Processing and fulfillment Suppliers Buyers and sale transactions and other services provided to clients. Participants in Net marketplaces can establish prices through online negotiations, auctions, or requests for quotations, or they can use fixed prices. There are many types of Net marketplaces and ways of classifying them. Some sell direct goods and some sell indirect goods. Direct goods are goods used in a production process, such as sheet steel for auto body production. Indirect goods are all other goods not directly involved in the production process, such as office supplies or products for maintenance and repair. Some Net marketplaces support contractual purchasing based on long-term relationships with designated suppliers, and others support short-term spot purchasing, where goods are purchased based on immediate needs, often from many suppliers. Some Net marketplaces serve vertical markets for specific industries, such as automobiles, telecommunications, or machine tools, whereas others serve horizontal markets for goods and services that can be found in many industries, such as office equipment or transportation. Exostar is an example of an industry-owned Net marketplace, focusing on long-term contract purchasing relationships and on providing common networks and computing platforms for reducing supply chain inefficiencies. This aerospace and defense industry-sponsored Net marketplace was founded jointly by BAE Systems, Boeing, Lockheed Martin, Raytheon, and Rolls-Royce plc to connect these companies to their suppliers and facilitate collaboration. More than 125,000 trading partners in the commercial, military, and government sectors use Exostar’s sourcing, e-procurement, and collaboration tools for both direct and indirect goods. Exchanges are independently owned third-party Net marketplaces that connect thousands of suppliers and buyers for spot purchasing. Many exchanges provide vertical markets for a single industry, such as food, electronics, or industrial equipment, and they primarily deal with direct inputs. For example, Go2Paper enables a spot market for paper, board, and craft among buyers and sellers in the paper industries from more than 75 countries. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 71 Chapter 2 E-commerce: Digital Markets, Digital Goods Exchanges proliferated during the early years of e-commerce, but many have failed. Suppliers were reluctant to participate because the exchanges encouraged competitive bidding that drove prices down and did not offer any long-term relationships with buyers or services to make lowering prices worthwhile. Many essential direct purchases are not conducted on a spot basis because they require contracts and consideration of issues such as delivery timing, customization, and quality of products. 2-5 What is the role of m-commerce in business, and what are the most important m-commerce applications? Walk down the street in any major metropolitan area and count how many people are pecking away at their iPhones, Samsungs, or BlackBerrys. Ride the trains or fly the planes, and you’ll see fellow travelers reading an online newspaper, watching a video on their phone, or reading a novel on their Kindle. As the mobile audience has expanded in leaps and bounds, mobile advertising and m-commerce have taken off. In 2019, retail m-commerce will account for about 48 percent of all e-commerce, with about $270 billion in annual revenues generated by retail goods and services, apps, advertising, music, videos, ring tones, movies, television, and location-based services such as local restaurant locators and traffic updates. M-commerce is the fastest-growing form of e-commerce, expanding at a rate of 30 percent or more per year, and is estimated to grow to $500 billion by 2022 (see Figure 2.9) (eMarketer, 2018d). FIGURE 2.9 MOBILE RETAIL COMMERCE REVENUES Mobile e-commerce is the fastest-growing type of B2C e-commerce and represented about 34 percent of all e-commerce in 2018. Sources: Data from eMarketer chart “Retail Mcommerce Sales, US, (billions) 2018–2022,” eMarketer, 2018d 600 500 Revenue (billions $) 72 400 300 200 100 0 2016 2017 2018 2019 Year 2020 2021 2022 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods The main areas of growth in mobile e-commerce are mass market retailing such as Amazon; sales of digital content such as music, TV shows, movies, and e-books; and in-app sales to mobile devices. On-demand firms such as Uber (described earlier in this chapter) and Airbnb are location-based services, and examples of mobile commerce as well. Larger mobile screens and more-convenient payment procedures also play a role in the expansion of m-commerce. Location-Based Services and Applications Location-based services include geosocial, geoadvertising, and geoinformation services. Seventy-four percent of smartphone owners use location-based services. What ties these activities together and is the foundation for mobile commerce is the global positioning system (GPS)–enabled map services available on smartphones. A geosocial service can tell you where your friends are meeting. Geoadvertising services can tell you where to find the nearest Italian restaurant, and geoinformation services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing. In 2019, the fastest-growing and most popular location-based services are on-demand economy firms such as Uber, Lyft, Airbnb, and hundreds more that provide services to users in local areas and are based on the user’s location (or, in the case of Airbnb, the user’s intended travel location). Waze is an example of a popular, social geoinformation service. Waze is a GPS-based map and navigational app for smartphones, now owned by Google. Waze locates the user’s car on a digital map using GPS and, like other navigation programs, collects information on the user’s speed and direction continuously. What makes Waze different is that it collects traffic information from users who submit accident reports, speed traps, landmarks, street fairs, protests, and even addresses. Waze uses this information to come up with suggested alternative routes, travel times, and warnings and can even make recommendations for gas stations along the way. The Waze app is used extensively by Uber and Lyft drivers and more than 50 million other drivers in the United States. Foursquare and new offerings by Facebook and Google are examples of geosocial services. Geosocial services help you find friends, or your friends to find you, by checking in to the service, announcing your presence in a restaurant or other place. Your friends are instantly notified. About 20 percent of smartphone owners use geosocial services. Foursquare provides a location-based social networking service to over 60 million registered individual users, who can connect with friends, update their location, and provide reviews and tips for enjoying a location. Points are awarded for checking in at designated venues. Users choose to post their checkins on their accounts on Twitter, Facebook, or both. Users also earn badges by checking in at locations with certain tags, for check-in frequency, or for the time of check-in. Connecting people to local merchants in the form of geoadvertising is the economic foundation for mobile commerce. Geoadvertising sends ads to users based on their GPS locations. Smartphones report their locations back to Google and Apple. Merchants buy access to these consumers when they come within range of a merchant. For instance, Kiehl Stores, a cosmetics retailer, sent special offers and announcements to customers who came within 100 yards of their store. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 73 74 Chapter 2 E-commerce: Digital Markets, Digital Goods Other Mobile Commerce Services Banks and credit card companies have developed services that let customers manage their accounts from their mobile devices. JPMorgan Chase and Bank of America customers can use their cell phones to check account balances, transfer funds, and pay bills. Apple Pay for the iPhone and Apple Watch, along with other Android and Windows smartphone models, allow users to charge items to their credit card accounts with a swipe of their phone. (See our Learning Track on mobile payment systems.) The mobile advertising market is the fastest-growing online ad platform, racking up a forecast $90 billion in ad revenue in 2019 and growing at 20 percent annually. Ads eventually move to where the eyeballs are, and increasingly that means mobile phones and, to a lesser extent, tablets. Google is the largest mobile advertising market, posting about $23 billion in mobile ads or 60 percent of its total ad revenue, with Facebook number two with $19.4 billion (90 percent of its total digital ad business). Google is displaying ads linked to cell phone searches by users of the mobile version of its search engine; ads are embedded in games, videos, and other mobile applications. Shopkick is a mobile application that enables retailers such as Best Buy, Sports Authority, and Macy’s to offer coupons to people when they walk into their stores. The Shopkick app automatically recognizes when the user has entered a partner retail store and offers a new virtual currency called kickbucks, which can be redeemed for store gift cards. Fifty-five percent of online retailers now have m-commerce websites— simplified versions of their websites that enable shoppers to use cell phones to shop and place orders. Virtually all large traditional and online retailers such as Sephora, Home Depot, Amazon, and Walmart have apps for m-commerce sales. In 2019, more than 66 percent of m-commerce sales will occur within apps rather than mobile web browsers. Browser commerce has, at least for mobile users, become app commerce. 2-6 What issues must be addressed when building an e-commerce presence? Building a successful e-commerce presence requires a keen understanding of business, technology, and social issues as well as a systematic approach. Today, an e-commerce presence is not just a corporate website but also includes a social network site on Facebook, a Twitter feed, and smartphone apps where customers can access your services. Developing and coordinating all these customer venues can be difficult. A complete treatment of the topic is beyond the scope of this text, and students should consult books devoted to just this topic (Laudon and Traver, 2019). The two most important management challenges in building a successful e-commerce presence are (1) developing a clear understanding of your business objectives and (2) knowing how to choose the right technology to achieve those objectives. Develop an E-commerce Presence Map E-commerce has moved from being a PC-centric activity on the web to a mobile and tablet-based activity. Currently, a majority of Internet users in the United States use smartphones and tablets to shop for goods and services, IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods FIGURE 2.10 E-COMMERCE PRESENCE MAP An e-commerce presence requires firms to consider the four types of presence, with specific platforms and activities associated with each. Type of Presence Websites Platform Activity Traditional Search Display Apps Affiliates Sponsorships Mobile Tablet Email Internal lists Purchased lists Facebook Social media Twitter Blogs Offline media Print TV & radio Newsletters Updates Sales Conversation Engagement Sharing Advice Education Exposure Branding look up prices, enjoy entertainment, and access social sites, less so to make purchases. Your potential customers use these various devices at different times during the day and involve themselves in different conversations, depending what they are doing—touching base with friends, tweeting, or reading a blog. Each of these is a touch point where you can meet the customer, and you have to think about how you develop a presence in these different virtual places. Figure 2.10 provides a roadmap to the platforms and related activities you will need to think about when developing your e-commerce presence. Figure 2.10 illustrates four kinds of e-commerce presence: websites, email, social media, and offline media. You must address different platforms for each of these types. For instance, in the case of website presence, there are three platforms: traditional desktop, tablets, and smartphones, each with different capabilities. Moreover, for each type of e-commerce presence, there are related activities you will need to consider. For instance, in the case of websites, you will want to engage in search engine marketing, display ads, affiliate programs, and sponsorships. Offline media, the fourth type of e-commerce presence, is included here because many firms use multiplatform or integrated marketing by which print ads refer customers to websites. Develop a Timeline: Milestones Where would you like to be a year from now? It’s very helpful for you to have a rough idea of the time frame for developing your e-commerce presence when you begin. You should break your project down into a small number of phases that could be completed within a specified time. Table 2.8 illustrates a one-year IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 75 76 Chapter 2 E-commerce: Digital Markets, Digital Goods TABLE 2.8 E-COMMERCE PRESENCE TIMELINE PHASE ACTIVITY Phase 1: Planning Envision web presence; determine personnel. Web mission statement Phase 2: Website development Acquire content; develop a site design; arrange for hosting the site. Website plan Phase 3: Web implementation Develop keywords and metatags; focus on search engine optimization; identify potential sponsors. A functional website Phase 4: Social media plan Identify appropriate social platforms and content for your products and services. A social media plan Phase 5: Social media implementation Develop Facebook, Twitter, and Pinterest presence. Functioning social media presence Phase 6: Mobile plan Develop a mobile plan; consider options for porting your website to smartphones. A mobile media plan MILESTONE timeline for the development of an e-commerce presence for a start-up company devoted to fashions for teenagers. You can also find more detail about developing an e-commerce website in the Learning Tracks for this chapter. 2.7 How will MIS help my career? Here is how Chapter 2 and this text can help you find a job as a junior e-commerce data analyst. The Company SportsFantasy Empire, a technology company that creates digital sports competitions, is looking for a recent college graduate to fill a junior e-commerce data analyst position. SportsFantasy Empire offers players the opportunity to compete through web and mobile devices in fantasy sports contests for cash prizes. The company was founded in 2012 and is headquartered in Los Angeles, with additional offices in San Francisco and New York. Job Description The junior e-commerce data analyst will work with SportsFantasy Empire’s analytics team to analyze large volumes of data to derive business insights about the company’s games and customers that will increase revenue. Job responsibilities include: • Setting up contest sizing that defines the user experience and business efficiency. • Optimizing acquisition spending and marketing strategies to drive growth. • Identifying ways to improve customer gameplay through on-site changes. • Measuring how new features or site changes are driving changes in customer behavior. • Developing standard reporting for key business results, including reports on contest performance, player activity, segment performance, and key player performance. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods Job Requirements • • • • • Bachelor’s degree in engineering, mathematics, business, or a related field E-commerce data analytics experience desirable Knowledge of statistics Demonstrated history of independently developing new insights from data Experience with model building, SQL, SAS, or other programming language desirable • Strong communication and organizational skills • Avid fantasy sports player a plus Interview Questions 1. Do you play fantasy sports? How often? Have you ever worked with data about fantasy sports? Why do you think you would be a good fit for this job? 2. What is your background in statistics? What courses did you take? Have you any job experience where you had to use statistics? 3. Have you ever analyzed data about website performance or online customer behavior? 4. What do you know about the cost of acquiring a customer through social media channels (i.e., measuring the average customer acquisition cost on social networks; acquisition vs. retention costs)? 5. How would you propose working with our non-technical teams in telling a story about customer data insights so that they are able to drive customer engagement and loyalty and execute more effectively? 6. What is your proficiency level with SQL or SAS and site analytics tools? Have you ever used these tools on the job? What did you do with them? 7. Can you give an example of a problem you solved using data analytics? Did you do any writing and analysis? Can you provide examples? Author Tips 1. Review this chapter and also the discussion of search and search engine marketing. To qualify for this job, you should also have taken course work in statistics. Course work or on-the-job training in SQL and SAS would also be helpful. 2. Use the web to do more research on the company. Try to find out more about its strategy, competitors, and business challenges. Additionally, review the company’s social media channels from the past 12 months. Are there any trends you can identify or certain themes the social media channels seem to focus on? 3. Be prepared to talk about SportsFantasy Empire’s games as well as the games offered by competitors to show you are familiar with the industry. Inquire about some of the ways the company fine-tunes its online presence. Be prepared to give an example of how you think a fantasy game could improve its online presence. 4. Use the web to find examples of data analytics used by fantasy sports companies. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 77 78 Chapter 2 E-commerce: Digital Markets, Digital Goods REVIEW SUMMARY 2-1 What are the unique features of e-commerce, digital markets, and digital goods? E-commerce involves digitally enabled commercial transactions between and among organizations and individuals. Unique features of e-commerce technology include ubiquity, global reach, universal technology standards, richness, interactivity, information density, capabilities for personalization and customization, and social technology. E-commerce is becoming increasingly social, mobile, and local. Digital markets are said to be more transparent than traditional markets, with reduced information asymmetry, search costs, transaction costs, and menu costs along with the ability to change prices dynamically based on market conditions. Digital goods, such as music, video, software, and books, can be delivered over a digital network. Once a digital product has been produced, the cost of delivering that product digitally is extremely low. 2-2 What are the principal e-commerce business and revenue models? E-commerce business models are e-tailers, transaction brokers, market creators, content providers, community providers, service providers, and portals. The principal e-commerce revenue models are advertising, sales, subscription, free/freemium, transaction fee, and affiliate. 2-3 How has e-commerce transformed marketing? The Internet provides marketers with new ways of identifying and communicating with millions of potential customers at costs far lower than traditional media. Crowdsourcing using the wisdom of crowds helps companies learn from customers to improve product offerings and increase customer value. Behavioral targeting techniques increase the effectiveness of banner, rich media, and video ads. Social commerce uses social networks and social network sites to improve targeting of products and services. 2-4 How has e-commerce affected business-to-business transactions? B2B e-commerce generates efficiencies by enabling companies to locate suppliers, solicit bids, place orders, and track shipments in transit electronically. Net marketplaces provide a single, digital marketplace for many buyers and sellers. Private industrial networks link a firm with its suppliers and other strategic business partners to develop highly efficient and responsive supply chains. 2-5 What is the role of m-commerce in business, and what are the most important m-commerce applications? M-commerce is especially well suited for location-based applications such as finding local hotels and restaurants, monitoring local traffic and weather, and providing personalized location-based marketing. Mobile phones and handhelds are being used for mobile bill payment, banking, securities trading, transportation schedule updates, and downloads of digital content such as music, games, and video clips. M-commerce requires wireless portals and special digital payment systems that can handle micropayments. The GPS capabilities of smartphones make geoadvertising, geosocial, and geoinformation services possible. 2-6 What issues must be addressed when building an e-commerce presence? Building a successful e-commerce presence requires a clear understanding of the business objectives to be achieved and selection of the right platforms, activities, and timeline to achieve those objectives. An e-commerce presence includes not only a corporate website but also a presence on Facebook, Twitter, and other social networking sites and smartphone apps. Key Terms Advertising revenue model, 58 Affiliate revenue model, 60 Behavioral targeting, 61 Business-to-business (B2B), 53 Business-to-consumer (B2C), 53 Community providers, 56 Consumer-to-consumer (C2C), 53 Cost transparency, 49 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods Crowdsourcing, 66 Customization, 49 Digital goods, 51 Direct goods, 71 Disintermediation, 51 Dynamic pricing, 50 Electronic Data Interchange (EDI), 69 E-tailer, 55 Exchanges, 71 FinTech, 60 Free/freemium revenue model, 59 Geoadvertising services, 73 Geoinformation services, 73 Geosocial services, 73 Indirect goods, 71 Information asymmetry, 50 Information density, 49 Intellectual property, 55 Location-based services, 73 Long tail marketing, 61 Market creator, 56 Market entry costs, 48 Marketspace, 48 79 Menu costs, 50 Micropayment systems, 59 Mobile commerce (m-commerce), 54 Native advertising, 64 Net marketplaces, 70 Personalization, 49 Podcasting, 55 Price discrimination, 49 Price transparency, 49 Private exchange, 70 Private industrial networks, 70 Revenue model, 58 Richness, 48 Sales revenue model, 59 Search costs, 48 Social graph, 65 Social shopping, 65 Streaming, 55 Subscription revenue model, 59 Transaction costs, 48 Transaction fee revenue model, 60 Wisdom of crowds, 66 MyLab MIS To complete the problems with MyLab MIS, go to the EOC Discussion Questions in MyLab MIS. Review Questions 2-1 What are the unique features of e-commerce, digital markets, and digital goods? • • • 2-2 2-4 • Name and describe the principal e-commerce business models. Name and describe the e-commerce revenue models. • • How has e-commerce transformed marketing? • • Explain how social networking and the wisdom of crowds help companies improve their marketing. Define behavioral targeting and explain how it works at individual websites and on advertising networks. 2-5 Explain how Internet technology supports business-to-business electronic commerce. Define and describe Net marketplaces and explain how they differ from private industrial networks (private exchanges). What is the role of m-commerce in business, and what are the most important m-commerce applications? • 2-6 Define the social graph and explain how it is used in e-commerce marketing. How has e-commerce affected business-tobusiness transactions? What are the principal e-commerce business and revenue models? • 2-3 Name and describe four business trends and three technology trends shaping e-commerce today. List and describe the eight unique features of e-commerce. Define a digital market and digital goods and describe their distinguishing features. • List and describe important types of m-commerce services and applications. What issues must be addressed when building an e-commerce presence? • List and describe the four types of e-commerce presence. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 80 Chapter 2 E-commerce: Digital Markets, Digital Goods Discussion Questions 2-7 How does the Internet change consumer and supplier relationships? 2-8 The Internet may not make corporations MyLab MIS obsolete, but the corporations will have MyLab MIS to change their business models. Do you agree? Why or why not? 2-9 How have social technologies changed MyLab MIS e-commerce? Hands-On MIS Projects The projects in this section give you hands-on experience developing e-commerce strategies for businesses, using spreadsheet software to research the profitability of an e-commerce company, and using web tools to research and evaluate e-commerce hosting services. Visit MyLab MIS to access this chapter’s Hands-On MIS Projects. Management Decision Problems 2-10 Columbiana is a small, independent island in the Caribbean that has many historical buildings, forts, and other sites along with rain forests and striking mountains. A few first-class hotels and several dozen less-expensive accommodations lie along its beautiful white-sand beaches. The major airlines have regular flights to Columbiana, as do several small airlines. Columbiana’s government wants to increase tourism and develop new markets for the country’s tropical agricultural products. How can an e-commerce presence help? What Internet business model would be appropriate? What functions should the e-commerce presence perform? 2-11 Explore the websites of the following companies: Swatch, Lowe’s, and Priceline. Determine which of these websites would benefit most from adding a company-sponsored blog to the website. List the business benefits of the blog. Specify the intended audience for the blog. Decide who in the company should author the blog and select some topics for the blog. Improving Decision Making: Using Spreadsheet Software to Analyze a Dot-com Business Software skills: Spreadsheet downloading, formatting, and formulas Business skills: Financial statement analysis 2-12 Pick one e-commerce company on the Internet—for example, Ashford, Yahoo, or Priceline. Study the web pages that describe the company and explain its purpose and structure. Use the web to find articles that comment on the company. Then visit the Securities and Exchange Commission’s website at www.sec.gov to access the company’s 10-K (annual report) form showing income statements and balance sheets. Select only the sections of the 10-K form containing the desired portions of financial statements that you need to examine and download them into your spreadsheet. (MyLab MIS provides more detailed instructions on how to download this 10-K data into a spreadsheet.) Create simplified spreadsheets of the company’s balance sheets and income statements for the past three years. • Is the company a dot-com success, borderline business, or failure? What information provides the basis of your decision? Why? When answering these questions, pay special attention to the company’s three-year trends in revenues, costs of sales, gross margins, operating expenses, and net margins. • Prepare an overhead presentation (with a minimum of five slides), including appropriate spreadsheets or charts, and present your work to your professor and classmates. Achieving Operational Excellence: Evaluating E-commerce Hosting Services Software skills: Web browser software Business skills: Evaluating e-commerce hosting services 2-13 This project will help develop your Internet skills in evaluating commercial services for hosting an e-commerce site for a small start-up company. You would like to set up a website to sell towels, linens, pottery, and tableware from Portugal and are examining services for hosting small business Internet storefronts. Your website should be able to take secure credit card payments and calculate shipping costs and taxes. Initially, you would like to display photos and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods 81 descriptions of 40 products. Visit Wix, GoDaddy, and iPage and compare the range of e-commerce hosting services they offer to small businesses, their capabilities, and their costs. Examine the tools they provide for creating an e-commerce site. Compare these services and decide which you would use if you were actually establishing a web store. Write a brief report indicating your choice and explaining the strengths and weaknesses of each service. Collaboration and Teamwork Project Performing a Competitive Analysis of E-commerce Sites 2-14 Form a group with three or four of your classmates. Select two businesses that are competitors in the same industry and that use their websites for electronic commerce. Visit these websites. You might compare, for example, the websites for Pandora and Spotify, Amazon and BarnesandNoble.com, or E*Trade and TD Ameritrade. Prepare an evaluation of each business’s website in terms of its functions, user friendliness, and ability to support the company’s business strategy. Which website does a better job? Why? Can you make some recommendations to improve these websites? If possible, use Google Docs and Google Drive or Google Sites to brainstorm, organize, and develop a presentation of your findings for the class. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 82 Chapter 2 E-commerce: Digital Markets, Digital Goods A Nasty Ending for Nasty Gal CASE STUDY I n 2006, Sophia Amoruso was a 22-year-old hitchhiking, dumpster-diving community college dropout with a lot of time on her hands. After reading a book called Starting an eBay Business for Dummies, she launched an eBay store called Nasty Gal Vintage, named after a song and 1975 album by the jazz singer Betty Davis, second wife of the legendary Miles Davis. Nasty Gal’s styling was edgy and fresh—a little bit rock and roll, a little bit disco, modern, but never hyper-trendy. Eight years after its founding, Nasty Gal had sold more than $100 million in new and vintage clothing and accessories, employed more than 350 people, had more than a million fans on Facebook and Instagram, and was a global brand. It looked like a genuine e-commerce success story. Or was it? When Amoruso began her business, she did everything herself out of her tiny San Francisco apartment—merchandising, photographing, copywriting, and shipping. She got up at the crack of dawn to make 6 a.m. estate sales, haggled with thrift stores, spent hours photoshopping the images she styled and shot photos herself using models she recruited herself, and ensured that packaging was high quality. She would inspect items to make sure they were in good enough shape to sell. She zipped zippers, buttoned buttons, connected hooks, folded each garment, and slid it into a clear plastic bag that was sealed with a sticker. Then she boxed the item and affixed a shipping label on it. She had to assume that her customers were as particular and as concerned with aesthetics as she was. Amoruso had taken photography classes at a community college, where she learned to understand the importance of silhouette and composition. She bought vintage pieces with dramatic silhouettes— a coat with a big funnel collar, a ’50s dress with a flared skirt, or a Victorian jacket with puffy sleeves. Exaggerating everything about the silhouette through the angle from which it was photographed helped Amoruso produce tiny thumbnails for eBay that attracted serious bidders. She was able to take an object, distill what was best about it, and then exaggerate those qualities so they were visible even in its tiniest representation. When the thumbnail was enlarged, it looked amazing. Amoruso has been a heavy user of social tools to promote her business. When she first started out, she used MySpace, where she attracted a cult following of more than 60,000 fans. The company gained traction on social media with Nasty Gal’s aesthetic that could be both high and low, edgy and glossy. Amoruso took customer feedback very seriously and believed customers were at the center of everything Nasty Gal did. When she sold on eBay, she learned to respond to every customer comment to help her understand precisely who was buying her goods and what they wanted. Amoruso said that the content Nasty Gal customers created has always been a huge part of the Nasty Gal brand. It was very important to see how customers wore Nasty Gal’s pieces and the types of photographs they took. They were inspiring. Social media is built on sharing, and Nasty Gal gave its followers compelling images, words, and content to share and talk about each day. They could be a crazy vintage piece, a quote, or a behind-the-scenes photo. At most companies the person manning the Twitter and Facebook accounts is far removed from senior management. Amoruso did not always author every Nasty Gal tweet, but she still read every comment. If the customers were unhappy about something, she wanted to hear about it right away. At other businesses, it might take months for customer feedback to filter up to the CEO. When Nasty Gal first joined Snapchat, Amoruso tested the water with a few Snaps, and Nasty Gal followers responded in force. In June 2008, Amoruso moved Nasty Gal Vintage off eBay and onto its own destination website, www.nastygal.com. In 2012, Nasty Gal began selling clothes under its own brand label and also invested $18 million in a 527,000-square-foot national distribution center in Shepherdsville, Kentucky, to handle its own shipping and logistics. Venture capitalists Index Ventures provided at least $40 million in funding. Nasty Gal opened a brick-and-mortar store in Los Angeles in 2014 and another in Santa Monica in 2015. With growing direct-to-consumer demand and higher inventory replenishment requirements driven by new store openings, Nasty Gal invested in a new warehouse management system. The warehouse IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods management system investment was designed to increase warehouse productivity and shorten order cycle times so that Nasty Gal’s supply chain could better service its mushrooming sales. (Order cycle time refers to the time period between placing of one order and the next order.) The company selected HighJump’s Warehouse Management System (WMS) with the goal of increasing visibility and overall productivity while keeping fill rates above 99 percent. (The fill rate is the percentage of orders satisfied from stock at hand.) Key considerations were scalability and capabilities for handling retail replenishment in addition to direct-to-consumer orders. HighJump’s implementation team customized the WMS software to optimize the business processes that worked best for an e-commerce retailer that ships most of its items straight to the customer, with a small subset going to retail stores. The WMS software was also configured to support processes that would scale with future growth. Picking efficiency and fill rates shot up, with fill rates above 99 percent, even though order volume climbed. Nasty Gal experienced tremendous growth in its early years, being named INC Magazine’s fastest-growing retailer in 2012 and earning a number one ranking in Internet Retailer’s Top 500 Guide in 2016. By 2011, annual sales hit $24 million and then nearly $100 million in 2012. However, sales started dropping to $85 million in 2014 and then $77 million in 2015. Nasty Gal’s rapid expansion had been fueled by heavy spending in advertising and marketing. This is a strategy used by many start-ups, but it only pays off in the long run if one-time buyers become loyal shoppers. Otherwise, too much money is spent on online marketing like banner ads and paying for influencers. If a company pays $70 on marketing to acquire a customer and that customer only buys once from it, the company won’t make money. A company that spends $200 million to make $100 million in revenue is not a sustainable business. Nasty Gal had a “leaky bucket” situation: Once it burned through its fundraising capital and cut down on marketing, sales continued to drop. Nasty Gal couldn’t hold onto customers. Some were dissatisfied with product quality, but many were more attracted to fast-fashion retailers such as Zara and H&M, which both deliver a wider array of trendy clothes through online and bricks-and-mortar stores at lower prices and are constantly changing their merchandise. The actual market for the Nasty Gal brand was quickly saturated. There was a limit to the number of women Nasty Gal appealed to: Nasty Gal had a California cool, young girl look, and it was unclear how attractive it was in other parts of the United States and around the world. Nasty Gal also wasted money on things that didn’t warrant large expenditures. The company quintupled the size of its headquarters by moving into a 50,300-square-foot location in downtown Los Angeles in 2013—far more space than the company needed, according to industry experts. The company had also opened a 500,000-square-foot fulfillment center in Kentucky to handle its own distribution and logistics as well as two bricks-and-mortar stores in Los Angeles and Santa Monica. Even in the hyper-trendy fashion business, companies have to closely monitor production, distribution, and expenses for operations to move products at a scale big enough to make a profit. Nasty Gal’s mostly young staff focused too much on the creative side of the business. While it was growing, Nasty Gal built its management team, hiring sizzling junior talent from retail outlets such as Urban Outfitters. But their traditional retail backgrounds clashed with the start-up mentality. As Nasty Gal expanded, Amoruso’s own fame also grew, and she was sidetracked by other projects. She wrote two books. The first, titled #Girlboss, described the founding of Nasty Gal and Amoruso’s business philosophy and was adapted by Netflix into a show with Amoruso as executive producer. (The series was cancelled in June 2017 after just one season.) Employees complained about Amoruso’s management style and lack of focus. Amoruso resigned as chief executive in 2015 but remained on Nasty Gal’s board of directors until the company filed for Chapter 7 bankruptcy on November 9, 2016. Between 2015 and 2016, Nasty Gal had raised an additional $24 million in equity and debt financing from venture-focused Stamos Capital Partners LP and Hercules Technology Growth Capital Inc. Even though the funding helped Nasty Gal stay afloat, the company still had trouble paying for new inventory, rent, and other operating expenses. Within weeks of filing for Chapter 7 protection, Nasty Gal sold its brand name and other intellectual property on February 28, 2017, for $20 million to a rival online fashion site, the United Kingdom’s Boohoo.com. Boohoo is operating Nasty Gal as a standalone website, but Nasty Gal’s stores are closing. Boohoo believes Nasty Gal’s arresting style and loyal customer base will complement Boohoo and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 83 84 Chapter 2 E-commerce: Digital Markets, Digital Goods expand global opportunities for growth. Many customers have complained about the quality of fabric and customer service. Amoruso subsequently turned to developing Girlboss—a media company that hosts a website, a podcast, and two annual conferences, called the Girlboss Rally. She also launched the Girlboss Foundation, which has given out $130,000 to women-owned small businesses. February 24, 2017; Shan Li, “Nasty Gal, Once a Fashion World Darling, Went Bankrupt: What Went Wrong?,” Los Angeles Times, February 24, 2017; “Case Study Nasty Gal,” HighJump, 2016; and Yelena Shuster, “NastyGal Founder Sophia Amoruso on How to Become a #GirlBoss,” Elle, May 15, 2014. Sources: Cady Drell, “Sophia Amoruso on the Strange and Difficult Upside of Making Big Mistakes.” Elle, July 24, 2018; Aundrea Cline-Thomas, “How Girlboss’s Sophia Amoruso Continues to Chart Her Career Course,” www.nbcnews.com, July 26, 2018; Sarah Chaney, “How Nasty Gal Went from an $85 Million Company to Bankruptcy,” Wall Street Journal, 2-16 CASE STUDY QUESTIONS 2-15 2-17 How was social media related to Nasty Gal’s business model? To what extent was Nasty Gal a “social” business? What management, organization, and technology problems were responsible for Nasty Gal’s failure as a business? Could Nasty Gal have avoided bankruptcy? Explain your answer. Complete the following writing exercises. 2-18 Describe the six features of social commerce. Provide an example for each feature, describing how a business could use that feature for selling to consumers online. 2-19 List and describe the main activities involved in building an e-commerce presence. Chapter 2 References Almquist, Eric, Jamie Cleghorn, and Lori Sherer. “The B2B Elements of Value.” Harvard Business Review (March–April 2018). Bapna, Ravi, Jui Ramaprasad, and Akmed Umyarov. “Monetizing Freemium Comunities: Does Paying for Premium Increase Social Engagement?”MIS Quarterly 42, No. 3 (September 2018). Bell, David R., Santiago Gallino, and Antonio Moreno. “The Store Is Dead - Long Live the Store.” MIT Sloan Management Review (Spring 2018). Brynjolfsson, Erik, Tomer Geva, and Shachar Reichman. “CrowdSquared: Amplifying the Predictive Power of Search Trend Data.” MIS Quarterly 40, No. 4 (December 2016). “Do Search Ads Really Work?” Harvard Business Review (March– April 2017). eMarketer. “US Mobile Downloads and In-App Revenue.” (November, 2017a). ___________. “US Time Spent with Media.” eMarketer Chart (April 2017b). ___________. “Digital Travel Sales 2018–2022.” eMarketer (June 2018a.) ___________. “Internet Users by Device, 2016–2022.” eMarketer (February 2018b). ___________. “Retail Ecommerce Sales 2018–2022.” eMarketer (May 2018c.) ___________. “Retail Mcommerce Sales 2018–2022.” eMarketer (July 2018d.) ___________. “Retail Sales North America 2018–2022.” eMarketer (May 2018e). ___________. “Social Network Share of Average Time Spent Per Day with Digital Media by Platform.” 2015–2020, eMarketer (April 2018f.) ___________. “US Ad Spending.” eMarketer (April 2018g.) ___________. “US Digital Users Estimates for 2018.” eMarketer (March 2018h). ___________. “US Digital Video Viewers and Penetration, 2016– 2022.” eMarketer (February 2018i). Facebook. “Stats.” https://newsroom.fb.com, accessed July 20, 2018. Fang, Xiao, and Paul Jen-Hwa Hu. “Top Persuader Prediction for Social Networks.” MIS Quarterly 42 No. 1 (March 2018). Gomber, Peter, Robert J. Kauffman, Chris Parker, and Bruce W. Weber. “On the Fintech Revolution: Interpreting the Forces of Innovation, Disruption, and Transformation in Financial Services.” Journal of Management Information Systems 35 No. 1 (2018). Gosline, Renee Richardson, Jeffrey Lee, and Glen Urban. “The Power of Customer Stories in Digital Marketing.” MIT Sloan Management Review (Summer 2017). Gunarathne, Priyanga, Huaxia Rui, and Abraham Seidmann. “When Social Media Delivers Customer Service: Differential Customer Treatment in the Airline Industry.” MIS Quarterly 42 No. 2 (June 2018). Hoang, Ai-Phuong, and Robert J. Kauffman. “Content Sampling, Household Informedness, and the Consumption of Digital Information Goods.” Journal of Management Information Systems 35 No. 2 (2018). Hong, Yili, Paul A. Pavlou, Nan Shi, and Kanliang Wang. “On the Role of Fairness and Social Distance in Designing Effective Social Referral Systems.” MIS Quarterly 41 No. 3 (September 2017). Hu, Nan, Paul A. Pavlou, and Jie Zhang. “On Self-Selection Biases in Online Product Reviews.” MIS Quarterly 41, No. 2 (June 2017). Huang, Ni, Yili Hong, and Gordon Burtch. “Social Network Integration and User Content Generation: Evidence from Natural Experiments.” MIS Quarterly 41 No. 4 (December 2017). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 2 E-commerce: Digital Markets, Digital Goods Internet World Stats. “Internet Users in the World.” Internetworldstats.com (2018). John, Leslie K., Daniel Mochon, Oliver Emrich, and Janet Schwartz. “What’s the Value of a ‘Like’?” Harvard Business Review (March–April 2017). Kwark, Young, Jianqing Chen, and Srinivasan Raghunathan. “Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information.” MIS Quarterly 41 No. 3 (September 2017). Laudon, Kenneth C., and Carol Guercio Traver. E-commerce: Business, Technology, Society, 15th ed. (Upper Saddle River, NJ: Prentice-Hall, 2019). Lin Zhije, Khim-Yong Goh, and Cheng-Suang Heng. “The Demand Effects of Product Recommendation Networks: An Empirical Analysis of Network Diversity and Stability.” MIS Quarterly 41, No. 2 (June 2017). Liu, Qianqian Ben, and Elena Karahanna. “The Dark Side of Reviews: The Swaying Effects of Online Product Reviews on Attribute Preference Construction.” MIS Quarterly 41, No. 2 (June 2017). Luo, Xueming, Bin Gu, Jie Zhang, and Chee Wei Phang. “Expert Blogs and Consumer Perceptions of Competing Brands.” MIS Quarterly 41, No. 2 (June 2017). Mo, Jiahui, Sumit Sarkar, and Syam Menon. “Know When to Run: Recommendations in Crowdsourcing Contests.” MIS Quarterly 42, No. 3 (September 2018). 85 Oh, Hyelim, Animesh Animesh, and Alain Pinsonneault. “Free Versus For-a-Fee: The Impact of a Paywall on the Pattern and Effectiveness of Word-of-Mouth via Social Media.” MIS Quarterly 40, No. 1 (March 2016). Orlikowski, Wanda, and Susan V. Scott. “The Algorithm and the Crowd: Considering the Materiality of Service Innovation.” MIS Quarterly 39, No. 1 (March 2015). Rainie, Lee. “Americans’ Complicated Feelings about Social Media in an Era of Privacy Concerns.” Pew Research Center (May 2018). ___________. “The State of Privacy in Post-Snowden America.” Pew Research Center (September 21, 2016). RIAA.com, accessed July 30, 2018. Schlager, Tobias, Christian Hildebrand, Gerald Häubl, Nikolaus Franke, and Andreas Herrmann. “Social ProductCustomization Systems: Peer Input, Conformity, and Consumers’ Evaluation of Customized Products.” Journal of Management Information Systems 35 No.1 (2018). Shuk, Ying Ho, and Kai H. Lim. “Nudging Moods to Induce Unplanned Purchases in Imperfect Mobile Personalization Conexts.” MIS Quarterly 42, No. 3 (September 2018). U.S. Bureau of the Census. “E-Stats.” www.census.gov, accessed July 8, 2018. Ye, Shun, Siva Viswanathan, and Il-Horn Hann. “The Value of Reciprocity in Online Barter Markets: An Empirical Investigation.” MIS Quarterly 42 No. 2 (June 2018). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 9B17M097 BKASH: FINANCIAL TECHNOLOGY INNOVATION FOR EMERGING MARKETS Ishtiaq P. Mahmood, Marleen Dieleman, and Narmin T. Banu wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be transmitted, photocopied, digitized, or otherwise reproduced in any form or by any means without the permission of the copyright holder. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Business School, Western University, London, Ontario, Canada, N6G 0N1; (t) 519.661.3208; (e) cases@ivey.ca; www.iveycases.com. Copyright © 2017, Richard Ivey School of Business Foundation Version: 2017-09-25 In May 2017, Kamal Quadir, the chief executive officer of bKash Limited (bKash), had mixed feelings. Quadir had built one of the most innovative companies in Bangladesh from scratch: bKash was a mobile financial services (MFS) firm uniquely targeted at the bottom, unbanked segment of society. The company now had 26 million customers and was a lead player in the financial technology industry. Quadir had made a positive impact on the lives of countless people, and bKash had gained worldwide recognition for an innovative business model that offered real solutions to the poor. However, getting there had required navigating through a range of challenges that required close collaboration with other players, including telecommunications operators (telcos), banks, non-governmental organizations (NGOs), and regulators. The journey was far from over. Now that the venture had finally scaled and reached break-even, Quadir wondered what more he could do. The current business model was built on a set of guidelines issued by Bangladesh Bank—the central bank of Bangladesh. However, the model could be undermined by future regulations, as effective innovations frequently ushered in new challenges. How could he strengthen the foundation of his disruptive business to make it more robust? How could the company continue to grow, while maintaining its financial inclusion objective? BANGLADESH: AN INCLUSIVE ECONOMIC GROWTH MODEL With 156 million people1 crammed in an area slightly less than the size of the U.S. state of Illinois, Bangladesh had long been one of the most densely populated countries in the world. Despite facing various natural and infrastructural setbacks, according to the Asian Development Bank, the country enjoyed a gross domestic product growth rate of above 6 per cent from 2012 to 2016.2 This number was achieved thanks to strong domestic demand, private sector wages, public investment, an increasing number of women joining the workforce, and higher worker remittances. Over the years, the country also showed significant improvement in the Human Development Index. Between 1990 and 2010, life expectancy rose by about 12 years—from 58 to 70.3 However, the literacy rate remained rather low at 57.7 per cent.4 87 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 88 Page 2 BKASH: Financial Technology Innovation for Emerging Markets 9B17M097 The country’s garment industry was booming and drew in large numbers of workers, many of them women. With the female workforce poised to grow from 34 per cent to 82 per cent over the next decade, Bangladesh was witnessing enviable advances in female employment.5 With the fourth-largest Muslim population in the world,6 Bangladesh also had an estimated 10 million overseas workers, most of them in the Middle East. They sent back remittances representing over 10 per cent of Bangladesh’s annual income.7 Like most emerging markets, Bangladesh experienced rapid development in urbanization, including an exodus of youth from rural areas to urban locations in search of better job opportunities. Dhaka, the capital city of Bangladesh, bulged to a megacity of 17 million people in 2014.8 As a result of urbanization, most emerging markets saw a reduction in rural living standards and an increase in extreme poverty. Bangladesh did not, thanks in part to the efforts of BRAC and the Grameen Foundation, two of the largest NGOs in the world. These organizations facilitated education and entrepreneurship, especially in the rural areas. THE URBAN–RURAL GAP Bangladesh had a fairly homogeneous population with close urban–rural bonds. The large population residing in a collectivist society and packed within a geographical boundary of 147,570 square kilometres ensured a steady demand for urban–rural interaction. Bangladesh’s tropical weather, population size, and horizontal terrain gave it certain competitive advantages. The vast, flat lands ensured easy installation of towers and an uninterrupted network, helping the telecommunication industry to thrive and allowing a closely knit and well-connected societal structure. The total number of mobile phone subscriptions reached 129 million at the end of July 2016.9 The share of mobile penetration was higher than richer developing countries such as neighbouring India or Kenya (see Exhibit 1). However, in a country with poor infrastructural facilities, widespread illiteracy, and an 84 per cent unbanked population,10 transfer of money from cities and towns to villages was an issue. People would often travel long distances to pay bills or hand over cash to relatives, which was inefficient and expensive. While urbanization and rural microentrepreneurship generated a demand for easy financial transactions, few players could meet the demand. One of the options that people had in the early 2000s was using the services of banks. However, there were few incentives for formal banks to venture out to unchartered territories. The reason was partly Bangladesh’s weak infrastructure and partly a lack of the right type of technology that could reach the poor. While banks were highly compliant as far as regulation was concerned, they did not cater to the basic needs of the lowincome population looking for an easy, efficient, and cost-effective financial service. Highly process oriented, and barely accessible, banks did not attract much volume in terms of mass money transfer. The power distance between formal banking employees and common uneducated people, as well as regulatory compliances continued to be key barriers to using bank services. The processes and formalities required for setting up bank accounts were complicated for common illiterate or semi-literate people. Moreover, given the kind of overhead costs involved in setting up a bank structure—along with security, employees, logistics, and utilities—banks did not find it financially feasible to extend services beyond urban and suburban areas. This left a major chunk of the Bangladeshi population unbanked. Another option people had was sending money through the Bangladesh Post Office. This required a trip to the nearest post office. Although easier than using the services of a bank, the formalities were still rather complicated for common people. The number of post offices was limited, and access points were inadequate. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 3 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets Alternatively, people could use a passenger bus company that had expanded its services to transfer money. The company adhered to none of the bank regulations, and the money transfer process worked in a way similar to that of the post office. The final option senders had was relying on family and friends. While this was an effective method, both sending and receiving parties had to depend a lot on friends and family members’ schedules, not to mention their reliability. This option proved to be not only inconvenient but also risky. Overall, sending money to family members was either expensive, complex, or insecure. It prevented opportunities from trickling down and empowering people at the lower levels of society where most people relied on cash transactions. The lack of equal opportunity to access financial services left poor people at a disadvantage. For instance, students pursuing education away from villages had to rely on inefficient means to obtain college fees from parents, such as spending time travelling back and forth. Aside from time spent, carrying cash around posed real dangers from robbery. Finally, less than ideal flows of cash to and from the urban areas created opportunity costs for the poor. The inequality in terms of access to financial services had attracted the attention of the Bangladesh central bank, which put “financial inclusion” on the agenda. The central bank realized that macro-level monetary policy was ineffective without micro-level channels to facilitate financial flows throughout society. KAMAL QUADIR: THE INNOVATOR The problem did not go unnoticed by Quadir, a Bangladeshi American entrepreneur. Quadir came from a family of entrepreneurs; his brother Iqbal was a big inspiration who left his lucrative career as an investment banker in New York in the mid-1990s and returned to Bangladesh to set up Grameenphone Limited (Grameenphone), the largest telco in the country with revenue of US$1.4 billion in 2016.11 Quadir, who studied studio art and economics at Oberlin College, Ohio, and later received a master of business administration (MBA) from the Massachusetts Institute of Technology, was not only well aware of macroeconomic dynamics but also well-equipped with business acumen to act on the urban–rural gap. After finishing his MBA in 2005, Quadir founded CellBazaar, a platform similar to eBay, as he said that there was “no efficient way for sellers to sell their item and buyers to look for it.” Instead of relying on computers, he thought the platform should be based on mobile phones: How do we use this tremendous resource we have in Bangladesh where 100 million people have mobile phones? So that was the idea I had—that if I can utilize the ubiquitously available mobile phones to create a marketplace, then poor people or anybody in the country can post his or her product and another person can retrieve it from there. So it’s like creating eBay with mobile phones. The venture worked, and within five years, almost 4.5 million people had used it. Quadir soon ran into a problem that planted the seeds for his subsequent venture: There was no efficient and universal payment mechanism in the country. The number of bank accounts was low, and on top of that, the number of credit and debit cards was also very low. So I was thinking how to solve the problem of common people not being able to make digital payment efficiently. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 89 90 Page 4 BKASH: Financial Technology Innovation for Emerging Markets 9B17M097 Having grown up in Jessore, a district town in the southwestern region of Bangladesh, Quadir was well aware of the infrastructural problems that people from the less-developed districts of the country were exposed to every day, limiting their opportunities. In later life, this exposure helped him have empathy and understanding of the needs of individuals with relatives away from home. He wanted to empower these low-income individuals who, despite their poverty, had access to cell phones that cost as little as Tk1,20012 (approximately US$15). It was only a matter of time before he connected the dots with bKash, offering mobile money accounts to millions. The earliest adoption was in transferring electronic money among the accounts, which opened up opportunities for not only the unbanked population but also students and microentrepreneurs. BRAC: THE PARTNER BRAC, the world’s largest NGO, started its journey in 1972, a year after Bangladesh gained independence. With a focus on social development, BRAC provided a host of services geared to uplifting society. Founded by Sir Fazle Hasan Abed, BRAC had 5.3 million microfinance borrowers and served 138 million of the country’s population.13 Along with its development programs, in 2001, BRAC initiated a commercial bank— BRAC Bank—to finance small and medium enterprises, which at that time was the “missing middle.” In January 2008, Quadir and his brother Iqbal went to see Sir Abed of BRAC, who encouraged them to consider how BRAC could serve as a platform for mobile payments. Two months later, Quadir went to Kenya to learn about M-Pesa, the world’s first successful and scaled mobile money solution. In September 2008, Sir Abed introduced Quadir to the management of BRAC Bank Limited. Meanwhile, Quadir and his brother formed Money in Motion, LLC, USA, together with Nick Hughes, who had led the launch of M-Pesa in Kenya, and Arun Gore, the managing director of venture capital firm Grey Ghost Ventures. BRAC Bank and Money in Motion then formed bKash in February 2010. The joint venture was designed to provide an electronic payment platform to increase access to financial services for low-income users. In a broader sense, the goal was to offer an efficient payment system for all Bangladeshis. Bikash is the Bengali word for growth, prosperity, or bloom. DIGITALIZATION FOR THE POOR: THE REGULATOR In 2009, Dr. Atiur Rahman was appointed the tenth governor (May 1, 2009–March 15, 2016) of the central bank. Educated in the Marxist tradition, Rahman was an economist who was passionate about reducing poverty. Fortunately, in that respect he received clear support. He related, “When I started on my first day as a Governor, I received a text message from the Prime Minister, and it read: ‘Please work for the poor.’” Rahman wasted no time doing precisely that. Financial inclusion became one of the prime goals of the central bank, as he believed it could contribute to economic growth without increasing inequality. According to Juanita Woodward, a financial inclusion specialist, Bangladesh was able to innovate in the area of financial inclusion partly because of the supportive role of the regulator: Bangladesh Bank realized that countries cannot prosper unless poor people can access financial services. Payments are (at the) centre of the plate; it is fundamental for economic development. Even more so if you need to travel (far) to make payment. In Bangladesh, Grameen Bank innovated by credit. Bangladesh Bank realized the “payments” piece was missing. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 5 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets According to Woodward, a key problem was that “banks are generally not interested in banking the poor.” For instance, in India, where the government was using banks to provide MFS, progress was slow. The central bank understood the inherent complexity of providing basic financial services to the masses. It required a single-minded focus on digital financial services, rather than these services being just one of the priorities for a bank. The central bank saw merit in allowing independent organizations designed for these purposes. With its inherently conservative and cautious stance, the central bank gave a licence to bKash as a specialized and independent entity but required it to operate as a bank subsidiary. That way, if anything went wrong, the central bank could intervene. Unlike other countries, such as Kenya and Philippines, where MFS took off through initiatives spearheaded by telcos, in Bangladesh, MFS were bank-led. The central bank saw the need to supervise and regulate the services. Two factors were of paramount importance: the safety of depositors’ funds and financial flows. From the consumer protection angle, knowing that this was common people’s money going into a system, the central bank needed to be confident that the money was safe. The second issue was related to monetary policy. The central bank needed to have a handle on how much money was flowing in and out of banks in order to have a clearer sense of the effectiveness of monetary instruments such as interest rates. A reckless decision could have a fundamental impact on millions of people. From the outset, the central bank was keen to allow experimentation and relied on market mechanisms to turn financial inclusion for the poor into a reality. Allah Malik Kazemi, senior advisor to the central bank governor, said, We felt that our task is to provide an enabling environment where ideas can be experimented, where successful ideas can flourish and other ideas will not do as well. We wanted to ensure that we do not over-regulate anything. We did not provide anything overly structured. That’s because we didn’t know what to regulate, the thing hadn’t taken off yet. So why should I make a 50-page manual laying out dos and don’ts? That would be self-defeating. So we provided them loose enabling guidelines. Under the new guidelines for MFS, the central bank gave out 28 licences to different parties, including bKash.14 Thus started a set of innovations in Bangladesh that would draw admiration from around the world, not only from institutions such as the Bill & Melinda Gates Foundation and the International Finance Corporation (both institutions subsequently made for-profit investments in the company and are substantial equity holders in bKash), but also from the World Bank and other central bankers. BKASH: THE BUSINESS MODEL Making full use of the licence given by the central bank along with his expertise gained from the Kenyan M-Pesa model, Quadir launched bKash, a purpose-built entity to provide MFS for the unbanked. The initial challenge was which technology platform to rely on—that is, how to come up with a simple interface that could be accessed by the cheapest (around US$15) handset. An easy way out would be to develop an application for smartphones. However, then the service would be limited to affluent customers, which would defeat the purpose of reaching the poor and unbanked. bKash was keen to avoid transactions based on Short Message Service (SMS) because this would make the process expensive and unsafe. With every SMS exchange, users would have amounts deducted from their virtual account. Moreover, SMS kept a log of all transactions, which could lead to privacy breaches such IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 91 92 Page 6 BKASH: Financial Technology Innovation for Emerging Markets 9B17M097 as a personal identification number (PIN) getting stolen. Finally, every handset had a different set of criteria for sending messages, making things more complex. Quadir instead decided on a technology called Unstructured Supplementary Service Data (USSD). This system offered a way for individuals to send and receive money using their cell phones, but without the disadvantages of SMS-based systems. Also, it was supported by all handsets, no matter how basic. The fact that USSD could be used irrespective of the mobile handset or operator15 gave Bangladesh a faster adoption of mobile money than other countries.16 On top of that, with a USSD system, security was higher. The system offered an opportunity to implement a two-factor authentication system. Since the mobile number for each person was unique, there was always a way to assign accountability regarding which account was being used. Also, providing a PIN to each account holder helped identify both the recipient and the sender. Thus, there was greater security in terms of payment or money transfer, since the secret PIN would prevent, for example, a thief from making a payment or transferring money in case of phone theft. bKash found Fundamo, a South African financial software company that had deployed a highly scalable financial platform in more than 20 countries. Fundamo was not only eager to work with bKash but also able to provide bKash with a platform that combined global security standards with a high degree of versatility to accommodate any operator or type of handset. Another challenge was how to get customers to use bKash. In the beginning, people did not understand or trust the service and did not perceive a need for it. bKash’s chief technology officer, Azmal Huda, commented, “As Steve Jobs said, customers don’t know what they need. Breaking that ice is very important.” He further noted that people originally would not believe that money could be transferred through the air; they had to be convinced that it really worked. To reach the millions of unbanked people across the country, bKash needed an outreach program. Initially, with the financial support of the Bill & Melinda Gates Foundation, bKash piloted an agent recruitment program with BRAC, which had microfinance borrowers all over the country. Shahid Ullah, a veteran staff member of the BRAC Microfinance Programme, explained the recruiting strategy, which resulted in the first 5,000 “brave individuals” as agents: “bKash recruited small and medium enterprise borrowers as they were entrepreneurs and had good marketing skills.”17 Customers would first go to an agent and give cash in exchange for electronic money in their mobile phone accounts. This was not unlike buying and selling airtime for mobile phones, something that was already commonplace in Bangladesh. As such, the first bKash agents were those small retailers that already sold airtime. Quadir shared how bKash followed a similar model of distribution as a consumer good company. He explained: “Essentially, we thought about mobile money as a consumer good that needs to be distributed. So after we concluded the pilot, we began to look for commercial distributors.”18 In subsequent years, bKash aggressively pursued distribution by linking up with seasoned distribution companies that were each handling hundreds of agents. The distributors were hungry for new sources of revenue. Quadir had a vision of achieving fast growth to ensure access points for cash and electronic money everywhere. By 2016, bKash’s agent network grew to nearly 160,000 and bKash agents became a common sight across the country. bKash ensured that opening an account was as simple as possible and cost free. It employed an aggressive pull strategy by flooding all media vehicles with awareness campaigns and “how to” promotions. To open IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 7 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets an account, a customer needed to visit any bKash agent in the area along with a national identification document, photographs, and mobile phone, and fill out a form. The process involved filling out the central bank Know Your Customer (KYC) form, verifying the information at multiple levels, and eventually, the authorized bKash employee approving the account. The process took around three days. As soon as the account activation process was complete, customers could easily top up their virtual account, withdraw money from it, and send or receive cash from another bKash account holder. According to Juanita Woodward, this process made bKash stand out: “bKash had another advantage: the sign up is very fast and easy, unlike banks. They also had a very transparent pricing. Banks, with their legacy systems driving up cost, cannot compete with all-digital systems like bKash.” This strategy, along with an engaged regulator and a robust distribution system available all the way to the grass-roots level, caused the adoption of bKash to skyrocket and made the word “bKash” synonymous with a verb, like “google.” The number of customers rose dramatically. By the end of 2013, bKash had 11 million accounts.19 This number grew to 26 million by the end of 2016, according to Quadir. The large footprint raised the issue of whether bKash was a bank-like institution. Quadir explained: Banks are designed for serving the big fish. We are designed for anchovies. Our job is to design a new kind of net, collect all the anchovies and give that money to the bank as a capital resource. A bank is designed to maximize that big pot of money […]. They can finance a hospital, a factory, universities. There is no conflict between us and the bank. We are making the idle money that has been under people’s mattresses effective, and putting it in the bank. In a very fundamental way we are complementing the banking service. Relying on small transactions, bKash indeed operated on a very different model. Its income came mostly from cash-out fees by customers (see Exhibit 2). Most of the service revenue—77 per cent—was shared with agents and distributors. Importantly, the bank-led model also implied that bKash paid telcos a fee for using the network; another 7 per cent of the service revenue was shared with the telco. bKash used the remaining 16 per cent of the revenue for operational activities such as marketing, technology, and recruiting agents. Overall, the margins seemed rather small, but volume generated viability (see Exhibit 3). SCALING THE MODEL: THE CHALLENGE The reliance on existing distribution channels, also used for such diverse activities as distributing matchboxes, distributing aid after hurricanes, or selling mobile airtime, had given bKash the ability to reach even the remotest parts of Bangladesh. However, moving physical cash around the country was becoming a challenge due to the liquidity imbalance (see Exhibit 4). As people were primarily sending cash from urban to rural areas, urban agents received cash from customers in the cities and rural agents were paying out cash to customers in the rural areas. There was a need for agents in the capital to deposit their cash in banks, and for agents in rural areas to obtain cash. However, because of existing regulations, depositing cash was only possible through the BRAC Bank, which had about 100 branches. This was not only inefficient but also posed security risks as agents had to travel far with cash. The need for extra protection raised costs, defeating the logic of a low-cost service. Moreover, counting excessive amounts of currency notes became a burden for BRAC Bank branches. The central bank recognized the challenges and adopted a change in regulation that allowed agents to deposit funds in any bank, not just a BRAC Bank. The new arrangement increased the protection of customer deposits, as the customers’ money was now kept in multiple banks, including large state-owned banks, IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 93 94 Page 8 BKASH: Financial Technology Innovation for Emerging Markets 9B17M097 instead of the BRAC Bank alone. Moreover, depositing in multiple banks reduced the risks to a customer’s deposit in case of a liquidity crisis in a single bank. Then there was the question of technology. While large multinational companies often focused their research and development expenses on technologies for improving customer convenience in rich countries, different needs in emerging markets called for different technologies. As bKash grew, it needed a new platform that could help it run smoothly on a much larger scale and cater to new, innovative products and services it could offer. Fundamo had, in the meantime, been bought by Visa, which brought a very different working relationship. Under the new setting, the partner had less incentive to serve customers like bKash. In developed countries, new platforms had taken many years to mature, but bKash could not wait; it was time for bKash to find a new technology partner. In 2016, bKash started working with technology giant Huawei in place of Fundamo. Separately, bKash thought about gearing up its application (app) development effort since cheap smartphones were becoming increasingly common. Quadir was looking for a human-centric designing firm that could help bKash come up with an app design allowing its customers to graduate out of USSD while receiving alternative channels. In 2016, bKash started working with San Francisco-based IDEO, which famously designed the first Apple mouse and many other innovative products. The growth of the labour-intensive garment industry in Bangladesh was another opportunity on which bKash wanted to capitalize. In a country where cheap labour was the main competitive advantage, companies typically paid salaries in cash, with each worker receiving a relatively small amount. A typical salary for an unskilled garment worker was US$68 per month in 2015.20 Most garment manufacturing companies closed their factories for a day to organize the logistics of cash salary payments to their thousands of workers. bKash’s technology platform could also be used to provide payroll payment solutions to garment manufacturing companies. The first trials suggested that it could be a good solution for the garment workers. Most were women who, until then, had been forced to cope with threats of extortion by their husbands, theft, or mugging. This broadening of services required bKash to deal with large companies, a hitherto unexplored territory for the company. Bangladesh, being one of the largest exporters of labour in the world, provided bKash with the opportunity to naturally extend its business by tapping into the growing pool of foreign remittances. Other players were already active in the market. To enter this existing market, in April 2016, bKash partnered with Western Union and MasterCard to help Bangladeshis transfer funds from anywhere in the world. REMAINING RELEVANT: THE FUTURE bKash had witnessed remarkable success in a short time span, becoming the lead player in a newly created market (see Exhibit 5). Profit margins were small, but bKash recovered all its losses by 2016. The question was, How big could bKash become? As bKash scaled up, became more visible, and increased its scope to adjacent services, it also attracted more attention. Some local banks thought that the disruptor was taking business away from them unfairly under a lighter compliance regime. Stories started to circulate that bKash was operating without regulation, overcharging customers, or even operating as a monopoly. Local newspapers occasionally reported on such allegations,21 and they were a source of concern for bKash. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 9 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets bKash’s view was that it was far from a monopoly or acting as a monopolist. Quadir pointed out that it did not enjoy any special concession from the state or the regulator. The company’s success was due to other actions, such as making prudent strategies and decisions, aligning its business goals with the regulator’s financial inclusion objectives, attracting good investors with global knowledge and governance, using appropriate technologies, building grassroots reach, and recruiting qualified resources. Furthermore, bKash had no capacity of blocking any of the other MFS providers to grow—a common feature of a monopolist. Even if some of the MFS licence holders were inactive, a few were stepping up their efforts to capture market share from bKash. In fact, the central bank hinted that it would be supportive of some consolidation as it hoped bKash would not dominate the MFS market. Kazemi, the central bank advisor, said, “We are keen to have a few major players in the market instead of bKash dominating the market.”22 Overall, competition seemed set to increase. Non-bank players were also looking to enter the market. For instance, Grameenphone, the largest telco, had its own MFS. It offered services such as utility bill payment and train ticketing services. While telcos had been lobbying the central bank for years for a licence to operate full-blown MFS, banks, keen on maintaining MFS as bank-led, opposed any such move. Telcos, as network providers, could be in a position to discriminate certain financial service providers if allowed to play in this market. Since most Bangladeshis still had basic handsets (as opposed to smartphones), the financial service provider needed USSD connectivity and MFS providers were directly dependent on the telco. By virtue of its ownership of the network infrastructure, a telco could potentially provide an unfair advantage to its own MFS services. However, Quadir thought the possibilities of regulatory shifts remained: A critical part of the business is that its character and boundary are defined by the regulator. If the regulator decides tomorrow that this is a business where it would allow telephone companies to be shareholders, then they will become my competitors along with being my essential network vendors. That would give birth to a serious conflict of interest and generate concerns on protecting the public interest. According to internal company documents, by late 2016, 92 per cent of bKash’s revenue still came from cash-out fees, and there was limited diversification into other types of MFS revenue streams. Interestingly, the central bank encouraged the company to offer a broader scope of MFS because of its goal of financial inclusion for the unbanked. Rahman, the former bank governor, said, “Now, MFS is mostly concerned with payments, but in the future there could be diversification of services. There should be more partnerships— say with e-commerce companies, or outsourcing companies.” It was inevitable that new technological innovations would emerge in Bangladesh, such as greater penetration of smartphones, or other innovative e-commerce and financial technology solutions that would transform the lives of the poor in the years to come. As such, bKash had to keep innovating and coming up with new services and partnerships. Quadir, who believed in specialization, was mindful of the regulatory demarcation. Instead of encroaching on others’ territory, he thought bKash was in a position to offer plenty of specialized new services: bKash should not be giving loans necessarily and have exposure to credit and related market risks. However, the customer data we possess can allow a bank to get very effective credit rating results, leading the bank to give loans to the right people; therefore, again we complement the bank’s business. Furthermore, we can be a channel through which the borrowed funds will be disbursed and loan repayment will be collected in a very efficient way at a reduced cost. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 95 96 Page 10 BKASH: Financial Technology Innovation for Emerging Markets 9B17M097 Being a first mover with an innovative model meant navigating new regulatory territory. The faster bKash developed, the more acute was the need to develop a regulatory ecosystem to match the risks. Quadir thought bKash should be regulated by the central bank, but it shouldn’t be regulated like a bank because it was not a bank. The current MFS guideline was created when the MFS industry was still in its infancy. Since then, the industry had grown to become an important part of the financial ecosystem in Bangladesh. Therefore, the question was how some regulatory areas needed to evolve to address the challenges identified in practice, and how to govern dedicated MFS players in an appropriate manner. The question of whether bKash was, or even should be, a bank, or a technology company that happened to handle money, became pertinent in other areas too. The remote nature of money transactions could lead to abuse of MFS by criminals. Quadir said, Say the law enforcement agency comes to us for details about a person and demands a copy of a customer’s KYC. Now, under the banking law, we cannot provide personal details; we will need a court order. So, the law enforcement agency tries to obtain a court order, but the court may say that this only happens under the banking law. But bKash is regulated under the company law, and thus the court may not issue a summon. You see, bKash intends to cooperate with all relevant agencies, and the agencies and bKash both require regulatory clarity. As in other countries, it would take time for regulations and government institutions to catch up to new, innovative practices and technologies that were fast changing lives for the better and offering opportunities to address new challenges. In Bangladesh, banks needed to be held accountable for their MFS operations. In the case of bKash, since it was a subsidiary of the BRAC Bank, a complex web of regulatory responsibilities was placed on the BRAC Bank. Bank officers had their performance milestones and incentives. These might not match with the accountability for an MFS with 26 million accounts and 160,000 agents. The central bank published a new draft regulatory guideline in July 2015 for “providing an orderly, enabling and competitive environment for utilizing this new window of opportunity of innovatively extending the outreach of financial services.”23 One of the aims was to broaden the playing field. The guideline discussed the granting of licences and the direct supervision of newly envisioned MFS entities engaging in financial services such as limited deposits, payments, and remittance services—similar to current MFS accounts. These new entities would not have exposure to credit risks; however, they must maintain a minimum paid-up capital as a cushion against operational risks. The guideline indicated that the central bank had in fact recognized the need for regulatory reform, endorsing the need for specialized digital financial platforms, similar to bKash, instead of offering MFS accounts through conventional banks. The latter would have increased the cost and defeated the whole purpose of financial inclusion through minimizing costs. While Quadir was excited about the new possibilities, regulatory uncertainty was a major concern. Was bKash sufficiently robust in its foundation to be able to maintain its inclusive model of serving not only the unbanked but also the under-banked, while remaining financially viable? Said Quadir, I emphasize that our regulators have allowed this innovation to take place. Bangladesh has seen some great innovations in the financial inclusion space due to its open-minded regulators. And, I recognize the spirit of finding comfort in ambiguity, which is an essential component of a social innovation that continues to evolve as does a society. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 11 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets EXHIBIT 1: MOBILE PHONE PENETRATION BY COUNTRY Country Penetration rate (%) Rwanda India Kenya Bangladesh Germany Philippines Brazil Chile 70.24 78.76 80.84 82.45 116.86 118.07 126.80 129.25 Source: Compiled by the authors using data from the World Bank, United Nations Development Programme, TheGlobalEconomy.com, Telecom Regulatory Authority of India, and Bangladesh Telecom Regulatory Commission. EXHIBIT 2: BKASH PRICING STRUCTURE Type of Transaction Fee Account opening Free Cash-in at agent Free Cash-out from agent 1.85% flat fee Person-to-person money transfer Tk5 (US$0.06, based on the exchange rate of December 2016) Bill and merchant payments (fee to customer) Free Merchant payments (cost to merchants) 1.30% to 1.80% Business-to-person disbursement (fee to business) 0.50% (negotiable) Source: International Finance Corporation, bKash: IFC Inclusive Business Case Study, 2016, accessed January 1, 2017, https://www.ifc.org/wps/wcm/connect/5c993b23-8dd1-40c5-88cf-eb64618e871b/bKash_FINAL_low+res.pdf?MOD=AJPERES. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 97 98 Page 12 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets EXHIBIT 3: BKASH FINANCIAL STATEMENTS INCOME STATEMENT (in US$ Million) 2010 2011 2012 2013 2014 2015 Revenue Cost of service Gross profit Other income Salary and other allowances Depreciation and amortization Operating expenses Other expenses – – – – – – −0.33 – 0.01 −0.00 0.01 0.76 – – −0.73 −0.75 4.66 −4.24 0.42 4.11 – – −2.37 −3.57 40.61 −36.10 4.51 6.06 −3.30 −0.47 −2.73 −7.79 73.88 −61.53 12.35 8.54 −5.26 −1.03 −3.86 −6.60 110.26 −90.02 20.24 13.04 −7.62 −1.32 −6.73 −12.73 Profit before tax Tax expenses Deferred −0.33 – −0.72 – −0.26 −1.41 – 0.40 −3.72 – 1.09 4.20 −1.77 – 4.88 −1.83 – Total comprehensive profit −0.33 −0.46 −1.02 −2.63 2.43 3.05 BALANCE SHEET (in US$ Million) (Not all items are listed) 2010 Assets Non-current assets Current assets Equity Current liabilities 2012 2013 2014 2015 Property, plant, and equipment 0.03 0.74 1.03 2.01 2.60 5.18 Intangible assets Total non-current assets 0.01 0.04 0.48 1.45 0.51 2.28 0.48 4.54 1.89 5.00 4.28 9.46 – 0.02 0.12 0.87 1.28 2.63 Total current assets Total assets 0.49 0.53 1.10 2.55 16.67 18.95 65.97 70.50 117.47 122.50 175.95 185.40 Share capital 0.05 0.04 0.36 0.49 0.49 0.49 – – 4.60 16.62 1.71 27.28 Retained earnings Total equity −0.32 0.41 −0.69 8.33 −1.76 3.20 −4.47 12.65 2.02 25.91 1.03 28.86 Deferred liabilities Accrued expenses Accounts payable 0.10 0.01 0.00 0.87 0.04 0.68 0.09 0.53 0.97 0.09 3.13 2.40 0.09 3.92 1.62 0.09 7.75 0.35 Current liabilities Total liabilities Total equity and liabilities – 0.01 – 1.62 15.66 15.71 57.76 57.85 96.47 96.53 155.70 156.55 0.53 2.55 18.95 70.50 122.50 185.40 Accounts receivable Share premium Liabilities Non-current liabilities 2011 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 13 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets EXHIBIT 3 (CONTINUED) CASH FLOW STATEMENT (in US$ Million) 2010 Net cash from operating activities Net cash from investing activities Net cash from financing activities Cash and cash equivalents at beginning of the year Change in cash and cash equivalents Cash and cash equivalents at end of the year Restricted cash and cash equivalents Cash and cash equivalents 2011 2012 −0.23 −0.72 −0.95 −0.04 −1.40 −0.64 0.75 2.78 16.11 – 0.45 0.47 0.47 – 0.47 0.66 1.11 – 1.11 1.00 2013 2014 2015 −1.06 −1.32 48.97 41.30 −8.21 44.04 57.70 −17.21 40.48 16.27 107.32 147.39 14.51 46.59 63.28 106.91 15.51 62.86 – – – −54.73 −93.10 −143.46 15.51 8.13 14.22 3.93 Source: Company documents. EXHIBIT 4: LIQUIDITY IMBALANCE Source: Created by the authors. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 99 Page 14 100 BKASH: Financial Technology Innovation for Emerging Markets 9B17M097 EXHIBIT 5: COMPETITIVE LANDSCAPE Market share (2015) bKash Rocket mCash UCash MYCash Others 58% 16.60% 8.50% 7.70% 3% 6.10% Source: Created by the authors based on Jaheed Parvez, Ariful Islam, and Josh Woodard, Mobile Financial Services in Bangladesh, April 2015, accessed July 15, 2016, www.cashlearning.org/downloads/mfsinbangladeshapril2015.pdf. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 15 9B17M097 BKASH: Financial Technology Innovation for Emerging Markets ENDNOTES “Bangladesh,” The World Factbook, Central Intelligence Agency, updated January 12, 2017, accessed January 15, 2017, https://www.cia.gov/library/publications/the-world-factbook/geos/bg.html. 2 “Bangladesh: Economy,” Asian Development Bank, accessed September 15, 2016, https://www.adb.org/countries/bangladesh/economy. 3 United Nations Development Progamme, Human Development Report 2016: Bangladesh, accessed September 15, 2016, http://hdr.undp.org/sites/all/themes/hdr_theme/country-notes/BGD.pdf. 4 “Bangladesh: Statistics,” UNICEF, updated December 18, 2013, September 16, 2016, www.unicef.org/infobycountry/bangladesh_bangladesh_statistics.html. 5 R. K. Byron and F. Rahman, “Women Workforce Growing Fast,” Daily Star, October 11, 2015, www.thedailystar.net/frontpage/women-workforce-growing-fast-155149. 6 “Top Ten Countries with Largest Muslim Population (2010),” Maps of World, accessed September 17, 2016, www.mapsofworld.com/world-top-ten/world-top-ten-countries-with-largest-muslim-populations-map.html. 7 “The Path through the Fields,” Economist, November 3, 2012, accessed September 17, 2016, www.economist.com/news/briefing/21565617-bangladesh-has-dysfunctional-politics-and-stunted-private-sector-yet-it-hasbeen-surprisingly. 8 “Rising Population Big Concern for Dhaka,” Daily Star, July 13, 2014, accessed September 18, 2016, www.thedailystar.net/rising-population-big-concern-for-dhaka-33081. 9 “Mobile Phone Subscribers, Bangladesh, July 2016,” Bangladesh Telecommunication Regulatory Commission, July 2016, accessed September 15, 2016, www.btrc.gov.bd/content/mobile-phone-subscribers-bangladesh-july-2016. 10 “The bKash Fundamo Partnership Story,” YouTube video, 3:37, posted by “Ashek Elahi,” July 21, 2012, accessed January 1, 2017, https://youtu.be/Z7Ln2LLhfCw. 11 Grameenphone, Welcome to a World Unbound: Annual Report 2016, 12, accessed June 4, 2017, https://cdn01.grameenphone.com/sites/default/files/investor_relations/annual_report/GP_Annual_Report_2016_Optimized.pdf. 12 Tk = BDT = Bangladeshi Taka; US$1.00 = Tk78.96 on December 31, 2016. 13 “BRAC at a Glance,” BRAC, accessed April 6, 2017, www.brac.net/partnership. 14 Authors’ interview with Allah Malik Kazemi, senior advisor to the central bank governor. 15 Michel Hanouch, “What Is USSD & Why Does It Matter for Mobile Financial Services?” CGAP, February 17, 2015, accessed April 5, 2017, www.cgap.org/blog/what-ussd-why-does-it-matter-mobile-financial-services. 16 “Innovation,” BRAC, accessed April 5, 2017, http://innovation.brac.net/fundchallenge/. 17 Shamsin Ahmed and Maria A. May, “Mobile Money in Bangladesh: Shifting from Scale to Innovation,” Impatient Optimists, Bill and Melinda Gates Foundation, June 18, 2014, accessed December 4, 2016, www.impatientoptimists.org/Posts/2014/06/Mobile-Money-in-Bangladesh-Shifting-from-Scale-to-Innovation. 18 McKinsey & Company, McKinsey on Payments 20 (September 2014): 4, accessed June 20, 2017, www.mckinsey.com/~/media/mckinsey/dotcom/client_service/financial%20services/latest%20thinking/payments/mop20_tran sforming_national_payments_systems.ashx. 19 Greg Chen, “BKash Bangladesh: What Explains Its Fast Start?” CGAP, August 4, 2014, accessed January 15, 2017, www.cgap.org/blog/bkash-bangladesh-what-explains-its-fast-start. 20 Matthew Cowgill, Malte Luebker, and Cuntao Xia, “Minimum Wages in the Global Garment Industry,” Research Note, International Labour Organization, December 2015, accessed June 20, 2017, www.ilo.org/wcmsp5/groups/public/---asia/---robangkok/documents/publication/wcms_436867.pdf. 21 Faruk Ahmed, “bKash under Scrutiny for its Controversial Roles, Daily Observer, September 8, 2015, accessed June 20, 201, www.observerbd.com/2015/09/08/109500.php. 22 Authors’ interview with Allah Malik Kazemi, senior advisor to the central bank governor. 23 Bangladesh Bank, Regulatory Guidelines for Mobile Financial Services (MFS) in Bangladesh (Revised Version, July 2015), 2015, accessed September 4, 2016, https://www.bb.org.bd/aboutus/draftguinotification/guideline/mfs_final_v9.pdf. 1 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 101 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 9B17E016 NETFLIX INC.: THE DISRUPTOR FACES DISRUPTION1 Chris F. Kemerer and Brian K. Dunn wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be transmitted, photocopied, digitized, or otherwise reproduced in any form or by any means without the permission of the copyright holder. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Business School, Western University, London, Ontario, Canada, N6G 0N1; (t) 519.661.3208; (e) cases@ivey.ca; www.iveycases.com. Copyright © 2017, Richard Ivey School of Business Foundation Version: 2017-11-27 THE TABLES ARE TURNED ON NETFLIX Reed Hastings, chief executive officer of Netflix Inc. (Netflix), was faced with another round of skeptical business press as he attempted to grow his firm in 2017. His 1990s start-up business plan, which had introduced the market to the convenience of home delivery of DVDs through the mail, had eviscerated the prior market leader, Blockbuster LLC (Blockbuster), forcing it to divest itself of thousands of brick-andmortar video rental stores before finally falling into bankruptcy. Hastings was so successful that Fortune magazine named him its 2010 “Businessperson of the Year.”2 This meteoric rise, however, seemed a distant memory as Netflix focused on its transition to the digital delivery of video content. Digital delivery required mastering new technologies and created the need to acquire or create popular content. Numerous competitors, including both established mainstream content producers and digital upstarts, were making it difficult for Netflix to recreate its earlier dominant success. The business press had become critical of Netflix’s slowing acquisition of subscribers and its accelerating levels of debt, which had reached US$3.4 billion3 by March 2017. Netflix was faced with the challenge of determining where and how quickly it would invest its capital in order to continue its growth. Though the company had had early success in creating new, exclusive content (e.g., television series House of Cards and Orange Is the New Black), this apparent invincibility appeared to be fading as more recent shows (e.g., The Get Down, Iron Fist) had been panned by the critics. As Netflix faced increasing competition to acquire exclusive content, some of which came from companies with a long history of success in content development, both the cost and the risk of failure seemed to be rising. In addition, former content suppliers that had previously licensed content to Netflix now viewed Netflix more warily, given its growth and apparent ambition to become more than just a delivery platform.4 Future deals would undoubtedly be more expensive, if agreement could even be reached at all. Should Netflix continue to try to be a content producer, competing with Hollywood’s industry leaders? Should it form a partnership with another media company or companies to align everyone’s incentives? Should it consider moving into other media content areas outside of traditional entertainment? Further, there remained the question of how to treat its legacy DVD-by-mail business, a former cash cow that had been the subject of controversy both in the market and internally at Netflix. Would the best choice be to sell the franchise and cash out? Netflix needed to decide where, when, and how to invest so as to ensure its future, lest it suffer the same fate as Blockbuster. 103 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 104 Netflix Inc.: The Disruptor Faces Disruption Page 2 9B17E016 BACKGROUND: VIDEO RENTAL STORES AND THE RISE OF BLOCKBUSTER5 To better understand Netflix’s situation, it is useful to understand the industry that existed before it entered the marketplace. Although Sony Corporation (Sony) developed its Betamax videocassette recorder (VCR) in 1976, for U.S. consumers the key development in the growth of home video entertainment was a 1984 U.S. Supreme Court 5–4 decision that found that the Betamax did not violate copyright laws.6 This was followed by Congress affirming the copyright law’s “first sale” doctrine and refusing to pass a law proposed by Hollywood studios that would have forbidden the renting or re-selling of movie videotapes. In short order, the focus of VCR users shifted from recording broadcast shows onto blank tapes to buying or renting prerecorded media.7 The video rental industry, in which VCR owners could rent tapes with video content (e.g., movies), was initially dominated by a variety of independent stores that had sprung up quickly in neighbourhoods everywhere. In 1985, David Cook opened the first Blockbuster store in Dallas, Texas. Blockbuster brought to the industry an aggressive strategy based on multiple stores and a central database that connected them. These data allowed Blockbuster to more accurately forecast demand for videos, and its emerging economies of scale kept its costs lower than that of its competition. By opening stores larger than those run by momand-pop operators, Blockbuster could offer customers more choices and more copies of popular movies. By 1993, Blockbuster had grown to over 3,400 stores, an accomplishment it achieved despite some hesitancy by the movie studios, which preferred the higher margins on individual consumer sales via outlets like Best Buy, rather than the smaller margins available from Blockbuster’s rentals. NETFLIX’S DISRUPTIVE INNOVATION8 Netflix Knocks Off Blockbuster Netflix lore noted that Hastings’s desire to found Netflix started with a $40 Blockbuster late fee that he incurred in 1997.9 As motivating as that might have been, the shift from bulky VHS videotapes to slimmer, more durable DVDs was also necessary to make a mail-order model feasible. One limitation for Netflix in 1997 was that DVD players were new and expensive, and therefore had limited U.S. household adoption. Blockbuster continued its growth of brick-and-mortar stores, and also began integrating DVDs into its inventory. In 1999, Netflix hired Ted Sarandos from Blockbuster competitor West Coast Video, and he focused on the content side of the business. Rapid growth in U.S. DVD adoption helped both firms—half of all U.S. households owned a DVD player by 2003 and over 80 per cent of households adopted this technology within the first nine years of its introduction. This adoption rate was even faster than that for VCRs, which had taken 13 years to reach the same level.10 Netflix’s pricing evolved from a traditional fee per rental, just as in video stores, to a monthly subscription model, at first limited to a fixed number of DVDs, then later evolving into a $20/month price for unlimited rentals. Significantly, Netflix had no late fees—customers could watch their rentals at their convenience, whereas late fees were Blockbuster’s primary revenue source. Netflix also touted the convenience of shopping by mail, eliminating both the trip to the store to rent a title and the trip to return it. However, Netflix found it challenging to provide an adequate number of high-demand titles to its customers.11 Its solution was to be an early developer and exploiter of database personalization, using a customer’s past rental history to suggest other titles they might like. Though keyed from past rental history, the recommendation system was also biased towards titles that Netflix actually had in stock, and therefore allowed Netflix to fulfill a greater percentage of orders. In addition, its relatively centralized inventory permitted it to stock a greater variety of titles, which Blockbuster, with its inventory scattered across IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 3 9B17E016 105 Netflix Inc.: The Disruptor Faces Disruption thousands of individual retail locations, could not easily support. Netflix developed good relationships with DVD suppliers, who saw it as another outlet for their product, and as a hedge against the growing nearmonopsonist Blockbuster. Netflix also worked closely on advanced integration with the U.S. Postal Service, becoming one of its biggest customers. In 2000, Netflix, with its 300,000 subscribers, was still not profitable. Meanwhile, DVD-player adoption had helped fuel Blockbuster’s growth to some 7,700 stores. Hastings, who earlier in his career had started but later sold the company Pure Software, had reported that in 2000 he engaged in negotiations with Blockbuster to sell it interest in Netflix for $50 million: “We offered to sell a 49-per-cent stake and take the name Blockbuster.com,” he said, but Blockbuster was not interested.12 Blockbuster would attempt to copy Netflix with an online service in 2004, hoping to leverage the availability of its brick-and-mortar stores with the mail-order option and keep the operations integrated. It was ultimately unsuccessful with its online offering, however, as were other contemporaneous imitators such as Wal-Mart. Netflix grew from 4.2 million subscribers in 2005 to 15 million in 2010 (see Exhibit 2). Although Blockbuster still had 47 million registered customers, its eventual demise seemed apparent. Netflix had more than doubled to 32 million subscribers by November of 2013—the month that Blockbuster announced it was going out of business. NETFLIX FACES DIGITAL DELIVERY What Is Digital Delivery? Information goods (i.e., any good that could be represented digitally) could be delivered over a communication network such as the Internet. Initially, early Internet content was limited to lower-volume content, such as text, and then later, images and music. Video content, with its relatively large file sizes, tended to be limited to physical media, such as film, videotape, and discs. However, with advances in both network speeds and compression algorithms to deliver content with greater fidelity using less data, other options emerged. Traditionally, the first step in digital delivery was via downloaded content, such as Apple iPod users downloading the complete file of any music they purchased from the iTunes online store. These files were stored on the user’s device, and could be played repeatedly, thus mimicking physical media, such as vinyl records, audio tapes, and music compact discs, which consumers were used to purchasing and owning. Streaming content, on the other hand, was content that was played on the consumer’s device but stored on a different device—typically a server operated by the content owner or licensee. Streaming required a network connection between the two devices in order to play the content. In this way, it more closely resembled listening to music on the radio, where the listener needed to have a connection to the content (similar to radio frequency reception), as opposed to owning local copies. Because video typically required much more data than music, streaming video required a faster network connection in order to provide a reasonable viewing experience. As a consequence, some content owners developed lower-resolution versions of their files in order to reduce their size, which then allowed them to stream the content. This also avoided the problem of allowing consumers to possess a digital copy of their content, which could potentially be shared or resold. Furthermore, the very large file sizes of full movies acted as a partial deterrent to digital piracy (as did law enforcement efforts, such as the 2012 closure of the popular website Megaupload).13 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 106 Netflix Inc.: The Disruptor Faces Disruption Page 4 9B17E016 Netflix initially thought the future of digital video delivery would be downloading, not streaming.14 It created a dedicated device (that later was sold and became the Roku box) for this purpose, but eventually developed a standalone streaming service, which was released as “Watch Instantly” in 2008.15 Early attempts at streaming were low quality, and in any event, most potential customers did not have the required Internet bandwidth. However, seeing the potential of streaming, in 2011 Netflix made what would be seen as an ill-fated, tooearly commitment to the digital delivery model when it announced a decision to split itself between its traditional DVD business (to be re-named “Qwikster”) and an uncoupled streaming business, which required separate customer logins. As it was to be operated as two separate companies with no bundled discounts for those seeking both DVD rentals and streaming availability, the new pricing model would mean a 60 per cent effective price hike for existing subscribers who wanted to continue both service types. Predictably, the announcement was met with a loss of 800,000 subscribers, and Netflix’s stock price fell 77 per cent.16 Although Netflix reversed the decision a month later, considerable damage had been done. This public relations disaster fed into a variety of contemporaneous pessimistic predictions about Netflix’s future. One noted that Netflix shares were in “free fall” after the third-quarter mishaps, and projected future losses.17 Another said “customers wasted little time in jumping ship.”18 Despite these misgivings, Netflix recovered and continued to grow after 2011, increasing its subscriber count from 23.5 million to over 93 million by the end of 2016, a compound annual growth rate of 32 per cent. REED HASTINGS’S DECISION POINTS Digital Delivery Challenges Regardless of the mode or degree of digital delivery adoption, digital delivery presented Netflix with significant challenges in terms of streaming content acquisition. This was not a problem in the DVD-bymail delivery model, as DVDs could be acquired from distributors and then rented. However, acquiring streaming content was both riskier and more expensive. First, licensing content was subject to the terms dictated by the content owner. Netflix learned this lesson early on, when its original streaming contract with the Starz network expired. Starz would not renew the contract on terms acceptable to Netflix, leaving Netflix with a hole in its available inventory.19 Second, the home entertainment market was a very crowded one, with 12 streaming competitors to Netflix that had each surpassed 1 million subscribers.20 One significant competitor was Hulu, founded by The National Broadcasting Company (NBC) and 21st Century Fox (Fox) in 2007, and later joined by the Disney–ABC Television Group and Time Warner Inc. It operated on a subscription model, but also offered advertisement-supported options. Fox streamed content 24 hours a day through Hulu, in some cases even bypassing its local affiliates.21 As of July 2017, Hulu had the greatest viewer engagement of all streaming services, measured at 2.9 hours per day (versus Netflix’s 2.2 hours per day),22 and its content included the shows Casual and The Handmaid’s Tale. Another streaming competitor was Amazon Prime Video. Amazon initially offered its Amazon Prime Video service as a bonus for subscribers to its fee-based Prime membership service. Doing so provided the video streaming service a large number of subscribers at launch. Further, the service benefited from Amazon’s financial power and multiple lines of business (e.g., Amazon Web Services). Amazon spent more than $100 million on content in the third quarter of 2014 alone, and its portfolio included the television series Transparent and The Man in the High Castle. In addition, its Fire TV platform grew with each device it sold (see Exhibit 3 for additional details). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 5 9B17E016 107 Netflix Inc.: The Disruptor Faces Disruption Traditional web giants that competed with Netflix included both Google LLC/YouTube LLC (YouTube), and Facebook Inc. (Facebook). While 75 per cent of U.S. Wi-Fi households had a Netflix subscription, YouTube had quickly grown into second place in 2017 with 53 per cent penetration, and reached more of the coveted 18–34-year-old demographic than any cable network.23 Its content included the series Escape the Night. Facebook, late to the sector, had also announced plans to offer new proprietary content, and tried to make up for its late start by offering Hollywood studios better terms for their content, including sharing advertising revenue and data on viewership, the latter of which was an important asset that had distinguished the success of digital platforms such as Netflix.24 Of course, Netflix also competed with traditional home entertainment outlets, including Home Box Office (HBO) and Sling TV, Dish’s live TV service. HBO had an extensive library of shows to watch on demand via cable, and it had an app (HBO Go). It had a large number of subscribers and a strong, extended track record of developing very popular original content, such as television series The Sopranos and Game of Thrones. Sling TV, although it had fewer subscribers than Netflix in 2017, had viewers who were more engaged, averaging 47 viewing hours per month, versus Netflix’s 28 hours per month.25 Many of these competitors fell into the category of “coopetition” to Netflix, a term that suggests cooperation between competing companies. Netflix licensed content from some of the same companies that formed Hulu, but at the same time provided a competing service. Further, it relied on companies like Sony, which had its own streaming service, to carry the Netflix app on Sony’s PlayStation videogame consoles. Lastly, Netflix relied on the availability of bandwidth from cable companies to provide its services to customers; many of these same cable companies (e.g., Comcast, Time Warner Inc.) were also content producers with an interest in streaming services, and with which Netflix competed. Major news outlets, such as The New York Times and The Wall Street Journal, reported that Netflix was seen as a rival to firms from which it had previously licensed content, and that therefore deals were being cut back.26 The Wall Street Journal wrote, “[Netflix] must keep things cordial with Hollywood’s traditional studios . . . [and] prevent them from turning to its main competitors, Amazon and Hulu.” 27 It only had the one source of revenue, but in its new market, it was competing with firms that had much more diverse portfolios and revenue streams. For example, if Netflix wanted to acquire some popular new show, it most likely would have to borrow money from the bank; if Amazon wanted to acquire it, it could borrow money from the Amazon Web Services division (of which, somewhat ironically, Netflix was a customer).28 Apple Inc., another financially powerful competitor with $260 billion in cash in 2017,29 was also investing in content creation, most recently poaching two senior executives from Sony TV.30 As an alternative to licensing third-party content, in 2013 Netflix ventured into developing its own original content. It started out with a “home run” when it acquired House of Cards, starring Kevin Spacey, which went on to win three Emmys.31 Given its lack of a track record at the time, Netflix needed to commit to buying the entire season of the show without the option of declining after a pilot episode, as traditional media outlets usually required. It also did well with Orange Is the New Black, a popular series based on a book, as well as the 1980sstyle adventure series Stranger Things. However, and to illustrate the risks, a more recent effort, Crouching Tiger, Hidden Dragon: Sword of Destiny, was widely regarded as a flop, and Netflix found itself increasingly cancelling original series that did not produce sufficient returns, such as Sense8 and The Get Down.32 In addition, there were significant sums at risk in these ventures. Netflix budgeted $6 billion in 2017 for content—more than twice its total revenue. This level of spending resulted in $3.4 billion in long-term debt.33 Critics said that its debt was such that it must continue to add more subscribers just to feed the IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 108 Inc.: The Disruptor Faces Disruption PageNetflix 6 9B17E016 business model, or everything could come crashing down.34 Whereas Netflix’s streaming content obligations were approximately equal to its revenue in 2011, by 2017 a significant gap had emerged.35 In-House Competition; the Challenge of Incumbency One consistent challenge confronted by all successful organizations facing significant technological change was the allure of their existing incumbent line of business. This took several forms, including financial investment in the existing capital infrastructure, organizational investment in skills and routines, and the risk associated with moving away from a consistent, well-understood source of cash flow. Author Joshua Gans36 termed this challenge “supply side disruption,” about which, drawing on the academic research of Rebecca Henderson,37 he said, Demand side disruption involves an established firm missing a certain kind of technological opportunity, but supply side disruption arises when an established firm becomes incapable of taking advantage of a technological opportunity. Specifically, when a new competing innovation involves a distinct set of architectural knowledge, established firms that have focus on being “best in breed” in terms of component innovation may find it difficult to integrate and build on the new architecture.38 At Netflix, those responsible for the legacy business had successfully argued for its re-investment. The finely tuned industrial-engineered manual process of opening and stuffing the trademark red mailing envelopes was replaced by special-purpose robots that could process 3,400 envelopes per hour versus the 680 per hour processed the prior, labour-intensive way.39 This enabled Netflix to reduce the number of distribution centres from 50 to 33. These efficiencies resulted in cutting 75 per cent of its labour costs while retaining a high degree of customer service—92 per cent of its customers received next-day delivery service. Competitors also continued to see promise in the DVD format, as Redbox, with its trademark automated kiosk vending machines, grew from about 100 locations in 2004 to 34,000 by 2012.40 One argument for continued investment in the legacy business was that, as recently as August 2015, fewer than half of all U.S. homes had high-speed broadband service, and it could be expected that the currently un-served lower-population-density areas might be without this service for the foreseeable future. This lack of connectivity contributed to the continued success of brick-and-mortar video rental stores in these areas.41 This primarily rural phenomenon in the United States could presage markets in international locations with limited broadband that might also continue to support the DVD format.42 And, when it temporarily split off its DVD business in 2011, Netflix lost a number of its own senior managers.43 On the other hand, Netflix did not face the sort of business cannibalization challenges often faced by traditional media businesses with the advent of a disruptive technology. Netflix, for example, did not face the loss of advertising revenue as a result of a shift to streaming delivery, a potentially significant problem for some of its competitors.44 Further, despite its increased internal efficiencies, its traditional DVD-based business faced other costs, such as its dependence on the U.S. Postal Service, which had recently resulted in a $100-million increase in mailing rates.45 Uncertain Future Public Policies—“Net Neutrality” and Its Variants In 2003, Columbia University media law professor Tim Wu coined the term “net neutrality” to describe a government regulatory principle that Internet service providers (ISPs) should enable access to all content and applications regardless of the source, without favouring or blocking particular products or websites. It gained IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 7 9B17E016 109 Netflix Inc.: The Disruptor Faces Disruption in visibility as Internet traffic became more and more concentrated over time, with Wired magazine reporting in 2014 that half of all Internet traffic originated from just 30 organizations, including Google LLC, Facebook, and Netflix.46 The policy required that ISPs not discriminate (e.g., “throttling back” throughput speeds) or charge differentially by user, content, website, platform, application, type of attached equipment, or mode of communication. This controversial policy tended to find favour with Internet firms, especially those that generated a lot of traffic, like Netflix. It tended to be opposed by ISPs, such as Comcast and Verizon, which argued that by limiting their decision rights, the effect of the regulation would be to reduce investment in broadband network services and, therefore, to stifle innovation. In 2015, the Democratic Party administration in the United States enacted the rules into law, effectively making broadband firms “common carriers,” like the telephone network. In 2017, the Republican Party administration scaled back the regulation.47 Netflix, similar to other Internet firms, originally lobbied for net neutrality, as streaming video required significant amounts of bandwidth, and limiting ISPs’ ability to differentially charge for this service effectively subsidized the Internet firms’ activities. By 2017, at least publicly, Hastings argued that it was no longer especially important.48 However, the uncertainty about the regulation and its future added risk to any decision-making in the digital delivery market. In addition, as the telecommunications sector of the economy grew and prospered, it became an attractive area for lawmakers to target for new taxes. In 2017, Canadian legislators proposed, but did not pass, a 5 per cent tax on broadband charges, dubbed by the press the “Netflix tax.”49 These monies would have been redistributed to traditional communications firms, like newspapers, that were adversely affected by the rise of the Internet. Traditional media firms lost revenue due to the Internet—particularly classified advertising, but also subscription revenue—as some of their customers shifted use to their Internet equivalents. If broadband revenue would be ultimately subject to additional taxes, this could decrease demand for it and thereby hamper the growth of Netflix-like streaming services. HASTINGS’S DECISIONS Hastings faced a significant number of business decisions, and, despite Netflix’s successes, he was selfcritical, and was often quoted as admitting to having made a number of, at least in hindsight, poor decisions in relation to the technology and home entertainment industries. These included online advertisements on the website, starting an independent film production company, and buying DVDs out of the Sundance Film Festival (which turned out to offer limited profitability), in addition to the 2011 Qwikster gaffe.50 In addition, he had initially believed that the future would be digital downloading rather than digital streaming, and in 2009 Hastings said that there would still be DVDs in 2030, a prediction that looked increasingly unlikely.51 However, despite some of these missteps, Netflix was positioned to compete with some of the biggest firms in both entertainment and consumer technology. Hastings himself noted that, historically, firms facing disruption, such as AOL Inc. and the Eastman Kodak Company, failed because they were too cautious.52 But which non-cautious path should Netflix take? Should it continue to create its own content, or revert back to being a neutral platform? Should it look to form exclusive contracts with content providers and/or hardware manufacturers to “lock in” its customers? Did it need to acquire competitors and/or upstream or downstream partners? What was the appropriate role for the legacy DVD division—should it continue to be operated as a cash cow for as long as it was economically viable, or should it be sold off so as to reinvest the funds in current operations? Or, was it finally time, as suggested by analysts who argued the firm was over-valued, to sell the company and cash out while it had a high market capitalization? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 110 Netflix Page 8 Inc.: The Disruptor Faces Disruption 9B17E016 EXHIBIT 1: CHRISTENSEN’S DISRUPTIVE INNOVATION CONCEPT Harvard Business School’s Clayton Christensen has authored a number of books and articles defining and illustrating what he terms “disruptive innovations,” which are new products or services that re-make whole industries, generally at the expense of the incumbent firm. This occurs because the incumbent firm does not recognize the threat posed by the innovation due to two main reasons. First, the disruptive innovation possesses a different package of performance attributes, not all of which are valued by existing customers; therefore, the incumbent’s current customers do not initially find it attractive. Second, the performance attributes of the innovation that existing customers do value, which are often weak in the innovation, improve at such a rapid rate that the new entrant can later move up and capture the incumbent’s existing customers. Disruptive innovators typically either enter at the low end of the market, or create entirely new markets. Both of these scenarios are characterized as markets not well served by current solutions. Incumbents, therefore, have a tendency not to take serious notice of the innovation, because either they are not losing current customers to it, or, when they are, they are customers who buy low-margin products. Losing such customers has the paradoxical effect of increasing the incumbent’s average margin, thus improving its bottom line. As such, the financial signals that incumbents receive create Christensen’s “dilemma,” whereby incumbent firms often do not recognize the threat. In addition, incumbents often have difficulty adopting disruptive innovations themselves because, as these innovations initially serve the existing customers poorly, to adopt them could mean the loss of existing revenues through cannibalization. Conversely, new entrants have no current customers to lose, removing any hesitation to invest in the innovation. Source: Clayton Christensen, The Innovator’s Dilemma (New York, NY: Harper Business, 2001). EXHIBIT 2: NETFLIX SUBSCRIBER GROWTH (MILLIONS) OVER TIME 100 90 80 70 60 50 40 30 20 10 0 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Source: “Netflix Subscribers from 2001 to 2011 (in 1,000),” Statista, accessed November 12, 2017, https://www.statista.com/statistics/272551/subscribers-of-netflix-since-2001/; Jeff Dunn, “Here’s How Huge Netflix Has Gotten in the Past Decade,” Business Insider, January 19, 2017, accessed July 2017, www.businessinsider.com/netflix-subscriberschart-2017-1. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Netflix Inc.: The Disruptor Faces Disruption Page 9 111 9B17E016 EXHIBIT 3: NETFLIX AND ITS COMPETITORS, 2017 Founded Netflix Aug. 1997 Subscription Price Revenue Sources Content Subscription Content Amount1 Ownership Subscribers $8.00/month Subscription On-demand TV (past seasons), on-demand movies, exclusive content 36,000 hours (April 2016);2 4,235 movies, 971 TV shows (June 2017) Netflix On-demand TV, ondemand movies, exclusive content, video-on-demand (VOD) content (additional fee) 99 million worldwide (April 2017),3 50.9 million in the United States (March 2017)4 36,000 hours (April 2016);5 7,430 movies, 513 TV shows (June 2017) Amazon 80 million in the United States (April 2017)6 Amazon Prime Video Sep. 2006 $79.00/year Subscription, purchase, rental, ad-supported (limited content) Apple TV Apr. 2003 (iTunes) n/a Purchase, rental VOD content n/a Apple n/a CBS All Access Oct. 2014 $5.99/month Subscription 70 TV shows (June 2017) CBS 1.5 million (February 2017)7 DirecTV Now Nov. 2016 $35.00/month (100+ channels) Live and on-demand CBS programming, some original content, classic CBS content Subscription Live TV channels n/a AT&T 400,000 (March 2017)8 HBO Now Apr. 2015 $14.99/month Subscription HBO content, including current season 681 movies, 90 TV shows (June 2017) Time Warner 2 million (February 2017)9 Subscription (with or without ads) On-demand network programming (except current season of CBS programming) 1,108 movies, 1,132 TV shows (June 2017) Joint venture of Disney, Fox, Comcast/NBC Universal, and Time Warner 12 million (November 2016)10 n/a Sony/Columbia 400,000 (March 2017)11 331 movies, 34 TV shows (June 2017) CBS 1.5 million (February 2017)12 n/a Dish Network 1.3 million (April 2017)13 Hulu Oct. 2007 $7.99/month PlayStation Vue Mar. 2015 $30.00/month (45+ channels) Showtime Jun. 2015 (streaming service) Sling TV Jan. 2015 Subscription, purchase, rental $10.99/month Subscription $20.00/month (20+ channels) Subscription Live TV channels, VOD Showtime content, including current season Live TV channels (limited major networks) IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 112 Netflix Inc.: The Disruptor Faces Disruption Page 10 9B17E016 EXHIBIT 3 (CONTINUED) Note: n/a = not available 1 “Movie/TV Show Counts,” JustWatch, accessed July 1, 2017, www.justwatch.com. 2 Mark Fahey, “Netflix vs Amazon: Estimating the Better Deal,” CNBC, April 22, 2016, accessed July 2017, www.cnbc.com/2016/04/22/netflix-vs-amazon-estimating-the-betterdeal.html. 3 Seth Fiegerman, “Netflix Nears 100 Million Subscribers,” CNN, April 17, 2017, accessed July 2017, http://money.cnn.com/2017/04/17/technology/netflixsubscribers/index.html. 4 “Number of Netflix Streaming Subscribers in the United States from 3rd Quarter 2011 to 2nd Quarter 2017 (in Millions),” Statista, accessed July 2017, https://www.statista.com/statistics/250937/quarterly-number-of-netflix-streaming-subscribers-in-the-us. 5 Mark Fahey, “Netflix vs Amazon: Estimating the Better Deal,” CNBC, April 22, 2016, accessed July 2017, www.cnbc.com/2016/04/22/netflix-vs-amazon-estimating-the-betterdeal.html. 6 Stephanie Pandolph and Jonathan Camhi, “Amazon Prime Subscribers Hit 80 Million,” Business Insider, April 27, 2017, accessed July 2017, www.businessinsider.com/amazon-prime-subscribers-hit-80-million-2017-4. The figure is for Amazon Prime subscribers, a service that includes Amazon Prime Video. 7 Todd Spangler, “Showtime Hits 1.5 Million Streaming Subscribers, CBS All Access Nears Same Mark,” Variety, February 13, 2017, accessed July 2017, http://variety.com/2017/digital/news/showtime-cbs-all-access-streaming-1-5-million-subscribers-1201986844. 8 Artie Beaty, “Discovery CEO: DIRECTV Now & Vue Have 400,000 Subscribers,” Streaming Observer, March 29, 2017, accessed July 2017, https://www.streamingobserver.com/discovery-ceo-directv-now-vue-400000-subscribers. 9 Cynthia Littleton, “HBO Now Grows to More Than 2 Million Domestic Subscribers,” Variety, February 8, 2017, accessed July 2017, http://variety.com/2017/tv/news/hbo-now2-million-subscribers-time-warner-1201981371. 10 Craig Smith, “18 Interesting Hulu Statistics (July 2017),” DMR, July 28, 2017, accessed July 2017, http://expandedramblings.com/index.php/hulu-statistics. 11 Artie Beaty, op. cit. 12 Todd Spangler, op. cit. 13 Daniel Frankel, “Sling TV Ended Q1 with 1.3M Subscribers, Dish Is Reportedly Telling Wall Street,” FierceCable, April 28, 2017, accessed July 2017, www.fiercecable.com/online-video/sling-tv-ended-q1-1-3m-subs-dish-reportedly-telling-wall-street. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Page 11 9B17E016 113 Netflix Inc.: The Disruptor Faces Disruption ENDNOTES This case has been written on the basis of published sources only. Consequently, the interpretation and perspective presented in this case are not necessarily those of Netflix Inc. or any of its employees. 2 Patricia Sellers, “The Man Who Became Fortune’s Businessperson of the Year,” Fortune, November 19, 2010, accessed September 27, 2017, http://fortune.com/2010/11/19/the-man-who-became-fortunes-businessperson-of-the-year. 3 All currency amounts are in USD unless otherwise specified. 4 Joe Flint and Shalini Ramachandran, “Netflix: The Monster That’s Eating Hollywood,” The Wall Street Journal, March 24, 2017, accessed July 2017, https://www.wsj.com/articles/netflix-the-monster-thats-eating-hollywood-1490370059. 5 Ken Auletta, “Outside the Box,” The New Yorker, February 3, 2014, accessed July 2017, https://www.newyorker.com/magazine/2014/02/03/outside-the-box-2. 6 Eduardo Porter, “Copyright Ruling Rings with Echo of Betamax,” The New York Times, March 26, 2013, accessed July 2017, www.nytimes.com/2013/03/27/business/in-a-copyright-ruling-the-lingering-legacy-of-the-betamax.html. 7 Richard Roehl and Hal R. Varian, “Circulating Libraries and Video Rental Stores,” First Monday 6, no. 5 (2001); Stan Liebowitz, Re-Thinking the Network Economy (New York: AMACOM, 2002), 194. 8 See Exhibit 1. 9 “Netflix: How a $40 Late Fee Revolutionized Television,” YouTube video, 12:52, posted by “Business Casual,” accessed July 2017, https://www.youtube.com/watch?v=BrpEHssa_gQ. 10 “VCR & DVD Player Household Penetration (1980-2007),” accessed July 2017, https://www.flickr.com/photos/42182583@N00/2299078244. 11 Emily Steel, “Netflix Refines Its DVD Business, Even as Streaming Unit Booms,” The New York Times, July 27, 2015, accessed July 2017, https://www.nytimes.com/2015/07/27/business/while-its-streaming-service-booms-netflix-streamlinesold-business.html. 12 Ken Auletta, op. cit. 13 Michael D. Smith and Rahul Telang, Streaming, Sharing, Stealing (Cambridge, MA: The MIT Press, 2016). 14 Joe Nocera, “Can Netflix Survive in the New World It Created?,” The New York Times Magazine, June 15, 2016, accessed July 2017, https://www.nytimes.com/2016/06/19/magazine/can-netflix-survive-in-the-new-world-it-created.html. 15 “Netflix: One Eye on the Present and Another on the Future,” Knowledge@Wharton, October 28, 2009, accessed July 2017, http://knowledge.wharton.upenn.edu/article/netflix-one-eye-on-the-present-and-another-on-the-future. 16 Greg Sandoval, “Netflix’s Lost Year: The Inside Story of the Price-Hike Train Wreck,” CNET, July 11, 2012, accessed July 2017, https://www.cnet.com/news/netflixs-lost-year-the-inside-story-of-the-price-hike-train-wreck. 17 Larry Dignan, “Netflix’s Big Collapse: Do You Believe in Streaming, International Expansion?,” ZDNet, October 25, 2011, accessed July 2017, www.zdnet.com/article/netflixs-big-collapse-do-you-believe-in-streaming-international-expansion. 18 “Netflix’s Tough Transition to Online Movie Streaming,” digitalsurgeons, October 3, 2011, accessed July 2017, https://www.digitalsurgeons.com/thoughts/strategy/netflixs-tough-transition-to-online-movie-streaming. 19 Ibid. 20 Joe Flint and Deepa Seetharaman, “Facebook Is Going Hollywood, Seeking Scripted TV Programming,” The Wall Street Journal, June 25, 2017, accessed July 2017, https://www.wsj.com/articles/facebook-is-going-hollywood-seeking-scripted-tvprogramming-1498388401. 21 Shalini Ramachandran, “Fox Tries to Gain Leverage Over Affiliates on Live Streaming,” The Wall Street Journal, June 12, 2017, accessed July 2017, https://www.wsj.com/articles/fox-tries-to-gain-leverage-over-affiliates-on-live-streaming1497261600. 22 Sarah Perez, “U.S. Cord Cutters Watch More Netflix than Amazon Video, Hulu and YouTube Combined,” TechCrunch, July 5, 2017, accessed July 2017, https://techcrunch.com/2017/07/05/u-s-cord-cutters-watch-more-netflix-than-amazon-videohulu-and-youtube-combined. 23 Sarah Perez, “Netflix Reaches 75% of US Streaming Service Viewers, but YouTube Is Catching Up,” TechCrunch, April 10, 2017, accessed July 2017, https://techcrunch.com/2017/04/10/netflix-reaches-75-of-u-s-streaming-service-viewers-butyoutube-is-catching-up. 24 M. Smith and R. Telang, op. cit. 25 Sarah Perez, “Netflix Reaches 75% of US Streaming Service Viewers, but YouTube Is Catching Up,” op. cit. 26 Joe Nocera, op. cit. 27 Joe Flint and Shalini Ramachandran, op. cit. 28 Jay Greene and Laura Stevens, “Wal-Mart to Vendors: Get Off Amazon Cloud,” The Wall Street Journal, June 21, 2017, accessed July 2017, https://www.wsj.com/articles/wal-mart-to-vendors-get-off-amazons-cloud-1498037402 29 Steve Vassallo, “It’s Time for Apple to Go Hollywood,” The Wall Street Journal, June 20, 2017, accessed July 2017, https://www.wsj.com/articles/its-time-for-apple-to-go-hollywood-1497998797. 30 Tripp Mickle and Joe Flint, “Apple Poaches Sony TV Executives to Lead Push into Original Content,” The Wall Street Journal, June 16, 2017, accessed July 2017, https://www.wsj.com/articles/apple-poaches-sony-tv-executives-to-lead-pushinto-original-content-1497616203. 31 Peter Cohan, “Netflix’s Reed Hastings Is the Master of Adaptation,” Forbes, October 22, 2013, accessed July 2017, https://www.forbes.com/sites/petercohan/2013/10/22/netflixs-reed-hastings-is-the-master-of-adaptation. 32 David Trainer and Kyle Guske II, “Netflix’s Stock Is Worth Only About One-Third of Where It Trades Today,” MarketWatch, June 18, 2017, accessed July 2017, www.marketwatch.com/story/netflixs-stock-is-worth-only-about-one-third-of-where-ittrades-today-2017-06-15. 1 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 114 Netflix Inc.: The Disruptor Faces Disruption Page 12 9B17E016 Trey Williams, “Netflix’s Global Blitz Should Lift Subscriptions 20% This Year,” The Wall Street Journal, March 6, 2017, accessed July 2017, www.marketwatch.com/story/netflixs-global-blitz-should-lift-subscriptions-20-this-year-2017-03-06. 34 Joe Nocera, op. cit. 35 David Trainer and Kyle Guske II, op. cit. 36 Joshua Gans, The Disruption Dilemma (Cambridge, MA: MIT Press, 2016). 37 Rebecca M. Henderson and Kim B. Clark, “Architectural Innovation: The Reconfiguration of Existing Product Technologies and the Failure of Established Firms,” Administrative Science Quarterly 35, no. 1 (1990): 9–30. 38 Joshua Gans, op. cit. 39 Emily Steel, op. cit. 40 Kirsten Acuna, “8 Ways Online Streaming Killed the Video Store”, Business Insider, February 5, 2013, accessed July 2017, www.businessinsider.com/online-streaming-is-making-the-dvd-obsolete-2013-1. 41 Mark Perry, “‘The ‘Netflix Effect’: An Excellent Example of ‘Creative Destruction,’” AEI, August 6, 2015, accessed July 2017, www.aei.org/publication/the-netflix-effect-is-an-excellent-example-of-creative-destruction; E. G. Smith, “Revenge of the Video Store,” The Wall Street Journal, November 26, 2016, accessed July 2017. 42 Emily Steel, op. cit. 43 Greg Sandoval, op. cit. 44 Ken Doctor, “The Newsonomics of Netflix and the Digital Shift,” NiemanLab, July 28, 2011, accessed July 2017, www.niemanlab.org/2011/07/the-newsonomics-of-netflix-and-the-digital-shift. 45 Peter Cohan, op. cit. 46 Robert McMillan, “What Everyone Gets Wrong in the Debate Over Net Neutrality,” Wired, June 23, 2014, accessed July 2017, https://www.wired.com/2014/06/net_neutrality_missing; the article argues that the Internet already was not “neutral,” with ISPs already providing specific resources to handle high-traffic sites. 47 John McKinnon, “FCC Votes to Scale Down Net Neutrality Rules,” The Wall Street Journal, May 18, 2017, accessed July 2017, https://www.wsj.com/articles/fcc-votes-to-scale-down-net-neutrality-rules-1495124194. 48 Erin Carson, “Net Neutrality May Have Lost Netflix as an Ally,” CNET, May 31, 2017, accessed July 2017, https://www.cnet.com/news/net-neutrality-netflix-reed-hastings. 49 Daniel Leblanc, “Trudeau Rejects New Internet Tax to Help Fund Media Sector,” The Globe and Mail, June 15, 2017, accessed July 2017, https://beta.theglobeandmail.com/news/politics/liberal-ndp-mps-call-for-new-tax-on-internet-providersto-help-media-companies/article35315234. 50 James B. Stewart, “Netflix Looks Back on Its Near-Death Spiral,” The New York Times, April 26, 2013, accessed July 2017, www.nytimes.com/2013/04/27/business/netflix-looks-back-on-its-near-death-spiral.html. 51 Knowledge@Wharton, op. cit. 52 Ken Auletta, op cit. 33 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems “How is the AI project going, Kam?” asks Jessica with a smile on MyLab MIS Using Your Knowledge Questions 3-1, 3-2, 3-3 her face, hoping for good news. Kamala Patel, eHermes’ automation subject matter expert (SME), has asked Jessica Ramma, CEO; Victor Vazquez, COO; and Tess Visser, VP of Sales, to come down to the large warehouse to see how the AI project is coming along. Jessica asked Kamala to see if she could feed the company’s data into an AI and improve operational efficiency. If the project is successful, it could save the company a lot of money. “It’s going OK. Well, actually, it’s going much more slowly than we thought,” Kamala says, shaking her head slightly and pointing to a map of the city on a large monitor showing multicolored routes, destinations, and mobile storefronts. “Putting it all together is turning out to be a lot more work than we initially thought. My expertise is self-driving vehicles, not AI. I think I’ve gotten in over my head. We really need an AI expert to make this work.” 115 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 116 CHAPTER 3 Hardware, Software, and Mobile Systems “We don’t have enough data to train the AI.” “When we talked about this a couple of months ago, you said it could work. What’s changed?” Jessica asks with a disappointed tone in her voice. “Nothing has changed. It will still work. It will save us a lot of money, too. It could cut our costs by at least 20 percent and double our operational efficiency. But, to get to that point, it will take a lot more time and money than we initially thought,” Kamala says, nodding with a hint of encouragement. Tess spins around and points to one of the screens. “You see, right now we load up each mobile storefront with similar types of items that we think a person might buy. Say a customer wants to buy baby clothes. Well, they might be interested in buying other baby-related items. So, we send a storefront full of baby items to that location, and the customer usually ends up buying more than just baby clothes.” “And then we get the ice-cream-truck effect when people hear our eHermes chimes being played in the neighborhood,” Kamala adds. “Multiple neighbors come out and buy items from that same truck. They also bring out their own items for sale. The time spent at each stop varies. There’s a lot of time spent selling items and logging new items that customers want to sell. It’s difficult to predict how long a storefront will stay at a given location.” Jessica looks slightly confused. “But we’ve seen this for the past couple of years. As people became more aware of eHermes, the duration of stops has increased. Why would this affect the AI project?” “For a couple of reasons. First, we don’t have enough data to train the AI. It takes a lot of data to train an AI to come up with optimal solutions. The variability in the way our business operates doesn’t help. We’re growing quickly, and the data from a few years ago isn’t good training data. Second, I’ve been leaning on a friend of mine from graduate school to help me figure this all out. It’s extraordinarily complex, and I’m not an AI expert. We’re trying to optimize more than just a supply chain. We’re really a company that combines shipping, online retailing, and physical retailing. We have to optimize routes, stops, probable sales, customer buying habits, inventory management—” Source: Haiyin Wang/Alamy Stock Photo Study QUESTIONS Q3- 1 What do business professionals need to know about computer hardware? Q3- 2 How can new hardware affect competitive strategies? Q3- 3 What do business professionals need to know about software? Q3- 4 Is open source software a viable alternative? Q3 -5 What are the differences between native and Web applications? Q3 -6 Why are mobile systems increasingly important? Q3 -7 What are the challenges of personal mobile devices at work? Q3 -8 2029? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 117 Victor interrupts Kamala with a look of concern on his face. “What would it take to make this work? How much would it cost?” “At this point, probably more than we’ve got. We’d have to hire at least two AI experts and a team of mid-level people. That won’t be cheap. We’d also need to spend more on infrastructure for the additional processing power, data storage, and back-end systems. Our cash burn rate will increase substantially.” Jessica looks visibly disappointed. “What if we hired a few more people for you to manage? Would that be enough?” Kamala smiles. “No, not even close. I was swamped before we even started this project. I’ve been neglecting software upgrades to our self-driving vehicles, and more importantly, I need to finish the new systems development project to automate the data collection from the storefronts. We’ll make a lot more money if we can log new inventory into our system as soon as we receive it from sellers and then sell it immediately.” Jessica looks disappointed. “Well, maybe you’re right. I really wish there was some way to make it work. We can’t grow quickly enough without an optimization system that doesn’t even exist yet. It’s really frustrating being on the cutting edge.” “You mean the bleeding edge. . .right?” Victor asks with a smirk. Chapter PREVIEW Q3-1 What would you do if you were Jessica? Or Victor? Would you go ahead and build your own AI? It would save you money down the road. It might even give you a competitive advantage over potential entrants into your market. You might be able to hire a team of AI people without breaking the bank. Is Kamala being too conservative? If you’re wondering why, as a future business professional, you need to know about hardware and software, think about those questions. Those questions and others of greater complexity—most likely ones involving technology that will be invented between now and the time you start working—will come your way. You don’t need to be an expert. You don’t need to be a hardware engineer or a computer programmer. You do need to know enough, however, to be an effective consumer. You need the knowledge and skills to ask important, relevant questions and understand the answers. We begin with basic hardware concepts and how innovations in hardware could affect businesses. Next, we will discuss software concepts, open source software development, and the differences between native and Web applications. Following that, we’ll discuss the importance of mobile systems and the challenges created when employees bring their computers to work. Finally, we’ll wrap up by forecasting trends in hardware and software in 2029. What Do Business Professionals Need to Know About Computer Hardware? Most people think of computer hardware as a laptop, a desktop, a server, or maybe even a tablet. As time passes, the way we think of computer hardware is changing. Take phones as an example. Twenty-five years ago, they were strictly used for voice communication. No one would have considered a phone a piece of computer hardware. Fast-forward to today. Smartphones have substantial processing power, the ability to connect to networks, internal memory, and virtual keyboards and can interconnect with other devices. Now a “phone” is essentially a powerful piece of computing hardware. Computing hardware is also being integrated into other devices such as watches, glasses, TVs, cars, and even toothbrushes. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 118 CHAPTER 3 Hardware, Software, and Mobile Systems Computer hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. All hardware today has more or less the same components, at least to the level that is important to us. We’ll begin with those components, and then we’ll quickly survey basic types of computers. Hardware Components Every computer has a central processing unit (CPU), which is sometimes called “the brain” of the computer. Although the design of the CPU has nothing in common with the anatomy of animal brains, this description is helpful because the CPU does have the “smarts” of the machine. The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. Some computers have two or more CPUs. A computer with two CPUs is called a dual-processor computer. Quad-processor computers have four CPUs. Some high-end computers have 16 or more CPUs. CPUs vary in speed, function, and cost. Hardware vendors such as Intel, Advanced Micro Devices, and National Semiconductor continually improve CPU speed and capabilities while reducing CPU costs. Whether you or your department needs the latest, greatest CPU depends on the nature of your work. The CPU works in conjunction with main memory. The CPU reads data and instructions from memory and then stores the results of computations in main memory. Main memory is sometimes called RAM, for random access memory. All computers include storage hardware, which is used to save data and programs. Magnetic disks (also called hard disks) are the most common storage device. Solid-state storage (SSD) (or an SSD drive) is much faster than traditional magnetic storage because it stores information using nonvolatile electronic circuits. SSD drives are gaining in popularity but are several times more expensive than magnetic hard disks. USB flash drives are small, portable solid-state storage devices that can be used to back up data and transfer it from one computer to another. Optical disks such as CDs and DVDs are also popular portable storage media. Types of Hardware Figure 3-1 lists the basic types of hardware. Personal computers (PCs) are classic computing devices that are used by individuals. In the past, PCs were the primary computer used in business. Today, they are gradually being supplanted by tablets and other mobile devices. The Mac Pro is an example of a modern PC. Apple brought tablets to prominence with the iPad. In 2012, Microsoft announced Surface and Google announced the Nexus series, all tablets. Moving down the list of hardware, a mobile device called a phablet combines the functionality of a smartphone with the larger screen of a tablet. Devices like Samsung’s Galaxy Note or Apple’s iPhone 8 Plus would fall into this crossover category. Smartphones are cell phones with processing capability; the Samsung Galaxy S9 and iPhone 8 are good examples. Today, because it’s hard to find a cell phone that isn’t “smart,” people often just call them phones. Hardware Type FIGURE 3-1 Basic Types of Hardware Example(s) Personal computer (PC) Including desktops and laptops Apple Mac Pro Tablet Including e-book readers iPad, Microsoft Surface, Google Nexus, Kindle Fire Phablet Samsung Galaxy Note, iPhone 8 Plus Smartphone Samsung Galaxy, iPhone Server Dell PowerEdge Server Server farm Racks of servers (Figure 3-2) IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 119 FIGURE 3-2 Server Farm Source: Andrew Twort/Alamy Stock Photo A server is a computer that is designed to support processing requests from many remote computers and users. A server is essentially a PC on steroids. A server differs from a PC principally because of what it does. The relationship between PCs and servers is similar to the relationship between clients and servers at a typical restaurant. Servers take requests from clients and then bring them things. In restaurants this is food and silverware. In computing environments servers can send Web pages, email, files, or data to PCs. PCs, tablets, and smartphones that access servers are called clients. As of 2018, a good example of a server is the Dell PowerEdge server. Finally, a server farm is a collection of, typically, thousands of servers. (See Figure 3-2.) Server farms are often placed in large truck trailers that hold 5,000 servers or more. Typically a trailer has two large cables coming out of it; one is for power, and the other is for data communications. The operator of the farm backs a trailer into a pre-prepared slab (in a warehouse or sometimes out in the open air), plugs in the power and communications cables, and, voilà, thousands of servers are up and running! Increasingly, server infrastructure is delivered as a service via the Internet that is often referred to as the cloud. We will discuss cloud computing in Chapter 4, after you have some knowledge of data communications. The capacities of computer hardware are specified according to data units, which we discuss next. Computer Data Computers represent data using binary digits, called bits. A bit is either a zero or a one. Bits are used for computer data because they are easy to represent physically, as illustrated in Figure 3-3. A switch can be either closed or open. A computer can be designed so that an open switch represents zero and a closed switch represents one. Or the orientation of a magnetic field can represent a bit: magnetism in one direction represents a zero; magnetism in the opposite direction represents a one. Or, for optical media, small pits are burned onto the surface of the disk so that they will reflect light. In a given spot, a reflection means a one; no reflection means a zero. Computer Data Sizes All forms of computer data are represented by bits. The data can be numbers, characters, currency amounts, photos, recordings, or whatever. All are simply a string of bits. For reasons that interest many but are irrelevant for future managers, bits are grouped into 8-bit chunks called bytes. For IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 120 CHAPTER 3 Hardware, Software, and Mobile Systems 1 1 0 1 A. Light switches representing 1101 FIGURE 3-3 Bits Are Easy to Represent Physically 1 1 0 1 B. Direction of magnetism representing 1101 1 1 0 1 C. Reflection/no reflection representing 1101 character data, such as the letters in a person’s name, one character will fit into one byte. Thus, when you read a specification that a computing device has 100 million bytes of memory, you know that the device can hold up to 100 million characters. Bytes are used to measure sizes of noncharacter data as well. Someone might say, for example, that a given picture is 100,000 bytes in size. This statement means the length of the bit string that represents the picture is 100,000 bytes or 800,000 bits (because there are 8 bits per byte). The specifications for the size of main memory, disk, and other computer devices are expressed in bytes. Figure 3-4 shows the set of abbreviations that are used to represent data storage capacity. A kilobyte, abbreviated KB, is a collection of 1,024 bytes. A megabyte, or MB, is 1,024 kilobytes. A gigabyte, or GB, is 1,024 megabytes; a terabyte, or TB, is 1,024 gigabytes; a petabyte, or PB, is 1,024 terabytes; an exabyte, or EB, is 1,024 petabytes; and a zettabyte, or ZB, is 1,024 exabytes. Sometimes you will see these definitions simplified as 1KB equals 1,000 bytes and 1MB equals 1,000KB, and so on. Such simplifications are incorrect, but they do ease the math. To put these sizes in perspective consider that Walmart processes about 40 PB worth of customer data per day.1 Facebook processes about 600 TB each day, in a 300PB data warehouse.2 The super-secret NSA data center in Utah is estimated to hold about 12 EB of data.3 And Cisco estimates that annual global Internet traffic volume will exceed 3.3 ZB by the end of 2021.4 Specifying Hardware with Computer Data Sizes Computer disk capacities are specified according to the amount of data they can contain. Thus, a 5TB disk can contain up to 5TB of data and programs. There is some overhead, so it is not quite 5TB, but it’s close enough. Term FIGURE 3-4 Important Storage-Capacity Terminology Definition Abbreviation Byte Number of bits to represent one character Kilobyte 1,024 bytes KB Megabyte 1,024 KB 5 1,048,576 bytes MB Gigabyte 1,024 MB 5 1,073,741,824 bytes GB Terabyte 1,024 GB 5 1,099,511,627,776 bytes TB Petabyte 1,024 TB 5 1,125,899,906,842,624 bytes PB Exabyte 1,024 PB 5 1,152,921,504,606,846,976 bytes EB Zettabyte 1,024 EB = 1,180,591,620,717,411,303,424 bytes ZB IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 121 You can purchase computers with CPUs of different speeds. CPU speed is expressed in cycles called hertz. In 2018, a slow personal computer had a speed of 3.0 Gigahertz with multiple processors. A fast personal computer had a speed of 3.5+ Gigahertz, with multiple processors. An employee who does only simple tasks such as word processing does not need a fast CPU; a multi-core 3.0 Gigahertz CPU will be fine. However, an employee who processes large, complicated spreadsheets or who manipulates large database files or edits large picture, sound, or video files needs a fast computer like a multi-processor workstation with 3.5 Gigahertz or more. Employees whose work requires them to use many large applications at the same time need 32 GB or more of RAM. Others can do with less. One last comment: The cache and main memory are volatile, meaning their contents are lost when power is off. Magnetic and optical disks are nonvolatile, meaning their contents survive when power is off. If you suddenly lose power, the contents of unsaved memory—say, documents that have been altered—will be lost. Therefore, get into the habit of frequently (every few minutes or so) saving documents or files that you are changing. Save your documents before your roommate trips over the power cord. Q3-2 How Can New Hardware Affect Competitive Strategies? Organizations are interested in new hardware because they represent potential opportunities, or threats, to their ability to generate revenue. It’s important to keep an eye on new tech hardware for the same reason you watch the weather forecast. You care about how the future will affect you. Next, we will look at five new hardware developments that have the potential to disrupt existing organizations. Internet of Things The first disruptive force that has the power to change business is the Internet of Things (IoT). This is the idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Everyday objects are being embedded with hardware capable of sensing, processing, and transmitting data. Objects can then connect to a network and share data with any other application, service, or device. Take your mobile phone, for example; it’s probably a smartphone. But it wasn’t always “smart.” It started out as a simple device that just handled voice calls. Over time it became a smart device by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to interconnect with other devices and applications (Figure 3-5). People began to use their mobile phones much differently than before. It also changed the way businesses operate. In 2017, Amazon reported that more than 70 percent of its customers shopped using a mobile device.5 What happens when other devices become smart? How would your life change if you had access to a smart car, smart home appliances, or an entire smart building? Within a few short decades it’s possible that you could interact with nearly every object around you from your smartphone. In fact, your devices will be able to talk to other devices, anticipate your actions, make changes, and configure themselves. This shift away from “dumb” devices to interconnected smart devices is not lost on businesses. Consumers like smart devices and are willing to pay more for them. Businesses want to improve the existing devices they manufacture into a smart devices and then sell them for twice as much. If they don’t, someone else will. The iPhone, for example, was introduced by Apple Inc., a computing hardware and software company. The mobile phone market was already mature. Industry leaders could have created a IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 122 CHAPTER 3 Hardware, Software, and Mobile Systems FIGURE 3-5 Smartphone Development Source: Grgroup/Fotolia smartphone, but they didn’t. Apple’s success with portable audio players (iPod) and mobile phones (iPhone) was a shot across the bow of other hardware manufacturers. A wave of smart devices is coming. Impact of the Internet of Things The impact of IoT will be felt by many different high-tech industries. Smart devices need microprocessors, memory, wireless network connections, a power source, and new software. These devices will also need new protocols, more bandwidth, and tighter security, and they will consume more energy. A good example of this push toward smart devices is General Electric’s (GE) Industrial Internet.6 GE’s Industrial Internet is a broad program focused on creating smart devices, analyzing the data from these devices, and then making changes that increase efficiencies, reduce waste, and improve decision making. GE sees the greatest potential for smart devices in hospitals, power grids, railroads, and manufacturing plants. GE estimates that an average airline using smart devices in its jet aircraft could save an average of 2 percent in fuel consumption. The resulting fuel and carbon dioxide savings would be the equivalent of removing 10,000 cars from the road.7 Microsoft has also made tremendous gains using smart devices. Microsoft has created a network of 125 smart buildings spread over 500 acres in Redmond, Washington (Figure 3-6).8 Its operations center processes 500 million data transactions every day from 30,000 devices, including heaters, air conditioners, lights, fans, and doors. Microsoft engineers were able to reduce energy costs by 6 percent to 10 percent a year by identifying problems like wasteful lighting, competing heating and cooling systems, and rogue fans. For Microsoft, that’s millions of dollars. What if every corporate building were a smart building? When you consider that 40 percent of the world’s energy is consumed in corporate buildings, you can start to get an idea of the immense financial cost savings. Indirectly, this would also have a huge environmental and economic impact worldwide. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 123 FIGURE 3-6 Microsoft’s Redmond, WA, Campus Source: Ian Dagnall/Alamy Stock Photo Digital Reality Devices The second disruptive force that has the power to change business is digital reality devices. Digital reality devices are an emerging technology with tremendous potential to revolutionize our daily lives. Much like the emergence of the Internet in the mid-1990s, these devices will create entirely new types of companies and change the way people live, work, shop, and entertain themselves. It’s estimated that the digital reality market will be $160 billion by 2021.9 There are different levels of digital reality on a continuum from completely real environments to completely virtual environments, or simulated nonphysical environments. Before you start to think about how digital reality devices will affect business, you need to understand how the levels of digital reality differ. First, reality is the state of things as they actually exist. If you’re reading the paper version of this textbook with your eyes, contact lenses, or glasses, you’re seeing the real world without any digital alteration. You are (hopefully) experiencing reality. Next comes augmented reality. Augmented reality (AR) is the altering of reality by overlaying digital information on real-world objects. Examples of AR devices include Google Glass ($1,250), Epson’s Moverio Smart Glasses ($700), and Daqri Smart Helmet (est. $5,000 to $15,000). Essentially, these devices work like heads-up displays, giving users information about the real world they’re experiencing. For example, an AR device could provide users directions in the form of virtual arrows being displayed on the roadway. Users could also read virtual emails displayed in the air or see virtual health data projected in front of them as they exercise. The next step on the digital reality continuum, as shown in Figure 3-7, is mixed reality. Mixed reality (MR) is the combination of the real physical world with interactive virtual images or objects. Reality Augmented Reality Mixed Reality Virtual Reality Glasses Google Glass Microsoft HoloLens Facebook’s Oculus Rift Virtual Information No Yes Yes Yes Virtual Objects No No Yes Yes Virtual World No No No Yes Example FIGURE 3-7 Levels of Digital Reality IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 124 CHAPTER 3 Hardware, Software, and Mobile Systems Microsoft (HoloLens, $3,000) and Meta (Meta 2, $1,495) released their MR devices in early 2016. Both companies are marketing these devices to developers interested in creating digital reality applications. MR devices are generally perceived as having greater potential than AR devices due to their ability to interact with virtual objects in real time. For example, using AR you could view a 2D virtual weather forecast projected on your wall. But with MR you would see a real-time 3D virtual model of your city created on your coffee table (Figure 3-8). It would show a virtual tornado moving toward the city, and you could interact with the 3D weather application to see its projected path. And this is just one example. Imagine watching sporting events live in high-definition 3D in the middle of your room. There’s one problem when discussing AR and MR devices. Currently, the term augmented reality isn’t applied consistently. It’s common to hear AR used to describe both AR and MR devices.10 But this is normal for emerging technologies. Terms are created, refined, and stored in common speech as the technology develops. So don’t be surprised to hear AR used to describe both types of digital reality. The last step on the digital reality continuum is virtual reality (VR), or a completely computer-generated virtual world with interactive digital objects. Here you’ll find devices like Facebook’s Oculus Rift ($465), Sony’s PlayStation VR ($349), and Samsung Gear VR ($129). These are completely immersive experiences that try to create a strong sense of presence, or the illusion that a virtual experience is real. In other words, if a device were able to create a strong sense of presence, you’d lean back and hold on tight if you were on a virtual roller coaster about to go off the track. Impact of Digital Reality Devices Digital reality devices are developing in much the same way cellular phones developed over the past 20 years. In fact, it’s entirely possible that the AR market could disrupt the smartphone market. Imagine taking calls, browsing the Web, messaging friends, and watching a movie without ever taking your smartphone out of your pocket. The application of digital reality devices extends beyond personal use as well. Organizations are currently building digital reality applications for education, training, collaboration, new product design, “holoportation,” gaming, sports, advertising, tourism, and shopping. For example, Lowe’s new Holoroom allows customers to design and visualize their ideal room before they commit to major changes. Case Western Reserve University has partnered with Microsoft to develop 3D mixedreality applications to teach anatomy in an interactive environment.11 The full impact of digital reality devices won’t be understood for years—we just don’t know how they’ll be used. Even experts in the field are just starting to understand the implications of how digital reality devices will change organizations. The shift from 2D flat screens to a 3D virtual world FIGURE 3-8 Digital Reality Applications Source: Peshkov/Fotolia IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 125 is like changing vocations from being a painter to being a sculptor. It requires new skills, processes, tools, and ways of thinking. Digital reality devices are truly one of the most transformative innovations in hardware to come along in the past 20 years. Self-Driving Cars The third disruptive force that could change the way businesses operate is self-driving cars. A selfdriving car (also known as a driverless car) uses a variety of sensors to navigate like a traditional car but without human intervention. It will be full of advanced hardware and integrated software and is the epitome of a mobile system. In fact, it will be so mobile that it will be able to move without anyone being in the car (Figure 3-9). Yes, self-driving cars are in your very near future. A recent report by KPMG indicates that self-driving cars could reach nearly full adoption by 2050.12 Most auto manufacturers (GM, Toyota, BMW, Ford, etc.) say they will have self-driving cars by 2021.13 Uber, Waymo (Google), and Tesla have been testing self-driving cars for a few years now with more than 1 billion miles driven. Toyota announced its ePalette self-driving mobile store at the 2018 CES show. And Apple announced it is partnering with Volkswagen to make its first self-driving shuttles for its employees.14 It looks like the race to develop self-driving cars is heating up. The competition will be fierce. Self-driving cars will make things easier, cheaper, and safer. They’ll also disrupt well-established industries. Self-Driving Cars Make Things Easier Imagine how a self-driving car will change the lives of a typical family. A self-driving car could allow Dad to review sales reports while “driving” to work. He’s much less stressed out—and more FIGURE 3-9 Future Cars Will Drive Themselves Source: Dan Race/Fotolia IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 126 CHAPTER 3 Hardware, Software, and Mobile Systems productive—during his commute than he was with his old car. The self-driving car could then drop off the kids at school—without Dad in the car—and return home to take Mom to work. After work the family goes shopping and is dropped off curbside at the store. No need to park anymore. It’s safer, too. While shopping, Dad gets a message from his college-aged daughter that she needs the car sent to pick her up from the airport. Dad’s glad he won’t have to drive all the way out there. Self-driving cars can also plan routes, fill themselves up with gas, take themselves to get repaired, and reroute themselves if there’s an accident or traffic. There’s no more stress or aggressive driving either. Self-Driving Cars Make Things Cheaper You’ve seen how a self-driving car can make your life easier. But what about cost? Will it be more expensive or less expensive than the car you have now? Self-driving cars will probably be much less expensive over time than your current car. Early adopters will pay a premium when self-driving cars first hit the market, but that’s true of most new products. Cost savings will show up in several ways. In the preceding scenario, you may have noticed that the family had only one car. Self-driving cars will be used more effectively than cars are used now. Most cars sit dormant for 22 hours a day. Sharing a self-driving car could eliminate the need to have multiple cars. That’s a big cost savings. You’ll see more cost savings because a self-driving car will drive more efficiently (less braking, revving the engine, and street racing!). You will avoid costly traffic tickets, parking tickets, accidents, and DUI citations. Your car insurance will drop dramatically. It may be so low that you won’t even need it anymore. In a report about the effect of self-driving cars on the insurance industry, KPMG estimated that accident frequency will drop by 90 percent by the year 2050. Subsequently, the personal automobile industry will shrink to 22 percent of its current size.15 The analysis is probably right. Self-driving cars will probably take a big chunk out of the $150B paid each year in car insurance premiums. Self-Driving Cars Will Make Things Safer Yes, you read that right—safer. Currently, 90 percent of motor vehicle crashes are caused by human error.16 Motor vehicle crashes are the leading cause of death for people ages 3 to 33. Spending time driving may be the most dangerous thing you do all day. Your self-driving car will be able to see better than you, react more quickly than you, and have better information about your driving environment. It will be able to communicate with other cars around it, dynamically analyze traffic patterns, avoid construction sites, and contact emergency services if needed. Self-driving cars will mean safer driving, fewer accidents, fewer drunk drivers, fewer road-rage incidents, and fewer auto–pedestrian accidents. Cars will be able to go faster with fewer accidents. In the future, manual driving may be a risky and expensive hobby. Self-Driving Cars Will Disrupt Businesses Self-driving cars have the potential to disrupt well-established industries. Self-driving cars may mean fewer cars on the road. Fewer cars on the road may mean fewer cars sold (transportation), fewer auto loans written (finance), fewer automobile insurance policies underwritten (insurance), fewer auto parts sold due to fewer accidents (manufacturing), and fewer parking lots (real estate). If they didn’t have to drive, consumers might take more trips by car than by plane or train (transportation). The production of self-driving cars will mean more jobs for engineers, programmers, and systems designers. There will be more computer hardware, sensors, and cameras in the vehicle. Corporations may not completely see the far-reaching effects of self-driving cars on existing industries. They may even fundamentally change our society. What if driving a “manual” car becomes too costly? Teenagers in the future may never learn how to drive a car. Ask yourself: Do you know how to ride a horse? Your ancestors did. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 127 3D Printing The fourth disruptive force that has the power to change businesses is 3D printing. 3D printing will not only change the competitive landscape, but it may change the nature of businesses themselves. Consider how Nike has used 3D printing to improve the way it designs and creates shoes. It recently used a 3D printer to create the world’s first 3D-printed cleat plate for a shoe called the Nike Vapor Laser Talon.17 Nike chose to use a 3D printer to produce the cleat because it could create the optimal geometric shapes for optimal traction. Using a 3D printer, it could design and produce a lighter and stronger cleat much more quickly than before. In fact, Nike did just that when it produced a pair of custom-designed sprinting shoes (the Nike Zoom Superfly Flyknit) for gold-medal Olympian Allyson Felix to be worn at the 2016 Olympic games in Rio.18 3D printers have the potential to affect a broad array of industries beyond sporting equipment. You can get an idea of the scope of change when you realize that 3D printers can print in more than just plastics (Figure 3-10). They can print in metal, wood, ceramics, foods, and biological material too. Take the ability to 3D-print in a variety of materials and look for opportunities across the aerospace, defense, automotive, entertainment, and healthcare industries. What happens when it becomes feasible to 3D-print extra-large objects like cars,19 planes, boats, houses, and drones? Cryptocurrencies The fifth disruptive force that has the power to change businesses is cryptocurrencies. Cryptocurrencies are digital-only currencies that use cryptographic protections to manage and record secure transactions. Bitcoin, introduced in 2009, is currently the most well-known cryptocurrency among the thousands available today. Cryptocurrencies are an important disruptive force because of their potential to transform world economies. Benefits of Cryptocurrencies There are lots of reasons to love cryptocurrencies. Compared to traditional payment methods, cryptocurrency transactions are faster and easier and have few to no fees. Governments can’t easily monitor, tax, or seize cryptocurrencies. Consumers holding cryptocurrencies are protected from inflation, too. FIGURE 3-10 3D Printer Source: Seraficus/iStock/Getty Images IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 128 CHAPTER 3 Hardware, Software, and Mobile Systems For example, there are only 21 million possible bitcoins. Each bitcoin can be broken down into smaller fractions of a bitcoin, with the smallest unit, a satoshi, being 1/100,000,000 of one bitcoin. But there won’t be any more bitcoins created beyond the original 21 million. The same is not true of traditional fiat currencies, or government-approved legal tender. Historically, when governments run up huge debts, they just print more money to pay for those debts. This causes inflation, which increases prices and decreases the purchasing power of your money. Consumers around the world like cryptocurrencies because they protect their users from inflation. Risks of Cryptocurrencies There are risks to cryptocurrencies, too. The value of a cryptocurrency can drop to zero if enough big holders of the currency sell their coins. Bitcoin, for example, derives its value because enough people perceive it as valuable. There is nothing like gold backing its value, and it is not governmentapproved legal tender. It’s all perception. That can lead to extreme price volatility. Bitcoin also suffers from the fact that relatively few businesses accept it as payment, and it initially got a bad reputation for being used by organized crime. The Future of Cryptocurrencies Cryptocurrencies are slowly gaining acceptance. Banks and even some governments are launching their own cryptocurrencies. Business are using blockchain, or the decentralized public ledgering system used to record cryptocurrency transactions, to manage transactions in traditional sectors like shipping, real estate, voting, and stock trading. Even if they don’t replace traditional fiat currencies, the underlying technology behind cryptocurrencies is making all types of transactions more secure and easier to manage. Q3-3 Innocuous-looking applications can be custom-made for malicious purposes. Read the Security Guide on pages 150–151 to learn more. What Do Business Professionals Need to Know About Software? As a future manager or business professional, you need to know the essential terminology and software concepts that will enable you to be an intelligent software consumer. To begin, consider the basic categories of software shown in Figure 3-11. Every computer has an operating system (OS), which is a program that controls that computer’s resources. Some of the functions of an operating system are to read and write data, allocate main memory, perform memory swapping, start and stop programs, respond to error conditions, and facilitate backup and recovery. In addition, the operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices. Although the operating system makes the computer usable, it does little application-specific work. If you want to check the weather or access a database, you need application programs such as an iPad weather application or Oracle’s customer relationship management (CRM) software. Both client and server computers need an operating system, though they need not be the same. Further, both clients and servers can process application programs. The application’s design determines whether the client, the server, or both process it. Operating System FIGURE 3-11 Categories of Computer Software Application Programs Client Programs that control the client computer’s resources Applications that are processed on client computers Server Programs that control the server computer’s resources Applications that are processed on server computers IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 129 You need to understand two important software constraints. First, a particular version of an operating system is written for a particular type of hardware. For example, Microsoft Windows works only on processors from Intel and companies that make processors that conform to the Intel instruction set (the commands that a CPU can process). With other operating systems, such as Linux, many versions exist for many different instruction sets. Second, two types of application programs exist. Native applications are programs that are written to use a particular operating system. Microsoft Access, for example, will run only on the Windows operating system. Some applications come in multiple versions. For example, there are Windows and Macintosh versions of Microsoft Word. But unless you are informed otherwise, assume that a native application runs on just one operating system. Native applications are sometimes called thick-client applications. A Web application (also known as a thin-client application) is designed to run within a computer browser such as Firefox, Chrome, Opera, or Edge (formerly Internet Explorer). Web applications run within the browser and can run on any type of computer. Ideally, a Web application can also run within any browser, though this is not always true as you will learn. Consider next the operating system and application program categories of software. What Are the Major Operating Systems? The major operating systems are listed in Figure 3-12. Consider each. FIGURE 3-12 Major Operating Systems Category Nonmobile Clients Mobile Clients Servers Operating System Used for Remarks Windows Personal computer clients Most widely used operating system in business. Current version is Windows 10. Includes a touch interface. macOS Macintosh clients First used by graphic artists and others in arts community; now used more widely. First desktop OS to provide a touch interface. Current version is the macOS High Sierra. Unix Workstation clients Popular on powerful client computers used in engineering, computer-assisted design, architecture. &KHƂEWNVHQTVJGPQPVGEJPKECNWUGT#NOQUVPGXGTWUGF by business clients. Linux Just about anything Open source variant of Unix. Adapted to almost every type of computing device. On a PC, used with Libre 1HƂEGCRRNKECVKQPUQHVYCTG4CTGN[WUGFD[DWUKPGUU clients. Symbian Nokia, Samsung, and other phones Popular worldwide, but less so in North America. BlackBerry OS Research in Motion BlackBerries iOS iPhone, iPod Touch, iPad Device and OS developed for use by business. Very popular in beginning, but losing market share to iOS and Android. Rapidly increasing installed base with success of the iPhone and iPad. Based on macOS. Android Samsung, Google, HTC, and Sony smartphones; tablets Linux-based phone/tablet operating system from Google. Rapidly increasing market share. Windows 10 (mobile) Nokia and Microsoft Surface 9KPFQYUVCKNQTGFURGEKƂECNN[HQTOQDKNGFGXKEGU Full Windows 10 on Surface Pro. Windows Server Servers Businesses with a strong commitment to Microsoft. Unix Servers Fading from use. Replaced by Linux. Linux Servers Very popular. Aggressively pushed by IBM. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 130 CHAPTER 3 Hardware, Software, and Mobile Systems Nonmobile Client Operating Systems Nonmobile client operating systems are used on personal computers. The most popular is Microsoft Windows. Some version of Windows resides on more than 88 percent of the world’s desktops, and, if we consider just business users, the figure is more than 95 percent. The most recent version of Windows is Windows 10. Net Applications estimates that overall market share of Windows as of 2018 is Windows 7 at 44 percent, Windows 10 at 31 percent, Windows XP at 6 percent, Windows 8.1 at 6 percent, and Windows 8 at 1 percent.20 It’s interesting to note that Windows 7 remains the most popular version of Windows despite the fact that Microsoft ended mainstream support for it in January 2015. Windows 8 was a major rewrite of prior versions. Windows 8 was distinguished by what Microsoft calls modern-style applications.21 These applications, now carried over into Windows 10, are touch-screen oriented and provide context-sensitive, pop-up menus. They can also be used with a mouse and keyboard. Microsoft claims that modern-style applications work just as well on portable, mobile devices, such as tablet computers, as they do on desktop computers. One key feature of modern-style applications is the minimization of menu bars, status lines, and other visual overhead. Figure 3-13 shows an example of a modern-style version of searching for images in Windows Explorer. Apple Computer, Inc., developed its own operating system for the Macintosh, macOS. The current version is macOS High Sierra. Apple touts it as the world’s most advanced desktop operating system. Windows 10 now gives it a run for the money in terms of that title. Until recently, macOS was used primarily by graphic artists and workers in the arts community. But for many reasons, macOS has made headway into the traditional Windows market. According to Net Applications, as of 2018, desktop operating system market share was divided between versions of Windows (88.8 percent), macOS (Mac OS X) (8.6 percent), and Linux (2.3 percent).22 macOS was designed originally to run the line of CPU processors from Motorola, but today a Macintosh with an Intel processor is able to run both Windows and the macOS. Unix is an operating system that was developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then. Unix is seldom used in business. Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to FIGURE 3-13 Example of the Modern-Style Interface Source: Microsoft Edge, Windows 10, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 131 develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but usually only when budget is of paramount concern. By far, Linux is most popular as a server OS. According to DistroWatch.com, the top five most popular versions of Linux as of 2018 were Linux Mint, Manjaro, Debian GNU/Linux, Ubuntu, and Solus.23 Mobile Client Operating Systems Figure 3-12 also lists the five principal mobile operating systems. Symbian is popular on phones in Europe and the Far East, but less so in North America. BlackBerry OS was one of the most successful early mobile operating systems and was used primarily by business users on BlackBerry devices. It has lost market share to iOS, Android, and Windows 10. iOS is the operating system used on the iPhone, iPod Touch, and iPad. When first released, it broke new ground with its ease of use and compelling display, features that are now being copied by the BlackBerry OS and Android. With the popularity of the iPhone and iPad, Apple has been increasing its market share of iOS, and, according to Net Applications, it is used on 28 percent of mobile devices.24 The current version of iOS is iOS 11. Android is a mobile operating system licensed by Google. Android devices have a very loyal following, especially among technical users. Net Applications estimates Android’s market share to be nearly 69 percent. Most industry observers would agree that Apple has led the way, both with the macOS and the iOS, in creating easy-to-use interfaces. Certainly, many innovative ideas have first appeared in a Macintosh or iSomething and then later were added, in one form or another, to Android and Windows. Users who want Windows 10 on mobile devices will get either Windows 10 (mobile) on smartphones or a full version of Windows 10 on Surface Pro devices. Windows garners less than 1 percent of the mobile OS market share. The smartphone market has always been huge, but recently, e-book readers and tablets have substantially increased the market for mobile client operating systems. As of 2018, 77 percent of Americans owned a smartphone, and 53 percent owned a tablet in addition to their smartphone.25 Server Operating Systems The last three rows of Figure 3-12 show the three most popular server operating systems. Windows Server is a version of Windows that has been specially designed and configured for server use. It has much more stringent and restrictive security features than other versions of Windows and is popular on servers in organizations that have made a strong commitment to Microsoft. Unix can also be used on servers, but it is gradually being replaced by Linux. Linux is frequently used on servers by organizations that want, for whatever reason, to avoid a server commitment to Microsoft. IBM is the primary proponent of Linux and in the past has used it as a means to better compete against Microsoft. Although IBM does not own Linux, IBM has developed many business systems solutions that use Linux. By using Linux, neither IBM nor its customers have to pay a license fee to Microsoft. Virtualization Virtualization is the process by which one physical computer hosts many different virtual (not literal) computers within it. One operating system, called the host operating system, runs one or more operating systems as applications. Those hosted operating systems are called virtual machines (vm). Each virtual machine has disk space and other resources allocated to it. The host operating system controls the activities of the virtual machines it hosts to prevent them from interfering with one another. With virtualization, each vm is able to operate exactly the same as it would if it were operating in a stand-alone, nonvirtual environment. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 132 CHAPTER 3 Hardware, Software, and Mobile Systems FIGURE 3-14 Linux Mint Virtual Machine Running in Microsoft Windows Source: Windows 10, Microsoft Corporation. Three types of virtualization exist: • PC virtualization • Server virtualization • Desktop virtualization With PC virtualization, a personal computer, such as a desktop or laptop, hosts several different operating systems. Say a user needs to have both Linux and Windows running on a computer for a training or development project. In that circumstance, the user can load software like Oracle VirtualBox or VMWare Workstation on the host operating system in order to create Linux and Windows virtual machines. The user can run both systems on the same hardware at the same time if the host operating system has sufficient resources (i.e., memory and CPU power) as shown in Figure 3-14. With server virtualization, a server computer hosts one or more other server computers. In Figure 3-15, a Windows Server computer is hosting multiple virtual machines. Users can log on to any of those virtual machines, and they will appear as normal desktop computers. Figure 3-16 shows how one of those virtual machines would appear to a user of that virtual desktop. Notice FIGURE 3-15 Windows Server Computer Hosting Virtual Machines Source: Windows 10, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 The host operating system Hardware, Software, and Mobile Systems 133 The virtual machine Browser on the virtual machine running Google Taskbar for the virtual machine FIGURE 3-16 Virtual Machine Example Source: Windows 10, Microsoft Corporation. Taskbar for the host that the user of that virtual machine is running a Web browser as if it is a local desktop. Server virtualization plays a key role for cloud vendors, as you’ll learn in Chapter 4. PC virtualization is interesting as well as quite useful, as you will learn in Chapter 4. Desktop virtualization, on the other hand, has the potential to be revolutionary. With desktop virtualization, a server hosts many versions of desktop operating systems. Each of those desktops has a complete user environment and appears to the user to be just another PC. However, the desktop can be accessed from any computer to which the user has access. Thus, you could be at an airport and go to a terminal computer and access your virtualized desktop. To you, it appears as if that airport computer is your own personal computer. Using a virtual desktop also means that you wouldn’t have to worry about losing a corporate laptop or confidential internal data. Meanwhile, many other users could have accessed the computer in the airport, and each thought he or she had his or her personal computer. Desktop virtualization is in its infancy, but it might have major impact during the early years of your career. Own Versus License When you buy a computer program, you are not actually buying that program. Instead, you are buying a license to use that program. For example, when you buy a macOS license, Apple is selling you the right to use macOS. Apple continues to own the macOS program. Large organizations do not buy a license for each computer user. Instead, they negotiate a site license, which is a flat fee that authorizes the company to install the product (operating system or application) on all of that company’s computers or on all of the computers at a specific site. In the case of Linux, no company can sell you a license to use it. It is owned by the open source community, which states that Linux has no license fee (with certain reasonable restrictions). Large companies such as IBM and smaller companies such as RedHat can make money by supporting Linux, but no company makes money selling Linux licenses. What Types of Applications Exist, and How Do Organizations Obtain Them? Some applications are designed to be free but gather data about the people who use them. Read the Ethics Guide on pages 143–145 about how this is done. Application software performs a service or function. Some application programs are general purpose, such as Microsoft Excel or Word. Other application programs provide specific functions. QuickBooks, for example, is an application program that provides general ledger and other accounting functions. We begin by describing categories of application programs and then describe sources for them. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 134 CHAPTER 3 Hardware, Software, and Mobile Systems Read more about how software is developed and managed in the Career Guide on page 152. Horizontal-market application software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. Examples from other vendors are Adobe’s Acrobat, Photoshop, and PageMaker and Jasc Corporation’s Paint Shop Pro. These applications are used in a wide variety of businesses across all industries. They are purchased off the shelf, and little customization of features is necessary (or possible). They are the automobile equivalent of a sedan. Everybody buys them and then uses them for different purposes. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients, those used by auto mechanics to keep track of customer data and customers’ automobile repairs, and those used by parts warehouses to track inventory, purchases, and sales. If horizontal-market applications are sedans, then vertical-market applications would be construction vehicles, like an excavator. They meet the needs of a specific industry. Vertical applications usually can be altered or customized. Typically, the company that sold the application software will provide such services or offer referrals to qualified consultants who can provide this service. One-of-a-kind application software is developed for a specific, unique need. The U.S. Department of Defense develops such software, for example, because it has needs that no other organization has. You can think of one-of-a-kind application software as the automotive equivalent of a military tank. Tanks are developed for a very specific and unique need. Tanks cost more to manufacture than sedans, and cost overruns are common. They take longer to make and require unique hardware components. However, tanks are highly customizable and fit the requirements of a heavy-duty battle vehicle very well. If you’re headed into battle, you wouldn’t want to be driving a four-door sedan. Sometimes paying for a custom vehicle, while expensive, is warranted. It all depends on what you’re doing. Militaries, for example, purchase sedans, construction vehicles, and tanks. Each vehicle fills its own need. You can buy computer software in exactly the same ways: off-the-shelf software, off-theshelf with alterations software, or custom-developed software. Organizations develop custom application software themselves or hire a development vendor. Like buying a tank, such development is done in situations where the needs of the organization are so unique that no horizontal or vertical applications are available. By developing custom software, the organization can tailor its application to fit its requirements. Custom development is difficult and risky. Staffing and managing teams of software developers is challenging. Managing software projects can be daunting. Many organizations have embarked on application development projects only to find that the projects take twice as long—or longer—to finish than planned. Cost overruns of 200 percent and 300 percent are not uncommon. In addition, every application program needs to be adapted to changing needs and changing technologies. The adaptation costs of horizontal and vertical software are amortized over all the users of that software, perhaps thousands or millions of customers. For custom-developed software, however, the using organization must pay all of the adaptation costs itself. Over time, this cost burden is heavy. Because of the risk and expense, custom development is the last-choice alternative, used only when there is no other option. Figure 3-17 summarizes software sources and types. What Is Firmware? Firmware is computer software that is installed into devices such as printers, print servers, and various types of communication devices. The software is coded just like other software, but it is installed into special, read-only memory of the printer or other device. In this way, the program IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 135 Software Source Off-the-shelf Software Type Off-the-shelf and then customized Custom-developed Horizontal applications Vertical applications One-of-a-kind applications FIGURE 3-17 Software Sources and Types becomes part of the device’s memory; it is as if the program’s logic is designed into the device’s circuitry. Therefore, users do not need to load firmware into the device’s memory. Firmware can be changed or upgraded, but this is normally a task for IS professionals. Q3-4 Is Open Source Software a Viable Alternative? To answer this question, you first need to know something about the open source movement and process. Most computer historians would agree that Richard Matthew Stallman is the father of the movement. In 1983, he developed a set of tools called GNU (a self-referential acronym meaning GNU Not Unix) for creating a free Unix-like operating system. Stallman made many other contributions to open source, including the GNU general public license (GPL) agreement, one of the standard license agreements for open source software. Stallman was unable to attract enough developers to finish the free Unix system but continued making other contributions to the open source movement. In 1991 Linus Torvalds, working in Helsinki, began work on another version of Unix, using some of Stallman’s tools. That version eventually became Linux, the high-quality and very popular operating system discussed previously. The Internet proved to be a great asset for open source, and many open source projects became successful, including: • • • • • • • • LibreOffice (default office suite in Linux distributions) Firefox (a browser) MySQL (a DBMS, see Chapter 5) Apache (a Web server, see Chapter 4) Ubuntu (a Windows-like desktop operating system) Android (a mobile device operating system) Cassandra (a NoSQL DBMS, see Chapter 5) Hadoop (a Big Data processing system) Why Do Programmers Volunteer Their Services? To a person who has never enjoyed writing computer programs, it is difficult to understand why anyone would donate his or her time and skills to contribute to open source projects. Programming is, however, an intense combination of art and logic, and designing and writing a complicated computer program can be exceedingly pleasurable (and addictive). Many programmers joyfully write computer programs—day after day. If you have an artistic and logical mind, you ought to try it. The first reason that people contribute to open source is that it is great fun! Additionally, some people contribute to open source because it gives them the freedom to choose the projects they work on. They may have a programming day job that is not terribly interesting—say, writing a program to manage a computer printer. Their job pays the bills, but it’s not fulfilling. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 136 CHAPTER 3 Hardware, Software, and Mobile Systems SO WHAT? NEW FROM CES 2018 What’s new in hardware? It’s the Consumer Electronics Show (CES) held in Las Vegas every January: 4,000 exhibitors and 180,000 hardware-gawking attendees whipped to a frenzy by loud music, screaming video, and hyperventilating media. It’s a show that only Las Vegas can do! What’s hot this year? How about: • Toyota e-Palette: At CES 2018, Toyota announced an autonomous concept vehicle named the e-Palette that the company believes will fill a role in an emerging mobility as a service (MaaS) market. The vehicle’s bizarre design looks like a rectangular cube on wheels with transparent panels that can be customized to display digital signage based on whatever the vehicle is tasked with doing at the time. The e-Palette vehicle can be configured for a variety of uses, including ridesharing, package delivery, mobile stores, temporary lodging, food trucks, or temporary entertainment at large events. The implications of Toyota’s e-Palette are even more profound if you consider that the vehicle is completely autonomous. Mobile clothing stores can bring products right to your front door to try on. You can order dinner from hundreds of different food trucks that will bring it wherever you are. Traditional and highly inefficient city buses will be replaced with smaller transport modules that can pick you up anywhere at any time for a fraction of the cost. Because drivers aren’t needed, the entire shipping sector will be revolutionized by dramatically lower costs. Toyota’s e-Palette may cause a fundamental transformation in commerce similar to the change that occurred with the emergence of the Internet. The Internet allowed certain companies to transform from traditional brick-andmortar businesses to online businesses. Similarly, e-Palette may cause a transformation from brick-and-mortar and online businesses to mobile businesses. • Peloton Tread: The Peloton Tread is a treadmill with a 32-inch HD touchscreen that allows users to participate in at least 10 live exercise classes per day. Users get live instruction by expert trainers streamed right to their homes. Users can see their real-time ranking on a live leaderboard as they’re running and get detailed workout metrics. Users don’t have to go to the gym anymore. They can get guided workouts that fit their schedule and have access to more than 1,000 prerecorded workouts. Users don’t have to worry about the weather, uneven terrain, or dodging cars. It’s a safe, convenient workout. The Peloton Tread will retail for about $4,000. These same features also come on Peloton’s stationary bike ($2,000). Source: Haiyin Wang/Alamy Stock Photo • Sony Aibo: One of the most talked about innovations at CES 2018 was Sony’s robotic dog named Aibo. The newest version of Aibo is Wi-Fi enabled and integrated with an AI. It has sensors all over its plastic body that recognize when people pet it. It has a camera built into its nose that can be used to recognize individual family members. Another camera on its back is pointed upward and used for navigation. In fact, Aibo learns the layout of the rooms and can even walk back to its charging station when it’s low on power. Aibo will retail for about $1,800 and will require a $27-per-month subscription. Unfortunately, it’s currently only for sale in Japan. Questions 1. What impact do you think Toyota’s e-Palette will have on traditional brick-and-mortar businesses? 2. How could Toyota’s e-Palette affect e-commerce? 3. Why would consumers prefer Peloton Tread over a traditional treadmill or running outside? 4. Peloton has transformed traditional treadmills and stationary bikes into IoT devices. Which other workout devices would benefit from being smart IoT devices? 5. What are the benefits of a robot dog over a biological dog? What might be some of the drawbacks of a robot dog? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 137 In the 1950s, Hollywood studio musicians suffered as they recorded the same style of music over and over for a long string of uninteresting movies. To keep their sanity, those musicians would gather on Sundays to play jazz, and a number of high-quality jazz clubs resulted. That’s what open source is to programmers: a place where they can exercise their creativity while working on projects they find interesting and fulfilling. Another reason for contributing to open source is to exhibit one’s skill, both for pride and to find a job or consulting employment. A final reason is to start a business selling services to support an open source product. How Does Open Source Work? The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and understandable by humans. Figure 3-18 shows a portion of the computer code written for the ARES project. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. When a user accesses a Web site, the machine code version of the program runs on the user’s computer. We do not show machine code in a figure because it would look like this: 1101001010010111111001110111100100011100000111111011101111100111. . . FIGURE 3-18 Source Code Sample In a closed source project, say, Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is protected like gold in a vault. Only those trusted programmers can make changes to a closed source project. With open source, anyone can obtain the source code from the open source project’s Web site. Programmers alter or add to this code depending on their interests and goals. In most cases, IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 138 CHAPTER 3 Hardware, Software, and Mobile Systems programmers can incorporate code they find into their own projects. They may be able to resell those projects depending on the type of license agreement the project uses. Open source succeeds because of collaboration. A programmer examines the source code and identifies a need or project that seems interesting. He or she then creates a new feature, redesigns or reprograms an existing feature, or fixes a known problem. That code is then sent to others in the open source project who evaluate the quality and merits of the work and add it to the product, if appropriate. Typically, there are many cycles of iteration and feedback. Because of this iteration, a wellmanaged project with strong peer reviews can result in very high quality code, like that in Linux. So, Is Open Source Viable? The answer depends on to whom and for what. Open source has certainly become legitimate. According to The Economist, “It is now generally accepted that the future will involve a blend of both proprietary and open-source software.”26 During your career, open source will likely take a greater and greater role in software. However, whether open source works for a particular situation depends on the requirements and constraints of that situation. You will learn more about matching requirements and programs in Chapter 8. In some cases, companies choose open source software because it is “free.” It turns out that this advantage may be less important than you’d think because in many cases support and operational costs swamp the initial licensing fee. Q3-5 What Are the Differences Between Native and Web Applications? Applications can be categorized as native applications that run on just one operating system or Web applications that run in browsers. In the latter case, the browser provides a more or less consistent environment for the application; the peculiarities of operating systems and hardware are handled by the browser’s code and hidden from the Web application. Figure 3-19 contrasts native and Web applications on their important characteristics. Consider the Native Applications column first. Developing Native Applications Native applications are developed using serious, heavy-duty, professional programming languages. macOS and iOS applications are constructed using Objective-C or the Swift programming language. Linux (Android) applications are constructed using Java, and Windows applications are constructed using C#, VB.NET, C++, and others. All of these languages are object-oriented, which means they can be used to create difficult, complex applications and, if used properly, will result in high-performance code that is easy to alter when requirements change. The particular characteristics of object-oriented languages are beyond the scope of this text. Object-oriented languages can be used only by professional programmers who have devoted years to learning object-oriented design and coding skills. Typically, such developers were computer science majors in college. The benefit of such languages is that they give programmers close control over the assets of the computing device and enable the creation of sophisticated and complex user interfaces. If the programs are well written, they perform fast and use memory efficiently. The limits on native applications are usually budgetary, not technological. As a businessperson, you can get just about any application you can afford. The downside of native applications is that they are, well, native. They only run on the operating system for which they are programmed. An iOS application must be completely recoded in order IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 FIGURE 3-19 Characteristics of Native and Web Applications Hardware, Software, and Mobile Systems Native Applications Web Applications Development Languages Objective-C Java C#, C++, VB.NET, Swift (object-oriented languages) html5 css3 JavaScript (scripting language) Developed by Professional programmers only Professional programmers and technically oriented Web developers and business professionals 5MKNNNGXGNTGSWKTGF High Low to high &KHƂEWNV[ High Easy to hard, depending on application requirements Developer’s Degree Computer science Computer science Information systems Graphics design User Experience Can be superb, depending on programming quality Simple to sophisticated, depending on program quality Possible applications Whatever you can pay for… Some limits prohibit very sophisticated applications Dependency iOS, Android, Windows Browser differences, only Cost *KIJ&KHƂEWNVYQTMD[JKIJN[ paid employees, multiple versions required. Low to high . .GCUKGTYQTMD[NGUUGTRCKF GORNQ[GGUQPN[OWNVKRNGDTQYUGTƂNGU necessary. Sophisticated applications OC[TGSWKTGJKIJUMKNNCPFRC[ Application distribution Via application stores (e.g., Apple Store) Via Web sites Example Vanguard iPad application (free in Apple's iTunes store) Seafood Web site: www.wildrhodyseafood.com Picozu editor: www.picozu.com/editor 139 to run on Android and recoded again to run on Windows.27 Thus, to reach all users, an organization will need to support and maintain three separate versions of the same application. It will also have to staff and manage three different development teams, with three different skill sets. As a general rule, the cost of native applications is high. Many organizations reduce that cost by outsourcing development to India and other countries, but native applications are still expensive relative to Web applications. The standard way to distribute native applications is via a company store, such as iTunes, owned by Apple. An excellent example of a native application is Vanguard’s iPad application. It is easy to use, has complex functionality, and is highly secure, as you would expect. Companies such as Vanguard must and can afford to pay for exceedingly high-quality applications. Developing Web Applications The third column in Figure 3-19 summarizes Web application characteristics. Such applications run inside a browser such as Firefox, Chrome, Opera, or Edge. The browser handles the idiosyncrasies of the operating system and underlying hardware. In theory, an organization should be able to develop a single application and have it run flawlessly on all browsers on all devices. Unfortunately, there are some differences in the way that browsers implement the Web code. This means that some applications won’t run correctly in some browsers. As shown in the first row of Figure 3-19, Web development languages are html5, css3, and Javascript. html5 is the latest version of html, which you will learn about in Chapter 4. The advantages of this version are support for graphics, animation, 2D animations, and other sophisticated user experiences. css3 is used with html5 to specify the appearance of content coded in html. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 140 CHAPTER 3 Hardware, Software, and Mobile Systems JavaScript is a scripting programming language that is much easier to learn than native-client languages. It is used to provide the underlying logic of the application. Web applications can be written by professional programmers, and, indeed, most are. However, it is possible for technically oriented Web developers and business professionals to develop them as well. The entry-level technical skill required is low, and simple applications are relatively easy to develop. But sophisticated user experiences are difficult. Web application developers may have degrees in computer science, information systems, or graphics design. The user experience provided by a Web application varies considerably. Some are simply fancy Web-based brochures (www.wildrhodyseafood.com); others are quite sophisticated, such as SpiroCanvas (www.gethugames.in/) or, even more impressive, www.biodigital.com. Web applications are limited by the capabilities of the browser. While browsers are becoming increasingly sophisticated, they cannot offer the full capabilities of the underlying operating system and hardware. Thus, Web applications are unable to support very specialized and complex applications, though this becomes less true each year. As stated, the major advantage of Web over native applications is that they will run on any operating system and device. There are some browser differences, but these differences are very minor when compared with the differences among iOS, Android, and Windows. In general, unlike native applications, you can assume that a Web application has one code base and one development team. Because Web applications can be developed by less skilled, lesser-paid employees and because only one code base and one development team are necessary, they are considerably cheaper to develop than native applications. However, this statement assumes applications of equivalent complexity. A simple native application can be cheaper to develop than a complex Web application. Users obtain Web applications via the Internet. For example, when you go to www.picozu.com/ editor. the required html5, css3, and JavaScript files are downloaded automatically over the Web. Updates to the application are automatic and seamless. You need not install (or reinstall) anything. This difference is an advantage to the user; it makes it more difficult, however, to earn money from your application. Amazon, for example, will sell your native application and pay you a royalty. However, unless you require users to buy your Web application (which is possible but rare), you’ll have to give it away. Which Is Better? You know the answer to that question. If it were clear-cut, we’d only be discussing one alternative. It’s not. The choice depends on your strategy, your particular goals, the requirements for your application, your budget, your schedule, your tolerance for managing technical projects, your need for application revenue, and other factors. In general, Web applications are cheaper to develop and maintain, but they may lack the wow factor. You and your organization have to decide for yourselves! Q3-6 Why Are Mobile Systems Increasingly Important? Mobile systems are information systems that support users in motion. Mobile systems users access the system from any place—at home, at work, in the car, on the bus, or at the beach—using any smart device, such as a smartphone, tablet, or PC. The possibilities are endless. Mobile systems users move not only geographically but also from device to device. The user who starts reading a book on an iPad on a bus, continues reading that book on a PC at work, and finishes it on a Kindle Fire at home is mobile both geographically and across devices. As shown in Figure 3-20, the major elements in a mobile system are users in motion, mobile devices, wireless connectivity, and a cloud-based resource. A mobile device is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity. Almost all mobile IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Mobile Device Users in Motion FIGURE 3-20 Elements of a Mobile Information System Wireless Connectivity Hardware, Software, and Mobile Systems 141 r Web sites r Services (IM, email, etc.) r Application code r Data sources Resources in the Cloud devices have a display and some means for data entry. Mobile devices include smartphones, tablets, smartwatches, and small, light laptops. Desktop computers, Xboxes, and large, heavy, powerhungry laptops are not mobile devices. You will learn about wireless connectivity and the cloud in Chapter 4. For now, just assume that the cloud is a group of servers on the other end of a connection with a mobile device. When downloading a book for a Kindle, for example, the cloud is one or more servers on the other end that store that book and download a copy of it to your device. The major reason for the importance of mobile systems is the size of their market. According to Cisco, at the end of 2016 there were 8 billion mobile devices generating 7.2 exabytes of traffic per month.28 By 2021, this will jump to 11.6 billion mobile devices generating more than 49 exabytes per month. That’s 1.5 devices for every person on the planet. Smartphones will account for nearly 86 percent of global mobile traffic.29 It took seven years after the launch of the first iPhone (2007–2014) for smartphones to achieve mainstream use by 70 percent of the U.S. market.30 That’s faster than any other technology except television in the early 1950s, which tied the smartphone adoption rate. The February 2018 Pew Research Center Mobile Fact Sheet shows that 95 percent of people in the United States owned a mobile phone and 77 percent owned a smartphone.31 The size of the mobile e-commerce, or m-commerce, market is expected to exceed $420B by 2021.32 Additionally, mobile use is favored by the young. According to Pew Research Center’s measures of mobile device use, the younger the age group, the greater the percentage of people with mobile devices. Further, younger people have more devices per capita than older groups.33 These young cohorts will further increase mobile systems use in the years to come. Because of this vast and growing market, mobile systems are having a major impact on business and society today—impact that is forcing industry change while creating new career opportunities for mobile-IS-savvy professionals, as well as large numbers of new, interesting mobile-IS-related jobs. Figure 3-21 summarizes the mobile-system impact for each of the five components of an information system. We will discuss each of the components in this figure, starting with hardware. Hardware Clearly, increasing demand for mobile systems means the sales of many more mobile devices, often at the expense of PC sales. Hewlett-Packard, a large PC manufacturer, learned this fact when it didn’t respond quickly enough to the onslaught of mobile devices and was forced to eliminate 27,000 jobs in 2012. In the future, there will be high demand for innovative mobile devices as well as cheap copycats. If you’re reading this book, you’re unlikely to be a hardware engineer, and if you’re not living in Asia, you’re also unlikely to be involved in hardware manufacturing. However, any market having 3.9 billion prospects is ripe with opportunities in marketing, sales, logistics, customer support, and related activities. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 142 CHAPTER 3 Hardware, Software, and Mobile Systems Hardware Software Data Procedures People Impact of mobile systems growth Many, many more mobile devices will be sold. Compact interfaces; new technology for active users; application scaling. More data, but more information? Less device real estate means fewer ads possible. Always on, always at work. Employee lifestyle becomes hybrid of personal and professional. Ability to thrive in a dynamic environment more important. Industry changes PCs less important; high demand (and requirement) for innovative devices as well as cheap copycats. html5, css3, and JavaScript increase capability of thin-clients. Loss of control. Ad model in danger? Personal mobile devices at work. More part-time employees and independent contractors. Career opportunities Jobs for mobile device sales, marketing, support. New technology levels the playing ƂGNFHQTJVON Business expertise needed for mobile requirements. New companies! Reporting and data mining even more important. Design of effective mobile reports. Innovative use of just-in-time data. Need for adjusting business processes gives another premium to nonroutine problem solvers. Independent contractors (and some employees) work where and when they want. What is this new social organism? FIGURE 3-21 Five Components of Mobile Change and Opportunity Software The reduced size of mobile devices requires the invention of new, innovative interfaces. The mobile user is an active user and expects an active screen experience. The premium will be for moving graphics, changing Web pages, and animation. Applications will need to scale from the very smallest to the very largest, while providing a user experience appropriate to the device’s size. Rapid technology change in mobile software continually levels the playing field. Today, for example, expert programmers in Objective-C better not relax. html5 and css3 are gaining popularity, and they will reduce the need for Objective-C expertise. Further, as you learned in Q3-5, while languages like Objective-C are difficult and time-consuming to learn, html5, css3, and JavaScript are less so. With the reduced barrier to entry, hordes of less experienced and less educated new entrants will appear as competitors. You might be one of them. Additionally, continually evolving software means new and exciting entrepreneurial opportunities. Are you sorry that you missed the early days working at Facebook? Right now, somewhere, there is another Mark Zuckerberg starting. . . well, what? Because of the continually changing software environment, new opportunities abound and will continue to do so for decades. Data Many more mobile systems mean an incredible amount of new data, data that professionals can use to create much more information. But, more data doesn’t necessarily mean more information. In fact, many business professionals believe they’re drowning in data while starving for information. What can be done with all of this mobile-systems data to enable humans to conceive information of greater value to them? Data mining and better reporting are good options. On the other hand, not all the news is good, at least not for many organizations. For one, smaller screens means less room for advertising, a factor that limited the success of the Facebook public offering in May 2012. Also, mobile systems increase the risk of organizations losing control over their data. In the past, employees used only computer equipment provided by the employer and connected only via employer-managed networks. In that situation, it is possible for the organization IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. ETHICS GUIDE FREE APPS FOR DATA You’re sitting in your Introduction to MIS class, and the professor starts talking about how profitable software development can be. He points out that billionaires like Bill Gates (Microsoft), Larry Ellison (Oracle), Larry Page (Google), and Mark Zuckerberg (Facebook) all made their fortunes by developing useful software. But a vocal classmate jumps in and points out that he’s never paid any of those people a penny. He uses Google Search, Gmail, and Facebook all for free. Yes, he uses Microsoft Office, but it’s the free online version through OneDrive. Even the apps on his smartphone are free. Then comes the perennial question, which also happens to be a major point of frustration for the tech industry: How do you make money from free apps? The professor says something about capturing market share, potential income, and future innovation. You’re not buying it. You’re interested in real income, not potential income. Nick the Data Broker The person sitting next to you, Nick, starts smiling broadly and nods his head. He’s in your group for your big class project. He leans over and whispers, “If you’re not paying for it, you are the product. Data is where you make money, not software. Give them the software, take the data, and make the money. It’s simple.” You’re a little confused at first. But then you think back to last Wednesday when you first met Nick. He said he was coming back to school to get a degree in MIS because he needed the technical knowledge for his new job with his brother’s company. He explained that his brother was a data broker (sometimes called an information broker). He buys data about individuals from companies and then sells it to other companies for a profit. It sounded like they were doing really well. Before you could even ask if it was legal or ethical, Nick quipped, “Yes, of course it’s legal. Everyone does it.” He had obviously gotten this question before. But was Nick right? He isn’t a billionaire like Bill Gates. Nick was only concerned with buying and selling data. He wasn’t interested in application development. But he did make a good point, and it got you thinking. What if you started a business that made applications that were designed to collect individual data? You could make dozens of useful apps, collect individual data, and then sell it to Nick. But what data would Nick pay for? How much of it could you get? He wouldn’t care about gaming data. But he would pay for data about user behavior like which Web sites they visit, where they’re located, who their friends are, and what they purchase. Flashlight Apps At lunch, you do a few searches about how mobile applications can access data on smartphones. It turns out that users just have to grant the application permission(s), and it can access any data on the phone. Could that be right? Any data? This could be a gold mine. You get excited at the prospect of harvesting thousands of terabytes of data and selling them to Nick. You could retire in a month. But then a sinking feeling comes over you. What if you’re not the first person to think of this idea? What if someone else is already giving away apps and harvesting users’ data. You decide to check the permissions for one of the most useful free applications you have on your phone—your flashlight app. You search for “flashlight app permissions” and you see dozens of news articles referencing a threat report by SnoopWall.34 The SnoopWall report looked at the permissions required by the top 10 flashlight apps for Android smartphones. The results were shocking. All of these apps did more than just turn a light on and off. They required permission to access data about your location, network connectivity, and USB storage. They also required permissions to install shortcuts, receive data to/from the Internet, modify your system settings, and disable your screen lock. The app you use was third on the list. Not good. You decide to check to see whether the report was accurate. Were these apps harvesting all this data? You look at the first six flashlight apps that show up in Google Play. The results are shown in the following table. The bottom three rows show the changes in the number of permissions from 2013, 2014, 2016, and 2018. Seeing all of the permissions required by these simple flashlight apps is distressing. Why would your flashlight need your GPS coordinates? Who was getting this data? What were they using it for? It looks like someone had already thought of your data-harvesting idea. It may be too late to make any money off the free-app-for-individual-data scheme. All of a sudden, these free apps don’t look as attractive to you—as a consumer. 143 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 144 CHAPTER 3 Hardware, Software, and Mobile Systems SuperBright LED Flashlight Brightest Flashlight Free Brightest LED Flashlight Take pictures and videos X X X Receive data from Internet X X** X Control flashlight X X X Permissions Flashlight HighPowered Flashlight Tiny Flashlight + LED X X X X X** X X X* Change system display settings X** X** X** Modify system settings X** X** X** Prevent device from sleeping X X X X* X X View network connections X X X X X X Full network access X X X X X X Run at startup X** Control vibration X X** X Retrieve running apps Modify or delete the contents of your storage X Read the contents of your storage X View Wi-Fi connections X Read phone status and identity X Read Home settings and shortcuts X X** X* Write Home settings and shortcuts Disable your screen lock Install shortcuts X Uninstall shortcuts X Approximate location X X** Precise location X X** Disable or modify status bar X** Draw over other apps X X** Other 3 Count 2013 20 15 13 9 15 6 Count 2014 8 15 13 9 15 7 Count 2016 6 14 8 5 6 7 Count 2018 8 16 10 7 12 8 * Dropped for 2018 ** Added for 2018 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 145 DISCUSSION QUESTIONS 1. Consider the decision to create a free application designed to harvest individual data. a. Is this decision ethical according to the categorical imperative? b. Is this decision ethical according to the utilitarian perspective? c. How would users react if they knew their data was being harvested in exchange for a free app? 2. Suppose Google becomes aware that apps in the Google Play store are harvesting user data unrelated to the function of the application. a. Does it have a legal obligation to find out which apps are harvesting data inappropriately? b. Does it have an ethical obligation to find out which apps are harvesting data inappropriately? c. Does Google provide free apps in exchange for individual data? Why? 3. How hard should Google work at curating apps in Google Play to ensure that appropriate permissions are set? 4. In 2014, Symantec found that 17 percent of all Android apps were malware in disguise.35 But a report by Google found that less than 1 percent of all Android devices had a potentially harmful application installed.36 a. Is it ethical for Google to remove applications it considers inappropriate? Consider both the categorical imperative and utilitarian perspectives. b. Is it ethical for Google to limit permissions for certain applications? Consider both the categorical imperative and utilitarian perspectives. to control who does what with which data and where. No longer. Employees come to work with their own mobile devices. Data leakage is inevitable. With more people switching to mobile devices and with less room for ads, online advertising revenue may be sharply reduced, possibly endangering the revenue model that supports most of the Web’s free content. If this happens, dramatic change is just around the corner! Procedures Mobile systems are always on. They have no business hours. And people who use mobile systems are equally always on. In the mobile world, we’re always open for business. It is impossible to be out of the office. One consequence of always-on is the blending of our personal and professional lives. Such blending means, in part, that business will intrude on your personal life, and your personal life will intrude on your business. This intrusion can be distracting and stressful; on the other hand, it can lead to richer, more complex relationships. Employees will expect to use their mobile devices at work, but should they? In truth, who can keep them from it? If the organization blocks them from connecting to the work-related networks, they can connect over the wireless networks that they pay for themselves. In this case, the organization is entirely out of the loop. Could employees send confidential corporate information through their personal mobile devices? We will discuss these issues in more detail in Q3-7. Mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed. A pharmaceutical salesperson uses just-in-time data when she accesses a mobile system to obtain the latest literature on a new drug while waiting for the doctor to whom she will pitch it. She needn’t remember the drug’s characteristics any longer than it takes her to walk down the hallway and make the sale. Furthermore, some organizations will passively wait for change to happen, while others will proactively reengineer their processes to incorporate mobile systems for higher process quality. Either way, the need for business process change creates opportunity for creative, nonroutine business problem solvers. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 146 CHAPTER 3 Hardware, Software, and Mobile Systems People Mobile systems change the value of our thinking. For example, just-in-time data removes the premium on the ability to memorize vast quantities of product data, but creates a premium for the ability to access, query, and present that data. Mobile systems increase the speed of business, giving an advantage to those who can nimbly respond to changing conditions and succeed with the unexpected. With the ability to be connected and always on, organizations may find they can be just as effective with part-time employees and independent contractors. The increasing regulatory complexity and cost of full-time employees will create an incentive for organizations to do just that. As that occurs, professionals who can thrive in a dynamic environment with little need for direct supervision will find that they can work both where and when they want, at least a good part of the time. Once you’re always on and remote, it doesn’t matter if you’re always on in New Jersey or at a ski area in Vermont. New lifestyle choices become possible for such workers. These mobile workers can work where they want and for whom they want. There won’t be a boss looking over their shoulder. They can work multiple jobs with different companies at the same time! Companies may have to change the way they pay workers. Instead of paying employees by the hour, they would need to focus more on paying for productivity. This shift toward focusing on performance will empower great employees and make it harder for slackers to hide out in an organization. Companies will benefit from mobile workers too. They won’t need as much expensive commercial office space. What an incredible time to be starting a business career! Q3-7 What Are the Challenges of Personal Mobile Devices at Work? So far, we’ve focused on mobile applications that organizations create for their customers and others to use. In this question we will address the use of mobile systems within organizations. In truth, organizations today have a love/hate relationship with their employees’ use of their own mobile devices at work. They love the cost-saving possibility of having employees buy their own hardware, but they hate the increased vulnerability and loss of control. The result, at least today, is a wide array of organizational attitudes. Consider a recent report by Tech Pro Research that estimates 74 percent of companies have adopted BYOD or are planning to do so.37 If you aren’t already bringing your own device to work, you’ll soon have to. Yet only 43 percent of all organizations have created an official mobile-use policy.38 Advantages and Disadvantages of Employee Use of Mobile Systems at Work Figure 3-22 summarizes the advantages and disadvantages of employee use of mobile systems at work. Advantages include the cost savings just mentioned as well as greater employee satisfaction of using devices that they chose according to their own preferences rather than organizationsupplied PCs. Because employees are already using these devices for their own purposes, they need less training and can be more productive. All of this means reduced support costs. On the other hand, employee use of mobile devices has significant disadvantages. First, there is the real danger of lost or damaged data. When data is brought into employee-owned computing devices, the organization loses control over where it goes or what happens to it. IBM, for example, disallowed the use of Apple’s voice searching application, Siri, on employees’ mobile devices for just that reason.39 Also, if an employee loses his or her device, the data goes with it, and when employees leave the organization, the data on their personal devices needs to be deleted somehow. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 FIGURE 3-22 Advantages and Disadvantages of Employee Use of Mobile Systems at Work 147 Hardware, Software, and Mobile Systems Advantages Disadvantages Cost savings Data loss or damage Greater employee satisfaction Loss of control Reduced need for training Compatibility problems Higher productivity Risk of infection Reduced support costs Greater support costs Organizations also lose control over the updating of software and the applications that users employ. This control loss leads to compatibility problems; users can process data, for example edit documents, with software that is incompatible with the organization’s standard software. The result to the organization is a mess of inconsistent documents. Possibly the greatest disadvantage of employee use of their own devices is the risk of infection. The organization cannot know where the users have been with their devices or what they’ve done when they’ve been there. The possibility of severe viruses infecting the organization’s networks is real. Finally, all of these disadvantages can also lead, ironically, to greater support costs. Given all that, organizations cannot avoid the issue. Whatever the costs and risks, employees are bringing their own devices to work. Ignoring the issue will simply make matters worse. Survey of Organizational BYOD Policy A bring your own device (BYOD) policy is a statement concerning employees’ permissions and responsibilities when they use their own device for organizational business. Figure 3-23 arranges BYOD policies according to functionality and control. Starting in the lower left-hand corner, the most primitive policy is to ignore mobile use. That posture, which provides neither functionality to the employee nor control to the organization, has no advantages and, as just stated, cannot last. The next step up in functionality is for the organization to offer its wireless network to mobile devices, as if it were a coffee shop. The advantage to the organization of this policy is that the organization can sniff employees’ mobile traffic, thus learning how employees are using their devices (and time) during work. Control High Low Functionality High FIGURE 3-23 Six Common BYOD Policies Low Full VPN Access to Organizational Systems You’re responsible for damage Organizational Services on Public Internet We’ll check it out, reload software and data, and manage it remotely If you connect it, we own it We’ll offer limited systems you can access from any device Access to Internet We’ll be a coffee shop None They don’t exist IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 148 CHAPTER 3 Hardware, Software, and Mobile Systems The next policy provides more functionality and somewhat more control. Here the organization creates secure application services using https that require employee sign-on and can be accessed from any device, mobile or not. Such applications can be used when employees are at work or elsewhere. These services provide controlled access to some organizations’ assets. A fourth policy is more of a strategic maneuver than a policy. The organization tells employees that they can sign on to the organization’s network with their mobile devices, but the employee is financially responsible for any damage he or she does. The hope is that few employees know what their exposure is and hence decide not to do so. A more enlightened policy is to manage the users’ devices as if they were owned by the organization. With this policy, employees turn over their mobile devices to the IS department, which cleanses and reloads software and installs programs that enable the IS department to manage the device remotely. Numerous vendors license products called mobile device management (MDM) software that assist this process. These products install and update software, back up and restore mobile devices, wipe employer software and data from devices in the event the device is lost or the employee leaves the company, report usage, and provide other mobile device management data. This policy benefits the organization, but some employees resist turning over the management of their own hardware to the organization. This resistance can be softened if the organization pays at least a portion of the hardware expense. The most controlling policy is for the organization to declare that it owns any mobile device that employees connect to its network. To be enforceable, this policy must be part of the employee’s contract. It is taken by organizations that manage very secure operations and environments. In some military/intelligence organizations, the policy is that any smart device that ever enters the workplace may never leave it. The advantages of these six policies are summarized in Figure 3-24. BYOD policies are rapidly evolving, and many organizations have not yet determined what is best for them. If your employer has a committee to develop such policies, join it if you can. Doing so will provide a great way to gain exposure to the leading technology thinkers at your organization. FIGURE 3-24 Advantages of Example BYOD Policies BYOD Policy Description Advantage to Organization They don’t exist Organization looks the other way when employees bring mobile devices to work. None We’ll be a coffee shop You’ll be able to sign in to our wireless network using your mobile device. Packet sniffing of employee mobile device use at work. We’ll offer limited systems you can access from any device Organization creates https applications with sign-in and offers access to noncritical business systems. Employees gain public access from any device, not just mobile devices, without having to use VPN accounts. You’re responsible for damage Threatening posture to discourage employee use of mobile devices at work. Appear to be permissive without actually being so. We’ll check it out, reload software, and then manage remotely Employees can use their mobile devices just as if they were computers provided by the corporate IS department. Employee buys the hardware (perhaps with an employer's contribution). If you connect it, we own it Employees are not to use mobile devices at work. If they do, they lose them. Part of employment agreement. Ultimate in control for highly secure work situations (intelligence, military). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Q3-8 Hardware, Software, and Mobile Systems 149 2029? There’s a really old movie called You’ve Got Mail (1998) starring Tom Hanks and Meg Ryan. In it, the characters get really excited when they get “mail.” The term email was so new at the time that it hadn’t even caught on yet. You can see people in the movie reading newspapers and paper books. Oh, how times have changed. Fast-forward to today. Email now comes in seconds after it’s sent. You check your email during commercial breaks while you’re watching TV, while you’re driving in traffic, and while you’re sitting on the toilet. Instead of checking your email with bated breath, you’re dreading seeing more work pile up in your inbox. Or worse—bills, spam, and viruses. New hardware and software have changed everyday life. People are always on, always connected, always communicating, always working and playing. This trend will continue. The Internet of Things will allow us to be continually connected to more and more devices. You’ll be able to control your home, and everything in it, from your smartphone. Your home will be so smart that it will analyze you. It will see what, how, and when you do things and then anticipate your needs. Imagine your TV turning on every morning at just the right time so you can watch the markets open (see Figure 3-25). You smell fresh-baked bread, your shower turns on by itself, and your car FIGURE 3-25 Smart Home Source: Si-Gal/iStock Vectors/Getty Images IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. SECURITY GUIDE POISONED APP-LES Have you ever stopped to look up at the stars on a clear night and seen a faint white light tracking slowly across the sky? If so, you’ve seen a satellite orbiting the earth at speeds exceeding thousands of miles per hour. What may surprise you is that early spacecraft launched by NASA had less computing power than your smartphone. That’s right—the small handheld device you use for checking social media and email and for playing games is more powerful than the first spacecraft. But why do you need all of that computing power? Phone calls and text messages don’t seem to require massive processing power. Welcome to the era of the “app”! Apps are the drivers of faster and more powerful smartphones. Apple and other smartphone manufacturers release new versions of their phones on an annual basis. Keeping up with the flashiest and most powerful apps drives the demand for faster processing chips and more memory. Advancements in both of these areas often happen without increasing the form factor of the phone or reducing battery life. Smartphone users have a seemingly insatiable appetite for apps. In 2017, the Apple App Store contained more than 2.2 million apps, reported 197 billion app downloads, and listed 12 million registered app developers.40 These apps allow you to do everything from making stock trades on the go to checking the latest weather conditions anywhere in the world. While most apps cost only a few dollars, many of them are free. You may be wondering, “How is this possible?” and “Are there any hidden costs?” You may be surprised to learn that free apps may not be such a great deal after all. accessed user credentials, hijacked URLs, were able to read and write data on devices, and compromised other iOS apps. WeChat, an app used extensively in China, was affected by XcodeGhost and contributed heavily to the tally of more than 500 million iOS users who could have been exposed to this dangerous malware.41 The malware was embedded in apps available on the App Store because developers chose to install a compromised version of the Xcode developers kit despite warnings that the software had been altered. Developers were downloading the compromised software because it had been posted on a server offering faster-than-standard download speeds. Once this vulnerability had been identified, Apple notified users that the dangerous apps had been removed from the XcodeGhost Haunts iOS The App Store is generally a well-regulated marketplace. Apps are screened for security vulnerabilities and vulgar content in order to create a safe experience for users. However, with more than 2 million applications available to consumers, it is inevitable that some malicious apps clear the screening process. Apple recently reported that dozens of apps available on the App Store contained a malware application named XcodeGhost. Apps containing this malware reportedly Source: © CarmenMurillo/iStock/Getty Images Plus 150 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 App Store and that they were collaborating with developers to ensure that this type of incident does not happen again. However, even with these apps identified and removed, this security breach begs the question “What other vulnerabilities are lurking in the App Store, and have you already downloaded any of these potential threats?” Installation App-rehension Have you ever been using your phone and seen an alert message indicating that one of the apps on your phone was accessing your location information in the background? If so, were you worried? Did you allow the app to continue monitoring your location, or did you shut it off? A key point to consider is that an app does not have to be considered malware to be dangerous or invasive. In fact, many of the apps on your phone are likely accessing data that are unrelated to the app’s specific purpose. For example, a survey of apps with built-in Hardware, Software, and Mobile Systems 151 networking tools revealed that 13 out of 15 of these apps uploaded all user contacts on the phone to remote servers managed by the app developers.42 Contact information can then be sold to advertisers and other third parties for a profit. This type of indirect information gathering is why many of the apps downloaded from the App Store are free. End users end up paying for them with their privacy. But why do users tolerate an invasion of their privacy? Users often fail to review the usage agreement for each app.43 Even more striking is that developers can change the terms of privacy agreements after a user has agreed to a prior version of the terms. Despite the tremendous convenience, productivity, and entertainment afforded by our phones and apps, there are hidden costs. These hidden costs may include the risk of downloading dangerous software or inadvertently allowing apps access to private data. A little app-rehension may help users prevent a serious privacy invasion or data theft. DISCUSSION QUESTIONS 1. Think about your use of various phone and computer apps and your interactions on social media. Have you ever experienced a breach of your privacy or personal data? What was the impact of this breach? Were you able to resolve it, or were you forced to live with the consequences? 2. Try to identify three different strategies that any smartphone user could follow in an attempt to minimize the risk of installing and using dangerous/risky apps. 3. Reflect on the trade-off between free apps and the potential privacy risks that these apps may introduce. Has this article changed your perception of free apps? If so, how? 4. Conduct an Internet search to identify if there have been any recent security vulnerabilities introduced through an app store (e.g., the App Store, Google Play, or Windows Phone Store). If so, conduct a brief investigation to see which apps are involved, how many people have been affected, and whether the vulnerability has been resolved. knows exactly when to self-start so it’s warm when you get in. Your self-driving car will let you work on your way to work. You’ll see these anticipatory systems at your job too. How will advances in hardware and software affect the types of jobs you’ll go to? Ten years from now, the best-paying jobs will be ones that don’t currently exist. The following are hot jobs today: IoT architect, marketing technologist, Big Data architect, and DevOps manager. These job titles didn’t exist 10 years ago. Ten years from now, there will be an entirely new set of jobs that you haven’t heard of before. How do you prepare for future jobs? What types of jobs will pay well? Regardless of your current college major, your future job will probably require a high level of tech skill. The best way to prepare for these types of jobs is to cultivate creativity, novel problem solving, and good judgment and have a sincere desire to learn new things. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CAREER GUIDE Name: Marshall Pettit Company: Preparis, Inc. Job Title: Senior Software Engineer Education: University of Utah Source: Marshall Pettit, Preparis, Inc. Sr. Software Engineer 1 How did you get this type of job? Networking. Never underestimate the value of professional lunches and close friends. Although my education and earlier experience differed substantially from my current job, a brilliant friend encouraged me to pursue my dreams as a software developer and gave me a strong referral to a company that had recently offered him a job. We started together, and he became an important mentor for me. 2 5 Learning quickly! Programming languages, platforms, and paradigms consistently change. Staying abreast of these changes is important for making positive contributions on a continuing basis. 6 What does a typical workday look like for you (duties, decisions, problems)? Each workday requires self-motivation and a strong commitment to our team. I meet briefly each morning with my team to review our progress and make sure it is in line with the goals and objectives we select at the beginning of each iteration, spanning 2 or 3 weeks. I also make myself available throughout the day to review their code and individual work, as they do for me. 4 What do you like most about your job? My home is my office, and my schedule is flexible. This allows me opportunities to coach my children’s sports teams, help with their homework, and support their daily needs. Are education or certifications important in your field? Why? Formal education is important in every field. Although my education differs from my current responsibilities, it provides me greater depth when interacting with business leaders as we develop solutions for the customers we serve. Certificates are not as important in my field. Instead, consistent informal study and practice at coding challenge websites pay greater dividends. What attracted you to this field? Web software development has always fascinated me since taking an elective during my undergraduate business management studies. Building complex yet elegant business systems using commands in a text editor is as fulfilling as building a home from raw materials and seeing it take shape. 3 What skills would someone need to do well at your job? 7 What advice would you give to someone who is considering working in your field? Just do it. Take a leap of faith and run with the challenges ahead. Courageously tackling your dream job in spite of the imaginary barriers around it will be both fun and rewarding. 8 What do you think will be hot tech jobs in 10 years? Artificial intelligence will provide the most intriguing opportunities in the coming years. Opportunities in machine learning, data science, and business intelligence will grow substantially. 152 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 Hardware, Software, and Mobile Systems 153 ACTIVE REVIEW Use this Active Review to verify that you understand the ideas and concepts that answer the chapter’s study questions. languages. Explain each cell of Figure 3-19. State which is better: native or Web applications. Justify your answer. Q3-1 What do business professionals need to know about computer hardware? Why are mobile systems increasingly important? List types of hardware and give an example of each. Define bit and byte. Explain why bits are used to represent computer data. Define the units of bytes used to size memory. Define mobile systems. Name and describe the four elements of a mobile system. Describe the size of the mobile market and explain why there are 3.9 billion mobile prospects. Explain why the mobile market will become stronger in the future. Explain why a problem for one organization is an opportunity for another. Using the five-component model, describe particular opportunities for each component. Define just-in-time data and explain how it changes the value of human thinking. How can new hardware affect competitive strategies? Q3-2 Define IoT and describe a smart device. Explain why smart devices are desirable. Give two examples of how businesses could benefit from smart devices. Describe the difference between AR, MR, and VR. Explain why sense of presence is important in virtual environments. Describe how self-driving cars could be safer and cheaper and make life easier. Explain how 3D printing works and how it could affect new product design, manufacturing, distribution, and consumer purchasing. Describe some of the benefits and risks of using a cryptocurrency like Bitcoin. Q3-3 What do business professionals need to know about software? Review Figure 3-12 and explain the meaning of each cell in this table. Describe three kinds of virtualization and explain the use of each. Explain the difference between software ownership and software licenses. Explain the differences among horizontal-market, vertical-market, and one-of-a-kind applications. Describe the three ways that organizations can acquire software. Is open source software a viable alternative? Q3-4 Define GNU and GPL. Name three successful open source projects. Describe four reasons programmers contribute to open source projects. Define open source, closed source, source code, and machine code. In your own words, explain why open source is a legitimate alternative but might or might not be appropriate for a given application. Q3-6 Q3-7 What are the challenges of personal mobile devices at work? Summarize the advantages and disadvantages of employees’ using mobile systems at work. Define BYOD and BYOD policy. Name six possible policies and compare them in terms of functionality and organizational control. Summarize the advantage of each to employers. Q3-8 2029? Explain how email usage has changed over the past 20 years. Describe how an anticipatory system might work. Explain how advances in hardware and software might change the types of jobs you take in the future. Using Your Knowledge with eHermes Suppose you are part of this eHermes team. Briefly summarize how the knowledge in this chapter would help you contribute. Explain why eHermes decided not to develop its own AI. Summarize the challenges it would face if it did decide to develop its own AI. What are the differences between native and Web applications? Q3-5 In your own words, summarize the differences between native applications and Web applications. In high-level terms, explain the difference between object-oriented languages and scripting IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 154 CHAPTER 3 Hardware, Software, and Mobile Systems KEY TERMS AND CONCEPTS Android 131 Application software 133 Augmented reality (AR) 123 Binary digits 119 Bitcoin 127 Bits 119 BlackBerry OS 131 Blockchain 128 Bring your own device (BYOD) policy 147 Bytes 119 Central processing unit (CPU) 118 Client 119 Closed source 137 Computer hardware 118 Cryptocurrencies 127 Custom-developed software 134 Desktop virtualization 133 Dual processor 118 Exabyte (EB) 120 Fiat currencies 128 Firmware 134 Gigabyte (GB) 120 GNU 135 GNU general public license (GPL) agreement 135 HoloLens 155 Horizontal-market application 134 Host operating system 131 Internet of Things (IoT) 121 iOS 131 Just-in-time data 145 Kilobyte (KB) 120 License 133 Linux 130 Machine code 137 macOS 130 Main memory 118 M-commerce 141 Megabyte (MB) 120 Microsoft Windows 130 Mixed reality (MR) 123 Mobile device 140 Mobile device management (MDM) software 148 Mobile systems 140 Modern-style application 130 Native application 129 Nonvolatile 121 Object-oriented 138 Off-the-shelf software 134 Off-the-shelf with alterations software 134 One-of-a-kind application 134 Open source 137 Operating system (OS) 128 PC virtualization 132 Personal computers 118 Petabyte (PB) 120 Phablet 118 Quad processor 118 RAM 118 Reality 123 Satoshi 128 Self-driving car 125 Sense of presence 124 Server 131 Server farm 119 Server virtualization 132 Site license 133 Smart device 121 Smartphone 118 Solid-state storage (SSD) 118 Source code 137 Storage hardware 118 Swift 138 Symbian 131 Tablets 118 Terabyte (TB) 120 Thick-client application 129 Thin-client application 129 Unix 130 Vertical-market application 134 Virtual 123 Virtualization 131 Virtual machines (vm) 131 Virtual reality (VR) 124 Volatile 121 Web application 129 Windows 10 (mobile) 131 Windows Server 131 Zettabyte (ZB) 120 MyLab MIS To complete the problems with MyLab MIS, go to EOC Discussion Questions in the MyLab. USING YOUR KNOWLEDGE 3-1. Microsoft offers free licenses of certain software prodMyLab MIS ucts to students at colleges and universities that participate in its Microsoft Imagine program (formerly known as the Microsoft DreamSpark program). If your college or university participates in this program, you have the opportunity to obtain hundreds of dollars of software for free. Here is a partial list of the software you can obtain: • Microsoft Access 2016 • Microsoft OneNote 2016 • Microsoft Windows Server 2016 • • • • a. Microsoft Project 2016 Microsoft Visual Studio 2017 Microsoft SQL Server 2017 Microsoft Visio 2016 Search www.microsoft.com, www.google.com, or www. bing.com and determine the function of each of these software products. b. Which of these software products are operating systems, and which are application programs? c. Which of these programs are DBMS products? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 d. Which of these programs should you download and install tonight? e. Either (1) download and install the programs in your answer to part d or (2) explain why you would choose not to do so. f. Does Microsoft Imagine provide an unfair advantage to Microsoft? Why or why not? 3-2. Visit the Open Source Initiative’s Web site at www.openMyLab MIS source.org. Summarize the mission of this foundation. Find the definition of open source on this site, and summarize that definition in your own words. Explain this foundation’s role with regard to open source licenses. Summarize the process for having a license approved by the foundation. Describe the advantage of having the foundation’s approval. 3-3. Suppose that you are Kamala at eHermes. List five criteria MyLab MIS you would use in helping eHermes decide whether it should make its own AI. Justify your criteria. Hardware, Software, and Mobile Systems 155 3-4. Describe how the class enrollment application at your university could benefit from a mobile application that uses the cloud. 3-5. Judging from your personal experience, describe the BYOD policy that appears to be in place at your university. Explain the advantages and disadvantages of the policy to you as a student and to the organization as a whole. How do you think that BYOD policy will change in the next five years? Explain your answer. 3-6. Read Q3-2 if you have not already done so. Critically evaluate the opinions of the author. Do you agree that advances in the IoT and self-driving cars will make life easier? Better? If so, say why. If not, explain what you think will happen when more smart devices and self-driving cars are adopted. Explain how you could prepare for a future high-tech job market. COLLABORATION EXERCISE 3 Using the collaboration IS you built, collaborate with a group of students to answer the following questions. In March 2016, Microsoft released the development edition of its new mixed-reality head-mounted device named Microsoft HoloLens. HoloLens differs from digital reality devices like Meta 2 or Oculus Rift because it is a stand-alone, untethered computing device. In other words, it doesn’t have to be plugged into a computer. It’s a complete Windows 10 computer.44 HoloLens has a custom-built holographic CPU, an Intel 32-bit processor, 2 GB of RAM, and 64 GB of storage. It can be used for 2 to 3 hours without being recharged, and it comes with Bluetooth/Wi-Fi connectivity. It also comes with a 2-megapixel HD video camera, four microphones, motion sensors, light sensors, environmental cameras, and a depth-sensing camera. As a result, HoloLens can do some pretty amazing things. It accepts voice commands and gesture commands (e.g., air tapping), it maps spaces in a room, and, most importantly, it creates holograms (virtual objects) in thin air. You can watch videos of how HoloLens works on its YouTube channel. In a recent demonstration, Microsoft showed how HoloLens could be used collaboratively by having two people in different locations fix a plumbing problem together. A person with a broken pipe was wearing HoloLens, and a person who knew how to fix the pipe was in a separate location. The person wearing the HoloLens could see 3D holographic arrows appear on the pipes indicating what needed to be done to fix the problem. The arrows were being hand-drawn on a tablet showing a live video feed from the HoloLens. In another example, designers and engineers at Autodesk use HoloLens to collaboratively create new products.45 Mechanical engineers, industrial designers, and marketing managers can all see the product as it’s being designed. They don’t have to iterate through numerous physical prototypes. They can make immediate changes to a virtual prototype before it’s even built. Volvo is using HoloLens in a similar way. The company has been able to reduce design times and potentially improve its manufacturing processes with the device. HoloLens also helps with sales. Using the device, customers can change the color of the car they’re looking at with one click. Salespeople can also show customers interactive demonstrations of a car’s built-in safety features (like automatic breaking sensors) in 3D holographic environments. The potential uses for HoloLens are staggering. Gamers won’t be stuck on the couch playing video games anymore; they will be able to play multiplayer holographic games anywhere with anyone—for 2 hours. HoloLens will also change the way people communicate. Microsoft engineers recently gave a demonstration of “holoportation” in which a real-time interactive 3D hologram of a person was holoported into another room. Users wearing HoloLens could interact with the person as if they were in the same room. Many other applications in education, entertainment, tourism, design, engineering, and movies are being developed. And, because HoloLens is one of the first mixed-reality devices to become commercially available, it’s likely that the best applications for this technology are still unknown. We simply don’t know what people will use it for. What is clear, however, is that big names like Google, Microsoft, and Apple are making large investments into mixed-reality devices like HoloLens. They see the potential and are voting with their wallets. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 156 CHAPTER 3 Hardware, Software, and Mobile Systems Recall the RAND study that stated there will be increased worldwide demand for workers who can apply new technology and products to solve business problems in innovative ways. Microsoft HoloLens is an excellent example of a new technology that will be applied innovatively. 3-10. Some people buy gaming consoles like Sony PlayStation 3-7. Consider uses for HoloLens at your university. How might 3-11. You will sometimes hear the expression “Emerging tech- HoloLens be used in architecture, chemistry, law, medicine, business, geography, political science, art, music, or any other discipline in which your team has interest? Describe one potential application for HoloLens for five different disciplines. nology is constantly leveling the playing field.” In other words, technology eliminates competitive advantages of existing companies and enables opportunities for new companies. How does this statement pertain to HoloLens, iPad, Windows 10, Apple, and Google? and Microsoft Xbox because of exclusive games. Not all video games are available on all consoles. How important might applications be in the success of digital reality devices like HoloLens, Meta 2, and Oculus Rift? 3-8. List specific features and benefits for each of the five applications you selected in question 3-7. 3-9. Describe, in general terms, the work that needs to be accomplished to create the applications you identified in question 3-7. CASE STUDY 3 The Apple of Your i A quick glance at Apple’s stock history in Figure 3-26 will tell you that Apple is an incredibly successful and dramatic company, having peaks around the turn of the century, in 2007–2008, 2012, 2015, and again in 2018. It currently has the highest market value of any public company worldwide. Apple has been so successful that the NASDAQ stock exchange concluded Apple’s price was skewing the price of the NASDAQ 100 Index and reduced Apple’s weight in that index from 20 percent to 12 percent. As of this writing, Apple stock is trading at $190 after hitting a recent low of $56 in 2013. But since Steve Jobs’s death (October 5, 2011), there haven’t been any groundbreaking products like the iPod, iPhone, and iPad. iWatch was released in 2015, but many initial reviews were tepid at best.46 There were already several smartwatches on the market that had similar functionality, and it had performance issues. Most importantly, it wasn’t clear if the iWatch provided enough value over the iPhone that was already in users’ pockets. In short, it wasn’t an immediate hit. So, what does the future look Apple Closing Stock Price $200 $180 $160 $140 $120 $100 $80 $60 $40 $20 Jul-18 Jul-17 Jul-16 Jul-15 Jul-14 Jul-13 Jul-12 Jul-11 Jul-10 Jul-09 Jul-08 Jul-07 Jul-06 Jul-05 Jul-04 Jul-03 Jul-02 Jul-01 Jul-00 Jul-99 Source: Financial data from finance. yahoo.com $0 Jul-98 FIGURE 3-26 Growth in Apple Stock Price IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 like for Apple and its shareholders? Uncertain, especially if you consider its past history without Jobs. Early Success and Downfall At the dawn of the personal computer age, in the early 1980s, Apple pioneered well-engineered home computers and innovative interfaces with its Apple II PC for the home and its Macintosh computer for students and knowledge workers. At one point, Apple owned more than 20 percent of the PC market, competing against many other PC vendors, most of which are no longer relevant (or in business). However, Apple lost its way. In 1985, Steve Jobs, Apple’s chief innovator, lost a fight with the Apple board and was forced out. He founded another PC company, NeXT, which developed and sold a groundbreaking PC product that was too innovative to sell well in that era. Meanwhile, Apple employed a succession of CEOs, starting with John Sculley, who was hired away from Pepsi-Cola where he’d enjoyed considerable success. Sculley’s knowledge and experience did not transfer well to the PC business, however, and the company went downhill so fast that CNBC named him the 14th worst American CEO of all time.47 Two other CEOs followed in Sculley’s footsteps. During this period, Apple made numerous mistakes, among them not rewarding innovative engineering, creating too many products for too many market segments, and losing the respect of the retail computer stores. Apple’s PC market share plummeted. Steve Jobs, Second Verse In 1996, Apple bought Jobs’s NeXT computing and gained technology that became the foundation of macOS High Sierra, today’s Macintosh operating system. The true asset it acquired, however, was Steve Jobs. Even he, however, couldn’t create an overnight miracle. It is exceedingly difficult to regain lost market share and even more difficult to regain the respect of the retail channel that had come to view Apple’s products with disdain. Even by 2011, Apple’s PC market share was in the range of 10 percent to 12 percent, down from a high of 20 percent in the 1980s. In response to these problems, Apple broke away from the PC and created new markets with its iPod, iPhone, and iPad. It also countered retailer problems by opening its own stores. In the process, it pioneered the sale of music and applications over the Internet. iPod, iPhone, and iPad devices are a marvel of creativity and engineering. They exude not only ease of use, but also now/wow/ fun coolness. By selling hot music for the iPod, Apple established a connection with a dynamic segment of the market that was willing to spend lots of money on bright, shiny objects. The ability to turn the iPhone on its side to rotate images probably sold more iPhones than anything else. With the iPad, portable devices became readable, and the market responded by awarding Apple Hardware, Software, and Mobile Systems 157 a 54 percent share of the mobile market.48 And Apple’s success continues with the iPhone 8, which, as of this writing, is selling well. All of this success propelled Apple’s stores not only beyond vanilla retailers like Murphy USA but also beyond the lofty heights of Tiffany & Co. In 2017, Apple stores were grossing more than $5,546 per square foot, compared with $2,951 for Tiffany and $3,721 for Murphy USA. Apple currently operates more than 500 such retail outlets and welcomes more than 1 million customers per day.49 Apple encourages customer visits and loyalty with its open and inviting sales floor, its Genius Bar help desk, and its incredibly well-trained and disciplined sales force. Salespeople, who are not commissioned, are taught to be consultants who help customers solve problems. Even some vocabulary is standardized. When an employee cannot solve a customer’s problem, the word unfortunately is to be avoided; employees are taught to use the phrase as it turns out instead.50 Try that on your next exam! Apple has sold more than 25 billion songs through its iTunes online store, 130 million books through its iBookstore, and a mere 75 billion applications downloaded through its App Store. Apple is now the number-one PC software channel.51 To encourage the development of iPhone and iPad apps, Apple shares its revenue with application developers. That would be more than $70B paid to developers over the years!52 Developers responded by creating 1,000,000 iOS applications, and an army of developers are at work building thousands more while you read this. By the way, if you want to build an iOS application, what’s the first thing you need to do? Buy a Macintosh. Apple closed its development to any other development method. Adobe Flash? No way. Apple claims that Flash has too many bugs, and perhaps so. Thus, Flash developers are excluded. Microsoft Silverlight? Nope. Microsoft developers are out in the cold too. The non-Apple development community was furious, and Apple’s response was, in essence, “Fine, we’ll pay our $70B to someone else.” The bottom line? Until Jobs’s death, every sales success fed every other sales success. Hot music fed the iPod. The iPod fed iTunes and created a growing customer base that was ripe for the iPhone. Sales of the iPhone fed the stores, whose success fed the developer community, which fed more applications, which fed the iPhone and set the stage for the iPad, which fed the App Store, which led to more loyal customers and, of course, to more developers. Apple Without Steve Jobs Apple’s future is uncertain. It floundered when Jobs was fired in the 1990s, and it could flounder again. Sure, it’ll be around for a long time, but the days of its incredible innovative leadership could be, alas, over. Smart investors must consider the innovations coming from Apple in a post-Steve-Jobs world. Will Apple’s IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 158 CHAPTER 3 Hardware, Software, and Mobile Systems new CEO, Tim Cook, take the same bold risks that Steve Jobs did? In the years since Tim took over, we’ve seen improvements to existing products like the iPhone, iPad, iMac, and iPod, but few new innovations beyond Apple Watch and Apple Pay. Will Apple come out with an iCar and iGoggles (mixed reality device) like many are hoping? Or will innovation at Apple be limited to incremental improvements to existing products? That’s the trillion dollar question. A huge question for many investors is whether the company can be successful without Steve Jobs. What do you think? Has Tim Cook been innovative enough since taking over Apple? Will he be a bold innovator like Steve Jobs? Would you be willing to invest in Apple with Tim Cook at the helm? Why or why not? 3-15. Microsoft took an early lead in the development of tablet devices (like the iPad), and it had the world’s leading operating system and applications for more than 20 years. Provide five reasons why Microsoft has not been able to achieve the same success that Apple has. Most industry analysts would agree that the skills and abilities of Microsoft’s 124,000 employees are as good, on average, as Apple’s. QUESTIONS 3-12. Which of Porter’s four competitive strategies does Apple engage in? Explain. 3-13. What do you think are the three most important factors in Apple’s past success? Justify your answer. 3-14. Steve Jobs passed away in October 2011. Until his 3-16. Considering your answers to the previous four questions if you had a spare $5,000 in your portfolio and wanted to buy an equity stock with it, would you buy AAPL (Apple)? Why or why not? death, he had been the heart and soul of Apple’s innovation. Today, 123,000 Apple employees continue onward in his absence with Tim Cook as the new CEO. Complete the following writing exercises. 3-17. Suppose your first job after graduating from college is working at a large insurance company. Your boss asks you to analyze the impact self-driving cars will have on revenues from car insurance policies. List four ways selfdriving cars could impact the insurance industry. Justify your answers. 3-18. Visit www.distrowatch.com. Click on one of the top five listed Linux distributions (like Mint, Manjaro, Debian, Ubuntu, or Solus). Click on the Screenshots link for that distribution. List some similarities between this operating system and your current operating system. Summarize the advantages and disadvantages of switching from your current operating system to a Linux distribution. ENDNOTES 1. Bernard Marr, “Really Big Data at Walmart: Real-Time Insights from Their 40+ Petabyte Data Cloud,” Forbes, January 23, 2017, accessed May 30, 2018, www.forbes.com/sites/bernardmarr/2017/01/23/reallybig-data-at-walmart-real-time-insights-from-their-40-petabyte-data-cloud. 2. Pamela Vagata and Kevin Wilfong, “Scaling the Facebook Data Warehouse to 300 PB,” Facebook.com, accessed May 30, 2018, https://code.facebook.com/posts/229861827208629/ scaling-the-facebook-data-warehouse-to-300-pb. 3. Kashmir Hill, “Blueprints of NSA’s Ridiculously Expensive Data Center in Utah Suggest It Holds Less Info Than Thought,” Forbes.com, accessed May 30, 2018, www.forbes.com/sites/kashmirhill/2013/07/24/ blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity-islessimpressive-than-thought. 4. Cisco Systems, Inc., “VNI Forecast Highlights,” Cisco.com, accessed May 30, 2018, www.cisco.com/c/m/en_us/solutions/service-provider/vniforecast-highlights.html. 5. Amazon, “Amazon Celebrates Biggest Holiday; More Than Four Million People Trialed Prime in One Week Alone This Season,” press release, 6. 7. 8. 9. 10. 11. December 26, 2017, accessed May 30, 2018, http://phx.corporate-ir. net/phoenix.zhtml?c=176060&p=irol-newsArticle&ID=2324045. General Electric, “Industrial Internet,” accessed May 30, 2018, www .ge.com/reports/tag/industrial-internet/. Ibid. Jennifer Warnick, “88 Acres: How Microsoft Quietly Built the City of the Future,” Microsoft Corp., accessed May 30, 2018, www.microsoft .com/en-us/news/stories/88acres/88-acres-how-microsoft-quietlybuiltthe-city-of-the-future-chapter-1.aspx. Allan V. Cook, Ryan Jones, Ash Raghavan, and Irfan Saif, “Digital Reality: The Focus Shifts from Technology to Opportunity,” Deloitte Insights, December 5, 2017, accessed May 30, 2018, www2.deloitte.com/insights/ us/en/focus/tech-trends/2018/immersive-technologies-digital-reality.html. Eric Johnson, “Choose Your Reality: Virtual, Augmented or Mixed,” Re/code, July 27, 2015, accessed May 30, 2018, www.casact.org/ community/affiliates/bace/0517/KPMG.pdf. See Microsoft’s site for the latest MR applications being developed for HoloLens: www.microsoft.com/microsoft-hololens/en-us. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 3 12. KPMG, “The Chaotic Middle: The Autonomous Vehicle, Insurance and Potential New Market Entrants,” May 12, 2017, accessed May 30, 2018, www.kpmg.com/US/en/IssuesAndInsights/ArticlesPublications/ Documents/automobile-insurancein-the-era-of-autonomous-vehiclessurvey-results-june-2015.pdf. 13. Saeed Elnai, “The Uber Accident, Waymo Technology and the Future of Self-Driving Cars,” Forbes, May 24, 2018, accessed May 30, 2018, www.forbes.com/sites/forbestechcouncil/2018/05/24/ the-uber-accident-waymo-technology-and-the-future-of-self-driving-cars. 14. Jack Nicas, “Apple, Spurned by Others, Signs Deal with Volkswagen for Driverless Cars,” The New York Times, May 23, 2018, accessed May 30, 2018, www.nytimes.com/2018/05/23/technology/apple-bmw-mercedesvolkswagen-driverless-cars.html. 15. KPMG, “The Chaotic Middle: The Autonomous Vehicle, Insurance and Potential New Market Entrants,” May 12, 2017, accessed May 30, 2018, www.kpmg.com/US/en/IssuesAndInsights/ArticlesPublications/ Documents/automobile-insurancein-the-era-of-autonomous-vehiclessurvey-results-june-2015.pdf. 16. Network of Employers for Traffic Safety, “10 Facts Employers Must Know,” accessed May 30, 2018, http://trafficsafety.org/safety/ fleet-safety/10-facts-employers-must-know. 17. Liz Stinson, “For Super Bowl, Nike Uses 3-D Printing to Create a Faster Football Cleat,” Wired, January 10, 2014, accessed May 30, 2018, www.wired.com/2014/01/nike-designed-fastest-cleat-history. 18. Scott Grunewald, “Nike’s 3D Printed Sprinting Shoe the Zoom Superfly Flyknit Will Be Worn at the 2016 Olympic Games in Rio,” 3DPrint.com, April 27, 2016, accessed May 30, 2018, https://3dprint.com/131549/ nike-zoom-superfly-flyknit. 19. See EDAG’s GENESIS prototype car at www.EDAG.de. 20. “Net Applications,” accessed May 30, 2018, www.netapplications.com. 21. Previously called metro-style. Name change by Microsoft, reputedly because of a trademark lawsuit from Europe. 22. “Net Applications,” accessed May 30, 2018, www.netapplications.com. 23. DistroWatch.com, accessed May 30, 2018, www.distrowatch.com. 24. “Net Applications,” accessed May 30, 2018, www.netapplications.com. 25. Pew Research Center, “Device Ownership,” February 1, 2018, accessed May 30, 2018, www.pewinternet.org/fact-sheet/mobile. 26. “Unlocking the Cloud,” The Economist, May 28, 2009. 27. Not quite true. Much of the design and possibly some of the code can be reused between native applications. But, for your planning, assume that it all must be redone. Not enough will carry over to make it worth considering. 28. Cisco Systems Inc., “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021 White Paper,” Cisco.com, March 28, 2017, accessed May 31, 2018, www.cisco.com/c/en/us/ solutions/collateral/service-provider/visual-networking-index-vni/mobilewhite-paper-c11-520862.html. 29. Ibid. 30. Horace Dediu, “Late Late Majority,” Asymco.com, May 4, 2016, accessed May 30, 2018, www.asymco.com/2014/07/08/ late-late-majority. 31. Pew Research Center, “Device Ownership,” February 1, 2018, accessed May 30, 2018, www.pewinternet.org/fact-sheet/mobile. 32. Statista, “Mobile Retail E-commerce Sales in the United States from 2013 to 2021 (in Billion U.S. Dollars),” Statista.com, accessed May 30, 2018, www.statista.com/statistics/249855/ mobile-retail-commerce-revenue-in-the-united-states/. 33. Pew Research Center, “Device Ownership,” February 1, 2018, accessed May 30, 2018, www.pewinternet.org/fact-sheet/mobile. Hardware, Software, and Mobile Systems 159 34. SnoopWall, “SnoopWall Flashlight Apps Threat Assessment Report,” October 1, 2014, SnoopWall.com, accessed May 30, 2018, www .snoopwall.com/threat-reports-10-01-2014. 35. Symantec Corporation, “Internet Security Report,” Symantec.com, Volume 20, April 2015, accessed May 30, 2018, www4.symantec .com/mktginfo/whitepaper/ISTR/21347932_GA-internet-securitythreatreport-volume-20-2015-social_v2.pdf. 36. Google, “Android Security 2014 Year in Review,” GoogleUserContent .com, accessed May 30, 2018, http://static.googleusercontent.com/media/ source.android.com/en/us/devices/tech/security/reports/Google_Android_ Security_2014_Report_Final.pdf. 37. Teena Maddox, “Research: 74 Percent Using or Adopting BYOD,” ZDNet, January 5, 2015, accessed May 30, 2018, www.zdnet.com/ article/research-74-percent-using-or-adopting-byod. 38. “CDH,” accessed May 30, 2018, www.cdh.com. 39. Robert McMillan, “IBM Worries iPhone’s Siri Has Loose Lips,” last modified May 24, 2012, www.cnn.com/2012/05/23/tech/mobile/ ibmsiri-ban/index.html?iphoneemail. 40. Artyom Dogtiev, “App Download and Usage Statistics,” BusinessofApps, May 25, 2018, www.businessofapps.com/data/app-statistics/. 41. Joe Rossignol, “What You Need to Know About iOS Malware XcodeGhost,” MacRumors, March 4, 2016, www.macrumors .com/2015/09/20/xcodeghost-chinese-malware-faq. 42. Larry Magid, “App Privacy Issues Deeply Troubling,” The Huffington Post, March 4, 2016, www.huffingtonpost.com/larry-magid/iphoneappprivacy_b_1290529.html. 43. Terrie Morgan-Besecker, “Cellphone Apps Can Invade Your Privacy,” Government Technology, March 4, 2016, www.govtech.com/applications/ Cellphone-Apps-Can-Invade-Your-Privacy.html. 44. Horia Ungureanu, “TAG Microsoft, HoloLens, Augmented Reality Microsoft HoloLens Full Processor, RAM and Storage Specs Revealed: All You Need to Know,” Tech Times, May 4, 2016, accessed May 30, 2018, www.techtimes.com/articles/155683/20160504/ microsofthololens-full-processor-ram-and-storage-specs-revealed-all-youneed-toknow.htm. 45. Ken Yeung, “Microsoft Partners with Autodesk to Bring 3D Product Design to HoloLens,” VentureBeat, November 30, 2015, accessed May 30, 2018, http://venturebeat.com/2015/11/30/ microsoft-partners-with-autodesk-to-bring-3d-product-design-to-hololens. 46. Will Shanklin, “Apple Watch Review: Elegant, Delightful . . . and Completely Optional,” April 29, 2015, Gizmag.com, accessed May 30, 2018, www.gizmag.com/apple-watch-review-iwatch-review/37244. 47. “Portfolio’s Worst American CEOs of All Time,” CNBC.com, accessed May 30, 2018, www.cnbc.com/id/30502091?slide=8. 48. “Net Applications,” accessed May 30, 2018, www.netapplications.com. 49. Marketing Charts, “Apple Remains the Retail Leader in Sales per Square Foot,” Marketingcharts.com, August 7, 2017, accessed May 30, 2018, www.marketingcharts.com/industries/ retail-and-e-commerce-79421. 50. Yukari Iwatani Kane and Ian Sherr, “Secrets from Apple’s Genius Bar: Full Loyalty, No Negativity,” Wall Street Journal, last modified June 15, 2011, http://online.wsj.com/article/SB10001424052702304563104 576364071955678908.html. 51. Apple presentation at the Apple Worldwide Developers Conference, June 6, 2011. 52. Apple Inc., “Developer Earnings from the App Store Top $70 Billion,” Apple.com, June 1, 2017, accessed May 30, 2018, www.apple.com/ newsroom/2017/06/developer-earnings-from-the-app-store-top70-billion/. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud “So, you think the cloud is the answer to our problems?” Jessica MyLab MIS Using Your Knowledge Questions 4-1, 4-2, 4-3 Ramma, CEO of eHermes, is meeting with Seth Wilson, director of IT services, and Victor Vazquez, COO, to discuss eHermes’ data storage costs. “Yes, that’s right. We could substantially reduce our costs if we outsourced our data storage to the cloud,” Seth says confidently. “The what?” Victor says, annoyed. “The cloud. We move all of our data to the cloud.” Jessica is curious. “OK, Seth, I’ll bite. What’s the cloud?” “We lease storage capacity from a third party and access it over the Internet.” Victor is confused. “You mean we’d lease hard drives rather than buy them?” 161 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 162 CHAPTER 4 The Cloud “How about $10 per “Well, not exactly. We wouldn’t be installing any more hard drives in our data center. The cloud would allow us to lease online storage on very, very flexible, pay-asyou-go terms. As our business grows, we can acquire more storage and scale it to meet our needs.” “You mean each day? We can change the terms of our lease on a daily basis?” Victor is skeptical. “OK, so how much does it cost? This can’t be cheap.” “How about $10 per terabyte?” Jessica’s puzzled at that. “What do you mean $10 per terabyte?” “I mean we can get 1 terabyte of online storage for about $10 per month.” Seth grins as he says this. “What?” Victor is dumbfounded. “Yeah, that’s it. We can get as much storage as we want, and our systems automatically upload all incoming data from our mobile storefronts. The net difference would be that our average monthly storage costs would be at least 50 percent less than they are now. And that’s not counting the power savings, the time saved doing backups, or the fact that we wouldn’t have to configure any additional new hardware.” Seth isn’t quite sure, but he thinks the actual storage costs could be less. “Seth, you’ve got to be kidding. We can save tens of thousands of dollars in storage costs. This is huge. The money we spend on storage has increased 350 percent in the past year. The company is growing so quickly, we’ll need these cost savings. Plus you have the new automated inventory identification development project you’re working on. The data storage costs on that project will be considerable.” As Victor says this, in the back of his mind he’s thinking, “If it’s true.” “Well, it’s good; I don’t know about huge. We’d have additional development costs to set up our systems, and that will take some time. I also worry about being locked into a single vendor, and I have some security concerns.” “Seth, give me a plan. I want a plan,” Jessica says, thinking what these savings could mean to the next two quarters . . . and beyond. “I’ll give you something next week.” “I want it by Friday, Seth.” terabyte?” Source: Haiyin Wang/Alamy Stock Photo Study QUESTIONS Q4-1 Why are organizations moving to the cloud? Q4-2 How do organizations use the cloud? Q4-3 What network technology supports the cloud? Q4-4 How does the Internet work? Q4-5 How do Web servers support the cloud? Q4-6 How can eHermes use the cloud? Q4-7 How can organizations use cloud services securely? Q4-8 2029? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud Chapter PREVIEW Q4-1 163 If you go into business for yourself, there’s an excellent chance you’ll have a problem just like eHermes’. What is the best way to support your information systems? Should you use the cloud? Most likely, the answer will be yes. So, then, which of your applications should use it and how? You need the knowledge of this chapter to participate in the conversations you’ll have. Of course, you could just rely on outside experts, but that doesn’t work in the 21st century. Many of your competitors will be able to ask and understand those questions—and use the money their knowledge saves them for other purposes. Or what if you work for a large company that has embraced the Internet of Things (IoT)? Will you make products that send and receive data across the Internet? How will your products connect to the cloud? Will a cloud offering make sense for you and your customers? How will you know without some knowledge of the cloud? We begin this chapter with an overview of where the cloud came from, why organizations are moving toward it, and how they use it. Then, in Q4-3 and Q4-4, we will discuss local area networks and the fundamentals of the Internet. We then look at how Web servers function, basic steps for setting up a cloud presence, and cloud security. We’ll wrap up with the cloud in 2029. Why Are Organizations Moving to the Cloud? We define the cloud as the elastic leasing of pooled computer resources over the Internet. The term cloud is used because most early diagrams of three-tier and other Internet-based systems used a cloud symbol to represent the Internet, and organizations came to view their infrastructure as being “somewhere in the cloud.” To understand its importance, you need to first know where the term the cloud came from. From about the early 1960s to the late 1980s, organizations primarily used mainframes, or large-scale high-speed centralized computers, for their internal data processing needs (see Figure 4-1). A mainframe architecture supported connections between a central mainframe and numerous thin clients (sometimes called computer terminals) which were essentially a screen, a keyboard, and a network connection. All applications, data, and processing power were located on the mainframe. There was no cloud as we currently understand it because the Internet had not yet arrived. By the early 1990s, Internet usage had started taking off. Users were connecting their personal computers (stand-alone clients) to the Internet and organizations were buying servers to host their Web sites and data (in-house hosting). As you read in Chapter 3, a client-server architecture allows clients (users) to send requests across the Internet to severs. Servers respond to requests by sending data back to clients. For example, a user sitting at home can click on a link that sends a Web request to a Web server. The Web server then sends a copy of the Web page back to the user. As shown in Figure 4-2, applications and data storage can reside on clients, servers, or both. Processing load can also be shared between clients and servers. Applications FIGURE 4-1 The Mainframe Era (1960s–1980s) Data Storage Thin Client Local Network Processing Mainframe IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 164 CHAPTER 4 The Cloud Applications FIGURE 4-2 The Client-Server Era (1990s–2000s) Internet Data Storage Processing Stand-Alone Client Server The client-server architecture was more appealing to organizations than mainframes because servers were much less expensive. Mainframes cost millions of dollars, but servers only cost thousands of dollars. Servers were also more scalable—or easily able to respond to incremental growth in demand—than mainframes because their incremental cost was lower. The client-server architecture also allowed users to access systems from anywhere in the world as long as they had an Internet connection. What we now know as the cloud had arrived, but modern cloud computing was still a few years away. Mainframes didn’t entirely go away with the advent of the client-server architecture. In fact, there are still some large organizations (e.g., large banks) that use mainframes to process daily transactions. Cloud Computing Until about 2008 or so, most organizations constructed and maintained their own computing infrastructure. Organizations purchased or leased hardware; installed it on their premises; and used it to support organizational email, Web sites, e-commerce sites, and in-house applications such as accounting and operations systems. After 2008, however, organizations began to move their computing infrastructure to the cloud. Cloud computing architecture allows employees and customers to access organizational data and applications located in the cloud. As shown in Figure 4-3, applications, data, and processing power can be used remotely with a variety of devices including PCs, thin clients, mobile devices, and IoT devices. Organizations no longer need to purchase, configure, and maintain expensive computing infrastructure. Organizations are shifting to the cloud for some of the same reasons they shifted to a client-server architecture—reduced costs and improved scalability. But there are additional benefits to using the cloud. At the beginning of this chapter we defined the cloud as the elastic leasing of pooled computer resources over the Internet. Consider each of the italicized terms in the definition to explore these benefits. IoT Devices Cloud Service Providers Mobile Clients Applications Data Storage Processing Thin Clients FIGURE 4-3 The Cloud Computing Era (2008–Current) Stand-Alone Clients IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 165 Elastic The term elastic, which was first used this way by Amazon.com, means that leased computing resources can be increased or decreased dynamically, programmatically, in a short span of time and that organizations pay for only the resources they use. Elasticity is not the same thing as scalability, which is the ability to respond to slow incremental growth in demand. A system’s ability to add 1,000 new clients per year for the next 10 years (an increase) is an example of scalability. A small local news channel’s ability to handle Web page requests from everyone on the planet about a one-time news story (massive increase and decrease) is an example of elasticity. Cloud-based hosting offers considerable elasticity that traditional client-server environments don’t offer. An organization could purchase enough server capacity to respond to any increase in demand, but it would be extremely expensive. The same organization could lease the capacity from a cloud vendor on an as-needed basis for a fraction of the price. Pooled The second key in the definition of the cloud is pooled. Cloud resources are pooled because many different organizations use the same physical hardware; they share that hardware through virtualization. Virtualization technology enables the rapid creation of new virtual machines. The customer provides (or creates in the cloud) a disk image of the data and programs of the machine it wants to provision. Virtualization software takes it from there. Virtualization increases the scalability of an organization’s systems because it can quickly respond to incremental growth in demand. New virtual machines can be created in a few minutes. But ordering, shipping, installing, and configuring a physical server can take days. Virtualization also reduces costs. Hundreds of virtual machines (virtual servers) can reside on a single physical server. Thus, the cost of the physical server is spread across each of the individual virtual machines. Over the Internet Finally, with the cloud, the resources are accessed over the Internet. “Big deal,” you’re saying. “I use the Internet all the time.” Well, think about that for a minute. Accessing resources over the Internet means they aren’t stored locally. From an organization’s point of view, it doesn’t have to have any servers on its premises anymore. It doesn’t have to pay for power to run its servers, buy backup generators in case the power goes out, lease the additional commercial space to store the servers, heat and cool the server room, or install specialized fire suppression systems in case a fire breaks out. It also doesn’t have to pay for someone to physically care for its servers by replacing broken parts or upgrading components. Physically managing your own computing infrastructure is costly. For many companies it has become too costly. Why Do Organizations Prefer the Cloud? It is likely that in the future all or nearly all computing infrastructure will be leased from the cloud, but we’re not there yet. Not all organizations have fully embraced cloud computing. There are still racks of servers filling up in-house data centers. But the list of companies that have embraced cloud computing is growing rapidly. Well-known organizations like Netflix, Verizon, Disney, GE, and Comcast have all shifted to the cloud.1 In fact, most people don’t realize how quickly organizations have shifted to the cloud. Amazon launched Amazon Web Services (AWS) in 2006 largely as an experiment. Most industry analysts saw it as a cost center that probably wouldn’t generate revenue for many years, if ever. As shown in Figure 4-4, by the first quarter of 2018 revenue from AWS was $5.44B,2 and annual revenue was expected to be $26.1B.3 That’s tremendous growth in a short period of time. AWS IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 166 CHAPTER 4 The Cloud Amazon Web Services (AWS) Revenue (in billions) $6.00 $5.11 Revenue in Billions $5.00 $4.58 $4.10 $4.00 $3.00 $2.00 $1.00 $5.44 $1.05 $1.01 $1.17 $1.42 $1.57 $1.82 $2.09 $2.41 $2.57 $2.89 $3.23 $3.54 $3.66 $– FIGURE 4-4 AWS Revenue Growth Companies that harvest user data from network-enabled devices and then sell them can create privacy concerns. The Ethics Guide on pages 176–177 examines these concerns. Q1 2014 Q2 Q3 Q4 Q1 2015 Q2 Q3 Q4 Q1 Q2 2016 Quarter Q3 Q4 Q1 2017 Q2 Q3 Q4 Q1 2018 also generated more than half of the operating income for Amazon as a whole and was growing twice as fast as its e-commerce counterpart. What is even more amazing is that Amazon boasts 33 percent market share of the cloud computing market with more than a million active customers!4 A million customers may not sound like a lot, but these aren’t individual consumers buying items on Amazon.com; they are large companies like Adobe Systems ($124B market cap), Netflix Inc. ($157B market cap), and Pfizer Inc. ($213B market cap). One million of this type of customer is a lot. Several factors have pushed organizations toward cloud-based hosting, including lower costs, ubiquitous access, improved scalability, and elasticity. But there are other reasons to shift to the cloud. Figure 4-5 compares and contrasts cloud-based and in-house (client-server) hosting. As you can see, the positives are heavily tilted toward cloud-based hosting. The cloud vendor Rackspace will lease you one medium server for less than a penny per hour. You can obtain and access that server today, actually within a few minutes. Tomorrow, if you need thousands of servers, you can readily scale up to obtain them. Furthermore, you know the cost structure; although you might have a surprise in terms of how many customers want to access your Web site, you won’t have any surprises about how much it will cost. Another positive is that as long as you’re dealing with large, reputable organizations, you’ll be receiving best-of-breed security and disaster recovery. In addition, you need not worry that you’re investing in technology that will soon be obsolete; the cloud vendor is taking that risk. All of this is possible because the cloud vendor is gaining economies of scale by selling to an entire industry, not just to you. Finally, cloud computing allows you to focus on your business, not spend time maintaining infrastructure. You can outsource functions that are not your core competency and focus on those that give you a competitive advantage. The negatives of cloud computing involve loss of control. You’re dependent on a vendor; changes in the vendor’s management, policy, and prices are beyond your control. Further, you don’t know where your data—which may be a large part of your organization’s value—is located. Nor do you know how many copies of your data there are or even if they’re located in the same country as you are. Finally, you have no visibility into the security and disaster preparedness that is actually in place. Your competition could be stealing your data and you won’t know it. The positives and negatives of in-house hosting are shown in the second column of Figure 4-5. For the most part, they are the opposite of those for cloud-based hosting; note, however, the need for personnel and management. With in-house hosting, not only will you have to construct your own data center, you’ll also need to acquire and train the personnel to run it and then manage those personnel and your facility. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud Cloud 167 In-house Positive: Small capital requirements Control of data location Speedy development In-depth visibility of security and disaster preparedness Superior scalability to growing or fluctuating demand Known cost structure Possibly best-of-breed security/disaster preparedness No obsolescence Industry-wide economies of scale, hence cheaper Focus on core business, not infrastructure Negative: Dependency on vendor Significant capital required Loss of control over data location Significant development effort Little visibility into true security and disaster preparedness capabilities Difficult (impossible?) to accommodate fluctuating demand Ongoing support costs Staff and train personnel Increased management requirements Annual maintenance costs Cost uncertainties Obsolescence FIGURE 4-5 Comparison of Cloud and In-House Alternatives When Does the Cloud Not Make Sense? The cloud can help keep critical systems online during periods of extreme demand. The Security Guide on pages 198–199 looks at how the cloud could have helped one such system. Cloud-based hosting makes sense for most organizations. The only organizations for which it may not make sense are those required by law or by industry standard practice to have physical control over their data. Such organizations might be forced to create and maintain their own hosting infrastructure. A financial institution, for example, might be legally required to maintain physical control over its data. Even in this circumstance, however, it is possible to gain many of the benefits of cloud computing using private clouds and virtual private clouds, possibilities we consider in Q4-7. Q4-2 How Do Organizations Use the Cloud? Now that you know what the cloud is, we will look at specific examples of how organizations use the cloud. We’ll look at how a car manufacturer can benefit from the cloud’s resource elasticity, pooling, and unique Internet connectivity. Resource Elasticity Suppose a car manufacturer creates an ad to run during the Academy Awards. It believes it has a fantastic ad that will result in millions of hits on its Web site. However, it doesn’t know ahead of time if there will be a thousand, a million, 10 million, or even more site visits. Further, the ad may appeal IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 168 CHAPTER 4 The Cloud more to one nationality than to another. Will 70 percent of those visits arise in the United States and the rest in Europe? Or will there be millions from Japan? Or Australia? Given this uncertainty, how does the car manufacturer prepare its computing infrastructure? The car manufacturer knows that if it cannot provide very short response time (say, a fraction of a second), it will lose the benefit of an incredibly expensive ad. On the other hand, if the ad is a flop, preprovisioning of thousands of servers will add to the accumulation of wasted money. Figure 4-6 shows an example of this situation, based on a real case supported by Amazon’s CloudFront. Suppose Figure 4-6 shows the processing on the car manufacturer’s Web site during the Academy Awards. Throughout the day, the car manufacturer is delivering less than 10 Gbps of its content to users. However, as soon as its ad runs (2 PM in the Hawaii-Aleutian time zone where the data was collected), demand increases sevenfold and stays high for half an hour. After the announcement of Best Picture, when the ad runs again, demand again increases to 30 and 40 Gbps for an hour and then returns to its base level. Without an increase in servers, response time will be 3 or 5 seconds or more, which is far too long to maintain the attention of an Academy Awards viewer. However, the car manufacturer has contracted with its cloud vendor to add servers, wherever needed worldwide, to keep response time to less than 0.5 seconds. Using cloud technology, the cloud vendor will programmatically increase its servers to keep response time below the 0.5-second threshold. As demand falls after the ad runs a second time, it will release the excess servers and reallocate them at the end of the awards. In this way, the car manufacturer need not build or contract for infrastructure that supports maximum demand. Had it done so, the vast majority of its servers would have been idle for most of the evening. And, as you’ll learn, the cloud vendor can provision servers worldwide using the cloud; if a good portion of the excess demand is in Singapore, for example, it can provision extra servers in Asia and reduce wait time due to global transmission delays. Pooling Resources The servers that the car manufacturer needed for these few hours were much less costly because it only needed them for a short time. The servers that it used for the Academy Awards can be reallocated to CPA firms that need them later that same day, to textbook publishers who need them for online student activity on Monday, or to the hotel industry that needs them later the next week. An easy way to understand the essence of this development is to consider electrical power. In the very earliest days of electric power generation, organizations operated their own generators to create power for their company’s needs. Over time, as the power grid expanded, it became possible to centralize power generation so that organizations could purchase just the electricity they needed from an electric utility. Both cloud vendors and electrical utilities benefit from economies of scale. According to this principle, the average cost of production decreases as the size of the operation increases. Major cloud Need: Scalability 80 Volume of Data Delivered (Gbps) 70 FIGURE 4-6 Example Video Banner Ad Customer Peak usage over 60 Gbps 60 50 40 30 20 10 0 8.00 AM 9.00 AM 10.00 AM 11.00 AM 12.00 PM 1.00 PM 2.00 PM 3.00 PM 4.00 PM 5.00 PM 6.00 PM 7.00 PM 8.00 PM 9.00 PM IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 169 FIGURE 4-7 Apple Data Center in Maiden, NC Source: ©2018 Google LLC, used with permission. Google and the Google logo are registered trademarks of Google LLC. vendors operate enormous Web farms. Figure 4-7 shows the building that contains the computers in the Web farm that Apple constructed in 2011 to support its iCloud offering. This billion-dollar facility contains 505,000 square feet.5 Amazon, IBM, Google, Microsoft, Oracle, and other large companies each operate several similar farms worldwide. Over the Internet The car manufacturer in the previous example has contracted with the cloud vendor for a maximum response time; the cloud vendor adds servers as needed to meet that requirement. As stated, the cloud vendor may be provisioning, nearly instantaneously, servers all over the world. How does it do that? And not for just one customer, like the car manufacturer, but for thousands? In the old days, for such interorganizational processing to occur, developers from the car manufacturer had to meet with developers from the cloud vendor and design an interface. “Our programs will do this, providing this data, and we want your programs to do that, in response, sending us this other data back.” Such meetings took days and were expensive and error-prone. Given the design, the developers then returned home to write code to meet the agreed-on interface design, which may not have been understood in the same way by all parties. It was a long, slow, expensive, and prone-to-failure process. If organizations had to do that today, cloud provisioning would be unaffordable and infeasible. Instead, the computer industry settled on a set of standard ways of requesting and receiving services over the Internet. You will learn about some of these standards in Q4-5. For now, just realize those standards enable computers that have never “met” before to organize a dizzying, worldwide dance to deliver and process content to users on PCs, iPads, Google phones, Xboxes, and even exercise equipment in a tenth of second or less. It is absolutely fascinating and gorgeous technology! Unfortunately, you will have the opportunity to learn only a few basic terms in Q4-3 and Q4-4. Cloud Services from Cloud Vendors Organizations can use the cloud in several different ways. The first and most popular way is obtaining cloud services from cloud service vendors. But not all organizations use cloud services to the same extent. You can use more of the cloud or less. It’s up to you. As a business professional, you’ll need to understand the differences in cloud service levels. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 170 CHAPTER 4 The Cloud To help you understand these differences, we’ll use a metaphor related to transportation and then relate it to cloud service offerings. Transportation as a Service Suppose you need to get to and from work each day. You have four options for satisfying your transportation needs. You can build a car, buy a car, rent a car, or take a taxi. Each has its own advantages and disadvantages. As shown in Figure 4-8, at one end of the spectrum, you manage your own transportation completely (building a car). At the other end of the spectrum, your transportation is managed by someone else (a taxi service). For example, if you decide to buy a car rather than build one, you are essentially outsourcing some of your transportation to a car manufacturer. You don’t have to buy the car parts, assemble the car, or test it to make sure it works properly. It might initially seem cheaper to build your own car. But realistically, you may not have the time, knowledge, skill, or patience to actually build a reliable car. It may end up cheaper to buy a car rather than build one. Similarly, if you decide to rent a car, you’re essentially outsourcing more of your transportation to someone else. By renting a car you don’t have to pay for vehicle registration and taxes. You also don’t have to make any repairs or clean the car. You’re doing less work but potentially paying more. The same is true of the difference between renting a car and taking a taxi. If you take a taxi, you don’t have to buy car insurance, drive the car, or buy gas. In fact, you don’t even need a driver’s license. Again, you’re accomplishing the same thing—getting to and from work. You’re just managing less of your transportation. Types of Cloud Service Offerings The “transportation as a service” metaphor helps explain how organizations use cloud services to move away from a traditional on-premises model in which they must provide all services internally. Depending on their choice of cloud services, organizations manage less of their infrastructure, platform, and software functions. In general, one type of service isn’t necessarily better than another. What is best for an individual organization depends upon the way in which its managers want to use the cloud. Cloudbased service offerings can be organized into the three categories shown in Figure 4-9. As shown in Figure 4-10, the most basic cloud offering is infrastructure as a service (IaaS), which is the cloud hosting of a bare server computer, data storage, network, and virtualization. Rackspace Inc. provides hardware for customers to load whatever operating system they want, and FIGURE 4-8 Transportation as a Service Build a Car Buy a Car Rent a Car Take a Taxi Traditional On-Premises Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Gas Gas Gas Gas Driving Driving Driving Driving Insurance Insurance Insurance Insurance Cleaning Cleaning Cleaning Cleaning Repairs Repairs Repairs Repairs Registration Registration Registration Registration Testing Testing Testing Testing Assembly Assembly Assembly Assembly Auto Parts Auto Parts Auto Parts Auto Parts You Manage Vendor Manages IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud FIGURE 4-9 Three Fundamental Cloud Types Cloud Service Users Examples SaaS Employees Customers Salesforce.com iCloud Office 365 PaaS Application developers Application testers Google App Engine Microsoft Azure AWS Elastic Beanstalk IaaS Network architects Systems administrators Amazon EC2 (Elastic Compute Cloud) Amazon S3 (Simple Storage Service) 171 Amazon licenses S3 (Simple Storage Service), which provides unlimited, reliable data storage in the cloud. The cost savings of IaaS over traditional on-premises hosting can be substantial. The second category of cloud hosting is platform as a service (PaaS), whereby vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS. Microsoft Windows Azure, for example, provides servers installed with Windows Server. Customers of Windows Azure then add their own applications on top of the hosted platform. Microsoft SQL Azure provides a host with Windows Server and SQL Server. Oracle On Demand provides a hosted server with Oracle Database. Again, for PaaS, organizations add their own applications to the host. Amazon EC2 provides servers with Windows Server or Linux installed. An organization that provides software as a service (SaaS) provides not only hardware infrastructure and an operating system but application programs and databases as well. For example, Salesforce.com provides hardware and programs for customer and sales tracking as a service. Similarly, Google provides Google Drive and Microsoft provides OneDrive as a service. With Office 365, Exchange, Skype for Business, and SharePoint applications are provided as a service “in the cloud.” For each of these applications, you just sign up for them and learn how to use them. You don’t have to worry about buying hardware, loading an operating system, setting up a database, or installing software. All of that is managed by the cloud service provider. Much like using a taxi—you just jump in and go. As a business professional you’ll need to know the advantages and disadvantages of onpremises hosing, IaaS, PaaS, and SaaS. Your choice of cloud service will be driven by your competitive environment, business strategy, and technical resources. Much like the “transportation as a service” metaphor mentioned earlier, not everyone should build, own, or even rent a car. If you’re a working professional living in a big city, maybe taking a taxi is your best transportation option (SaaS). If you’re always on the road traveling for business, renting a car in each city might be the right choice (PaaS). If you own a large package delivery company, you might want FIGURE 4-10 Cloud Service Offerings Traditional On-Premises Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Applications Applications Applications Applications Data Data Data Data Runtime Runtime Runtime Runtime Middleware Middleware Middleware Middleware OS OS OS OS Virtualization Virtualization Virtualization Virtualization Servers Servers Servers Servers Storage Storage Storage Storage Network Network Network Network You Manage Vendor Manages IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 172 CHAPTER 4 The Cloud to buy a fleet of trucks (IaaS). If you’re a high-performance racecar driver, you may need to build your own specialized racing vehicle (on-premises). Making the right choice between cloud services is really more about finding the right fit with your organization’s needs. Content Delivery Networks Another major use of the cloud is to deliver content from servers placed around the world. A content delivery network (CDN) is a system of hardware and software that stores user data in many different geographical locations and makes those data available on demand. A CDN provides a specialized type of PaaS but is usually considered in its own category, as it is here. To understand how a CDN delivers content, let’s compare it to how traditional servers deliver content. Figure 4-11 shows a server located in California delivering content to users around the United States. Suppose this hypothetical California-based media company streams HD movies to millions of homes around the country. The bandwidth usage from this company would be tremendous. To give you an idea of how much this might be, reports indicate that Netflix traffic consumes 35 percent of all Internet traffic in North America during peak evening hours.6 This level of bandwidth consumption would be costly to deliver and would slow content delivery from other companies. Figure 4-12 shows how this online media company could use a CDN to store copies of its movies. The CDN vendor replicates movies on servers, possibly worldwide, in order to speed up response time. When a user at home requests a movie, the request is transmitted to a routing server that determines which CDN server will deliver the movie to the user the fastest. Because traffic changes rapidly, such determinations are made in real time. A request for content at one moment in time could be served by a computer in, say, San Diego, and a few moments later, that same request from that same user might be served by a computer in Seattle. In addition to movies, CDNs are often used to store and deliver content that seldom changes. For example, the company banner on an organization’s Web page might be stored on many CDN servers. Various pieces of the Web page could be obtained from different servers on the CDN; all such decisions are made in real time to provide the fastest content delivery possible. Figure 4-13 summarizes CDN benefits. The first two are self-explanatory. Reliability is increased because data are stored on many servers. If one server fails, any of a potentially large number of other servers can deliver the content. You will learn about denial-of-service (DoS) attacks. For now, just understand that such security threats send so much data to a given server that the server’s performance for legitimate traffic becomes unacceptable. By having multiple servers, CDNs help to protect against such attacks. FIGURE 4-11 Traditional Server Content Distribution Media Company Home Users IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 173 Media Company Home Users FIGURE 4-12 Distributed CDN Servers CDN Server In some cases, CDNs reduce access costs for mobile users (those who have a limited data account). By delivering the data faster, site connection charges can be reduced. Finally, many (but not all) CDN services are offered on a flexible, pay-as-you-go basis. Customers need not contract for fixed services and payments; they pay only for what they use, when they use it. Some of the leading CDN vendors include Amazon CloudFront, Akamai, CloudFlare CDN, and MaxCDN. Using Web Services Internally The final way that organizations can use cloud technology is to build internal information systems using Web services. Strictly speaking, this is not using the cloud because it does not provide elasticity or the advantages of pooled resources. It does advantageously use cloud standards, however, so we include it here. Figure 4-14 shows a Web services inventory application at a hypothetical online bicycle part retailer named Best Bikes. In this example, Best Bikes is running its own servers on its own infrastructure. To do so, Best Bikes sets up a private internet within the company, an internet that is generally not reachable from outside the company. Best Bikes writes the applications for processing inventory using Web services standards, applications publish a WSDL, the Web services are accessed by other applications within the company using SOAP, and data are delivered using JSON. Application users access the inventory Web services using JavaScript that is sent down to the users’ browsers. All of these will be discussed later in this chapter in Q4-5. Users of the inventory Web services include Sales, Shipping, Customer Service, Accounting, and other departments. Internal applications can use the inventory Web services like building blocks. They can use the services that they need—and no more. Because the Web services are Benefits of Content Delivery Networks FIGURE 4-13 Benefits of Content Delivery Networks • • • • • • Decreased, even guaranteed, loadtime Reduced load on origin server Increased reliability Protection from DoS attacks Reduced delivery costs for mobile users Pay-as-you-go IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 174 CHAPTER 4 The Cloud Private Internet Browsers in Browsers in Sales Dept in Browsers Sales Dept in Browsers Sales Dept in Browsers Sales Dept in Browsers Sales Dept in Browsers Sales Dept Sales Dept Inventory application service requests & responses FIGURE 4-14 Web Services Principles Applied to Inventory Applications Browsers in Browsers in Customer Browsers in Customer Browsers in Service Customer Service Customer Service Service Inventory Applications Inventory application service requests & responses Web Servers Database server service requests & responses Browsers in Browsers in Shipping Browsers in Shipping Browsers in Shipping Browsers in Shipping Shipping DBMS Browsers in Browsers in Accounting Browsers in Accounting Accounting DB Database Server encapsulated, the inventory system can be altered without affecting other applications. In this way, systems development is more flexible, and it will be faster and hence less costly. As stated, however, this is not a cloud. In this example, Best Bikes has a fixed number of servers; no attempt is made to make them elastic. Also, the servers are dedicated to inventory. During idle periods, they are not dynamically reused for other purposes. Some organizations remove this limit by creating a private cloud, as discussed in Q4-7. Q4-3 What Network Technology Supports the Cloud? A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly. As shown in Figure 4-15, the four basic types of networks are personal area networks, local area networks, wide area networks, and internets. A personal area network (PAN) connects devices located around a single person. Most PAN devices connect wirelessly to other devices located within 10 meters. A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that operates the LAN. The number of connected computers can range from two to several hundred. The distinguishing characteristic of a LAN is a single location. A wide area network (WAN) connects computers at different geographic locations. The computers in two separated company sites must be connected using a WAN. To illustrate, a smartwatch or fitness tracker will create a PAN by connecting to a student’s smartphone. The computers for a college of business located on a single campus can be connected via a LAN. The computers for a college of business located on multiple campuses must be connected via a WAN. Type FIGURE 4-15 Basic Network Types Characteristic Personal area network (PAN) Devices connected around a single person Local area network (LAN) Computers connected at a single physical site Wide area network (WAN) Computers connected between two or more separated sites The Internet and internets Networks of networks IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud See what a typical workday would look like for someone who manages networks in the Career Guide on page 201. 175 The single- versus multiple-site distinction between LANs and WANs is important. With a LAN, an organization can place communications lines wherever it wants because all lines reside on its premises. The same is not true for a WAN. A company with offices in Chicago and Atlanta cannot run a wire down the freeway to connect computers in the two cities. Instead, the company contracts with a communications vendor licensed by the government and that already has lines or has the authority to run new lines between the two cities. An internet is a network of networks. Internets connect LANs, WANs, and other internets. The most famous internet is “the Internet” (with an uppercase letter I), the collection of networks you use when you send email or access a Web site. In addition to the Internet, private networks of networks, called internets, also exist. A private internet used exclusively within an organization is sometimes called an intranet. The networks that make up an internet use a large variety of communication methods and conventions, and data must flow seamlessly across them. To provide seamless flow, an elaborate scheme called a layered protocol is used. The details of protocols are beyond the scope of this text. Just understand that a protocol is a set of rules and data structures for organizing communication. Computers need to use protocols so they can exchange data. People use similar protocols to communicate. People, for example, follow a conversational protocol that says when one person talks, the other person listens. They switch back and forth until they are done communicating. Without a protocol for conversations, people would continually talk over each other and nothing would be communicated. There are many different protocols; some are used for PANs, some are used for LANs, some are used for WANs, some are used for internets and the Internet, and some are used for all of these. We will identify several common protocols in this chapter. What Are the Components of a LAN? As stated, a LAN is a group of computers connected together on a single site. Usually the computers are located within a half-mile or so of each other. The key distinction, however, is that all of the computers are located on property controlled by the organization that operates the LAN. This means that the organization can run cables wherever needed to connect the computers. Figure 4-16 shows a LAN typical of those in a small office or home office (SOHO). Typically, such LANs have fewer than a dozen or so computers and printers. Many businesses, of course, operate LANs much larger than this one. The principles are the same for a larger LAN, but the additional complexity is beyond the scope of this text. The computers and printers in Figure 4-16 communicate via a mixture of wired and wireless connections. Some devices use wired connections, and others use wireless connections. The devices and protocols used differ for wired and wireless connectivity. The Institute for Electrical and Electronics Engineers (IEEE, pronounced “I triple E”) sponsors committees that create and publish protocol and other standards. The committee that addresses LAN standards is called the IEEE 802 Committee. Thus, IEEE LAN protocols always start with the numbers 802. The IEEE 802.3 protocol is used for wired LAN connections. This protocol standard, also called Ethernet, specifies hardware characteristics, such as which wire carries which signals. It also describes how messages are to be packaged and processed for wired transmission over the LAN. Most personal computers today support what is called 10/100/1000 Ethernet. These products conform to the 802.3 specification and allow for transmission at a rate of 10, 100, or 1,000 Mbps (megabits per second). Switches detect the speed a given device can handle and communicate with it at that speed. If you check computer listings at Dell, Lenovo, and other manufacturers, you will see PCs advertised as having 10/100/1000 Ethernet. Today, speeds of up to 1 Gbps are possible on wired LANs. By the way, the abbreviations used for communications speeds differ from those used for computer memory. For communications equipment, K stands for 1,000, not 1,024 as it does for IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. ETHICS GUIDE REVERSE ENGINEERING PRIVACY Wendy entered the classroom and made her way up the stairs to the back row. She normally didn’t like to sit in the back of the room, but she had been late on the first day of class, and the instructor had mandated assigned seating during that session. The semester felt like it was dragging on, and she couldn’t wait to begin her marketing internship in the city that summer. She had worked for the same company the previous summer, and she was confident that she would be offered a full-time position once she graduated. Her thoughts of city life were interrupted when the instructor entered at the front and abruptly started class. The class was required for business students, and it covered a variety of technology-related topics. The session began in the usual way—with an overview of current popular press articles. The instructor started the class by discussing an article that quickly grabbed the attention of the class. “Did you know that billboards are spying on you?” he said. “Well, let me rephrase that—they are not exactly spying, but they do know more about you than you think.” The Billboards Are Watching “You may have noticed a number of digital billboards popping up around the city,” the instructor continued. “They can be programmed to display a variety of ads throughout the day. If you’ve seen one, you may have thought it just cycles through a fixed set of advertisements over the course of the day, changing about every 10 seconds. However, the ad selection process is very dynamic, and the time of day that each advertisement is displayed is quite intentional. In fact, the billboard knows which types of demographic and socioeconomic segments are driving by the billboard throughout the day.”7 The class seemed skeptical about this statement—how could this be possible? The instructor then explained how it worked. “Cell phone companies collect vast quantities of location data about their customers. This is because customers’ phones are continuously communicating their location to cell towers in order to send and receive data. They also manage the process of identifying the nearby towers with the strongest signal. As a by-product of this process, phone companies know where you are at all times of the day as long as you are carrying your phone.” The instructor smiled matter-of-factly and continued, “They then take these massive data sets containing customer location data and sell them to third parties, in this case, companies advertising via billboards. These companies then analyze the location data and segment people into various groups—sports fans who have been to a stadium several times, people who like sailing and spend time at the yacht club every weekend, people who stop at a specific coffee shop every morning. Once these segments are identified, advertising companies determine when the highest number of people in each segment are driving by the digital billboards and display targeted ads accordingly.” Privacy Please After describing the general process of how these billboards work, the instructor opened up the floor for students to comment. The students seemed to fall into one of two distinct Source: Aurélio Scetta/Alamy Stock Vector 176 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud opinions. Some thought the technology was cool and that billboards displaying targeted advertisements based on their data was yet another example of the innovation and limitless reach of the information age. Others found the billboards to be another egregious example of companies operating with reckless abandon concerning the privacy and security of consumer data. After a number of students on each side shared their thoughts, the instructor offered some new insights to take the discussion a step further. “Those of you who are concerned about the security of your data are justified in your position. There was a recent article that discussed the agreement you make when you allow apps on your phone to access your location data—you are essentially agreeing that they can take your data and sell it, and it may pass between any number of third parties before it is actually used for targeted advertising. This clearly poses a potential security risk if the data is compromised. This is 177 especially worrisome because companies are not diligent about removing personally identifiable information (PII).8 And to make matters worse, it was recently revealed that Android phones were collecting and storing location data even when location-based services were disabled.”9 These revelations riled up the class even more and further polarized the two groups of students. Wendy wasn’t exactly sure to which camp she belonged. As a marketing major, she recognized the tremendous potential in creating targeted advertising campaigns. However, as a private citizen, the thought of companies knowing everywhere she had been since she started using her cell phone and the ease with which these companies shared this data with other organizations without her permission felt wrong and unsettling. She started wondering about her future career in marketing. Could she work for a company that takes advantage of consumer data—her data—in this way? DISCUSSION QUESTIONS 1. According to the definitions of the ethical principles defined previously in this book: a. Do you think tracking a customer’s physical location throughout the day is ethical according to the categorical imperative? b. Do you think tracking a customer’s physical location throughout the day is ethical according to the utilitarian perspective? 2. Why do you think Wendy is conflicted? Is it OK to track other people but not want your own movements tracked? Why? 3. Most people don’t read the terms when they sign up for a new service. Do you think it’s OK for a company to do whatever it wants with customer data if it specifically notes it in the terms of the contract? If the contract is extraordinarily lengthy, written in legalese, and displayed in a tiny font, is it reasonable to assume that a typical person will read and understand it? Is it the company’s responsibility to make sure its customers understand it? 4. Suppose the cellular company shares network signal strength data from the customer’s phone with a thirdparty marketing company. The marketing firm can then use the data to compute the customer’s location throughout the day. How might sharing corporate “network” data be a potential customer privacy violation? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 178 CHAPTER 4 The Cloud Laptop 1 Laptop 2 Phone 1 Phone 2 Wireless connections (dotted lines) use IEEE 802.11 Computer 1 LAN devices acts as a router, switch, and wireless access point (AP) Internet FIGURE 4-16 Typical Small Office/Home Office (SOHO) LAN Internet Service Provider Computer 2 Wired connections (solid lines) use IEEE 802.3 Computer 3 Printer Fax memory. Similarly, M stands for 1,000,000, not 1,024 * 1,024; G stands for 1,000,000,000, not 1,024 * 1,024 * 1,024. Thus, 100 Mbps is 100,000,000 bits per second. Also, communications speeds are expressed in bits, whereas memory sizes are expressed in bytes. These are different units of measurement. One byte consists of eight bits. This means a 1 MB file would consist of 8,388,608 bits. If you sent a 1 MB file over a 1 Mbps connection, it would take more than 8 seconds to send because your connection speed is measured in bits per second, not bytes per second. Wireless LAN connections use the IEEE 802.11 protocol. Several versions of 802.11 exist, and as of 2018, the most current one is IEEE 802.11ac. The differences among these versions are beyond the scope of this discussion. Just note that the current standard, 802.11ac, allows speeds of up to 1.3 Gbps, though few users have an Internet connection fast enough to take full advantage of that speed. The next version, 802.11ax, promises speeds around 10 Gbps. Bluetooth is another common wireless protocol used to make PAN connections. It is designed for transmitting data over short distances, replacing cables. Devices, such as wireless mice, keyboards, printers, and headphones, use Bluetooth to connect to desktop computers. Other devices like smartwatches and fitness trackers can use Bluetooth to connect to smartphones and send data over the Internet. More and more devices like clothing, automobiles, and sports equipment are becoming Bluetooth enabled. Connecting Your LAN to the Internet Although you may not have realized it, when you connect your SOHO LAN, phone, iPad, or Kindle to the Internet, you are connecting to a WAN. You must do so because you are connecting to computers that are not physically located on your premises. You cannot start running wires down the street to plug in somewhere. When you connect to the Internet, you are actually connecting to an Internet service provider (ISP). An ISP has three important functions. First, it provides you with a legitimate IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 179 Internet address. Second, it serves as your gateway to the Internet. The ISP receives the communications from your computer and passes them on to the Internet, and it receives communications from the Internet and passes them on to you. Finally, ISPs pay for the Internet. They collect money from their customers and pay access fees and other charges on your behalf. Figure 4-17 shows the three common alternatives for connecting to the Internet. Notice that we are discussing how your computer connects to the Internet via a WAN; we are not discussing the structure of the WAN itself. WAN architectures and their protocols are beyond the scope of this text. Search the Web for “leased lines” or “PSDN” if you want to learn more about WAN architectures. SOHO LANs (such as that in Figure 4-16) and individual home and office computers are commonly connected to an ISP in one of three ways: a special telephone line called a DSL, a cable TV line, or a wireless-phone-like connection. Digital Subscriber Line (DSL) A digital subscriber line (DSL) operates on the same lines as voice telephones, but it operates so it does not interfere with voice telephone service. Because DSL signals do not interfere with telephone signals, DSL data transmission and telephone conversations can occur simultaneously. A device at the telephone company separates the phone signals from the computer signals and sends the latter signal to the ISP. Digital subscriber lines use their own protocols for data transmission. Cable Line A cable line is the second type of WAN connection. Cable lines provide high-speed data transmission using cable television lines. The cable company installs a fast, high-capacity optical fiber cable to a distribution center in each neighborhood it serves. At the distribution center, the optical fiber cable connects to regular cable-television cables that run to subscribers’ homes or businesses. Cable signals do not interfere with TV signals. Because as many as 500 user sites can share these facilities, performance varies depending on how many other users are sending and receiving data. At the maximum, users can download FIGURE 4-17 Summary of LAN Networks Type Local area network Topology Transmission Line Local area network UTP or optical fiber Local area network with wireless DSL modem to ISP Cable modem Connections to ISP to the Internet WAN wireless Transmission Speed Equipment Used Protocol Commonly Used Remarks Switch NIC UTP or optical IEEE 802.3 (Ethernet) Switches connect devices, multiple switches on all but small LANs. UTP or optical for Up to 1.3 Gbps nonwireless connections Wireless access point Wireless NIC IEEE 802.11ac, (802.11ax not yet common) Access point transforms wired LAN (802.3) to wireless LAN (802.11). DSL telephone Personal: Upstream to 1 Mbps, downstream to 40 Mbps (max 10 likely in most areas) DSL modem DSL-capable telephone line DSL Can have computer and phone use simultaneously. Always connected. Cable TV lines to optical cable Upstream to 1 Mbps Downstream 20 Mbps to 100 Mbps Cable modem Cable TV cable Cable Capacity is shared with other sites; performance varies depending on others’ use. Wireless connection to WAN 500 Kbps to 1.7 Mbps Wireless WAN modem One of several wireless standards Sophisticated protocols enable several devices to use the same wireless frequency. Common: 10/100/1000 Mbps Possible: 1 Gbps IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 180 CHAPTER 4 The Cloud data up to 50 Mbps and can upload data at 512 Kbps. Typically, performance is much lower than this. In most cases, the download speed of cable lines and DSL lines is about the same. Cable lines use their own protocols. WAN Wireless Connection A third way you can connect your computer, mobile device, or other communicating device is via a WAN wireless connection. Amazon’s Kindle, for example, uses a Sprint wireless network to provide wireless data connections. The iPhone uses a LAN-based wireless network if one is available and a WAN wireless network if not. The LAN-based network is preferred because performance is considerably higher. As of 2018, WAN wireless provides average performance of 1.0 Mbps with peaks of up to 3.0 Mbps, as opposed to the typical 50 Mbps for LAN wireless. Q4-4 How Does the Internet Work? This section will give you the basic understanding of how the Internet works and enable you to be an effective consumer of cloud services. The cloud resides in the Internet. So, in order to learn how the cloud works, you need a basic understanding of how the Internet works. With that background, you will learn how it is possible for a cloud vendor to provide dramatic elasticity to support the workload shown in Figure 4-6. The Internet and the U.S. Postal System FIGURE 4-18 Comparison of the Postal System and the Internet The technology that underlies the Internet and the additional technology that enables the cloud to work are complicated. To explain how the Internet works, we’ll use a simplified example, shown in Figure 4-18, comparing the movement of packages in the U.S. postal system to the movement of packets through the Internet. This is a highly simplified, but useful, example for explaining the basics of how the Internet works. We will stay at a high level and help you learn overarching concepts and basic definitions. The Internet works much like the U.S. postal system in that both systems transport things from one location to another. The Internet transports email, while the U.S. postal system sends paper mail. Comparing the Internet to the U.S. postal system allows you to relate new Internet terms to a system with which you’re already familiar (the U.S. postal system). Steps to Send Package Postal System Internet Equivalent 1. Assemble package Package Packet 2. Put name on package Person’s name (e.g., BigBank Inc. or Jane Smith) Domain name (e.g., www.BigBank.com) 3. Look up address Phone book DNS 4. Put address on package Mailing address (e.g., 123 Park Ave, New York, NY, 10172) IP address (e.g., 10.84.8.154) 5. Put registered mail sticker on package Registered Mail TCP 6. Ship package Airlines (e.g., Delta Air Lines, Inc.) Airports (e.g., Seattle-Tacoma International Airport) Carriers (e.g., Sprint Corp.) Routers IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 181 Step 1: Assemble Package (Packets) Suppose you are sitting in your apartment in Seattle and you want to send a box of cookies to your friend, Jane Smith, working at BigBank Inc. in New York City. The Internet equivalent of this is sending a packet, or a formatted message that passes through networks, to BigBank’s Web server requesting a copy of its main Web page. Packets wind their way through the Internet much the same way packages wind their way through the U.S. postal system. The cookies are created and boxed up by you, a person. The contents of the packet, on the other hand, are created by applications like Google Chrome, Firefox, Safari, Skype, or FileZilla. Step 2: Put Name on Package (Domain Names) The next step in sending a package through the U.S. postal system is to put a name on the package. On your package of cookies you might write “BigBank Inc.” or “Jane Smith.” On the packet you put a domain name, or a worldwide-unique name affiliated with a public IP address (discussed in Step 3). Examples of domain names include www.bigbank.com, www.microsoft.com, or www.university.edu. It is not necessary for packets to contain a domain name. In fact, many don’t. Just like with the U.S. postal system, the address is more important than the recipient name. Step 3: Look Up Address (IP Address) Before you can send your box of cookies to your friend you need to put a shipping address on the package (e.g., 123 Park Ave, New York, NY, 10172). Just like regular postal mail, every location on the Internet needs a unique address. For reasons beyond this discussion, an Internet address is called an IP address, which is a number that identifies a particular device. Public IP addresses identify a particular device on the public Internet. In order to get on the Internet, every device must have access to a public IP address. IP Addresses IP addresses have two formats. The most common form, called IPv4, has a four-decimal dotted notation such as 137.190.8.10. Unfortunately, there are only 4 billion IPv4 addresses that can be used by all 7 billion people on the earth. As a result, a second format of IP addresses called IPv6 is being adopted—slowly. It has a longer format (e.g., 0:0:0:0:0:ffff:89be:80a), which accommodates 340 undecillion addresses. That’s plenty of IP addresses—for now. In your browser, if you enter an IPv4 address like http://137.190.8.10 or an IPv6 address like 0:0:0:0:0:ffff:89be:80a, your browser will connect with the device on the public Internet that has been assigned to this address. DNS Most people don’t remember addresses. It’s easier to remember a name like Jane Smith or BigBank Inc. and look up the mailing address in a phone book (or an Internet-based phone book). The Internet works the same way. Nobody wants to type IP addresses like http://165.193.140.14 to find a particular site. It is easier to enter names like www.pandora.com or www.woot.com or www .pearsonhighered.com. Because public IP addresses must be unique worldwide, their assignment is controlled by a centralized organization named ICANN (Internet Corporation for Assigned Names and Numbers). ICANN administers a directory naming system, like a phone book, called Domain Name System (DNS) that assigns domain names to IP addresses. When an organization or individual wants to register a domain name, it goes to a company that applies to an ICANN-approved agency to do so. GoDaddy (www.godaddy.com) is an example of such a company (Figure 4-19). GoDaddy, or a similar agency, will first determine if the desired name is unique worldwide. If so, then it will apply to register that name to the applicant. Once the registration is completed, the applicant can affiliate a public IP address with the domain name, much like your name is associated IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 182 CHAPTER 4 The Cloud FIGURE 4-19 GoDaddy Screenshot Source: © 2018 GoDaddy Operating Company, LLC. All rights reserved. with a single postal address. From that point onward, traffic for the new domain name will be routed to the affiliated IP address. In 2016, the U.S. Department of Commerce gave up oversight of ICANN to a diverse group of governments and companies. Most tech companies applauded the handover. But critics worry that less-free countries may try to influence ICANN to disallow domain names for dissident groups, thereby kicking them off the Internet. At this point, ICANN is still located in the United States and must obey U.S. laws. Time will tell if the transition proves to be a good one. Step 4: Put Address on Package (IP Address on Packet) Every time you enter a domain name (e.g., www.washington.edu) into your Web browser, your computer sends a lookup (resolution) request to a DNS server asking it for the IP address that corresponds with that domain name. The DNS server responds with the IP address that your operating system then puts on packets to be sent to that site. Note two important points: First, several (or many) domain names can point to the same IP address. This is the real-world equivalent of multiple people (i.e., a family) sharing the same postal mailing address. Second, the affiliation of domain names with IP addresses is dynamic. The owner of the domain name can change the affiliated IP addresses at its discretion, much like you can change your affiliation with a specific mailing address if you decide to move. Before we leave addressing, you need to know one more term. A URL (Uniform Resource Locator) is an address on the Internet. Commonly, it consists of a protocol (such as http:// or ftp://) followed by a domain name or public IP address. A URL is actually quite a bit more complicated than this description, but that detailed knowledge is beyond the scope of this text, so we’ll hurry along. The preferred pronunciation of URL is to say the letters U, R, L. Step 5: Put Registered Mail Sticker on Package (TCP) After your package is addressed, you need to guarantee that it gets delivered using registered mail. Registered mail guarantees delivery by requiring the recipient to sign a receipt that is then sent back to the sender. The same is true of packets. The Transmission Control Protocol (TCP) is IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 183 CHAPTER 4 The Cloud a core Internet protocol that guarantees the reliable delivery of packets. TCP is the equivalent of registered mail in the postal system. TCP information is added to packets just like registered mail stickers are added to postal packages. They guarantee delivery by requiring the receiver to send back an acknowledgement that the packet was received. If no acknowledgement is received, it will keep trying to sending the packet a certain number of times before it gives up. Step 6: Ship Package (Packets Transported by Carriers) Figure 4-20 illustrates a simplified path that your packet may take through the Internet. To begin, note that this example is an internet because it is a network of networks. It consists of two LANs (yours and the bank’s) and four networks. (In truth, the real Internet consists of tens of thousands of networks, but to conserve paper, we don’t show all of them.) A hop is the movement from one network to another. This term is frequently used by cloud vendors when they discuss provisioning servers to minimize the number of hops. As drawn, in Figure 4-20, the shortest path from you to the bank’s LAN consists of four hops. Your box of cookies will take a similar number of hops between postal facilities as it moves across the country. At this point, we should mention that most hosts connected to a LAN share a single public IP address, much like a family living in a house shares a single postal address. Each internal host receives a private IP address that identifies a particular device on a private network. Private IP addresses are used for traffic going to other devices on the LAN. But all traffic leaving the LAN uses the single shared public IP address to cross the Internet. All private IP addresses are managed by a LAN device like the one shown in Figure 4-16. Carriers FIGURE 4-20 Using the Internet to Request a Web Page In the U.S. postal system, your package weaves its way toward its destination through multiple airports. It does so aboard airplanes owned by airlines like Delta Air Lines, Southwest Airlines, and United Airlines. Similarly, as your packet moves across the Internet, it passes through routers (airports), which are devices that connect different networks together. Routers, and many of the networks they’re connected to, are owned by large telecommunication providers (airlines) known as carriers. Some of these large carriers include Sprint, AT&T, Verizon Business, and XO Communications. These large carriers exchange Internet traffic freely at physical locations called Internet exchange points (IXP). Large carriers exchange traffic without charging each other access fees via peering agreements. Carriers make revenue by collecting subscription fees from end users but not from peers. The problem with peering is that some people use more bandwidth than others. Netflix, for example, accounts for more than 35 percent of all Internet traffic in North America between 9 PM and 12 AM.10 Carriers argue that they should be able to charge varying rates based on content, application, or the user requesting the data. Network 3 You in Seattle Your LAN Friend at BigBank Internet Service Provider BigBank’s LAN Network 4 Network 1 Network 2 Internet Service Provider The Internet IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 184 CHAPTER 4 The Cloud Net Neutrality Netflix, eBay, Yahoo!, and Amazon say that allowing carriers to charge these varying rates could hurt consumers and innovation. They believe in the net neutrality principle, where all data is treated equally. They argue that carriers should not be allowed to decide which sites load quickly, which apps are allowed on a network, and which content is acceptable. In 2015, the Federal Communications Commission (FCC) approved new net neutrality regulations that ensured ISPs could not discriminate between different types of Internet traffic. This meant all consumers would have access to content on an equal basis. This ruling in many ways rendered the Internet a utility like water or electricity that would be governed by comparable regulations. However, in 2017 the FCC reversed the previous ruling and classified Internet services as an information service. This meant ISPs could manage the flow of network traffic over their networks. Several states have begun fighting these new regulations in court. Q4-5 How Do Web Servers Support the Cloud? At this point, you know basic networking terms and have a high-level view of how the Internet works. To understand the value of the cloud as well as how it works and how your organization can use it, you need to know a bit about the processing that occurs on a Web server. For this discussion, we will use the example of a Web storefront, which is a server on the Web from which you can buy products. Suppose you want to buy an item from zulily, a private buyer’s site that sells clothing. To do so, you go to www.zulily.com and navigate to the product(s) you want to buy (see Figure 4-21). When you find something you want, you add it to your shopping cart and keep shopping. At some point, you check out by supplying credit card data. But what happens when your order data arrives at the server? FIGURE 4-21 Sample of Commerce Server Pages; Product Offer Pages Source: Courtesy of Zulily Inc. Used by permission. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 185 CHAPTER 4 The Cloud When you enter www.zulily.com in your browser, the browser sends a request that travels over the Internet to a computer in the server tier at the zulily site. In response to your request, a servertier computer sends back a Web page, which is a document coded in, usually, html (and, as discussed in Chapter 3, probably includes CSS, JavaScript, and other data). Three-Tier Architecture Almost all Web applications use the three-tier architecture, which is a design of user computers and servers that consists of three categories, or tiers, as shown in Figure 4-22. The user tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. The server tier consists of computers that run Web servers and process application programs. The database tier consists of computers that run a DBMS that processes requests to retrieve and store data. Figure 4-22 shows only one computer at the database tier. Some sites have multicomputer database tiers as well. Web servers are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A commerce server is an application program that runs on a server-tier computer. Typical commerce server functions are to obtain product data from a database, manage the items in a shopping cart, and coordinate the checkout process. When a request comes to the server, the Web server examines it and sends it to the proper program for processing. Thus, the Web server passes e-commerce traffic to the commerce server. It passes requests for other applications to those applications. In Figure 4-22, the server-tier computers are running a Web server program, a commerce server application, and other applications having an unspecified purpose. Watch the Three Tiers in Action! Suppose the user of the Web page in Figure 4-21 clicks on shoes and then selects a particular shoe, say, the Darkish Gray Dorine Mary Jane shoe. When the user clicks on that shoe, the commerce server requests that shoe’s data from the DBMS, which reads it from the database and then returns the data (including pictures) to the commerce server. That server then formats the Web page with the data and sends the html version of that page to the user’s computer. The result is the page shown in Figure 4-23. FIGURE 4-22 Three-Tier Architecture Instructions and Data Web Browsers Web Browsers Web Browsers Web Browsers Web Browsers html via http User Computers (User Tier) Commerce Other Server Applications Commerce Other Application .....Other Server Applications Commerce Application .....Other Server Applications Commerce Web Server Applications Application ..... Server (Apache, IIS) Web Server Application ..... (Apache, IIS) Web Server (Apache, IIS) Web Server (Apache, IIS) Web Server Computers (Server Tier) DBMS DB DBMS Computer (Database Tier) IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 186 CHAPTER 4 The Cloud FIGURE 4-23 Product Page Source: Courtesy of Zulily Inc. Used by permission. Service-Oriented Architecture (SOA) The cloud would be impossible without a design philosophy called the service-oriented architecture (SOA). According to this philosophy, all interactions among computing devices are defined as services in a formal, standardized way. This philosophy enables all the pieces of the cloud to fit together, as you will see. However, understanding SOA (pronounced SO-ah) in depth requires you to learn more computer science than you need as a business professional. So, the best way for you to understand SOA is via a business analogy. A SOA Analogy Figure 4-24 shows an arrangement of departments at a hypothetical online bicycle part retailer named Best Bikes. The Sales Department receives order requests and follows a process to have them approved for shipping. On request, the Credit Department verifies customer credit as needed to approve orders, and the Inventory Department verifies the availability of the inventory needed to fulfill an order. In an informal, non-SOA-type organization, one salesperson would contact someone he or she knows in Credit and ask something like “Can you approve an allocation of $10,000 of credit to the ABC Bicycle Company?” In response, the credit person might say, “Sure,” and the salesperson might note the name of the person who approved the amount. Some days, he or she might remember to record the date; other days, not so. Another salesperson might do something else, say, contact a different person in Credit and ask something like, “I need $5,000 in credit for Order 12345,” and that other person in Credit might say, “I don’t know, send the order over, and if I can, I’ll write ’Approved’ on it.” Other irregular, but similar, interactions could occur between the Sales and the Inventory departments. Such operations are definitely not service-oriented. People are asking for credit verification in different ways and receiving responses in different ways. The process for approving an order IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 187 Customers Order Requests Sales Department st que s Re Sale Inve ntor FIGURE 4-24 Approval Request Interactions Among Three Departments y Re Credit Department nse spo / Re que st / R esp ons e Inventory Department varies from salesperson to salesperson, and possibly from day to day with the same salesperson. The records of approvals are inconsistent. Such an organization will have varying levels of process quality and inconsistent results, and should the company decide to open a facility in another city, these operations cannot be readily duplicated, nor should they be. Using SOA principles, each department would formally define the services it provides. Examples are: For the Credit Department: • CheckCustomerCredit • ApproveCustomerCredit For the Inventory Department: • VerifyInventoryAmount • AllocateInventory • ReleaseAllocatedInventory Further, for each service, each department would formally state the data it expects to receive with the request and the data it promises to return in response. Every interaction is done exactly the same way. There is no personal contact between certain people in the departments; no salesperson need know who works in Credit or Inventory. Instead, requests are emailed to a generic email address in Credit or Inventory, and those departments decide who will process the request and how it will be processed. No department has or need have any knowledge of who works in another department nor how the department accomplishes its work. Each department is free to change personnel task assignments and to change the way it performs its services, and no other department needs to know that a change occurred. In SOA terms, we would say the work of the department is encapsulated in the department. With this organization, if Best Bikes wants to add another Inventory Department in another city, it can do so and no salesperson need change the way he or she sets up, submits, or receives responses to requests. Sales continues to send a VerifyInventoryAmount service request, formatted in the standard way, to the same email address. With multiple sites, the Inventory function would change the way it implements service requests to first identify which of the several Inventory Departments should process the request. Sales would not know, nor need to know, this happened. Best Bikes could dynamically create 1,000 Inventory Departments and the Sales Department need not change anything it does. Later, it could reduce those 1,000 Inventory Departments to three, and, again, sales need not make any change. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 188 CHAPTER 4 The Cloud SOA for Three-Tier Architecture From this discussion, you can see how SOA is used to enable cloud processing. The description and advantages and disadvantages of this analogy for SOA are the same for the cloud. Consider Figure 4-25, which shows the three-tier architecture with SOA drawn in. In this case, the commerce server application formally defines services that browsers can request, the data they must provide with the request, and the data that each will receive in response to the request. Sample services are: • • • • ObtainPartData ObtainPartImages ObtainPartQuantityOnHand OrderPart And so forth. Again, each service also documents the data it expects and the data it will return. Now, JavaScript (or another code language) is written to invoke these services correctly. That JavaScript is included as part of the Web pages the server sends to the browsers, and when users employ the browsers to purchase, the JavaScript behind the Web page invokes the services in the correct way. The server tier can consist of three servers at 3 AM, 3,000 servers at 11 AM, 6,000 servers at 6 PM, and 100 servers at 10 PM. Furthermore, those servers can move around the world; at one time of day, they can be all located in the United States, and at another time of day, they can all be located in Europe, and so on. Nothing, absolutely nothing, in the browsers need change as these servers are adjusted. To take advantage of the multiple Web servers, a load-balancing program receives requests and sends them to an available server. The load-balancing program keeps data about the speed and health of all its assigned Web servers and allocates work to maximize throughput. In addition, on the back end, SOA services are defined between the Web server and the database server. Accordingly, the database server need do nothing as the number and location of Web servers is adjusted. And that’s a two-way street. Nothing in the Web servers need be changed if the number and location of database servers is adjusted. However, load balancing for database servers is considerably more complicated. Do not infer from this discussion that SOA services and the cloud are only used for three-tier processing. Such services and the cloud are used for multitudes of applications across the Internet. This three-tier application is just an example. html with JavaScript that correctly requests services and processes responses Browser Browser FIGURE 4-25 SOA Principles Applied to Three-Tier Architecture … Database server service requests & responses Commerce Commerce Server Commerce Server Commerce Web Server Server Commerce Web Server Server Commerce Web Server Server Web Server Server Web Server Web Server 1, 3, 100, 1000, etc. Web Servers DB Load Balancer Browser Load Balancer Browser Commerce server service requests & responses DBMS DB DBMS DB DBMS DB 1, 3, 50 Database Servers Browser IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 189 From this discussion, you can understand how cloud elasticity is possible. However, for many organizations to use the cloud and to be able to mix and match Web services, they need to agree on standard ways of formatting and processing service requests and data. That leads us to cloud standards and protocols. Again, we discuss these at a very high level. Internet Protocols A protocol is a set of rules and data structures for organizing communication. Because the cloud’s Web services use the Internet, the protocols that run the Internet also support cloud processing. We will start with them. TCP/IP Protocol Architecture The basic plumbing of the Internet is governed by protocols that are defined according to an arrangement called the TCP/IP protocol architecture. This architecture has five layers; one or more protocols are defined at each layer. Data communications and software vendors write computer programs that implement the rules of a particular protocol. (For protocols at the bottom layer, the physical layer, they build hardware devices that implement the protocol.) Internet Protocols: http, https, smtp, and ftp The only Internet protocols that you as a business professional are likely to encounter are those at the top, or the application layer of the TCP/IP architecture, shown in Figure 4-26. Hypertext Transfer Protocol (http) is the protocol used between browsers and Web servers. When you use a browser such as Chrome, Safari, or Firefox, you are using a program that implements the http protocol. At the other end there is a server that also processes http. Even though your browser and the server have never “met” before, they can communicate with one another because they both follow the rules of http. Similarly, in Figure 4-25, the browsers send and receive service requests to and from the commerce server using http. As you will learn, there is a secure version of http called https. Whenever you see https in your browser’s address bar, you have a secure transmission and you can safely send sensitive data like credit card numbers. When you are on the Internet, if you do not see https, then you should assume that all of your communication is open and could be published on the front page of your campus newspaper tomorrow morning. Hence, when you are using http, email, text messaging, chat, videoconferencing, or anything other than https, know that whatever you are typing or saying could be known by anyone else. Two additional TCP/IP application-layer protocols are common. smtp, or Simple Mail Transfer Protocol, is used for email transmissions (along with other protocols). ftp, or File Transfer Protocol, is used to move files over the Internet. Google Drive and Microsoft OneDrive use ftp behind the scenes to transmit files to and from their cloud servers to your computer. WSDL/SOAP Application layer protocols FIGURE 4-26 Protocols That Support Web Services Internet ‘plumbing’ protocols Web Service Protocols http, https, smtp, ftp 4 more layers of protocols Internet Protocols (TCP/IP Protocol Architecture) IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 190 CHAPTER 4 The Cloud WSDL, SOAP, XML, and JSON To wrap up the discussion, we will briefly consider four standards used extensively for Web services and the cloud. Those standards and their purpose are as follows: WSDL (Web Services Description A standard for describing the services, inputs and outputs, Language) and other data supported by a Web service. Documents coded according to this standard are machine readable and can be used by developer tools for creating programs to access the service. SOAP (no longer an acronym) A protocol for requesting Web services and for sending responses to Web service requests. XML (eXtensible Markup Language) A markup language used for transmitting documents. Contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead (see Figure 4-27a). JSON (JavaScript Object Notation) A markup language used for transmitting documents. Contains little metadata and is preferred for transmitting volumes of data between servers and browsers. While the notation is the format of JavaScript objects, JSON documents can be processed by any language (see Figure 4-27b). Service authors (computer programmers) create WSDL documents to describe the services they provide and the inputs and outputs required. These WSDL documents are seldom read by humans. Instead, developer tools like Microsoft Visual Studio read the WSDL to configure the programming environment for programmers who write code to access that service. As shown in Figure 4-26, SOAP, which is not an acronym though it looks like one, is a protocol that sits on top of http and the lower-level Internet protocols. Sits on top of means that it uses http to send and receive SOAP messages. (SOAP can also use smtp.) Programs that use Web services issue SOAP messages to request services; the Web service uses SOAP messages to return responses to service requests. Finally, XML and JSON are ways of marking up documents so that both the service requestor and the service provider know what data they’re processing. Figure 4-27 shows a simple example of both. As you can see, XML documents contain as much metadata as they do application data. These metadata are used to ensure that the document is complete and properly formatted. XML is FIGURE 4-27A Example XML Document IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud { FIGURE 4-27B Example JSON Document } 191 "firstName": "Kelly", "lastName": "Summers", "dob": "12/28/1985", "address": { "streetAddress": "309 Elm Avenue", "city": "San Diego", "state": "CA", "postalCode": "98225" }, "phoneNumber": [ { "type": "home", "number": "685 555-1234" }, { "type": "cell", "number": "685 555-5678" } ] used when relatively few messages are being transmitted and when ensuring a complete and correct document is crucial. Both WSDLs and SOAP messages are coded in XML. As its name indicates, JSON uses the notation for JavaScript objects to format data. It has much less metadata and is preferred for the transmission of voluminous application data. Web servers use JSON as their primary way of sending application data to browsers. With this technical background, you should no longer be skeptical that the benefits of the cloud are real. They are. However, this fact does not mean that every organization uses the cloud well. In the remainder of this chapter, we will describe generic ways that organizations can use the cloud, discuss how eHermes in particular can use the cloud, and, finally, discuss an exceedingly important topic: cloud security. Q4-6 How Can eHermes Use the Cloud? eHermes is an innovative startup company with a relatively small IT department. As such, it is unlikely to have the resources necessary to develop a large server infrastructure. Instead, it is far more likely to take advantage of cloud services provided by cloud vendors. SaaS Services at eHermes Software as a service requires little investment in the hardware and software system components. The SaaS vendor administers and manages the cloud servers and makes the software available, usually as a thin client. eHermes will, however, need to transfer existing data, create new data, develop procedures, and train users. Some of the SaaS products that eHermes could use are: • • • • • • Google Mail Google Drive Office 365 Salesforce.com Microsoft CRM OnLine And many others You already know what the first three SaaS offerings are. Salesforce.com and Microsoft’s CRM OnLine are customer relationship management systems, which you will learn about in Chapter 6. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 192 CHAPTER 4 The Cloud PaaS Services at eHermes Security With PaaS, eHermes leases hardware and operating systems in the cloud from the cloud vendor. For example, it can lease EC2 (Elastic Cloud 2, a PaaS product offered by Amazon), and Amazon will preinstall either Linux or Windows Server on the cloud hardware. Given that basic capability, eHermes would then install its own software. For example, it could install its own, in-house developed applications, or it could install other applications licensed from a software vendor. It could also license a DBMS, say, SQL Server from Microsoft, and place it on an EC2 Windows Server instance. In the case of software licensed from others, eHermes must purchase licenses that permit replication because Amazon will replicate it when it increases servers. Some cloud vendors include DBMS products in their PaaS services. Thus, eHermes could obtain Windows Servers with SQL Server already installed from the Microsoft Azure cloud offerings. That option is likely what Seth was considering when he mentioned the $10 per TB per month. DBMS are also included in other vendors’ cloud offerings. As of May 2018, Amazon offers the following DBMS products with EC2: Amazon Relational Database Service (RDS) A relational database service supporting MySQL, Oracle, SQL Server, or PostgreSQL Amazon DynamoDB A fast and scalable NoSQL database service Amazon ElastiCache A very fast in-memory cache database service Amazon Redshift A petabyte-scale data warehouse Amazon Neptune A fast, fully managed graph database for complex hierarchical structures Finally, eHermes might use a CDN to distribute its content worldwide as it grows and expands into new markets. IaaS Services at eHermes As stated, IaaS provides basic hardware in the cloud. Some companies acquire servers this way and then load operating systems onto them. Doing so requires a considerable technical expertise and management. A company like eHermes is more likely to spend its valuable resources on developing its own mobile storefronts and internal systems rather than spending time configuring servers. eHermes might, however, obtain data storage services in the cloud. Amazon, for example, offers data storage with its S3 product. Using it, organizations can place data in the cloud and even have that data be made elastically available. Again, however, an organization like eHermes would more likely use SaaS and PaaS because of the added value they provide. Q4-7 How Can Organizations Use Cloud Services Securely? The Internet and cloud services based on Internet infrastructure provide powerful processing and storage services at a fraction of the cost of private data centers. However, the Internet is a jungle of threats to data and computing infrastructure. Some of the biggest threats to cloud services include insecure interfaces, data loss, and data leakage. How can organizations realize the benefits of cloud technology without succumbing to those threats? The answer involves a combination of technologies that we will address, at a very high level, in this question. As you read, realize that no security story is ever over; attackers constantly IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 193 strive to find ways around security safeguards, and occasionally they succeed. Thus, you can expect that cloud security will evolve beyond that described here throughout your career. We begin with a discussion of VPNs, a technology used to provide secure communication over the Internet. Virtual Private Networks (VPNs) A virtual private network (VPN) uses the Internet to create the appearance of private, secure connections. In the IT world, the term virtual means something that appears to exist but in fact does not. Here, a VPN uses the public Internet to create the appearance of a private connection on a secure network. A Typical VPN Figure 4-28 shows one way to create a VPN to connect a remote computer, perhaps used by an employee working at a hotel in Miami, to a LAN at a Chicago site. The remote user is the VPN client. That client first establishes a public connection to the Internet. The connection can be obtained by accessing a local ISP, as shown in Figure 4-28, or, in some cases, the hotel itself provides a direct Internet connection. In either case, once the Internet connection is made, VPN software on the remote user’s computer establishes a connection with the VPN server in Chicago. The VPN client and VPN server then have a secure connection. That connection, called a tunnel, is a virtual, private pathway over a public or shared network from the VPN client to the VPN server. Figure 4-29 illustrates the connection as it appears to the remote user. To secure VPN communications over the public Internet, the VPN client software encrypts, or codes, messages so their contents are protected from snooping. Then the VPN client appends the Internet address of the VPN server to the message and sends that packet over the Internet to the VPN server. When the VPN server receives the message, it strips its address off the front of the message, decrypts the coded message, and sends the plain text message to the original address inside the LAN. In this way, secure private messages are delivered over the public Internet. Using a Private Cloud A private cloud is a cloud owned and operated by an organization for its own benefit. To create a private cloud, the organization creates a private internet and designs applications using Web services standards as shown in Figure 4-14 (page 174). The organization then creates a farm of Used during tunnel setup Chicago Site Local Area Network 1 ISP VPN Server FIGURE 4-28 Remote Access Using VPN; Actual Connections Tunnel Internet VPN Client IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 194 CHAPTER 4 The Cloud Chicago Site Local Area Network 1 Remote Client FIGURE 4-29 Remote Access Using VPN; Apparent Connection servers and manages those servers with elastic load balancing just as the cloud service vendors do. Because of the complexity of managing multiple database servers, most organizations choose not to replicate database servers. Figure 4-30 illustrates this possibility. Private clouds provide security within the organizational infrastructure but do not provide secure access from outside that infrastructure. To provide such access, organizations set up a VPN and users employ it to securely access the private cloud as shown in Figure 4-31. Private clouds provide the advantages of elasticity, but to questionable benefit. What can organizations do with their idle servers? They could realize some cost savings by shutting down the idle servers. But unlike the cloud vendors, they cannot repurpose them for use by other companies. Possibly a large conglomerate or major international company could balance processing loads across subsidiary business units and across different geographical regions. 3M, for example, might balance processing for its different product groups and on different continents, but it is difficult to imagine that, in doing so, it would save money or time. A company like eHermes is very unlikely to develop a private cloud. Amazon, Microsoft, IBM, Google, and other major cloud service vendors employ thousands of highly trained, very highly skilled personnel to create, manage, administer, and improve their cloud services. It is unimaginable that any non-cloud company, even large ones like 3M, could build and operate a cloud service facility that competes. The only situation in which this might make sense is if the organization is required by law or business custom to maintain physical control over its stored data. Even in that case, however, the organization is unlikely to be required to maintain physical control over all data, so it might keep critically sensitive data on-premises and place the rest of the Browsers in Browsers in Sales Dept in Browsers Sales Dept in Browsers Sales Dept in Browsers Sales Dept in Browsers Sales Dept in Browsers Sales Dept Sales Inventory application service requests & responses Private Cloud Browsers in Browsers in Customer Browsers in Customer Browsers in Service Customer Service Customer Service Service Elastic Load Balancer Inventory & Other Applications Web servers Browsers in Browsers in Shipping Browsers in Shipping Browsers in Shipping Browsers in Shipping Shipping FIGURE 4-30 Private Cloud for Inventory and Other Applications Database server service requests & responses DBMS Inventory application service requests & responses Browsers in Browsers in Accounting Browsers in Accounting Accounting DB Database Server IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 195 VPN Private Cloud Users Organization’s Private Computing Infrastructure FIGURE 4-31 Accessing Private Cloud over a Virtual Private Network data and related applications into the facilities of a public cloud vendor. It might also use a virtual private cloud, which we consider next. Using a Virtual Private Cloud A virtual private cloud (VPC) is a subset of a public cloud that has highly restricted, secure access. An organization can build its own VPC on top of public cloud infrastructure like AWS or that provided by other cloud vendors. The means by which this is done are beyond the scope of this text, but think of it as VPN tunneling on steroids. Using a VPC, an organization can store its most sensitive data on its own infrastructure and store the less sensitive data on the VPC. In this way, organizations that are required to have physical control over some of their data can place that data on their own servers and locate the rest of their data on the VPC as shown in Figure 4-32. By doing so, the organization gains the advantages of cloud storage and possibly cloud processing for that portion of its data that it need not physically control. Organization’s Computing Infrastructure (sensitive data stored here) VPN Virtual Private Cloud (other data stored here) Public Cloud Users FIGURE 4-32 Using a Virtual Private Cloud (VPC) Cloud Service Vendor Computing Infrastructure IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 196 CHAPTER 4 The Cloud SO WHAT? QUANTUM LEARNING If you are reading this textbook as part of a college course, then you probably already recognize the value of learning. Learning has been a fundamental part of your life for as long as you can remember. Some of the knowledge you have acquired has been “book” knowledge learned in school, while some has been “street smarts” learned while interacting with new people in new places. For example, the first time someone broke a promise to you, it probably affected the way you perceive the trustworthiness of others. As a result, the next time someone promised you something, a small part of you might have questioned whether that person would actually keep his word. This ability of humans to interpret complex situations and social interactions, and remember and learn from past experiences, enables us to survive and thrive in dynamic and rapidly changing environments. What you may not realize is that computers are becoming better at learning in this dynamic way, too. Learning to Learn Many people perceive computers to be systems with very rigid operations; they can only carry out finite sets of tasks based on seemingly endless lines of computer code that tell them what to do. However, the walls of rigid computer code are breaking down as machine learning becomes more widely used in a number of industries. Machine learning, in a basic sense, is the ability of computers to learn dynamically rather than being explicitly told what to do via restrictive sets of coded instructions. Machine learning is based on the iterative generation of models; the computer has the ability to adapt to these models and interpret them differently over time. This capability is important because it allows the computer to identify patterns and other insights without being directed to the features it should analyze or being told where to find those features in large sets of data.11 The ability of computers to learn iteratively and dynamically has important implications for many real-world applications. Machine learning techniques have been used for fraud detection, credit score analysis, network intrusion detection, and image recognition.12 Future applications of machine learning will likely include the development of artificial intelligence personal assistants and autonomous cars.13 As a more specific example, think about the ways in which companies are turning to social media for insight about how their products and services are perceived by customers. Companies use machine learning tools to analyze customer tweets. Then they identify trends in how customers feel about different advertising campaigns. Based on the results, Source: Iconimage/Fotolia companies can curtail campaigns that are not having the desired effect and roll out more effective campaigns on a larger scale.14 Computer scientists and executives are looking to the future of machine learning to see how advancements may change their industries. Many have an eye on the world of quantum computing as the next big advancement for machine learning due to its ability to increase the speed at which computers can process data. One Quantum Step for Computers, One Giant Step for Learning Quantum computing has been a topic of interest for scientists and innovators for many years. The fundamental difference between a quantum computer and a regular computer is the way in which computers manage information—bits. A standard computer uses 1s and 0s as the basis for all of its operations. For example, when you enter an A on the keyboard, the computer interprets this as “01000001.” In contrast, a quantum computer can encode information in what are called qubits, which can be represented as a 1, a 0, or both at the same time. The capacity for this third state allows tasks to be carried out much more quickly and has the potential to yield exponential growth in the processing capability of computers. Quantum computing also enhances computers’ ability to learn. Right now there is still a huge gap between how computers adapt through machine learning and how humans learn. Quantum computing has the potential to narrow this gap as computers become increasingly able to learn how to interpret and adapt more complex datasets with little to no direction.15 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud The implications of quantum computing for machine learning and the creation of a more powerful artificial intelligence are profound. However, even if quantum computers have the capacity to process mammoth data sets, standardization of schemas and metadata will still be needed to ensure that the correct types of data are being considered for analysis.16 Once infrastructure and data management hurdles are overcome, quantum computing stands to revolutionize almost everything that we do with 1s, 0s, or both! Questions 1. Think about the last time you learned how to do something new. How long did it take for you to master it? What types of learning mechanisms did you use, and how varied were your approaches to learning? Think about the inherent limitations of computers in learning new operations. What would a computer have to do to master this same skill? Q4-8 197 2. The feature provides the example of a company using social media analysis to evaluate customer sentiment and customize advertising based on consumers’ tweets. Why would this type of analysis require a machine learning approach? 3. Conduct an Internet search to find the binary codes for ASCII keyboard characters. A common first task that programmers use to test their code is to have the system print “Hello World” on the screen. Use the binary codes for these characters to write “Hello World” as a computer would see it. 4. The article mentions that quantum computers will have tremendous processing power and revolutionize a number of computer applications. Conduct an Internet search to identify specific examples of how quantum computers may be used in the future. 2029? So where does the cloud go in the next 10 years? Absent some unknown factor such as a federal tax on Internet traffic, cloud services will become faster, more secure, easier to use, and cheaper. Fewer and fewer organizations will set up their own computing infrastructure; instead, they will benefit from the pooling of servers across organizations and from the economies of scale produced by cloud vendors. But, looking a bit deeper, the cloud brings both good and bad news. The good news is that organizations can readily obtain elastic resources at very low cost. This trend will benefit everyone from individuals on the iCloud or Google Drive, to small groups using Office 365, to companies like eHermes using PaaS, to huge organizations using IaaS. The overall size of the cloud is getting bigger too. For example, Google’s Project Loon looks to seed the atmosphere with high-altitude balloons capable of providing Internet access to previously unreachable parts of the planet. And Google isn’t stopping there. It’s also making the cloud faster. Google Fiber aims to offer users 1 Gbps connections to the Internet. That’s 100 times faster than the average broadband connection. Comcast responded to Google’s plans by announcing its own gigabit-per-second service. So what’s the bad news? Remember that 500,000-square-foot Apple Web farm in Figure 4-7? Note the size of the parking lot. That tiny lot accommodates the entire operations staff. According to Computerworld, that building employs an operations staff of 50 people, which, spread over three shifts, 24/7, means that not many more than eight people will be running that center at any one time. Seems impossible, but is it? Again, look at the size of the parking lot. And it’s not just large companies like Apple. In 2018, every city of almost any size still supports small companies that install and maintain in-house email Exchange and other servers. If SaaS products like Google Drive or Office 365 replace those servers, what happens to those local jobs? They’re gone! See Collaboration Exercise 4,page 204, for more on this topic. But, with computing infrastructure so much cheaper, there have to be new jobs somewhere. By 2029, where will they be? For one, there will be more startups. Cheap and elastic cloud services enable small startups like the football player evaluation company Hudl (www.hudl.com) to access IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. SECURITY GUIDE IRS SYSTEMS OVERTAXED The most common signs people look for when deciding to replace a computer or phone are rapidly depleted batteries, sluggish processing times, system crashes, and excessive physical abuse to the case or screen. If you have a device that is suffering from some (or all) of these symptoms, why haven’t you replaced it? In many cases, people choose to delay replacing a device either because they do not have the resources to do so or they do not have the time. They simply wait until an absolute system failure, when they have no choice but to proceed with the upgrade. Not surprisingly, companies often follow a similar strategy for managing their IT infrastructures. Outdated enterprise systems, also called legacy systems, can also show signs of duress over time. But as long as they don’t severely disrupt business operations, they continue to be used. This is because executives and strategists within the organization often prefer to allocate resources to parts of the business with more glaring needs. In other words, if the system is not completely broken, why should we pay to fix it? Unfortunately, it is common for legacy systems to fail at the worst possible moment, like the middle of the holiday shopping season or, in the case of the IRS, April 17, 2018—Tax Day. Be Right Back, in 7,981 Years! The IRS experienced a critical system failure on the deadline for Americans to file their taxes. The system was inaccessible for direct bank account payments and e-filing services from the early morning hours on Tuesday until about 5 PM.17 In spite of the poor timing of this failure, a number of highranking officials in the IRS expressed some degree of astonishment that this type of IT infrastructure breakdown had not already occurred. When describing the systems (some circa 1960s) used by the IRS for processing tax payments, the IRS Deputy Commissioner for operations support commented that about 64 percent of IRS systems are considered aged and 32 percent of software is multiple releases behind industry standards.18 Comically, visitors to the IRS site attempting to file were greeted with a message indicating that systems were down due to planned maintenance but that they would return on December 31, 9999. While some found this message humorous, the diminishing resources of the IRS over the past several years can be labeled anything but funny to those trying to manage the operations of this massive government agency. The IRS budget sank 80 percent from where it was in 2010.19 Further exacerbating the problem is the constant barrage of daily cyberattacks against the IRS, which the organization must mitigate.20 Does the IRS Have Its Head in the Clouds? Should It? Many organizations that maintain their own IT infrastructure are transitioning to cloud-based operations. This strategy allows highly specialized experts (benefiting from the economies of scale derived from managing numerous organizations’ infrastructures) to manage your systems and data so that your organization can focus on its own expertise. In the case of the IRS, a cloud-based model seems especially appropriate due to the ability of cloud operations to more easily scale up during times of high demand and then ramp back down during times of little activity. (This clearly lines up with the frenzied activity of the tax season versus the rest of the year, as roughly 15 percent of Americans waited until the last possible week to file taxes in 2016.)21 As a comparable example, consider Source: Markus Mainka/Alamy Stock Photo 198 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud Amazon, which handles a constant stream of orders throughout the year but handles exceptional increases in traffic volume around the holiday season. Specifically, in 2017 Amazon handled just under 13 million orders over the 2 days spanning 199 Thanksgiving Day and Black Friday.22 Perhaps the IRS will follow the mass exodus of companies heading to the cloud so that we can all wait until the last minute to file our taxes without crashing their systems! DISCUSSION QUESTIONS 1. Is it time for you to upgrade either your phone or your laptop? If so, what are the indicators that you look for to determine whether your device is beginning to become unstable or fail? What other types of legacy systems have you encountered? 2. The IRS system crash of 2018 is the most recent example of a high-profile IT-infrastructure debacle with the U.S. government. Can you think of any other recent examples of government-related IT problems? 3. From a security perspective, what are the pros and cons of the government using such outdated IT systems for handling tax filings? 4. What types of interactions do you have with the cloud? Do you back up personal documents, like photos and music, on the cloud? Do you use it strictly for productivity-related files and collaboration? What are the benefits and drawbacks of the cloud for you relative to storing files locally on your devices? CDN and other cloud services for next to nothing, a capability that would have taken years and thousands of dollars in the past. Go to its site to check its response time; it’s fast! There may be additional new cloud services beyond IaaS, PaaS, and SaaS. Cloud service providers may provide Analytics as a Service (AaaS) to help companies analyze the mountains of big data they’re collecting. They may go even further and provide Business Process as a Service (BPaaS). Companies could then outsource common business processes like shipping and procurement. In fact, the cloud may evolve into Everything as a Service (EaaS) where all aspects of your business can be outsourced to a service provider—except the one aspect where you add value. But what else? The cloud will foster new categories of work. By 2029, everything will be connected to everything else. Consider remote action systems, IS that provide computer-based activity or action at a distance. By enabling action at a distance, remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located. They also enable experts to scale their expertise. Let’s look at a few examples. Telemedicine is a remote action system that healthcare professionals use to diagnose and treat patients in rural or remote areas. Doctors videoconference with patients at local drugstores, where they can transmit diagnostic readings like blood pressure and temperature. The telemedicine market is expected to exceed $49 billion by 2023.23 In Canada, Dr. Mehran Anvari regularly performs telesurgery, in which telecommunications link the surgeon to robotic equipment at distant locations, on patients more than 400 kilometers away.24 Such examples, which are still somewhat rare, have problems that must be overcome, but they will become more common by 2029. In fact, the largest healthcare provider in the United States, UnitedHealthcare, recently announced that all video-based doctor visits will be covered just like regular doctor visits.25 Other uses for remote systems include telelaw enforcement, such as the RedFlex system that uses cameras and motion-sensing equipment to issue tickets for red-light and speeding violations. The RedFlex Group, headquartered in South Melbourne, Victoria, Australia, earns 87 percent of its IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 200 CHAPTER 4 The Cloud revenue from traffic violations in the United States. It offers a turnkey traffic citation information system that includes all five components. Many remote systems are designed to provide services in dangerous locations, such as robots that clean nuclear reactors or biologically contaminated sites. Drones and other unoccupied military equipment are examples of remote systems used in war zones. Private security and law enforcement will increasingly take advantage of remotely controlled flying drones and robots. You may see an upgraded form of Knightscope’s wheeled robot, named K7, patrolling your neighborhood in 2029. But, even with these new opportunities, the news isn’t all good. New York’s Metropolitan Opera is arguably the finest opera company in the world. To see a live performance, you can drive to Manhattan, park your car, taxi to Lincoln Center, and pay $300 per seat. Or you can watch the same opera, remotely broadcast via Met Live, at a local movie theater, park your car for free, pay $12, and take a seat in the fourth row, where via the magic of digital broadcasting you can see details like the stitching on the singers’ costumes. Details you just can’t see from the $300 seats at the Met. And the sound quality is better. Wonderful, but now, who will go to a local opera performance? Access to remote action systems reduces the value of local mediocrity. The claim “Well, I’m not the best, but at least I’m here” loses value in an interconnected world. In 1990, when former Secretary of Labor Robert Reich wrote The Work of Nations,26 he could sensibly claim that those who provide routine face-to-face services are exempt from the dangers of offshoring. That claim loses validity in an interconnected world. By 2029, the value of the top-notch performers increases, possibly exponentially. Four million people watch the average Met Live broadcast; agents for the artists who perform at that venue will negotiate a sizable part of that $120 million gate. A famous surgeon or skating coach can reach a bigger market, faster and better, and be much better paid. So, if you can be the world’s best at something, do it! But what about the rest of us? If you’re not the world’s expert at something, then find a way to be indispensable to someone who is. Own the theaters that broadcast Met Live. Own the skating rink for the remote figure skating coach. Be the vendor of the food at some teleaction event. Or become essential to the development, use, and management of information systems that support these new opportunities. A business background with IS expertise will serve you very well between now and 2029. The next six chapters discuss many existing and new IS applications. Keep reading! IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CAREER GUIDE Source: Rebecca Cengiz Robbs, Carbonite, Senior Network Manager 1 Name: Rebecca Cengiz-Robbs Company: Carbonite Job Title: Senior Network Manager Education: University of Utah How did you get this type of job? I think it’s a combination of skill, attitude, and networking. I was working as a network engineer when I was promoted to manager. I had been an engineer for four and a half years and hoped to stay in a technical position for a few more years. However, with my strong organizational skills and my willingness to volunteer for projects, it evolved into a management position. I also have a manager who is motivated to help his employees improve and advance. 2 5 When I am interviewing potential candidates I look for someone who is smart and happy. I’ve hired less experienced people because they were educated, intelligent, and organized and had a good attitude. Technical skills are easy to teach; attitude and intelligence are not. 6 What attracted you to this field? What does a typical workday look like for you (duties, decisions, problems)? I have remote engineers, so I host a daily team call so we all stay connected and aware of short- and long-term projects. I am responsible for negotiating and maintaining support contracts for network equipment; purchasing equipment for new projects and upgrades; coordinating with other teams on projects that impact infrastructure; monitoring and managing bandwidth capacity, network assets, and inventory; and managing the work and advancement of network engineers. 4 7 What advice would you give to someone who is considering working in your field? In addition to technical skills and a good work ethic, I’d develop emotional intelligence and build a personal network. Often in IT, it’s who you know and how you get along with people that will help you stand out and advance. What do you like most about your job? I like how there is always something to learn from day-to-day tasks, new projects, and my colleagues. At first I was intimidated by how much I didn’t know. Now I’m glad I don’t know everything and that I am surrounded by smart engineers who are willing to learn, teach, and help each other. Are education or certifications important in your field? Why? This question is frequently debated by my colleagues. Most of the engineers at my company do not have a college degree. Some have certifications. I often hear that the only thing that matters is what you can do on the job, not a piece of paper. I believe education and certifications are both important in addition to technical skills. My degree gave me an advantage when I was looking for my first job. I had very little experience, but my manager was impressed with my academic accomplishments and took a chance on me. Based on my experience as a manager, I see that engineers with education have more motivation, focus, and ability to juggle multiple projects. They often communicate (verbally and in writing) better than engineers without degrees. I worked in the tourism industry before making a career change. I was attracted to IT by the wide variety of disciplines and the abundant opportunities, especially for women. After working as a network administrator and being able to get exposure to storage, backups, computing, security, and networking, I realized I liked networking the best. 3 What skills would someone need to do well at your job? 8 What do you think will be hot tech jobs in 10 years? Anything to do with cloud computing: software engineering, network infrastructure and engineering, storage, computing, and automation. 201 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 202 CHAPTER 4 The Cloud ACTIVE REVIEW Use this Active Review to verify that you understand the ideas and concepts that answer the chapter’s study questions. Why are organizations moving to the cloud? Q4-1 Define cloud and explain the three key terms in your definition. Describe the differences between mainframe, client-server, and cloud architectures. Explain the difference between scalability and elasticity. Using Figure 4-5 as a guide, compare and contrast cloud-based and in-house hosting. What factors encourage organizations to move to the cloud? When does it not make sense to use a cloud-based infrastructure? Q4-2 How do organizations use the cloud? Describe how an organization can benefit from the cloud’s resource elasticity, pooling, and unique Internet connectivity. Define SaaS, PaaS, and IaaS. Provide an example of each. For each, describe the business situation in which it would be the most appropriate option. Define CDN and explain the purpose and advantages of a CDN. Explain how Web services can be used internally. What network technology supports the cloud? Q4-3 Define computer network. Explain the differences among PANs, LANs, WANs, intranets, internets, and the Internet. Describe protocol and explain the purpose of protocols. Explain the key distinction of a LAN. Describe the purpose of each component in Figure 4-16. Define IEEE 802.3 and 802.11 and explain how they differ. List three ways of connecting a LAN or computer to the Internet. Explain the nature of each. Q4-4 How does the Internet work? Describe how the Internet and the U.S. postal system are similar. Define IP address and explain why public IP addresses are necessary to deliver packets. Describe the purpose of a domain name and explain how such names are associated with public IP addresses. Explain the purpose of TCP. Explain the role for agencies like GoDaddy. Define URL. Define peering agreements and explain why carriers make them. Would a company like Netflix be for or against net neutrality? Explain why. Q4-5 How do Web servers support the cloud? Define three-tier architecture and name and describe the role of each tier. Explain the role of each tier in Figure 4-22 as well as how the pages in Figures 4-21 and 4-23 are processed. Using the department analogy, define SOA and explain why departments are encapsulated. Summarize the advantages of using SOA in the three-tier architecture. Define TCP/IP protocol architecture and explain, in general terms, the purpose of http, https, smtp, and ftp. Define the purpose and role of WSDL, SOAP, XML, and JSON. State a key difference between XML and JSON. Q4-6 How can eHermes use the cloud? First, state why eHermes is likely to use the cloud. Name and describe SaaS products that eHermes could use. Explain several ways that eHermes could use PaaS offerings. Summarize why it is unlikely that eHermes would use IaaS. How can organizations use cloud services securely? Q4-7 Explain the purpose of a VPN and describe, in broad terms, how a VPN works. Define the term virtual and explain how it relates to VPN. Define private cloud. Summarize why the benefits of a private cloud are questionable. What kind of organization might benefit from such a cloud? Explain why it is unlikely that even very large organizations can create private clouds that compete with public cloud utilities. Under what circumstance might a private cloud make sense for an organization? Define VPC and explain how and why an organization might use one. Q4-8 2029? What is the likely future for the cloud? Summarize the good and bad news the cloud brings. Explain why the photo in Figure 4-7 is disturbing. Describe three categories of remote action systems. Explain how remote systems will increase the value of superexperts but diminish local mediocrity. What can other-thansuper-experts do? Summarize how this 2029 discussion pertains to your career hopes. Using Your Knowledge with eHermes Name the principal advantage of the cloud to eHermes. For hosting its data, which cloud offering—SaaS, PaaS, or IaaS—makes the most sense, given the size and nature of eHermes’ business? Explain how eHermes could use that offering. If eHermes were larger and employed a more sophisticated IT staff, name another alternative that would make sense. Explain why. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 203 KEY TERMS AND CONCEPTS 10/100/1000 Ethernet 175 Bluetooth 178 Cable line 179 Carrier 183 Client-server architecture 163 Cloud 163 Cloud computing architecture 164 Commerce server 185 Computer terminal 163 Content delivery network (CDN) 172 Database tier 185 Digital subscriber line (DSL) 179 Domain name 181 Domain Name System (DNS) 181 Elastic 165 Encapsulated 187 Ethernet 175 File Transfer Protocol (ftp) 189 Hop 183 https 189 Hypertext Transfer Protocol (http) 189 ICANN (Internet Corporation for Assigned Names and Numbers) 181 IEEE 802.3 protocol 175 IEEE 802.11 protocol 178 Infrastructure as a service (IaaS) 170 Internet 175 Internet exchange points (IXP) 183 Internet service provider (ISP) 178 Intranet 175 IP address 181 IPv4 181 IPv6 181 Local area network (LAN) 174 Mainframe architecture 163 Mainframes 163 Net neutrality 184 Network 174 Over the Internet 165 Packet 181 Peering 183 Personal area network (PAN) 174 Platform as a service (PaaS) 171 Pooled 165 Private cloud 193 Private IP address 183 Protocol 175 Public IP address 181 Remote action system 199 Routers 183 Scalable 164 Server tier 185 Service-oriented architecture (SOA) 186 Simple Mail Transfer Protocol (smtp) 189 Small office/home office (SOHO) 175 Software as a service (SaaS) 171 TCP/IP protocol architecture 189 Telelaw enforcement 199 Telemedicine 199 Telesurgery 199 The Internet 175 Thin client 163 Three-tier architecture 185 Transmission Control Protocol (TCP) 182 Tunnel 193 URL (Uniform Resource Locator) 182 User tier 185 Virtual private cloud (VPC) 195 Virtual private network (VPN) 193 WAN wireless 180 Web page 185 Web servers 185 Wide area network (WAN) 174 MyLab MIS To complete the problems with MyLab MIS, go to EOC Discussion Questions in the MyLab. USING YOUR KNOWLEDGE 4-1. Define cloud, and explain the three key terms in your defi- MyLab MIS nition. Compare and contrast cloud-based and in-house hosting using the comparison presented in Q4-1 as a guide. In your opinion, explain the three most important factors that make cloud-based hosting preferable to inhouse hosting. 4-2. Apple invested more than $3B in the North Carolina data MyLab MIS center mentioned in Q4-2. For Apple to spend such a sum, it must perceive the iCloud as being a key component of its future. Explain all the ways you believe the iCloud will give Apple a competitive advantage over other mobile device vendors. 4-3. Suppose you manage a group of seven employees in a small MyLab MIS business. Each of your employees wants to be connected to the Internet. Consider two alternatives: Alternative A: Each employee has his or her own device and connects individually to the Internet. Alternative B: The employees’ computers are connected using a LAN, and the network uses a single device to connect to the Internet. a. Sketch the equipment and lines required for each alternative. b. Explain the actions you need to take to create each alternative. c. Which of these two alternatives would you recommend? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 204 CHAPTER 4 The Cloud 4-4. Go to http://aws.amazon.com. and search for AWS data- 4-5. Suppose Seth wants eHermes to set up a private inter- base offerings. Explain the differences among Amazon’s RDS, DynamoDB, ElastiCache, Redshift services, and Neptune. Which of these would you recommend for storing eHermes’ data? (By the way, whenever you query the Internet for any AWS product, be sure to include the keyword AWS in your search. Otherwise, your search will result in Amazon’s lists of books about the item you’re searching for.) net, and he justifies this request on the basis of better security. Explain why that is not a good decision and rebut his claim about security by suggesting that eHermes use a VPC. Justify your suggestion. 4-6. In five sentences or fewer, explain how the cloud will affect job prospects for you between now and 2029. COLLABORATION EXERCISE 4 Using the collaboration IS you built, collaborate with a group of students to answer the following questions. The cloud is causing monumental changes in the information systems services industry. In every city, you will still see the trucks of local independent software vendors (ISVs) driving to their clients to set up and maintain local area networks, servers, and software. You’ll know the trucks by the Microsoft, Oracle, and Cisco logos on their sides. For years, those small, local companies have survived, some very profitably, on their ability to set up and maintain LANs, connect user computers to the Internet, set up servers, sell Microsoft Exchange licenses, and install other software on both servers and user computers. Once everything is installed, these companies continued to earn revenue by providing maintenance for problems that inevitably developed and support for new versions of software, connecting new user computers, and so forth. Their customers vary, but generally are smaller companies of, say, 3 to 50 employees—companies that are large enough to need email, Internet connections, and possibly some entry-level software applications such as QuickBooks. 4-7. Using the knowledge of this chapter and the intuition of the members of your team, summarize threats that cloud services present to such ISVs. 4-8. Suppose your team owns and manages one of these ISVs. You learn that more and more of your clients are choosing SaaS cloud services like Google for email, rather than setting up local email servers. a. What, if anything, can you do to prevent the encroachment of SaaS on your business? b. Given your answer to question 4-8a, identify three alternative ways you can respond. c. Which of the three responses identified in your answer to question 4-8b would you choose? Justify your choice. 4-9. Even if SaaS eliminates the need for email and other local servers, there will still remain viable services that you can provide. Name and describe those services. 4-10. Suppose instead of attempting to adapt an existing ISV to the threat of cloud services, you and your teammates decide to set up an entirely new business, one that will succeed in the presence of SaaS and other cloud services. Looking at businesses in and around your campus, identify and describe the IS needs those businesses will have in the cloud services world. 4-11. Describe the IS services that your new business could provide for the business needs you identified in your answer to question 4-10. 4-12. Given your answers to questions 4-7 through 4-11, would you rather be an existing ISV attempting to adapt to this new world or an entirely new company? Compare and contrast the advantages and disadvantages of each alternative. 4-13. Changing technology has, for centuries, eliminated the need for certain products and services and created the need for new products and services. What is new, today, however, is the rapid pace at which new technology is created and adapted. Using cloud services as an example, create a statement of the posture that business professionals should take with regard to technology in order to thrive in this fast-changing environment. Notice the verb in this assignment is thrive and not just survive. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 205 CASE STUDY 4 Salesforce.com In 1999, Marc Benioff was writing software in a small San Francisco apartment with two other cofounders of his new company. Together they created a cloud enterprise software used by millions of people today. Prior to starting the new company, Benioff was a successful executive at Oracle. But he was tired of the big company culture. He wanted to leave Oracle, but leaving such a successful job was a very hard decision. After some deep reflection and a bit of soul searching, Benioff decided to trust himself and start a new company called Salesforce.com. Growing Salesforce.com Benioff knew he wouldn’t be able to go it alone. He didn’t have the experience or the skills he needed to create what he envisioned. Finding the right people was a challenge. Even after he found the right people, he had to convince them that his vision of a people-focused software company would actually work. That was hard, too. Finally, once his team was in place, he faced a third challenge—he needed to raise a lot of money to develop the large systems the company needed. Investors and venture capitalists weren’t really interested in his idea, so Benioff turned to friends. Luckily, he had some successful friends, including founders and investors at companies like Oracle, Dropbox, and CNET. With money in hand, Benioff and his cofounders were able to launch one of the very earliest enterprise software as a service (SaaS) companies in the world. A Force to Be Reckoned With Today, Salesforce.com dominates the market for customer relationship management (CRM) software. It consistently outsells giants like SAP, Oracle, Microsoft, and IBM. About one-third of Salesforce.com customers are small businesses; the rest are larger organizations. It’s estimated that Salesforce.com has a 20 percent share of the $40 billion CRM software market.27 As of 2018, Salesforce.com’s market capitalization was more than $98 billion, and it is one of the most valued cloud computing companies in the United States. Even more amazing is how quickly Salesforce.com has grown. Since its initial public offering (IPO) in 2004, Salesforce.com’s stock price has grown from $4 per share (adjusting for a stock split) to more than $130 per share (a P/E ratio of 147).28 That’s a 3,150 percent increase in stock price in 14 years, or 262 percent annual growth every year since its IPO. That is a tremendous amount of growth for any company. And Salesforce.com has gone worldwide, too. It has been translated into more than 15 different languages. Salesforce.com has been more than just a financial success. It has been given numerous awards, including “100 Best Companies to Work For,” “World’s Most Admired Companies,” and “Most Innovative Companies in the World.”29 As an organization, Salesforce.com focuses on four pillars of success: trust, growth, innovation, and equality. To build trust, Salesforce.com communicates openly with its customers. It promises to do what it takes to keep customer data secure. To promote growth, Salesforce.com focuses on the success of its customers. By maintaining positive relationships with existing customers, the company continues to grow. Salesforce.com works to innovate in what it does with the hope that its ideas drive positive change in the company, the industry, and even the world. Finally, Salesforce.com pursues equality and is committed to hiring employees from every background. This focus helps it thrive. QUESTIONS 4-14. Go to www.salesforce.com, and click on the “Try for Free” button. Fill in the required fields and start your free trial. This will take you to a test site full of data for a company named Acme. Click on the “Take a Tour of Salesforce.com” link on the upper left-hand side of the screen. Walk through the automated tour labeled “Manage Your Pipeline (13 steps).” a. Why would these dashboards be useful to a marketing or sales manager? b. How could Salesforce.com help a sales manager increase sales? c. How long do you think it would take you to learn the basics of Salesforce.com? 4-15. Explain why a company like Salesforce.com requires so Source: Richard Levine/Alamy Stock Photo much money to become successful. Once the software is built, what are the incremental costs of adding additional customers? How does this affect profitability? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 206 CHAPTER 4 The Cloud 4-16. Why was it critical to choose the right team of people to get Salesforce.com off the ground? What types of skills would be necessary to create a CRM like Salesforce.com? 4-17. Why did tech giants like SAP, Oracle, Microsoft, and IBM miss the opportunity to produce a SaaS CRM like Salesforce.com? What might keep large tech companies from identifying potential opportunities like Salesforce.com? 4-18. What could be driving the tremendous growth in Salesforce.com’s stock price and revenue? Why do you think investors put such a high premium on Salesforce.com’s stock? 4-19. Why do you think Salesforce.com chose trust, growth, innovation, and equality as its four pillars of success? Why are these important for a company that provides CRM software? 4-20. CRM software is just one type of software service. Companies might be open to trying additional types of SaaS after having a great experience with Salesforce .com. What other types of software might be good candidates for future expansion for Salesforce.com? Why? Complete the following writing exercises. 4-21. Suppose that you work at eHermes and Victor tells you that he doesn’t believe that cheap, elastic provisioning of data storage is possible. “There has to be a catch somewhere,” he says. Write a one-page memo to him explaining how the cloud works. In your memo, include the role of standards for cloud processing. 4-22. Suppose you manage a sales department that uses the SaaS product Salesforce.com. One of your key salespeople refuses to put his data into that system. “I just don’t believe that the competition can’t steal my data, and I’m not taking that risk.” How do you respond to him? ENDNOTES 1. Eric Jhonsa, “Amazon’s New Cloud Deal with Verizon Signals a Bigger Trend,” The Street, May 15, 2018, accessed June 5, 2018, http://realmoney.thestreet.com/articles/05/15/2018/ amazons-new-cloud-deal-verizon-signals-bigger-trend. 2. Yahoo! Finance, SEC Filings, accessed June 5, 2018, http://finance. yahoo.com/q/sec?s=AMZN+SEC+Filings. 3. Bob Evans, “Top Cloud Vendors Will Crush $100 Billion in 2018 Revenue; Microsoft, Amazon, IBM Hit $75 Billion?,” Forbes, May 21, 2018, accessed June 5, 2018, www.forbes.com/sites/ bobevans1/2018/05/21/top-cloud-vendors-will-crush-100-billion-in2018-revenue-microsoft-amazon-ibm-hit-75-billion/. 4. Jordan Novet, “Microsoft Narrows Amazon’s Lead in Cloud, but the Gap Remains Large,” CNBC, April 27, 2018, accessed June 5, 2018, www.cnbc.com/2018/04/27/microsoft-gains-cloud-market-share-in-q1but-aws-still-dominates.html. 5. Patrick Thibodeau, “Apple, Google, Facebook Turn N.C. into Data Center Hub,” Computerworld, June 3, 2011, accessed June 5, 2018, www.computerworld.com/article/2508851/data-center/applegooglefacebook-turn-n-c-into-data-center-hub.html. 6. Signiant, “The Need for Speed Series Part 1: In a Changing Media Landscape,” Studiodaily, March 20, 2018, accessed June 5, 2018, http://partners.studiodaily.com/signiant/content/ the-need-for-speed-series-part-1-in-a-changing-media-landscape. 7. Hiawatha Bray, “When the Billboard Has a Brain,” The Boston Globe, April 6, 2018, www.bostonglobe.com/business/2016/05/18/whenbillboard-has-brain/TjUFP907S0nUKmqsLihsaN/story.html. 8. Christopher Mims, “Your Location Data Is Being Sold—Often Without Your Knowledge,” The Wall Street Journal, April 6, 2018, www. wsj.com/articles/your-location-data-is-being-soldoften-without-yourknowledge-1520168400. 9. Swati Khandelwal, “Google Collects Android Location Data Even When Location Service Is Disabled,” The Hacker News, April 6, 2018, http:// thehackernews.com/2017/11/android-location-tracking.html. 10. Signiant, “The Need for Speed Series Part 1: In a Changing Media Landscape,” Studiodaily, March 20, 2018, accessed June 5, 2018, http://partners.studiodaily.com/signiant/content/ the-need-for-speed-series-part-1-in-a-changing-media-landscape. 11. SAS, “Machine Learning: What It Is & Why It Matters,” SAS.com, accessed June 5, 2018, www.sas.com/it_it/insights/analytics/machinelearning.html. 12. Ibid. 13. Lukas Biewald, “How Real Businesses Are Using Machine Learning,” TechCrunch.com, March 19, 2016, accessed June 5, 2018, http://techcrunch.com/2016/03/19/ how-real-businesses-are-usingmachine-learning. 14. Ibid. 15. Tom Simonite, “Google’s Quantum Dream Machine,” TechnologyReview.com, December 18, 2015, accessed June 5, 2018, www.technologyreview.com/s/544421/googles-quantum-dream-machine. 16. Jennifer Ouellette, “How Quantum Computers and Machine Learning Will Revolutionize Big Data,” Wired, October 14, 2013, accessed June 5, 2018, www.wired.com/2013/10/computers-big-data. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 4 The Cloud 17. Elizabeth Weise, “IRS Site Back Up and Running—Drawing on Computer Codes That Date Back to the 1960s,” USA Today, April 18, 2018, www.usatoday.com/story/tech/news/2018/04/18/ irs-site-back-up-and-running-drawing-computer-codes-date-back1960-s/528468002/. 18. Ibid. 19. Thomas Claburn, “It’s US Tax Day, so of Course the IRS’s Servers Have Taken a Swan Dive,” The Register, April 17, 2018, www.theregister .co.uk/2018/04/17/irs_systems_stumble/. 20. Ibid. 21. Ben Casselman, “Everyone Files Their Taxes at the Last Minute,” FiveThirtyEight, April 15, 2016, http://fivethirtyeight.com/features/ everyone-files-their-taxes-at-the-last-minute/. 22. Rob Stott, “Amazon’s Share of Black Friday Transactions Will Shock You,” DealerScope, November 27, 2017, www.dealerscope.com/article/ hitwise-amazons-share-black-friday-transactions-will-shock. 23. P&S Market Research, “Telemedicine Market to Cross $48.8 Billion by 2023: P&S Market Research,” Globenewswire.com, May 30, 24. 25. 26. 27. 28. 29. 207 2018, accessed June 5, 2018, http://globenewswire.com/newsrelease/2018/05/30/1513647/0/en/Telemedicine-Market-to-Cross-488-Billion-by-2023-P-S-Market-Research.html. Rose Eveleth, “The Surgeon Who Operates from 400km Away,” BBC.com, May 16, 2014, accessed June 5, 2018, www.bbc.com/future/ story/20140516-i-operate-on-people-400km-away. Issie Lapowsky, “Video Is About to Become the Way We All Visit the Doctor,” Wired, April 30, 2015, accessed June 5, 2018, www.wired .com/2015/04/united-healthcare-telemedicine. Robert Reich, Work of Nations: Preparing Ourselves for Twenty-First Century Capitalism (New York: Vintage Books, 1992), p. 176. PYMNTS, “Salesforce’s Revenues Grow to $3B,” June 4, 2018, accessed June 7, 2018, www.pymnts.com/news/b2b-payments/2018/ salesforce-revenue-growth. Yahoo! Finance, “Salesforce.com, Inc. (CRM),” accessed June 7, 2018, http://finance.yahoo.com/quote/CRM/http://finance.yahoo.com/quote/ CRM/. Salesforce.com, “Recognition,” accessed June 7, 2018, www.salesforce .com/company/recognition/. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Teaching Case Improving the clinical-care pathway of an Ayurvedic hospital: a teaching case for developing process improvement capabilities Wasana Bandara1, Dharshani Thennakoon1,2, Rehan Syed1, Paul Mathiesen1, K K D S Ranaweera 3,4 1 Business Process Management Discipline, Information Systems School, Queensland University of Technology, Brisbane, Australia; Faculty of Management and Finance, Department of Human Resources Management, University of Colombo, Colombo, Sri Lanka; 3 Bandaranaike Memorial Ayurvedic Research Institute, Maharagama, Sri Lanka; 4 Department of Food Science and Technology, University of Sri Jayewardenepura, Nugegoda, Sri Lanka 2 Correspondence: W Bandara, Business Process Management Discipline, Information Systems School, Queensland University of Technology, 2 George Street, Brisbane, QLD 4000, Australia. E-mail: w.bandara@qut.edu.au Abstract Business Process Management (BPM) is a topic that has received immense attention in information systems research and practice. While its adoption has been increasing rapidly, many companies struggle to find BPM professionals with the appropriate skills, hence BPM education has been an area of increasing interest as well. One big challenge for BPM education is the lack of teaching resources. Appropriately written BPM teaching cases derived from real-life case scenarios has been recognised as a valuable means to address this gap. Yet, teaching cases that are rich in context dedicated to BPM are still scarce. This teaching case, specifically developed for business process improvement education purposes, is designed as a rich resource to address this gap. Teaching notes with an extensive set of multimedia ancillary material are also available to instructors upon request. This case study is based on a real-life patient-care process of a national Ayurvedic hospital in Sri Lanka. With its position as the leading national institute for Ayurvedic research and teaching, the hospital has the potential to make striding impacts with Ayurvedic innovations both nationally and globally. This narrative describes the current patient-care process in detail, challenging students to analyse the current process and derive justifiable high-impact creative/innovative recommendations that are feasible to the case’s context and improve business processes at the hospital. Journal of Information Technology Teaching Cases (2016) 6, 111–120. doi:10.1057/jittc.2016.4; advance online publication, 24 May 2016 Keywords: process management; business process improvement; teaching; patient care; clinicalcare pathways; Ayurveda Introduction n any organisation the effectiveness of core business processes is critical to sustained delivery of services and agreeable customer outcomes. As supported by Hellström et al. (2010), this business imperative is justifiably of significant importance in the healthcare industry, especially when organisations are heavily impacted by operational and national constraints. On the basis of this resource-focussed context, Business Process Management (BPM) can provide a I ‘set of methods, techniques and software tools supporting the design, enactment, control and analysis of operational business processes in order to facilitate an optimised value creation’ (Houy et al., 2010: 621). The healthcare industry in particular will benefit from this approach as Osterweil (2011: 187) acknowledges that ‘carefully defined processes can be effective tools for guiding and coordinating the actions of healthcare professionals’. This imperative is also driven by 209 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 210 I mP R OV I nG T H E C LI n I CA L- CAImproving R E PAT H WAy the clinical-care pathway W Bandara et al 112 2 112 global healthcare challenges such as ‘declining resources and increasing patient complexity with an increasing need for high-quality healthcare services’ (Helfert, 2009: 937). In this teaching case, the healthcare provider in question (the Navinna Ayurvedic Hospital) is highly constrained in terms of physical, financial and human resources (HR). This necessitates the stringent and targeted application of process improvement methods that support the effective delivery of patient services aligned with the ethos of this organisation. Weerasinghe et al. (2014) view BPM as important for developing nations considering the impact process improvement can bring on these nations. The rapidly developing nation of Sri Lanka is currently at a crossroads, embracing new Western medical practices while holding true to established, widely accepted and deeply cultural medical programs. The practice of Ayurveda is one such holistic approach to the management of patient well-being that has long been applied with much success. Now, with widespread acceptance both domestically and internationally, the demand for Ayurvedic healing is rapidly increasing. This case study is based on the leading Ayurveda research institute and healthcare provider: Navinna Ayurvedic Hospital in Sri Lanka. It is a not-for-profit national institution, where, in addition to the provision of patient healthcare services, the hospital plays a vital role in the delivery of much-needed teaching and research programs to advance the quality of Ayurvedic healing and improve patient outcomes. These deliverables must be achieved under tight fiscal constraints from the government as well as increased scrutiny from the community in general, as funding for continued research and practice is always under threat. The fact that the hospital operates on a not-for-profit basis increases the obvious cost and revenue efficiencies they must strictly adhere to. The appropriate use of ‘real-world’ teaching cases supports the current challenge of BPM education where there exists a gap in appropriate teaching resources that have been derived from real organisational scenarios. This teaching case (with a detailed supporting resource kit) has been designed to help address this known gap. On the basis of the provided narrative, students are tasked with creating innovative and effective process improvement ideas that support sustainable excellence in the provision of patient services. BPM is considered as a suitable approach for consolidation and effective management of all patient-care functions to achieve operational efficiencies (Jain, 2009). The effectiveness of automation for patient-care processes has been questioned by the healthcare industry, and BPM has been acknowledged as an alternative for streamlining all healthcare processes. Furthermore, the access to healthcare services located in the urban areas by rural communities has been identified as a critical issue faced by many developing countries (Mitra et al., 2008). The positive results produced by introducing BPM in the public-sector healthcare establishments were reported by Ramani (2004). To advance the practices of the Navinna Ayurveda Hospital and ensure continued quality of healthcare, it is now critical to document and analyse the core business processes of this organisation and establish a set of metrics by which it can be managed. By improving the business operations of the hospital there will be a direct impact upon the national healthcare system, an opportunity to cater for international demand and, most importantly, improved patient outcomes that are sustainable. Background According to Obeyesekere (1976), Ayurveda is considered more than a medicine as its base stems from religion and ritual. Before being introduced to Allopathy (‘Allopathy’ is a term used to refer to the broad category of medical practice that is commonly known as ‘Western medicine’), it was Ayurveda that treated the ill of Sri Lanka. At present, a system of plural medicine exists in Sri Lanka where both Western biomedicine and Ayurveda are seen as equal alternate forms of medication. Predominantly, Ayurveda has been identified with wellness and around it have emerged many luxury Ayurvedic solutions for indulgence and pampering. This has succeeded in catering to a domestic market and has also opened avenues for international exposure in terms of Ayurvedic exports and as a means of attracting tourism. Although the practice is gaining popularity globally (and widely used by Sri Lankans), the need for identifying Ayurveda as a holistic medical alternative has been under pressure with Ayurvedic forms of treatment being critically tested on the patient outcomes it delivers. Bandaranaike Memorial Ayurveda Research Institute (Ministry of Health and Indigenous Medicine, 2015a), based in Navinna, Sri Lanka (also known as the Navinna Ayurveda Hospital) was set up in 1962 as a national research institute for Ayurveda in Sri Lanka. The mission of the hospital is to be the national leader in Ayurvedic research; to be engaged in focussed and well-planned research and development in every aspect of Ayurveda; and to enhance and improve the contribution of Ayurvedic medicine to patient well-being. Apart from the research activities that it conducts, the institute provides services to both out-patients and also has separate wards to cater to patients who need in-house treatment. The hospital is an institution that belongs to the Ministry of Health and Indigenous Medicine of Sri Lanka and comes under the direct purview of the Department of Ayurveda (Ministry of Health and Indigenous Medicine, 2015b). The hospital runs as a complete not-for-profit organisation. The funding for the hospital comes from the Department of Ayurveda (under the Ministry of Health and Indigenous Medicine). All doctors who practice at the Navinna Hospital have had intensive training at Sri Lankan universities where they have received specialised training in the practice of Ayurveda for at least 6 years. Further, the hospital is also the largest Ayurvedic teaching hospital in Sri Lanka. Other staff members such as the nurses, attendants (also known as health service assistants), pharmacists, research officers and lab assistants are also well-trained professionals in the field who have undergone special training on Ayurveda and are fully qualified in Ayurvedic aspects related to their job roles. A severe shortage of qualified staff who can competently conduct these activities has been an ongoing issue. The hospital currently has 125 personnel, which includes 31 doctors, 8 nurses, 1 sister who overlooks the nurses, 15 ward attendants and 5 kitchen staff among the other staff. Figure 1 provides an overview of the hospital’s organisational structure in terms of staff designations at the strategic levels and the different divisions falling under them. The focus of this case is on the patient-care area, hence related roles specific to these tasks are listed further in Figure 1. Recent organisational performance reviews have highlighted the need for proper formalisation, documentation and rapid review of the business processes undertaken at the hospital. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Improving the clinical-care pathway W Bandara et al ImPR OV InG TH E C L InICAL-CARE PATHWAy 211 113 3 Commissioner of Ayurveda Director Deputy Director Admin Assistant Director (AD) Admin AD Patient Care Management Unit AD Outreach Health Services Clinics General Maint. Unit Wards Drug Manuf.acturing Unit General Stores Drug Stores Staff Dev Unit Internal Audit Support Staff AD Finance Biodiversity Centre & Nursery Testing Unit Public Interaction and Extension Unit Internal Lab Dispensary Unit Kitchen Sanitation & Maintanance. Unit Biochemical and Pathalogy Unit AD R&D Legal Officer Standardisation Division Research Division Phamocognacy Division Statistics Unit Lab Unit Lab Maint Unit Ethical Review & Intellectual Property Rights Knowledge Division Library & Literary Section Publication Unit Audio Visual Unit ICT Unit Ticket Office • Doctors (31) • Chief Medical Officer • Resident Medical Officer • Sisters (1) • Nurses (8) • Medical Laboratory Technician • Ward Attendants (1) Figure 1 Organisational structure. The Navinna Ayurveda Hospital management has shared (see Figure 2) a high-level overview of the core processes conducted and have identified some significant issues and opportunities for improvement within their patient-care processes. A detailed analysis of the end-to-end process, from when an individual enters the hospital as a ‘patient’ to the time the patient leaves the hospital, is discussed in the sections that follow. Improvements in this process will have a direct impact upon the thousands of Sri Lankans who reach out to Navinna hospital for Ayurvedic services to address their healthcare needs. Detailed description of current scenario For the Navinna Ayurveda Hospital management, it is not only what is being delivered to the client that is important but also how the service is being delivered. Coherent communication and patient safety are also aspects that the Navinna Ayurveda Hospital aims to achieve. One issue is patient waiting times, which negatively affects the hospital’s reputation; elimination of these long waiting times is a key objective. Furthermore, patient errors are numerous, especially for those patients who see multiple doctors or who have multiple chronic diseases. This is partially influenced not only by the weaknesses of existing processes and information management, but also because of the nature of Ayurveda itself and its unique ways and methods of treatment. Reducing such errors is paramount to ensure compliance with emerging National health standards, another key imperative. The value chain of the hospital is depicted above in Figure 2. All organisational units represented here complement the activities of and are heavily interdependent on each other. The support activities have been identified to be crucial in the implementation of the primary activities. Both the primary and support activities are described in the sections that follow. The patient-care chain directly and indirectly interacts with a large number of areas (hence many different stakeholder groups) within the hospital and therefore is a very complex process. There are three main variants (different types of patients) who seek services through the patient-care process. They are (1) patients of the outdoor patient department (hereinafter referred to as OPD), (2) patients who seek services at the different clinics held at the hospital and (3) patients who undergo in-house treatment within the hospital. The hospital has identified two types of patients within its care process: (1) the first-time patients who will always be directed to the OPD (where they may be recommended for further visits to the OPD, treatment at the clinics or in-house treatment) and (2) the repeat patients who can be either patients to the OPD or the clinics (this is further elaborated in the sections ‘Patient registration’, ‘Outdoor patient department’, ‘Clinical care’ and ‘In-house treatment’). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 212 I mP R OV I nG T H E C LI n I CA L- CAImproving R E PAT H WAy the clinical-care pathway W Bandara et al Primary Activities Support Activities 4 114 Strategic Planning, Auditing and Finance Administration and Human Resource Management (HRM) Ayurveda Research and Outreach Health Services Procurement Patient Registration Out Patient Department (OPD), Clinical Care, In-House Care Pharmacy, In-Door Dispensary (IDD), Out Patient Dispensary Health Information Management Laboratory Services, Patient Diet Management Figure 2 Overview of core process areas at the Navinna Hospital. Patient registration A patient’s first point of interaction after entering the hospital is with the ticket issue counter (hereafter referred to as the ‘ticket counter’). This is a very small counter with little physical space available to attend to the registration of all patients at the hospital. There are two different queues: one for the ‘first-time’ patients and another for repeat patients of the hospital. As no proper directions are given, the patients themselves have to identify the ticket counter, which is situated a distance away from the entrance to the hospital, and they must also identify the specific queues to which they belong. If it is a first-time patient, he/she will be given a prescription form by the ticket clerks at the ticket counter, to be filled in and handed to the Doctor by the patient. The form will require the patient to fill in details such as the name, address, age, gender and the occupation of the patient. At this point, a record starts for the patient at the ticket counter, and he/she will be issued with a registration number. The registration number comes with a numerator and a denominator. The denominator denotes the month (where an alphabetical index is used to represent the different months, where January is represented by A and February by B, etc.) in which the patient visited the hospital for the first time, and the numerator denotes the number that is assigned to the patient. Together with this registration number, the patient is also issued with a registration form that the patient should always bring along with him/her when he/she visits the hospital. This form also needs to be completed by the patient and requires (1) the registration number issued to the patient, (2) the name of the patient and (3) the date. The summary details on the prescription form are also entered by the staff in a separate manual log book that is maintained by the ticket counter. It captures the date, and the patients (including name, age, registration number and residential details) that were treated on that date. This is used for record-keeping purposes to know the exact number of patients who were treated within the day/ week/month and so on. Upon registration, the patient is then directed to the OPD. Here a doctor will examine the patient and will record details of the diagnosis and the prescription for medicine on the prescription form that was issued to the patient at the ticket counter. If the patient is a repeat patient (either of the OPD or of the clinics that are explained further in the sections ‘Outdoor patient department’ and ‘Clinical care’, respectively), the patient’s records should already be available with the ticketissuing counter. Upon submission of the registration form (which the patient at the initial visit is given to carry with them on any occasion that they visit the hospital for medication), the ticket clerks will retrieve the records from the filing shelf where the records are maintained (see the section ‘Recordkeeping and health information management’ for further details). The retrieved record is then handed over to the patient who is either directed or escorted to the waiting area near the consultation chamber. It is clear that the ticket-issuing process is time consuming and, although the staff do try to be as efficient as possible, there are long queues especially during the peak hours. Often there is a lack of staff to handle the work load, at which times other hospital staff (from various designations) are called in for assistance. This ad hoc allocation of staff as need arises has created obvious issues from a HR perspective, as issues like establishing clear role accountability and training are frequently overlooked. Outdoor patient department Patients, who need medical or surgical care but are not in acute emergency, generally attend the OPD. A permanent cadre of Ayurvedic doctors performs general physician services for OPD patients. They may refer patients to specialist consultations at the clinics or for in-house care when they deem it necessary, and thus the OPD also acts as a filter for inhouse admissions and specialist consultations at the clinics. On any given day, the OPD provides services to approximately 250 patients. Patients who get their prescription forms at the ticketissuing counter have to find their own way to the waiting area of the OPD, as the direction from the ticket counter is not clearly displayed. The waiting area sometimes lacks capacity to allow for seating facilities for all the patients of the OPD. The patients wait (for a duration that may vary from a minimum of 10 min to 90 min depending on the peak and off-peak hours) for their appointment. As patients are not informed or called for consultation, they have to be very attentive to work out when to walk in to see the doctor. Some consultation chambers are situated in a common hall and are attended by three or four doctors. The doctor takes historical patient IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Improving the clinical-care pathway W Bandara et al ImPR OV InG TH E C L InICAL-CARE PATHWAy 213 115 5 details from the prescription form (which the patient obtained from the ticker counter, in the case of repeat patients) and examines him/her. The doctor also informs the patient regarding his/her ailment, plan of treatment and prognosis and accordingly may prescribe drugs and/ or additional tests. The patient may also be given a date for revisits where deemed necessary. Where necessary, patients will be directed to the clinics if the patient requires specialised treatment for their ailments or for in-house admission. For each consultation of this nature, a doctor takes approximately 5–10 min. Clinical care Ayurvedic doctors specialising in various ailments such as cardiac disorders, eye problems, diabetes and so on can be consulted at the clinics. Clinics are held on Monday–Friday – 8.00 am–4.00 pm. There are 18 specialised areas of treatment, and normally three clinics are held for approximately a hundred patients on any given day. The patients have to be vigilant about the timetables of the clinics as they are not welldisplayed, and there is no point of contact available to the patients to get information about the clinics. All clinics are dispersed around a generic area of the hospital that the patients must locate by themselves. Similar to the OPD consultations, the patients who receive their prescription form at the ticket counter find their way to the clinics (as it is not displayed) and wait for their turn to consult a doctor. In-house treatment The hospital has four separate wards – one each for (i) males, (ii) females, (iii) children and expectant women, and (iv) the clergy. Twenty five patients can be accommodated in each ward except the one for the clergy, which can accommodate only up to 10 patients at a time. On any given occasion, all the wards except for the ward for clergy are full and in total accommodate an average of 75 patients a day. Despite being recommended by a doctor at the OPD or a clinic, not all patients are accommodated for in-house treatment because of lack of capacity. However, in case of capacity problems, special preference is given to patients who are firsttime patients waiting to be admitted. Patients who have been admitted at the different wards on prior occasions will only be admitted if 3 months have elapsed after the last date of them being discharged from the ward. This is recognised as a general rule applied by the hospital to provide its services to the majority of the masses who seek in-house medication at the hospital. To admit a patient to a ward, a referring doctor must first informally check the available ward capacity by consulting with the ward staff. The Chief Medical Officer (CMO) at the OPD is also kept informed about the ward occupancy details by the duty nurse on a daily basis. The patient takes the prescribed admission document offered by the doctor to the Resident Medical Officer’s (RMO) office. The RMO at this stage approves the patient admission. The RMO considers both patient details and the availability of space at the wards before approving admittance to the ward. Upon approval, the patient’s details are provided by the patient or the patient’s guardian to the staff (most probably a clerk) at the RMO’s office who completes an inhouse registration application for the patient. The application form includes details such as the name, age, gender, marital status and residential address of the patient and/or guardian. The patient and the guardian then leave for the ward with the in-house registration application and hands it over to the nurse in-charge of the ward at the particular point in time. The nurse will then record details of the patient in the log book maintained at the ward. As a general hospital rule, inhouse patient admissions are only allowed from 8.00 am to 11.30 am and 2.00 pm to 3.30 pm. Upon admission, the patient is given a special ward-patient ID number. This number is different from the number that the patient was initially registered with. A separate patient register is maintained in each ward by a nurse that includes details such as (1) the number of cases from the commencement of the year, (2) number of cases from the commencement of the month, (3) the name of the patient, (4) age of the patient, (5) gender of the patient, (6) marital status of the patient, (7) the religion and ethnicity of the patient, (8) date and time of admission to the hospital, (9) number of days the patient was ill before admission or the date on which he/she fell ill and (10) place at which he/she fell ill or was wounded. Upon discharge, the date and time at which the patient was discharged will also be noted in the register. Once a patient is admitted to a ward for in-house treatment, they will be subject to care and medication from the staff at the ward. As soon as the patient is admitted to a ward, the doctor-in-charge is informed who then examines the patient. If the doctor-incharge is not available, another available doctor or the RMO will be informed to examine the patient. The doctors, who are in-charge of the wards, will examine the patient and prescribe medicine and diets, and conduct various medical examinations (e.g., urine, blood pressure, heart, etc.) of the in-house patients on a daily basis. These will be recorded separately for each patient in the prescription forms (containing patient’s name, details of prescribed medicines and dietary requirements) used for in-house patients. Apart from this, the patient’s condition is also recorded on a daily basis by the doctor. The average cost incurred by the hospital for an in-house patient’s medicine amounts to Sri Lankan Rupees (LKR) 1500.00 (see Appendix for some further details related to costs described here and currency conversions).The treatments specified by the doctors will be provided by the nurses and the attendants at the wards. The wards also have very basic facilities of toilets, bathrooms and eating spaces for the patients. Certain equipment within the wards was donated by the patients and their caretakers. However, because of limited infrastructure, some of the equipment has not been used. The archaic design of the ward does not provide adequate privacy for patients. Female patients have to take additional steps on their own to ensure their privacy. The admission capacity can be increased by utilising the ample space available at the hospital (the hospital sits in an area of 18 acres of land with sufficient buildings already established and in good condition, which are not used in a very ‘space-wise’ manner). The inadequate furniture for visitors makes it difficult for them to manage their visits to the ward patients. In-house patients are examined daily by the doctor-incharge. They will decide on the patient’s condition and make the decision whether the patient needs further in-house treatment or is ready to leave for home. If a patient is not fit to leave for home, they will continue to remain at the hospital on medication and under daily monitoring. The ward staff, IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 214 I mP R OV I nG T H E C LI n I CA L- CAImproving R E PAT H WAy the clinical-care pathway W Bandara et al 6 116 although few in number to attend to all the work relating to the in-house patients, try their utmost best to serve the patients well. If it is decided that the patient no longer needs treatment in-house, the patient will be set for discharge and will be informed of it. In most cases, patients are advised by the ward-in-charge doctor to continue with the prescribed medication at home. The patient will have to purchase the prescribed medicine externally if it is not available at the indoor dispensary (IDD). On certain occasions, because of the unavailability of adequate space and inadequacy to handle a large number of patients, certain patients cannot be accommodated in the wards, and, therefore, they are required to visit the wards for treatment either on a daily basis or on specific days. The records of the patients’ medication history are kept at the ward in a separate summary patient register. This is maintained by the ward staff during a patient’s stay. Record-keeping and health information management Record-keeping primarily happens at the ticket counter that has very small space availability. The records of the repeat patients to the OPD are physically maintained in different shelves at the counter. The shelves are labelled alphabetically to denote the month in which the patient initially visited the hospital (e.g., January – A, February – B, March – C) and the frequency of visits that patient has paid to the hospital (e.g., a patient who has visited once – 1, a patient who has visited twice – 2, etc.). The records of patients to the clinics are also maintained at the ticket counter separately from the records of the OPD patients. They are stored according to the different clinics run by the hospital. When a patient revisits the clinic, after the very first time, his/her records will be retrieved manually on a case by case basis by the staff at the ticket counter, for the patient to produce to the doctor that she/he will be seeing. All records of patients that exceed 3 months are physically archived in the ticket office. They are bundled according to the month and frequency system and stored away so they can be retrieved if the need arises. All related detailed documents of any discharged in-house patient are maintained in a special archival system. As the hospital has no separate records room, these documents of patient history are maintained manually by the hospital’s Diet Clerk in two separate cupboards stored according to the year of admittance and the ward in which the patient was treated. These records are kept for 5 years and rarely accessed unless needed for future reference. Out-patient dispensary, IDD and pharmacy There are three points of supply of medicine within the hospital, namely, the out-patient dispensary, the IDD (where medicine containers are not always labelled) and the pharmacy. Both the out-patient pharmacy and the IDD deal mostly with non-perishable medicine, whereas the pharmacy deals mostly with perishable medicine and only caters to the inhouse patient requirements, making the prescribed Ayurvedic medications. The out-patient dispensary caters to the OPD patients. The IDD caters to the patients of the clinics as well as the in-house patients. The distinction between the out-patient dispensary and the IDD is not very clearly articulated to the patients who sometimes confuse themselves when obtaining the medicine from the relevant dispensary. Patients form long queues at both dispensaries because of the severe lack of staff, and often staff from other areas in the hospital are called in to help out during peak hours. The experienced and trained staff at the dispensary check the patients’ prescriptions and issue the patients with the necessary medicine. They know the medicines by heart, and even though the medicine containers are not properly labelled, the staff are confident that there is very little room for mistakes in the issuing of medicine. The prescription forms of the patient will be kept with the dispensary and later (at the end of the day) returned to the ticket counter. Average cost of medicine for an OPD patient is between LKR150.00 and LKR400.00 for a clinical patient. If the required medicine is not available with the out-patient dispensary or the IDD, the patient or their caretakers will be informed to purchase the medicine externally. A separate register for the different categories of the issued medicine will be kept at the dispensary for reporting purposes. This record will track the amount of oil, tablets and other Ayurveda medicine that was issued for the day/week/month from the dispensary or pharmacy. Medicine needed for the dispensaries will be requested by the dispensary staff from the drug stores (the hospital’s drug procurement and inventory management office, which is discussed in detail in the section ‘Procurement’) through a drug requisition form. This form includes details such as: (1) the date of issue; (2) the different types of medicine issued; (3) the quantities of medicine issued; and (4) the signature of the staff at the pharmacy who issued the medicine. The doctors at the wards will prescribe the medicine to be issued to the patients each day during their ward rounds in the morning. According to such prescription, the staff at the ward will order medicine of a non-perishable nature from the IDD. Upon receipt of the order from the ward the dispensary will issue the medicine. They will keep record of the issued medicine and send the book on which the request was placed back to the ward. If the medicine is not available at the dispensary, staff at the dispensary will inform the ward staff of the unavailability who will then inform the caretakers of the patient to source the medicine externally. A separate register for the different categories of the issued medicine is kept at the IDD for reporting purposes. This register will record the amount of medicine in different forms that were issued by them. Requests for the medicines of a perishable nature will be placed with the pharmacy. The ward staff will enter their requirement on a special book requesting the pharmacy for the medicine and send it across to the pharmacy upon which the pharmacy will prepare the necessary medicine. The pharmacy will keep record of the issued medicine and hand over the book to the wards. A separate register for the different wards and the issued medicine will be kept at the pharmacy for reporting purposes. The pharmacy and its functions are run in a very old building within the hospital premises that is not built for this purpose and hence sometimes creates difficulties for the staff in the preparation of medicine. A doctor-in-charge at the pharmacy and staff supports the activities. However, there is certainly the need for more trained staff to work at the pharmacy. There is special purpose machinery that is used for the making of medicine, and some of this machinery is not operational. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Improving the clinical-care pathway W Bandara et al ImPR OV InG TH E C L InICAL-CARE PATHWAy 215 117 7 Patient diet management Patient diet management is a critical aspect of Ayurvedic treatment and therefore is given high importance. Ayurvedic meals promote good health and well-being and are prepared according to the recommendations of the doctors. The food for the patients conforming to the dietary plans set by the Department of Ayurveda is decided by the doctorin-charge of the ward. The staff is of the view that these plans are very old and at times outdated and are not suitable for the current context. A Diet Clerk, on a daily basis, takes a record of the food that needs to be prepared for the patients and makes a chart of the details that she receives from the wards. The Diet Clerk’s responsibility thereafter is to convey the meal plan to the kitchen staff and ensure the patient is getting the meals at the scheduled time. Once the meal plan message is conveyed to the kitchen through a document (maintained by the Diet Clerk), the kitchen staff prepares the meals and delivers it to the appropriate wards. There are five kitchen staff including the Diet Clerk, cooks and helpers. The hospital incurs approximately LKR90 per patient on meals on any particular day. Nurses attached to the relevant wards will cross check the meal with the prescriptions to ensure the correct meal is given to the patient. There are also specific dietary plans for the patients with different ailments (e.g., for diabetes patients) that are specified by the Department of Ayurveda with the collaboration of the Ministry of Health. The kitchen places orders for the needed ingredients to prepare meals with the registered suppliers of the hospital. The suppliers will deliver the ordered ingredients to the hospital. The payment for the suppliers is done by the Department of Ayurveda, and there are times when there is a lack of funds to support essential appropriate food requirements for the diverse patient needs, and thus compromised meals are occasionally provided to the patients. Procurement The Department of Ayurveda calls for quotations from medicine, raw material and food suppliers on an annual basis to supply to all Ayurvedic hospitals in Sri Lanka including the Navinna Hospital. At the Navinna Hospital, there are two stores; the drugs store (which deals with all medicine storage and distribution), and the general store (which stores all other procured goods other than medicine). All shortages of medicinal requirements are requested from the drugs stores (referred to as the ‘Stores’ hereinafter). The stores play a vital role in making the medications available for the patients as and when required. The stores get requests for different kinds of medicine from the OPD, the IDD and the Pharmacy. On the basis of requests and the experience of the officer-in-charge of the stores (who has been doing the ordering for a long period of time), the monthly orders will be placed with the relevant suppliers. However, sometimes, there are delays in the supply of ordered goods from the stores to the two dispensaries and the pharmacy that creates a shortage of medicine to be issued to the patients. Although the staff at the stores is experienced, because of lack of training, they have limited professional expertise in managing the stores. Normally, the requirements are provided to the stores through internal telephone calls. The pharmacy will request the amounts of different raw materials needed to prepare the medicine from the stores through a specified book entry (though notifying of it is done informally over the phone). At the time of issuing the medicine to the pharmacy, the staff of the pharmacy will arrive at the store complex and receive the goods in the presence of the store staff. The Store-in-charge officer will be present when issuing the goods. The Storein-charge officer will note the details of the goods issued in the book sent by the pharmacy and keep a copy of these details for record purposes. The pharmacy will prepare the necessary perishable medicine for the patients in the wards and send the medicine to the stores. The stores will take a stock of it and send it across to the IDD for distribution within the wards. One of the main suppliers to the hospital is the Ayurvedic Drugs Corporation. All suppliers will be paid through the Department of Ayurveda. The hospital will also call for quotations from suppliers for certain types of medicine. Records of orders placed, goods received as per orders made and goods issued to the different sections of the hospital are recorded in a separate registry. This enables the stores to determine the available stock of different medicines at any particular time and when to make orders in a timely manner. Ayurvedic research Research activity in the hospital is centred on clinical treatment and thus conducts well-planned research in every aspect of Ayurveda to enhance and improve the contribution of Ayurvedic medicine to the national healthcare services. Research focusses on five main areas, namely, cancer, cardiovascular diseases, chronic kidney diseases, diabetes and dengue. All doctors of the hospital are attached to at least one of the five areas of research. Undergraduate interns also conduct research in collaboration with the research unit of the hospital. Laboratory services The laboratory services within the hospital include two main sub-areas. One is the Botany division, which authenticates the raw material used in the production of drugs, and the other is the standardisation lab, which checks whether the medicine used in the hospital complies with the physical and chemical standards. These areas assist in quality assurance of the medicine produced and used at the hospital. Strategic planning The Commissioner of Ayurveda (based at the Department of Ayurveda) is the primary authority of the hospital as it is an institution that comes under the purview of the Department of Ayurveda. The operations of the hospital are headed by the Hospital Director. The hospital is given authority and has the autonomy to make decisions within the frameworks stipulated by the Department of Ayurveda. However, approval of the Commissioner is sought in all policy-related matters. The Director of the hospital, two doctors in-charge of administration and the OPD section CMO have regular meetings and are involved in official strategy-related matters and short- and long-term planning. However, staff suggestions and participation is always sought by the Director when venturing out for new initiatives. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 216 I mP R OV I nG T H E C LI n I CA L- CAImproving R E PAT H WAy the clinical-care pathway W Bandara et al 8 118 HR management and administration The officers in-charge of the HR management and administration activities mainly deal with the attendance, leave, salaryrelated matters and the maintenance of personal files of employees. Table 1 depicts approximate monthly salaries of some employees of the hospital. Auditing and finance General auditing of the hospital is done by the Auditor General’s department that is responsible for all audit-related activities in the public sector of Sri Lanka on an annual basis. Apart from this, the internal audit team from the Department of Ayurveda also conducts audits within the hospital. The funds received from the treasury for research activities are handled by the project offices of the research and development division that are established to administer the five different research areas (discussed in the section ‘Challenges and tasks’). The management unit overlooks the funds allocated for the other expenses of the hospital. There are administrative officers at the project offices and the management unit who look into the finance-related activities under the purview of the Director of the hospital. The expenses that the general office deals with are depicted in summary in Table 2. Table 1 Monthly Staff Salaries Salary gradea Doctors • Special grade • Senior medical officer • Junior medical officer Administration staff • Administrative officer • Development officer • Research assistant • Senior management assistant • Junior management assistant • Driver • Senior nurse • Junior nurse Minor staff • Ward attendant • Labour – Senior • Labour – Junior Expenditures (LKR) 82,113 72,074 47,192 48,904 34,316 36,745 43,292 32,638 38,480 66,573 47,544 36,284 31,695 30,729 a Employees within a certain function (e.g., ticket counter, dispensaries) may fall into different salary grades based on their seniority. Table 2 Annual Expenditures Item Annual total expenditure on medicine Annul total cost on administration activities a Expenditure (in Sri Lankan Rupees – LKR)a 26,002,284 12,440,580 See Appendix for further financial details and currency conversion information. Challenges and tasks Your team is requested to conduct a comprehensive process analysis and improvement project for the patient-care process described above. The main challenges are expected to centre around: development of a detailed understanding of the current (as-is) process; definition of a (graphical) process model describing the process; identification of key performance indicators, benchmarks and other performance metrics; conducting quantitative and qualitative analyses of the as-is process performance; and proposal of opportunities and recommendation for process improvements for the short term (to be implemented in the next 3–6 months) and long term (to be implemented in 12–18 months). It is important to provide quantified and qualified benefits of the suggested improvement ideas, with a high-level implementation strategy and plan. Furthermore, the hospital administration is aware of the potential of IT solutions (such as EHR – Electronic patient Health Records) and how they have become the ‘norm’ in the healthcare service domain. However, with less than 5% of the hospital staff having had any formal training in IT, hospital executives have been concerned of the challenges of even considering any automated solutions. They are fully aware of the need to first better understand the underlying processes and evaluate the stakeholders ‘readiness for technology’ before any such recommendations are considered, and seek your valued input for this as well. A set of tasks (that will relate to the trainings you receive from the course) are recommended (see below) to help you address the challenges laid in front of you. 1. Describe what this case is about. 1.1. What are the main goals of this process? 1.2. What are the main phases of the described process? – Derive a value chain depicting these. 1.3. Who are the key stakeholders in this process? 1.4. What roles do these different stakeholders play in the process? 1.5. What areas/aspects of the process are not clear for you – derive a detailed set of questions that you seek to ask at the client-side interview. 1.6. What insights can you obtain about BPM in the healthcare sector? 1.6.1. For what goals and purposes is BPM applied in the healthcare sector? 1.6.2. What are some of the common issues with BPM in the healthcare sector? 1.6.3. Can you find some useful cases that would be relevant to the context of this case study (i.e., cases from the developing context/cases about better patient information management, etc.)? 2. Create a SIPOC diagram and an IGEO diagram to capture the context of this process. 2.1. What are the advantages and disadvantages of these two approaches? 2.2. For each area in the process chain, identify the main activities and the involved stakeholders. 3. Model the current (as-is) scenario for this process, using BPMN. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Improving the clinical-care pathway W Bandara et al ImPR OV InG TH E C L InICAL-CARE PATHWAy 217 119 9 3.1. Derive a high-level value chain that describes this process, using correct modelling notations. 3.2. What modelling tool and technique will you use to model this process? Justify your selection. 3.3. Document the modelling guidelines your team will use for this modelling effort. 3.4. Apply the guidelines and derive a complete ‘as-is’ process model for this process. 3.5. Reflect how easy or difficult it was to abide by the guidelines you had created – describe your response with some samples from your work. 4. Provide a preliminary analysis of the process. 4.1. Derive a SWOT analysis about this process. 4.1.1. What are the strengths and weaknesses of doing a SWOT analysis on the process? 4.2. What are the current constraints of the process? 4.3. Derive a stakeholder objective matrix for this process. 4.3.1. How are the objectives of the different stakeholders similar or different? 4.3.2. How can this effect the process improvement initiative? 4.4. What aspects of the process can you do a Pareto analysis on? 4.5. What other techniques can you use here to enhance your preliminary understanding of the process? 4.6. Provide a summary document that articulates your preliminary understanding of the process. 5. What are some of the issues of this process? 5.1. Maintain an issues register for this process. 5.2. How might you prioritise these issues? 5.3. Conduct a root cause analysis (making the relevant assumptions as deemed relevant) to three of the top priority issues identified by your team. 6. Provide a detailed analysis of the process’s current performance. 6.1. What techniques might you use here to derive a detailed performance matrix of the current process? 6.2. Conduct and show evidence of at least five relevant KPIs (making the relevant assumptions as deemed required for the analysis). 7. [Optional] Provide a summary document that articulates your understanding and analysis of the current process. 8. Provide some short-term (within 3–6 months) and longterm (within 12–18 months) improvements for this process. 8.1. Discuss your recommendations and how you derived at it. 8.1.1. Which approach(es) did you use to generate these improvement options (and why were these approaches chosen)? 8.1.2. What are the constraints that hinder/influence your recommendations? 8.2. Summarise your recommendations in a detailed business case. 9. What role can ICT play to improve healthcare? 9.1. Briefly identify the areas where ICT solutions can aid with the issues and goals of this case. 9.2. Research and report on information systems that can contribute to transform the functionalities of this hospital. 9.3. What are the challenges this case must overcome in order to be able to consider deploying these technologies? 10. [Optional] Summarise your recommendations in a detailed report and present as a business case for consideration. References Helfert, M. (2009). Challenges of Business Processes Management in Healthcare: Experience in the Irish healthcare sector, Business Process Management Journal 15(6): 937–952. Hellström, A., Lifvergren, S. and Quist, J. (2010). Process Management in Healthcare: Investigating why it’s easier said than done, Journal of Manufacturing Technology Management 21(4): 499–511. Houy, C., Fettke, P. and Loos, P. (2010). Empirical Research in Business Process Management-Analysis of an Emerging Field of Research, Business Process Management Journal 16(4): 619–661. Jain, P. (2009). BPM in healthcare [www document] http://archivehealthcare. financialexpress.com/200902/it@healthcare03.shtml (accessed 4 September 2015). Ministry of Health and Indigenous Medicine (2015a). Bandaranayake Memorial Ayurvedic Research Institute [www document] http://www.indigenousmedimini .gov.lk/Research_institute.html (accessed 2 October 2015). Ministry of Health and Indigenous Medicine (2015b). Overview [www document] http://www.ayurveda.gov.lk/ (accessed 2 October 2015). Mitra, S., Mitra, M. and Chaudhuri, B. (2008). Rural Cardiac Healthcare System-A Scheme for Developing Countries, in TENCON 2008-IEEE Region 10 Conference Hyderabad, 2008, pp. 1–5. doi:10.1109/TENCON.2008.4766548. Obeyesekere, G. (1976). The Impact of Ayurvedic Ideas on the Culture and the Individual in Sri Lanka, in C.M. Leslie (ed.) Asian Medical Systems: A Comparative Study, Berkeley: University of California Press, pp. 201–226. Osterweil, L.J. (2011). Context, Retrospection, and Prospection in Healthcare Process Definitions, in F. Daniel, K. Barkaoui, and S. Dustdar (eds.) Business Process Management Workshops: BPM 2011 International Workshops (Clermont-Ferrand, France, 29 August); Revised Selected Papers, Part II (187). Berlin, Heidelberg: Springer. Ramani, K.V. (2004). IT Enabled Applications in Government Hospitals in India: Illustrations of telemedicine, e-governance, and BPR, in 37th Annual Hawaii International IEEE Conference on System Sciences (Hawaii, 2004); Hawaii: IEEE, 1–8. Weerasinghe, K., Bandara, W., Dharmasena, T., Kuruppubandara, M. and Nawinna, D. (2014). Analysis and Improvement of a Construction Permit Approval Process: A teaching case for developing business process development capabilities, targeting developing nations, in Australasian Conference on Information Systems (Auckland, New Zealand, 2014); Auckland: ACIS. About the authors Wasana Bandara is a fully tenured Senior Lecturer at the Information Systems School, Queensland University of Technology, Brisbane, Australia. She has published over 70 refereed articles in leading IS outlets. In addition to her research interests in the IS discipline she also works in IS education topics. Dharshani Thennakoon is a Lecturer in Human Resources Management at the Faculty of Management and Finance, University of Colombo, Sri-Lanka and is currently reading for her Ph.D. at the Queensland University of Technology. Her research interest is in the area of Human Resource Management for Business Process Management and improvement initiatives. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 218 I mP R OV I nG T H E C LI n I CA L- CAImproving R E PAT H WAy the clinical-care pathway W Bandara et al 10 120 Rehan Syed is a Doctoral candidate at Information Systems School, Queensland University of Technology. His research is focussed towards understanding the characteristics of leadership in Business Process Management with a special concentration on developing countries. He specialises in information system project management and business analysis for largescale and complex projects. Paul Mathiesen is an Associate Lecturer in Business Process Management at the Information Systems School, Queensland University of Technology. He is Unit Coordinator for the Business Process Management (BPM) unit and conducts research in the Information Systems (IS) domain with a primary focus on BPM expertise and capability development. KKDS Ranaweera is fully tenured Professor at the University of Sri Jayewardenepura – Sri Lanka, and headed the Department of Food Science and Technology till 2011. He is the present Director to the Bandaranaike Memorial Ayurvedic Research Institute (BMARI) in Sri Lanka, and has a strong interest in sustainable innovative practices of indigenous medicine. Appendix Additional financial information pertaining to the case (including currency conversions) This Appendix has two parts. Part A provides some additional financial details about the case institute’s (Bandaranayake Memorial Ayurvedic Research Institute) running costs. Part B provides Sri Lankan currency conversion details. Part A: Additional information about running costs Total Expenditure (Annual) in Sri Lankan Rupees (LKR) Description Expenditure for a month Drugs for OPD Drugs for clinics Drugs for admitted Patients Electricity Telephone Water Expenditure for a year 657,132.00 956,588.00 553,137.00 7,885,584.00 11,479,056.00 6,637,644.00 278,000.00 25,000.00 79,000.00 3,336,000.00 300,000.00 948,000.00 Monthly Drug Expenditure for a patient in Sri Lankan Rupees (LKR) Description OPD Clinics Admitted Expenditure for a month Expenditure for a year 103.00 332.00 5701.00 Number of patients – OPD (for a month) New patients 4190 Repeat patients 2187 Total 6377 Number of patients – Clinics (for a month) New patients 695 1236.00 3984.00 68,412.00 Repeat patients 2033 2728 Daily expenditure on meals per patient – Rs 90/Number of medical officers – 31 Medical Officers’ Salaries (LKR) Grade Basic Special grade Senior medical officer Junior medical officer 55,490.00 47,095.00 26,160.00 Allowances 26,623.00 24,979.00 21,032.00 Total 82,113.00 72,074.00 47,192.00 Administration Staff Salaries (LKR) Grade Basic Allowances Total Administrative officer Development officer Research assistant Senior management assistant Junior management assistant Driver 27,695.00 15,430.00 17,515.00 22,910.00 Grade Basic Senior nurse Junior nurse 44,785.00 21,788.00 66,573.00 28,620.00 18,924.00 47,544.00 21,209.00 18,886.00 19,230.00 20,382.00 48,904.00 34,316.00 36,745.00 43,292.00 13,990.00 18,648.00 32,638.00 18,900.00 19,580.00 38,480.00 Allowances Total Minor Staff Salaries (LKR) Grade Basic Attendant Labour – Senior Labour – Junior 17,070.00 13,170.00 12,330.00 Allowances 19,214.00 18,525.00 18,399.00 Total 36,284.00 31,695.00 30,729.00 Part B: Currency conversion details Some currency conversion details are given here to provide a basic understanding of the costs in relation to the country context. The information is current as of March 2016. The average currency conversion rate for Lankan Rupees (LKR) is as follows: AU$1.00 = LKR107.80 US$1.00 = LKR146.80 €1.00 = LKR165.09 Average monthly disposable salary (after tax) = LKR37,000.00 Further information of this nature can be obtained from the Central Bank of Sri Lanka (http://www.cbsl.gov.lk/htm/english/_cei/er/e_1.asp) and Department of Census and Statistics, Sri Lanka (http://www.statistics.gov.lk/). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing “The tricky part is correctly identifying the inventory item,” says Seth Wilson, MyLab MIS Using Your Knowledge Questions 5-1, 5-2, 5-3 eHermes’ director of IT services. “We’ve tested hundreds of inventory items, and we’re seeing about 85 percent accuracy in identifying items. The item needs to be positioned and lighted correctly, and then the system identifies items pretty well. But it doesn’t do well with one-of-a-kind items or items that are really old.” “That sounds pretty good to me,” says Victor Vazquez, eHermes’ COO. “Yes, it would really help us get items into inventory more quickly and accurately. Currently, customers have to manually upload images and a short description of each item. But sometimes the description isn’t that great. That makes it hard for buyers to find the item they want. If we had more information about each item—say, color, age, brand name, or type—it would be much easier for customers to find the types of items they really want.” Seth reaches over and puts a small toy tractor in the portable photography lightbox and clicks his mouse. The image appears on his monitor, and data starts filling in below it. Pointing at the screen, he says, “Once we correctly identify the item, we can also pull in customer reviews, product review videos, and links to the manufacturers’ sites, and we can show comparative prices of previously sold items.” 219 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 220 CHAPTER 5 Database Processing Victor smiles broadly. “Wow, this is great. Customers will love it. How long before we can push this out?” Seth winces slightly. “We’re still working out some of the details. We’re using Google’s image classifier API to identify the images. Depending on the features we want, it could cost us a few dollars per 1,000 images searched. But we’ll need more data storage, a redesigned database, a new application front end, and possibly a new DBMS.” “Hmm . . . the image search doesn’t sound too expensive. But the database redesign and the new application sound pricey,” Victor says with a concerned tone. “Not really. We can do the database redesign in house. We created it ourselves, so it won’t cost much to redesign it. And I know a good local application developer, so that cost will be minimal. The increased storage costs will be minimal because we’ve got a fairly large NAS [Network Attached Storage] in our data center. It’s just figuring out all the data flows, APIs, storage requirements, and security protections that are worrisome. We’re sending and receiving data from multiple different data sources.” Victor nods understandingly. “I see. It sounds like the data sources might be an issue going forward.” “For sure. We’d be relying on Google for all of our image identification. If they increased their prices, we’d be at their mercy. We’d also be linking to videos on YouTube and product pages at manufacturers’ sites, and we’d be pulling product reviews from other online Web sites. Internally we’d be tying in past sales data. That would increase our data processing needs. I just want to make sure it’s all going to work together.” “That’s understandable. But don’t you think the rewards outweigh the risks?” Victor says, shaking his head. “Of course,” Seth says, smiling. “It will be awesome. We can install these lightboxes in each mobile storefront with built-in digital cameras. Sellers will place their items in the lightboxes, and the boxes will automatically recognize the items. In seconds the system will fill in all related data fields, suggest an approximate sale price, and start marketing the item to potential buyers. Items would sell much more quickly because sellers would more accurately price their items based on the past sales of similar items. Sellers wouldn’t have to write lengthy descriptions anymore.” “Sounds great. What’s our next step?” “We’re seeing about 85 percent “We’ve got some database redesign and application development work accuracy in identifying items.” to do. Then we’ll install a lightbox in a mobile storefront and test the data Source: Haiyin Wang/Alamy Stock Photo transfers and new systems. We’ve got a lot of work ahead of us.” Study QUESTIONS Q5- 1 What is the purpose of a database? Q5- 2 What is a database? Q5- 3 What is a database management system (DBMS)? Q5- 4 How do database applications make databases more useful? Q5- 5 How are data models used for database development? Q5- 6 How is a data model transformed into a database design? Q5- 7 How can eHermes benefit from a database system? Q5- 8 2029? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Chapter PREVIEW Database Processing 221 Although you may not realize it, you access dozens, if not hundreds, of databases every day. Every time you make a cell phone call, log on to the Internet, or buy something online using a credit card, applications behind the scenes are processing numerous databases. Use Snapchat, Facebook, Twitter, or LinkedIn, and again applications are processing databases on your behalf. Google something, and yet again dozens of databases are processed to obtain the search results. As a user, you need know nothing about the underlying technology. From your perspective, “It just works,” to quote the late Steve Jobs. However, as a business professional in the 21st century, it’s a different story. You need the knowledge of this chapter for four principal reasons: 1. When you participate in the development of any new business initiative, you need to know if database technology can facilitate your project goals. If so, you need sufficient knowledge to assess whether building that database is akin to building a small shed or is closer to building a skyscraper. Victor, in the opening vignette of this chapter, needs to have some knowledge to assess how hard (and thus how expensive) building that new database will be. 2. Because databases are ubiquitous in commerce, billions upon billions of bytes of data are stored every day. You need to know how to turn that data into a format from which you can construct useful information. To that end, you might use one of many different graphical tools to query that data. Or, to become truly proficient, you might learn SQL, an international standard language for querying databases. Many business professionals have done just that. 3. Business is dynamic, and information systems must adapt. Often such adaptation means that the structure of the database needs to be changed. Sometimes it means that entirely new databases must be created. As you will learn in this chapter, only the users, such as yourself, know what and how details should be stored. You may be asked to evaluate a data model like those described in Q5-4 to facilitate database change and creation. 4. Finally, you might someday find yourself or your department in a material mess. Maybe you don’t know who has which equipment, or where certain tools are located, or what’s really in your supply closet. In that case, you might choose to build your own database. Unless you’re an IS professional, that database will be small and relatively simple, but it can still be very useful to you and your colleagues. Case Study 5 on page 253 illustrates one such example. This chapter addresses the why, what, and how of database processing. We begin by describing the purpose of a database and then explain the important components of database systems. Next, we discuss data modeling and show how IS professionals use data models to design database structure. We then discuss how a redesigned database system could be used to solve the item identification and inventory problem at eHermes. We’ll wrap up with pondering where database technology might be in 2029. Q5-1 What Is the Purpose of a Database? The purpose of a database is to keep track of things. When most students learn that, they wonder why we need a special technology for such a simple task. Why not just use a list? If the list is long, put it into a spreadsheet. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 222 CHAPTER 5 Database Processing FIGURE 5-1 A List of Student Grades Presented in a Spreadsheet Source: Excel 2016, Windows 10, Microsoft Corporation. In fact, many professionals do keep track of things using spreadsheets. If the structure of the list is simple enough, there is no need to use database technology. The list of student grades in Figure 5-1, for example, works perfectly well in a spreadsheet. Suppose, however, that the professor wants to track more than just grades. Say that the professor wants to record email messages as well. Or perhaps the professor wants to record both email messages and office visits. There is no place in Figure 5-1 to record that additional data. Of course, the professor could set up a separate spreadsheet for email messages and another one for office visits, but that awkward solution would be difficult to use because it does not provide all of the data in one place. Instead, the professor wants a form like that in Figure 5-2. With it, the professor can record student grades, emails, and office visits all in one place. A form like the one in Figure 5-2 is difficult, if not impossible, to produce from a spreadsheet. Such a form is easily produced, however, from a database. The key distinction between Figures 5-1 and 5-2 is that the data in Figure 5-1 is about a single theme or concept. It is about student grades only. The data in Figure 5-2 has multiple themes; it shows student grades, student emails, and student office visits. We can make a general rule from these examples: Lists of data involving a single theme can be stored in a spreadsheet; lists that involve data with multiple themes require a database. We will say more about this general rule as this chapter proceeds. FIGURE 5-2 Student Data Shown in a Form from a Database Source: Access 2016, Windows 10, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 223 Columns, also called fields Student Number Rows, also called records FIGURE 5-3 Student Table (also called a file) Q5-2 Student Name HW1 HW2 MidTerm 1325 BAKER, ANDREA 88 100 78 1644 LAU, SWEE 75 90 90 2881 NELSON, STUART 100 90 98 3007 FISCHER, MAYAN 95 100 74 3559 TAM, JEFFREY 100 88 4867 VERBERRA, ADAM 70 90 92 5265 VALDEZ, MARIE 80 90 85 8009 ROGERS, SHELLY 95 100 98 Characters, also called bytes What Is a Database? A database is a self-describing collection of integrated records. To understand the terms in this definition, you first need to understand the terms illustrated in Figure 5-3. As you learned in Chapter 3, a byte is a character of data. In databases, bytes are grouped into columns, such as Student Number and Student Name. Columns are also called fields. Columns or fields, in turn, are grouped into rows, which are also called records. In Figure 5-3, the collection of data for all columns (Student Number, Student Name, HW1, HW2, and MidTerm) is called a row or a record. Finally, a group of similar rows or records is called a table or a file. From these definitions, you can see a hierarchy of data elements, as shown in Figure 5-4. It is tempting to continue this grouping process by saying that a database is a group of tables or files. This statement, although true, does not go far enough. As shown in Figure 5-5, a database is a collection of tables plus relationships among the rows in those tables, plus special data, called Table or File Student Number Student Name HW1 … Student Number Student Name HW1 … Student Number Student Name HW1 … Student Number Student Name HW1 … Student Number Student Name HW1 … Group of Records or Rows Student Number Student Name HW1 … ,… Group of Fields or Columns Student Number Student Name HW1 ,… Group of FIGURE 5-4 Hierarchy of Data Elements Bytes or Characters B A K E R ,… IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 224 CHAPTER 5 Database Processing Tables or Files Relationships Among Rows in Tables FIGURE 5-5 Components of a Database Database Metadata metadata, that describes the structure of the database. By the way, the cylindrical symbol labeled “database” in Figure 5-5 represents a computer disk drive. It is used like this because databases are most frequently stored on disks. Relationships Among Rows Consider the terms on the left-hand side of Figure 5-5. You know what tables are. To understand what is meant by relationships among rows in tables, examine Figure 5-6. It shows sample data from the three tables Email, Student, and Office_Visit. Notice the column named Student Number in the Email table. That column indicates the row in Student to which a row of Email is connected. In the first row of Email, the Student Number value is 1325. This indicates that this particular email was received from the student whose Student Number is 1325. If you examine the Student table, you will see that the row for Andrea Baker has this value. Thus, the first row of the Email table is related to Andrea Baker. FIGURE 5-6 Example of Relationships Among Rows Email Table Message EmailNum Date Student Number 1 2/1/2020 For homework 1, do you want us to provide notes on our references? 1325 2 3/15/2020 My group consists of Swee Lau and Stuart Nelson. 1325 3 3/15/2020 Could you please assign me to a group? 1644 Student Table Student Number Student Name HW1 HW2 MidTerm 1325 BAKER, ANDREA 88 100 78 1644 LAU, SWEE 75 90 90 2881 NELSON, STUART 100 90 98 3007 FISCHER, MAYAN 95 100 74 3559 TAM, JEFFREY 100 88 4867 VERBERRA, ADAM 70 90 92 5265 VALDEZ, MARIE 80 90 85 8009 ROGERS, SHELLY 95 100 98 Office_Visit Table Student Number VisitID Date 2 2/13/2020 Andrea had questions about using IS for raising barriers to entry. 1325 3 2/17/2020 Jeffrey is considering an IS major. Wanted to talk about career opportunities. 3559 4 2/17/2020 9KNNOKUUENCUU(TKFC[FWGVQLQDEQPƃKEV 4867 Notes IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 225 Now consider the last row of the Office_Visit table at the bottom of the figure. The value of Student Number in that row is 4867. This value indicates that the last row in Office_Visit belongs to Adam Verberra. From these examples, you can see that values in one table relate rows of that table to rows in a second table. Several special terms are used to express these ideas. A key (also called a primary key) is a column or group of columns that identifies a unique row in a table. Student Number is the key of the Student table. Given a value of Student Number, you can determine one and only one row in Student. Only one student has the number 1325, for example. Every table must have a key. The key of the Email table is EmailNum, and the key of the Office_ Visit table is VisitID. Sometimes more than one column is needed to form a unique identifier. In a table called City, for example, the key would consist of the combination of columns (City, State) because a given city name can appear in more than one state. Student Number is not the key of the Email or the Office_Visit tables. We know that about Email because there are two rows in Email that have the Student Number value 1325. The value 1325 does not identify a unique row; therefore, Student Number cannot be the key of Email. Nor is Student Number a key of Office_Visit, although you cannot tell that from the data in Figure 5-6. If you think about it, however, there is nothing to prevent a student from visiting a professor more than once. If that were to happen, there would be two rows in Office_Visit with the same value of Student Number. It just happens that no student has visited twice in the limited data in Figure 5-6. In both Email and Office_Visit, Student Number is a key, but it is a key of a different table, namely Student. Hence, the columns that fulfill a role like that of Student Number in the Email and Office_Visit tables are called foreign keys. This term is used because such columns are keys, but they are keys of a different (foreign) table than the one in which they reside. Before we go on, databases that carry their data in the form of tables and that represent relationships using foreign keys are called relational databases. (The term relational is used because another, more formal name for a table like those we’re discussing is relation.) You’ll learn about another kind of database, or data store, in Q5-8 and in Case Study 5. Metadata Databases and information systems can be complex enough that only a few internal employees know how to operate them. What happens when these employees use them for their own gain? See the Ethics Guide on pages 226–227 for an example case. Recall the definition of database: A database is a self-describing collection of integrated records. The records are integrated because, as you just learned, rows can be linked together by their key/ foreign key relationship. Relationships among rows are represented in the database. But what does self-describing mean? It means that a database contains, within itself, a description of its contents. Think of a library. A library is a self-describing collection of books and other materials. It is self-describing because the library contains a catalog that describes the library’s contents. The same idea also pertains to a database. Databases are self-describing because they contain not only data, but also data about the data in the database. Metadata is data that describes data. Figure 5-7 shows metadata for the Email table. The format of metadata depends on the software product that is processing the database. Figure 5-7 shows the metadata as it appears in Microsoft Access. Each row of the top part of this form describes a column of the Email table. The columns of these descriptions are Field Name, Data Type, and Description. Field Name contains the name of the column, Data Type shows the type of data the column may hold, and Description contains notes that explain the source or use of the column. As you can see, there is one row of metadata for each of the four columns of the Email table: EmailNum, Date, Message, and Student Number. The bottom part of this form provides more metadata, which Access calls Field Properties, for each column. In Figure 5-7 , the focus is on the Date column (note the light rectangle drawn around the Date row). Because the focus is on Date in the top pane, the details in the bottom pane pertain to the Date column. The Field Properties describe formats, a default value for Access to supply when a new row is created, and the constraint that a value is required for this column. It is not important IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. ETHICS GUIDE MINING AT WORK Richard pulled into the employee lot and steered his shiny new sedan into a front-row spot. The office looked entirely different at night with the lot empty and only a handful of the offices illuminated. The new car was his first splurge since graduating from a graduate program a few years earlier. In spite of being in the field for a relatively short time, Richard had already moved up in the technology group and was one of two key system administrators at the company. He swiped his badge at the side entrance and heard the familiar click as the lock released. He worked his way up the dimly lit staircase to the server room on the tenth floor. As he moved toward the end of the hallway, Richard could smell the aroma of burgers and fries, his boss’ staple meal on these overnight systems upgrade projects. He wasn’t sure which was harder for him to tolerate—the greasy odor of the food or the presence of his boss, Steve. Crypto-holic Steve had been working for the company for several decades. The only thing rivaling his expertise was his propensity to complain. Steve’s rants focused mainly on the incompetence of company executives and the salary increase he thought he deserved. When Richard grudgingly joined him for lunch a few times a week, Steve tended to go on and on about a variety of techrelated topics. However, lately Steve seemed interested in the surging popularity and value of cryptocurrencies. Hackers, college students, and tech startups were not only buying cryptocurrencies like bitcoin, but they were setting up computer “rigs” to mine them. Richard didn’t quite understand all of the technical nuances of Steve’s tirades, but he surmised that cryptocurrency mining is based on computers compiling the most recent transactions for that type of cryptocurrency and performing complex mathematical calculations. When a “miner’s” system successfully contributed to the update of this digital ledger, they received payment in that type of cryptocurrency. As the value of bitcoin increased, for example, more and more people were investing in top-of-the-line computer hardware to increase the odds that their mining system could successfully compete against other miners, helping them accrue as much cryptocurrency as possible. Richard was especially interested to learn that the demand for these powerful mining rigs was dramatically increasing. High-end graphics processing cards were becoming hard to find, much to the chagrin of the gaming community.1 Even more interesting was the pilgrimage of crypto-miners to Iceland due to the naturally cold climate that made it easier to keep their systems cool and the geothermal and hydroelectric resources that kept electricity prices low.2 In fact, the power consumed by mining rigs in Iceland was exceeding that used by the country’s residents! Source: Alexander Blinov/Alamy Stock Photo 226 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Son-of-a-Bitcoin Richard exchanged pleasantries with Steve, received his instructions for the night, and retreated to his office adjacent to the server room. They would begin rolling out a number of system updates over the next several hours, but Steve insisted on finishing his dinner before starting. Richard opted to cut through the server room, even though it was not the most direct route to his office. As he entered the room, he noticed more activity and noise than usual. “Better check on this,” he thought as he unlocked the door to his office. He pulled up a couple monitoring tools he used to manage the servers; everything seemed normal. He then ran a few scripts he had developed on his own, and within a few minutes he found himself staring at his monitor in shock. He slowly pushed back his keyboard and rolled his chair away from the terminal. Steve had taken his fixation with cryptocurrency mining to a new level. He was not just talking about it, he was actually doing it—on the company’s machines! Richard had discovered a rogue program that Steve had installed on all of the servers. It was programmed to run only after hours when employees were home and the processing capabilities of the Database Processing 227 servers were largely underutilized. This explained the frenzy of light and noise Richard had noticed in the server room— the servers were running the mining program. Steve had clearly underestimated Richard’s technical abilities because he had done little to conceal his program. Richard wasn’t sure what to do about his discovery. It was not like Steve was overtly harming the company—the systems were just sitting around idling at night anyway, right? And even if running this program was putting wear and tear on the servers, they were replaced regularly and almost never failed before the replacement cycle began. The only thing it might cost the company was some extra power, but who would know or care about an uptick in the power bill, especially when the company was rapidly growing and regularly adding new staff and offices? Beyond all of that, Steve was the last person Richard wanted to confront or make angry. He could seriously affect Richard’s long-term employment at the company and his job prospects elsewhere. Steve was very well-connected in the tech world. On the other hand, if someone else figured out what was going on, would Richard be accused of complicity? He let out a groan and kept pondering what to do. DISCUSSION QUESTIONS 1. According to the definitions of the ethical principles previously defined in this book: a. Do you think using company resources to mine cryptocurrency is ethical according to the categorical imperative? b. Do you think using company resources to mine cryptocurrency is ethical according to the utilitarian perspective? 2. Richard is probably the only other person in the company who could detect Steve’s mining scheme. How important is it to have ethical employees in positions that can’t be easily audited or checked? For these types of positions, is it better to hire a person who behaves ethically but has limited technical skills, or is it better to hire a highly skilled person with moral flexibility? 3. It’s unlikely the company has a policy against using too much CPU power; this wasn’t even an issue before crypto-mining became popular. Even if Richard turned Steve in, could Steve simply claim he wasn’t violating corporate policy? How might Steve justify his mining activities and avoid being fired? 4. Suppose Steve goes to his boss and tells her about his idea. He reminds her that the main corporate office pays all the power bills, so they could just keep the profits within the IT group. Essentially, they could increase their departmental budget by “efficiently” using existing resources. Steve could covertly skim a small percentage off the top for himself and be protected from getting fired at the same time. He might even get a raise. How would you feel if you were the CEO of the company and found out about this sort of cryptomining activity? How would you respond to the IT group? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 228 CHAPTER 5 Database Processing FIGURE 5-7 Sample Metadata (in Access) Source: Access 2016, Windows 10, Microsoft Corporation. for you to remember these details. Instead, just understand that metadata is data about data and that such metadata is always a part of a database. The presence of metadata makes databases much more useful. Because of metadata, no one needs to guess, remember, or even record what is in the database. To find out what a database contains, we just look at the metadata inside the database. Q5-3 What Is a Database Management System (DBMS)? A database management system (DBMS) is a program used to create, process, and administer a database. As with operating systems, almost no organization develops its own DBMS. Instead, companies license DBMS products from vendors such as IBM, Microsoft, Oracle, and others. Popular DBMS products are DB2 from IBM, Access and SQL Server from Microsoft, and Oracle Database from the Oracle Corporation. Another popular DBMS is MySQL, an open source DBMS product that is license-free for most applications.3 Other DBMS products are available, but these five process the great bulk of databases today. Note that a DBMS and a database are two different things. For some reason, the trade press and even some books confuse the two. A DBMS is a software program; a database is a collection of tables, relationships, and metadata. The two are very different concepts. Creating the Database and Its Structures Database developers use the DBMS to create tables, relationships, and other structures in the database. The form in Figure 5-7 can be used to define a new table or to modify an existing one. To create a new table, the developer just fills the new table’s metadata into the form. To modify an existing table—say, to add a new column—the developer opens the metadata form for that table and adds a new row of metadata. For example, in Figure 5-8 the developer has added a new column called Response?. This new column has the data type Yes/No, which means that the column can contain only one value—Yes or No. The professor will use this column to indicate whether he has responded to the student’s email. A column can be removed by deleting its row in this table, though doing so will lose any existing data. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 229 FIGURE 5-8 Adding a New Column to a Table (in Access) Source: Access 2016, Windows 10, Microsoft Corporation. Processing the Database Organizations are collecting large amounts of data. Big data becomes a big target for hackers as described in the Security Guide on pages 248–249. The second function of the DBMS is to process the database. Such processing can be quite complex, but, fundamentally, the DBMS provides applications for four processing operations: to read, insert, modify, or delete data. These operations are requested in application calls upon the DBMS. From a form, when the user enters new or changed data, a computer program behind the form calls the DBMS to make the necessary database changes. From a Web application, a program on the client or on the server calls the DBMS to make the change. Structured Query Language (SQL) is an international standard language for processing a database. All five of the DBMS products mentioned earlier accept and process SQL (pronounced “see-quell”) statements. As an example, the following SQL statement inserts a new row into the Student table: INSERT INTO Student ([Student Number], [Student Name], HW1, HW2, MidTerm) VALUES (1000, ‘Franklin, Benjamin’, 90, 95, 100); As stated, statements like this one are issued “behind the scenes” by programs that process forms and reports. Alternatively, they can be issued directly to the DBMS by an application program. You do not need to understand or remember SQL language syntax. Instead, just realize that SQL is an international standard for processing a database. SQL can also be used to create databases and database structures. You will learn more about SQL if you take a database management class. Administering the Database A third DBMS function is to provide tools to assist in the administration of the database. Database administration involves a wide variety of activities. For example, the DBMS can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database. To provide database security, a user must sign on using a valid user account before she can process the database. Permissions can be limited in very specific ways. In the Student database example, it is possible to limit a particular user to reading only Student Name from the Student table. A different user could be given permission to read the entire Student table, but limited to update only the HW1, HW2, and MidTerm columns. Other users can be given still other permissions. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 230 CHAPTER 5 Database Processing SO WHAT? SLICK ANALYTICS Spreadsheet software designed for small businesses is often misused. For example, if you use spreadsheet software to manage a dataset with several hundreds of thousands of rows of data, you will find that simple operations like sorting and saving updates to the data take several minutes. It is difficult to work effectively and efficiently when minutes are wasted on rudimentary operations. As companies continue to collect larger and larger datasets, there is demand for more robust and scalable data management solutions. These solutions must facilitate rather than hinder the rapid collection and analysis of important data. Nowadays, a great deal of data collection, storage, and analysis has moved to the cloud. You may not realize it, but you are probably taking advantage of some sort of cloud-based storage solution right now. If you use applications like Dropbox, OneDrive, or Google Drive, you’re using the cloud. You no longer need to transfer files from one device to the next using a flash drive or other physical storage medium. You can access your files on any device with Internet connectivity. As a student, you’ve probably found cloud storage tremendously convenient (e.g., when sharing large files for a group project with peers). Businesses are harnessing the same power and convenience offered by the cloud, but on a much larger scale. Companies aren’t just looking for the convenient file access, though; chief information officers (CIOs) are looking to merge the storage and analysis of data into one synergistic operation. Drilling for Answers Laredo Petroleum is an example of a company that has recognized the benefits offered by cloud analytics.4 In a recent interview, the CIO described the cumbersome data analysis process the company had been using to improve its drilling operations. The company’s old approach entailed the use of numerous spreadsheets and manual calculations that took a long time to perform. By the time actionable insights had been extracted from the data, the value of the information had already been diminished due to old age. One important question Laredo Petroleum must answer is when it should clean chemical deposits in its wells. Cleaning these deposits boosts the efficiency of wells, but sending maintenance teams to clean the wells is costly. Laredo Petroleum transitioned from the antiquated spreadsheet-based approach of analyzing this problem to using a cloud-based analytics platform. This new approach made data management more scalable, data analysis more robust, and data accessibility better. Data could now be accessed on both traditional PCs and mobile devices at any time and in any location.5 Source: Georgejmclittle/Fotolia Cloud analytics provide a much nimbler information systems architecture. It can respond to changes in market conditions more easily (e.g., the dramatic drops in oil prices in 2008 and 2015 have affected how Laredo Petroleum does business). Laredo Petroleum isn’t the only company that has identified cloud analytics as a viable solution for surviving and thriving in a world driven by Big Data. A recent study reported that global cloud analytics would grow by 46 percent through 2020.6 The widespread interest in cloud analytics is likely driven by improvements in data storage and analysis functionality like enhanced scalability, parallelism across devices, resource pooling, and agile virtualization.7 Cloudburst? It’s easy to tout the benefits of cloud services, but you may be wondering if there are downsides. Think about your own use of cloud services. Are there any aspects of storing your files in the cloud that concern you? Some people are apprehensive about storing their photos and financial data (e.g., tax returns) in the cloud. Are their data being stored securely? Is it safe to allow your personal data out in the “wild” where it is out of your control? There are other risks too. Could your data be permanently lost due to a system failure or a malicious insider at your cloud service provider?8 Could a denial-of-service attack against your cloud service provider render your data inaccessible for an extended period of time?9 As with any system, security often comes at the expense of convenience. As a business leader, you must consider if the benefits of cloud-based services outweigh the potential risks, which in some cases may turn into real losses. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 231 Questions 1. Have you chosen to store any of your personal data in the cloud? If so, do you store all of your data or only certain types of data? If not, what factors have inhibited you from putting your data in the hands of a cloud provider? If you don’t use cloud-based storage, how do you back up your data? 2. This article discussed the specific example of a petroleum company using cloud-based data analytics to improve decision making. What other industries can you identify that would benefit from the ability to capture large quantities of data in real time, analyze the data, and then use the results of those analyses to make better decisions? 3. This article mentions that some users may decide to manage their data “in house” rather than use cloud-based services and risk losing access to their data in the event of a denialof-service (DoS) attack. Take a few minutes to research what a DoS attack is and how it could prevent users from accessing their data. Be prepared to explain this concept to another classmate or the class. 4. In a business setting, what types of organizations would place greater value on security rather than convenience? What types of organizations would prioritize convenience over security? In addition to security, DBMS administrative functions include backing up database data, adding structures to improve the performance of database applications, removing data that are no longer wanted or needed, and similar tasks. For important databases, most organizations dedicate one or more employees to the role of database administration. Figure 5-9 summarizes the major responsibilities for this function. You will learn more about this topic if you take a database management course. Category Development Operation Backup and Recovery FIGURE 5-9 Summary of Database Administration (DBA) Tasks Adaptation Database Administration Task Description Create and staff DBA function Size of DBA group depends on size and complexity of database. Groups range from one part-time person to small group. Form steering committee Consists of representatives of all user groups. Forum for community-wide discussions and decisions. Specify requirements Ensure that all appropriate user input is considered. Validate data model Check data model for accuracy and completeness. Evaluate application design Verify that all necessary forms, reports, queries, and applications are developed. Validate design and usability of application components. Manage processing rights and responsibilities Determine processing rights/restrictions on each table and column. Manage security Add and delete users and user groups as necessary; ensure that security system works. Track problems and manage resolution Develop system to record and manage resolution of problems. Monitor database performance Provide expertise/solutions for performance improvements. Manage DBMS Evaluate new features and functions. Monitor backup procedures Verify that database backup procedures are followed. Conduct training Ensure that users and operations personnel know and understand recovery procedures. Manage recovery Manage recovery process. Set up request tracking system Develop system to record and prioritize requests for change. /CPCIGEQPƂIWTCVKQPEJCPIG Manage impact of database structure changes on applications and users. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 232 CHAPTER 5 Database Processing Q5-4 How Do Database Applications Make Databases More Useful? A set of database tables, by itself, is not very useful; the tables in Figure 5-6 contain the data the professor wants, but the format is awkward at best. The data in database tables can be made more useful, or more available for the conception of information, when it is placed into forms like that in Figure 5-2 or other formats. A database application is a collection of forms, reports, queries, and application programs10 that serves as an intermediary between users and database data. Database applications reformat database table data to make it more informative and more easily updated. Application programs also have features that provide security, maintain data consistency, and handle special cases. The specific purposes of the four elements of a database application are: Forms View data; insert new, update existing, and delete existing data Reports Structured presentation of data using sorting, grouping, filtering, and other operations Queries Search based on data values provided by the user Application programs Provide security, data consistency, and special purpose processing, (e.g., handle out-of-stock situations) Database applications came into prominence in the 1990s and were based on the technology available at that time. Many existing systems today are long-lived extensions to those applications; the ERP system SAP (discussed in Chapter 6) is a good example of this concept. You should expect to see these kinds of applications during the early years of your career. Today, however, many database applications are based on newer technology that employs browsers, the Web, and related standards. These browser-based applications can do everything the older ones do, but they are more dynamic and better suited to today’s world. To see why, consider each type. Traditional Forms, Queries, Reports, and Applications FIGURE 5-10 Components of a Database Application System In most cases, a traditional database is shared among many users. In that case, the application shown in Figure 5-10 resides on the users’ computers and the DBMS and database reside on a server computer. A network, in most cases not the Internet, is used to transmit traffic back and forth between the users’ computers and the DBMS server computer. Organizational Network rForms rReports rQueries rApplication Programs Database Management System (DBMS) r Tables r Relationships r Metadata Database Application Users Users’ Computers Database Server IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 233 FIGURE 5-11 Example of a Student Report Single-user databases like those in Microsoft Access are an exception. With such databases, the application, the DBMS, and the database all reside on the user’s computer. Traditional forms appeared in window-like displays like that in Figure 5-2. They serve their purpose; users can view, insert, modify, and delete data with them, but by today’s standards, they look clunky. Figure 5-11 shows a traditional report, which is a static display of data, placed into a format that is meaningful to the user. In this report, each of the emails for a particular student is shown after the student’s name and grade data. Figure 5-12 shows a traditional query. The user specifies query criteria in a window-like box (Figure 5-12a), and the application responds with data that fit those criteria (Figure 5-12b). Traditional database application programs are written in object-oriented languages such as C++ and VisualBasic (and even in earlier languages like COBOL). They are thick applications that need to be installed on users’ computers. In some cases, all of the application logic is contained in a program on users’ computers and the server does nothing except run the DBMS and serve up data. In other cases, some application code is placed on both the users’ computers and the database server computer. As stated, in the early years of your career, you will still see traditional applications, especially for enterprise-wide applications like ERP and CRM. Most likely, you will also be concerned, as a user if not in a more involved way, with the transition from such traditional applications into browserbased applications. FIGURE 5-12A Sample Query Form Used to Enter Phrase for Search Source: Access 2016, Windows 10, Microsoft Corporation. FIGURE 5-12B Sample Query Results of Query Operation Source: Access 2016, Windows 10, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 234 CHAPTER 5 Database Processing Browser Forms, Reports, Queries, and Applications The databases in browser-based applications are nearly always shared among many users. As shown in Figure 5-13, the users’ browsers connect over the Internet to a Web server computer, which in turn connects to a database server computer (often many computers are involved on the server side of the Internet). Browser applications are thin-client applications that need not be preinstalled on the users’ computers. In most cases, all of the code for generating and processing the application elements is shared between the users’ computers and the servers. JavaScript is the standard language for user-side processing. Languages like C# and Java are used for server-side code, though JavaScript is starting to be used on the server with an open source product named Node.js. Browser database application forms, reports, and queries are displayed and processed using html and, most recently, using html5, css3, and JavaScript as you learned in Chapter 3. Figure 5-14 shows a browser form that is used to create a new user account in Office 365. The form’s content is dynamic; the user can click on the blue arrow next to Additional Details to see more data. Also, notice the steps on the left-hand side that outline the process that the administrator will follow when creating the new account. The current step is shown in color. Compare and contrast this form with that in Figure 5-2 ; it is cleaner, with much less chrome. Figure 5-15 illustrates a browser report that shows the content of a SharePoint site. The content is dynamic; almost all of the items can be clicked to produce other reports or take other actions. The user can search the report in the box in the upper-right-hand corner to find specific items. Browser-based applications can support traditional queries, but more exciting are graphical queries, in which query criteria are created when the user clicks on a graphic. Security requirements are more stringent for browser-based Internet applications than for traditional ones. Most traditional applications run within a corporate network protected from threats common on the Internet. Browser-based applications that are open to the public, over the Internet, are far more vulnerable. Thus, protecting security is a major function for browser-based Internet application programs. Like traditional database application programs, they need to provide for data Applications with both client- and server-side code Browser Application Program A Browser Browser Application Program B Internet Application Program C Browser Application Program D Browser FIGURE 5-13 Four Application Programs on a Web Server Computer DBMS DB Database Server Computer Web Server Computer(s) Applications coded in: rhtml5 rcss3 rJavaScript Applications coded in: rC# rJava rNode.js JavaScript IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 235 FIGURE 5-14 Account Creation Browser Form Source: Windows 10, Microsoft Corporation. consistency and to handle special conditions as well. As an example of the need for data consistency, consider the problems introduced by multi-user processing. Multi-user Processing Most traditional and browser-based applications involve multiple users processing the same database. While such multi-user processing is common, it does pose unique problems that you, as a future manager, should know about. To understand the nature of those problems, consider the following scenario, which could occur on either a traditional or browser-based application. At a ticket vendor’s Web site, two customers, Andrea and Jeffrey, are both attempting to buy tickets to a popular event. Andrea uses her browser to access the site and finds that two tickets are available. She places both of them in her shopping cart. She doesn’t know it, but when she opened Search Report: All Icons Clickable: FIGURE 5-15 Browser Report Source: Access 2016, Windows 10, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 236 CHAPTER 5 Database Processing the order form, she invoked an application program on the vendor’s servers that read a database to find that two tickets are available. Before she checks out, she takes a moment to verify with her friend that they still want to go. Meanwhile, Jeffrey uses his browser and also finds that two tickets are available because his browser activates that same application that reads the database and finds (because Andrea has not yet checked out) that two are available. He places both in his cart and checks out. Meanwhile, Andrea and her friend decide to go, so she checks out. Clearly, we have a problem. Both Andrea and Jeffrey have purchased the same two tickets. One of them is going to be disappointed. This problem, known as the lost-update problem, exemplifies one of the special characteristics of multi-user database processing. To prevent this problem, some type of locking must be used to coordinate the activities of users who know nothing about one another. Locking brings its own set of problems, however, and those problems must be addressed as well. We will not delve further into this topic here, however. Be aware of possible data conflicts when you manage business activities that involve multi-user processing. If you find inaccurate results that seem not to have a cause, you may be experiencing multi-user data conflicts. Contact your IS department for assistance. Q5-5 To learn more about a career as a data engineer, see the Career Guide on page 250. How Are Data Models Used for Database Development? In Chapter 8, we will describe the process for developing information systems in detail. However, business professionals have such a critical role in the development of database applications that we need to anticipate part of that discussion here by introducing two topics—data modeling and database design. Because the design of the database depends entirely on how users view their business environment, user involvement is critical for database development. Think about the Student database. What data should it contain? Possibilities are: Students, Classes, Grades, Emails, Office_Visits, Majors, Advisers, Student_Organizations—the list could go on and on. Further, how much detail should be included in each? Should the database include campus addresses? Home addresses? Billing addresses? In fact, there are unlimited possibilities, and the database developers do not and cannot know what to include. They do know, however, that a database must include all the data necessary for the users to perform their jobs. Ideally, it contains that amount of data and no more. So, during database development, the developers must rely on the users to tell them what to include in the database. Database structures can be complex, in some cases very complex. So, before building the database the developers construct a logical representation of database data called a data model. It describes the data and relationships that will be stored in the database. It is akin to a blueprint. Just as building architects create a blueprint before they start building, so, too, database developers create a data model before they start designing the database. Figure 5-16 summarizes the database development process. Interviews with users lead to database requirements, which are summarized in a data model. Once the users have approved (validated) the data model, it is transformed into a database design. That design is then implemented into database structures. We will consider data modeling and database design briefly in the next two sections. Again, your goal should be to learn the process so that you can be an effective user representative for a development effort. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Forms Requirements Reports FIGURE 5-16 Database Development Process Create Data Model (Entities and Relationships) Data Model 237 Database Processing Create Database Design (Tables with Foreign Keys) Database Design Create Database Queries What Is the Entity-Relationship Data Model? The entity-relationship (E-R) data model is a tool for constructing data models. Developers use it to describe the content of a data model by defining the things (entities) that will be stored in the database and the relationships among those entities. A second, less popular tool for data modeling is the Unified Modeling Language (UML). We will not describe that tool here. However, if you learn how to interpret E-R models, with a bit of study you will be able to understand UML models as well. Entities An entity is some thing that the users want to track. Examples of entities are Order, Customer, Salesperson, and Item. Some entities represent a physical object, such as Item or Salesperson; others represent a logical construct or transaction, such as Order or Contract. For reasons beyond this discussion, entity names are always singular. We use Order, not Orders; Salesperson, not Salespersons. Entities have attributes that describe characteristics of the entity. Example attributes of Order are OrderNumber, OrderDate, SubTotal, Tax, Total, and so forth. Example attributes of Salesperson are SalespersonName, Email, Phone, and so forth. Entities have an identifier, which is an attribute (or group of attributes) whose value is associated with one and only one entity instance. For example, OrderNumber is an identifier of Order because only one Order instance has a given value of OrderNumber. For the same reason, CustomerNumber is an identifier of Customer. If each member of the sales staff has a unique name, then SalespersonName is an identifier of Salesperson. Before we continue, consider that last sentence. Is the salesperson’s name unique among the sales staff ? Both now and in the future? Who decides the answer to such a question? Only the users know whether this is true; the database developers cannot know. This example underlines why it is important for you to be able to interpret data models because only users like you will know for sure. Figure 5-17 shows examples of entities for the Student database. Each entity is shown in a rectangle. The name of the entity is just above the rectangle, and the identifier is shown in a section at the top of the entity. Entity attributes are shown in the remainder of the rectangle. In Figure 5-18, the Adviser entity has an identifier called AdviserName and the attributes Phone, CampusAddress, and EmailAddress. Observe that the entities Email and Office_Visit do not have an identifier. Unlike Student or Adviser, the users do not have an attribute that identifies a particular email. We could make one up. For example, we could say that the identifier of Email is EmailNumber, but if we do so we are not modeling how the users view their world. Instead, we are forcing something onto the IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 238 CHAPTER 5 Database Processing Student StudentNumber StudentName HW1 HW2 MidTerm Adviser FIGURE 5-17 Student Data Model Entities Department Email Date Message DeptName Admin Phone Email Office_Visit AdviserName Phone CampusAddress EmailAddress Date Notes users. Be aware of this possibility when you review data models about your business. Do not allow the database developers to create something in the data model that is not part of your business world. Relationships Entities have relationships to each other. An Order, for example, has a relationship to a Customer entity and also to a Salesperson entity. In the Student database, a Student has a relationship to an Adviser, and an Adviser has a relationship to a Department. Figure 5-19 shows sample Department, Adviser, and Student entities and their relationships. For simplicity, this figure shows just the identifier of the entities and not the other attributes. For this sample data, Accounting has three professors—Jones, Wu, and Lopez—and Finance has two professors—Smith and Greene. The relationship between Advisers and Students is a bit more complicated because in this example, an adviser is allowed to advise many students and a student is allowed to have many advisers. Perhaps this happens because students can have multiple majors. In any case, note that Professor Jones advises students 100 and 400 and that student 100 is advised by both Professors Jones and Smith. 100 200 Jones 300 Accounting Wu 400 Smith 500 Finance Department Entities FIGURE 5-18 Example of Department, Adviser, and Student Entities and Relationships Lopez 600 Greene Adviser Entities 700 800 Student Entities IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Department FIGURE 5-19 Sample Relationships Version 1 DeptName Admin Phone Email Adviser AdviserName Phone CampusAddress EmailAddress Database Processing 239 Student StudentNumber StudentName HW1 HW2 MidTerm Diagrams like the one in Figure 5-18 are too cumbersome for use in database design discussions. Instead, database designers use diagrams called entity-relationship (E-R) diagrams. Figure 5-19 shows an E-R diagram for the data in Figure 5-18. In this figure, all of the entities of one type are represented by a single rectangle. Thus, there are rectangles for the Department, Adviser, and Student entities. Attributes are shown as before in Figure 5-17. Additionally, a line is used to represent a relationship between two entities. Notice the line between Department and Adviser, for example. The vertical bar on the left side of the relationship means that an adviser works in just one department. The forked lines on the right side of that line signify that a department may have more than one adviser. The angled lines, which are referred to as crow’s feet, are shorthand for the multiple lines between Department and Adviser in Figure 5-18. Relationships like this one are called 1:N, or one-to-many relationships, because one department can have many advisers, but an adviser has at most one department. Now examine the line between Adviser and Student. Notice the crow’s feet that appear at each end of the line. This notation signifies that an adviser can be related to many students and that a student can be related to many advisers, which is the situation in Figure 5-18. Relationships like this one are called N:M, or many-to-many relationships, because one adviser can have many students and one student can have many advisers. Students sometimes find the notation N:M confusing. Interpret the N and M to mean that a variable number, greater than one, is allowed on each side of the relationship. Such a relationship is not written N:N because that notation would imply that there are the same number of entities on each side of the relationship, which is not necessarily true. N:M means that more than one entity is allowed on each side of the relationship and that the number of entities on each side can be different. Figure 5-20 shows the same entities with different assumptions. Here, advisers may advise in more than one department, but a student may have only one adviser, representing a policy that students may not have multiple majors. Which, if either, of these versions is correct? Only the users know. These alternatives illustrate the kinds of questions you will need to answer when a database designer asks you to check a data model for correctness. Figures 5-19 and 5-20 are typical examples of an entity-relationship diagram. Unfortunately, there are several different styles of entity-relationship diagrams. This one is called, not surprisingly, a crow’s-foot diagram version. You may learn other versions if you take a database management class. Department FIGURE 5-20 Sample Relationships Version 2 DeptName Admin Phone Email Adviser AdviserName Phone CampusAddress EmailAddress Student StudentNumber StudentName HW1 HW2 MidTerm IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 240 CHAPTER 5 Database Processing Department FIGURE 5-21 Sample Relationships Showing Both Maximum and Minimum Cardinalities DeptName Admin Phone Email Adviser Student AdviserName Phone CampusAddress EmailAddress StudentNumber StudentName HW1 HW2 MidTerm The crow’s-foot notation shows the maximum number of entities that can be involved in a relationship. Accordingly, they are called the relationship’s maximum cardinality. Common examples of maximum cardinality are 1:N, N:M, and 1:1 (not shown). Another important question is “What is the minimum number of entities required in the relationship?” Must an adviser have a student to advise, and must a student have an adviser? Constraints on minimum requirements are called minimum cardinalities. Figure 5-21 presents a third version of this E-R diagram that shows both maximum and minimum cardinalities. The second vertical bar on the lines means that at least one entity of that type is required. The small oval means that the entity is optional; the relationship need not have an entity of that type. Using this notation, if there are two vertical bars, both the minimum and maximum cardinality are one. If there is a vertical bar with a crow’s foot, then the minimum cardinality is one and the maximum is many. Thus, in Figure 5-21 a department is not required to have a relationship to any adviser, but an adviser is required to belong to a department. Similarly, an adviser is not required to have a relationship to a student, but a student is required to have a relationship to an adviser. Note, also, that the maximum cardinalities in Figure 5-21 have been changed so that both are 1:N. Is the model in Figure 5-21 a good one? It depends on the policy of the university. Again, only the users know for sure. Q5-6 How Is a Data Model Transformed into a Database Design? Database design is the process of converting a data model into tables, relationships, and data constraints. The database design team transforms entities into tables and expresses relationships by defining foreign keys. Database design is a complicated subject; as with data modeling, it occupies weeks in a database management class. In this section, however, we will introduce two important database design concepts: normalization and the representation of two kinds of relationships. The first concept is a foundation of database design, and the second will help you understand important design considerations. Normalization Normalization is the process of converting a poorly structured table into two or more well-structured tables. A table is such a simple construct that you may wonder how one could possibly be poorly structured. In truth, there are many ways that tables can be malformed—so many, in fact, that researchers have published hundreds of papers on this topic alone. Consider the Employee table in Figure 5-22a. It lists employee names, hire dates, email addresses, and the name and number of the department in which the employee works. This table seems innocent enough. But consider what happens when the Accounting department changes its name to Accounting and Finance. Because department names are duplicated in this table, every row that has a value of “Accounting” must be changed to “Accounting and Finance.” IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 FIGURE 5-22 A Poorly Designed Employee Table Database Processing 241 Employee Name HireDate Email DeptNo DeptName Jones Feb 1, 2018 Jones@ourcompany.com 100 Accounting Smith Dec 3, 2020 Smith@ourcompany.com 200 Marketing Chau March 7, 2020 Chau@ourcompany.com 100 Accounting Greene July 17, 2019 Greene@ourcompany.com 100 Accounting (a) Table Before Update Employee Name HireDate Email DeptNo DeptName Jones Feb 1, 2018 Jones@ourcompany.com 100 Accounting and Finance Smith Dec 3, 2020 Smith@ourcompany.com 200 Marketing Chau March 7, 2020 Chau@ourcompany.com 100 Accounting and Finance Greene July 17, 2019 Greene@ourcompany.com 100 Accounting (b) Table with Incomplete Update Data Integrity Problems Suppose the Accounting name change is correctly made in two rows, but not in the third. The result is shown in Figure 5-22b. This table has what is called a data integrity problem: Some rows indicate that the name of Department 100 is “Accounting and Finance,” and another row indicates that the name of Department 100 is “Accounting.” This problem is easy to spot in this small table. But consider a table like the Customer table in the Amazon database or the eBay database. Those databases have millions of rows. Once a table that large develops serious data integrity problems, months of labor will be required to remove them. Data integrity problems are serious. A table that has data integrity problems will produce incorrect and inconsistent results. Users will lose confidence in the data, and the system will develop a poor reputation. Information systems with poor reputations become serious burdens to the organizations that use them. Normalizing for Data Integrity The data integrity problem can occur only if data are duplicated. Because of this, one easy way to eliminate the problem is to eliminate the duplicated data. We can do this by transforming the table design in Figure 5-22a into two tables, as shown in Figure 5-23. Here the name of the department is stored just once; therefore, no data inconsistencies can occur. Of course, to produce an employee report that includes the department name, the two tables in Figure 5-23 will need to be joined back together. Because such joining of tables is common, DBMS products have been programmed to perform it efficiently, but it still requires work. From this example, you can see a trade-off in database design: Normalized tables eliminate data duplication, but they can be slower to process. Dealing with such trade-offs is an important consideration in database design. The general goal of normalization is to construct tables such that every table has a single topic or theme. In good writing, every paragraph should have a single theme. This is true of databases IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 242 CHAPTER 5 Database Processing FIGURE 5-23 Two Normalized Tables Employee Name HireDate Email DeptNo Jones Feb 1, 2018 Jones@ourcompany.com 100 Smith Dec 3, 2020 Smith@ourcompany.com 200 Chau March 7, 2020 Chau@ourcompany.com 100 Greene July 17, 2019 Greene@ourcompany.com 100 Department DeptNo DeptName 100 Accounting 200 Marketing 300 Information Systems as well; every table should have a single theme. The problem with the table design in Figure 5-22 is that it has two independent themes: employees and departments. The way to correct the problem is to split the table into two tables, each with its own theme. In this case, we create an Employee table and a Department table, as shown in Figure 5-23. As mentioned, there are dozens of ways that tables can be poorly formed. Database practitioners classify tables into various normal forms according to the kinds of problems they have. Transforming a table into a normal form to remove duplicated data and other problems is called normalizing the table.11 Thus, when you hear a database designer say, “Those tables are not normalized,” she does not mean that the tables have irregular, not-normal data. Instead, she means that the tables have a format that could cause data integrity problems. Summary of Normalization As a future user of databases, you do not need to know the details of normalization. Instead, understand the general principle that every normalized (well-formed) table has one and only one theme. Further, tables that are not normalized are subject to data integrity problems. Be aware, too, that normalization is just one criterion for evaluating database designs. Because normalized designs can be slower to process, database designers sometimes choose to accept nonnormalized tables. The best design depends on the users’ processing requirements. Representing Relationships Figure 5-24 shows the steps involved in transforming a data model into a relational database design. First, the database designer creates a table for each entity. The identifier of the entity becomes the key of the table. Each attribute of the entity becomes a column of the table. Next, the resulting tables are normalized so that each table has a single theme. Once that has been done, the next step is to represent the relationships among those tables. FIGURE 5-24 Transforming a Data Model into a Database Design r4GRTGUGPVGCEJGPVKV[YKVJCVCDNG s'PVKV[KFGPVKƂGTDGEQOGUVCDNGMG[ s'PVKV[CVVTKDWVGUDGEQOGVCDNGEQNWOPU r0QTOCNK\GVCDNGUCUPGEGUUCT[ r4GRTGUGPVTGNCVKQPUJKRU s7UGHQTGKIPMG[U s#FFCFFKVKQPCNVCDNGUHQT0/TGNCVKQPUJKRU IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 243 For example, consider the E-R diagram in Figure 5-25a. The Adviser entity has a 1:N relationship to the Student entity. To create the database design, we construct a table for Adviser and a second table for Student, as shown in Figure 5-25b. The key of the Adviser table is AdviserName, and the key of the Student table is StudentNumber. Further, the EmailAddress attribute of the Adviser entity becomes the EmailAddress column of the Adviser table, and the StudentName and MidTerm attributes of the Student entity become the StudentName and MidTerm columns of the Student table. The next task is to represent the relationship. Because we are using the relational model, we know that we must add a foreign key to one of the two tables. The possibilities are: (1) place the foreign key StudentNumber in the Adviser table or (2) place the foreign key AdviserName in the Student table. The correct choice is to place AdviserName in the Student table, as shown in Figure 5-25c. To determine a student’s adviser, we just look into the AdviserName column of that student’s row. To Student Adviser AdviserName EmailAddress StudentNumber StudentName MidTerm (a) 1:N Relationship Between Adviser and Student Entities Adviser Table—Key Is AdviserName EmailAddress AdviserName Jones Jones@myuniv.edu Choi Choi@myuniv.edu Jackson Jackson@myuniv.edu Student Table—Key Is StudentNumber StudentNumber StudentName MidTerm 100 Lisa 90 200 Jennie 85 300 Jason 82 400 Terry 95 (b) Creating a Table for Each Entity Adviser Table—Key Is AdviserName AdviserName EmailAddress Jones Jones@myuniv.edu Choi Choi@myuniv.edu Jackson Jackson@myuniv.edu Student—Key Is StudentNumber Foreign key column represents relationship StudentNumber StudentName MidTerm AdviserName FIGURE 5-25 Representing a 1:N Relationship 100 Lisa 90 Jackson 200 Jennie 85 Jackson 300 Jason 82 Choi 400 Terry 95 Jackson (c) Using the AdviserName Foreign Key to Represent the 1:N Relationship IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 244 CHAPTER 5 Database Processing determine the adviser’s students, we search the AdviserName column in the Student table to determine which rows have that adviser’s name. If a student changes advisers, we simply change the value in the AdviserName column. Changing Jackson to Jones in the first row, for example, will assign student 100 to Professor Jones. For this data model, placing StudentNumber in Adviser would be incorrect. If we were to do that, we could assign only one student to an adviser. There is no place to assign a second adviser. This strategy for placing foreign keys will not work for N:M relationships, however. Consider the data model in Figure 5-26a; here advisers and students have a many-to-many relationship. An adviser may have many students, and a student may have multiple advisers (for multiple majors). Adviser Student AdviserName Email Student Number StudentName MidTerm (a) N:M Relationship Between Adviser and Student Adviser—Key Is AdviserName Email AdviserName Jones Jones@myuniv.edu Choi Choi@myuniv.edu Jackson Jackson@myuniv.edu No room to place second or third AdviserName Student—Key Is StudentNumber StudentName MidTerm AdviserName dvise StudentNumber tNum 100 Lisa 90 Jackson 200 Jennie 85 Jackson 300 Jason ason 82 Choi 400 Terry 95 Jackson Jacks (b) Incorrect Representation of N:M Relationship Student—Key Is StudentNumber Adviser—Key Is AdviserName AdviserName Email StudentNumber StudentName MidTerm Jones Jones@myuniv.edu 100 Lisa 90 Choi Choi@myuniv.edu 200 Jennie 85 Jackson Jackson@myuniv.edu 300 Jason 82 400 Terry 95 Adviser_Student_Intersection AdviserName StudentNumber FIGURE 5-26 Representing an N:M Relationship Jackson 100 Jackson 200 Choi 300 Jackson 400 Choi 100 Jones 100 Student 100 has three advisers (c) Adviser_Student_Intersection Table Represents the N:M Relationship IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 245 To see why the foreign key strategy we used for 1:N relationships will not work for N:M relationships, examine Figure 5-26b. If student 100 has more than one adviser, there is no place to record second or subsequent advisers. To represent an N:M relationship, we need to create a third table, as shown in Figure 5-26c. The third table has two columns, AdviserName and StudentNumber. Each row of the table means that the given adviser advises the student with the given number. As you can imagine, there is a great deal more to database design than we have presented here. Still, this section should give you an idea of the tasks that need to be accomplished to create a database. You should also realize that the database design is a direct consequence of decisions made in the data model. If the data model is wrong, the database design will be wrong as well. Users’ Role in the Development of Databases As stated, a database is a model of how the users view their business world. This means that the users are the final judges as to what data the database should contain and how the records in that database should be related to one another. The easiest time to change the database structure is during the data modeling stage. Changing a relationship from one-to-many to many-to-many in a data model is simply a matter of changing the 1:N notation to N:M. However, once the database has been constructed and loaded with data and forms, reports, queries, and application programs have been created, changing a one-to-many relationship to many-to-many means weeks of work. You can glean some idea of why this might be true by contrasting Figure 5-25c with Figure 5-26c. Suppose that instead of having just a few rows, each table has thousands of rows; in that case, transforming the database from one format to the other involves considerable work. Even worse, however, is that someone must change application components as well. For example, if students have at most one adviser, then a single text box can be used to enter AdviserName. If students can have multiple advisers, then a multiple-row table will need to be used to enter AdviserName and a program will need to be written to store the values of AdviserName into the Adviser_Student_Intersection table. There are dozens of other consequences, consequences that will translate into wasted labor and wasted expense. Thus, user review of the data model is crucial. When a database is developed for your use, you must carefully review the data model. If you do not understand any aspect of it, you should ask for clarification until you do. Entities must contain all of the data you and your employees need to do your jobs, and relationships must accurately reflect your view of the business. If the data model is wrong, the database will be designed incorrectly, and the applications will be difficult to use, if not worthless. Do not proceed unless the data model is accurate. As a corollary, when asked to review a data model, take that review seriously. Devote the time necessary to perform a thorough review. Any mistakes you miss will come back to haunt you, and by then the cost of correction may be very high with regard to both time and expense. This brief introduction to data modeling shows why databases can be more difficult to develop than spreadsheets. Q5-7 How Can eHermes Benefit from a Database System? eHermes wants to speed up the process of inventorying the new items it receives from sellers. Currently, sales associates have to wait for customers to enter lengthy product descriptions that are often incomplete or incorrect. If associates can take a picture of the new item and use Google’s image classifier to automatically recognize it, eHermes will be able to automatically fill in its database. The information would likely be more detailed and accurate than what eHermes is currently getting, and items could be sold much more quickly. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 246 CHAPTER 5 Database Processing This process would require a lot of data storage and multiple data flows. Images would be sent from mobile storefronts and stored either locally or on the cloud. Then the images would be sent to cloud services to be processed. Once an item is identified, eHermes would query additional sites for product information, reviews, and past sales data. The entire process needs to be fast and scalable as eHermes grows. eHermes can choose one of two database architectures. For the first one, it can store the images on a file server and keep metadata about each image in a relational database that it can query. That metadata will include the address of the image on the file server. Alternatively, eHermes can utilize one of the new NoSQL DBMS products like MongoDB—an open source document-oriented DBMS—to store the images in the same database as the metadata. (See Q5-8.) Seth Wilson, director of IT services, investigates these two alternatives and discusses his findings with Kamala Patel, an automation expert. They are both intrigued by the possible use of MongoDB, but they know that their interest is, in part, a desire to learn something new. They don’t really know how well that product works, nor do they know how robust the MongoDB query facility will be. On the other hand, they can readily modify their existing Microsoft SQL Server database to store the metadata. In the metadata, they can store the URL of the file server location that has the images (for example, https://abc.ehermes.com/image1). In this way, they can use the Microsoft SQL Server to store the data and then query it using the graphical query designer. Because Microsoft SQL Server can also process native SQL, they can use it for the most sophisticated query operations if needed. Seth and Kamala discuss these alternatives and decide to use Microsoft SQL Server to store the metadata. They know this approach is less risky because it uses known technology. Also, both of them are skilled at using Microsoft SQL Server, and they can develop the database and application quickly with less risk. Seth and Kamala create a short presentation of this recommendation and present it to Jessica Ramma, eHermes’ CEO, who approves it. After the approval, Seth creates the E-R diagram shown in Figure 5-27 and discusses it with Kamala. She thinks that they might want to add an Employee entity rather than just the employee’s name in the Analysis entity. They decide, however, that they don’t yet have that many employees and that adding the extra entity might make the application too hard to use, at least at present. So, with that decision, they proceed to create the database and related applications. You’ll have an opportunity to do the same with a team of your colleagues in Collaboration Exercise 5, page 253. Customer CustomerID First_Name Last_Name Phone Email Item PK ItemID /QDKNG5VQTG PK /QDKNGID PK YearBuilt MaxWeight &CVG5GTXKEGF 'HHGEVKXG4CPIG %QPFKVKQP &CVG4GEGKXGF .KUV2TKEG 5GNNGT6[RG %NCUUKƂGF2TQFWEVU %NCUUKƂGF2TQFWEVID FIGURE 5-27 E-R Diagram for eHermes’ Database PK /CPWHCEVWTGT &GUETKRVKQP Size /QFGN0WODGT IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Q5-8 Database Processing 247 2029? With ever-cheaper data storage and data communications, we can be sure that the volume of database data will continue to grow, probably exponentially, through 2029. All that data contains patterns that can be used to conceive information to help businesses and organizations achieve their strategies. That will make business intelligence, even more important. Furthermore, as databases become bigger and bigger, they’re more attractive as targets for theft or mischief, as we saw in recent attacks at Yahoo (3 billion accounts), Twitter (330 million accounts), Under Armour (150 million accounts), and Equifax (145 million accounts). Those risks will make database security even more important. Additionally, the DBMS landscape is changing. While for years relational DBMS products were the only game in town, the Internet changed that by posing new processing requirements. As compared to traditional database applications, some Internet applications process many, many more transactions against much simpler data. A tweet has a much simpler data structure than the configuration of a Kenworth truck, but there are so many more tweets than truck configurations! Also, traditional relational DBMS products devote considerable code and processing power to support what are termed ACID (atomic, consistent, isolated, durable) transactions. In essence, this acronym means that either all of a transaction is processed or none of it is (atomic), that transactions are processed in the same manner (consistent) whether processed alone or in the presence of millions of other transactions (isolated), and that once a transaction is stored it never goes away— even in the presence of failure (durable). ACID transactions are critical to traditional commercial applications. Even in the presence of machine failure, Vanguard must process both the sell and the buy sides of a transaction; it cannot process part of a transaction. Also, what it stores today must be stored tomorrow. But many new Internet applications don’t need ACID. Who cares if, one time out of 1 million, only half of your tweet is stored? Or if it’s stored today and disappears tomorrow? These new requirements have led to three new categories of DBMS: 1. NoSQL DBMS. This acronym is misleading. It really should be non-relational DBMS. It refers to new DBMS products that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud, without ACID transaction support. MongoDB, Cassandra, Bigtable, and Dynamo are NoSQL products. 2. NewSQL DBMS. These DBMS products process very high levels of transactions, like the NoSQL DBMS, but provide ACID support. They may or may not support the relational model. Such products are a hotbed of development with new vendors popping up nearly every day. Leading products are yet unknown. 3. In-memory DBMS. This category consists of DBMS products that process databases in main memory. This technique has become possible because today’s computer memories can be enormous and can hold an entire database at one time, or at least very large chunks of it. Usually these products support or extend the relational model. SAP HANA is a computer with an in-memory DBMS that provides high volume ACID transaction support simultaneously with complex relational query processing. Tableau Software’s reporting products are supported by a proprietary in-memory DBMS using an extension to SQL. Does the emergence of these new products mean the death knell for relational databases? It seems unlikely because organizations have created thousands of traditional relational databases with millions of lines of application code that process SQL statements against relational data structures. No organization wants to endure the expense and effort of converting those databases and code to something else. There is also a strong social trend among older technologists to hang onto the relational model. However, these new products are loosening the stronghold that relational IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. SECURITY GUIDE BIG DATA . . . LOSSES Do you enjoy trivia games? If so, you have probably flipped through the channels on a weeknight and stopped on the trivia game show Jeopardy! Successful contestants can quickly answer questions across a range of categories. Winners often repeat their success over several episodes. Long winning streaks are fairly uncommon, however, because they require mastery of an extensive set of topics. Viewers at home often resort to using their phones or computers to look up answers. If you have ever resorted to such tactics, you may have wondered how a computer would fare on Jeopardy! Researchers at IBM had the same question in 2011. They had developed Watson, a supercomputer with advanced functionality that includes natural language processing and data mining. The data accessed by Watson when it competed on Jeopardy! included 500 gigabytes worth of dictionaries, encyclopedias, and other reference materials.12 Since Watson’s stunning defeat of two former Jeopardy! champions, IBM has been working to leverage Watson for a number of Big Data applications, including health care and marketing analytics. Other companies witnessed the impressive performance of Watson on Jeopardy! and scrambled to develop their own Big Data analytics tools. However, some companies are still trying to figure out how Big Data applications can be used effectively. Furthermore, when focusing on perfecting powerful Big Data tools, some companies consider securing the data collected as an afterthought, if they consider it at all. through decades of technological advancement. For example, many car manufacturers now boast Internet connectivity in their advertisements but have done little to ensure the security and privacy of vehicles connected to the Internet. Technology-focused trade shows focus on the Internet of Things and feature home automation gadgets like Internetconnected lights, thermostats, door locks, and toasters. Unfortunately, the security features in these devices are often lacking or nonexistent. The Big Data movement is another victim of the march toward technological advancement without thought of security ramifications. Many companies lack the ability to effectively use Big Data tools. As a result, their ability to secure these tools and the data that accompanies them is a grave concern.13 Based on a recent scan of Big Data apps, a security audit conducted by a Swiss security company confirmed this suspicion. The company’s analysis revealed that data on more than 39,000 NoSQL databases are exposed and 1.1 petabytes of this data were also available online.14 Security Loses, Again Neglecting security for the sake of functionality and convenience is a common thread that runs Source: Christian Charisius/Dpa Picture Alliance/Alamy Stock Photo 248 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 But what leads to poor security protocols for these Big Data applications? Rich in Data, Poor in Security It turns out that security shortcomings in Big Data practices are not isolated. In fact, it is likely that poor database management practices translate into larger and more specialized Big Data “transfers.” A recent survey conducted by InformationWeek reveals some troubling findings concerning the security issues plaguing Big Data. The survey identified poor database security practices in roughly 20 percent of survey respondents. They found that (1) databases containing sensitive information are not secured, (2) data breaches have occurred or it cannot be confirmed breaches have not Database Processing 249 occurred, and (3) security evaluations are not regularly conducted on respondents’ databases.15 These factors are driven by the larger problem of Big Data tools prioritizing security below other objectives like functionality, flexible access, and convenience. In light of these security deficiencies, a number of best practices have been recommended to improve the state of Big Data security. These include logging and auditing all activity to permit the identification of unauthorized access, implementing strict access management protocols, and using better encryption to safeguard sensitive data.16 Ultimately, securing the data generated and used by data-driven applications is as important as the accuracy and reporting capabilities of the applications themselves! DISCUSSION QUESTIONS 1. Think about how the trend of capturing and storing data has affected you. What types of data have been generated about you, and where are these data located? What data have you generated yourself? Can you do anything to manage access to or the security of these data? 2. Search the Web to identify a new data-driven application being used by IBM’s Watson. Describe how this new application might provide a competitive advantage for the adopting organization. 3. The feature mentions the continuing technological tension between security and convenience. How has this tension affected your own interactions with computers? Do you err on the side of security or convenience when creating and managing your own security “policies”? 4. Have you or anyone you know purchased home-automation devices? Based on a lack of security found in many of these devices, are you willing to accept the risk that comes with these devices in exchange for the convenience they provide? technology has enjoyed for decades, and it is likely that by 2029 many NoSQL, NewSQL, and inmemory databases will exist in commerce. Furthermore, existing DBMS vendors like Oracle, Microsoft, and IBM will not sit still. With substantial cash and highly skilled developers, they will likely incorporate features of these new categories of DBMS into their existing or new products. Acquisitions of some of the NewSQL startups, in particular, are likely. What does that mean to you as a business professional? First, such knowledge is useful; stay abreast of developments in this area. When you are given a problem, you might choose to utilize one of these new types of database. Unless you are an IT professional, however, you won’t work with them directly. It will be to your advantage to know about them, however, and to suggest their use to the IS personnel who support your requirements. Also, watch these developments from an investor’s perspective. Not all such products will be open source; even if they are, there will be companies that integrate them into their product or service offerings, and those companies may well be good investment opportunities. If you’re interested in IS as a discipline or as a second major, pay attention to these products. You still need to learn the relational model and the processing of relational databases; they will be the bread-and-butter of the industry, even in 2029. But exciting new opportunities and career paths will also develop around these new DBMS products. Learn about them as well, and use that knowledge to separate yourself from the competition when it comes to job interviews. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CAREER GUIDE Name: Kailey Smith Company: Artemis Health Job Title: Director of Data Engineering Education: University of Utah Source: Kailey Smith, Artemis Health, Director of Data Engineering 1 How did you get this type of job? 5 I started at Artemis Health as a senior data quality engineer after being recruited by one of the cofounders on LinkedIn due to my experience with healthcare data. Because we’re a startup, everyone is required to wear a lot of hats, and because of my eagerness to get things done and follow up with the people I was working with, they asked me to manage the team. 2 What attracted you to this field? Working with data really takes someone who is analytical and has an eye for detail. Patience is also important. You can spend a whole day going down the wrong path and start over the next day and find the answer within an hour. As far as technical skills, you need to understand data modeling, SQL, and data analysis. 6 I’ve always enjoyed working with computers and figuring things out, but after taking my first information systems course at the University of Utah, I was sold. This is a field that will be growing and expanding with new and exciting opportunities. There are so many different areas to explore, and you can definitely be paid pretty well! 3 4 7 What advice would you give to someone who is considering working in your field? Keep an open mind. Try out new things. When I was in school, I was focused on the security side of things because it sounded more exciting, but I ended up working more on the data side. Figure out what really excites you, but the more you learn, the more opportunities will open up to you. What do you like most about your job? I like that there are a variety of things for me to do on a daily basis, and I love solving problems! My company is helping our clients find different ways they can save money on their employee benefits, and a lot of that has to do with the healthcare industry. We have been able to uncover some very interesting things that our customers haven’t even thought of. Are education or certifications important in your field? Why? Continually educating yourself on new technology is important for anyone going into the information systems world. If you can show that you’re willing to learn on your own as well as on the job, employers will be far more willing to hire you. Microsoft certifications are only really useful if the company you are going to work for uses those applications. What does a typical workday look like for you (duties, decisions, problems)? I manage the data team of ETL and SQL engineers, so we work very closely with our customers’ data. I work with our COO to find different ways to improve our existing processes, making high-level decisions about how we can migrate to a different system or how we can better implement our next client, but I also jump in on client issues to determine where the bad data is coming from. What skills would someone need to do well at your job? 8 What do you think will be hot tech jobs in 10 years? Big Data is definitely the “next big thing,” but as technology becomes increasingly used in different ways, security is going to be more and more important. It’s really so hard to predict because things are changing so rapidly! 250 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 251 ACTIVE REVIEW Use this Active Review to verify that you understand the ideas and concepts that answer the chapter’s study questions. Q5-6 How is a data model transformed into a database design? Define the term database. Explain the hierarchy of data and name three elements of a database. Define metadata. Using the example of Student and Office_Visit tables, show how relationships among rows are represented in a database. Define the terms primary key, foreign key, and relational database. Name the three components of a database design. Define normalization and explain why it is important. Define data integrity problem and describe its consequences. Give an example of a table with data integrity problems and show how it can be normalized into two or more tables that do not have such problems. Describe two steps in transforming a data model into a database design. Using an example not in this chapter, show how 1:N and N:M relationships are represented in a relational database. Describe the users’ role in the database development. Explain why it is easier and cheaper to change a data model than to change an existing database. Use the examples of Figures 5-25c and 5-26c in your answer. Q5-3 What is a database management system (DBMS)? Q5-7 How can eHermes benefit from a database system? Explain the acronym DBMS and name its functions. List five popular DBMS products. Explain the difference between a DBMS and a database. Summarize the functions of a DBMS. Define SQL. Describe the major functions of database administration. Summarize the two database architectures that eHermes could use for its image database. Describe the architecture it used and explain the rationale for that choice. Q5-1 What is the purpose of a database? State the purpose of a database. Explain the circumstances in which a database is preferred to a spreadsheet. Describe the key difference between Figures 5-1 and 5-2. Q5-2 What is a database? Q5-8 How do database applications make databases more useful? Q5-4 Explain why database tables, by themselves, are not very useful to buiness users. Name the four elements of a database application and describe the purpose of each. Explain the difference between a database application and a database application program. Describe the nature of traditional database applications. Explain why browser-based applications are better than traditional ones. Name the primary technologies used to support browser-based applications. How are data models used for database development? Q5-5 Explain why user involvement is critical during database development. Describe the function of a data model. Sketch the database development process. Define E-R model, entity, relationship, attribute, and identifier. Give an example, other than one in this text, of an E-R diagram. Define maximum cardinality and minimum cardinality. Give an example of three maximum cardinalities and two minimum cardinalities. Explain the notation in Figures 5-20 and 5-21. 2029? Explain how an increase in database data in the next decade will affect business intelligence and security. Summarize two major requirements that some Internet database applications created. Explain the characteristics of the ACID processing of a transaction. Briefly describe the characteristics of NoSQL, NewSQL, and in-memory DBMS products. Summarize how you should respond to these developments. Using Your Knowledge with eHermes You can readily understand why the knowledge of this chapter would be useful to you if you have a job like Seth or Kamala. But what if you are Jessica (the CEO) or Victor (the COO)? The knowledge in this chapter will prepare you to make better decisions like the one that Jessica made in Q5-7. It will also help Victor understand the level of budget required to fund this project. Even if you never create a single query during your career, you will make many decisions that involve the use, creation, and maintenance of databases. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 252 CHAPTER 5 Database Processing KEY TERMS AND CONCEPTS Access 228 ACID 247 Attributes 237 Byte 223 Columns 223 Crow’s feet 239 Crow’s-foot diagram 239 Data integrity problem 241 Data model 236 Database 223 Database administration 229 Database application 232 Database management system (DBMS) 228 DB2 228 Entity 237 Entity-relationship (E-R) data model 237 Entity-relationship (E-R) diagrams 239 Fields 223 File 223 Foreign keys 225 Graphical queries 234 Identifier 237 In-memory DBMS 247 Key 225 Lost-update problem 236 Many-to-many (N:M) relationships 239 Maximum cardinality 240 Metadata 225 Minimum cardinality 240 MongoDB 246 Multi-user processing 235 MySQL 228 NewSQL DBMS 247 Normal forms 242 Normalization 240 NoSQL DBMS 247 One-to-many (1:N) relationships 239 Oracle Database 228 Primary key 225 Records 223 Relation 225 Relational databases 225 Relationships 238 Rows 223 SQL server 228 Structured Query Language (SQL) 229 Table 223 Unified Modeling Language (UML) 237 MyLab MIS To complete the problems with MyLab MIS, go to EOC Discussion Questions in the MyLab. USING YOUR KNOWLEDGE 5-1. Draw an entity-relationship diagram that shows the relaMyLab MIS tionships among a database, database applications, and users. 5-2. Consider the relationship between Adviser and Student in MyLab MIS Figure 5-21. Explain what it means if the maximum cardinality of this relationship is: a. N:1 b. 1:1 c. 5:1 d. 1:5 5-3. Identify two entities in the data entry form in Figure 5-28. MyLab MIS What attributes are shown for each? What do you think are the identifiers? 5-4. Visit www.acxiom.com. Navigate the site to answer the following questions. a. According to the Web site, what is Acxiom’s privacy policy? Are you reassured by its policy? Why or why not? b. Make a list of 10 different products that Acxiom provides. c. Describe Acxiom’s top customers. d. Examine your answers in parts b and c and describe, in general terms, the kinds of data that Acxiom must be collecting to be able to provide those products to those customers. e. What is the function of InfoBase? f. What is the function of PersonicX? g. In what ways might companies like Acxiom need to limit their marketing so as to avoid a privacy outcry from the public? h. Should there be laws that govern companies like Acxiom? Why or why not? i. Should there be laws that govern the types of data services that governmental agencies can buy from companies like Acxiom? Why or why not? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 253 FIGURE 5-28 Sample Data Entry Form COLLABORATION EXERCISE 5 Using the collaboration IS you built, collaborate with a group of students to answer the following questions. The eHermes problem is an excellent example of the use of databases in business. It is also within reach for you to develop as a practice exercise. To do so, work with your team to answer the following questions: 5-5. Study Figure 5-27 to understand the entities and their relationships. Justify each of the cardinalities in this model. 5-6. Working with your team, develop a list of seven queries that together use all of the entities in Figure 5-27. 5-7. Modify the E-R model in Figure 5-27 to include a Manufacturer entity that is related to the ClassifiedProducts entity. Create the relationship, and specify and justify the relationship’s cardinalities. 5-8. Discuss the advantages and disadvantages of the model you created in your answer to question 5-7 and the model in Figure 5-27. 5-9. Transform the data model in Figure 5-27 into a relational database design. Hint: Create a table for each entity and relate those tables as shown in question 5-6. 5-10. Create an Access database for your design in question 5-9. 5-11. Fill your database with sample data. Because you do not have files on a server, leave the URL column blank. 5-12. Using the Access query facility, process each of the seven queries that you created in your answer to question 5-6. CASE STUDY 5 Searching for Pianos . . . Dean Petrich is a certified piano tuner and technician who has been repairing and restoring pianos since 1973. He also has a career as Deano the Clown, a clown entertainer who performs at children’s parties in the Seattle, WA, metro area. (See Figure 5-29, http://deanotheclown.com.) The schedule of his two businesses balance each other: He’s busy as a clown in the late spring, summer, and fall, and during the rest of year, he repairs and restores pianos. Over the past 20 years, the demand for pianos has dramatically declined. When Grandma dies or the kids move out or some other life change occurs, families have no further use for their piano, and when they find there is no market for it, they call Dean, who picks up that piano for a modest fee. For a number of years, Dean restored those pianos and either resold or rented them. Since the turn of the century, however, the decreasing demand for pianos has affected him as well, and over time, he’s accumulated far too many pianos. Even discarding the worst of them, he has, today, nearly 100. As you can imagine, 100 pianos consume considerable storage. At first, Dean stored them in his workshop. When he ran out of room in his workshop, he built and stored them in a large IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 254 CHAPTER 5 Database Processing FIGURE 5-29 Deano the Clown Source: Dean Petrich metal shed (Figure 5-30). When the shed overflowed with pianos, he moved them to plastic tents in a meadow on his property (Figure 5-31). Unfortunately, the plastic tents are prone to rips and tears, and because Dean lives in the Pacific Northwest, many pianos have been ruined by rain, even when he covers them with plastic tarps inside the plastic tents. Two years ago, sinking in his steadily increasing piano inventory, Dean began to offer pianos for free. Not the very best pianos—those he hopes to sell—but he offers many quality pianos for free. However, Dean has two problems. First, he doesn’t know which pianos are best and where they are located in the shop, shed, or tents. Second, few people are willing to crawl over the tops of the pianos in the large shed and tents (through refuse of squirrels, rats, and mice) looking for their perfect piano. To resolve this issue, Dean created a Microsoft Access database with only one table: Piano. To fill the database with data, Dean had to first take an inventory of all the pianos and record the data shown in the columns of Figure 5-32. As you know, a one-table database could just as easily have been stored in Excel, but Dean used Access because he wants to query his data in a variety of ways. He wants to know, for example, all of the pianos located in a tent that have a sound quality of 4 or higher. And he wants to know which pianos have a sound quality of 1 or less so he can dispose of them. Further, customers have particular needs. One might, for example, want a Baldwin spinet (a type of piano); without a database he has no idea whether he has one or where. Or, when he needs a replacement key top, he might want to know the location of all the pianos in the workshop that have ivory keys and a sound quality of 2 or less, and so on. Because of the dynamic nature of his needs, Dean uses the Access query facility. Figure 5-33 shows an example query that returns all of the pianos of a sound quality higher than 4 that are located in a tent and Figure 5-34 shows the result of that query. Dean also suspects that the quality deteriorates faster in the tents than in the shed or the shop. To determine if this is the case, he created the report shown in Figure 5-35. FIGURE 5-30 Pianos in Storage FIGURE 5-31 Pianos in Tent Source: David Kroenke Source: David Kroenke IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing FIGURE 5-32 Columns in the Piano Table Source: Microsoft Access, Microsoft Corporation. FIGURE 5-33 Example Query Source: Microsoft Access, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 255 256 CHAPTER 5 Database Processing FIGURE 5-34 Results from Query in Figure 5-33 Source: Microsoft Access, Microsoft Corporation. FIGURE 5-35 Piano Sound Quality by Building Source: Microsoft Access, Microsoft Corporation. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 5 Database Processing 257 QUESTIONS 5-13. Explain why a one-table database could be stored just as readily in Excel as in Access. 5-14. Justify the decision to use Access to store the piano database. 5-15. Examine the columns in Figure 5-32. Name three characteristics of pianos that are not represented in this table. a. If you were a consultant advising Dean, what criteria should you and he use in deciding whether to include that additional data? b. Is this database a model of an inventory of pianos, or is it a model of Dean’s model of an inventory of pianos? Explain the difference. 5-16. Suppose, in addition to the data about pianos, Dean wants to store data about the manufacturer such as its address (or last known address), its years of operation, and general comments about that manufacturer. a. Design a Manufacturer table. b. Alter the design of the Piano table (Figure 5-32) to represent the relationship between Piano and Manufacturer. State and justify any assumptions. 5-17. Using the data in Figure 5-35, draw conclusions about the effect of location on piano sound quality. Justify your statements using this data. 5-18. Explain the statement “A database is an abstraction of some aspect of a business.” Using this example, explain the ways that processing an abstraction is more effective than examining pianos. Explain the ways that processing an abstraction is more efficient that examining pianos. Generalize your observation to databases for business in general. 5-19. This database will soon become useless if it is not kept up to date. List procedures that Dean needs to create and follow to keep his database current. Complete the following writing exercises. 5-20. Go to http://aws.amazon.com and search for AWS database offerings. Explain the differences among Amazon’s RDS, DynamoDB, ElastiCache, and Redshift services. Which of these would you recommend for storing eHermes’ data? (By the way, whenever you query the Internet for any AWS product, be sure to include the keyword “AWS” in your search. Otherwise, your search will result in Amazon’s lists of books about the item you’re searching for.) 5-21. Suppose you are the accounts manager at a wholesale auto parts distributor. You use spreadsheets to keep track of just about everything. So do your employees. You have hundreds of different spreadsheets to update, back up, and share. Some of them are getting extremely large and unwieldy. You’re worried about losing track of them or, worse, having a malicious employee permanently destroy them. A new hire fresh out of college says building a database would solve most of your problems. How would you determine if a database would really solve your problems? If you chose to develop a centralized database, how would you choose the employees to create the database? What criteria would you use to select those employees? How would you justify allocating people and money to developing this database? ENDNOTES 1. Sarah Needleman, “The Computer Part People Are Hoarding: ‘I Felt Like I Was Buying Drugs,’” The Wall Street Journal, March 27, 2018, www.wsj.com/articles/the-computer-part-people-are-hoarding-i-felt-like-iwas-buying-drugs-1518195876. 2. William Alden, “The Bitcoin Mines of Iceland,” The New York Times, March 27, 2018, https://dealbook.nytimes.com/2013/12/23/ morning-agenda-the-bitcoin-mines-of-iceland/. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 258 CHAPTER 5 Database Processing 3. MySQL was supported by the MySQL Company. In 2008, that company was acquired by Sun Microsystems, which was, in turn, acquired by Oracle later that year. However, because MySQL is open source, Oracle does not own the source code. 4. Clint Boulton, “Oil Company Hopes to Strike Efficiency with Cloud Analytics,” CIO.com, November 10, 2015, accessed June 2, 2018, www.cio.com/article/3003498/cloud-computing/oil-company-hopes-tostrike-efficiency-with-cloud-analytics.html. 5. Ibid. 6. James Kobielus, “The All-Consuming Future of Cloud Analytics,” InfoWorld.com, March 20, 2015, accessed June 2, 2018, www .infoworld.com/article/2899662/big-data/the-all-consuming-futureofcloud-analytics.html. 7. Ibid. 8. Ibid. 9. Fahmida Y. Rashid, “The Dirty Dozen: 12 Cloud Security Threats,” InfoWorld.com, March 11, 2016, accessed June 2, 2018, www .infoworld.com/article/3041078/security/the-dirty-dozen-12cloudsecurity-threats.html. 10. Watch out for confusion between a database application and a database application program. A database application includes forms, reports, queries, and database application programs. 11. See David Kroenke and David Auer, Database Concepts, 8th ed., pp. 81–86 (Upper Saddle River, NJ: Pearson Education, 2017) for more information. 12. Elizabeth Dwoskin, “IBM to Sell Watson as a Big-Data Tool,” Digits: Tech Tools & Analysis from the WSJ, March 6, 2016, http://blogs.wsj.com/ digits/2014/09/16/ibms-watson-computer-now-has-analytics. 13. John Jordan, “The Risks of Big Data for Companies,” The Wall Street Journal, March 6, 2016, www.wsj.com/articles/SB10001424052702 304526204579102941708296708. 14. John Leyden, “Misconfigured Big Data Apps Are Leaking Data Like Sieves,” The Register, March 6, 2016, www.theregister .co.uk/2015/08/13/big_data_apps_expose_data. 15. Lorna Garey, “Big Data Brings Big Security Problems,” InformationWeek, March 6, 2016, www.informationweek.com/big-data/ big-data-analytics/big-data-brings-big-security-problems/d/d-id/1252747. 16. Ibid. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems “No, Felix! Not again! Over and over and over! We decide something one MyLab MIS Using Your Knowledge Questions 6-1, 6-2, 6-3 meeting and then go over it again the next meeting and again the next. What a waste!” “What do you mean, Raj?” asks Felix, ARES’ customer service manager. “I think it’s important we get this right.” “Well, Felix, if that’s the case, why don’t you come to the meetings?” “I just missed a couple.” “Right. Last week we met here for, oh, two, maybe three, hours, and we decided to meet with a spinning instructor Cassie knows. She teaches spinning classes at a local university and was open to the idea of leading the virtual classes.” 259 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 260 CHAPTER 6 Processes, Organizations, and Information Systems “I got the email, but I couldn’t download the attachment.” Source: Haiyin Wang/Alamy Stock Photo “But, Raj, we don’t even know if we’ll have the bandwidth to handle the virtual classes or if anyone will actually sign up. What difference does it make if we offer spinning classes if no one signs up?” “Felix! We discussed that last week. The university has an excellent high-speed Internet connection, and we share the same ISP. So, bandwidth won’t be an issue at all. And users won’t be a problem either. The spinning instructor has a class full of students who are more than willing to try the new virtual classes as long as we supply the headsets.” “Look, Raj, Henri just wants something reasonable to tell Ashley. If we tell him these new virtual spinning classes aren’t going to fly, which they probably won’t, Ashley will cancel this project and we can get back to work . . . focusing on home users and corporate clients!” “Felix, you’re driving me nuts. We discussed this ad nauseam last week. Let’s make some progress. Cassie, what do you think?” “Felix, Raj is right,” Cassie chimes in. “We did have a long discussion on how to go about this—and we did agree to focus first on setting up this test class. This could be an important new revenue source. Yes, we’d have to change some of our internal processes, but it could be very profitable.” “Well, Cassie, I think it’s a mistake. Why didn’t anyone tell me? I put in a lot of time looking into selling ARES directly to corporate clients for their wellness programs.” “Did you read the email?” Cassie asks tentatively. “What email?” “The meeting summary email that I send out each week,” Cassie says with a sigh. “I got the email, but I couldn’t download the attachment. Something weird about a virus checker couldn’t access a gizmo or something like that . . .” Felix trails off. Raj can’t stand that excuse. “Here, Felix, take a look at mine. I’ll underline the part where we concluded that we’d focus on testing the virtual spinning class.” “Raj, there’s no reason to get snippy about this. I thought I had a good idea,” Felix says, sounding hurt. “OK, so we’re agreed—again this week—that we’re going to focus on testing the virtual spinning class at the university. Now, we’ve wasted enough time covering old ground. Let’s get some new thinking on how we’re going to do that.” Felix slumps back into his chair and looks down at his cell phone. “Oh, no, I missed a call from Mapplethorpe. Ahhhh.” “Felix, what are you talking about?” Raj asks. “Mapplethorpe, my human resource contact at GenTech. He wants to know what kind of data we can share with them for their wellness program. I’m sorry, but I’ve got to call him. I’ll be back in a few minutes.” Felix leaves the room. Raj looks at Cassie. “Now what?” he asks. “If we go forward, we’ll have to rediscuss everything when Felix comes back. Maybe we should just take a break?” Cassie shakes her head. “Raj, let’s not. It’s tough for me to get to these meetings. I don’t have to work until tonight, so I drove down here just for this. I’ve got to pick up Simone from day care. We haven’t done anything yet. Let’s just ignore Felix.” “OK, Cassie, but it isn’t easy to ignore Felix. There’s got to be a better way to get this done.” The door opens, and Henri walks in. “Hi everyone! How’s it going?” he asks brightly. “Is it OK if I sit in on your meeting?” IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Study QUESTIONS Chapter PREVIEW Q6-1 Processes, Organizations, and Information Systems 261 Q6-1 What are the basic types of processes? Q6-2 How can information systems improve process quality? Q6-3 How do information systems eliminate the problems of information silos? Q6-4 How do CRM, ERP, and EAI support enterprise processes? Q6-5 What are the elements of an ERP system? Q6-6 What are the challenges of implementing and upgrading enterprise information systems? Q6-7 How do inter-enterprise IS solve the problems of enterprise silos? Q6-8 2029? This chapter explores processes and their supporting information systems within levels of an organization. We will extend the business process discussion to investigate three types of processes and the scope of information systems they use. We will also investigate the concept of process quality and explain how information systems can be used to increase it. Then we will discuss how the use of information systems at one level of organization leads to information silos, explain the problems of such silos, and then show how those problems can be solved by information systems at the next level of organization. In particular, we’ll discuss how enterprise systems such as CRM, ERP, and EAI (you’ll learn the meaning of those terms) solve problems caused by workgroup information silos. ERP systems play a particularly important role, and we’ll discuss their purpose and components and the major ERP vendors. Then we’ll survey the major challenges that occur when implementing enterprise systems. We’ll wrap up the chapter by showing how inter-enterprise IS can solve the problems of enterprise-level silos and finally, in 2029, discuss the implications of mobility and the cloud on future enterprise and inter-enterprise IS. What Are the Basic Types of Processes? A business process is a network of activities that generate value by transforming inputs into outputs. Activities are subparts of processes that receive inputs and produce outputs. Activities can be performed by humans only, by humans augmented by computer systems, and by computer systems only. Figure 6-1 shows a simplified view of a three-activity process for approving customer orders. Each of these activities is, itself, a subprocess of this overall process. You can see that each step—check inventory, check customer credit, and approve special terms—receives inputs and IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 262 CHAPTER 6 Processes, Organizations, and Information Systems Customer Order Check Inventory Out of Stock Order in Stock Credit Rejected Check Customer Credit Order in Stock Credit Approved Special Terms Rejected Or FIGURE 6-1 Business Process with Three Activities Approved Order Approve Special Terms To Order Fulfillment Process transforms them into outputs. You will learn how to better diagram such processes in Chapter 8; for now, just view Figure 6-1 as showing the gist of a typical business process. How Do Structured Processes Differ from Dynamic Processes? Businesses have dozens, hundreds, even thousands of different processes. Some processes are stable, almost fixed sequences of activities and data flows. For example, the process of a salesclerk accepting a return at Nordstrom, or other quality retail stores, is fixed. If the customer has a receipt, take these steps . . . if the customer has no receipt, take these other steps. That process needs to be standardized so that customers are treated consistently and correctly, so that returned goods are accounted for appropriately, and so that sales commissions are reduced in a way that is fair to the sales staff. Other processes are less structured, less rigid, and often creative. For example, how does Nordstrom’s management decide what women’s clothes to carry next spring? Managers can look at past sales, consider current economic conditions, and make assessments about women’s acceptance of new styles at recent fashion shows, but the process for combining all those factors into orders of specific garments in specific quantities and colors is not nearly as structured as that for accepting returns. In this text, we divide processes into two broad categories. Structured processes are formally defined, standardized processes that involve day-to-day operations: accepting a return, placing an order, purchasing raw materials, and so forth. They have the characteristics summarized in the left-hand column of Figure 6-2. Dynamic processes are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. Deciding whether to open a new store location and how best to solve the problem of excessive product returns are examples, as is using Twitter to generate buzz about next season’s product line. Dynamic processes usually require human judgment. The right-hand column of Figure 6-2 shows characteristics of dynamic processes. We will discuss structured processes and information systems that support them in this chapter. For the balance of this chapter, we will use the term process to mean structured process. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems Structured FIGURE 6-2 Structured Versus Dynamic Processes 263 Dynamic Support operational and structured managerial decisions and activities Support strategic and less structured managerial decision and activities Standardized Less specific, fluid Usually formally defined and documented Usually informal Exceptions rare and not (well) tolerated Exceptions frequent and expected Process structure changes slowly and with organizational agony Adaptive processes that change structure rapidly and readily Example: Customer returns, order entry, purchasing, payroll, etc. Example: Collaboration; social networking; ill-defined, ambiguous situations How Do Processes Vary by Organizational Scope? Processes are used at three levels of organizational scope: workgroup, enterprise, and inter-enterprise. In general, the wider the scope of the process, the more challenging the process is to manage. For example, processes that support a single workgroup function, say, accounts payable, are simpler and easier to manage than those that support a network of independent organizations, such as a supply chain. Consider processes at each of these three organizational scopes. Workgroup Processes A workgroup process exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department. A physicians’ partnership is a workgroup that follows processes to manage patient records, issue and update prescriptions, provide standardized postsurgery care, and so forth. Figure 6-3 lists common workgroup processes. Notice that each of these processes is largely contained within a given department. These processes may receive inputs from other departments, and they may produce outputs used by other departments, but all, or at least the bulk of, the processes’ activities lay within a single department. A workgroup information system exists to support one or more processes within the workgroup. For example, an Operations department could implement an IS to support all three of the operations processes shown in Figure 6-3. Or an Accounting department might implement two or three different IS to support the accounting processes shown. Sometimes, workgroup information systems are called functional information systems. Thus, an operations management system is a functional information system, as are a general ledger system and a cost accounting system. The program component of a functional information system is called a functional application. General characteristics of workgroup information systems are summarized in the top row of Figure 6-4. Typical workgroup information systems support 10 to 100 users. Because the procedures for using them must be understood by all members of the group, those procedures are often formalized in documentation. Users generally receive formal training in the use of those procedures as well. When problems occur, they almost always can be solved within the group. If accounts payable duplicates the record for a particular supplier, the accounts payable group can make the fix. If the Web storefront has the wrong number of items in the inventory database, that count can be fixed within the storefront group. (Notice, by the way, that the consequences of a problem are not isolated to the group. Because the workgroup information system exists to provide a service to the rest of the organization, its IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 264 CHAPTER 6 Processes, Organizations, and Information Systems Workgroup Example Processes Workgroup Sales and marketing • • • • • Operations • Order entry • Order management • Finished goods inventory management Manufacturing • • • • Customer service • Order tracking • Account tracking • Customer support Human resources • • • • Recruiting Compensation Assessment HR planning Accounting • • • • • • • • General ledger Financial reporting Cost accounting Accounts receivable Accounts payable Cash management Budgeting Treasury management FIGURE 6-3 Common Workgroup Processes Lead generation Lead tracking Customer management Sales forecasting Product and brand management Inventory (raw materials, goods-in-process) Planning Scheduling Operations problems have consequences throughout the organization. The fix to the problem can usually be obtained within the group, however.) Two or more departments within an organization can duplicate data, and such duplication can be very problematic to the organization, as we discuss in Q6-3. Finally, because workgroup information systems involve multiple users, changing them can be problematic. But, again, when problems do occur, they can be resolved within the workgroup. FIGURE 6-4 Characteristics of Information Systems Scope Example Characteristics Workgroup Doctor's office/ medical practice Support one or more workgroup processes. 10–100 users; procedures often formalized; problem solutions within group; workgroups can duplicate data; somewhat difficult to change Enterprise Hospital Support one or more enterprise processes. 100–1,000+ users; procedures formalized; problem solutions affect enterprise; eliminate workgroup data duplication; difficult to change Inter-enterprise Healthcare exchange Support one or more inter-enterprise processes. 1,000+ users; systems procedures formalized; problem solutions affect multiple organizations; can resolve problems of duplicated enterprise data; very difficult to change IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 265 Enterprise Processes The Ethics Guide on pages 276– 277 demonstrates how one person’s actions can affect an entire company Enterprise processes span an organization and support activities in multiple departments. At a hospital, the process for discharging a patient supports activities in housekeeping, the pharmacy, the kitchen, nurses’ stations, and other hospital departments. Enterprise information systems support one or more enterprise processes. As shown in the second row of Figure 6-4, they typically have hundreds to thousands of users. Procedures are formalized and extensively documented; users always undergo formal procedure training. Sometimes enterprise systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by level of authority. The solutions to problems in an enterprise system involve more than one workgroup or department. As you will learn in this chapter, a major advantage of enterprise systems is that data duplication within the enterprise is either eliminated altogether or, if it is allowed to exist, changes to duplicated data are carefully managed to maintain consistency. Because enterprise systems span many departments and involve potentially thousands of users, they are difficult to change. Changes must be carefully planned and cautiously implemented and users given considerable training. Sometimes users are given cash incentives and other inducements to motivate them to change. CRM, ERP, and EAI are three enterprise information systems that we will define and discuss in Q6-4. Inter-enterprise Processes Inter-enterprise processes span two or more independent organizations. For example, the process of buying a healthcare insurance policy via a healthcare exchange (see Case Study 6, pages 296–298) involves many insurance companies and governmental agencies. Each of these organizations has activities to fulfill, all of which are affected by laws, governmental policy, and competitive concerns of the insurance companies. Inter-enterprise information systems support one or more inter-enterprise processes. Such systems typically involve thousands of users, and solutions to problems require cooperation among different, usually independently owned, organizations. Problems are resolved by meeting, by contract, and sometimes by litigation. Data are often duplicated among organizations; such duplication is either eliminated or carefully managed. Because of their wide span, complexity, and use by multiple companies, such systems can be exceedingly difficult to change. Supply chain management is the classic example of an inter-enterprise information system. We will study inter-enterprise ARES examples throughout the remaining chapters of this text. Q6-2 How Can Information Systems Improve Process Quality? Processes are the fabric of organizations; they are the means by which people organize their activities to achieve the organization’s goals. As such, process quality is an important, possibly the most important, determinant of organizational success.1 The two dimensions of process quality are efficiency and effectiveness. Process efficiency is a measure of the ratio of process outputs to inputs. If an alternative to the process in Figure 6-1 can produce the same order approvals/rejections (output) for less cost or produce more approvals/ rejections for the same cost, it is more efficient. Process effectiveness is a measure of how well a process achieves organizational strategy. If an organization differentiates itself on quality customer service and if the process in IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 266 CHAPTER 6 Processes, Organizations, and Information Systems Figure 6-1 requires 5 days to respond to an order request, then that process is ineffective. Companies that provide customized manufacturing might make their processes more effective by using 3D printing. How Can Processes Be Improved? Organizations can improve the quality (efficiency and/or effectiveness) of a process in one of three ways: • Change the process structure. • Change the process resources. • Change both process structure and resources. Change the Process Structure In some cases, process quality can be changed just by reorganizing the process. The order approval process in Figure 6-1 might be made more efficient if customer credit was done first and inventory was checked second. This change might be more efficient because it would save the cost of checking inventory for customers whose credit will be denied. However, that change would also mean that the organization would pay for a credit check on customers for which it did not have appropriate inventory. We will investigate such changes further in Chapter 8. For now, just note that process structure has a strong bearing on process efficiency. Changing process structure can also increase process effectiveness. If an organization chooses a cost-leader strategy, then that strategy might mean that no special terms should ever be approved. If the process in Figure 6-1 results in the authorization of orders with special terms, then eliminating the third activity will make it more effective (most likely it will save on operational costs as well). Change Process Resources Business process activities are accomplished by humans and information systems. One way to improve process quality is to change the allocation of those resources. For example, if the process in Figure 6-1 is not effective because it takes too long, one way to make it more effective is to identify the source of delays and then to add more resources. If delays are caused by the check customer credit activity, one way to increase process effectiveness is to add more people to that activity. Adding people should decrease delays, but it will also add cost, so the organization needs to find the appropriate balance between effectiveness and efficiency. Another way to shorten the credit check process would be to use an information system to perform the customer credit checks. Depending on the development and operational costs of the new system, that change might also be less costly and therefore more efficient. Change Both Process Structure and Process Resources Of course, it is possible to improve process quality by changing both the process’s structure and resources. In fact, unless a structure change is only a simple reordering of tasks, changing the structure of a process almost always involves a change in resources as well. How Can Information Systems Improve Process Quality? Information systems can be used to improve process quality by: • Performing an activity. • Augmenting a human who is performing an activity. • Controlling data quality and process flow. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 267 Performing an Activity Information systems can perform the entirety of a process activity. In Figure 6-1, for example, the check credit activity could be entirely automated. When you purchase from Amazon or another major online retailer, information systems check your credit while your transaction is being processed. Reserving a seat on an airline is done automatically; all of the reservation activity is done by an information system. (Except, of course, the passenger’s activities: When making a reservation, you must choose the seat from available locations, but your time is free to the airline.) Augmenting a Human Performing an Activity A second way that information systems can improve process quality is by augmenting the actions of a human who is performing that activity. Consider the process of managing patient appointments. To schedule an appointment, patients call the doctor’s office and talk with a receptionist who uses an appointment information system. That information system augments the appointment creation activity. Controlling Data Quality Process Flow A third way that information systems can improve process quality is by controlling data quality and process flow. One of the major benefits of information systems is to control data quality. The IS can not only ensure that correct data values are being input, it can also ensure that data are complete before continuing process activities. The cheapest way to correct for data errors is at the source, and it avoids the problems that develop when process activities are begun with incomplete data. Information systems also have a role in controlling process flow. Consider the order approval process in Figure 6-1. If this process is controlled manually, then someone, say, a salesperson, will obtain the order data from the customer and take whatever actions are needed to push that order through the three steps in the order process. If the salesperson gets busy or is distracted or away from work for a few days, or if there are unexpected delays in one of the activities, it is possible for an order to be lost or the approval unnecessarily delayed. If, however, an information system is controlling the order approval process, then it can ensure that steps are performed in accordance with an established schedule. The information system can also be relied upon to make correct process-routing decisions for processes that are more complicated than that in Figure 6-1. SharePoint workflows, can be used to automate structured processes. Q6-3 How Do Information Systems Eliminate the Problems of Information Silos? An information silo is the condition that exists when data are isolated in separated information systems. For example, consider the six workgroups and their information systems in Figure 6-3. Reflect on these information systems for a moment, and you’ll realize that each one processes customer, sales, product, and other data, but each uses that data for its own purposes and will likely store slightly different data. Sales, for example, will store contact data for customers’ purchasing agents, while Accounting will store contact data for customers’ accounts payable personnel. It’s completely natural for workgroups to develop information systems solely for their own needs, but, over time, the existence of these separate systems will result in information silos that cause numerous problems. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 268 CHAPTER 6 Processes, Organizations, and Information Systems What Are the Problems of Information Silos? Figure 6-5 lists the major problems caused by information silos at the workgroup level, in this case, between the Sales and Marketing department and the Accounting department. First, data are duplicated. Sales and Marketing and Accounting applications maintain separate databases that store some of the same customer data. As you know, data storage is cheap, so the problem with duplication is not wasted disk storage. Rather, the problem is data inconsistency. Changes to customer data made in the Sales and Marketing application may take days or weeks to be made to the Accounting application’s database. During that period, shipments will reach the customer without delay, but invoices will be sent to the wrong address. When an organization has inconsistent duplicated data, it is said to have a data integrity problem. Additionally, when applications are isolated, business processes are disjointed. Suppose a business has a rule that credit orders over $15,000 must be preapproved by the Accounts Receivable department. If the supporting applications are separated, it will be difficult for the two activities to reconcile their data, and the approval will be slow to grant and possibly erroneous. In the second row of Figure 6-5, Sales and Marketing wants to approve a $20,000 order with Ajax. According to the Sales and Marketing database, Ajax has a current balance of $17,800, so Sales and Marketing requests a total credit amount of $37,800. The Accounting database, however, shows Ajax with a balance of only $12,300 because the accounts receivable application has credited Ajax for a return of $5,500. According to Accounting’s records, a total credit authorization of only $32,300 is needed in order to approve the $20,000 order, so that is all the department grants. FIGURE 6-5 Problems Created by Information Silos Problem Sales and Marketing Accounting Ajax Construction Ship to: Reno, NV Bill to: Reno, NV Ajax Construction Ship to: Reno, NV Bill to: Buffalo, NY Data duplication, data inconsistency Disjointed processes Limited information and lack of integrated information Request $37,800 Get Credit Approval Approve $32,300 Order Data ?? Approve Customer Credit Payment Data Is IndyMac a preferred customer? Isolated decisions lead to organizational inefficiencies Increased expense Order Data Payment Data Redouble sales efforts at IndyMac. OneWest has been slow to pay. Sum of problems above. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 269 Sales and Marketing doesn’t understand what to do with a credit approval of $32,300. According to its database, Ajax already owes $17,800, so if the total credit authorization is only $32,300, did Accounting approve only $14,500 of the new order? And why that amount? Both departments want to approve the order. It will take numerous emails and phone calls, however, to sort this out. These interacting business processes are disjointed. A consequence of such disjointed activities is the lack of integrated enterprise information. For example, suppose Sales and Marketing wants to know if IndyMac is still a preferred customer. Assume that determining whether this is so requires a comparison of order history and payment history data. With information silos, that data will reside in two different databases and, in one of them, IndyMac is known by the name of the company that acquired it, OneWest Bank. Data integration will be difficult. Making the determination will require manual processes and days, when it should be readily answered in seconds. This leads to the fourth consequence: inefficiency. When using isolated functional applications, decisions are made in isolation. As shown in the fourth row of Figure 6-5, Sales and Marketing decided to redouble its sales effort with IndyMac. However, Accounting knows that IndyMac was foreclosed by the FDIC and sold to OneWest and has been slow to pay. There are far better prospects for increased sales attention. Without integration, the left hand of the organization doesn’t know what the right hand of the organization is doing. Finally, information silos can result in increased cost for the organization. Duplicated data, disjointed systems, limited information, and inefficiencies all mean higher costs. How Do Organizations Solve the Problems of Information Silos? As defined, an information silo occurs when data is stored in isolated systems. The obvious way to fix such a silo is to integrate the data into a single database and revise applications (and business processes) to use that database. If that is not possible or practical, another remedy is to allow the isolation, but to manage it to avoid problems. The arrows in Figure 6-6 show this resolution at two levels of organization. First, isolated data created by workgroup information systems are integrated using enterprise-wide applications. Scope Example Example Information Silo Enabling Technology Workgroup Doctor's office/ medical practice Physicians and hospitals store separated data about patients. Unnecessarily duplicate tests and procedures. Functional applications. Enterprise applications (CRM, ERP, EAI) on enterprise networks. Enterprise Hospital Hospital and local drug store pharmacy have different prescription data for the same patient. Distributed systems using Web service technologies in the cloud. Interenterprise FIGURE 6-6 Information Silos as Drivers Inter-agency prescription application No silo: Doctors, hospitals, pharmacies share patients’ prescription and other data. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 270 CHAPTER 6 Processes, Organizations, and Information Systems Doctors Issue Discharge Patient Order Nurses Pharmacy Kitchen Housekeeping Family Enterprise Applications Stop Food Prepare Discharge Discharge Patient Enterprise Information System Schedule Pickup Prepare Takehome Meds Deliver Meds Prepare Room Arrive Hospital Enterprise Database “OK, you’re ready FIGURE 6-7 Example Enterprise Process and Information System to go home!” Second, today, isolated data created by information systems at the enterprise level are being integrated into inter-enterprise systems using distributed applications (such as ARES). These applications process data in a single cloud database or connect disparate, independent databases so that those databases appear to be one database. We will discuss inter-enterprise systems further in Q6-7. For now, to better understand how isolated data problems can be resolved, consider an enterprise system at a hospital. An Enterprise System for Patient Discharge Figure 6-7 shows some of the hospital departments and a portion of the patient discharge process. A doctor initiates the process by issuing a discharge patient order. That order is delivered to the appropriate nursing staff, who initiates activities at the pharmacy, the patient’s family, and the kitchen. Some of those activities initiate activities back at the nursing staff. In Figure 6-7, the enterprise process (supported by the IS) is represented by a dotted blue line. Prior to the enterprise system, the hospital had developed procedures for using a paper-based system and informal messaging via the telephone. Each department kept its own records. When the new enterprise information system was implemented, not only was the data integrated into a database, but new computer-based forms and reports were created. The staff needed to transition from the paper-based system to the computer-based system. They also needed to stop making phone calls and let the new information system make notifications across departments. These measures involved substantial change, and most organizations experience considerable anguish when undergoing such transitions. Q6-4 How Do CRM, ERP, and EAI Support Enterprise Processes? Enterprise systems like the one in Figure 6-7 were not feasible until network, data communication, and database technologies reached a sufficient level of capability and maturity in the late 1980s and early 1990s. At that point, many organizations began to develop enterprise systems. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 271 The Need for Business Process Engineering As they did so, organizations realized that their existing business processes needed to change. In part, they needed to change to use the shared databases and to use new computer-based forms and reports. However, an even more important reason for changing business processes was that integrated data and enterprise systems offered the potential of substantial improvements in process quality. It became possible to do things that had been impossible before. Using Porter’s language, enterprise systems enabled the creation of stronger, faster, more effective linkages among value chains. For example, when the hospital used a paper-based system, the kitchen would prepare meals for everyone who was a patient at the hospital as of midnight the night before. It was not possible to obtain data about discharges until the next midnight. Consequently, considerable food was wasted at substantial cost. With the enterprise system, the kitchen can be notified about patient discharges as they occur throughout the day, resulting in substantial reductions in wasted food. But when should the kitchen be notified? Immediately? And what if the discharge is cancelled before completion? Notify the kitchen of the cancelled discharge? Many possibilities and alternatives exist. So, to design its new enterprise system, the hospital needed to determine how best to change its processes to take advantage of the new capability. Such projects came to be known as business process reengineering, which is the activity of altering existing and designing new business processes to take advantage of new information systems. Unfortunately, business process reengineering is difficult, slow, and exceedingly expensive. Business analysts need to interview key personnel throughout the organization to determine how best to use the new technology. Because of the complexity involved, such projects require highlevel, expensive skills and considerable time. Many early projects stalled when the enormity of the project became apparent. This left some organizations with partially implemented systems, which had disastrous consequences. Personnel didn’t know if they were using the new system, the old system, or some hacked-up version of both. The stage was set for the emergence of enterprise application solutions, which we discuss next. Emergence of Enterprise Application Solutions See the Career Guide on pages 290– 291 to learn more about careers in managing the development of largescale applications. When the process quality benefits of enterprise-wide systems became apparent, most organizations were still developing their applications in-house. At the time, organizations perceived their needs as being “too unique” to be satisfied by off-the-shelf or altered applications. However, as applications became more and more complex, in-house development costs became infeasible. As stated in Chapter 3, systems built in-house are expensive not only because of their high initial development costs, but also because of the continuing need to adapt those systems to changing requirements. In the early 1990s, as the costs of business process reengineering were coupled to the costs of in-house development, organizations began to look more favorably on the idea of licensing preexisting applications. “Maybe we’re not so unique, after all.” Some of the vendors who took advantage of this change in attitude were PeopleSoft, which licensed payroll and limited-capability human resources systems; Siebel, which licensed a sales lead tracking and management system; and SAP, which licensed something new, a system called enterprise resource management. These three companies, and ultimately dozens of others like them, offered not just software and database designs. They also offered standardized business processes. These inherent processes, which are predesigned procedures for using the software products, saved organizations from the expense, delays, and risks of business process reengineering. Instead, organizations could license the software and obtain, as part of the deal, prebuilt processes that the vendors assured them were based on “industry best practices.” Some parts of that deal were too good to be true because, as you’ll learn in Q6-5, inherent processes are almost never a perfect fit. But the offer was too much for many organizations to resist. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 272 CHAPTER 6 Processes, Organizations, and Information Systems Marketing Customer acquisition Relationship management Loss/Churn Attract Sell Support and resell Categorize Low-value customers Sell more Target Prospect Customer High-value customers Win back FIGURE 6-8 The Customer Life Cycle Source: The Customer Life Cycle. Used with permission from Professor Douglas MacLachlan, Foster School of Business, University of Washington. Solicitation Processes Lead-Tracking Processes Relationship Management Processes Over time, three categories of enterprise applications emerged: customer relationship management, enterprise resource planning, and enterprise application integration. Consider each. Customer Relationship Management (CRM) A customer relationship management (CRM) system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. Every contact and transaction with the customer is recorded in the CRM database. Vendors of CRM systems claim that using their products makes the organization customer-centric. Though that term reeks of sales hyperbole, it does indicate the nature and intent of CRM packages. Figure 6-8 shows four phases of the customer life cycle: marketing, customer acquisition, relationship management, and loss/churn. Marketing sends messages to the target market to attract customer prospects. When prospects order, they become customers who need to be supported. Additionally, relationship management processes increase the value of existing customers by selling them more product. Inevitably, over time the organization loses customers. When this occurs, win-back processes categorize customers according to value and attempt to win back high-value customers. Figure 6-9 illustrates the major components of a CRM application. Notice that components exist for each stage of the customer life cycle. As shown, all applications process a common customer database. This design eliminates duplicated customer data and removes the possibility of inconsistent data. It also means that each department knows what has been happening with the customer at other departments. Customer support, for example, will know not to provide $1,000 worth of support labor to a customer that has generated $300 worth of business over time. However, it will know to bend over backward for customers that have generated hundreds of thousands of dollars of business. The result to the customers is that they feel like they are dealing with one entity, not many. CRM systems vary in the degree of functionality they provide. One of the primary tasks when selecting a CRM package is to determine the features you need and to find a package that meets that set of needs. You might be involved in just such a project during your career. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 273 Relationship Management Applications Sales Applications Solicitation and Lead Management Applications Customer Support Applications CRM Database FIGURE 6-9 CRM Applications Enterprise Resource Planning (ERP) Large centralized databases can be attractive targets for disgruntled employees. For more information, see the Security Guide on pages 288–289. Enterprise resource planning (ERP) is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. An ERP system is an information system based on ERP technology. As shown in Figure 6-10, ERP systems include the functions of CRM systems but also incorporate accounting, manufacturing, inventory, and human resources applications. The primary purpose of an ERP system is integration; an ERP system allows the left hand of the organization to know what the right hand is doing. This integration allows real-time updates globally, whenever and wherever a transaction takes place. Critical business decisions can then be made on a timely basis using the latest data. To understand the utility of this integration, consider the pre-ERP systems shown in Figure 6-11. This diagram represents the processes used by a bicycle manufacturer. It includes five different databases, one each for vendors, raw materials, finished goods, manufacturing plan, and CRM. Consider the problems that appear with such separated data when the Sales department closes a large order, say, for 1,000 bicycles. First, should the company take the order? Can it meet the schedule requirements for such a large order? Suppose one of the primary parts vendors recently lost capacity due to an earthquake, Relationship Management Applications Sales Applications Solicitation and Lead Management Applications Customer Support Applications ERP Database Human Resources Applications FIGURE 6-10 ERP Applications Accounting Applications Inventory Applications Manufacturing Applications IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 274 CHAPTER 6 Processes, Organizations, and Information Systems SO WHAT? DIGITAL DINING Have you ever stopped to think about all of the complex processes that take place around you on a daily basis that you can’t see? For example, ordering something online requires only a few keystrokes and mouse clicks. Before long, your order is delivered to your front door. However, this delivery is likely the result of countless business processes spanning multiple organizations— perhaps even in a global supply chain—and they all had to be conducted with precision for your package to arrive with the correct items, at the correct location, and at the indicated time. We attribute the ease with which many processes seem to operate today to advancements in technology. For example, online retailers can track inventory levels and shipments in real time using RFID tags. Global supply chains leverage complex enterprise resource planning (ERP) systems to integrate operations and promote information sharing. And fulfillment centers now use robots to bring products to employees who pack shipments (instead of sending people to pick products from storage locations in massive warehouses). It feels as though most processes around us are being reevaluated and reengineered to promote efficiency and effectiveness, all using technology. No process is safe—not even at your local fast-food joint! A Burger-Flipping Robot? CaliBurger, a fast-food chain, recently started testing a burgerflipping robot named Flippy in its Pasadena restaurant. The robot is bolted to the floor in close proximity to the grill and can be fitted with a number of different tools that enable it to interact with the grill (e.g., a spatula and a scraper). The company that developed Flippy stated that the robot is a “costeffective and highly efficient solution” that will not replace kitchen workers but augment them and allow them to focus on direct customer service (like asking customers about their food and experience at the restaurant).2 Flippy uses a variety of sensors and cameras to monitor the environment and guide its movements around the grill. It can manage the cooking process for about 150 burgers per hour. CaliBurger plans to deploy Flippy robots in 50 of its locations in the near future. In light of the potential for competitors to invest in this technology, CaliBurger has exclusive rights to Flippy for the first 6months.3 Task Workers Are Flipping Out While watching a robot make your next meal is an intriguing prospect, have you thought about what happens to the person who used to be paid to cook that burger? The reality of innovation and the transformation of processes mean that some people will inevitably lose their jobs to machines (even if companies state that machines will not replace human Source: Kittipong Jirasukhanont/Alamy Stock Photo workers). The greatest risk of job loss is for workers who perform mundane and routine operations. The real question becomes will these workers stay unemployed, or will they be able to retrain and transition into new jobs? Will younger workers choose to avoid jobs that can be easily automated? Consider that many of the best jobs available today didn’t exist 50 years ago. In fact, current stock prices are reaching record highs, and unemployment rates are reaching near record lows in spite of the proliferation of automation and digitization in our lives. Nevertheless, some economists believe that this time it will be different and that the potential for mass unemployment is increasingly high. Part of the driving force to automate many restaurant and hotel jobs is the plummeting cost of robots. One consulting company estimated that the cost of machines has dropped by about 40 percent since 2005.4 Machines like Flippy are calculated to pay for themselves within a few years due in large part to the fact that they can run around the clock; do not take personal days or vacation time; and do not require extensive onboarding, training, or management. Consider the robotic barista from Café X. It costs $25,000, can make 150 cups of custom coffee per hour, and doesn’t need to be tipped. The payback period is about 2 years, and then profits increase dramatically. How many baristas will need to be retrained after a major coffee shop chain sees the financial benefits of automation? Can they afford to stick with human labor if their competitors buy the Café X baristas? Advocates for this type of automation also point out that the creation and use of machines add numerous jobs back into the economy. For example, the company developing these robots employs a lot of well-paid people. There are also people needed to sell, maintain, and replace these machines with newer models once they become antiquated. In fact, many argue that these new IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 jobs provide better career opportunities than the jobs that are lost to automation. For you as a student, it has never been more important to choose the right college major—the first time around. Questions 1. Take a few minutes to reflect on the nature of the work your friends do for a living. How many of those jobs could be outsourced to robots? What jobs wouldn’t be outsourced? 2. When was the last time you interacted with a process that had been automated? What role did human workers previously fill? What roles are now carried out by machines? Is 275 Processes, Organizations, and Information Systems this automated process more efficient/effective now that it is automated? Are there ways in which humans were actually better at executing this process? 3. Flippy the burger-flipping robot has undergone rigorous testing before being deployed in restaurants. However, would you have any reservations about eating food prepared by a robot? Are there other applications of robots in which you would be uncomfortable with them replacing human workers? 4. The debate over promoting innovation/automation versus endangering jobs is a common theme in the news. Do you agree that workers and the overall economy will be able to adapt over time and replace as many jobs as are taken via automation? and the manufacturer cannot obtain parts for the order in time. If so, the order schedule ought not to be approved. However, with such separated systems this situation is unknown. Even if parts can be obtained, until the order is entered into the finished goods database, purchasing is unaware of the need to buy new parts. The same comment applies to manufacturing. Until the new order is entered into the manufacturing plan, the Production department doesn’t know that it needs to increase manufacturing. And, as with parts, does the company have sufficient machine and floor capacity to fill the order on a timely basis? Does it have sufficient personnel with the correct skill sets? Should it be hiring? Can production meet the order schedule? No one knows before the order is approved. Inbound Logistics Outbound Logistics Manufacturing Sales and Marketing Customer Service Purchase Bicycle Parts Vendor Database Customer Demand Query Vendor Query Vendor Name Raw Materials Order Cash Parts Query Raw Materials Database Update with Parts Received Vendor Finished Goods Database Update with Finished Bicycle Update with Shipped Bicycles Bicycle Query Update with Parts Used Raw Materials Finished Goods Inventory Receiving Accepted Materials Raw Materials Inventory Sales Prospects Components Production Schedule Bicycles Approved Order Shipping Customer Sales Pitch Customer Order Cash Finished Bicycle Make Bicycle CRM Database Salesperson Boxed Bicycles Manufacturing Plan FIGURE 6-11 Pre-ERP Information Systems IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. ETHICS GUIDE PAID DELETION Robin wound her way up to the third floor of the parking garage. As she began backing up into her assigned spot, she noticed that the car she expected to see in her side mirror was not there. Rather, a shiny new luxury car was parked in that spot. The space occupied by the car belonged to Eric Pittman, a colleague on their employer’s search engine optimization team. Robin and Eric had both worked for the company—a leading Web search provider—for about 5 years. Based on conversations they’d had while out for drinks after work, they had comparable salaries, too. Robin wondered how Eric could afford such a nice car considering they were both struggling to afford basic living expenses in such an expensive city. Robin’s thoughts turned to the meetings she had lined up all morning—she probably wouldn’t be able to check her email until after lunch. With a grimace, she descended to the first floor in the elevator. She counted the number of days until the weekend and let out a groan. Eraser for Hire Eric and Robin burst out of the conference room as quickly as they could. It was almost 6 o’clock and they had just left their last meeting of the day. “Do you want to grab a bite to eat at that Greek place?” Eric asked. “Sure,” Robin replied. “I am happy to go anywhere that’s at least a mile from this office!” They jumped into their cars and met up at the restaurant. They gossiped about some of their colleagues and poked fun at their bosses while they waited for the food to arrive. Once it arrived and Eric picked up his gyro to take a bite, Robin noticed his brand-new luxury watch. “Time out!” Robin exclaimed. “You need to tell me what is going on! I parked my car next to your brand-new set of wheels this morning. I didn’t want to say anything, but I just noticed that you have a brand-new watch, too. Did you get some sort of bonus that I don’t know about?” she asked, halfkidding and half-worried. She wondered why she wouldn’t Source: Ian Dagnall/Alamy Stock Photo 276 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 have received a bonus, too. Eric immediately had a concerned look on his face. “Can you keep a secret?” he asked. Eric described an unraveling chain of events in which a number of companies operating in the area had approached him about the possibility of providing “reputation management” services. Each company had recently had some form of negative press, though each form was different. One large manufacturing company was dealing with environmental protection violations. A large retailer had to explain why it provided inadequate health benefits to its employees. A popular chain of restaurants had recently had a long list of healthcode violations. The companies had come to Eric because his dad was a well-known consultant to many large companies in the area. Each company had offered Eric a substantial financial incentive to tweak the results of Web searches using key terms relevant to these negative incidents. Eric had used his access to the search algorithms to make sure any negative press about these incidents showed up several pages deep in the search results, thus minimizing the likelihood that anyone would see Processes, Organizations, and Information Systems 277 them. In some cases, Eric even had the content completely removed from the search index. Thanks to Eric, the negative stories had very little impact on the companies. His work limited the availability of information about these events via the search engine. “With what they paid me, I paid off my student loans, prepaid the lease on my apartment for a whole year, and still had some left over to treat myself a bit,” he said with pride. “Are you interested in being a part of this?” Robin was astounded. She couldn’t imagine what would happen to Eric if someone found out what he had done. She also couldn’t bring herself to think about what would happen to their employer if someone found out its search results had been manipulated. Not only could Eric be in trouble, but the company could be severely damaged. She could lose her job, too. But now that she knew about Eric’s actions, she worried that she might be considered an accessory to search engine manipulation if she didn’t report his behavior. Robin took another bite of her gyro; it didn’t taste nearly as good as it had about 20 minutes before. DISCUSSION QUESTIONS 1. According to the definitions of the ethical principles previously defined in this book: a. Do you think that removing content on the Internet and manipulating search engine results for money is ethical according to the categorical imperative? b. Do you think that removing content on the Internet and manipulating search engine results for money is ethical according to the utilitarian perspective? 2. How might have Eric rationalized his fraudulent behavior? 3. How could an employer prevent this type of manipulation? What types of policies or procedures could be implemented to prevent this type of fraud? 4. Even if Eric were caught, would he be guilty of a crime? Which laws govern search engine management? 5. Would his employer be motivated to report this fraudulent behavior? Why or why not? Figure 6-11 does not show accounting. We can assume, however, that the company has a separate accounting system that is similarly isolated. Eventually, records of business activity find their way to the Accounting department and will be posted into the general ledger. With such a pre-ERP system, financial statements are always outdated, available several weeks after the close of the quarter or other accounting period. Contrast this situation with the ERP system in Figure 6-12. Here, all activity is processed by ERP application programs (called modules), and consolidated data are stored in a centralized ERP database. When Sales is confronted with the opportunity to sell 1,000 bicycles, the information it needs to confirm that the order, schedule, and terms are possible can be obtained from the ERP system immediately. Once the order is accepted, all departments, including purchasing, manufacturing, human resources, and accounting, are notified. Further, transactions are posted to the ERP database as they occur; the result is that financial statements are available quickly. In most cases, correct financial statements can be produced in real time. With such integration, ERP systems can display the current status of critical business factors to managers and executives, as shown in the sales dashboard in Figure 6-13. Of course, the devil is in the details. It’s one thing to draw a rectangle on a chart, label it “ERP Applications,” and assume that data integration takes all the problems away. It is far more difficult IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 278 CHAPTER 6 Processes, Organizations, and Information Systems Inbound Logistics ERP Database Outbound Logistics Manufacturing Materials Management Module Purchasing Module Production & Manufacturing Module Vendor Query Purchase Bicycle Parts Vendor Customer Demand Name Query Parts Query Sales & Distribution Module Update with Parts Used Customer Relationship Module Update with Shipped Bicycles Raw Materials Finished Goods Inventory Vendor Components Make Bicycle Sales Prospects Customer Sales Pitch Customer Order Cash Bicycles Approved Order Raw Materials Inventory ERP Applications Bicycle Query Finished Bicycle Accepted Materials Financial & Cost Module Update with Sale Production Schedule Receiving Customer Service Update with Finished Bicycle Update with Parts Received Raw Materials Order Cash Sales and Marketing Shipping Salesperson Boxed Bicycles FIGURE 6-12 ERP Information Systems to write those application programs and to design the database to store that integrated data. Even more problematic, what procedures should employees and others use to process those application programs? Specifically, for example, what actions should salespeople take before they approve a large order? Here are some of the questions that need to be answered or resolved: • How does the Sales department determine that an order is considered large? By dollars? By volume? • Who approves customer credit (and how)? • Who approves production capacity (and how)? • Who approves schedule and terms (and how)? • What actions need to be taken if the customer modifies the order? • How does management obtain oversight on sales activity? As you can imagine, many other questions must be answered as well. Because of its importance to organizations today, we will discuss ERP in further detail in Q6-5. Before we do so, however, consider the third type of enterprise system: EAI. Enterprise Application Integration (EAI) ERP systems are not for every organization. For example, some nonmanufacturing companies find the manufacturing orientation of ERP inappropriate. Even for manufacturing companies, some find the process of converting from their current system to an ERP system too daunting. Others are quite satisfied with their manufacturing application systems and do not wish to change them. Companies for which ERP is inappropriate still have the problems associated with information silos, however, and some choose to use enterprise application integration (EAI) to solve those IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 279 FIGURE 6-13 Sales Dashboard Source: Windows 10, Microsoft Corporation. problems. EAI is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. EAI does the following: • • • • It connects system “islands” via a new layer of software/system. It enables existing applications to communicate and share data. It provides integrated information. It leverages existing systems—leaving functional applications as is but providing an integration layer over the top. • It enables a gradual move to ERP. The layers of EAI software shown in Figure 6-14 enable existing applications to communicate with each other and to share data. For example, EAI software can be configured to automatically carry out the data conversion required to make data compatible among different systems. When the CRM applications send data to the manufacturing application system, for example, the CRM system sends its data to an EAI software program. That EAI program makes the conversion and then sends the converted data to the ERP system. The reverse action is taken to send data back from the ERP to the CRM. CRM sends request to manufacturing systems via EAI Server FIGURE 6-14 Design and Implementation for the Five Components EAI Metadata EAI Server EAI Interface EAI Interface EAI Interface EAI Interface CRM Manufacturing systems Accounting systems Human resources systems IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 280 CHAPTER 6 Processes, Organizations, and Information Systems Although there is no centralized EAI database, the EAI software keeps files of metadata that describe data formats and locations. Users can access the EAI system to find the data they need. In some cases, the EAI system provides services that provide a “virtual integrated database” for the user to process. The major benefit of EAI is that it enables organizations to use existing applications while eliminating many of the serious problems of isolated systems. Converting to an EAI system is not nearly as disruptive as converting to an ERP system, and it provides many of the benefits of ERP. Some organizations develop EAI applications as a stepping stone to complete ERP systems. Today, many EAI systems use Web services standards to define the interactions among EAI components. Some or all of the processing for those components can be moved to the cloud as well. Q6-5 What Are the Elements of an ERP System? Because of its importance to organizations today, we will consider ERP in more depth than CRM or EAI. To begin, the term ERP has been applied to a wide array of application solutions, in some cases erroneously. Some vendors attempted to catch the buzz for ERP by misapplying the term to applications that provided only one or two integrated functional applications. The organization ERPsoftware360 publishes a wealth of information about ERP vendors, products, solutions, and applications. According to its Web site (www.erpsoftware360.com/erp-101.htm), for a product to be considered a true ERP product, it must include applications that integrate: • Supply chain (procurement, sales order processing, inventory management, supplier management, and related activities) • Manufacturing (scheduling, capacity planning, quality control, bill of materials, and related activities) • CRM (sales prospecting, customer management, marketing, customer support, call center support) • Human resources (payroll, time and attendance, HR management, commission calculations, benefits administration, and related activities) • Accounting (general ledger, accounts receivable, accounts payable, cash management, fixed asset accounting) An ERP solution is an information system and, as such, has all five components. We consider each in turn. Hardware Traditionally, organizations hosted ERP solutions on their own in-house, networked server computers. Such hosting is still the case for many large ERP applications, as well as for those ERP applications that were installed years ago and for which the hardware infrastructure is stable and well managed. Increasingly, however, organizations are turning to cloud-based hosting in one of two modes: • PaaS: Replace an organization’s existing hardware infrastructure with hardware in the cloud. Install ERP software and databases on that cloud hardware. The using organization then manages the ERP software on the cloud hardware. • SaaS: Acquire a cloud-based ERP solution. SAP, Oracle, Microsoft, and the other major ERP vendors offer their ERP software as a service. The vendor manages the ERP software and offers it to customers as a service. During your career, existing in-house ERP solutions are likely to migrate to one of these two modes. Larger installations will likely move to PaaS; smaller and new ERP systems are likely to use SaaS. ERP Application Programs ERP vendors design application programs to be configurable so that development teams can alter them to meet an organization’s requirements without changing program code. Accordingly, during the ERP development process, the development team sets configuration parameters that specify how ERP application programs will operate. For example, an hourly payroll application is configured to IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 281 specify the number of hours in the standard workweek, hourly wages for different job categories, wage adjustments for overtime and holiday work, and so forth. Deciding on the initial configuration values and adapting them to new requirements is a challenging collaboration activity. It is also one that you might be involved in as a business professional. Of course, there are limits to how much configuration can be done. If a new ERP customer has requirements that cannot be met via program configuration, then it needs to either adapt its business to what the software can do or write (or pay another vendor to write) application code to meet its requirements. As stated in Chapter 3, such custom programming is expensive, both initially and in long-term maintenance costs. Thus, choosing an ERP solution with applications that function close to the organization’s requirements is critical to its successful implementation. ERP Databases An ERP solution includes a database design as well as initial configuration data. It does not, of course, contain the company’s operational data. During development, the team must enter the initial values for that data as part of the development effort. If your only experience with databases is creating a few tables in Microsoft Access, then you probably underestimate the value and importance of ERP database designs. SAP, the leading vendor of ERP solutions, provides ERP databases that contain more than 15,000 tables. The design includes the metadata for those tables, as well as their relationships to each other, and rules and constraints about how the data in some tables must relate to data in other tables. The ERP solution also contains tables filled with initial configuration data. Reflect on the difficulty of creating and validating data models (as discussed in Chapter 5), and you will have some idea of the amount of intellectual capital invested in a database design of 15,000 tables. Also, consider the magnitude of the task of filling such a database with users’ data! Although we did not discuss this database feature in Chapter 5, large organizational databases contain two types of program code. The first, called a trigger, is a computer program stored within the database that runs to keep the database consistent when certain conditions arise. The second, called a stored procedure, is a computer program stored in the database that is used to enforce business rules. An example of such a rule would be never to sell certain items at a discount. Triggers and stored procedures are also part of the ERP solution. Developers and business users need to configure the operation of such code during the ERP implementation as well. Business Process Procedures Another component of an ERP solution is a set of inherent procedures that implement standard business processes. ERP vendors develop hundreds, or even thousands, of procedures that enable the ERP customer organization to accomplish its work using the applications provided by the vendor. Figure 6-15 shows a part of the SAP ordering business process; this process implements a portion of the inbound logistics activities. Some ERP vendors call the inherent processes that are defined in the ERP solution process blueprints. Without delving into the details, you should be able to understand the flow of work outlined in this process. Every function (rounded rectangles in Figure 6-15) consists of a set of procedures for accomplishing that function. Typically, these procedures require an ERP user to use application menus, screens, and reports to accomplish the activity. As with application programs, ERP users must either adapt to the predefined, inherent processes and procedures or design new ones. In the latter case, the design of new procedures may necessitate changes to application programs and to database structures as well. Perhaps you can begin to understand why organizations attempt to conform to vendor standards. Training and Consulting Because of the complexity and difficulty of implementing and using ERP solutions, ERP vendors have developed training curricula and numerous classes. SAP operates universities, in which customers and potential customers receive training both before and after the ERP implementation. In IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 282 CHAPTER 6 Processes, Organizations, and Information Systems Purchase requisition does not exist Symbol Key RFQ to be created Event V Function Processing of RFQ issued to vendor RFQs transmitted to vendors Purchasing department Organizational Unit V xor AND Only 1 of several Quotation is received V Processing of RFQ issued to vendor Purchasing department xor Rejection is transmitted Quotation is selected P.O. processing for stock material Material with P.O. ref. has arrived Purchasing department P.O. is transmitted V Goods rec. proc. with P.O. ref. for stock material Goods receiving department xor Goods to be returned Goods receipt cannot be posted Stock is placed V Billing docum. with ref. received Invoice processing with reference Vendor processing xor Bill. docum. cannot be posted FIGURE 6-15 SAP Ordering Process Source: Based on Thomas A. Curran, Andrew Ladd, and Dennis Ladd, SAP R/3 Reporting Business and Intelligence, 1st ed. copyright 2000. Bill. docum. posted and released for payment Vendor processing addition, ERP vendors typically conduct classes on site. To reduce expenses, the vendors sometimes train the organization’s employees, called Super Users, to become in-house trainers in training sessions called train the trainer. ERP training falls into two broad categories. The first category is training about how to implement the ERP solution. This training includes topics such as obtaining top-level management support, preparing the organization for change, and dealing with the inevitable resistance that develops when people are asked to perform work in new ways. The second category is training on how to use IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 283 the ERP application software; this training includes specific steps for using the ERP applications to accomplish the activities in processes such as those in Figure 6-15. ERP vendors also provide on-site consulting for implementing and using the ERP system. Additionally, an industry of third-party ERP consultants has developed to support new ERP customers and implementations. These consultants provide knowledge gained through numerous ERP implementations. Such knowledge is valued because most organizations go through an ERP conversion only once. Ironically, having done so, they now know how to do it. Consequently, some employees, seasoned by an ERP conversion with their employer, leave that company to become ERP consultants. Industry-Specific Solutions As you can tell, considerable work needs to be done to customize an ERP application to a particular customer. To reduce that work, ERP vendors provide starter kits for specific industries called industry-specific solutions. These solutions contain program and database configuration files as well as process blueprints that apply to ERP implementations in specific industries. Over time, SAP, which first provided such solutions, and other ERP vendors created dozens of such starter kits for manufacturing, sales and distribution, healthcare, and other major industries. Which Companies Are the Major ERP Vendors? Although more than 100 different companies advertise ERP products, not all of those products meet the minimal ERP criteria. Of those that do, the bulk of the market is held by the five vendors shown in Figure 6-16.5 SAP and Oracle serve the largest organizations. Microsoft, Infor ERP, and Epicor products primarily serve midsize to small companies. The ERP market is mature and facing stiff competition from SaaS competitors. According to Forbes, four of 10 large organizations will have at least 60 percent of their ERP applications in the Company Market Share SAP 21 percent Market leader in client-server implementations. Expensive. Many consider it to be the gold standard of ERP. Microsoft 16 percent Microsoft AX, which is popular in Europe, is primarily used in manufacturing. Other products have smaller revenue. Dynamics CRM is offered as SaaS, but no full ERP solution is offered in the cloud. Oracle 13 percent Intensely competitive company with strong technology base. Large customer base. Flexible SOA architecture. Will leverage strong technology base into innovative and effective cloud-based solutions. Strong challenge to SAP market leadership. Infor ERP 13 percent Many solutions, not integrated, particularly specialized for manufacturing and supply chain management. Evolving with revolution in 3D printing practices. Epicor 4 percent Leading ERP provider for midsize companies. Many applications to provide clients with custom solutions. FIGURE 6-16 Characteristics of Top ERP Vendors Source: Based on Panorama Consulting Solutions, “Clash of the Titans 2017,” Panorama-consulting.com, November 2015, http://go.panorama-consulting. com/rs/603-UJX-107/images/Clash-ofthe-Titans-2017.pdf. Remarks IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 284 CHAPTER 6 Processes, Organizations, and Information Systems cloud by 2020.6 The $43 billion cloud ERP market will continue to mature, consolidation of vendors is likely, and smaller vendors will fall out entirely. In fact, the top 10 vendors own 64 percent of the market share, and the top five, listed in Figure 6-16, own 55 percent.7 The cloud is having a major impact on ERP vendors. Those with substantial resources (SAP) and deep technical talent (Oracle) are moving their product suites into some version of SaaS, PaaS, or IaaS. Others are unable to convert to the new technology and are gradually losing their customers to those who have converted or to new companies that have only ever offered cloud-based ERP solutions. Among organizations that use ERP, the movement from classical client/server ERP to the cloud will likely be a major business challenge during the early years of your career. Q6-6 What Are the Challenges of Implementing and Upgrading Enterprise Information Systems? Implementing new enterprise systems, whether CRM, ERP, or EAI, is challenging, difficult, expensive, and risky. It is not unusual for enterprise system projects to be well over budget and a year or more late. In addition to new ERP implementations, numerous organizations implemented ERP 15 or 20 years ago and now need to upgrade their ERP installation to meet new requirements. If you work in an organization that is already using enterprise systems, you may find yourself engaged in a significant upgrade effort. Whether from a new implementation or an upgrade, expense and risks arise from five primary factors (see Figure 6-17). Collaborative Management Unlike departmental systems in which a single department manager is in charge, enterprise systems have no clear boss. Examine the discharge process in Figure 6-7; there is no manager of discharge. The discharge process is a collaborative effort among many departments (and customers). With no single manager, who resolves the disputes that inevitably arise? All of these departments ultimately report to the CEO, so there is a single boss over all of them, but employees can’t go to the CEO with a problem about, say, coordinating discharge activities between nursing and housekeeping. The CEO would throw them out of his or her office. Instead, the organization needs to develop some sort of collaborative management for resolving process issues. Usually this means that the enterprise develops committees and steering groups for providing enterprise process management. Although this can be an effective solution, and in fact may be the only solution, the work of such groups is both slow and expensive. Requirements Gaps As stated in Q6-4, few organizations today create their own enterprise systems from scratch. Instead, they license an enterprise product that provides specific functions and features and that includes inherent procedures. But such licensed products are never a perfect fit. Almost always there are gaps between the organization’s requirements and the application’s capabilities. Collaborative management Requirements gaps Transition problems Employee resistance FIGURE 6-17 Five Primary Factors New technology IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 285 The first challenge is identifying the gaps. To specify a gap, an organization must know both what it needs and what the new product does. However, it can be very difficult for an organization to determine what it needs; that difficulty is one reason organizations choose to license rather than to build. Further, the features and functions of complex products like CRM or ERP are not easy to identify. Thus, gap identification is a major task when implementing enterprise systems. The second challenge is deciding what to do with gaps, once they are identified. Either the organization needs to change the way it does things to adapt to the new application, or the application must be altered to match what the organization does. Either choice is problematic. Employees will resist change, but paying for alterations is expensive, and, as noted in Chapter 3, the organization is committing to maintaining those alterations as the application is changed over time. Here, organizations fill gaps by choosing their lesser regret. Transition Problems Transitioning to a new enterprise system is also difficult. The organization must somehow change from using isolated departmental systems to using the new enterprise system, while continuing to run the business. It’s like having heart surgery while running a 100-yard dash. Such transitions require careful planning and substantial training. Inevitably, problems will develop. Knowing this will occur, senior management needs to communicate the need for the change to the employees and then stand behind the new system as the kinks are worked out. It is an incredibly stressful time for all involved. Employee Resistance People resist change. Change requires effort and engenders fear. Considerable research and literature exist about the reasons for change resistance and how organizations can deal with it. Here we will summarize the major principles. First, senior-level management needs to communicate the need for the change to the organization and reiterate this, as necessary, throughout the transition process. Second, employees fear change because it threatens self-efficacy, which is a person’s belief that he or she can be successful at his or her job. To enhance confidence, employees need to be trained and coached on the successful use of the new system. Word-of-mouth is a very powerful factor, and in some cases key users are trained ahead of time to create positive buzz about the new system. Video demonstrations of employees successfully using the new system are also effective. Third, in many ways, the primary benefits of a new ERP system are felt by the accounting and finance departments and the senior management. Many of the employees who are asked to change their activities to implement ERP will not receive any direct benefit from it. Therefore, employees may need to be given extra inducement to change to the new system. As one experienced change consultant said, “Nothing succeeds like praise or cash, especially cash.” Straight-out pay for change is bribery, but contests with cash prizes among employees or groups can be very effective at inducing change. Implementing new enterprise systems can solve many problems and bring great efficiency and cost savings to an organization, but it is not for the faint of heart. New Technology Emerging, new technology affects all information systems, but it affects enterprise systems particularly because of their importance and their value. Consider, for example, the cloud. Because of the cost savings of cloud-based computing, organizations would like to move their enterprise systems to the cloud. But legal, risk, and business policy factors may make such a move infeasible. The organization may be required to keep physical control over its data. When moving it to the cloud, the cloud vendor controls the physical location of the data, and that location might not even be in the same country as the organization. So, some sort of hybrid model may need to be devised (see Q6-8). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 286 CHAPTER 6 Processes, Organizations, and Information Systems Similar comments pertain to mobile technology. Employees want to use mobile devices to access and even modify enterprise system data. But mobile devices are just that—mobile. The enterprise system may be exposed to considerable risk while outside the control of the organization. And ERP data is a juicy target for crime. These factors don’t mean organizations cannot use new technology with enterprise systems, but they do add challenges. Q6-7 How Do Inter-Enterprise IS Solve the Problems of Enterprise Silos? The discussion in Q6-4 illustrates the primary ways in which enterprise systems solve the problems of workgroup information silos. In this question, we will use the ARES example to show you how inter-enterprise systems can accomplish the same for enterprise silos. (The transition is shown by the lower arrow leading to the bottom row in Figure 6-6, page 269.) Figure 6-18 shows the information silos that exist among employers, health clubs, and principal ARES home users. Employers may maintain records of exercise programs, diet, weight, lab test results (e.g., cholesterol, blood sugar, etc.), and biometric readings from wearables (e.g., steps taken, heart rate, sleep patterns, etc.). Health clubs store membership, class, personal trainer, and exercise performance data in a club database. Data is gathered automatically from virtual cycling classes or from on-premises exercise equipment and member heart monitors. At home, individuals generate exercise data on heart monitors and equipment; that data is recorded on mobile devices via wearable exercise devices. The isolation of this exercise data causes problems. For example, employers would like to have reports on exercise data stored in user devices and in health clubs. Users would like to have data like lab test results from their employer, as well as exercise data from their time at health clubs. Health clubs would like to have lab results and home workout data to integrate with the data they have. All three entities would like to produce reports from the integrated data. Figure 6-19 shows the structure of an inter-enterprise system that meets the goals of the three types of participants. In this figure, the labeled rectangles inside the cloud represent mobile applications that could be native, thin-client, or both. Some of the application processing might be done on cloud servers as well as on the mobile devices. Those design decisions are not shown. As illustrated, this system assumes that all users receive reports on mobile devices, but because of the large amount of keying involved, employers submit and manage lab results using a personal computer. Employers Exercise records Diet Weight Lab test results cholesterol blood sugar Biometric readings steps taken heart rate sleep patterns FIGURE 6-18 Information Silos Without ARES Health Clubs Membership data Class data Personal trainer data Exercise performance data Home Users Heart monitor data Stationary bike exercise data Watch data recorded in mobile devices Information Silos IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 287 Processes, Organizations, and Information Systems M ac Ma chi neg Da ener at ta Users at Home ed Health Club hin eDa gen ta era ted Rep ort s Report Personal Progress Store Lab Results Lab Results orts Store Exercise Data Report Member Progress Report Patient Exercise … FIGURE 6-19 Inter-Enterprise ARES System Q6-8 Reports ARES Database Employer Rep Personal Trainer = Native or thin-client mobile application As you can see, lab results and exercise data are integrated in the ARES database; that integrated data is processed by a reporting application to create and distribute the reports as shown. Systems like that shown in Figure 6-19 are referred to as distributed systems because applications processing is distributed across multiple computing devices. Standards such as http, https, html5, css3, JavaScript, and SOA using Web services enable programs to receive data from and display data to a variety of mobile and desktop devices. ARES data is requested and delivered using JSON. 2029? Within the next 10 years, ERP vendors and customers will have sorted out the problems of cloudbased ERP. In what is coming to be known as the hybrid model, ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers that they manage themselves. Governmental agencies, financial analysts, and accountants will have defined standards against which organizations can be monitored for appropriate compliance. By the way, if you graduate as an accountant or financial analyst, this is interesting work in which you could be involved early in your career. Mobility, however, will still present problems in 2029. Workers in the warehouse, loading dock, and shipping department will all carry mobile devices that enable them to process ERP and other IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. SECURITY GUIDE IT’S NOT ME . . . IT’S YOU If you have ever been asked to leave a job, then you understand how difficult it is. Learning that your services are no longer needed is stressful. Compounding the stresses are tense moments with managers and awkward interactions with coworkers. However, the realization that you now need to secure some other means of employment is often the most discouraging part. You may be surprised to learn that these factors commonly lead exiting employees to take advantage of their last moments with their employers. A survey of 945 adults who had been laid off, been fired, or changed jobs in the past year revealed some startling statistics. Sixty percent reported stealing data from their employer before their employment ended. Seventy-nine percent admitted to knowing that taking company data with them was not permitted. They reported taking email lists, customers contact lists, employee records, and financial information.8 It has been estimated that the financial damages inflicted by these types of incidents range from $5,000 to $3 million per incident.9 White Collar . . . Dark Deeds You may be wondering what factors contribute to the widespread theft of company data. To get “inside the minds” of data-stealing employees, we must look at the “fraud triangle.” The fraud triangle contends that pressure, opportunity, and rationalization are the three key factors that govern an individual’s propensity to commit white-collar crime.10 In this context, employees in the process of leaving a company are pressured to find a job. They often think that they can increase the chances of finding a new position if they bring data assets with them. This is especially true if they are targeting a position at their employer’s key competitor. What many employees fail to realize is that confidential customer lists and intellectual Source: Putilov_Denis/Fotolia 288 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 property are considered proprietary and are often governed by nondisclosure agreements. Giving this information to a new employer will likely harm them, not help them. Factor two—opportunity—has continually increased over the past decade as interactions among employees, systems, and data have drastically changed. The rise of telecommuting—employees working from home—and the ability of employees to access their employer’s data in the cloud have opened up countless opportunities for theft of data and intellectual assets. Shockingly, the employee survey also revealed that almost a quarter of employees said they still had the ability to connect to their employer’s network after their employment had ended.11 That’s an opportunity! Finally, rationalization is an element of data theft because employees have often created the data that they are attempting to take with them. They feel a sense of justification for taking the data because they created it. I’m Not Disgruntled . . . Are You? In light of the ample opportunities for employees to take data from their companies and the feelings of pressure and Processes, Organizations, and Information Systems 289 rationalization for doing so, organizations are working to develop predictive tools that will help identify employees who may be preparing to steal data. A data loss prevention expert commented on the inadequacy of existing theftprevention solutions by saying that most organizations fail to have the technological infrastructure in place to identify accidental employee dissemination of sensitive information. Identification of intentional, malicious incidents is even more difficult.12 The tools that are being developed to identify potential data theft search, monitor, analyze, and visualize the data originating from Web sites, applications, servers, networks, sensors, and mobile devices.13 Encryption and continual monitoring of stored data are other tactics that can be used to thwart data theft. This includes encrypting and monitoring data stored within the organization and with third parties like the cloud vendors. Most importantly, companies need to ensure that HR departments and technology groups are collaborating in real time to ensure that employee access to internal systems is revoked when an employee’s time with the company has come to an end. DISCUSSION QUESTIONS 1. Have you ever witnessed someone stealing something at work? If so, it was probably apparent to both you and the perpetrator that he or she was doing something wrong. Why do you think employees are so willing to steal data but might be hesitant to steal tangible items like cash, laptops, or other expensive organizational assets? 2. Take a moment to search the Internet for cases of white-collar crime. Find a specific example and see if you can identify the three elements of the fraud triangle as being factors that contributed to that crime being committed. 3. How do you feel about the fact that many companies are investing in tools to monitor employee behavior? Would you want to work for a company that regularly audits your emails and analyzes your activity on the company’s network? 4. The article mentions that encryption can be a tactic used to thwart employees from taking data with them. Explain how encryption can be used effectively in this context. enterprise applications from wherever they happen to be. Managers, decision makers, and other knowledge workers will have similar applications on their own phones or other mobile devices, devices that they can access from work, other offices, the street, or home. However—and it’s an enormous however—mobile devices are subject to severe security threats. Putting data online does make it easier to access. That’s true for the good guys, but it’s also true for the bad guys. In 2015 Anthem Inc., the largest for-profit healthcare company in the United States, lost healthcare records for 80 million people. Consider the enormity of that single data breach. There are only 320 million people in the United States. That means a single company lost records for one out of every four people you know—including the author of your textbook! Even worse, in 2017 Yahoo! lost all of its 3 billion user accounts. That’s nearly half the people on the planet. Consider what would happen if some criminal, perhaps a malicious insider, were to infiltrate an ERP system. It would be possible to wreak havoc in, say, supply chain orders and inventories or in the operation of machinery on the factory floor. The hacked organization would have to shut down its ERP system, and thus its company, to sort out the mess. But allowing users mobile access to the ERP system will enable organizations to make significant improvements in process quality. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CAREER GUIDE Source: Ben Peters, Anaconda, Inc, Software/Platform Engineer 1 Name: Ben Peters Company: Anaconda, Inc. Job Title: Software/Platform Engineer Education: Carnegie Mellon University, Longwood University I had been working in the industry for about 2 years after graduate school and was passively exploring new opportunities. An HR representative from Anaconda reached out to me about a job opening via LinkedIn, and it sounded exactly like what I was looking for. I spoke with the VP of engineering about the role and was given an interview assignment to complete over the weekend. I really wanted the job, so I spent a considerable amount of time working on the coding assignment. I went in for an onsite interview the following week where they asked me technical questions about data structures, cloud computing, and infrastructure tooling. We also went over the coding assignment. My hard work paid off, and I was given an offer later that week. 2 4 What does a typical workday look like for you (duties, decisions, problems)? We practice Agile software development at Anaconda, so each morning the team meets for a standup to discuss what each member is working on and whether there are any roadblocks. The rest of the day is spent coding and working through technical problems with other team members. As part of the Agile method, we commit to delivering new product features at the end of every 2-week What do you like most about your job? Anaconda is a young and fairly small company, so I feel a great sense of ownership over the product. Before coming here, I was working for large Fortune 100 companies where I did not have that feeling. I get to work with and learn from some of the best talent in the field, and the company is highly respected among the open source and data science communities. It feels good to always get a positive reaction from other software engineers when I tell them where I work. 5 What skills would someone need to do well at your job? Software engineers today need to be versatile. Technology is always changing, so you need to be willing to constantly learn and adapt. It’s good to be fluent in multiple programming languages and frameworks and have a solid understanding of databases, Linux, and cloud computing. Modern software engineers should be knowledgable about DevOps and infrastructure automation tools as well. What attracted you to this field? Big Data and machine learning are two of the hottest technology trends today, and Anaconda is an integral part of those communities. I love working to solve the challenges the industry faces and having the potential to change the world. When I was exploring majors in college, I looked at factors like job demand outlook and salary potential, too. I wanted to be a part of a growing industry with lots of potential. 3 period. This can be intense but is also enjoyable and rewarding. How did you get this type of job? 6 Are education or certifications important in your field? Why? Education and certifications are important because they give you a competitive advantage in the field. It’s equivalent to having a trusted third party who can vouch for the skills you claim to have. Even though good software engineers are in high demand, the field is still very competitive for the positions that you likely want. There are many online courses and certifications you can pursue after graduating to help you stay on top and give you an edge. 290 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 7 What advice would you give to someone who is considering working in your field? Practice, practice, and more practice! Try to get as much hands-on experience as you can while you are in school so you will stand out to future employers. Focus on grasping the fundamentals of software development, design, and architecture, and you will have a great career. 8 Processes, Organizations, and Information Systems 291 What do you think will be hot tech jobs in 10 years? Internet of Things (IoT), virtual and augmented reality (VR/AR), machine learning and deep learning (ML/DL), artificial intelligence (AI), and quantum computing will all likely be hot engineering jobs in the near future. Some of these are already in high demand today, but I believe they will be a much bigger part of our daily life 10 years from now. So, in the next 10 years, organizations must engage in a delicate balancing act between risk of loss and improvement to processes. Consider also the effect of the Internet of Things. Future users of ERP systems will be not just people but also devices and machines. ERP vendors are adapting their software to the particular requirements of 3D printing. In the future, when a salesperson enters an order, he or she may be starting a machine to make that part on demand. In addition, factory automation will also add to process quality improvements. Inventory-picking robots are one example, but self-driving cars and trucks are likely to have an even larger effect. And within the next 10 years, machines will be able to employ the ERP system to schedule their own maintenance. For example, on the factory floor a milling machine will be able to order a replacement for a dull cutter, one possibly made by a 3D printer. Machines will schedule both routine and emergency maintenance for themselves, thus carrying factory automation to a new level. As we have stated many times so far, the future belongs not to those who specialize in existing methods, technology, and processes but rather to those who can find and implement innovative applications of emerging trends. Technology’s effect on enterprise systems will be widespread because enterprise systems are widespread. Many opportunities will occur in the early years of your career. FIGURE 6-20 Designing a Future ERP System Source: Tom Wang/Fotolia IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 292 CHAPTER 6 Processes, Organizations, and Information Systems ACTIVE REVIEW Use this Active Review to verify that you understand the ideas and concepts that answer the chapter’s study questions. What are the basic types of processes? Q6-1 Define structured and dynamic processes and compare and contrast them. Define workgroup processes, enterprise processes, and interenterprise processes and explain their differences and challenges. Define those same levels of information systems. Define functional systems and functional applications. How can information systems improve process quality? Q6-2 Name, define, and give an example of two dimensions of process quality. Name and describe three ways that organizations can improve process quality. Name and describe three ways that information systems can be used to improve process quality. How do information systems eliminate the problems of information silos? Q6-3 Define information silo and explain how such silos come into existence. When do such silos become a problem? Describe the two types of silos in Figure 6-6 and explain the meaning implied by the two arrows. How do CRM, ERP, and EAI support enterprise processes? Q6-4 Define business process reengineering and explain why it is difficult and expensive. Explain two major reasons why developing enterprise information systems in-house is expensive. Explain the advantages of inherent processes. Define and differentiate among CRM, ERP, and EAI. Explain how the nature of CRM and ERP is more similar to each other than that of EAI. What are the elements of an ERP system? Q6-5 Describe the minimum capability of a true ERP product. Explain the nature of each of the following ERP solution components: programs, data, procedures, and training and consulting. For each, summarize the work that customers must perform. List the top five ERP vendors in decreasing order of market share. Q6-6 What are the challenges of implementing and upgrading enterprise information systems? Name and describe five sources of challenges when implementing enterprise systems. Describe why enterprise systems management must be collaborative. Explain two major tasks required to identify requirements gaps. Summarize the challenges of transitioning to an enterprise system. Explain why employees resist change and describe three ways of responding to that resistance. Discuss the challenges that new technology poses for enterprise systems. How do inter-enterprise IS solve the problems of enterprise silos? Q6-7 Describe information silos that exist among employers health clubs, and individuals with regard to exercise data. Describe problems that those silos create. Explain how the system shown in Figure 6-19 will solve the problems caused by those silos. Define distributed systems and explain the benefits of SOA using Web services when implementing such systems. Q6-8 2029? Describe how the cloud, mobility, and the Internet of Things will affect enterprise systems in the next 10 years. Explain how these factors will create opportunities for business professionals. Explain how they will create opportunities for you! Using Your Knowledge with ARES Knowledge of this chapter will help you understand the fundamental value offered by solutions like ARES, namely the elimination of the problems of enterprise-level information silos. As you now know, silos caused by workgroup processes can be eliminated (or managed, in the case of EAI) with enterprise systems. Similarly, silos caused by enterprise processes can be eliminated with inter-enterprise systems like ARES Also, the knowledge of this chapter prepares you to understand the difficulty of adapting and of managing inter-enterprise systems. Finally, Figure 6-19 helps you understand how mobile devices and a cloud database can be used to implement an inter-enterprise system. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 293 KEY TERMS AND CONCEPTS Business process reengineering 271 Customer life cycle 272 Customer relationship management (CRM) system 272 Data integrity 268 Distributed systems 287 Dynamic processes 262 Enterprise application integration (EAI) 278 Enterprise information system 265 Enterprise processes 265 Enterprise resource planning (ERP) 273 ERP system 273 Functional application 263 Functional information systems 263 Hybrid model 287 Industry-specific solutions 283 Information silo 267 Inherent processes 271 Inter-enterprise information systems 265 Inter-enterprise processes 265 Modules 273 Process blueprints 281 Process effectiveness 265 Process efficiency 265 Self-efficacy 285 Stored procedure 281 Structured processes 262 Train the trainer 282 Trigger 281 Workgroup information system 263 Workgroup process 263 MyLab MIS To complete the problems with MyLab MIS, go to EOC Discussion Questions in the MyLab. USING YOUR KNOWLEDGE 6-1. Using the example of your university, give examples of 6-4. Google or Bing each of the top five ERP vendors discussed in information systems for each of the three levels of scope (workgroup, enterprise, and inter-enterprise) discussed in Q6-1. Describe three departmental information systems likely to duplicate data. Explain how the characteristics of these systems relate to your examples. Q6-5. In what ways have their product offerings changed since this text was written? Do these vendors have new products? Have they made important acquisitions? Have they been acquired? Have any new companies made important inroads into their market share? 6-2. In your answer to question 6-1, explain how the three 6-5. Using the knowledge you gained from Chapters 3 and 4 workgroup information systems create information silos. Describe the kinds of problems these silos are likely to cause. Refer to the discussion in Q6-3 as a guide. how do you think mobile systems and the cloud will affect ERP solutions? Explain how mobile ERP might benefit the types of personnel discussed in the bicycle manufacturing example from Q6-4. MyLab MIS MyLab MIS 6-3. Using your answer to question 6-2, describe an enterprise MyLab MIS information system that will eliminate the silos. Would the implementation of your system require business process reengineering? Explain why or why not. COLLABORATION EXERCISE 6 Using the collaboration IS you built, collaborate with a group of students to answer the following questions. The county planning office issues building permits, septic system permits, and county road access permits for all building projects in a county in an eastern state. The planning office issues permits to homeowners and builders for the construction of new homes and buildings and for any remodeling projects that involve electrical, gas, plumbing, and other utilities, as well as the conversion of unoccupied spaces, such as garages, into living or working space. The office also issues permits for new or upgraded septic systems and permits to provide driveway entrances to county roads. Figure 6-21 shows the permit process that the county used for many years. Contractors and homeowners found this process slow and very frustrating. For one, they did not like its sequential nature. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 294 CHAPTER 6 Processes, Organizations, and Information Systems Receive Permit Application Complete? Reject Permit No Yes No Engineering Review Approved? No Yes No Need Septic or Water Review? Yes Health Department Review No Need Highway Dept. Review? Approved? Yes Yes No FIGURE 6-21 Building Permit Process, Old Version Only after a permit had been approved or rejected by the engineering review process would they find out that a health or highway review was also needed. Because each of these reviews could take 3 or 4 weeks, applicants requesting permits wanted the review processes to be concurrent rather than serial. Also, both the permit applicants and county personnel were frustrated because they never knew where a particular application was in the permit process. A contractor would call to ask how much longer, and it might take an hour or longer just to find which desk the permits were on. Accordingly, the county changed the permit process to that shown in Figure 6-22. In this second process, the permit office made three copies of the permit and distributed one to each Approved? Highway Department Review No Yes Approve Permit department. The departments reviewed the permits in parallel; a clerk would analyze the results and, if there were no rejections, approve the permit. Unfortunately, this process had a number of problems, too. For one, some of the permit applications were lengthy; some included as many as 40 to 50 pages of large architectural drawings. The labor and copy expense to the county was considerable. Second, in some cases departments reviewed documents unnecessarily. If, for example, the highway department rejected an application, then neither the engineering nor health departments needed to continue their reviews. At first, the county IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 295 Make Permit Copies Receive Permit Application Engineering Copy Health Department Copy Highway Department Copy Engineering Review Health Department Review Highway Department Review Approved or Rejected Permit Approved or Rejected Permit Approved or Rejected Permit Analyze Results Approved? No FIGURE 6-22 Building Permit Process, Revised Version Reject Permit responded to this problem by having the clerk who analyzed results cancel the reviews of other departments when a rejection was received. However, that policy was exceedingly unpopular with the permit applicants, because once the problem in a rejected application was corrected, the permit had to go back through the other departments. The permit would go to the end of the line and work its way back into the departments from which it had been pulled. Sometimes this resulted in a delay of 5 or 6 weeks. Cancelling reviews was unpopular with the departments as well, because permit-review work had to be repeated. An application might have been nearly completed when it was cancelled due to a rejection in another department. When the application came through again, the partial work results from the earlier review were lost. 6-6. Explain why the processes in Figures 6-21 and 6-22 are classified as enterprise processes rather than departmental processes. Why are these processes not interorganizational processes? Yes Approve Permit 6-7. Using Figure 6-8 as an example, redraw Figure 6-21 using an enterprise information system that processes a shared database. Explain the advantages of this system over the paper-based system in Figure 6-21. 6-8. Using Figure 6-10 as an example, redraw Figure 6-22 using an enterprise information system that processes a shared database. Explain the advantages of this system over the paper-based system in Figure 6-22. 6-9. Assuming that the county has just changed from the system in Figure 6-21 to the one in Figure 6-22, which of your answers in questions 6-7 and 6-8 do you think is better? Justify your answer. 6-10. Assume your team is in charge of the implementation of the system you recommend in your answer to question 6-9. Describe how each of the five challenges discussed in Q6-6 pertain to this implementation. Explain how your team will deal with those challenges. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 296 CHAPTER 6 Processes, Organizations, and Information Systems CASE STUDY 6 A Tale of Two Interorganizational IS The Affordable Care Act (also known as Obamacare) requires the creation of healthcare exchanges that necessitate the development of interorganizational information systems. States were encouraged to set up exchanges for their own residents, but if they elected not to do so, the states’ residents could use an exchange developed by the federal government. About half of the states decided to use the federal exchange. The remainder developed their own exchanges (and supporting information systems). These many parallel development projects give us a unique opportunity to learn from the experience of similar projects that had, in some cases, very different outcomes. Consider, for example, Connecticut and Oregon. The state of Connecticut created an exchange named Access CT. It was delivered on time and on budget and has been such a success that the state of Maryland stopped developing its own system and licensed the Access CT solution instead.14 Other states are considering licensing Access CT as well. On the other hand, the state of Oregon created an exchange named Cover Oregon that was a complete and utter failure. Cover Oregon was never operable despite costing more than $248 million in U.S. and Oregon tax dollars. In May 2014, the U.S. attorney’s office in Portland opened a grand jury investigation into the project.15 Why were there such different outcomes? The two states started their projects about the same time, they had the same scope and goals, they began with about the same funding (Cover Oregon eventually spent nearly twice as much as Access CT), and they had the same required finish date. There is no substantial difference in the population of the two states; Connecticut has about 3.5 million people and Oregon about 3.9 million. What caused the different outcomes? What Is a Healthcare Exchange? To begin, a healthcare exchange is an online store that offers health insurance products to individuals and small businesses. Choosing medical insurance is a complex process with many different levels of coverage and costs, and selecting the right policy is difficult and confusing for most people. Exchanges are thus created not only to offer medical insurance policies, but also to simplify and partially automate the selection process. Exchanges also promote fair competition among health insurers. Besides simplifying the selection of health insurance, another goal for exchanges is to help consumers navigate the complex array of governmental assistance options and possibilities. Depending on income, family size, and other circumstances, some consumers are entitled to Medicare and a variety of other governmental programs. Thus, when using an exchange, a consumer provides personal data about income and family situation, and the exchange uses automation to contact various governmental agencies to determine that consumer’s eligibility. Given this determination, the exchange then offers insurance products appropriate to that particular consumer’s situation. Exchanges are supposed to pay for themselves by charging a modest fee to insurers. Figure 6-23 shows some of the organizations involved in a healthcare exchange. Clearly, an interorganizational information system is needed. As you know from this chapter, such projects are difficult to develop and manage, and it is not surprising that some states failed. Access CT Access CT is a quasi-public corporation. The chairman of the board is Connecticut’s Lieutenant Governor, Nancy Wyman, who set out in the summer of 2012 to find an appropriate CEO. A nationwide search identified 74 candidates, and in July 2012, the Connecticut governor hired Kevin Counihan. Counihan had more than 30 years of experience working in the insurance industry and had been a key player in the development of the Massachusetts healthcare system (widely regarded as the model for Obamacare). Most recently, he had been the president of a private health exchange in California.16 Counihan holds a master’s degree in marketing, and it shows. As soon as he was hired, he began a series of press conferences to explain the nature and goals of the project to the public. Within a few months, Counihan hired senior staff with deep experience in insurance, including Jim Wadleigh, Chief Information Officer. Wadleigh had been director of application development for CIGNA, a health services organization.17 Wadleigh’s primary assignment was to hire and manage an outside contractor to develop the exchange Web site and supporting backend code and to manage the implementation of the exchange information system. By June 2012, Access CT had created a project plan and begun a search for the contractor to develop the site. By September 2012, it selected Deloitte Consulting LLP. At the time, Wadleigh stated, “With only 12 months until the Exchange goes live, we look forward to beginning our work with them immediately.”18 That summer, in an interview on July 13, a local press reporter asked CEO Counihan, “Can you get it done on time?” His response: “This state’s going to get it done in time.”19 And it did. By the end of the federally mandated deadline, Access CT had enrolled 208,301 Connecticut residents,20 and Connecticut had become a model for state-run exchanges. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 Processes, Organizations, and Information Systems 297 Health Health Insurance Health Insurance Company Health Insurance Company Insurance Company Company State Agency State Agency State Book Store Web Site Agency State Agency Back-End Analysis Processes Individuals and Small Businesses FIGURE 6-23 Healthcare Exchange Interorganizational IS Cover Oregon The outcome was not so positive in Oregon. After spending nearly $250 million, the exchange was clearly inoperable, and the exchange’s board of directors decided to stop development and utilize the federal exchange instead.21 After this decision, the Oregon legislature hired an independent company, First Data Corporation, to investigate the causes of this debacle.22 Unlike in Connecticut, neither Oregon’s governor nor any other elected official was directly involved in the project. In fact, in January 2014, the governor stated that he’d only become aware of the failure in “late October.”23 The site was to have gone operational on October 1, and it strains credulity to believe that it took 3 weeks for the news of the failure to reach him. In any case, it is safe to assume the governor was not a “hands-on manager” of the project, nor did he delegate any senior elected official to take that role. According to First Data,24 from the onset, the project suffered from divided direction. Cover Oregon is a quasi-independent corporation as is Access CT, but the exchange information system was to be developed by a different governmental agency, Oregon Health Authority (OHA). Personnel in the two agencies engaged in turf battles and held deep differences about project requirements. These differences resulted in always-changing, inconsistent direction to software developers.25 Further, unlike Access CT, OHA did not hire a supervising contractor for the project, but instead decided itself to take an Federal Agency Federal Agency Federal Agency Federal Agency Federal Agency active role in the software’s development. Unfortunately, the agency suffered high employee turnover and had difficulty hiring and keeping qualified personnel. OHA did hire the services of a professional software development company to create major software components. However, of the three finalists for this work, two dropped out at the last minute, and the winner by default, Oracle Corporation, became in essence a sole source vendor. Consequently, Oracle was able to negotiate time and materials contracts rather than contracts for specific deliverables at specific prices. Later, when problems developed, Oracle was paid tens of millions of additional money for change orders on that same time and materials basis. OHA also attempted to do much of its own programming, but the team had no experience with Oracle and lacked both developers and managers.26 Ironically, because of prior problems with technology projects, the Oregon legislature required the state to hire a quality assurance contractor, Maximus Corporation, to oversee the project. From the project’s start, Maximus reported significant problems involving divided control, lack of clear requirements, inappropriate contracting methodology, lack of project planning, and lack of progress. It is unclear to whom those reports were delivered or what was done with them. In January 2013, when the head of the OHA project received another negative report in a long string of such negative reports, she threatened to withhold Maximus’ payment.27 Alas, when, in January 2013, The Oregonian asked Rocky King, the director of Cover Oregon, whether the system would IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 298 CHAPTER 6 Processes, Organizations, and Information Systems work, he responded, “I haven’t the foggiest idea.”28 Sadly, when the fog cleared, the exchange failed. In March 2015, Cover Oregon was shuttered. QUESTIONS 6-14. Healthcare exchanges must utilize personal and confidential data about their users. Write a one-paragraph policy that stipulates responsible processing and storage of this data. 6-15. Explain what you believe are the reasons for the Access 6-11. Summarize the purpose and intended benefits of a healthcare exchange. CT success. 6-16. Read the Executive Summary of the First Data report 6-12. Explain why a healthcare exchange requires an interorganizational information system. located at https://digital.osl.state.or.us/islandora/object/ osl:16687. Summarize the report’s findings. 6-13. Using knowledge from this chapter, summarize the 6-17. Using the facts described in this case and your answer difficulties and challenges of developing interorganizational information systems. to question 6-16, list five key learnings you can take from the Access CT and Cover Oregon projects. Complete the following writing exercises. 6-18. Using the patient discharge process in Q6-3, explain how the hospital ben- efits from an ERP solution. Describe why integration of patient records has advantages over separated databases. Explain the value of an industryspecific ERP solution to the hospital. 6-19. Go to www.microsoft.com and search for Microsoft Dynamics. Ignore Dynamics CRM. Have any important changes occurred in Microsoft’s ERP product offerings since this edition was written? Has Microsoft brought a cloud-based ERP solution to market? Have any of the four ERP systems described in the chapter been better integrated with Office or the Microsoft Developer’s platform? Using your knowledge guided by experience, what do you think are Microsoft’s intentions with regard to ERP? ENDNOTES 1. The subject of this chapter is structured processes, and we will discuss process quality in terms of them. Note, however, that all of the concepts in this question pertain equally well to dynamic processes. 2. Scott Neuman, “‘Flippy’ the Fast Food Robot (Sort Of) Mans the Grill at Caliburger,” NPR, March 29, 2018, www .npr.org/sections/thetwo-way/2018/03/05/590884388/ flippy-the-fast-food-robot-sort-of-mans-the-grill-at-caliburger. 3. Brian Heater, “Flippy, the Hamburger Cooking Robot, Gets Its First Restaurant Gig,” TechCrunch, March 29, 2018, https://techcrunch.com/2017/09/19/ flippy-the-hamburger-cooking-robot-gets-its-first-restaurant-gig/. 4. Alana Semuels, “Robots Will Transform Fast Food,” The Atlantic, March 29, 2018, www.theatlantic.com/magazine/archive/2018/01/iron-chefs/546581/. 5. Panorama Consulting Solutions, “Clash of the Titans 2017,”Panoramaconsulting.com, November 2015, http://go.panorama-consulting.com/ rs/603-UJX-107/images/Clash-of-the-Titans-2017.pdf. 6. Paul Taylor, “Tipping Point for Cloud-ERP and Big Companies,” Forbes, February 6, 2017, accessed June 12, 2018, www.forbes.com/sites/ sap/2017/02/06/tipping-point-for-cloud-erp-and-big-companies. 7. Panorama Consulting Solutions, “Only the Best Will Rise to the Top,” Panorama-consulting.com, February 2016, http://go.panorama-consulting .com/rs/603-UJX-107/images/Top-10-ERP-Systems-Report.pdf. 8. Brian Krebs, “Data Theft Common by Departing Employees,”TheWashington Post, March 7, 2016, www .washingtonpost.com/wp-dyn/content/article/2009/02/26/ AR2009022601821.html. 9. Devlin Barrett, “FBI Warns of Rise in Disgruntled Employees Stealing Data,” TheWall Street Journal, March 7, 2016, www.wsj.com/articles/ fbi-warns-of-rise-in-disgruntled-employees-stealing-data-1411516389. 10. Bill Barrett, “Inside the Mind of the White-Collar Criminal,” Accounting Web, March 7, 2016, www.accountingweb.com/technology/ trends/inside-the-mind-of-the-white-collar-criminal. 11. Krebs, “Data Theft Common by Departing Employees.” 12. Ibid. 13. Stacy Collett, “5 Signs an Employee Plans to Leave with Your Company’s Data,” CIO, March 7, 2016, www.cio.com/ article/2975774/data-protection/5-signs-an-employee-plans-to-leavewith-your-companysdata.html. 14. Andrea Walker, Meredith Cohn, and Erin Cox, “Md. Votes to Adopt Health Exchange Software Used in Connecticut,” Baltimore Sun, April 2, 2014, accessed June 11, 2018, http://articles.baltimoresun .com/2014-04-02/health/bs-hs-exchange-board-vote-20140401_1_ isabel-fitzgerald-new-website-federal-exchange. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAPTER 6 15. Maeve Reston, “U.S. Prosecutors Investigate Oregon’s Failed Health Insurance Exchange,” Los Angeles Times, May 21, 2014, accessed June 11, 2018, www.latimes.com/nation/nationnow/la-na-usattorneys-officeprobes-oregons-health-insurance-exchange-20140521story.html. 16. Matthew Sturdevant, “CT Health Exchange Has a New Chief Executive,” Hartford Courant, June 21, 2012, accessed June 11, 2018, http://articles.courant.com/2012-06-21/health/hc-healthexchangeceo-20120621_1_health-insurance-exchange-health-carevictoria-veltri 17. Healthcare IT Connect, “Jim Wadleigh,” accessed June 11, 2018, www .healthcareitconnect.com/jim-wadleigh/. 18. Office of Lieutenant Governor Nancy Wyman, “Health Insurance Exchange Hires Key Technical Consultant,” September 27, 2012, accessed June 11, 2018, http://ct.gov/hix/lib/hix/HIXDELOITTERELEASE.pdf. 19. Matthew Sturdevant, “Health Exchange Chief Explains How It Will Work,” Hartford Courant, July 13,2012, accessed June 11, 2018, www.courant.com/health/connecticut/ hc-healthexchange-20120712,0,4877364.story. 20. Arielle Levin Becker, “Obamacare Exchange’s Final Tally: 208,301 People Signed Up,” The CT Mirror, April 17, 2014, accessed June 11, 2018, http://ctmirror.org/2014/04/17/ obamacare-exchanges-final-tally-208301-people-signed-up/. Processes, Organizations, and Information Systems 299 21. Jeff Manning, “Cover Oregon: State Moves to Federal Exchange, but Oracle Technology Lives On,” The Oregonian, May 6, 2014, accessed June 11, 2018, www.oregonlive.com/health/index.ssf/2014/05/ cover_oregon_state_moves_to_fe.html. 22. “Cover Oregon Website Implementation Assessment,” April 23, 2014, accessed June 11, 2018, http://portlandtribune.com/documents/ artdocs/00003481205618.pdf. 23. Dusty Lane, “‘We Look Like Fools:’ A History of Cover Oregon’s Failure,” Katu.com, January 10, 2014, accessed June 11, 2018, www.althycommunitiesoregon.com/lanecounty/2014/01/ we-look-like-fools-a-history-of-cover-oregons-failure/. 24. “Cover Oregon Website Implementation Assessment.” 25. Nick Budnick, “Cover Oregon: Health Exchange Failure Predicted, but Tech Watchdogs’ Warnings Fell on Deaf Ears,” The Oregonian, January18, 2014, accessed June 11, 2018, www.oregonlive.com/health/ index.ssf/2014/01/cover_oregon_health_exchange_f.html. 26. Nick Budnick, “Oregon Health Exchange Technology Troubles Run Deep due to Mismanagement, Early Decisions,” The Oregonian, December 14, 2013, accessed June 11, 2018, www .oregonlive.com/health/index.ssf/2013/12/oregon_health_exchange_ technol.html. 27. Budnick, “Cover Oregon: Health Exchange Failure Predicted.” 28. Ibid. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. CHAP TER 7 Managing Knowledge and Artificial Intelligence LEARNING OBJECTIVES CHAPTER CASES After reading this chapter, you will be able to answer the following questions: Machine Learning Helps Akershus University Hospital Make Better Treatment Decisions Sargent & Lundy Learns to Manage Employee Knowledge The Reality of Virtual Reality Can Cars Drive Themselves—And Should They? 7-1 What is the role of knowledge management systems in business? 7-2 What are artificial intelligence (AI) and machine learning? How do businesses use AI? 7-3 What types of systems are used for enterprise-wide knowledge management, and how do they provide value for businesses? 7-4 What are the major types of knowledge work systems, and how do they provide value for firms? VIDEO CASES How IBM’s Watson Became a Jeopardy Champion Alfresco: Open Source Document Management and Collaboration 7-5 How will MIS help my career? MyLab MIS Discussion Questions: 7-5, 7-6, 7-7; Hands-on MIS Projects: 7-8, 7-9, 7-10, 7-11; eText with Conceptual Animations 300 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Machine Learning Helps Akershus University Hospital Make Better Treatment Decisions T he healthcare industry is deluged with big data, including patient histories, clinical records, charts, and test results. Medical information is now doubling every 3 years and will be doubling every 73 days by 2020. How can healthcare professionals keep up with the knowledge in their field, and how can they use this knowledge to make more informed decisions about treatment options and managing healthcare costs when there is way too much data for humans to easily analyze and absorb? One of the many health care organizations struggling with this problem is Akershus University Hospital (Ahus), a Norwegian public university hospital serving approximately 500,000 inhabitants around Oslo, Norway, and employing 9,500 people. Ahus had amassed huge volumes of data on patients and treatments, but much of this information was in unstructured, textual reports that made it extremely difficult and time-consuming to extract meaningful information. Combing through thousands of complex clinical documents was impossible to complete manually. Working with Capgemini consultants, Ahus is trying to solve this problem by using artificial intelligence technology in IBM Watson Explorer. IBM Watson Explorer is a cognitive computing platform that can analyze structured and unstructured data to uncover trends and patterns that would be difficult, if not impossible, for humans to discern. It uses natural language processing to search data expressed in everyday language like ordinary speech and machine learning algorithms to improve search results. Natural language processing technology makes it possible for a machine to understand, analyze, and derive meaning from human language. Machine learning software can identify patterns in very large databases without explicit programming, although with significant human training. IBM Watson Explorer is able to rapidly mine large volumes of data, interpret speech and text, pick up on nuances of meaning and context, answer questions, draw conclusions, and learn from its experience. It can make inferences and correlations about the content it ingests and rank potential responses for a user to select. The hospital’s image diagnostic department wanted to improve the use of CT examinations in emergencies. Ahus used IBM Watson Explorer to analyze when its CT scans performed on pediatric patients in emergency situations fell within recommended guidelines. CT scans can be life-saving in critical circumstances, © Panchenko Vladimir/Shutterstock 301 IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 302 Chapter 7 Managing Knowledge and Artificial Intelligence but the radiation can also be potentially harmful, so CT scans should not be overused. A large amount of Ahus’s CT scan data was in text format. Ahus used Watson Explorer to gather unstructured data from more than 5,000 anonymous CT examination reports and apply machine learning and natural language processing techniques to learn how often CT scans were undertaken and the findings of those scans. Ahus and Capgemini implemented the project over a period of seven weeks during the summer of 2016. Watson had to learn the language used in medicine and understand the context of how that language is used. Capgemini adapted the technology to the Norwegian language, and Ahus trained Watson to understand medical words and phrases. The project also created a classification schema, teaching Watson to distinguish files that reported positive scan results and those that reported negative results, and categorize the data accordingly. After several tests, Watson Explorer attained an accuracy level of 99 percent for content classification. The final analysis confirmed that frequency of CT scanning at Ahus was at an acceptable level, and that the hospital was striking the right balance between the probability of positive gains in relation to the potential harmful effects. It would have taken a team of people months and perhaps years to analyze the same amount of data that Watson could process in minutes. Sources: IBM Corporation. “Akershus University Hospital,” and “IBM Watson Explorer,” www.ibm.com, accessed May 17, 2018; and “Akershus University Hospital Optimizes the Use of CT Examinations,” www.capgemini.com, accessed May 18, 2018. A kershus University Hospital’s use of artificial intelligence techniques such as machine learning and natural language processing to determine whether its CT scans fell within recommended guidelines shows how organizational performance can benefit by using technology to facilitate the acquisition and application of knowledge. Facilitating access to knowledge, using knowledge tools to create and utilize new knowledge, and using that knowledge to improve business processes are vital to success and survival for both private business firms and public organizations. The chapter-opening diagram calls attention to important points raised by this case and this chapter. Like other medical facilities, Akershus University Hospital was what is termed “data rich but knowledge poor.” It had vast quantities of patient and treatment data, but they were largely unstructured and very difficult to analyze for information and insights. AI techniques such as machine learning and natural language processing helped Ahus obtain new insights and knowledge from thousands of CT scan records so that it could optimize treatments and ensure doctors and staff were following best practices. Here are some questions to think about: How did using IBM Watson Explorer help Akershus University Hospital improve its knowledge? What was the impact on the hospital’s business processes? IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 7 Managing Knowledge and Artificial Intelligence Business Challenges • Monitor safety and Management costs • Unstructured data • Very large volume of data • Opportunities from new technology • Collect patient data • Collect procedure and test data • Implement CT scan Organization Information System Business Solutions process • Train Watson Explorer • IBM Watson Explorer • Machine learning • Natural language processing Technology CT Scan Analysis System • Optimize treatments • Improve safety • Mine large databases • Categorize scan results • Classify content • Evaluate conformity with best practices 7-1 What is the role of knowledge management systems in business? Knowledge management and collaboration systems are among the fastestgrowing areas of corporate and government software investment. The past decade has shown an explosive growth in research on knowledge and knowledge management in the economics, management, and information systems fields. Knowledge management and collaboration are closely related. Knowledge that cannot be communicated and shared with others is nearly useless. Knowledge becomes useful and actionable when shared throughout the firm. In this chapter, we will focus on knowledge management systems and be mindful that communicating and sharing knowledge are becoming increasingly important. We live in an information economy in which the major source of wealth and prosperity is the production and distribution of information and knowledge. At least 20 percent of the total economic output of the United States, $4 trillion, derives from the output of the information and knowledge sectors of the economy, which employs an estimated minimum of 30 million people (U.S. Department of Labor, 2017; Bureau of Economic Analysis, 2018). Knowledge management has become an important theme at many large business firms as managers realize that much of their firm’s value depends on the firm’s ability to create and manage knowledge. Studies have found that a substantial part of a firm’s stock market value is related to its intangible assets, of which knowledge is one important component, along with brands, reputations, and unique business processes. Well-executed knowledge-based projects have been known to produce extraordinary returns on investment, although the impacts of knowledge-based investments are difficult to measure (Gu and Lev, 2001). IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 303 304 Chapter 7 Managing Knowledge and Artificial Intelligence Important Dimensions of Knowledge There is an important distinction between data, information, knowledge, and wisdom. Chapter 1 defines data as flows of events or transactions captured by an organization’s systems that are useful for transacting but little else. To turn data into useful information, a firm must expend resources to organize data into categories of understanding, such as monthly, daily, regional, or store-based reports of total sales. To transform information into knowledge, a firm must expend additional resources to discover patterns, rules, and contexts where the knowledge works. Finally, wisdom is thought to be the collective and individual experience of applying knowledge to the solution of problems. Wisdom involves where, when, and how to apply knowledge. Knowledge is both an individual attribute and a collective attribute of the firm. Knowledge is a cognitive, even a physiological, event that takes place inside people’s heads. It is also stored in libraries and records, shared in lectures, and stored by firms in the form of business processes and employee know-how. Knowledge residing in the minds of employees that has not been documented is called tacit knowledge, whereas knowledge that has been documented is called explicit knowledge. Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents. Knowledge is generally believed to have a location, either in the minds of humans or in specific business processes. Knowledge is “sticky” and not universally applicable or easily moved. Finally, knowledge is thought to be situational and contextual. For example, you must know when to perform a procedure as well as how to perform it. Table 7.1 reviews these dimensions of knowledge. We can see that knowledge is a different kind of firm asset from, say, buildings and financial assets; that knowledge is a complex phenomenon; and that there are many aspects to the process of managing knowledge. We can also TABLE 7. 1 IMPORTANT DIMENSIONS OF KNOWLEDGE KNOWLEDGE IS A FIRM ASSET Knowledge is an intangible asset. The transformation of data into useful information and knowledge requires organizational resources. Knowledge is not subject to the law of diminishing returns as are physical assets but instead experiences network effects because its value increases as more people share it. KNOWLEDGE HAS DIFFERENT FORMS Knowledge can be either tacit or explicit (codified). Knowledge involves know-how, craft, and skill. Knowledge involves knowing how to follow procedures. Knowledge involves knowing why, not simply when, things happen (causality). KNOWLEDGE HAS A LOCATION Knowledge is a cognitive event involving mental models and maps of individuals. There is both a social and an individual basis of knowledge. Knowledge is “sticky” (hard to move), situated (enmeshed in a firm’s culture), and contextual (works only in certain situations). KNOWLEDGE IS SITUATIONAL Knowledge is conditional; knowing when to apply a procedure is just as important as knowing the procedure (conditional). Knowledge is related to context; you must know how to use a certain tool and under what circumstances. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 7 Managing Knowledge and Artificial Intelligence recognize that knowledge-based core competencies of firms—the two or three things that an organization does best—are key organizational assets. Knowing how to do things effectively and efficiently in ways that other organizations cannot duplicate is a primary source of profit and competitive advantage that cannot be purchased easily by competitors in the marketplace. For instance, having a unique build-to-order production system constitutes a form of knowledge and perhaps a unique asset that other firms cannot copy easily. With knowledge, firms become more efficient and effective in their use of scarce resources. Without knowledge, firms become less efficient and less effective in their use of resources and ultimately fail. Organizational Learning and Knowledge Management Like humans, organizations create and gather knowledge using a variety of organizational learning mechanisms. Through collection of data, careful measurement of planned activities, trial and error (experimentation), and feedback from customers and the environment in general, organizations gain experience. Organizations that learn adjust their behavior to reflect that learning by creating new business processes and by changing patterns of management decision making. This process of change is called organizational learning. Arguably, organizations that can sense and respond to their environments rapidly will survive longer than organizations that have poor learning mechanisms. The Knowledge Management Value Chain Knowledge management refers to the set of business processes developed in an organization to create, store, transfer, and apply knowledge. Knowledge management increases the ability of the organization to learn from its environment and to incorporate knowledge into its business processes. Figure 7.1 illustrates the value-adding steps in the knowledge management value chain. Each stage in the value chain adds value to raw data and information as they are transformed into usable knowledge. In Figure 7.1, information systems activities are separated from related management and organizational activities, with information systems activities on the top of the graphic and organizational and management activities below. One apt slogan of the knowledge management field is “Effective knowledge management is 80 percent managerial and organizational and 20 percent technological.” In Chapter 1, we define organizational and management capital as the set of business processes, culture, and behavior required to obtain value from investments in information systems. In the case of knowledge management, as with other information systems investments, supportive values, structures, and behavior patterns must be built to maximize the return on investment in knowledge management projects. In Figure 7.1, the management and organizational activities in the lower half of the diagram represent the investment in organizational capital required to obtain substantial returns on the information technology (IT) investments and systems shown in the top half of the diagram. Knowledge Acquisition Organizations acquire knowledge in a number of ways, depending on the type of knowledge they seek. The first knowledge management systems sought to build corporate repositories of documents, reports, presentations, and best practices. These efforts have been extended to include unstructured documents (such as email). In other cases, organizations acquire knowledge by developing IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 305 306 Chapter 7 Managing Knowledge and Artificial Intelligence FIGURE 7. 1 THE KNOWLEDGE MANAGEMENT VALUE CHAIN Knowledge management today involves both information systems activities and a host of enabling management and organizational activities. Knowledge Business Value Chain Knowledge Management Systems Data and Information Acquisition Collecting Storing Disseminating Information System Acquire Store Business analytics Content management Data mining systems Neural networks Knowledge databases Machine learning Expert systems Knowledge workstations Expert knowledge networks Feedback Knowledge culture Communities of practice Social networks Activities Disseminate Portals Search engines Collaboration and social business tools Apply Decision support systems Enterprise applications Robotics Management and Organizational Activities Organizational routines Organizational culture Training Collaboration New IT-based business processes New products and services New markets online expert networks so that employees can “find the expert” in the company who is personally knowledgeable. In still other cases, firms must acquire new knowledge by discovering patterns in corporate data via machine learning (including neural networks, genenetic algorithms, natural language processing, and other AI techniques), or by using knowledge workstations where engineers can discover new knowledge. These various efforts are described throughout this chapter. A coherent and organized knowledge system also requires business analytics using data from the firm’s transaction processing systems that track sales, payments, inventory, customers, and other vital areas as well as data from external sources such as news feeds, industry reports, legal opinions, scientific research, and government statistics. Knowledge Storage Once they are discovered, documents, patterns, and expert rules must be stored so they can be retrieved and used by employees. Knowledge storage generally involves the creation of a database. Document management systems that digitize, index, and tag documents according to a coherent framework are large databases adept at storing collections of documents. Expert systems also help corporations preserve the knowledge that is acquired by incorporating that knowledge into organizational processes and culture. Each of these is discussed later in this chapter and in the following chapter. Management must support the development of planned knowledge storage systems, encourage the development of corporate-wide schemas for indexing documents, and reward employees for taking the time to update and store documents properly. For instance, it would reward the sales force for submitting IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 7 Managing Knowledge and Artificial Intelligence names of prospects to a shared corporate database of prospects where all sales personnel can identify each prospect and review the stored knowledge. Knowledge Dissemination Portals, email, instant messaging, wikis, social business tools, and search engine technology have added to an existing array of collaboration tools for sharing calendars, documents, data, and graphics. Contemporary technology has created a deluge of information and knowledge. How can managers and employees discover, in a sea of information and knowledge, that which is really important for their decisions and their work? Here, training programs, informal networks, and shared management experience communicated through a supportive culture help managers focus their attention on what is important. Knowledge Application Regardless of what type of knowledge management system is involved, knowledge that is not shared and applied to the practical problems facing firms and managers does not add business value. To provide a return on investment, organizational knowledge must become a systematic part of management decision making and become situated in systems for decision support. Ultimately, new knowledge must be built into a firm’s business processes and key application systems, including enterprise applications for managing crucial internal business processes and relationships with customers and suppliers. Management supports this process by creating—based on new knowledge—new business practices, new products and services, and new markets for the firm. Building Organizational and Management Capital: Collaboration, Communities of Practice, and Office Environments In addition to the activities we have just described, managers can help by developing new organizational roles and responsibilities for the acquisition of knowledge, including the creation of chief knowledge officer executive positions, dedicated staff positions (knowledge managers), and communities of practice. Communities of practice (COPs) are informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests. The activities of these communities include self-education and group education, conferences, online newsletters, and day-to-day sharing of experiences and techniques to solve specific work problems. Many organizations, such as IBM, the U.S. Federal Highway Administration, and the World Bank, have encouraged the development of thousands of online communities of practice. These communities of practice depend greatly on software environments that enable collaboration and communication. COPs can make it easier for people to reuse knowledge by pointing community members to useful documents, creating document repositories, and filtering information for newcomers. COPs’ members act as facilitators, encouraging contributions and discussion. COPs can also reduce the learning curve for new employees by providing contacts with subject matter experts and access to a community’s established methods and tools. Finally, COPs can act as a spawning ground for new ideas, techniques, and decision-making behavior. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 307 308 Chapter 7 Managing Knowledge and Artificial Intelligence FIGURE 7. 2 MAJOR TYPES OF KNOWLEDGE MANAGEMENT SYSTEMS There are three major categories of knowledge management systems, and each can be broken down further into more specialized types of knowledge management systems. Enterprise-Wide Knowledge Management Systems General-purpose, integrated, firmwide efforts to collect, store, disseminate, and use digital content and knowledge Enterprise content management systems Collaboration and social tools Learning management systems Knowledge Work Systems “Intelligent” Techniques Specialized workstations and systems that enable scientists, engineers, and other knowledge workers to create and discover new knowledge Tools for discovering patterns and applying knowledge to discrete decisions and knowledge domains Computer-aided design (CAD) Virtual reality Data mining Neural networks Expert systems Machine learning Natural language processing Computer vision systems Robotics Genetic algorithms Intelligent agents Types of Knowledge Management Systems There are essentially three major types of knowledge management systems: enterprise-wide knowledge management systems, knowledge work systems, and “intelligent” techniques. Figure 7.2 shows the knowledge management systems applications for each of these major categories. Enterprise-wide knowledge management systems are general-purpose firmwide efforts to collect, store, distribute, and apply digital content and knowledge. These systems include capabilities for searching for information, storing both structured and unstructured data, and locating employee expertise within the firm. They also include supporting technologies such as portals, search engines, collaboration and social business tools, and learning management systems. The development of powerful networked workstations and software for assisting engineers and scientists in the discovery of new knowledge has led to the creation of knowledge work systems such as computer-aided design (CAD), visualization, simulation, and virtual reality systems. Knowledge work systems (KWS) are specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and creating new knowledge for a company. We discuss knowledge work applications in detail in Section 7-4. Knowledge management also includes a diverse group of “intelligent” techniques, such as data mining, expert systems, machine learning, neural networks, natural language processing, computer vision systems, robotics, genetic algorithms, and intelligent agents. These techniques have different objectives, from a focus on discovering knowledge (data mining and neural networks) to distilling knowledge in the form of rules for a computer program (expert systems) to discovering optimal solutions for problems (genetic algorithms). Section 7-2 provides more detail about these “intelligent” techniques. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 7 Managing Knowledge and Artificial Intelligence 7-2 What are artificial intelligence (AI) and machine learning? How do businesses use AI? “Intelligent” techniques are often described as artificial intelligence (AI). There are many definitions of artificial intelligence. In the most ambitious vision, AI involves the attempt to build computer systems that think and act like humans. Humans see, hear, and communicate with natural languages, make decisions, plan for the future, achieve goals, perceive patterns in their environments, and learn, among many other capabilities. Humans also love, hate, and choose what objectives they want to pursue. These are the foundations of what is called “human intelligence” and what is called “common sense” or generalized intelligence. So far the “Grand Vision” of AI remains a distant dream: there are no computer programs that have demonstrated generalized human intelligence or common sense. Human intelligence is vastly more complex than the most sophisticated computer programs and covers a broader range of activities than is currently possible with “intelligent” computer systems and devices. A narrow definition of artificial intelligence is far more realistic and useful. Stripped of all the hyperbole, artificial intelligence programs are like all computer programs: They take data input from the environment, process that data, and produce outputs. AI programs differ from traditional software programs in the techniques and technologies they use to input and process data. AI systems today can perform many tasks that would be impossible for humans to accomplish, and can equal or come close to humans in tasks such as interpreting CT scans, recognizing faces and voices, playing games like chess or Go, or besting human experts in certain well-defined tasks. In many industries they are transforming how business is done, where people are employed, and how they do their jobs. Evolution of AI In the last decade, significant progress has been made within this limited vision of AI. The major forces driving the rapid evolution of AI are the development of Big Data databases generated by the Internet, e-commerce, the Internet of Things, and social media. Secondary drivers include the drastic reduction in the cost of computer processing and the growth in the power of processors. And finally, the growth of AI has relied on the refinement of algorithms by tens of thousands of AI software engineers and university AI research centers, along with significant investment from business and governments. There have been few fundamental conceptual breakthroughs in AI in this period, or in understanding how humans think. Many of the algorithms and statistical techniques were developed decades earlier but could not be implemented and refined on such a large scale as is currently possible. Progress has been significant: Image recognition programs have gone from 25 percent error rates down to less than 3 percent in 2018; natural language speech recognition errors have dropped from 15 percent to 6 percent; and in translation among common languages, Google’s Translate program achieves about 85 percent accuracy compared to humans (Technology Quarterly, 2017; Hirschberg and Manning, 2016). These advances have made possible personal assistants like Siri (Apple), Alexa (Amazon), Cortana (Microsoft), and Now (Google), as well as speech-activated systems in automobiles. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 309 310 Chapter 7 Managing Knowledge and Artificial Intelligence In a famous 1950 paper, computer scientist Alan Turing defined an artificially intelligent computer program as one that a human could have a conversation with and not be able to tell it was a computer (Turing, 1950). We still cannot have a genuine conversation with a computer AI system because it has no genuine understanding of the world, no common sense, and does not truly understand humans. Nevertheless, AI systems can be enormously helpful to humans and business firms. Major Types of AI Artificial intelligence is a family of programming techniques and technologies, each of which has advantages in select applications. Table 7.2 describes the major types of AI: expert systems, machine learning, neural networks, deep learning, genetic algorithms, natural language processing, computer vision systems, robotics, and intelligent agents. Let’s take a look at each type of AI and understand how it is used by businesses and other organizations. Expert Systems Expert systems were developed in the 1970s and were the first large-scale applications of AI in business and other organizations. They account for an estimated 20 percent of all AI systems today. Expert systems capture the knowledge of individual experts in an organization through in-depth interviews, and represent that knowledge as sets of rules. These rules are then converted into computer code in the form of IF-THEN rules. Such programs are often used to develop apps that walk users through a process of decision making. Expert systems provide benefits such as improved decisions, reduced errors, reduced costs, reduced training time, and better quality and service. They have been used in applications for making decisions about granting credit and for diagnosing equipment problems, as well as in medical diagnostics, legal research, civil engineering, building maintenance, drawing up building plans, and educational technology (personalized learning and responsive testing) TABLE 7. 2 MAJOR TYPES OF AI TECHNIQUES Expert systems Represent the knowledge of experts as a set of rules that can be programmed so that a computer can assist human decision makers. Machine learning Software that can identify patterns in very large databases without explicit programming although with significant human training. Neural networks and deep learning Loosely based on human neurons, algorithms that can be trained to classify objects into known categories based on data inputs. Deep learning uses multiple layers of neural networks to reveal the underlying patterns in data, and in some limited cases identify patterns without human training. Genetic algorithms Algorithms based loosely on evolutionary natural selection and mutation, commonly used to generate high-quality solutions to optimization and search problems. Natural language processing Algorithms that make it possible for a computer to understand and analyze natural human language. Computer vision systems Systems that can view and extract information from real-world images. Robotics Use of machines that can substitute for human movements as well as computer systems for their control and information processing. Intelligent agents Software agents that use built-in or learned knowledge to perform specific tasks or services for an individual. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 7 Managing Knowledge and Artificial Intelligence FIGURE 7. 3 RULES IN AN EXPERT SYSTEM An expert system contains a number of rules to be followed. The rules are interconnected, the number of outcomes is known in advance and is limited, there are multiple paths to the same outcome, and the system can consider multiple rules at a single time. The rules illustrated are for simple credit-granting expert systems. A --> B If INC > 50,000 Ask about car payments Else EXIT B --> C If car payment < 10% of income Ask about mortgage payment Else EXIT C --> D If mortgage payment < 20% of income Grant credit Else EXIT D Grant credit line D --> E If D, ask about years employed E --> F If years > = 4 Grant 10,000 line Else do G F Limit 10,000 G --> H If years < 4 Ask about other debt H --> F If other debt < 5% of income Do F Else do I I Limit 3,000 (Maor, 2003; Mishra, 2016). For instance, if you were the project manager of a 14-story office building and were given the task of configuring the building’s air conditioning system, which has hundreds of parts and subassemblies, an expert system could walk you through the process by asking a series of questions, producing an order to suppliers, and providing an overall cost estimate for the project, all in a matter of hours rather than weeks. See Figure 7.3 for an expert system for credit granting. How Expert Systems Work Expert systems model human knowledge as a set of rules that collectively are called the knowledge base. Expert systems can have from a handful to many thousands of rules, depending on the complexity of the decision-making problem. The strategy used to search through the collection of rules and formulate conclusions is called the inference engine. The inference engine works by searching through the rules and firing those rules that are triggered by facts the user gathers and enters. Expert systems have a number of limitations, the most important of which is that even experts can’t explain how they make decisions: they know more than they can say. People drive cars, for instance, but are challenged to say how they do it. The knowledge base can become chaotic as the number of IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. 311 312 Chapter 7 Managing Knowledge and Artificial Intelligence rules can reach into the thousands. In rapidly changing environments, say medical diagnosis, the rules change and need to be continually updated. Expert systems are not useful for dealing with unstructured problems that managers and employees typically encounter, and do not use real-time data to guide their decisions. Expert systems do not scale well to the kinds of very large data sets produced by the Internet and the Internet of Things (IoT), and they are expensive to build. For these reasons, expert system development has slowed in the last decade to small domains of expert knowledge such as automobile diagnosis. Machine Learning More than 75 percent of AI development today involves some kind of machine learning (ML) accomplished by neural networks, genetic algorithms, and deep learning networks, with the main focus on finding patterns in data, and classifying data inputs into known (and unknown) outputs. Machine learning is based on an entirely different AI paradigm than expert systems. In machine learning there are no experts, and there is no effort to write computer code for rules reflecting an expert’s understanding. Instead, ML begins with very large data sets with tens to hundreds of millions of data points and automatically finds patterns and relationships by analyzing a large set of examples and making a statistical inference. Table 7.3 provides some examples of how leading business firms are using various types of machine learning. Facebook has over 200 million monthly users in the United States who spend an average of 35 minutes on site daily. The firm displays an estimated 1 billion ads monthly to this audience, and it decides which ads to show each person in less than one second. For each person, Facebook bases this decision on the prior behavior of its users, including information shared (posts, comments, Likes), the activity of their social network friends, background information supplied to Facebook (age, gender, location, devices used), information supplied by advertisers (email address, prior purchases), and user activity on apps and other websites that Facebook can track. Facebook uses ML to identify patterns in the dataset, and to estimate the probability that any specific user will click on a particular ad based on the patterns of behavior they have identified. TABLE 7. 3 EXAMPLES OF MACHINE LEARNING WellsFargo Aiera system reads and analyzes a half-million documents daily for 1,600 stocks, and produces buy and sell calls for 550 stocks followed by their wealth management unit. Allstate Insurance Amelia system uses deep learning and natural language processing to assist call center employees in handling customer queries. Trained on 40 insurance topics, it understands context, and learns from experience. Netflix Recommender system based on video similarity algorithm uses statistical and machine learning to develop a personalized selection of videos for each of its 125 million subscribers worldwide. Amazon Alexa uses machine learning and speech recognition for its intelligent voice-controlled personal assistant. Schindler Group Monitors over one million elevators and walkways using GE’s Predix operating system and machine learning to make predictions about needed maintenance. PayPal Uses machine learning algorithms to identify patterns of fraud for 170 million customers who generate four billion transactions annually. IS 223 Introduction to Information Systems, Custom Edition for Boston University. Published by Pearson. Copyright © 2021 by Pearson Education, Inc. Chapter 7 Managing Knowledge and Artificial Intelligence Analysts estimate that Facebook uses at least 100,000 servers located in several very large-scale “hyper datacenters” to perform this task. At the end of this process is a simple show ad/no show ad result. The current response rate (click rate) to Facebook ads is about 0.1 percent, roughly four times that of an untargeted display ad although not as good as targeted email campaigns (about 3 percent), or Google Search ads (about 2 percent). All of the very large Internet consumer firms, including Amazon, Alphabet’s Google, Microsoft, Alibaba, Tencent, Netflix, and Baidu, use similar ML algorithms. Obviously, no human or group