Samenvatting Digital Organisation Chapter 1: Information Systems in Global Business Today 1 Opening case: Premier League: The Power of IT Analytics Well known football clubs have a large budget to spend on their players or IT, less known clubs have to come through with a smaller budget. Nevertheless, in 2016, a smaller club has won the Premier League because of the usage of Big Data to improve their revenue and player training. Illustrates why information systems are so essential today. 2. Opening case: smart stores reinvent the retail space Door nieuwe slimme camera’s moeten klanten in een winkel niet meer wachten bij de kassa. Deze camera’s doen aan gezichtsherkenning maar ook aan productherkenning. Hierdoor gaat het sneller voor de klant maar is het ook voordelig voor de winkel door de besparing van arbeidskosten. 3. How are information systems transforming business, and why are they so essential for running and managing a business today? o o o o o o An increased IT-related spending: from 21% up to 33% of the total investment - Hardware, software, and telecommunications equipment - Consulting services: to help their employees with the implementation of IT Smartphones and other mobile devices Widespread access to the internet: ex. a smart refrigerator Online social networks: ex. costumer reviews on Yelp, Google Laws requiring organizations to store digital records (GDPR) Change management: Een vorm van management die zich in het bijzonder bezighoudt met het veranderen van de structuur en/of de werkwijze van een organisatie. The Gartner Hype Cycle can be used to identify interesting technologies that can be used in an organisation. It shows the maturity and the adoption of these technologies. Digital technologies move through 5 stages: 1) innovation trigger: a lot of media interest but it is not really usable yet 2) peak of inflated expectations: there are some success stories 3) trough of disillusionment: more and more failures 4) slope of enlightenment: a better understanding of the benefits that the technology could offer to an organisation 5) plateau of productivity: the product will be adopted 2.1 What is new in Management Information Systems o IT innovations - Cloud computing: buy a subscription to have infrastructure (you don’t have to own the hardware). Ex. Office 365 - Big data and the Internet of Things - AI and machine learning o New business models - Online video streaming services for ex. Netflix instead of Telenet or other on-demand e-commerce services o E-commerce expanding - Selling physical products (Zalando) - Selling services (Netflix, Spotify) - Selling both (Amazon) o Management changes - Managers use social networks, collaboration tools - Virtual meetings o Changes in firms and organizations - More collaborative and teamwork between IT-teams and businesspeople, less emphasis on hierarchy - Higher-speed and more accurate decision making based on data and analysis - More willingness to interact with consumers through social media - Better understanding of the importance of IT: new employees are used to working with technology These digital organizations lead to a globalization with challenges and opportunities. Internet and global communications have changed how and where business is done: o o o o o Drastic reduction of costs of operating and transacting on global scale. Ex. outsourcing from another, less expensive, county the wages are lower less costs Competition for jobs, markets, resources, ideas. Ex. outsourcing more competition from all over the world Growing interdependence of global economies: more import and export Requires new understandings of skills, markets, opportunities to distinguish yourself from other, cheaper, workers Information systems enable globalization of commerce Because of the impact of IT on organizations, there are more and more digital firms. A digital firm is a firm where: o o o Significant business relationships (relationships with customers, suppliers, employees) are digitally enabled and mediated Core business processes are accomplished through digital networks Key corporate assets are managed digitally. KCP = human assets such as employees, financial assets, … These digital firms offer greater flexibility in organization and management for ex. time shifting and space shifting (working from anywhere, anytime). 2.2 Strategic Business Objectives of Information Systems There is a growing interdependence between: o The ability to use information technology (information systems) o The ability to implement corporate strategies and achieve corporate goals (organization) Firms invest heavily in information systems to achieve six strategic business objectives: 1. Operational excellence 4. Improved decision making 2. New products, services, and business models 5. Competitive advantage 3. Customer and supplier intimacy 6. Survival 2.2.1 Operational excellence Improve the efficiency of operations to achieve higher profitability. Information systems and technologies help improve this efficiency and productivity which in the end will save you a lot of money. When these new technologies are coupled with changes in the behaviour of employees or the strategy of the organization, it will be even more efficient. Ex. Walmart is the most efficient retailer; Colruyt has ‘ugly’ stores, but they can guarantee a lowcost supermarket; Ikea saves a lot of money by having the costumers assemble their own furniture. 2.2.2 New products, services, and business models Information systems and technology a major enabling tool for new products, services, and business models. A business model is how a company produces, delivers, and sells its products and services. Ex. Uber is a taxi company but it does not need to buy taxis or drivers, because it links already existing drivers with their own cars to a customer. This is a different business model than a taxi company. 2.2.3 Customer and supplier intimacy o Customer intimacy: if a customer is treated well, he/ she will come back another time. Ex. High-end hotels that use computers to track customer preferences (room temperature, light settings) and then customize the room for each costumer. o Supplier intimacy: building a close relationship with your suppliers to minimize your costs Example: Just-in-time (JIT) manufacturing 2.2.4 Improved decision making Managers can’t always make the best decisions without accurate information. They have to make forecasts, guesses which can lead to over- or underproduction, a misallocation of resources or poor response times. Technology or information systems can help them by enabling informed decision-making. This allows managers to have the right information at the right time (real-time data). Ex. Verizon’s web-based digital dashboard to provide managers with real-time data (customer complaints, network performance, line outages, …) 2.2.5 Competitive advantage All these strategic business objectives could lead to a competitive advantage. This means that your company is better at something than your competitors. This can be achieved through: - Delivering better performance - Charging less for superior products - Responding to customers and suppliers in real-time Ex. UPS, Walmart 2.2.6 Survival Businesses may need to invest in information systems out of necessity, just because their competitors have a technological advantage and your customers expect the same. Ex. Citibank’s introduction of ATMs. Another reason why companies need to invest in technology are federal and state regulations and reporting requirements. Ex. the Sarbanes-Oxley Act that requires companies to keep all emails for five years, this requires a certain technology. 2 3.1 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? What is an Information System (IS)? An Information system (IS) is a: o Set of interrelated components o That will collect, process, store and distribute information o And also support decision making and control There is a difference between information and data: o Data are streams of raw facts o Information is data shaped into meaningful, useful form information adds a meaning to data It is necessary that organizations use their data correctly to create information translates data into information. An Information System can be used for this. How does it work? Activities in an information system that produce information organizational decision-makers need: o Input: captures raw data o Processing: converts raw data into meaningful form (information) o Output: transfers processed information to support decision-making o Feedback: output returned to appropriate members of the organization to help them evaluate or correct the input stage There is a difference between a computer program and an Information System. Computers and software are the technical foundation, but they have to be tailored to a specific organization in order to become an Information System. In this course, we will assume three dimensions of IS. 3.2 The three dimensions of Information Systems 3.2.1 Organizations o Senior Management: makes strategic decisions about products and services to ensure firm performance o Middle Management: carries out the plans of senior management o Operational Management: responsible for monitoring daily activities The Information System has to help one of these three levels. These factors need to be taken into account when designing an Information System: o Different business functions in which the technology will be used: - Sales and marketing - Human resources - Finance and accounting - Manufacturing and production The IS will be used to optimize each business function but also to make them all work together better o Unique business processes: ex. fulfilling an order, enrolling a student, … The IS will automate part of/ the entire business process o Unique business culture the IS has to support the business culture o Organizational politics: there are a lot of different jobs and functions in an organization who pursue their own interests 3.2.2 Management Managers have an important role in an organization: o They sense business challenges and opportunities in the environment: “what are the opportunities?” o They set organizational strategy in response: “what is our strategy?” o They allocate resources to carry out strategy: “how are we going to execute this strategy?” In addition, managers must act creatively: o Creating new products and services o Re-inventing the organization. They have to figure out how to change their organization before it becomes insignificant 3.2.3 Technology o o o o Hardware and software changes very quickly, this is a challenge for organizations Data management technology Network and communication technology (network, internet, intranet, extranet) IT infrastructure: provides platform that system is built on 3.2.4 Example: UPS tracking system 1) Organizational o The UPS tracking system is embedded in the sales and production business functions. o o 2) o o o Business processes related to tracking packages, managing inventory and providing information to customers are all embedded by the UPS tracking system. UPS has a business culture where they put the customer first and deliver real-time information about their packages Management Managers have set the strategy of combining low cost and superior service Allocate resources to carry out this strategy: using an information system to support this Monitoring service levels and costs 3) Technology Handheld computers, bar-code scanners, networks, desktop computers, etc. 3.3 It Isn’t Just Technology: A Business Perspective on Information Systems Investing in information technology does not guarantee good returns. In some cases, it might even be counterproductive such as in the 4th quadrant of the graph below. The factors are: o Adopting the right business model o Investing in complementary assets (organizational and management capital) and not only focusing on the technology 1: less investments, more business value 2: more investments, more business value 3: less investments, less business value 4: more investments, less business value?! blindly investing in technology (no O and M) 3.3.1 Complementary Assets: Organizational and Management capital These are assets required to derive value from a primary investment. Firms supporting technology investments with investment in complementary assets receive superior returns. Complementary assets such as: o Examples of organizational assets - Appropriate business model - Efficient business processes o Examples of managerial assets - Incentives for management innovation - Teamwork and collaborative work environments o Examples of social assets: investments not made by the organization itself (by the government) - The Internet and telecommunications infrastructure - Technology standard Chapter 2: Global E-Business and Collaboration 1 Opening case: Social networking helps Sanofi Pasteur innovate and improve quality Sanofi Pasteur is the vaccine division of the French multinational pharmaceutical company. This leads to multiple problems, such as: o Hierarchical top-down processes: a lot of employees who need to work together o Large geographically dispersed workforce: all around the globe o Lack of collaboration and idea sharing: this is necessary for innovation Therefore, they have created some solutions: o Develop knowledge sharing strategy and goals o Redesign knowledge and collaboration processes o Change organizational culture o Implement Microsoft Yammer collaboration software: kind of a ‘Facebook for businesses’ with groups and a newsfeed improved their performance and enabled knowledge gathering and sharing between employees 2 What are business processes? How are they related to information systems? = Business processes are at the heart of the organization. It is a logically related set of tasks that define how specific business tasks are performed. The total of all business processes is how a business operates. In other words, businesses can be seen as collection of business processes. It may be tied to functional area or be cross-functional. The following order fulfillment process is crossfunctional because it involves 3 functions (sales, accounting, production). The order of these business processes is important. If for ex. they produce an order before the customer credit is checked, it could lead to problems when it appears that they can’t really pay for it. Other examples of functional business processes: Function Business process(es) Manufacturing and production Assembling the product Checking for quality Sales and marketing Identifying customers Finance and accounting Creating financial statements Paying creditors Human resources Hiring employees Business processes may be assets or liabilities: Assets: als door de business processen de organisatie beter en efficiënter te werk gaat. Liabilities: als er chaos veroorzaakt wordt door gebruik te maken van de business processen. 2.1 How Information Technology Improves Business Processes Organisations will start by looking at their business processes, analyzing them and re-engineer them. This is business process reengineering means thinking about how we can change the steps in our process in the way tasks are performed to get some kind of benefit out of it. How? o Increasing efficiency of existing processes - Automating steps that were manual o Enabling entirely new processes - Changing flow of information - Replacing sequential steps with parallel steps - Eliminating delays in decision making - Supporting new business models 2.1.1 Example Ford At first, Ford had over 500 employees to make sure their orders were all checked, and the vendors were being payed correctly. This was a very long process which leaded to a long lead time between order and payment. o Order was made (copy of purchase order) o Products were received (receiving document) o Vendor sent an invoice (invoice) o The vendor was paid after the ‘accounts payable’ had a physical copy of these 3 documents and they checked if everything on these documents matched Obviously, this was a long and complicated process, that could be easily improved by introducing a database in which these 3 documents were stored so that each department (purchasing, receiving and account payable) could access each other’s documents. The business model also changed because they didn’t have to check everything from the other 2 departments. This way, the lead time was reduced drastically, and Ford could reduce their employees by 75%. So, by both introducing this information technology and by changing their business processes, Ford successfully reduced their business processes. 3 How do systems serve the different management groups in a business, and how do systems that link the enterprise improve organizational performance? 3.1 Systems for different management groups (2) o Transaction processing systems (TPS) - Support operational managers who are responsible for daily activities: perform and record daily routine transactions necessary to conduct business. Ex. sales order entry, payroll, shipping. - o Allows managers to monitor status of operations and relations with external environment Systems for business intelligence: transforming data into information that enables managers to make better and smarter decisions (3) - Management information systems - Decision support systems - Executive support systems 3.1.1 Management Information Systems (MIS) o o o o Supports the middle management Used periodically (not daily <-> transaction processing) Provide reports on firm’s current performance, based on data from TPS Provide answers to routine questions with predefined procedure for answering them (ex. questions about trends in sales) 3.1.2 Decision Support Systems (DSS) o Supports the middle management o Support nonroutine decision making (ex. How much do we charge if we want to double our profits? Or what is the impact on production schedule if December sales doubled?) o Use TPS/ MIS data and/ or external information (ex. fluctuating electricity prices) - These DSS may help let the managers handle these external forces o Model driven DSS: ex. Voyage-estimating systems o Data driven DSS: ex. Intrawest’s marketing analysis systems 3.1.3 Executive Support Systems (ESS) o o o o o 3.2 Supports senior management who make strategic and future oriented decisions Support nonroutine decision making (more important than DSS). They require judgment, evaluation, and insight of the senior management (ex. Should we take over another company?) Incorporate data about external events (e.g., new tax laws or competitors) as well as summarized information from internal MIS and DSS All of these systems use each other’s information to create new information. The systems should be linked! The ESS reports should be easy to use so that a senior manager can make decisions quickly ESS provides a ‘digital dashboard’ with real-time view of firm’s financial performance Enterprise Applications These are systems designed to link the enterprise. o Combine different functional areas (sales, production, accounting, HR) o Execute business processes across the firm o Include all levels of management o Four major applications (4) - Enterprise systems - Supply chain management systems Customer relationship management systems - Knowledge management systems 3.2.1 Enterprise Systems (ERP) o o o o o Also called enterprise resource planning (ERP) systems Integrate data from key business processes into single system Speed communication of information throughout firm Enable greater flexibility in responding to customer requests, greater accuracy in order fulfilment Enable managers to assemble overall view of operations 3.2.2 Supply Chain Management Systems (SCM) o o o o Manage relationships with suppliers, purchasing firms, distributors, and logistics companies. Manage shared information about orders, production, inventory levels, … Goal = move correct amount of product from source to point of consumption as quickly as possible and at lowest cost Interorganizational system: automating flow of information across different organizations this means that you should also know the business process of your suppliers, etc. can be used to enhance supplier intimacy 3.2.3 Customer Relationship Management Systems (CRM) CRM Systems help manage relationship with customers and coordinate the business processes that deal with customers in sales, marketing, and customer service. o Goals: - Optimize revenue - Improve customer satisfaction and retention - Identify and retain most profitable customers; see which customers aren’t profitable and maybe invest less in these groups - Increase in sales 3.2.4 Knowledge Management Systems (KMS) This is used by organizations to let their employees learn new things. Ex. a webinar on how to treat your customers and their data. They collect the relevant knowledge and make it available wherever needed in the enterprise to improve business processes and management decisions. 3.3 Intranets and Extranets These are some sort of internet-protected websites. Intranets are designed for internal employees extranets are designed for other people. They are technology platforms that increase integration and expedite the flow of information. 3.4 E-Business, E-Commerce, and E-Government o E-business: use of digital technology and Internet to drive major business processes o E-commerce: part of e-Business focusing on buying and selling goods and services through Internet E-government: using Internet to deliver information and services to citizens, employees, and businesses o 4 4.1 Why are systems for collaboration and social business so important, and what technologies do they use? o Sharp: een Japanse multinational die eerst aan top down decision making deed (De leiders maakten eerst de beslissingen en de werknemers moesten dit gewoon uitvoeren) maar nu meer en meer belang hecht aan two-way dialogue (Nu is er veel meer dialoog tussen werkgever en werknemer bij het nemen van beslissingen). Functionalities: Create groups to collaborate on projects Share and edit documents Company news feed People directory Business benefits: Improved information flow More engaged employees Breeding ground for innovation Change in corporate culture What is Collaboration? There is a growing importance of collaboration within organizations (between employees) but also between employees and their suppliers, customers, distributors, … Why? o Changing nature of work: the jobs that need to be done require more and more teamwork o Growth of professional work “interaction jobs”: more and more jobs require interaction with co-workers or externals for feedback, share information o Changing organization of the firm: less hierarchical, flatter organizational structure o Changing scope of the firm: everything is becoming global o Emphasis on innovation to stay relevant and competitive (innovation comes from collaboration) o Changing culture of work: teams will produce a better output than individuals 4.2 What is Social Business? Collaboration is important with employees, but also with customers and suppliers. This is social business. It’s the use of social networking platforms (internal and external) to engage employees, customers, and suppliers. Ex. Instagram, Facebook, LinkedIn o Aims to deepen interactions and expedite information sharing o “Conversations” to strengthen bonds with customers. Ex. COS posts pictures of their costumers wearing their clothes strengthen the relationship between brand and clients o Seen as way to drive operational efficiency, spur innovation, accelerate decision making Business benefits of collaboration and teamwork: o Investment in collaboration technology can return large rewards, especially in sales and marketing, research and development o Productivity: share knowledge and resolve problems o Quality: faster resolution of quality issues o Innovation: more ideas for products and services o Customer service: complaints handled more rapidly o Financial performance: generated by improvements in factors above When will collaboration result in firm performance? o Collaboration capability: flattened organizational structure o Collaboration technology lead to collaboration quality lead to firm performance Collaboration is not something that just happens, you need to nurture it to design your organization to support collaboration. A key ingredient is a collaborative business culture: o Senior managers rely on teams of employees o Policies, products, designs, processes, and systems rely on teams o The managers purpose is to build teams o Collaboration needs to be rewarded, not individuality 4.3 Collaboration technologies o o o o E-mail and instant messaging (IM) Wikis Virtual worlds Collaboration and social business platforms - Virtual meeting systems (Blackboard Collaborate) - Cloud collaboration services (Google Drive, Google Docs, etc.) - Microsoft SharePoint - Enterprise social networking tools (Microsoft Yammer) Managers have to decide which tools they use for collaboration. How do they evaluate and select these collaboration and social software tools? o Six steps in evaluating software tools - Identify your firm’s collaboration challenges - Identify what kinds of solutions are available - Analyse available products’ cost and benefits - Evaluate security risks - Consult users for implementation and training issues - Evaluate product vendors o Time/space matrix Same place, same time: face-to-face Same place, different time: continuous tasks. Ex. a team room with a whiteboard where you meet at different times Different place, same time: video conferencing or livestreaming Different place, different time: ex. watching a recording of a lesson another time at home 5 What is the role of the information systems function in a business? The Information Systems Department consists of: o Often headed by chief information officer (CIO) - Other senior positions include chief security officer (CSO), chief knowledge officer (CKO), chief privacy officer (CPO), chief data officer (CDO) o Programmers o Systems analysts: identify what the Information Systems should be doing o Information systems managers o End users: should be included in the implementation of the Information Systems IT governance is a way of thinking about how the IT investments can result in business value. o Strategies and policies for using IT in the organization o Decision rights and accountability - Who makes what decisions? - Who is accountable when something goes wrong? o Structures, processes and relational mechanisms - We need structures to make sure business value is coming from these IT investments. Ex. interdisciplinary team where business and IT are working together - Processes: how are decisions made - Relational mechanisms: making sure business and IT understand each other Chapter 3: Information Systems, Organizations, and Strategy 1 Which features of organizations do managers need to know about to build and use information systems successfully? 1.1 Organizations Information technology and organizations influence each other: o Structure o Business processes o Politics o Culture o Environment o Management decisions What are organizations? 1) A technical definitions very mechanical o Formal social structure that processes resources from environment to produce outputs o A formal legal entity with internal rules and procedures, as well as a social structure 2) A behavioural definition harder to change o A collection of rights, privileges, obligations, and responsibilities that is delicately balanced over a period of time through conflict and conflict resolution. Focus is more on relationships, values and people. 1.2 Features of organizations o o o o o o o Use of hierarchical structure: each person is accountable for their own tasks - Accountability, authority in system of impartial decision-making Adherence to principle of efficiency Routines and business processes Organizational politics Organizational culture Organizational environments Organizational structures 1.2.1 Routines and business processes Organizations is a collection of business processes which also consists of collections routines or standard operating procedures. These are precise rules, procedures, and practices developed to cope with virtually all expected situations. o Business processes: collections of routines o Business firm: collection of business processes When implementing new Information Systems, they will impact all these routines and therefore also the business processes. 1.2.2 Organizational politics Each employee who works at an organization might have their own individual goals and this can lead to political struggle, competition, and conflict. This political resistance greatly hampers organizational change. When implementing new Information Systems, employees might be resistant to this change. 1.2.3 Organizational culture Contains a set of assumptions that define goal and product of an organization: o What products the organization should produce o How and where it should be produced o For whom the products should be produced May be powerful unifying force as well as restraint on change withing Information Systems. 1.2.4 Organizational environments Organizations and environments have a reciprocal relationship (they influence each other): o Organizations are open to, and dependent on, the social and physical environment: they need employees coming from the environment o Organizations can influence their environments. Ex. through advertising Environments generally change faster than organizations. If organizations can’t cope with these changes fast enough, it is called inertia. What causes this inertia? Politics, culture, … Therefore, organizations should frequently scan the environmental and search for external changes that may require an organizational response. 1.2.4.1 Disruptive technologies Technology that brings significant change to businesses, industries, markets. o Ex. PC’s, smartphones, Big Data, artificial intelligence, the Internet As an organization, you have to be a first mover or a fast follower when it comes to these disruptive technologies: o First movers: inventors of disruptive technologies. Ex. Citibank was the first bank in New York that created the ATM’s o Fast followers: firms with the size and resources to capitalize on that technology o Slower followers might get into trouble and lose their clients to the other 2 groups 1.2.5 Organizational structures There are 5 basic kinds of organizational structure (Mintzberg): o Entrepreneurial: young and flat organizations; typically start-ups o Machine bureaucracy: very centralized, large bureaucracies. Ex. manufacturing companies focused on a small set of products o Divisionalized bureaucracy: has multiple business units. ex. manufacturing companies with different type of products 15 o o Professional bureaucracy: a central decision making but the quality of the products depend on the employees. Typically, organizations that are built on expertise or specific employees, ex. hospitals. Adhocracy: multidisciplinary teams who work together for a short period of time changes a lot. Ex. a consulting firm Information system often reflects organizational structure. 2 What is the impact of information systems on organizations? 2.1 Economic impact Can be seen through 2 theories: transaction cost theory and the agency cost theory. 2.1.1 Transaction cost theory Firms want to minimize their transaction costs (costs of participating in markets). This can lead to vertical integration where organizations controls the entire supply chain, hiring more employees, buying suppliers and distributors. But IT can lower these transaction costs, making it worthwhile for firms to transact with other firms rather than grow the number of employees. o Ex. Communicating with suppliers (SCM systems), outsourcing (communication technologies). 2.1.2 Agency cost theory A principal (owner) employs agents (employees) to perform work. The agents need to be supervised to make sure that they act in the principal’s interest, instead of their own. when a firm grows, the agency costs (costs related to managing/supervising employees) also grows. But IT can reduce agency costs, making it possible for firms to grow without adding to the costs of supervising, and without adding employees. Werknemers mogen hun eigen persoonlijke doelen hebben die ze nastreven binnen een bedrijf maar de manager moet ervoor zorgen dat deze persoonlijke doelen in lijn liggen met de doelen van het bedrijf. 2.2 Organizational and behavioural impact o o IT flattens organizations - Decision making is pushed to lower levels - Fewer managers are needed: IT enables faster decision making (right information at the right time) and increases span of control Post-industrial organizations: - Organizations flatten because in post-industrial societies, the focus is more on knowledge and competence rather than formal positions 2.2.1 Understanding organizational resistance to change Information systems potentially change an organization’s structure, culture, politics, and work. The most important reason of failure of Information Systems is resistance to change. This is why a lot of consulting firms focus on change management within organizations. What is change management? Involving your stakeholder early on in the process of implementing a new IS; involving end-users in the beginning of this process and allowing them to give feedback. 2.3 The Internet and Organizations o o 2.4 What do we need to take into account when implementing a new IS? o o o o o o 3 3.1 The Internet increases the accessibility, storage, and distribution of information and knowledge for organizations The Internet can greatly lower transaction and agency costs - Ex. a large firm delivers internal manuals to employees via a corporate website, saving millions of dollars in distribution costs. Instead of printing and posting them, they could just find it on the website. Environment Structure: hierarchy, specialization, routines, business processes Culture and politics Type of organization (family-owned or not) and style of leadership Main interest groups affected by system (suppliers, customers); attitudes of end users Tasks, decisions, and business processes the system will assist How do Porter’s competitive forces model, the value chain model, synergies, core competencies, and network economics help companies develop competitive strategies using information systems? Porter’s Competitive Forces Model (5) There are five competitive forces that shape the strategic position of a firm Your competitors are in the same industry and experience the same other 4 forces as you do, so you are in the same ‘circle’. 1) Traditional direct competitors: - want to steal your customers by creating new products and services. 2) New market entrants: - Some industries have high barriers to entry (capital costs, required expertise): higher barriers, less market entrants - New companies have new equipment, younger workers, but little brand recognition 3) Substitute products and services: - substitutes customers might use if your prices become too high. Not exactly the same product, but fulfill the same needs (Spotify and Apple Music) more substitutes weaken your strategic position 4) Customers: - Can customers easily switch to competitor's products? Can they force businesses to compete on price alone in transparent marketplace? (more price transparency -> the customers bargaining power is higher) 5) Suppliers: - related to the number of suppliers a firm has. If there are a lot of suppliers available in the market, then the supplier’s bargaining power is lower 3.1.1 Information Systems for dealing with competitive forces (4) o o o o Low-cost leadership: produce products and services at a lower price than competitors (Walmart’s efficient customer response system) Product differentiation - Enable new products or services, greatly change customer convenience and experience (Apple) - Mass customization: ex. Nike can customize each sneaker Focus on market niche: use information systems to enable a focused strategy on a single market niche; specialize (Hilton Hotels’ OnQ system) Strengthen customer and supplier intimacy - Use information systems to develop strong ties and loyalty with customers and suppliers - Increase switching costs Ex. Amazon recommends other books after you purchased one, after a while the recommendations are really interesting and the switching cost to another supplier becomes higher 3.1.2 The Internet’s impact on competitive forces The Internet is either a threat to some industries or can lead a transformation. Competitive Force Substitute products or services Customers’ bargaining power Suppliers’ bargaining power Threat of new entrants Rivalry among existing competitors Impact of the Internet Enables new substitutes to emerge (Wikipedia competes with printed encyclopaedia) Customers can quickly compare prices, increasing their bargaining power Internet lowers suppliers’ bargaining power Internet reduces barriers to entry, increasing the threat of new entry Widens geographic market, increasing the number of competitors Internet of Things (IoT) also has an impact on these competitive forces. Smart products such as fitness equipment or health trackers gather information from their customers and raise the switching costs. o Ex. a smartwatch that tracks your runs: you are likely to keep using this watch because it already has all your data from before and buying another brand means losing this data. Impact IoT: o Increasing rivalry between competitors: it is ‘easy’ to make smart products o Raise switching costs o Inhibit new entrants: it is difficult for new firms to gain new customers o May decrease power of suppliers 3.2 The Business Value Chain Model Views the firm as a series of activities that add value to products or services. We have 2 different kinds of activities: o o Primary activities: directly related to production and distribution of the products or services (manufacturing) Support activities: make the primary activities possible (HR, administration) At each stage, you evaluate whether or not this contributes to your competitive advantage and whether you could use Information Systems to create a competitive advantage in this specific activity. You determine how Information Systems can improve operational efficiency and improve customer and supplier intimacy. The different activities are linked and therefore, their different Information Systems can use each other’s data. The top arrow represents a value chain of an individual company; the bottom arrow is the industry value chain, where each particle has its own firm value chain. 3.2.1 The Value Web As an individual firm, you are part of this industry value chain. This industry value chain is sequential and every organization in this chain changes very fast. The Value Web is something non-sequential to adapt quickly to a changing environment. It is some kind of network system where suppliers, firms and customers work together and can more easily respond to changes in the market. o o o o Value web: a highly synchronized industry value chain Collection of independent firms using highly synchronized IT to coordinate value chains to produce product or service collectively More customer driven, less linear operation than traditional value chain Synchronizes business processes of value partners 3.2.2 Synergies Refers to benefits that an organization expects to realize when it merges with or acquires another organization. o Ex. Google purchased YouTube and now there are Google video ads on YT; when you Google something, a lot of YouTube clips show up in the search results. When merging with another company, there could be problems with separately operating units. The role of Information Systems is coordinating these operations of the separate units so that they can act as a whole. This is very complex. 3.2.3 Core Competencies Each organization has their own activity and core competencies for which this firm is a world-class leader. This relies on knowledge, experience, and sharing this across business units. o Ex. Ford’s core competencies are manufacturing vehicles. When they started working together with UPS (which core competencies are delivering products), they saved a lot on money on vehicle inventory and inventory carrying cost. UPS has a web-enabled system that helps them with their core competencies. IS can help organizations work together with other organizations and let them focus themselves on their core competencies. 3.2.4 Network-Based Strategies Take advantage of firm’s abilities to network with one another. Include use of: o Network economics o Virtual company model o Business ecosystems 3.2.4.1 Network economics o The marginal cost of adding new participant almost zero, with much greater marginal gain o When the economic value being produced depends on the number of people using a product or service o IS can be used to build and maintain the network/community - Ex. the more people join eBay, the more interesting in becomes. When there are only 2 people on eBay and the first person sells a car and the second person wants to buy a bike, it is not interesting. 3.2.4.2 Virtual company model A virtual company: o Uses networks (private extranet) to work together with other companies o Creates and distributes products without being limited by traditional organizational boundaries or physical locations: they do not own factories or machinery, but they manage multiple organizations that do own factories or machinery Ex. Li & Fung: o Manages production, shipment of garments for major fashion companies o Does not own fabrics, factories, or machines o Outsources all work to thousands of suppliers 3.2.4.3 Business ecosystems and Platforms o Instead of participating in a single industry, some firms participate in industry sets (so collections of industries that provide related products or services) o One or a few keystone firms that create platforms (ex. Microsoft and Facebook) o Ex. Mobile internet platform: - Device makers (Apple, Samsung, Huawei) - Wireless telecommunication firms (Proximus, Orange) - Independent software applications providers: they create apps - Internet service providers (Proximus) These are 4 different industries that are working together The difference between the Value Webs and these Business Ecosystems is that these Business Ecosystems cross industry boundaries while the Value Webs typically stay within these industry boundaries. They're both about collaboration between firms about searching for synergies. 4 What are the challenges posed by strategic information systems, and how should they be addressed? o o o Sustaining competitive advantage is far more difficult than actually creating this advantage - Competitors can copy strategic systems - Systems may even become tools for survival Aligning IT with business objectives (it is all about how you use IT to support your business objectives) - First step is performing strategic systems analysis (Porter, Value Chain) Structure of industry Firm value chains Managing strategic transitions - Adopting strategic systems requires changes in business goals, relationships with customers and suppliers, and business processes Chapter 8: Securing Information Systems 1 Why are information systems vulnerable to destruction, error, and abuse? 1.1 Why systems are vulnerable? There is a difference between IS Security and Controls: o IS Security is the prevention of unauthorized access, alteration, theft, or physical damage to information systems. o Controls are the methods and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards. How you can ensure your Information Systems are safe. Main categories of threats to Information Systems (6): o Network of systems provides multiple access points to which hackers can enter the system o Hardware problems: server breaking down o Software problems: programming errors, unauthorized changes o Power failures, natural disasters: earthquakes o Use of networks/computers outside of firm’s control: using your company computer for personal reasons that are not congruent with the companies’ security policy o Loss and theft of portable devices When organizations work with other organizations, they have to make sure those other firms also think about their security because it can also harm you when they get hacked for example. 1.2 Internet vulnerabilities o o o o 1.3 Large public network open to anyone and the large number of Internet users means abuses can have wide impact Information systems connected to the Internet are vulnerable for external attacks Unencrypted VOIP (voice-over IP): hackers can intercept your voice conversations E-mail, instant messaging can be leaked Wireless Security Challenges Bluetooth and Wi-Fi networks are susceptible to sniffing. Sniffing means monitoring the network traffic. How does this work? o Hackers can pick up SSIDs (service set identifiers) from different users with their sniffer programs and try to infiltrate this network. 22 o o War driving: a hacker can drive by buildings or park outside and try to detect their SSIDs to intercept wireless network traffic. Once access point is breached, the intruder can gain access to networked drives and files. A hacker can create ‘rogue access points’ to which unsuspecting users connect, making their username and password visible to the intruders What do these hackers do after accessing your network? (7) o Use malware (malicious software) that harms your Information Systems (3): - Viruses: malicious code attached to a host file, reproduces itself - Worms: spread from system to system without host file (autonomously). It works without human interaction, so it works a lot faster than viruses - Trojan Horses: a way for a virus to enter the system o Worms and viruses spread by downloads and drive-by downloads, E-mail, IM (instant messaging) attachments o Mobile device malware o Social network malware o SQL injection attacks: technique used to try gain unauthorized access to databases underlying websites (steal usernames and passwords used on a website) o Ransomware: hackers break into your computer, encrypt your files and request payment for decrypting o Spyware that monitors web-surfing by key loggers that record every keystroke made on a computer 1.4 Hackers and computer crime Hackers and crackers both intend to gain unauthorized access to a system, but crackers have some sort of criminal intent. Certified Ethical Hacker (CEH) are ‘good’ hackers. They are hired by organizations to search for flaws in their computer systems. What kind of techniques do these hackers do? (5) o Spoofing and sniffing - Spoofing: re-directing to a fake website that looks like the real one. Ex. a fake site of ING to gather your financial data. - Sniffing: monitoring network traffic o Denial-of-service attacks (DoS): this is a way of flooding a server with many false service requests in order to crash their server or network. - Distributed Denial-of-Service (DDoS): attack the server from various computers simultaneously - DDoS attack can be performed by botnet: many infected PCs (without owner’s knowing) o Identity theft: obtaining key pieces of personal information to impersonate someone else (ex. credit card information) - Phishing: spoofing to obtain confidential data - Evil twins: rogue Wi-Fi networks posing as legitimate. Ex. when you are at a café, use ‘their’ (but actually a false) Wi-Fi-network, they can gather your passwords, etc 23 o o 1.5 Pharming: redirect a website's traffic to a rogue server: kind of like phishing but phishing uses a false website and pharming uses a real website, but a bad server. Click fraud: pay-per-click advertising: use techniques to click competitor’s ads frequently, thereby increasing their marketing costs Cyberwarfare: state-sponsored activities to attack computers and networks of other states. Ex. Stuxnet that the US used to damage the nuclear programs of Iran Internal threats: employees Sometimes, the biggest threat to an organization aren’t hackers but their own employees internal threat. This is because they lack the knowledge of security and might let others use their passwords, or login on multiple uncontrolled devices. Social engineering is when attackers might trick employees in sharing their passwords by pretending to be colleagues from internal IT helpdesk. 1.6 Software vulnerability (5) Not only networks, but also the software itself, are vulnerable. Commercial software contains defects (bugs) that create security vulnerabilities: o Software without defects cannot be achieved because complete testing is not possible with large programs o Flaws can open networks to intruders o Zero-day vulnerabilities: found by hackers, unknown to the creator sold on the dark-web Patches are small pieces of software to repair these flaws o As an organization, it is better to wait a while before purchasing a new software so that most potential bugs are already solved 2 What is the business value of security and control? Failed computer systems can lead to significant or total loss of business function (“downtime”). o Ex. when Blackboard crashes, then the University’s business processes (teaching classes) is discontinued. Firms now are more vulnerable than ever because they capture a lot of confidential, personal and financial data; but also trade secrets, new products, strategies. A security breach may negatively affect a firm’s market value almost immediately. Inadequate security and controls also bring forth issues of liability. Companies can be sued for not taking appropriate protective action to prevent loss of confidential information. Legal and regulatory requirements for firms (3): o HIPAA - Medical security and privacy rules and procedures o Gramm-Leach-Bliley Act - Requires financial institutions to ensure the security and confidentiality of customer data o Sarbanes-Oxley Act - Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally When you are sued, electronic evidence can be crucial. o Legal cases increasingly rely on evidence represented as digital data o Proper control of data can save time and money when responding to legal discovery request Computer forensics are: o Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law o Recovery of ambient data: recovers deleted data 3 What are the components of an organizational framework for security and control? How can an organization help prevent these security breach problems? Information System Controls, Risk Assessment and a Security Policy. 3.1 Information System Controls May be automated or manual (ex. making sure the physical servers are okay and no non-authorized personnel can reach them). o General controls: apply to all computerized applications - Software controls, hardware controls, computer operations controls, data security controls, system development controls, administrative controls, o Application controls: unique to a computerized application - Input controls, processing controls, output controls 3.2 Risk Assessment An organization should determine various level of risk if specific activity or process is not properly controlled. These risks are estimated by the likelihood that the event happens and the impact if it happens. Example: Exposure Probability of Loss Range (average) Expected Annual Loss Occurrence ($) ($) Power failure 30% $5,000 − $200,000 $30,750 ($102,500) Embezzlement 5% $1,000 − $50,000 $1,275 ($25,500) User error 98% $200 − $40,000 $19,698 ($20,100) In de eerste kolom zie je de “risk”, in de 2de kolom de “likelihood” en in de 3de kolom staat de “impact” You can see that the likelihood of a user error is much greater than power failure, but the impact of a power failure is bigger than a user error. Combined, the expected annual loss of a power failure is way higher. 3.3 Security Policy The security policy states your security goals and mechanisms for achieving these goals. A manager should think about their assets and the costs if these assets are breached; the costs and benefits of the security systems and the maximal level of risk that the organization is willing to take. o o 3.4 Drives other policies - Ex. Acceptable use policy (AUP): defines acceptable uses of firm’s information resources and computing equipment, and consequences of noncompliance Identity management: defining different types of users and the access rights for each user Disaster Recovery Planning and Business Continuity Planning Thinking about what an organization should do in case of a disaster (power outage, earthquake). (2) o Disaster recovery planning: focuses on restoring IT-operations after disaster o Business continuity planning: focuses on restoring business operations after disaster Both types of plans needed to identify firm’s most critical systems. A manager needs to do a business impact analysis to determine impact of an outage on the business and then determine which systems should be restored first. 3.5 Role of Auditing Information systems audit is checking the 3 types of controls. It examines a firm’s overall security environment as well as controls governing individual information systems. Security audits (3) o Audit security effectiveness o Review technologies, procedures, documentation, training, and personnel o May even simulate disaster to test responses Auditors list and rank control weaknesses and the probability of occurrence but also assess financial and organizational impact of each threat. 4 What are the most important tools and technologies for safeguarding information resources? 4.1 Tools and technologies for safeguarding Information Systems (6) o o o Identity management software - Automates keeping track of all system users and controlling their access - Users can have different access rights at different systems Authentication: password systems, tokens, smart cards, biometric authentication (irises, fingerprint, face), two-factor authentication Firewall - Combination of hardware and software that prevents unauthorized users from accessing private networks - Controls flow of incoming and outgoing network traffic - Acts like a “gatekeeper” that checks each user’s credentials before granting access to the network (identify IP address) o o o 4.2 Intrusion detection system - Monitor vulnerable spots on networks and identify suspicious behaviour (unauthorized access) --> Alert, or even shut down (part of) network, in case of unauthorized traffic Antivirus and antispyware software - Prevents, detects, and removes malware from computers - Requires continual updating to remain effective Unified threat management (UTM) systems - Comprehensive security management products Encryption and Public Key Infrastructure It is important to encrypt your data. This means transforming data into encrypted data that can only be read by sender and intended receiver. This uses an encryption key, used to encrypt and decrypt. Two methods: o Symmetric key encryption o Sender and receiver use single, shared key exposes the key to outsiders for interception not the safest o Public key encryption o Uses two keys: the receiver has a public key (that is known to everyone) and a private key they are linked, but cannot be derived from each other o Sender encrypts message with recipient’s public key o Recipient decrypts with private key Digital certificate is some sort of digital password that uses a trusted third party, certification authority (CA), to validate a user's identity. Public key infrastructure (PKI) is all about working with these certificate authorities. 4.3 Ensuring System Availability Downtime is the loss of business function after a cyber-attack. In order to avoid this, we can ensure system availability. This is necessary when dealing with online transactions because it requires 100% availability. Fault-tolerant computer systems are used for this. It is a back-up that provides continuous, uninterrupted service and has built-in logic to detect hardware failures and automatically switch to a backup device. You can also outsource your company’s security to another organization whose core competency is security. o Ex. Managed security service providers (MSSPs). 4.4 Security Issues for Cloud Computing and the Mobile Digital Platform Cloud computing: Organizations can store their data in the cloud. But regardless of where the data is stored, it is their responsibility to make sure it is secure. Responsibility for security resides with company owning the data. Mobile devices create their own kind of new security issues. o Ex. in case an employee lost their mobile device you might want to lock it down immediately or erase it. Guest Lecture: KPMG What is Information Security about? (CIA) (EXAMEN) o Confidentiality: protecting information against unauthorized disclosure Have data available to only the people who are authorized to have access to the data Ex. nudes from Sean, Peter and Stan o Integrity: protecting information against unauthorized modification make sure the data is really correct o Availability: ensuring that information remains accessible Ex. ransomware: malware that encrypts your entire system and if you don't pay the ransom you cannot decrypt your files and they are no longer available to you. De uitleg voor de volgende begrippen staat ook in de afbeelding rechts: Threat actors are different people who want to gain access to your systems, steal data, damage, … Hacktivism: ex. Anonymous, Greenpeace The insider: people who got fired that want to expose secrets, … State-sponsored: ex. Rusland, Amerika,... Internet of things: connects everything to the internet IAM: Identity and Access Management o Authentication o Authorisation o You want to secure all your cloud applications in a strong matter. For example, by using multifactor authentication. It exists from 3 parts: (EXAMEN) Something you know: password, username, secret question Something you have: ID-card, smartphone, token (ex. card) Something you are: fingerprint, voice recognition, retina scan How hackers operate (2 soorten): o Classical hacking: trying to breach technical measures that someone takes (antivirus, firewall, multifactor authentication). o Hacking anno 2021: targeting the human factor by convincing them to do something stupid social engineering. HTTP: Als iemand je communicatie kan onderscheppen kan deze persoon je gesprekken meelezen in normale woorden. HTTPS: is veilig Als bestanden eindigen met X (ppt,word,..) dan weet je dat er geen malware in zit (het niet gevaarlijk is) Chapter 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 1 How do enterprise systems help businesses achieve operational excellence? Enterprise Systems are commonly referred to as Enterprise Resource Planning (ERP) systems. It is a cross-functional system used to linking the enterprise (end-to-end). It is important that all the different business functions work together well and have each other’s information. Example: when an order is created by sales and marketing, it is important that operations knows about this order so they can start manufacturing it. Also, outbound logistics should know this so they can start planning the distribution. If there is an increasing amount of orders created by sales and marketing, it might also be interesting for HR to know about it so they can invest in extra personnel. Enterprise systems are all about bridging these communication gaps between these different compartments 1.1 Enterprise Systems o o o 1.2 Set of integrated software modules and one common central database all about data integration Brings together data from all over the firm for use in many internal business activities Information entered in one process is immediately available for other processes can lead to significant increase in operational efficiency. Enterprise Software o o o Collection of integrated software modules (Finance & accounting, sales & marketing, human resources) Built around many predefined business processes that reflect best practices (=a method or technique that has been generally accepted as superior to any alternatives; seems to work well for other organizations) Firms can (2): - Adapt its business processes to the best practices - Customize the software to fit their specific business processes How should an organization decide whether they should adapt their business processes or adapt their software? They decide whether or not a business process delivers a competitive advantage. If a business process doing does not deliver a competitive advantage, the firm might want to adapt it to the software to the best practice. 1.3 2 Business Value of Enterprise Systems o o o Increase operational efficiency operational excellence Provide firm-wide (and real-time) information to improve decision making Enable rapid responses to customer requests for information or products o Include analytical tools to evaluate overall organizational performance and improve decisionmaking in (quasi) real- time How do supply chain management systems coordinate planning, production, and logistics with suppliers? The supply chain is a network of organizations and business processes to move a product from a supplier to a customer. o Procuring materials, transforming these materials into products, and distributing the products (finished goods) to customers o It is a flow of information and can be supported by Information Systems Different elements in the supply chain (3): o Upstream supply chain - Firm’s suppliers, suppliers’ suppliers, processes for managing relationships with them o Downstream supply chain: everything happening towards the customers - Organizations and processes responsible for delivering products to customers distributors and retailers o Internal supply chain - The employees that transform the raw materials, components and services into the actual products Information interesting for the upstream part of the supply chain are: capacity, inventory level, delivery schedule, payment terms. Information interesting for the downstream part of the supply chain are: orders, return requests, repair and service requests, payments. Supply chain management: o o o Inefficiencies in supply chain (ex. part shortage) increases operating costs. These inefficiencies come from un-timely information/ imperfect information. effectively managing supply chain can save you money Just-in-time (JIT) strategy (assumes perfect information) - Components arrive as they are needed - Finished goods shipped directly after leaving assembly line - JIT assumes a low stock at all times This is not realistic; this is why organizations use a safety stock. This is buffer for lack of flexibility in supply chain and takes into account imperfect information o This leads to the bullwhip effect: - Information about product demand gets distorted as it passes from one entity to next across supply chain - A small increase in demand by the customers can lead to a big effect in the upstream part of the supply chain - All caused by the inaccurate information voorbeeld bullwhip effect: If the customers want more of a product, then the retailer will supply just a little more than the anticipated stock (just in case). Distribution will increase the stock just a little more, and as you move further upstream, this will amplify. 2.1 Supply Chain Management Software (2) o o 2.2 Supply chain planning systems - Model existing supply chain - Enable demand planning (generate demand forecasts): guesses of what the demand will be in the future - Optimize sourcing, manufacturing plans - Establish inventory levels - Identify transportation modes Supply chain execution systems - Manage flow of products through distribution centre’s and warehouses - Ensure finished products are delivered to the right locations in the most efficient way Global Supply Chains and the Internet When companies outsource their manufacturing to companies in low wage countries like China, then a lot of participants on the supply chain are working in different regions and time zones. Also, all these different people will have different performance standards or different legal requirements. Global supply chain has some additional complexities. o o Global supply chain issues - Extend across multiple regions and time zones - Participants from different countries Different performance standards Different legal requirements Internet helps manage global complexities - Outsourcing of manufacturing - Warehouse management - Logistics (by monitoring shipments) 2.3 Demand-Driven Supply Chains: From Push to Pull Manufacturing and Efficient Customer Response o o 2.4 Business Value of Supply Chain of these Management Systems o o o o o o 3 Push-based model (“build-to-stock”) traditional supply chain models - Production schedules based on demand forecasts (guesses what the demand will be) - Products are “pushed” to customers Pull-based model (“build-to-order”) - Customer orders trigger events in supply chain - Actual order information drives production schedules - Internet supports this model Ex. Dell does not produce a computer until there is a specific order and then they will build the computer to the customer’s specifications Match supply to demand Reduce inventory levels Improve delivery service Faster product time to market Use assets more effectively: total supply chain costs can be 75% of operating budget managing the supply chain efficiently can really provide great benefits Increase sales How do customer relationship management systems help firms achieve customer intimacy? The goal of CRM is to optimize customer satisfaction and retention, which will optimize revenue and profitability. In order to do so, you really have to know your customers: Who are they? How do we contact them? What kind of products are they interested in? How much business do they generate? In large businesses, this is not as easy because there often are too many customers to know them personally use CRM systems. 3.1 CRM Systems o o o o Capture and integrate customer data from all over the organization. Especially from sales, marketing and service. Consolidate and analyse customer data Distribute customer information to various systems and customer touch points across enterprise Provide single enterprise-wide view of customers customer will feel known and satisfied 3.2 CRM Software (3): o o o Sales force automation (SFA) - Improve productivity of sales staff: focus on the most profitable customers - Sales prospect and contact information - Sales forecasts Customer service: increase efficiency of call centres, help desks and customer support staff; help manage customer service requests Marketing: - Capturing prospect and customer data - Scheduling and tracking direct-marketing mailings or e-mail, support targeted marketing - Cross-selling: marketing of complementary goods (products that most people buy together) This figure shows the response on several promotional campaigns. The response was highest via direct mails and lowers through social media. In the future, they might not use social media for these kinds of promotional campaigns. The CRM Software packages range in size and complexity, normally it is just focused on sales, customer service and marketing, but there are more larger packages such as (2): o Partner relationship management (PRM) - Extend past the borders of a firm to its selling partners - Integrating lead generation, pricing, promotions, order configurations, and availability - Tools to assess partners’ performances o Employee relationship management (ERM) - Focus on how employees perform and interact with customers - Setting objectives, employee performance management, performance-based compensation, employee training 3.3 Operational and Analytical CRM Operational CRM includes everything that a company should provide to their employees who directly interact with customers. Customer-facing applications such as: o Sales force automation o Call centre and customer service support o Marketing automation Analytical CRM is used by managers and decision makers to improve business performance. o Applications that analyse customer data generated by operational CRM applications o Identify buying patterns, create segments for targeted marketing, determine customer profitability o Let the decision makers determine a customer’s lifetime value for the firm 3.4 Business Value of CRM Systems o o o o o o 4 Increased customer satisfaction Reduced direct-marketing costs More effective marketing Lower costs for customer acquisition/retention Increased sales revenue Reduce customer churn - Churn rate is determined by customers who stop using or purchasing products or services from a company. It indicates the decline of firm’s customer base. - Compare with growth rate: churn rate < growth rate -> good What are the challenges that enterprise applications pose, and how are enterprise applications taking advantage of new technologies? 4.1 Challenges o o o o o o 4.2 It is expensive to purchase and time intensive to implement these enterprise applications: multi-million-dollar projects in 2018; long development times (±16 months) Technology changes Business process changes: trade-off between adapting business processes to the software and the other way around Organizational learning, changes: employees need to learn the new activities which are part of the new business processes - Importance of change management! High switching costs, dependence on software vendors - Vender locking: really high switching costs so you are ‘locked’ with one vender Data standardization, management, cleansing New technologies o o o o o Enterprise solutions/suites: make applications more flexible, web-enabled, integrated with other systems Cloud-based versions Functionality for mobile platform Social CRM - Incorporating social networking technologies within these typical CRM systems - Monitor social media activity; social media analytics - Manage social and web-based campaigns Business intelligence - Inclusion of BI with enterprise applications - Flexible reporting, ad hoc analysis, “what-if” scenarios, digital dashboards, data visualization Guest Lecture: AE 1 Introduction Ae betekenis: adapt and enable AE is a business and ICT consulting company that helps other organizations into their digital transformation journeys. They have four business lines: 1) Transformation & innovation: helping other organizations with optimizing and digitizing their business as usual. 2) Software engineering: building software applications for clients. 3) Data intelligence: helping organisations getting info out of their data. 4) Quality and time excellence: we focus on all of the 3 previous business lines on quality and time excellence. Why are we here: provide firm-wide information to improve decision-making. 2 2.1 BAC case BAC context When choosing an Enterprise System, you can choose between buying it or building it. Buy Build + + - Standardization & Less flexibility - Adjust according to More expensive certainty your needs implementation Standardize your processes to fit More uncertainty functionalities - Often lower implementation cost - Can handle complex processes Dagelijks zijn er ongeveer 70 000 passagiers op Brussels Airport. Verschil Brussels airport en Brussels airport company: o Brussels airport company facilitate in airport operations In the case of Brussels Airport Company (BAC), they chose to build an Enterprise System. The goal was to: o Facilitate processes in airport operations: infrastructure, buildings o Provide planning, predict and forecast models Brussels Airport Company has a lot of challenges: o European sky is getting crowded: airport capacity is limited o Complex ecosystems, many partners: require effective collaboration o Weren’t scoring well on passenger happiness (ASQ) How do they want to tackle these challenges? What are their goals? AOP: Airports Operations Plan o Become the n°1 transfer hub in Europe: passengers passing through Brussels Airport o Increase customer satisfaction o Increase control on airport operations o Increase operational efficiency o Boost collaboration between airport community How to reach these goals: o E2E approach o From reactive to pro-active o Insight driven improvement o Work on all levels business, organisation & technology 2.2 Intro: case short connections One of the main functionalities of the AE platform was short connections. A connection is the time you have to wait between the arriving flight, and the departing flight (without leaving the airport). They calculated the available time a passenger has between his two flights and the needed time to go through the airport and catch their flight. 2.3 Short connections approach Five steps: 1) Inside-out: looking at the operations between different parties in the airport and look at the communication between the two parties • Process modelling: Why: to understand the inside-out processes of BAC 2) Outside-in: look at the perspective of the passenger and look at the different steps of their journey 3) Key locations: incoming gate, screening, border control, outgoing gate • Identifying the key locations: Incoming gate Screening Border control Outgoing gate 4) Identify KPI’s (key performance indicators): passenger throughput, waiting times, punctuality of flight 5) Enterprise application: developing the program The program can tell if a certain connection is at risk or not. This means that the timeframe between needed time and available time will be very small so the passenger might miss their flight. If the connection is at risk, the program can provide certain methods for improving this (mitigation actions). For example, just rebooking your flight or maybe opting for a fast-lane ticket that minimizes the waiting line at screening or border control. 2.4 Next steps to improve the passenger experience (5) o o o o o 2.5 Mitigation actions Integration with other applications Focus on waiting times Passengers with reduced mobility (wheelchairs) Bussing Key takeaways An enterprise system: o Can be an enabler to gain insights & to be more proactive o Can help organizations having one single version of the truth o Is not the holy grail. Transformation on business & organizational level is also needed. By centralizing limited amounts of data, you can already create a lot of value on a short amount of time. While the environment of your business changes constantly, your digitalization efforts should also evolve continuously. Chapter 10: E-commerce: Digital Markets, Digital Goods 1 What are the unique features of e-commerce, digital markets, and digital goods? E-Commerce is all digitally-enabled commercial transactions. It has known an exponential growth: current e-commerce growth > offline retail sales growth. Because of Covid-19, E-Commerce has gained even more importance. The new e-commerce is social, mobile, local: o Rapid growth of social media - Social media marketing: towards more communication with customers o Explosive adoption of smartphones o Local merchants are increasingly engaged in e-commerce (Covid- 19) 1.1 Why E-Commerce is different o o o o o Ubiquity (omnipresent): digital markets are available everywhere, all the time Global reach - Commercial transactions can cross geographical (and cultural) boundaries easily - Potential market size for e-commerce roughly equal to the world’s online population Universal standards - Technical standard for conducting e-commerce (i.e., internet) is universal reduced market entry costs to conduct global business (entry barriers): cheaper to enter new markets around the globe because it is done the same way/ according to standards Richness: supports video, audio, and text messages. Ex. when buying something online, the site can add a video on how to use the product. Interactivity o o o 1.2 Allow for two-way communication between merchant and consumer (as opposed to for instance mail ordering). Ex. a chat window on a website Information density - Greater price and cost transparency Ex. comparing prices for the same product on different websites - Merchants can discover much more about consumers (ex. # product page visits) Personalization/customization - Personalized marketing - Recommender systems (based on past purchases). Ex. Zalando recommends products based on your previous purchases. Social technology - Promotes user content generation and social networking. Ex. customer reviews/Q&A between customers - From “one-to-many” to “many-to-many” model of mass- communication One-to-many: the company communicates to their customers Many-to-many: mass communication -> many customers communicate to other customers Key concepts in E-Commerce: Digital Markets and Digital Goods in a global marketplace 1.2.1 Digital Markets Internet and digital markets have changed the way companies conduct business: o Higher information transparency o Lower menu costs, search and transaction costs - Menu costs: costs of changing your prices -> cheaper to change your prices online than in a physical store - Search costs: opportunity cost on time spend on searching - Transaction costs: cost of participating in the market o Dynamic pricing enabled - Based on demand characteristics of the customer - Based on the supply situation of the seller o Switching costs o Delayed gratification: the time between ordering and receiving the product (the shipping) can delay the gratification of using the product o “cutting out the middleman” which leads to a lower price 1.2.2 o Digital Goods Goods that can be delivered over a digital network - Ex. Music, movies, books, magazines - Physical counterparts decline in sales (less DVDs and CDs) o o o o 2 Cost of producing first unit is almost entire cost of product - Marginal cost of extra unit is approximately zero. Ex. when you write a book, it is very easy to make a new copy of that book when using an e-book Costs of delivery over the internet very low Marketing costs remain the same; pricing highly variable Industries with digital goods are undergoing revolutionary changes (publishers, record labels) What are the principal e-commerce business and revenue models? 2.1 Types of E-Commerce Three major types (categorized by nature of participants): o Business-to-consumer (B2C): ex. Zalando o Business-to-business (B2B): ex. Vikingdirect.be (also has a B2C site) o Consumer-to-consumer (C2C): ex. eBay, Vinted Mobile commerce (m-commerce) is a subset of e-commerce (can be B2C, B2B, or C2C) using apps for the E-Commerce. 2.2 E-Commerce Business Models (7) o o o o o o o 2.3 Portal: “entry points” to the web (Google, Bing): they create revenue by selling ads E-tailer: online retail stores (Bol.com) - “bricks-and-clicks”: combine physical store and e-commerce (Vanden Borre, Cool blue) Content provider: provides digital content: offers intellectual property content that users can purchase to use on their digital devices. - Streaming services (Spotify, Netflix) or iTunes Transaction broker: process transactions for customers over internet and saving them time and money by doing so - Financial services (BinckBank) - Travel services (Booking.com) Market creator: provide platform where buyers and sellers can meet (eBay, Vinted, Uber, Airbnb) Service provider: offer services online: e-tailer for services - Ex. Software as a service (SaaS) (Microsoft’s Office 365) or WeTransfer Community provider: provide digital online environment: Social networking: ex. Facebook or Pinterest E-Commerce Revenue Models o Advertising: ex. ads on YouTube o Sales: Selling goods or services o Subscription: Fee for access (Monthly payments): ex. Netflix o Free/Freemium: Offer basic services or content for free, but charge for advanced features: ex. Spotify o Transaction fee: fee for each transaction. Ex. eBay or Vinted o Affiliate: Send visitors to other sites in return for referral fee (Lead-generation fees). Ex. Influencers provide affiliated links to buy a product to their viewers 3 How has e-commerce transformed marketing? o o o o o o 3.1 Internet marketing provides new ways to identify and communicate with customers at a low cost. Long tail marketing: Internet enables inexpensive marketing for niche products. Focus on a small group of people who most likely will be interested in your product instead of spending a lot of money to reach a lot of people. Behavioural targeting: tracking online behaviour of individuals (time spent on a page, what products they viewed, how many clicks) expose them to personalized ads Advertising networks - Track users at all members sites - Database of clickstream behaviour - Create profiles of (potential) customers - Can show you the same personalized ads on different sites Programmatic ad buying - Buy specific targets (users that fit a profile) and show them personalized ads - Increase ad effectiveness (show ads only to the right people at the right time) Native advertising - Placing ads in social network newsfeeds or within traditional editorial content - Appear to be part of the story or the story itself: it looks like a part of the website, but it is an ad Social E-Commerce and Social Network Marketing o o o o o o Social e-commerce based on digital social graph (=the network of people you are connected to on the Internet) - Features of social e-commerce driving its growth (social sign-on, social search (recommendations)) Social sign-on: websites can let their users sign in through their Facebook or Gmail use information for personalized ads Social search: consumers can ask their friends for advice on products by viewing their evaluations Social media is the fastest growing media for branding and marketing Social network marketing - Seeks to leverage individuals’ influence over others - Targeting a social network of people sharing interests and advice Social shopping sites (Pinterest): share shopping ideas with friends Wisdom of crowds - Consult thousands of customers to make better decisions, create new ways to markets, find out how customers feel about your product, … Crowdsourcing: present a problem or opportunity online and let people provide suggestions, advice, or feedback 4 How has e-commerce affected business-to-business (B2B) transactions? 4.1 Electronic Data Interchange (EDI) Businesses can communicate over the Internet through EDI. It is a computer-to-computer exchange of standard transactions such as invoices, purchase orders, … o Major industries have EDI standards that facilitate communication between these businesses - Define structure and information fields of electronic documents o More companies are moving toward web-enabled private networks - Allow them to link to a wider variety of firms than EDI allows - Enable sharing a wider range of information 4.2 New ways of B2B buying and selling o o o 5 Private industrial networks (“private exchange”) Extranet - Large firm using a secure web-based network to link to suppliers, distributors and other key business partners for an efficient supply chain management Net marketplaces (“e-hubs”) - Single digital marketplace for many buyers and sellers not private - May focus on direct or indirect goods - May be vertical or horizontal marketplaces Exchanges net marketplaces for 1 purchase - Independently owned third-party Net marketplaces for spot purchasing What is the role of m-commerce in business, and what are the most important mcommerce applications? M-commerce is the use of mobile devices for E-Commerce transactions. o M-commerce in 2017 is 35% of all e-commerce o Fastest growing form of e-commerce: growing at 20 percent or more per year o Main areas of growth - Mass market retailing (Amazon, eBay) - Sales of digital content (iTunes) - In-app sales to mobile devices - Services (Uber, Airbnb) 5.1 Location-Based services and applications o o o o o Used by 74% of smartphone owners Based on GPS technology Geosocial services: to find out where friends are Geo-advertising: to find out what shops are nearby through location-based ads Geoinformation services: to find out the price of a house for sale you are passing 5.2 Other mobile commerce services o o o 6 Financial account management apps: banks, credit card companies Mobile advertising market - Google and Facebook are largest markets - Ads embedded in games, videos, and mobile apps M-commerce websites and apps (Wish, Zalando, Cool blue, Amazon) - 55% of online retailers have m-commerce websites What issues must be addressed when building an e-commerce presence? o o o Most important management challenges - Developing clear understanding of business objectives: which customers do we want to reach with our e-commerce platform, what products do we want to sell - Knowing how to choose the right technology to achieve those objectives: make sure the platform is easy to use Develop an e-commerce presence map - Four areas: websites, e-mail, social media, offline media Develop a timeline: milestones - Breaking a project into discrete phases (development website, implementation, social media plan, …) Guest lecture: Bol.com 1 The power of platforms In a marketplace, there are a lot of sellers and buyers so that everyone can find exactly what they are looking for. It is an assembly so that every demand can be addressed. VOOR de pandemie hadden we een verwachting van 2.6% groei v.d. offline markt en een groei van 10.4% online (dit was een verwachting voor het jaar 2025). NU zijn de verwachtingen veel hoger. In Azië veranderd de online markt nog een stuk sneller dan in Europa omdat ze verder ontwikkelt zijn in dit technologie. Today, these marketplaces are also online. Ex. Deliveroo, Booking.com and Uber. But these marketplaces also exist for shopping, ex. bol.com, 2dehands.be, Amazon, … Bol.com’s strategy: “Together we can change retail in order to make everyday life easier with local partners.” o Work together with local partners • Het aandeel partners doorheen de jaren is enkel gestegen en dit wordt ook verwacht voor de toekomst (in 2019 waren dit 24 000 partners en in 2021 zijn dit er al 47 000) o Be present locally. Your packages can be delivered at home, but also at your local Albert Heijn or Delhaize. o Speak the local language (difference between Dutch of Belgium and The Netherlands) o Local assortment: put the local partners in the spotlight with their local products. Ex. a cookbook of Jeroen Meus will be more in the spotlight than one of Jamie Oliver. o Local calendar: Belgium and The Netherlands celebrate the holidays a little different. In Belgium, only children receive presents with Sinterklaas while in The Netherlands, both children and adults receive presents. Bol.com is for everybody: both independent entrepreneurs and known brands can sell on bol.com. 2 2.1 How bol.com changes the game (3) Platform development o o o Be available wherever your customer goes Grow your business Reach new customers Een combinatie van bovenstaande 3 zorgt voor het groeien van je merk (onderneming)!! 2.2 Shopper data They use customers data (what they search, how many times they click on a certain product) to optimize how the local partners can reach these customers better. A good title and specifications are more important than a unique description. Also a short delivery times and a Track&Trace can increase customers rating. Bol.com uses customers data to find ‘whitespots’. These are products that customers are looking for but are not finding on the website. These are opportunities that bol.com can utilize. 2.3 Advertising technology Bol.com is the 6th most viewed app in Benelux with over 3,5 million visits daily so it is the perfect base for advertising. Partners can place their products in the spotlight by paying per click. This way, you can extend your reach and choose how much you want to invest in these sponsored products. Cost per click: Click thru rate: 3 Key Takeaways 1) Half of all future purchases will be made through platforms 2) Platforms offer a seamless customer experience 3) Adapting to local customer needs will make the difference 4 Partner: Claudia Lubbersen o o Je kan een dienst of een product verkopen Een partner van bol.com worden is gratis Chapter 11: Managing Knowledge and Artificial Intelligence 1 What is the role of knowledge management systems in business? o o 1.1 Knowledge management systems among fastest growing areas of software investment - It is used to share knowledge throughout the firm Information economy: creating and managing knowledge is major source of business value - 37% of US labour force are knowledge and information workers - 55% of US GDP comes from knowledge and information sectors Important dimensions of knowledge What is knowledge in the context of an organization? o Data, information, knowledge, and wisdom - Data: transactions captured by an organization’s systems - Information: organized data to provide understanding - Knowledge: discover patterns, rules, and applicable contexts - Wisdom: results from applying knowledge in problem-solving o Knowledge can be tacit or explicit - Tacit: resides in the head of employees - Explicit: formally documented o Knowledge can lead to a competitive advantage when the organization has knowledge-based core competencies (=the things the firm does best) o Organizational learning: a process in which organizations gain experience through collection of data, measurement, trial and error, and feedback 1.2 The Knowledge Management Value Chain Knowledge management is a set of business processes developed in an organization to create, store, transfer, and apply knowledge. In order to adequately manage your knowledge, you could consider the knowledge management value chain. o This is the process from creating (or acquiring) to applying knowledge o Each stage adds value to raw data and information as they are transformed into usable knowledge: - Knowledge acquisition - Knowledge storage - Knowledge dissemination/ distribution - Knowledge application 1.2.1 Knowledge acquisition o o o Documenting tacit and explicit knowledge (by storing documents/reports/presentations, developing online expert networks) Creating knowledge (by using data mining techniques on the data) Tracking data from TPS (transaction processing systems) and external sources Ex. a bank. o Documenting the business process of granting someone a loan o Using data of loans that very fully repaid and didn’t get repaid to create a model for granting a loan 1.2.2 Knowledge storage o o Databases Document management systems: documents can be tagged so that they can be easily found by employees 1.2.3 Knowledge dissemination/ distribution o o o Portals, wikis E-mail, instant messaging Search engines, collaboration tools (ex. Microsoft Yammer) 1.2.4 Knowledge application Applying this knowledge to create: o New business practices o New products and services o New markets Knowledge management consists of Information System Activities and Management and Organizational Activities. 1.3 Building Organizational and Management Capital: Collaboration, Communities of Practice, and Office Environments Organizations are developing new organizational roles and responsibilities for the acquisition of knowledge because knowledge is becoming a strategic asset. o Chief knowledge officer executives (CKO): designing methods for the different stages of the Knowledge Management Chain o Dedicated staff / knowledge managers o Communities of practice (COPs) - Informal social networks of professionals and employees - Activities include education, online newsletters, sharing knowledge 1.4 Types of Knowledge Management Systems (3) o o o 2 Enterprise-wide knowledge management systems - General-purpose - Firm-wide - Collect, store, distribute, and apply digital content and knowledge Knowledge work systems (KWS) - Specialized systems built for knowledge workers (engineers, scientists) who are responsible with discovering and creating new knowledge - Ex. computer-aided design (CAD) Intelligent techniques - Diverse group of techniques such as data mining used for various goals: discovering knowledge, distilling knowledge, discovering optimal solutions - Ex. AI and machine learning What are artificial intelligence (AI) and machine learning? How do businesses use AI? 2.1 What is Artificial Intelligence? o o o Systems that take data inputs, process them, and produce outputs (like all software programs) AI programs differ from traditional software programs in the techniques and technologies they use They can perform many complex tasks that would be difficult or impossible for humans to perform more complex systems Examples: Recognize millions of faces in seconds; interpret millions of CT scans in minutes; analyse millions of financial records; detect patterns in very large Big Data databases; improve their performance over time (“learn”); navigate a car in certain limited conditions; respond to questions from humans (natural language); speech activated assistants like Siri, Alexa, and Cortana. Major Types of AI (7): o Expert systems o Machine learning o Neural networks and deep learning networks o Genetic algorithms o Natural language Processing o Computer vision o Robotics 2.2 Capturing Knowledge: Expert Systems o o o o o 2.3 Capture tacit knowledge from an expert and transform it into explicit knowledge that a nonexpert user can use Typically perform limited tasks (ex. diagnosing malfunctioning machine, determining whether to grant credit for loan) Used for highly-structured decision-making: capture knowledge as set of rules, typically IFTHEN-ELSE rules Can be used to support decision making, but do not replace humans Key elements: - Knowledge base: Set of hundreds or thousands of rules (made by humans) - Inference engine: Strategy used to search knowledge base Machine Learning o o o 2.4 How computer programs improve performance without explicit programming. The machine learning software will recognize patterns and relationships in large data sets Ex. Netflix or Amazon recommender systems, identify patterns of fraud for PayPal Two types of learning: - Supervised learning: a human will guide the computer to learn certain things and at some point, the computer will begin to learn on its own system is “trained” by providing specific examples of desired inputs and outputs identified by humans in advance - Unsupervised learning: same procedures, but humans do not feed the system examples system learns on its own Neural Networks o o o Find patterns and relationships in massive amounts of data too complicated for humans to analyse using pattern detection programs a type of machine learning: - Humans “train” network by feeding it data inputs for which outputs are known - “Learn” patterns by searching for relationships, building models, and correcting over and over again Inspired by the structure of the human brain: contains highly interconnected units or nodes Examples: speech recognition, targeted online ads o 3 layers: - Input layer - The hidden layer will construct some kind of logic to interpret the inputs and turn them into outputs. - Output layer 2.5 A deep learning network are multiple neural networks combined. Deep learning algorithm must have more than 3 layers of neural networks. Genetic Algorithms o o Useful for finding optimal solution for specific problem by examining very large number of possible solutions for that problem able to evaluate many solution alternatives quickly Used in optimization problems in which hundreds or thousands of variables exist o Ex. minimization of costs, efficient scheduling 2.6 Natural language processing (NLP) o o o 2.7 Enable computers to understand, and speak in natural language, read natural language and translate. Typically based on machine learning, aided by very large databases of common phrases and sentences in a given language Ex. Google Translate or digital assistants: Siri, Alexa, Cortana, Google Assistant Computer vision o o 2.8 Digital image systems that create a digital map of an image (like a face, or a street sign), and recognize this image in large data bases of images in near real time Examples: - Facebook’s Deep Face can identify friends in photos across their system, and the entire web - Autonomous vehicles can recognize signs, road markers, people, animals, and other vehicles with good reliability - Passport control at airports - Identifying people in crowds Robotics o o o o 2.9 Design, construction, and operation of machines that can substitute for humans in many factory, office, and home applications (home vacuums) Generally programmed to perform specific and detailed actions in limited domains (ex. robots spray paint autos, and assemble certain parts) Can be used in dangerous situations where you don’t want to risk a human life (ex. bomb disposal) Robotics also can be used in a medical context: surgical robots Intelligent Agents o o o Work without direct human intervention to carry out repetitive, predictable tasks for example deleting junk e-mail, finding cheapest airfare Some are capable of self-adjustment using machine learning and NLP. Ex. Siri will adapt to the user’s individual preferences over time Example: chatbots for customer service 3 What types of systems are used for Enterprise-Wide Knowledge Management, and how do they provide value for businesses? There are three major types of knowledge in an enterprise: 1) Structured documents: reports, presentations, formal rules 2) Semi structured documents: e-mails, videos 3) Unstructured, tacit knowledge that resides in the minds of employees And 80% of an organization’s business content is semi structured or unstructured. 3.1 Enterprise Content Management Systems o o o Help organizations manage structured and semi structured knowledge - Help capture, store, retrieve, distribute, preserve documents and semi structured knowledge - Bring in external sources of information (from research) - Tools for communication and collaboration (blogs, enterprise social networking) Key problem: enabling employees to easily find and access the information or knowledge that they need developing taxonomy to easily find documents Digital Asset Management Systems help companies classify, store and distribute digital objects (photographs, video and audio content) These Content Management Systems offer functionalities to locate and share expertise. o They link employees who have tacit knowledge with other employees who need this knowledge o Search tools enable employees to find appropriate expert in a company o Social networking and social business tools for finding knowledge outside the firm 3.2 Learning Management Systems (LMS) o o Provide tools for management, delivery, tracking, and assessment of employee learning and training - Support multiple modes of learning (Web-based classes, online forums, instructional videos) - Automates selection and administration of courses - Assembles and delivers learning content - Measures learning effectiveness Massively open online courses (MOOCs): web course open to large numbers of participants (Microsoft, Coursera) 4 What are the major types of knowledge work systems, and how do they provide value for the firm? 4.1 Knowledge Workers and Knowledge Work Knowledge workers are researchers, designers, architects, scientists, engineers who create knowledge for the organization. They have three key roles: o Keeping organization’s knowledge up-to-date o Serving as internal consultants/experts o Acting as change agents (evaluating, initiating, and promoting change projects) These workers are supported by Knowledge Work Systems. These are systems for knowledge workers to help create new knowledge and integrate that knowledge into business. 4.1.1 o o o o o o 4.1.2 o o o Requirements of Knowledge Work Systems Sufficient computing power for graphics, complex calculations Powerful graphics and analytical tools to visualize the newly created knowledge Communications and document management Access to external databases User-friendly interfaces Designed and optimized for specific tasks to be performed (design engineering, financial analysis) Examples CAD (computer-aided design) - Creation of engineering or architectural designs - 3D printing Virtual reality - VR to let medical students learn a specific surgery Augmented reality: different than VR because you are still in the same physical world but enhanced by some kind of virtual image. Ex. you have an iPad with augmented reality Chapter 12: Enhancing Decision-Making 1 What are the different types of decisions, and how does the decision-making process work? 1.1 Types of decisions (3) o o o Unstructured: - Involves judgment, evaluation, and insight to solve problem typically very complex decisions; not taken daily - Each decision is nonroutine, with no agreed-on procedure for making the decision Structured: - Repetitive and routine easy, simple decisions - Involve definite procedure for handling - Often supported by Knowledge Management Systems Semi structured: - Part of problem structured and part unstructured The higher the organizational level, the more unstructured decisions become! 1.2 The Decision-Making Process (4) o o o o Intelligence / Problem discovery - Discover, identify, and understand the problems occurring in the organization really try to understand the problem Design / Solution discovery - Identify and explore different solutions to the problem Choice / Choosing solutions - Choose best solution Implementation / Solution testing - Making chosen alternative work and continuing to monitor how well solution is working - Is the solution working? How can we make it work better? 2 How do business intelligence and business analytics support decision-making? 2.1 What is business intelligence Businesses collect a lot of data about their customers, suppliers, … Business intelligence and business analytics are a way to make sense of these huge amount of data. o o o Business intelligence - Infrastructure for collecting, storing, analyzing data - The data is stored in data warehouses and/or data marts Difference data warehouse and database: in data warehouses, data is stored with the goal of efficient data analysis (structured in a mathematic way). Data marts are subsets of the data warehouse: data about a specific business function or business domain. Business analytics - Tools and techniques for analyzing data - For instance, statistics and data mining Business intelligence and analytics is about the enterprise- wide integration of data and then analyse the data to support decision-making The Business Intelligence Environment consists of 6 elements: o Data from the business environment: from internal sources (call centers) and external sources (social media) o Business intelligence infrastructure: data warehouses and data marts o Business analytics toolset o Managerial users and methods they make sure the data is being analysed in order to create business value o Delivery platform: MIS, DSS, ESS (chapter 2) o User interface o Data visualization tools Business Intelligence and Analytics require a strong database foundation, a set of analytical tools and an involved management team. The goal is to deliver accurate real-time information to decision makers. The result of business intelligence and analytics is delivered to the different users through 3 systems (MIS, DSS and ESS). Main analytic functionalities of BI systems (6): o Production reports o Parameterized reports: show the impact of different parameters on data o Dashboards/scorecards to visualize data o Ad hoc query/search/report creation: so that users can create their own reports o Drill down: going from general data to specific data o Forecasts, scenarios, models 2.2 Predictive Analytics Uses variety of data, techniques to predict/model future trends and behaviour patterns. It uses statistical analysis, data mining, historical data to predict patterns of future trends. Incorporated into numerous BI applications for sales, marketing, finance, fraud detection, healthcare. This works well with predicting behaviour that is repetitive and consistent over time, such as customer behaviour. Ex. How will customers respond to price changes? How successful will new sales locations be? Predictive Analytics does not work well in dynamic environments such as the stock market. 2.3 Big Data Analytics o 2.4 Analysing massive datasets for different purposes. - Big data: massive datasets collected from social media, online and in-store customer data - Often discovery-oriented: we do not know what we are looking for in advance Ex. online retailers: create real-time, personalized shopping experiences. Ex. smart cities: use public records, sensors, location data from smartphones to make better decisions about running cities and serving their residents. Operational Intelligence and Analytics Monitoring business activity on an operational level. o Collection and use of data generated by sensors o Internet of Things o Ex. monitor and analyse the performance of power generators 2.5 Location Analytics and Geographic Information Systems 2.5.1 o Location analytics Ability to gain business insight from the location (geographic) component of data (location data of mobile phones, sensors or scanning devices) - 2.5.2 o o Ex. UPS’s package tracking to determine optimal delivery schedules and routes Geographic information systems (GIS) Visualize location data on maps and run business scenarios Ex. identify the optimal location to open a new Starbucks without harming sales at other Starbucks locations 3 How do different decision-making constituencies in an organization use business intelligence, and what is the role of information systems in helping people working in a group make decisions more efficiently? There are two main categories of business intelligence users. o Power users: the producers of the output of business intelligence o Casual users: consumers of the output Different employees in the organization will use business intelligence functions in different ways. 3.1 Decision Support for Operational and Middle Management o Management information systems (MIS) mostly for operational management - Delivery platform for BI to support structured decisions - View reports on performance of key business aspects such as production reports o Decision-support systems (DSS) mostly for middle management - Delivery platform for BI to support semi structured decisions - Relies more heavily on business analytics than MIS - Use mathematical or analytical models - Allow varied types of analysis “What-if” decisions use sensitivity analysis models: predict outcomes if changes occur. Ex. What would happen if we increase a products price by 3%? 3.2 Multidimensional analysis Decision Support for Senior Management o Executive support systems (ESS) - Delivery platform for BI to support non-routine strategic decision-making (unstructured) - Focus on information of strategic importance. Ex. ESS will help executives answer the question: “what products should we be making in 5 years?” o Balanced scorecard - Provides measurable outcomes related to strategic objectives on four dimensions Financial: what are the financial results of the organization? - - Business process: how efficiently are the business processes? Customer: how happy are the clients? Learning and growth: how much training are the employees following? In order to determine how well the firm is doing in regards of the strategy, the strategic objectives need to be translated into these 4 dimensions. Key performance indicators (KPIs) measure each dimension ESS will help senior management follow up on these KPIs through for example a digital dashboard The data used for ESS will come from: o o o 3.3 Internal data from enterprise applications (ERP, CRM, SCM) External data (financial market databases, news services) Drill-down capabilities Group Decision-Support Systems (GDSS) o Interactive system to facilitate solution of unstructured problems by group - Virtual collaboration rooms - Software to collect, rank, edit participant ideas and responses - Stores information generated during meetings - Enables collaboration between geographically separated employees o Ex. Skype for Business, Miro Guest lecture: KPMG Lighthouse The KPMG Lighthouse is a department within KPMG that is building data driven solutions. 1 2 What is Business Intelligence? o Business intelligence and analytics is about the enterprise-wide integration of data and then analyse the data to support decision-making. o A BI project is not just about the end product (data visualization), but there are a lot of underlying processes. o o o o o Requirements gathering: what does the client want? Data acquisition: what data do I need in order to solve the problem? Data cleansing & transformation: import and harmonize data; start building the data model Data exploration: deliver the insights you want to deliver Data visualization: build a report, dashboard, … • Enkel het tipje v.d. ijsberg, de rest is niet zichtbaar!! Data visualization o o o Data visualization allows analysts to quickly identify patterns which are hard to see in a regular table. Advanced Data visualization tools offer the possibility to discover these patterns and insights faster thanks to highly interactive user interface. A lot of data can be represented dynamically and analysed onto a single screen. Common mistakes: o Using happy faces to report for example shootings o Using pie charts that does not add up to 100% o Using wrong scaling when representing different percentages How to do it right: o Represent complex things in a simple way o Use simple colours, simple language. Simple = efficient 3 Client cases KPMG uses a methodology when dealing with a client (5): o Strategy: build a total project plan o High-level design: gain a further understanding of the business requirements o Detailed design: design an application architecture o Build: building the application architecture o Implement: let the client use the application 4 A BI project (5) 4.1 Requirements gathering o o Gain a thorough understanding of the problem and requirements Client meetings For this case: o The client wants to gain insights on how they are performing compared to their competition. o They would like to see this with respect to revenue and growth per product category and by country o The client expressed the need to have an updated report available on a monthly basis 4.2 Data acquisition o o o o Figure out what system holds the required information In what format is the data available? Structured, semi structured, unstructured? Get this information on a monthly basis – can we ingest this data in an automated manner? How classified is the information? Can anyone see it? For this case: just Excel files: o Sales figures with geographical information o Product information 4.3 Data cleansing & transformation Start importing and transforming the data. o We need to ensure that all data is in a usable format so that we can use it in our data models and reports: transform half structured data into structured data o Depending on the size of the project– it can be done either directly within Power BI or the data cleansing and transformations can be done somewhere else (ex. Data Warehouse) 4.4 Data exploration Depending on the complexity of the report you’ll have to do some data exploration and experimentation while building the report. Depending on the problem you’ll need to perform advanced analytics to gather the insights you want. 4.5 Data visualization Once we know what visuals we want to use and that it delivers the insights and information that is required, we can start putting it all together to create a coherent (interactive) report. Guest lecture: Delaware The main goal is to align business and technology. Delaware wants to be a one stop shop for their customers. They want to guide their customers from the very beginning of the project to the end. o Design & Consulting: what are the requirements? what do we want to build? how did the process look like? o Building & Integrate: building solutions and integrate with what the customers have already o Train & Transform: training the people to work with it and transform the organisation o Managed services: support the customers with whatever question they have Delaware focused on bringing ERP on smaller organizations in a payable way. 1 Smart Enterprises A smart enterprise can also be said to be one that is powered by digital technologies. 1.1 What do we expect from Smart Enterprises in 2020? We expect 3 things from Smart Enterprises: o Personalization o Transparency in everything they do o Comfort delivery The Supply Chain of organizations is under pressure from all sides: Technology and therefore Smart Enterprises offer a solution to the demanding customers, a cleaner organization in the circular economy and the war for talent. A smart business uses technology to work on better offerings, lower cost and faster time-to-market with the goal of making their customers happier. 59 Example smart business: Swapfiets. They invested in technology and created an application to offer a better experience to the customer. 1.2 What is a Smart Manufacturing Enterprise? The application of these technologies for the improvement of efficiency, safety and productivity. The use of cyber-physical systems in the manufacturing process is also called the fourth industrial revolution or Industry 4.0. 2 The role of ERP in Smart Enterprises o How are all the sensors connected? o What about non-digitized processes? o Where is all the data stored and centralized? ERP helps bring all these things together and make it a whole 2.1 Evolution role of ERP Firstly, ERP helped to support secondary processes (accounting, finance). Later on, it also helped supporting primary business processes (production, logistics). Eventually, ERP also adds value for primary processes. The latest generation of ERP can also generate innovation of primary processes. 2.2 Growth path Smart Enterprise 1) Operational excellence: visualize all the business processes and implement them into the ERP system so that it can add value to those processes 2) Smarter data: collect data from machines, warehouses and interpret the data, find connections 3) Predictive: use the data to predict the future 4) Artificial intelligence: refine the business model, be relevant for the customers and operate as a truly top-efficient, integrated organization How does this work? 60 3 Business Case The Eastman Chemical Company is responsible for global distribution of amines, used for water purification, crop protection, … 3.1 Use of technology in an everyday process For example, a Brazilian farmer orders 20 barrels that is required for the protection of his harvest. The product has to be there before a certain date, the start of the sowing season. o o o o 3.2 Firstly, a person of contact for Brazilian agriculture enters the client order from the farmer in the ERP system (quantity, product sold, customer information). Then, the factory in Gent starts production and the ERP system helps with the production planning: sensors in silo’s are connected with the ERP system to calculate the production quantity and stock. Next, the drum filling line is managed through the ERP system. Then, the truck is loaded with drums for transport to the port. The truck drives through a weight station connected with the ERP system. Challenges and lessons learned Challenges of a rapidly changing market with increased digitization. It takes a lot of time, there is a need for multi-skilled teams to implement such a project. 4 Conclusion o o o o o 61 ERP is often the necessary first step towards Smart Enterprises ERP projects can have long lead-times. A reactive attitude is detrimental to be ahead of evolution. ERP business objects are central to collect all kinds of data and connect everything in an organization (customer, employee, operators, machines) Cross-domain teams are necessary because SMART is the combination of technology fit and organizational fitness. SMART is not just an IT related opportunity. Business models and processes need to evolve as fast as IT does. Guest lecture: Deloitte 1 Macro technology forces Macro technology forces can drive purposeful, transformational change. Macro technology forces are divided in 3 groups: o Enablers o Foundation: the heart of the business o Disruptors Originally, there were 6 forces (first two columns: digital experience, analytics, cloud, business of technology, risk and core modernization). Over the years, technology gained more and more importance in organizations. We also see other forces arising, like the last two columns. o o o o o o o o o 2 Digital experience: how you experience a service Analytics: companies need to make decisions based on data Cloud: allows you to provide your software as a service Business of technology: your IT needs to be efficient and effective Risk: technologies brings a lot of new risks (ex. hackers) Core modernization: technology puts pressure on organizations to modernize Digital reality: to move beyond the screen (VR, augmented reality, Siri) Cognitive: all the things related to AI and machine learning Blockchain: an online register in which transactions are recorded Ethical technology and trust How can we position ourselves in such a way that we become more trustworthy? There are three domains on which we can focus to further establish this trust. 62 o o o 2.1 Technology: how can we optimize in such a way that people trust us when they give us their data? Processes: are there processes on how to manage the personal data? People: how can we include everybody? Technology Encoding company’s values Building a strong data foundation Hardening defenses 2.2 Processes Respecting differing cultural norms Respecting stakeholder privacy Transparency 2.3 Organizations need to operate in line with their principles Prevent users from engaging with technology in irresponsible ways Be transparent in what data will be collected, how are we managing this and how are we ensuring that it is not getting abused Work on the cyber risk strategy (prevent hackers): security, privacy, integrity and confidentiality Acceptable norms in Europe might be different than in South America a service should be designed in a way that is flexible, and able to respect the norms of different countries Let your customers have the ability to know what we know about them Be transparent on what information you gather People Make sure to include all ethnic groups, economic backgrounds, levels of education, … when developing a certain platform or delivering a certain service. 63 3 Finance and the future of IT Organizations are trying to figure out how to balance the growing demand for innovation and digital transformation with the realities of traditional budgeting, accounting and management of capital. This offers IT and finance an opportunity to work together in a more consistent and effective way. IT and finance leaders work together to develop flexible approaches for funding innovation. How? o Change within Finance: adapt their normal cycles of budgeting, funding and reporting o Change within IT: Creating a clear road map for foundational tech investments o Creative funding: when a company has the money but not the knowledge to innovate, they can fund another company who has the knowledge 3.1 Central problems 64