Chapter 6 Foundations of Business Intelligence: Databases and Information Management 6.1 ORGANIZING DATA IN A TRADITIONAL FILE ENVIRONMENT A n effective information system provides users with accurate, timely, and relevant information. Accurate information is free of errors. Information is timely when it is available to decision makers when it is needed. Information is relevant when it is useful and appropriate for the types of work and decisions that require it. You might be surprised to learn that many businesses don’t have timely, accurate, or relevant information because the data in their information systems have been poorly organized and maintained. That’s why data management is so essential. To understand the problem, let’s look at how information systems arrange data in computer files and traditional methods of file management. FILE ORGANIZATION TERMS AND CONCEPTS A computer system organizes data in a hierarchy that starts with bits and bytes and progresses to fields, records, files, and databases (see Figure 6-1). A bit represents the smallest unit of data a computer can handle. A group of bits, called a byte, represents a single character, which can be a letter, a FIGURE 6-1 THE DATA HIERARCHY A computer system organizes data in a hierarchy that starts with the bit, which represents either a 0 or a 1. Bits can be grouped to form a byte to represent one character, number, or symbol. Bytes can be grouped to form a field, and related fields can be grouped to form a record. Related records can be collected to form a file, and related files can be organized into a database. 209 210 Part Two Information Technology Infrastructure number, or another symbol. A grouping of characters into a word, a group of words, or a complete number (such as a person’s name or age) is called a field. A group of related fields, such as the student’s name, the course taken, the date, and the grade, comprises a record; a group of records of the same type is called a file. For example, the records in Figure 6-1 could constitute a student course file. A group of related files makes up a database. The student course file illustrated in Figure 6-1 could be grouped with files on students’ personal histories and financial backgrounds to create a student database. A record describes an entity. An entity is a person, place, thing, or event on which we store and maintain information. Each characteristic or quality describing a particular entity is called an attribute. For example, Student_ID, Course, Date, and Grade are attributes of the entity COURSE. The specific values that these attributes can have are found in the fields of the record describing the entity COURSE. PROBLEMS WITH THE TRADITIONAL FILE ENVIRONMENT In most organizations, systems tended to grow independently without a company-wide plan. Accounting, finance, manufacturing, human resources, and sales and marketing all developed their own systems and data files. Figure 6-2 illustrates the traditional approach to information processing. FIGURE 6-2 TRADITIONAL FILE PROCESSING The use of a traditional approach to file processing encourages each functional area in a corporation to develop specialized applications. Each application requires a unique data file that is likely to be a subset of the master file. These subsets of the master file lead to data redundancy and inconsistency, processing inflexibility, and wasted storage resources. Chapter 6 Foundations of Business Intelligence: Databases and Information Management Each application, of course, required its own files and its own computer program to operate. For example, the human resources functional area might have a personnel master file, a payroll file, a medical insurance file, a pension file, a mailing list file, and so forth until tens, perhaps hundreds, of files and programs existed. In the company as a whole, this process led to multiple master files created, maintained, and operated by separate divisions or departments. As this process goes on for 5 or 10 years, the organization is saddled with hundreds of programs and applications that are very difficult to maintain and manage. The resulting problems are data redundancy and inconsistency, program-data dependence, inflexibility, poor data security, and an inability to share data among applications. Data Redundancy and Inconsistency Data redundancy is the presence of duplicate data in multiple data files so that the same data are stored in more than place or location. Data redundancy occurs when different groups in an organization independently collect the same piece of data and store it independently of each other. Data redundancy wastes storage resources and also leads to data inconsistency, where the same attribute may have different values. For example, in instances of the entity COURSE illustrated in Figure 6-1, the Date may be updated in some systems but not in others. The same attribute, Student_ID, may also have different names in different systems throughout the organization. Some systems might use Student_ID and others might use ID, for example. Additional confusion might result from using different coding systems to represent values for an attribute. For instance, the sales, inventory, and manufacturing systems of a clothing retailer might use different codes to represent clothing size. One system might represent clothing size as “extra large,” whereas another might use the code “XL” for the same purpose. The resulting confusion would make it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. Program-Data Dependence Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data. Every traditional computer program has to describe the location and nature of the data with which it works. In a traditional file environment, any change in a software program could require a change in the data accessed by that program. One program might be modified from a five-digit to a nine-digit ZIP code. If the original data file were changed from five-digit to nine-digit ZIP codes, then other programs that required the five-digit ZIP code would no longer work properly. Such changes could cost millions of dollars to implement properly. L ack of Flexibility A traditional file system can deliver routine scheduled reports after extensive programming efforts, but it cannot deliver ad hoc reports or respond to unanticipated information requirements in a timely fashion. The information required by ad hoc requests is somewhere in the system but may be too expensive to retrieve. Several programmers might have to work for weeks to put together the required data items in a new file. 211 212 Part Two Information Technology Infrastructure Poor Security Because there is little control or management of data, access to and dissemination of information may be out of control. Management may have no way of knowing who is accessing or even making changes to the organization’s data. Lack of Data Sharing and Availability Because pieces of information in different files and different parts of the organization cannot be related to one another, it is virtually impossible for information to be shared or accessed in a timely manner. Information cannot flow freely across different functional areas or different parts of the organization. If users find different values of the same piece of information in two different systems, they may not want to use these systems because they cannot trust the accuracy of their data. 6.2 THE DATABASE APPROACH TO DATA MANAGEMENT Database technology cuts through many of the problems of traditional file organization. A more rigorous definition of a database is a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data. Rather than storing data in separate files for each application, data are stored so as to appear to users as being stored in only one location. A single database services multiple applications. For example, instead of a corporation storing employee data in separate information systems and separate files for personnel, payroll, and benefits, the corporation could create a single common human resources database. DATABASE MANAGEMENT SYSTEMS A database management system (DBMS) is software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs. The DBMS acts as an interface between application programs and the physical data files. When the application program calls for a data item, such as gross pay, the DBMS finds this item in the database and presents it to the application program. Using traditional data files, the programmer would have to specify the size and format of each data element used in the program and then tell the computer where they were located. The DBMS relieves the programmer or end user from the task of understanding where and how the data are actually stored by separating the logical and physical views of the data. The logical view presents data as they would be perceived by end users or business specialists, whereas the physical view shows how data are actually organized and structured on physical storage media. The database management software makes the physical database available for different logical views required by users. For example, for the human resources database illustrated in Figure 6-3, a benefits specialist might require a view consisting of the employee’s name, social security number, and health insurance coverage. A payroll department member might need data such as the employee’s name, social security number, gross pay, and net pay. The data for Chapter 6 Foundations of Business Intelligence: Databases and Information Management FIGURE 6-3 HUMAN RESOURCES DATABASE WITH MULTIPLE VIEWS A single human resources database provides many different views of data, depending on the information requirements of the user. Illustrated here are two possible views, one of interest to a benefits specialist and one of interest to a member of the company’s payroll department. all these views are stored in a single database, where they can be more easily managed by the organization. H o w a D B M S S o l v e s t h e P r o b l e m s o f t h e Tr a d i t i o n a l File Environment A DBMS reduces data redundancy and inconsistency by minimizing isolated files in which the same data are repeated. The DBMS may not enable the organization to eliminate data redundancy entirely, but it can help control redundancy. Even if the organization maintains some redundant data, using a DBMS eliminates data inconsistency because the DBMS can help the organization ensure that every occurrence of redundant data has the same values. The DBMS uncouples programs and data, enabling data to stand on their own. Access and availability of information will be increased and program development and maintenance costs reduced because users and programmers can perform ad hoc queries of data in the database. The DBMS enables the organization to centrally manage data, their use, and security. Relational DBMS Contemporary DBMS use different database models to keep track of entities, attributes, and relationships. The most popular type of DBMS today for PCs as well as for larger computers and mainframes is the relational DBMS. Relational databases represent data as two-dimensional tables (called relations). Tables may be referred to as files. Each table contains data on an entity and its attributes. Microsoft Access is a relational DBMS for desktop systems, whereas DB2, Oracle Database, and Microsoft SQL Server are relational DBMS for large mainframes and midrange computers. MySQL is a popular open-source DBMS, and Oracle Database Lite is a DBMS for small handheld computing devices. 213 214 Part Two Information Technology Infrastructure Let’s look at how a relational database organizes data about suppliers and parts (see Figure 6-4). The database has a separate table for the entity SUPPLIER and a table for the entity PART. Each table consists of a grid of columns and rows of data. Each individual element of data for each entity is stored as a separate field, and each field represents an attribute for that entity. Fields in a relational database are also called columns. For the entity SUPPLIER, the supplier identification number, name, street, city, state, and ZIP code are stored as separate fields within the SUPPLIER table and each field represents an attribute for the entity SUPPLIER. The actual information about a single supplier that resides in a table is called a row. Rows are commonly referred to as records, or in very technical terms, as tuples. Data for the entity PART have their own separate table. The field for Supplier_Number in the SUPPLIER table uniquely identifies each record so that the record can be retrieved, updated, or sorted and it is called a key field. Each table in a relational database has one field that is designated as its primary key. This key field is the unique identifier for all the information in any row of the table and this primary key cannot be duplicated. FIGURE 6-4 RELATIONAL DATABASE TABLES A relational database organizes data in the form of two-dimensional tables. Illustrated here are tables for the entities SUPPLIER and PART showing how they represent each entity and its attributes. Supplier_Number is a primary key for the SUPPLIER table and a foreign key for the PART table. Chapter 6 Foundations of Business Intelligence: Databases and Information Management Supplier_Number is the primary key for the SUPPLIER table and Part_Number is the primary key for the PART table. Note that Supplier_Number appears in both the SUPPLIER and PART tables. In the SUPPLIER table, Supplier_Number is the primary key. When the field Supplier_Number appears in the PART table it is called a foreign key and is essentially a lookup field to look up data about the supplier of a specific part. Operations of a Relational DBMS Relational database tables can be combined easily to deliver data required by users, provided that any two tables share a common data element. Suppose we wanted to find in this database the names of suppliers who could provide us with part number 137 or part number 150. We would need information from two tables: the SUPPLIER table and the PART table. Note that these two files have a shared data element: Supplier_Number. In a relational database, three basic operations, as shown in Figure 6-5, are used to develop useful sets of data: select, join, and project. The select operation creates a subset consisting of all records in the file that meet stated criteria. Select creates, in other words, a subset of rows that meet certain criteria. In our example, we want to select records (rows) from the PART table where the Part_Number equals 137 or 150. The join operation combines relational tables to provide the user with more information than is available in individual tables. In our example, we want to join the now-shortened PART table (only parts 137 or 150 will be presented) and the SUPPLIER table into a single new table. The project operation creates a subset consisting of columns in a table, permitting the user to create new tables that contain only the information required. In our example, we want to extract from the new table only the following columns: Part_Number, Part_Name, Supplier_Number, and Supplier_Name. Object-Oriented DBMS Many applications today and in the future require databases that can store and retrieve not only structured numbers and characters but also drawings, images, photographs, voice, and full-motion video. DBMS designed for organizing structured data into rows and columns are not well suited to handling graphicsbased or multimedia applications. Object-oriented databases are better suited for this purpose. An object-oriented DBMS stores the data and procedures that act on those data as objects that can be automatically retrieved and shared. Object-oriented database management systems (OODBMS) are becoming popular because they can be used to manage the various multimedia components or Java applets used in Web applications, which typically integrate pieces of information from a variety of sources. Although object-oriented databases can store more complex types of information than relational DBMS, they are relatively slow compared with relational DBMS for processing large numbers of transactions. Hybrid object-relational DBMS systems are now available to provide capabilities of both object-oriented and relational DBMS. Databases in the Cloud Suppose your company wants to use cloud computing services. Is there a way to manage data in the cloud? The answer is a qualified “Yes.” Cloud computing providers offer database management services, but these services typically have less functionality than their on-premises counterparts. At the moment, 215 216 THE THREE BASIC OPERATIONS OF A RELATIONAL DBMS The select, join, and project operations enable data from two different tables to be combined and only selected attributes to be displayed. Part Two Information Technology Infrastructure FIGURE 6-5 Chapter 6 Foundations of Business Intelligence: Databases and Information Management the primary customer base for cloud-based data management consists of Webfocused start-ups or small to medium-sized businesses looking for database capabilities at a lower price than a standard relational DBMS. Amazon Web Services has both a simple non-relational database called SimpleDB and a Relational Database Service, which is based on an online implementation of the MySQL open source DBMS. Amazon Relational Database Service (Amazon RDS) offers the full range of capabilities of MySQL. Pricing is based on usage. (Charges run from 11 cents per hour for a small database using 1.7 GB of server memory to $3.10 per hour for a large database using 68 GB of server memory.) There are also charges for the volume of data stored, the number of input-output requests, the amount of data written to the database, and the amount of data read from the database. Amazon Web Services additionally offers Oracle customers the option to license Oracle Database 11g, Oracle Enterprise Manager, and Oracle Fusion Middleware to run on the Amazon EC2 (Elastic Cloud Compute) platform. Microsoft SQL Azure Database is a cloud-based relational database service based on Microsoft’s SQL Server DBMS. It provides a highly available, scalable database service hosted by Microsoft in the cloud. SQL Azure Database helps reduce costs by integrating with existing software tools and providing symmetry with on-premises and cloud databases. TicketDirect, which sells tickets to concerts, sporting events, theater performances, and movies in Australia and New Zealand, adopted the SQL Azure Database cloud platform in order to improve management of peak system loads during major ticket sales. It migrated its data to the SQL Azure database. By moving to a cloud solution, TicketDirect is able to scale its computing resources in response to real-time demand while keeping costs low. CAPABILITIES OF DATABASE MANAGEMENT SYSTEMS A DBMS includes capabilities and tools for organizing, managing, and accessing the data in the database. The most important are its data definition language, data dictionary, and data manipulation language. DBMS have a data definition capability to specify the structure of the content of the database. It would be used to create database tables and to define the characteristics of the fields in each table. This information about the database would be documented in a data dictionary. A data dictionary is an automated or manual file that stores definitions of data elements and their characteristics. Microsoft Access has a rudimentary data dictionary capability that displays information about the name, description, size, type, format, and other properties of each field in a table (see Figure 6-6). Data dictionaries for large corporate databases may capture additional information, such as usage, ownership (who in the organization is responsible for maintaining the data), authorization; security, and the individuals, business functions, programs, and reports that use each data element. Quer ying and Reporting DBMS includes tools for accessing and manipulating information in databases. Most DBMS have a specialized language called a data manipulation language that is used to add, change, delete, and retrieve the data in the database. This language contains commands that permit end users and programming specialists to extract data from the database to satisfy information requests and develop applications. The most prominent data manipulation language today is Structured Query Language, or SQL. Figure 6-7 illustrates the SQL query that 217 218 Part Two Information Technology Infrastructure FIGURE 6-6 MICROSOFT ACCESS DATA DICTIONARY FEATURES Microsoft Access has a rudimentary data dictionary capability that displays information about the size, format, and other characteristics of each field in a database. Displayed here is the information maintained in the SUPPLIER table. The small key icon to the left of Supplier_Number indicates that it is a key field. would produce the new resultant table in Figure 6-5. You can find out more about how to perform SQL queries in our Learning Tracks for this chapter. Users of DBMS for large and midrange computers, such as DB2, Oracle, or SQL Server, would employ SQL to retrieve information they needed from the database. Microsoft Access also uses SQL, but it provides its own set of user-friendly tools for querying databases and for organizing data from databases into more polished reports. In Microsoft Access, you will find features that enable users to create queries by identifying the tables and fields they want and the results, and then selecting the rows from the database that meet particular criteria. These actions in turn are translated into SQL commands. Figure 6-8 illustrates how FIGURE 6-7 EXAMPLE OF AN SQL QUERY Illustrated here are the SQL statements for a query to select suppliers for parts 137 or 150. They produce a list with the same results as Figure 6-5. Chapter 6 Foundations of Business Intelligence: Databases and Information Management FIGURE 6-8 AN ACCESS QUERY Illustrated here is how the query in Figure 6-7 would be constructed using Microsoft Access querybuilding tools. It shows the tables, fields, and selection criteria used for the query. the same query as the SQL query to select parts and suppliers would be constructed using the Microsoft query-building tools. Microsoft Access and other DBMS include capabilities for report generation so that the data of interest can be displayed in a more structured and polished format than would be possible just by querying. Crystal Reports is a popular report generator for large corporate DBMS, although it can also be used with Access. Access also has capabilities for developing desktop system applications. These include tools for creating data entry screens, reports, and developing the logic for processing transactions. DESIGNING DATABASES To create a database, you must understand the relationships among the data, the type of data that will be maintained in the database, how the data will be used, and how the organization will need to change to manage data from a company-wide perspective. The database requires both a conceptual design and a physical design. The conceptual, or logical, design of a database is an abstract model of the database from a business perspective, whereas the physical design shows how the database is actually arranged on direct-access storage devices. Normalization and Entity-Relationship Diagrams The conceptual database design describes how the data elements in the database are to be grouped. The design process identifies relationships among data elements and the most efficient way of grouping data elements together to meet business information requirements. The process also identifies redundant data elements and the groupings of data elements required for specific 219 220 Part Two Information Technology Infrastructure FIGURE 6-9 AN UNNORMALIZED RELATION FOR ORDER An unnormalized relation contains repeating groups. For example, there can be many parts and suppliers for each order. There is only a one-to-one correspondence between Order_Number and Order_Date. application programs. Groups of data are organized, refined, and streamlined until an overall logical view of the relationships among all the data in the database emerges. To use a relational database model effectively, complex groupings of data must be streamlined to minimize redundant data elements and awkward manyto-many relationships. The process of creating small, stable, yet flexible and adaptive data structures from complex groups of data is called normalization. Figures 6-9 and 6-10 illustrate this process. In the particular business modeled here, an order can have more than one part but each part is provided by only one supplier. If we build a relation called ORDER with all the fields included here, we would have to repeat the name and address of the supplier for every part on the order, even though the order is for parts from a single supplier. This relationship contains what are called repeating data groups because there can be many parts on a single order to a given supplier. A more efficient way to arrange the data is to break down ORDER into smaller relations, each of which describes a single entity. If we go step by step and normalize the relation ORDER, we emerge with the relations illustrated in Figure 6-10. You can find out more about normalization, entity-relationship diagramming, and database design in the Learning Tracks for this chapter. Relational database systems try to enforce referential integrity rules to ensure that relationships between coupled tables remain consistent. When one table has a foreign key that points to another table, you may not add a record to the table with the foreign key unless there is a corresponding record in the linked table. In the database we examined earlier in this chapter, the foreign key FIGURE 6-10 NORMALIZED TABLES CREATED FROM ORDER After normalization, the original relation ORDER has been broken down into four smaller relations. The relation ORDER is left with only two attributes and the relation LINE_ITEM has a combined, or concatenated, key consisting of Order_Number and Part_Number. Chapter 6 Foundations of Business Intelligence: Databases and Information Management Supplier_Number links the PART table to the SUPPLIER table. We may not add a new record to the PART table for a part with Supplier_Number 8266 unless there is a corresponding record in the SUPPLIER table for Supplier_Number 8266. We must also delete the corresponding record in the PART table if we delete the record in the SUPPLIER table for Supplier_Number 8266. In other words, we shouldn’t have parts from nonexistent suppliers! Database designers document their data model with an entity-relationship diagram, illustrated in Figure 6-11. This diagram illustrates the relationship between the entities SUPPLIER, PART, LINE_ITEM, and ORDER. The boxes represent entities. The lines connecting the boxes represent relationships. A line connecting two entities that ends in two short marks designates a one-to-one relationship. A line connecting two entities that ends with a crow’s foot topped by a short mark indicates a one-to-many relationship. Figure 6-11 shows that one ORDER can contain many LINE_ITEMs. (A PART can be ordered many times and appear many times as a line item in a single order.) Each PART can have only one SUPPLIER, but many PARTs can be provided by the same SUPPLIER. It can’t be emphasized enough: If the business doesn’t get its data model right, the system won’t be able to serve the business well. The company’s systems will not be as effective as they could be because they’ll have to work with data that may be inaccurate, incomplete, or difficult to retrieve. Understanding the organization’s data and how they should be represented in a database is perhaps the most important lesson you can learn from this course. For example, Famous Footwear, a shoe store chain with more than 800 locations in 49 states, could not achieve its goal of having “the right style of shoe in the right store for sale at the right price” because its database was not properly designed for rapidly adjusting store inventory. The company had an Oracle relational database running on an IBM AS/400 midrange computer, but the database was designed primarily for producing standard reports for management rather than for reacting to marketplace changes. Management could not obtain precise data on specific items in inventory in each of its stores. The company had to work around this problem by building a new database where the sales and inventory data could be better organized for analysis and inventory management. 6.3 USING DATABASES TO IMPROVE BUSINESS PERFORMANCE AND DECISION MAKING Businesses use their databases to keep track of basic transactions, such as paying suppliers, processing orders, keeping track of customers, and paying employees. But they also need databases to provide information that will help the company FIGURE 6-11 AN ENTITY-RELATIONSHIP DIAGRAM This diagram shows the relationships between the entities SUPPLIER, PART, LINE_ITEM, and ORDER that might be used to model the database in Figure 6-10. 221 222 Part Two Information Technology Infrastructure run the business more efficiently, and help managers and employees make better decisions. If a company wants to know which product is the most popular or who is its most profitable customer, the answer lies in the data. For example, by analyzing data from customer credit card purchases, Louise’s Trattoria, a Los Angeles restaurant chain, learned that quality was more important than price for most of its customers, who were collegeeducated and liked fine wine. Acting on this information, the chain introduced vegetarian dishes, more seafood selections, and more expensive wines, raising sales by more than 10 percent. In a large company, with large databases or large systems for separate functions, such as manufacturing, sales, and accounting, special capabilities and tools are required for analyzing vast quantities of data and for accessing data from multiple systems. These capabilities include data warehousing, data mining, and tools for accessing internal databases through the Web. DATA WAREHOUSES Suppose you want concise, reliable information about current operations, trends, and changes across the entire company If you worked in a large company, obtaining this might be difficult because data are often maintained in separate systems, such as sales, manufacturing, or accounting. Some of the data you need might be found in the sales system, and other pieces in the manufacturing system. Many of these systems are older legacy systems that use outdated data management technologies or file systems where information is difficult for users to access. You might have to spend an inordinate amount of time locating and gathering the data you need, or you would be forced to make your decision based on incomplete knowledge. If you want information about trends, you might also have trouble finding data about past events because most firms only make their current data immediately available. Data warehousing addresses these problems. W h a t I s a D a t a Wa r e h o u s e ? A data warehouse is a database that stores current and historical data of potential interest to decision makers throughout the company. The data originate in many core operational transaction systems, such as systems for sales, customer accounts, and manufacturing, and may include data from Web site transactions. The data warehouse consolidates and standardizes information from different operational databases so that the information can be used across the enterprise for management analysis and decision making. Figure 6-12 illustrates how a data warehouse works. The data warehouse makes the data available for anyone to access as needed, but it cannot be altered. A data warehouse system also provides a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. Many firms use intranet portals to make the data warehouse information widely available throughout the firm. Catalina Marketing, a global marketing firm for major consumer packaged goods companies and retailers, operates a gigantic data warehouse that includes three years of purchase history for 195 million U.S. customer loyalty program members at supermarkets, pharmacies, and other retailers. It is the largest loyalty database in the world. Catalina’s retail store customers analyze this database of customer purchase histories to determine individual customers’ buying preferences. When a shopper checks out at the cash register of one of Chapter 6 Foundations of Business Intelligence: Databases and Information Management FIGURE 6-12 COMPONENTS OF A DATA WAREHOUSE The data warehouse extracts current and historical data from multiple operational systems inside the organization. These data are combined with data from external sources and reorganized into a central database designed for management reporting and analysis. The information directory provides users with information about the data available in the warehouse. Catalina’s retail customers, the purchase is instantly analyzed along with that customer’s buying history in the data warehouse to determine what coupons that customer will receive at checkout along with a receipt. The U.S. Internal Revenue Service (IRS) maintains a Compliance Data Warehouse that consolidates taxpayer data that had been fragmented among many different legacy systems, including personal information about taxpayers and archived tax returns. These systems had been designed to process tax return forms efficiently but their data were very difficult to query and analyze. The Compliance Data Warehouse integrates taxpayer data from many disparate sources into a relational structure, which makes querying and analysis much easier. With a complete and comprehensive picture of taxpayers, the warehouse helps IRS analysts and staff identify people who are most likely to cheat on their income tax payments and respond rapidly to taxpayer queries. Data Marts Companies often build enterprise-wide data warehouses, where a central data warehouse serves the entire organization, or they create smaller, decentralized warehouses called data marts. A data mart is a subset of a data warehouse in which a summarized or highly focused portion of the organization’s data is placed in a separate database for a specific population of users. For example, a company might develop marketing and sales data marts to deal with customer information. Before implementing an enterprise-wide data warehouse, bookseller Barnes & Noble maintained a series of data marts—one for point-of-sale data in retail stores, another for college bookstore sales, and a third for online sales. A data mart typically focuses on a single subject area or line of business, so it usually can be constructed more rapidly and at lower cost than an enterprise-wide data warehouse. 223 224 Part Two Information Technology Infrastructure TOOLS FOR BUSINESS INTELLIGENCE: MULTIDIMENSIONAL DATA ANALYSIS AND DATA MINING Once data have been captured and organized in data warehouses and data marts, they are available for further analysis using tools for business intelligence, which we introduced briefly in Chapter 2. Business intelligence tools enable users to analyze data to see new patterns, relationships, and insights that are useful for guiding decision making. Principal tools for business intelligence include software for database querying and reporting, tools for multidimensional data analysis (online analytical processing), and tools for data mining. This section will introduce you to these tools, with more detail about business intelligence analytics and applications in the Chapter 12 discussion of decision making. Online Analytical Processing (OLAP) Suppose your company sells four different products—nuts, bolts, washers, and screws—in the East, West, and Central regions. If you wanted to ask a fairly straightforward question, such as how many washers were sold during the past quarter, you could easily find the answer by querying your sales database. But what if you wanted to know how many washers sold in each of your sales regions and compare actual results with projected sales? To obtain the answer, you would need online analytical processing (OLAP). OLAP supports multidimensional data analysis, enabling users to view the same data in different ways using multiple dimensions. Each aspect of information—product, pricing, cost, region, or time period—represents a different dimension. So, a product manager could use a multidimensional data analysis tool to learn how many washers were sold in the East in June, how that compares with the previous month and the previous June, and how it compares with the sales forecast. OLAP enables users to obtain online answers to ad hoc questions such as these in a fairly rapid amount of time, even when the data are stored in very large databases, such as sales figures for multiple years. Figure 6-13 shows a multidimensional model that could be created to represent products, regions, actual sales, and projected sales. A matrix of actual sales can be stacked on top of a matrix of projected sales to form a cube with six faces. If you rotate the cube 90 degrees one way, the face showing will be product versus actual and projected sales. If you rotate the cube 90 degrees again, you will see region versus actual and projected sales. If you rotate 180 degrees from the original view, you will see projected sales and product versus region. Cubes can be nested within cubes to build complex views of data. A company would use either a specialized multidimensional database or a tool that creates multidimensional views of data in relational databases. Data Mining Traditional database queries answer such questions as, “How many units of product number 403 were shipped in February 2010?” OLAP, or multidimensional analysis, supports much more complex requests for information, such as “Compare sales of product 403 relative to plan by quarter and sales region for the past two years.” With OLAP and query-oriented data analysis, users need to have a good idea about the information for which they are looking. Data mining is more discovery-driven. Data mining provides insights into corporate data that cannot be obtained with OLAP by finding hidden patterns and Chapter 6 Foundations of Business Intelligence: Databases and Information Management FIGURE 6-13 MULTIDIMENSIONAL DATA MODEL The view that is showing is product versus region. If you rotate the cube 90 degrees, the face will show product versus actual and projected sales. If you rotate the cube 90 degrees again, you will see region versus actual and projected sales. Other views are possible. relationships in large databases and inferring rules from them to predict future behavior. The patterns and rules are used to guide decision making and forecast the effect of those decisions. The types of information obtainable from data mining include associations, sequences, classifications, clusters, and forecasts. • Associations are occurrences linked to a single event. For instance, a study of supermarket purchasing patterns might reveal that, when corn chips are purchased, a cola drink is purchased 65 percent of the time, but when there is a promotion, cola is purchased 85 percent of the time. This information helps managers make better decisions because they have learned the profitability of a promotion. • In sequences, events are linked over time. We might find, for example, that if a house is purchased, a new refrigerator will be purchased within two weeks 65 percent of the time, and an oven will be bought within one month of the home purchase 45 percent of the time. • Classification recognizes patterns that describe the group to which an item belongs by examining existing items that have been classified and by inferring a set of rules. For example, businesses such as credit card or telephone companies worry about the loss of steady customers. Classification helps discover the characteristics of customers who are likely to leave and can provide a model to help managers predict who those customers are so that the managers can devise special campaigns to retain such customers. • Clustering works in a manner similar to classification when no groups have yet been defined. A data mining tool can discover different groupings within data, such as finding affinity groups for bank cards or partitioning a database into groups of customers based on demographics and types of personal investments. • Although these applications involve predictions, forecasting uses predictions in a different way. It uses a series of existing values to forecast what other values will be. For example, forecasting might find patterns in data to help managers estimate the future value of continuous variables, such as sales figures. These systems perform high-level analyses of patterns or trends, but they can also drill down to provide more detail when needed. There are data mining 225 226 Part Two Information Technology Infrastructure applications for all the functional areas of business, and for government and scientific work. One popular use for data mining is to provide detailed analyses of patterns in customer data for one-to-one marketing campaigns or for identifying profitable customers. For example, Harrah’s Entertainment, the second-largest gambling company in its industry, uses data mining to identify its most profitable customers and generate more revenue from them. The company continually analyzes data about its customers gathered when people play its slot machines or use Harrah’s casinos and hotels. Harrah’s marketing department uses this information to build a detailed gambling profile, based on a particular customer’s ongoing value to the company. For instance, data mining lets Harrah’s know the favorite gaming experience of a regular customer at one of its Midwest riverboat casinos, along with that person’s preferences for room accomodations, restaurants, and entertainment. This information guides management decisions about how to cultivate the most profitable customers, encourage those customers to spend more, and attract more customers with high revenue-generating potential. Business intelligence has improved Harrah’s profits so much that it has become the centerpiece of the firm’s business strategy. Predictive analytics use data mining techniques, historical data, and assumptions about future conditions to predict outcomes of events, such as the probability a customer will respond to an offer or purchase a specific product. For example, the U.S. division of The Body Shop International plc used predictive analytics with its database of catalog, Web, and retail store customers to identify customers who were more likely to make catalog purchases. That information helped the company build a more precise and targeted mailing list for its catalogs, improving the response rate for catalog mailings and catalog revenues. Te x t M i n i n g a n d We b M i n i n g Business intelligence tools deal primarily with data that have been structured in databases and files. However, unstructured data, most in the form of text files, is believed to account for over 80 percent of an organization’s useful information. E-mail, memos, call center transcripts, survey responses, legal cases, patent descriptions, and service reports are all valuable for finding patterns and trends that will help employees make better business decisions. Text mining tools are now available to help businesses analyze these data. These tools are able to extract key elements from large unstructured data sets, discover patterns and relationships, and summarize the information. Businesses might turn to text mining to analyze transcripts of calls to customer service centers to identify major service and repair issues. Text mining is a relatively new technology, but what’s really new are the myriad ways in which unstructured data are being generated by consumers and the business uses for these data. The Interactive Session on Technology explores some of these business applications of text mining. The Web is another rich source of valuable information, some of which can now be mined for patterns, trends, and insights into customer behavior. The discovery and analysis of useful patterns and information from the World Wide Web is called Web mining. Businesses might turn to Web mining to help them understand customer behavior, evaluate the effectiveness of a particular Web site, or quantify the success of a marketing campaign. For instance, marketers use Google Trends and Google Insights for Search services, which track the popularity of various words and phrases used in Google search queries, to learn what people are interested in and what they are interested in buying. Chapter 6 Foundations of Business Intelligence: Databases and Information Management Suppose, for example, a customer with a Web browser wants to search an online retailer’s database for pricing information. Figure 6-14 illustrates how that customer might access the retailer’s internal database over the Web. The user accesses the retailer’s Web site over the Internet using Web browser software on his or her client PC. The user’s Web browser software requests data from the organization’s database, using HTML commands to communicate with the Web server. Because many back-end databases cannot interpret commands written in HTML, the Web server passes these requests for data to software that translates HTML commands into SQL so that they can be processed by the DBMS working with the database. In a client/server environment, the DBMS resides on a dedicated computer called a database server. The DBMS receives the SQL requests and provides the required data. The middleware transfers information from the organization’s internal database back to the Web server for delivery in the form of a Web page to the user. Figure 6-14 shows that the middleware working between the Web server and the DBMS is an application server running on its own dedicated computer (see Chapter 5). The application server software handles all application operations, including transaction processing and data access, between browser-based computers and a company’s back-end business applications or databases. The application server takes requests from the Web server, runs the business logic to process transactions based on those requests, and provides connectivity to the organization’s back-end systems or databases. Alternatively, the software for handling these operations could be a custom program or a CGI script. A CGI script is a compact program using the Common Gateway Interface (CGI) specification for processing data on a Web server. There are a number of advantages to using the Web to access an organization’s internal databases. First, Web browser software is much easier to use than proprietary query tools. Second, the Web interface requires few or no changes to the internal database. It costs much less to add a Web interface in front of a legacy system than to redesign and rebuild the system to improve user access. Accessing corporate databases through the Web is creating new efficiencies, opportunities, and business models. ThomasNet.com provides an up-to-date online directory of more than 600,000 suppliers of industrial products, such as chemicals, metals, plastics, rubber, and automotive equipment. Formerly called Thomas Register, the company used to send out huge paper catalogs with this information. Now it provides this information to users online via its Web site and has become a smaller, leaner company. Other companies have created entirely new businesses based on access to large databases through the Web. One is the social networking site MySpace, which helps users stay connected with each other or meet new people. FIGURE 6-14 LINKING INTERNAL DATABASES TO THE WEB Users access an organization’s internal database through the Web using their desktop PCs and Web browser software. 229 230 Part Two Information Technology Infrastructure MySpace features music, comedy, videos, and “profiles” with information supplied by 122 million users about their age, hometown, dating preferences, marital status, and interests. It maintains a massive database to house and manage all of this content. Facebook uses a similar database. 6.4 MANAGING DATA RESOURCES Setting up a database is only a start. In order to make sure that the data for your business remain accurate, reliable, and readily available to those who need it, your business will need special policies and procedures for data management. ESTABLISHING AN INFORMATION POLICY Every business, large and small, needs an information policy. Your firm’s data are an important resource, and you don’t want people doing whatever they want with them. You need to have rules on how the data are to be organized and maintained, and who is allowed to view the data or change them. An information policy specifies the organization’s rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information. Information policy lays out specific procedures and accountabilities, identifying which users and organizational units can share information, where information can be distributed, and who is responsible for updating and maintaining the information. For example, a typical information policy would specify that only selected members of the payroll and human resources department would have the right to change and view sensitive employee data, such as an employee’s salary or social security number, and that these departments are responsible for making sure that such employee data are accurate. If you are in a small business, the information policy would be established and implemented by the owners or managers. In a large organization, managing and planning for information as a corporate resource often requires a formal data administration function. Data administration is responsible for the specific policies and procedures through which data can be managed as an organizational resource. These responsibilities include developing information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end-user groups use data. You may hear the term data governance used to describe many of these activities. Promoted by IBM, data governance deals with the policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise, with special emphasis on promoting privacy, security, data quality, and compliance with government regulations. A large organization will also have a database design and management group within the corporate information systems division that is responsible for defining and organizing the structure and content of the database, and maintaining the database. In close cooperation with users, the design group establishes the physical database, the logical relations among elements, and the access rules and security procedures. The functions it performs are called database administration. ENSURING DATA QUALITY A well-designed database and information policy will go a long way toward ensuring that the business has the information it needs. However, additional Chapter 6 Foundations of Business Intelligence: Databases and Information Management steps must be taken to ensure that the data in organizational databases are accurate and remain reliable. What would happen if a customer’s telephone number or account balance were incorrect? What would be the impact if the database had the wrong price for the product you sold or your sales system and inventory system showed different prices for the same product? Data that are inaccurate, untimely, or inconsistent with other sources of information lead to incorrect decisions, product recalls, and financial losses. Inaccurate data in criminal justice and national security databases might even subject you to unnecessarily surveillance or detention, as described in the chapter-ending case study. According to Forrester Research, 20 percent of U.S. mail and commercial package deliveries were returned because of incorrect names or addresses. Gartner Inc. reported that more than 25 percent of the critical data in large Fortune 1000 companies’ databases is inaccurate or incomplete, including bad product codes and product descriptions, faulty inventory descriptions, erroneous financial data, incorrect supplier information, and incorrect employee data. (Gartner, 2007). Think of all the times you’ve received several pieces of the same direct mail advertising on the same day. This is very likely the result of having your name maintained multiple times in a database. Your name may have been misspelled or you used your middle initial on one occasion and not on another or the information was initially entered onto a paper form and not scanned properly into the system. Because of these inconsistencies, the database would treat you as different people! We often receive redundant mail addressed to Laudon, Lavdon, Lauden, or Landon. If a database is properly designed and enterprise-wide data standards established, duplicate or inconsistent data elements should be minimal. Most data quality problems, however, such as misspelled names, transposed numbers, or incorrect or missing codes, stem from errors during data input. The incidence of such errors is rising as companies move their businesses to the Web and allow customers and suppliers to enter data into their Web sites that directly update internal systems. Before a new database is in place, organizations need to identify and correct their faulty data and establish better routines for editing data once their database is in operation. Analysis of data quality often begins with a data quality audit, which is a structured survey of the accuracy and level of completeness of the data in an information system. Data quality audits can be performed by surveying entire data files, surveying samples from data files, or surveying end users for their perceptions of data quality. Data cleansing, also known as data scrubbing, consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant. Data cleansing not only corrects errors but also enforces consistency among different sets of data that originated in separate information systems. Specialized data-cleansing software is available to automatically survey data files, correct errors in the data, and integrate the data in a consistent company-wide format. Data quality problems are not just business problems. They also pose serious problems for individuals, affecting their financial condition and even their jobs. The Interactive Session on Organizations describes some of these impacts, as it details the data quality problems found in the companies that collect and report consumer credit data. As you read this case, look for the management, organization, and technology factors behind this problem, and whether existing solutions are adequate. 231 Chapter 8 Securing Information Systems 8.1 SYSTEM VULNERABILITY AND ABUSE C an you imagine what would happen if you tried to link to the Internet without a firewall or antivirus software? Your computer would be disabled in a few seconds, and it might take you many days to recover. If you used the computer to run your business, you might not be able to sell to your customers or place orders with your suppliers while it was down. And you might find that your computer system had been penetrated by outsiders, who perhaps stole or destroyed valuable data, including confidential payment data from your customers. If too much data were destroyed or divulged, your business might never be able to operate! In short, if you operate a business today, you need to make security and control a top priority. Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization’s assets; the accuracy and reliability of its records; and operational adherence to management standards. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats than when they existed in manual form. Through communications networks, information systems in different locations are interconnected. The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network. Figure 8-1 illustrates the most common threats against contemporary information systems. They can stem from technical, organizational, and environmental factors compounded by poor management decisions. In the multi-tier client/server computing environment illustrated here, vulnerabilities exist at each layer and in the communications between the layers. Users at the client layer can cause harm by introducing errors or by accessing systems without FIGURE 8-1 CONTEMPORARY SECURITY CHALLENGES AND VULNERABILITIES The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. 293 294 Part Two Information Technology Infrastructure authorization. It is possible to access data flowing over networks, steal valuable data during transmission, or alter messages without authorization. Radiation may disrupt a network at various points as well. Intruders can launch denial-ofservice attacks or malicious software to disrupt the operation of Web sites. Those capable of penetrating corporate systems can destroy or alter corporate data stored in databases or files. Systems malfunction if computer hardware breaks down, is not configured properly, or is damaged by improper use or criminal acts. Errors in programming, improper installation, or unauthorized changes cause computer software to fail. Power failures, floods, fires, or other natural disasters can also disrupt computer systems. Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers outside the organization’s control. Without strong safeguards, valuable data could be lost, destroyed, or could fall into the wrong hands, revealing important trade secrets or information that violates personal privacy. The popularity of handheld mobile devices for business computing adds to these woes. Portability makes cell phones, smartphones, and tablet computers easy to lose or steal. Smartphones share the same security weaknesses as other Internet devices, and are vulnerable to malicious software and penetration from outsiders. In 2009, security experts identified 30 security flaws in software and operating systems of smartphones made by Apple, Nokia, and BlackBerry maker Research in Motion. Even the apps that have been custom-developed for mobile devices are capable of turning into rogue software. For example, in December 2009, Google pulled dozens of mobile banking apps from its Android Market because they could have been updated to capture customers’ banking credentials. Smartphones used by corporate executives may contain sensitive data such as sales figures, customer names, phone numbers, and e-mail addresses. Intruders may be able to access internal corporate networks through these devices. I n t e r n e t Vu l n e r a b i l i t i e s Large public networks, such as the Internet, are more vulnerable than internal networks because they are virtually open to anyone. The Internet is so huge that when abuses do occur, they can have an enormously widespread impact. When the Internet becomes part of the corporate network, the organization’s information systems are even more vulnerable to actions from outsiders. Computers that are constantly connected to the Internet by cable modems or digital subscriber line (DSL) lines are more open to penetration by outsiders because they use fixed Internet addresses where they can be easily identified. (With dial-up service, a temporary Internet address is assigned for each session.) A fixed Internet address creates a fixed target for hackers. Telephone service based on Internet technology (see Chapter 7) is more vulnerable than the switched voice network if it does not run over a secure private network. Most Voice over IP (VoIP) traffic over the public Internet is not encrypted, so anyone with a network can listen in on conversations. Hackers can intercept conversations or shut down voice service by flooding servers supporting VoIP with bogus traffic. Vulnerability has also increased from widespread use of e-mail, instant messaging (IM), and peer-to-peer file-sharing programs. E-mail may contain attachments that serve as springboards for malicious software or unauthorized access to internal corporate systems. Employees may use e-mail messages to transmit valuable trade secrets, financial data, or confidential customer informa- Chapter 8 Securing Information Systems tion to unauthorized recipients. Popular IM applications for consumers do not use a secure layer for text messages, so they can be intercepted and read by outsiders during transmission over the public Internet. Instant messaging activity over the Internet can in some cases be used as a back door to an otherwise secure network. Sharing files over peer-to-peer (P2P) networks, such as those for illegal music sharing, may also transmit malicious software or expose information on either individual or corporate computers to outsiders. Wireless Security Challenges Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. Although the range of Wi-Fi networks is only several hundred feet, it can be extended up to one-fourth of a mile using external antennae. Local area networks (LANs) using the 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software. Hackers use these tools to detect unprotected networks, monitor network traffic, and, in some cases, gain access to the Internet or to corporate networks. Wi-Fi transmission technology was designed to make it easy for stations to find and hear one another. The service set identifiers (SSIDs) identifying the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders’ sniffer programs (see Figure 8-2). Wireless networks in many locations do not have basic protections against war driving, FIGURE 8-2 WI-FI SECURITY CHALLENGES Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. 295 296 Part Two Information Technology Infrastructure in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. A hacker can employ an 802.11 analysis tool to identify the SSID. (Windows XP, Vista, and 7 have capabilities for detecting the SSID used in a network and automatically configuring the radio NIC within the user’s device.) An intruder that has associated with an access point by using the correct SSID is capable of accessing other resources on the network, using the Windows operating system to determine which other users are connected to the network, access their computer hard drives, and open or copy their files. Intruders also use the information they have gleaned to set up rogue access points on a different radio channel in physical locations close to users to force a user’s radio NIC to associate with the rogue access point. Once this association occurs, hackers using the rogue access point can capture the names and passwords of unsuspecting users. The initial security standard developed for Wi-Fi, called Wired Equivalent Privacy (WEP), is not very effective. WEP is built into all standard 802.11 products, but its use is optional. Many users neglect to use WEP security features, leaving them unprotected. The basic WEP specification calls for an access point and all of its users to share the same 40-bit encrypted password, which can be easily decrypted by hackers from a small amount of traffic. Stronger encryption and authentication systems are now available, such as Wi-Fi Protected Access 2 (WPA2), but users must be willing to install them. MALICIOUS SOFTWARE: VIRUSES, WORMS, TROJAN HORSES, AND SPYWARE Malicious software programs are referred to as malware and include a variety of threats, such as computer viruses, worms, and Trojan horses. A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Most computer viruses deliver a “payload.” The payload may be relatively benign, such as the instructions to display a message or image, or it may be highly destructive—destroying programs or data, clogging computer memory, reformatting a computer’s hard drive, or causing programs to run improperly. Viruses typically spread from computer to computer when humans take an action, such as sending an e-mail attachment or copying an infected file. Most recent attacks have come from worms, which are independent computer programs that copy themselves from one computer to other computers over a network. (Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior in order to spread from computer to computer. This explains why computer worms spread much more rapidly than computer viruses.) Worms destroy data and programs as well as disrupt or even halt the operation of computer networks. Worms and viruses are often spread over the Internet from files of downloaded software, from files attached to e-mail transmissions, or from compromised e-mail messages or instant messaging. Viruses have also invaded computerized information systems from “infected” disks or infected machines. E-mail worms are currently the most problematic. Malware targeting mobile devices is not as extensive as that targeting computers, but is spreading nonetheless using e-mail, text messages, Bluetooth, Chapter 8 Securing Information Systems and file downloads from the Web via Wi-Fi or cellular networks.There are now more than 200 viruses and worms targeting mobile phones, such as Cabir, Commwarrior, Frontal.A, and Ikee.B. Frontal.A installs a corrupted file that causes phone failure and prevents the user from rebooting, while Ikee.B turns jailbroken iPhones into botnet-controlled devices. Mobile device viruses pose serious threats to enterprise computing because so many wireless devices are now linked to corporate information systems. Web 2.0 applications, such as blogs, wikis, and social networking sites such as Facebook and MySpace, have emerged as new conduits for malware or spyware. These applications allow users to post software code as part of the permissible content, and such code can be launched automatically as soon as a Web page is viewed. The chapter-opening case study describes other channels for malware targeting Facebook. In September 2010, hackers exploited a Twitter security flaw to send users to Japanese pornographic sites and automatically generated messages from other accounts (Coopes, 2010). Table 8-1 describes the characteristics of some of the most harmful worms and viruses that have appeared to date. Over the past decade, worms and viruses have caused billions of dollars of damage to corporate networks, e-mail systems, and data. According to Consumer Reports’ State of the Net 2010 survey, U.S. consumers lost $3.5 billion TABLE 8-1 EXAMPLES OF MALICIOUS CODE NAME TYPE DESCRIPTION Conficker (aka Downadup, Downup) Worm First detected in November 2008. Uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely. Has more than 5 million computers worldwide under its control. Difficult to eradicate. Storm Worm/ Trojan horse First identified in January 2007. Spreads via e-mail spam with a fake attachment. Infected up to 10 million computers, causing them to join its zombie network of computers engaged in criminal activity. Sasser.ftp Worm First appeared in May 2004. Spread over the Internet by attacking random IP addresses. Causes computers to continually crash and reboot, and infected computers to search for more victims. Affected millions of computers worldwide, disrupting British Airways flight check-ins, operations of British coast guard stations, Hong Kong hospitals, Taiwan post office branches, and Australia’s Westpac Bank. Sasser and its variants caused an estimated $14.8 billion to $18.6 billion in damages worldwide. MyDoom.A Worm First appeared on January 26, 2004. Spreads as an e-mail attachment. Sends e-mail to addresses harvested from infected machines, forging the sender’s address. At its peak this worm lowered global Internet performance by 10 percent and Web page loading times by as much as 50 percent. Was programmed to stop spreading after February 12, 2004. Sobig.F Worm First detected on August 19, 2003. Spreads via e-mail attachments and sends massive amounts of mail with forged sender information. Deactivated itself on September 10, 2003, after infecting more than 1 million PCs and doing $5 to $10 billion in damage. ILOVEYOU Virus First detected on May 3, 2000. Script virus written in Visual Basic script and transmitted as an attachment to e-mail with the subject line ILOVEYOU. Overwrites music, image, and other files with a copy of itself and did an estimated $10 billion to $15 billion in damage. Melissa Macro virus/ worm First appeared in March 1999. Word macro script mailing infected Word file to first 50 entries in user’s Microsoft Outlook address book. Infected 15 to 29 percent of all business PCs, causing $300 million to $600 million in damage. 297 298 Part Two Information Technology Infrastructure because of malware and online scams, and the majority of these losses came from malware (Consumer Reports, 2010). A Trojan horse is a software program that appears to be benign but then does something other than expected, such as the Zeus Trojan described in the chapter-opening case. The Trojan horse is not itself a virus because it does not replicate, but it is often a way for viruses or other malicious code to be introduced into a computer system. The term Trojan horse is based on the huge wooden horse used by the Greeks to trick the Trojans into opening the gates to their fortified city during the Trojan War. Once inside the city walls, Greek soldiers hidden in the horse revealed themselves and captured the city. At the moment, SQL injection attacks are the largest malware threat. SQL injection attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems and networks. These vulnerabilities occur when a Web application fails to properly validate or filter data entered by a user on a Web page, which might occur when ordering something online. An attacker uses this input validation error to send a rogue SQL query to the underlying database to access the database, plant malicious code, or access other systems on the network. Large Web applications have hundreds of places for inputting user data, each of which creates an opportunity for an SQL injection attack. A large number of Web-facing applications are believed to have SQL injection vulnerabilities, and tools are available for hackers to check Web applications for these vulnerabilities. Such tools are able to locate a data entry field on a Web page form, enter data into it, and check the response to see if shows vulnerability to a SQL injection. Some types of spyware also act as malicious software. These small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising. Thousands of forms of spyware have been documented. Many users find such spyware annoying and some critics worry about its infringement on computer users’ privacy. Some forms of spyware are especially nefarious. Keyloggers record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to e-mail accounts, to obtain passwords to protected computer systems, or to pick up personal information such as credit card numbers. Other spyware programs reset Web browser home pages, redirect search requests, or slow performance by taking up too much memory. The Zeus Trojan described in the chapteropening case uses keylogging to steal financial information. HACKERS AND COMPUTER CRIME A hacker is an individual who intends to gain unauthorized access to a computer system. Within the hacking community, the term cracker is typically used to denote a hacker with criminal intent, although in the public press, the terms hacker and cracker are used interchangeably. Hackers and crackers gain unauthorized access by finding weaknesses in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make it an open system that is easy to use. Hacker activities have broadened beyond mere system intrusion to include theft of goods and information, as well as system damage and cybervandalism, the intentional disruption, defacement, or even destruction of a Web site or corporate information system. For example, cybervandals have turned many of the MySpace “group” sites, which are dedicated to interests such as home beer Chapter 8 Securing Information Systems brewing or animal welfare, into cyber-graffiti walls, filled with offensive comments and photographs. Spoofing and Sniffing Hackers attempting to hide their true identities often spoof, or misrepresent, themselves by using fake e-mail addresses or masquerading as someone else. Spoofing also may involve redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination. For example, if hackers redirect customers to a fake Web site that looks almost exactly like the true site, they can then collect and process orders, effectively stealing business as well as sensitive customer information from the true site. We provide more detail on other forms of spoofing in our discussion of computer crime. A sniffer is a type of eavesdropping program that monitors information traveling over a network. When used legitimately, sniffers help identify potential network trouble spots or criminal activity on networks, but when used for criminal purposes, they can be damaging and very difficult to detect. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. Denial-of-Service Attacks In a denial-of-service (DoS) attack, hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network. The network receives so many queries that it cannot keep up with them and is thus unavailable to service legitimate requests. A distributed denial-of-service (DDoS) attack uses numerous computers to inundate and overwhelm the network from numerous launch points. For example, during the 2009 Iranian election protests, foreign activists trying to help the opposition engaged in DDoS attacks against Iran’s government. The official Web site of the Iranian government (ahmadinejad.ir) was rendered inaccessible on several occasions. Although DoS attacks do not destroy information or access restricted areas of a company’s information systems, they often cause a Web site to shut down, making it impossible for legitimate users to access the site. For busy e-commerce sites, these attacks are costly; while the site is shut down, customers cannot make purchases. Especially vulnerable are small and midsize businesses whose networks tend to be less protected than those of large corporations. Perpetrators of DoS attacks often use thousands of “zombie” PCs infected with malicious software without their owners’ knowledge and organized into a botnet. Hackers create these botnets by infecting other people’s computers with bot malware that opens a back door through which an attacker can give instructions. The infected computer then becomes a slave, or zombie, serving a master computer belonging to someone else. Once a hacker infects enough computers, her or she can use the amassed resources of the botnet to launch DDos attacks, phishing campaigns, or unsolicited “spam” e-mail. The number of computers that are part of botnets is variously estimated to be from 6 to 24 million, with thousands of botnets operating worldwide. The largest botnet attack in 2010 was the Mariposa botnet, which started in Spain and spread across the world. Mariposa had infected and controlled about 12.7 million computers in its efforts to steal credit card numbers and online banking passwords. More than half the Fortune 1000 companies, 40 major banks, and numerous government agencies were infected—and did not know it. 299 300 Part Two Information Technology Infrastructure The chapter-ending case study describes multiple waves of DDoS attacks targeting a number of Web sites of government agencies and other organizations in South Korea and the United States in July 2009. The attacker used a botnet controlling over 65,000 computers, and was able to cripple some of these sites for several days. Most of the botnet originated from China, and North Korea. Botnet attacks thought to have originated in Russia were responsible for crippling the Web sites of the Estonian government in April 2007 and the Georgian government in July 2008. Computer Crime Most hacker activities are criminal offenses, and the vulnerabilities of systems we have just described make them targets for other types of computer crime as well. For example, in early July 2009, U.S. federal agents arrested Sergey Aleynikov, a computer programmer at investment banking firm Goldman Sachs, for stealing proprietary computer programs used in making lucrative rapid-fire trades in the financial markets. The software brought Goldman many millions of dollars of profits per year and, in the wrong hands, could have been used to manipulate financial markets in unfair ways. Computer crime is defined by the U.S. Department of Justice as “any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.” Table 8-2 provides examples of the computer as a target of crime and as an instrument of crime. No one knows the magnitude of the computer crime problem—how many systems are invaded, how many people engage in the practice, or the total economic damage. According to the 2009 CSI Computer Crime and Security Survey of 500 companies, participants’ average annual loss from computer crime and security attacks was close to $234,000 (Computer Security Institute, 2009). Many companies are reluctant to report computer crimes because the crimes may involve employees, or the company fears that publicizing its vulnerability will hurt its reputation. The most economically damaging kinds of computer crime are TABLE 8-2 EXAMPLES OF COMPUTER CRIME COMPUTERS AS TARGETS OF CRIME Breaching the confidentiality of protected computerized data Accessing a computer system without authority Knowingly accessing a protected computer to commit fraud Intentionally accessing a protected computer and causing damage, negligently or deliberately Knowingly transmitting a program, program code, or command that intentionally causes damage to a protected computer Threatening to cause damage to a protected computer COMPUTERS AS INSTRUMENTS OF CRIME Theft of trade secrets Unauthorized copying of software or copyrighted intellectual property, such as articles, books, music, and video Schemes to defraud Using e-mail for threats or harassment Intentionally attempting to intercept electronic communication Illegally accessing stored electronic communications, including e-mail and voice mail Transmitting or possessing child pornography using a computer Chapter 8 Securing Information Systems DoS attacks, introducing viruses, theft of services, and disruption of computer systems. Identity Theft With the growth of the Internet and electronic commerce, identity theft has become especially troubling. Identity theft is a crime in which an imposter obtains key pieces of personal information, such as social security identification numbers, driver’s license numbers, or credit card numbers, to impersonate someone else. The information may be used to obtain credit, merchandise, or services in the name of the victim or to provide the thief with false credentials. According to Javelin Strategy and Research, losses from identity theft rose to $54 billion in 2009, and over 11 million U.S. adults were victims of identity fraud (Javelin Strategy & Research, 2010). Identify theft has flourished on the Internet, with credit card files a major target of Web site hackers. Moreover, e-commerce sites are wonderful sources of customer personal information—name, address, and phone number. Armed with this information, criminals are able to assume new identities and establish new credit for their own purposes. One increasingly popular tactic is a form of spoofing called phishing. Phishing involves setting up fake Web sites or sending e-mail or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social security numbers, bank and credit card information, and other confidential data either by responding to the e-mail message, by entering the information at a bogus Web site, or by calling a telephone number. EBay, PayPal, Amazon.com, Walmart, and a variety of banks, are among the top spoofed companies. New phishing techniques called evil twins and pharming are harder to detect. Evil twins are wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet, such as those in airport lounges, hotels, or coffee shops. The bogus network looks identical to a legitimate public network. Fraudsters try to capture passwords or credit card numbers of unwitting users who log on to the network. Pharming redirects users to a bogus Web page, even when the individual types the correct Web page address into his or her browser. This is possible if pharming perpetrators gain access to the Internet address information stored by Internet service providers to speed up Web browsing and the ISP companies have flawed software on their servers that allows the fraudsters to hack in and change those addresses. In the largest instance of identity theft to date, Alberto Gonzalez of Miami and two Russian co-conspirators penetrated the corporate systems of TJX Corporation, Hannaford Brothers, 7-Eleven, and other major retailers, stealing over 160 million credit and debit card numbers between 2005 and 2008. The group initially planted “sniffer” programs in these companies’ computer networks that captured card data as they were being transmitted between computer systems. They later switched to SQL injection attacks, which we introduced earlier in this chapter, to penetrate corporate databases. In March 2010, Gonzalez was sentenced to 20 years in prison. TJX alone spent over $200 million to deal with its data theft, including legal settlements. The U.S. Congress addressed the threat of computer crime in 1986 with the Computer Fraud and Abuse Act. This act makes it illegal to access a computer system without authorization. Most states have similar laws, and nations in Europe have comparable legislation. Congress also passed the National Information Infrastructure Protection Act in 1996 to make virus distribution 301 302 Part Two Information Technology Infrastructure and hacker attacks that disable Web sites federal crimes. U.S. legislation, such as the Wiretap Act, Wire Fraud Act, Economic Espionage Act, Electronic Communications Privacy Act, E-mail Threats and Harassment Act, and Child Pornography Act, covers computer crimes involving intercepting electronic communication, using electronic communication to defraud, stealing trade secrets, illegally accessing stored electronic communications, using e-mail for threats or harassment, and transmitting or possessing child pornography. Click Fraud When you click on an ad displayed by a search engine, the advertiser typically pays a fee for each click, which is supposed to direct potential buyers to its products. Click fraud occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. Click fraud has become a serious problem at Google and other Web sites that feature pay-per-click online advertising. Some companies hire third parties (typically from low-wage countries) to fraudulently click on a competitor’s ads to weaken them by driving up their marketing costs. Click fraud can also be perpetrated with software programs doing the clicking, and botnets are often used for this purpose. Search engines such as Google attempt to monitor click fraud but have been reluctant to publicize their efforts to deal with the problem. Global Threats: Cyberterrorism and Cyberwarfare The cybercriminal activities we have described—launching malware, denial-ofservice attacks, and phishing probes—are borderless. Computer security firm Sophos reported that 42 percent of the malware it identified in early 2010 originated in the United States, while 11 percent came from China, and 6 percent from Russia (Sophos, 2010). The global nature of the Internet makes it possible for cybercriminals to operate—and to do harm—anywhere in the world. Concern is mounting that the vulnerabilities of the Internet or other networks make digital networks easy targets for digital attacks by terrorists, foreign intelligence services, or other groups seeking to create widespread disruption and harm. Such cyberattacks might target the software that runs electrical power grids, air traffic control systems, or networks of major banks and financial institutions. At least 20 countries, including China, are believed to be developing offensive and defensive cyberwarfare capabilities. The chapterending case study discusses this problem in greater detail. INTERNAL THREATS: EMPLOYEES We tend to think the security threats to a business originate outside the organization. In fact, company insiders pose serious security problems. Employees have access to privileged information, and in the presence of sloppy internal security procedures, they are often able to roam throughout an organization’s systems without leaving a trace. Studies have found that user lack of knowledge is the single greatest cause of network security breaches. Many employees forget their passwords to access computer systems or allow co-workers to use them, which compromises the system. Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called social engineering. Both end users and information systems specialists are also a major source of errors introduced into information systems. End users introduce errors by Chapter 8 Securing Information Systems entering faulty data or by not following the proper instructions for processing data and using computer equipment. Information systems specialists may create software errors as they design and develop new software or maintain existing programs. SOFTWARE VULNERABILITY Software errors pose a constant threat to information systems, causing untold losses in productivity. Growing complexity and size of software programs, coupled with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities For example, a database-related software error prevented millions of JP Morgan Chase retail and small-business customers from accessing their online bank accounts for two days in September 2010 (Dash, 2010). A major problem with software is the presence of hidden bugs or program code defects. Studies have shown that it is virtually impossible to eliminate all bugs from large programs. The main source of bugs is the complexity of decision-making code. A relatively small program of several hundred lines will contain tens of decisions leading to hundreds or even thousands of different paths. Important programs within most corporations are usually much larger, containing tens of thousands or even millions of lines of code, each with many times the choices and paths of the smaller programs. Zero defects cannot be achieved in larger programs. Complete testing simply is not possible. Fully testing programs that contain thousands of choices and millions of paths would require thousands of years. Even with rigorous testing, you would not know for sure that a piece of software was dependable until the product proved itself after much operational use. Flaws in commercial software not only impede performance but also create security vulnerabilities that open networks to intruders. Each year security firms identify thousands of software vulnerabilities in Internet and PC software. For instance, in 2009, Symantec identified 384 browser vulnerabilities: 169 in Firefox, 94 in Safari, 45 in Internet Explorer, 41 in Chrome, and 25 in Opera. Some of these vulnerabilities were critical (Symantec, 2010). To correct software flaws once they are identified, the software vendor creates small pieces of software called patches to repair the flaws without disturbing the proper operation of the software. An example is Microsoft’s Windows Vista Service Pack 2, released in April 2009, which includes some security enhancements to counter malware and hackers. It is up to users of the software to track these vulnerabilities, test, and apply all patches. This process is called patch management. Because a company’s IT infrastructure is typically laden with multiple business applications, operating system installations, and other system services, maintaining patches on all devices and services used by a company is often time-consuming and costly. Malware is being created so rapidly that companies have very little time to respond between the time a vulnerability and a patch are announced and the time malicious software appears to exploit the vulnerability. The need to respond so rapidly to the torrent of security vulnerabilities even creates defects in the software meant to combat them, including popular antivirus products. What happened in the spring of 2010 to McAfee, a leading vendor of commercial antivirus software is an example, as discussed in the Interactive Session on Management. 303 308 Part Two Information Technology Infrastructure 8.3 ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL Even with the best security tools, your information systems won’t be reliable and secure unless you know how and where to deploy them. You’ll need to know where your company is at risk and what controls you must have in place to protect your information systems. You’ll also need to develop a security policy and plans for keeping your business running if your information systems aren’t operational. INFORMATION SYSTEMS CONTROLS Information systems controls are both manual and automated and consist of both general controls and application controls. General controls govern the design, security, and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure. On the whole, general controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. General controls include software controls, physical hardware controls, computer operations controls, data security controls, controls over implementation of system processes, and administrative controls. Table 8-3 describes the functions of each of these controls. Application controls are specific controls unique to each computerized application, such as payroll or order processing. They include both automated and manual procedures that ensure that only authorized data are completely and accurately processed by that application. Application controls can be classified as (1) input controls, (2) processing controls, and (3) output controls. Input controls check data for accuracy and completeness when they enter the system. There are specific input controls for input authorization, data conversion, data editing, and error handling. Processing controls establish that data are complete and accurate during updating. Output controls ensure that TABLE 8-3 GENERAL CONTROLS TYPE OF GENERAL CONTROL DESCRIPTION Software controls Monitor the use of system software and prevent unauthorized access of software programs, system software, and computer programs. Hardware controls Ensure that computer hardware is physically secure, and check for equipment malfunction. Organizations that are critically dependent on their computers also must make provisions for backup or continued operation to maintain constant service. Computer operations controls Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. They include controls over the setup of computer processing jobs and backup and recovery procedures for processing that ends abnormally. Data security controls Ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. Implementation controls Audit the systems development process at various points to ensure that the process is properly controlled and managed. Administrative controls Formalize standards, rules, procedures, and control disciplines to ensure that the organization’s general and application controls are properly executed and enforced. Chapter 8 Securing Information Systems the results of computer processing are accurate, complete, and properly distributed. You can find more detail about application and general controls in our Learning Tracks. RISK ASSESSMENT Before your company commits resources to security and information systems controls, it must know which assets require protection and the extent to which these assets are vulnerable. A risk assessment helps answer these questions and determine the most cost-effective set of controls for protecting assets. A risk assessment determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all risks can be anticipated and measured, but most businesses will be able to acquire some understanding of the risks they face. Business managers working with information systems specialists should try to determine the value of information assets, points of vulnerability, the likely frequency of a problem, and the potential for damage. For example, if an event is likely to occur no more than once a year, with a maximum of a $1,000 loss to the organization, it is not be wise to spend $20,000 on the design and maintenance of a control to protect against that event. However, if that same event could occur at least once a day, with a potential loss of more than $300,000 a year, $100,000 spent on a control might be entirely appropriate. Table 8-4 illustrates sample results of a risk assessment for an online order processing system that processes 30,000 orders per day. The likelihood of each exposure occurring over a one-year period is expressed as a percentage. The next column shows the highest and lowest possible loss that could be expected each time the exposure occurred and an average loss calculated by adding the highest and lowest figures together and dividing by two. The expected annual loss for each exposure can be determined by multiplying the average loss by its probability of occurrence. This risk assessment shows that the probability of a power failure occurring in a one-year period is 30 percent. Loss of order transactions while power is down could range from $5,000 to $200,000 (averaging $102,500) for each occurrence, depending on how long processing is halted. The probability of embezzlement occurring over a yearly period is about 5 percent, with potential losses ranging from $1,000 to $50,000 (and averaging $25,500) for each occurrence. User errors have a 98 percent chance of occurring over a yearly period, with losses ranging from $200 to $40,000 (and averaging $20,100) for each occurrence. Once the risks have been assessed, system builders will concentrate on the control points with the greatest vulnerability and potential for loss. In this case, controls should focus on ways to minimize the risk of power failures and user errors because anticipated annual losses are highest for these areas. TABLE 8-4 ONLINE ORDER PROCESSING RISK ASSESSMENT EXPOSURE PROBABILITY OF OCCURRENCE (%) LOSS RANGE/ AVERAGE ($) EXPECTED ANNUAL LOSS ($) Power failure 30% $5,000–$200,000 ($102,500) $30,750 Embezzlement 5% $1,000–$50,000 ($25,500) $1,275 98% $200–$40,000 ($20,100) $19,698 User error 309 310 Part Two Information Technology Infrastructure SECURITY POLICY Once you’ve identified the main risks to your systems, your company will need to develop a security policy for protecting the company’s assets. A security policy consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals. What are the firm’s most important information assets? Who generates and controls this information in the firm? What existing security policies are in place to protect the information? What level of risk is management willing to accept for each of these assets? Is it willing, for instance, to lose customer credit data once every 10 years? Or will it build a security system for credit card data that can withstand the once-in-a-hundred-year disaster? Management must estimate how much it will cost to achieve this level of acceptable risk. The security policy drives policies determining acceptable use of the firm’s information resources and which members of the company have access to its information assets. An acceptable use policy (AUP) defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet. The policy should clarify company policy regarding privacy, user responsibility, and personal use of company equipment and networks. A good AUP defines unacceptable and acceptable actions for every user and specifies consequences for noncompliance. For example, security policy at Unilever, the giant multinational consumer goods company, requires every employee equipped with a laptop or mobile handheld device to use a company-specified device and employ a password or other method of identification when logging onto the corporate network. Security policy also includes provisions for identity management. Identity management consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources. It includes policies for identifying and authorizing different categories of system users, specifying what systems or portions of systems each user is allowed to access, and the processes and technologies for authenticating users and protecting their identities. Figure 8-3 is one example of how an identity management system might capture the access rules for different levels of users in the human resources function. It specifies what portions of a human resource database each user is permitted to access, based on the information required to perform that person’s job. The database contains sensitive personal information such as employees’ salaries, benefits, and medical histories. The access rules illustrated here are for two sets of users. One set of users consists of all employees who perform clerical functions, such as inputting employee data into the system. All individuals with this type of profile can update the system but can neither read nor update sensitive fields, such as salary, medical history, or earnings data. Another profile applies to a divisional manager, who cannot update the system but who can read all employee data fields for his or her division, including medical history and salary. We provide more detail on the technologies for user authentication later on in this chapter. DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING If you run a business, you need to plan for events, such as power outages, floods, earthquakes, or terrorist attacks that will prevent your information systems and your business from operating. Disaster recovery planning devises Chapter 8 Securing Information Systems FIGURE 8-3 ACCESS RULES FOR A PERSONNEL SYSTEM These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the access rules, a user would have certain restrictions on access to various systems, locations, or data in an organization. plans for the restoration of computing and communications services after they have been disrupted. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services. For example, MasterCard maintains a duplicate computer center in Kansas City, Missouri, to serve as an emergency backup to its primary computer center in St. Louis. Rather than build their own backup facilities, many firms contract with disaster recovery firms, such as Comdisco Disaster Recovery Services in Rosemont, Illinois, and SunGard Availability Services, headquartered in Wayne, Pennsylvania. These disaster recovery firms provide hot sites housing spare computers at locations around the country where subscribing firms can run their critical applications in an emergency. For example, Champion Technologies, which supplies chemicals used in oil and gas operations, is able to switch its enterprise systems from Houston to a SunGard hot site in Scottsdale, Arizona, in two hours. Business continuity planning focuses on how the company can restore business operations after a disaster strikes. The business continuity plan identifies critical business processes and determines action plans for handling mission-critical functions if systems go down. For example, Deutsche Bank, which provides investment banking and asset management services in 74 different countries, has a well-developed business continuity plan that it continually updates and refines. It maintains full-time teams in Singapore, Hong Kong, Japan, India, and Australia 311 312 Part Two Information Technology Infrastructure to coordinate plans addressing loss of facilities, personnel, or critical systems so that the company can continue to operate when a catastrophic event occurs. Deutsche Bank’s plan distinguishes between processes critical for business survival and those critical to crisis support and is coordinated with the company’s disaster recovery planning for its computer centers. Business managers and information technology specialists need to work together on both types of plans to determine which systems and business processes are most critical to the company. They must conduct a business impact analysis to identify the firm’s most critical systems and the impact a systems outage would have on the business. Management must determine the maximum amount of time the business can survive with its systems down and which parts of the business must be restored first. THE ROLE OF AUDITING How does management know that information systems security and controls are effective? To answer this question, organizations must conduct comprehensive and systematic audits. An MIS audit examines the firm’s overall security environment as well as controls governing individual information systems. The auditor should trace the flow of sample transactions through the system and perform tests, using, if appropriate, automated audit software. The MIS audit may also examine data quality. Security audits review technologies, procedures, documentation, training, and personnel. A thorough audit will even simulate an attack or disaster to test the response of the technology, information systems staff, and business employees. The audit lists and ranks all control weaknesses and estimates the probability of their occurrence. It then assesses the financial and organizational impact of each threat. Figure 8-4 is a sample auditor’s listing of control weaknesses for a loan system. It includes a section for notifying management of such weaknesses and for management’s response. Management is expected to devise a plan for countering significant weaknesses in controls. 8.4 TECHNOLOGIES AND TOOLS FOR PROTECTING INFORMATION RESOURCES Businesses have an array of technologies for protecting their information resources. They include tools for managing user identities, preventing unauthorized access to systems and data, ensuring system availability, and ensuring software quality. IDENTITY MANAGEMENT AND AUTHENTICATION Large and midsize companies have complex IT infrastructures and many different systems, each with its own set of users. Identity management software automates the process of keeping track of all these users and their system privileges, assigning each user a unique digital identity for accessing each system. It also includes tools for authenticating users, protecting user identities, and controlling access to system resources. To gain access to a system, a user must be authorized and authenticated. Authentication refers to the ability to know that a person is who he or she Chapter 10 E-commerce: Digital Markets, Digital Goods 10.1 E-COMMERCE AND THE INTERNET H ave you ever purchased music over the Web or streamed a movie? Have you ever used the Web to search for information about your sneakers before you bought them in a retail store? If so, you’ve participated in e-commerce. In 2010, 133 million adult Americans bought something online, as did millions of others worldwide. And although most purchases still take place through traditional channels, e-commerce continues to grow rapidly and to transform the way many companies do business. In 2010, e-commerce represents about 6 percent of all retail sales in the United States, and is growing at 12 percent annually (eMarketer, 2010a). E-COMMERCE TODAY E-commerce refers to the use of the Internet and the Web to transact business. More formally, e-commerce is about digitally enabled commercial transactions between and among organizations and individuals. For the most part, this means transactions that occur over the Internet and the Web. Commercial transactions involve the exchange of value (e.g., money) across organizational or individual boundaries in return for products and services. E-commerce began in 1995 when one of the first Internet portals, Netscape.com, accepted the first ads from major corporations and popularized the idea that the Web could be used as a new medium for advertising and sales. No one envisioned at the time what would turn out to be an exponential growth curve for e-commerce retail sales, which doubled and tripled in the early years. E-commerce grew at double-digit rates until the recession of 2008–2009 when growth slowed to a crawl. In 2009, e-commerce revenues were flat (Figure 10-1), not bad considering that traditional retail sales were shrinking by 5 percent annually. In fact, e-commerce during the recession was the only stable segment in retail. Some online retailers forged ahead at a record pace: Amazon’s 2009 revenues were up 25 percent over 2008 sales. Despite the recession, in 2010, the FIGURE 10-1 THE GROWTH OF E-COMMERCE Retail e-commerce revenues grew 15–25 percent per year until the recession of 2008–2009, when they slowed measurably. In 2010, e-commerce revenues are growing again at an estimated 12 percent annually. 373 374 Part Three Key System Applications for the Digital Age number of online buyers increased by 6 percent to 133 million, and the average annual purchase is up 5 percent to $1,139. Amazon’s sales grew by 28 percent in the year. Mirroring the history of many technological innovations, such as the telephone, radio, and television, the very rapid growth in e-commerce in the early years created a market bubble in e-commerce stocks. Like all bubbles, the “dot-com” bubble burst (in March 2001). A large number of e-commerce companies failed during this process. Yet for many others, such as Amazon, eBay, Expedia, and Google, the results have been more positive: soaring revenues, fine-tuned business models that produce profits, and rising stock prices. By 2006, e-commerce revenues returned to solid growth, and have continued to be the fastest growing form of retail trade in the United States, Europe, and Asia. • Online consumer sales grew to an estimated $225 billion in 2010, an increase of more than 12 percent over 2009 (including travel services and digital downloads), with 133 million people purchasing online and 162 million shopping and gathering information but not necessarily purchasing (eMarketer, 2010a). • The number of individuals of all ages online in the United States expanded to 221 million in 2010, up from 147 million in 2004. In the world, over 1.9 billion people are now connected to the Internet. Growth in the overall Internet population has spurred growth in e-commerce (eMarketer, 2010b). • Approximately 80 million households have broadband access to the Internet in 2010, representing about 68 percent of all households. • About 83 million Americans now access the Internet using a smartphone such as an iPhone, Droid, or BlackBerry. Mobile e-commerce has begun a rapid growth based on apps, ring tones, downloaded entertainment, and location-based services. In a few years, mobile phones will be the most common Internet access device. • On an average day, an estimated 128 million adult U.S. Internet users go online. About 102 million send e-mail, 81 million use a search engine, and 71 million get news. Around 63 million use a social network, 43 million do online banking, 38 million watch an online video, and 28 million look for information on Wikipedia (Pew Internet & American Life Project, 2010). • B2B e-commerce-use of the Internet for business-to-business commerce and collaboration among business partners expanded to more than $3.6 trillion. The e-commerce revolution is still unfolding. Individuals and businesses will increasingly use the Internet to conduct commerce as more products and services come online and households switch to broadband telecommunications. More industries will be transformed by e-commerce, including travel reservations, music and entertainment, news, software, education, and finance. Table 10-1 highlights these new e-commerce developments. WHY E-COMMERCE IS DIFFERENT Why has e-commerce grown so rapidly? The answer lies in the unique nature of the Internet and the Web. Simply put, the Internet and e-commerce technologies are much more rich and powerful than previous technology revolutions like radio, television, and the telephone. Table 10-2 describes the unique features of the Internet and Web as a commercial medium. Let’s explore each of these unique features in more detail. Ubiquity In traditional commerce, a marketplace is a physical place, such as a retail store, that you visit to transact business. E-commerce is ubiquitous, meaning Chapter 10 E-commerce: Digital Markets, Digital Goods TABLE 10-1 THE GROWTH OF E-COMMERCE BUSINESS TRANSFORMATION • E-commerce remains the fastest growing form of commerce when compared to physical retail stores, services, and entertainment. • The first wave of e-commerce transformed the business world of books, music, and air travel. In the second wave, nine new industries are facing a similar transformation scenario: marketing and advertising, telecommunications, movies, television, jewelry and luxury goods, real estate, online travel, bill payments, and software. • The breadth of e-commerce offerings grows, especially in the services economy of social networking, travel, information clearinghouses, entertainment, retail apparel, appliances, and home furnishings. • The online demographics of shoppers broaden to match that of ordinary shoppers. • Pure e-commerce business models are refined further to achieve higher levels of profitability, whereas traditional retail brands, such as Sears, JCPenney, L.L.Bean, and Walmart, use e-commerce to retain their dominant retail positions. • Small businesses and entrepreneurs continue to flood the e-commerce marketplace, often riding on the infrastructures created by industry giants, such as Amazon, Apple, and Google, and increasingly taking advantage of cloud-based computing resources. • Mobile e-commerce begins to take off in the United States with location-based services and entertainment downloads including e-books. TECHNOLOGY FOUNDATIONS • Wireless Internet connections (Wi-Fi, WiMax, and 3G/4G smart phones) grow rapidly. • Powerful handheld mobile devices support music, Web surfing, and entertainment as well as voice communication. Podcasting and streaming take off as mediums for distribution of video, radio, and user-generated content. • The Internet broadband foundation becomes stronger in households and businesses as transmission prices fall. More than 80 million households had broadband cable or DSL access to the Internet in 2010 ,about 68 percent of all households in the United States (eMarketer, 2010a). • Social networking software and sites such as Facebook, MySpace, Twitter, LinkedIn, and thousands of others become a major new platform for e-commerce, marketing, and advertising. Facebook hits 500 million users worldwide, and 180 million in the United States (comScore, 2010). • New Internet-based models of computing, such as cloud computing, software as a service (SaaS), and Web 2.0 software greatly reduce the cost of e-commerce Web sites. NEW BUSINESS MODELS EMERGE • More than half the Internet user population have joined an online social network, contribute to social bookmarking sites, create blogs, and share photos. Together these sites create a massive online audience as large as television that is attractive to marketers. • The traditional advertising business model is severely disrupted as Google and other technology players such as Microsoft and Yahoo! seek to dominate online advertising, and expand into offline ad brokerage for television and newspapers. • Newspapers and other traditional media adopt online, interactive models but are losing advertising revenues to the online players despite gaining online readers. • Online entertainment business models offering television, movies, music, sports, and e-books surge, with cooperation among the major copyright owners in Hollywood and New York with the Internet distributors like Google, YouTube, Facebook, and Microsoft. that is it available just about everywhere, at all times. It makes it possible to shop from your desktop, at home, at work, or even from your car, using mobile commerce. The result is called a marketspace—a marketplace extended beyond traditional boundaries and removed from a temporal and geographic location. 375 376 Part Three Key System Applications for the Digital Age TABLE 10-2 EIGHT UNIQUE FEATURES OF E-COMMERCE TECHNOLOGY E-commerce Technology Dimension Business Significance Ubiquity. Internet/Web technology is available everywhere: at work, at home, and elsewhere via mobile devices. The marketplace is extended beyond traditional boundaries and is removed from a temporal and geographic location. “Marketspace” anytime, is created; shopping can take place anywhere. Customer convenience is enhanced, and shopping costs are reduced. Global reach. The technology reaches across national boundaries, around the Earth. Commerce is enabled across cultural and national boundaries seamlessly and without modification. The marketspace includes, potentially, billions of consumers and millions of businesses worldwide. Universal standards. There is one set of technology standards, namely Internet standards. With one set of technical standards across the globe, disparate computer systems can easily communicate with each other. Richness. Video, audio, and text messages are possible. Video, audio, and text marketing messages are integrated into a single marketing message and consumer experience. Interactivity. The technology works through interaction with the user. Consumers are engaged in a dialog that dynamically adjusts the experience to the individual, and makes the consumer a co-participant in the process of delivering goods to the market. Information Density. The technology reduces information costs and raises quality. Information processing, storage, and communication costs drop dramatically, whereas currency, accuracy, and timeliness improve greatly. Information becomes plentiful, cheap, and more accurate. Personalization/Customization. The technology allows personalized messages to be delivered to individuals as well as groups. Personalization of marketing messages and customization of products and services are based on individual characteristics. Social technology. User content generation and social networking. New Internet social and business models enable user content creation and distribution, and support social networks. From a consumer point of view, ubiquity reduces transaction costs—the costs of participating in a market. To transact business, it is no longer necessary that you spend time or money traveling to a market, and much less mental effort is required to make a purchase. Global Reach E-commerce technology permits commercial transactions to cross cultural and national boundaries far more conveniently and cost effectively than is true in traditional commerce. As a result, the potential market size for e-commerce merchants is roughly equal to the size of the world’s online population (estimated to be more than 1.9 billion, and growing rapidly) (Internetworldstats.com, 2010). In contrast, most traditional commerce is local or regional—it involves local merchants or national merchants with local outlets. Television and radio stations and newspapers, for instance, are primarily local and regional institutions with limited, but powerful, national networks that can attract a national audience but not easily cross national boundaries to a global audience. Chapter 10 E-commerce: Digital Markets, Digital Goods Universal Standards One strikingly unusual feature of e-commerce technologies is that the technical standards of the Internet and, therefore, the technical standards for conducting e-commerce are universal standards. They are shared by all nations around the world and enable any computer to link with any other computer regardless of the technology platform each is using. In contrast, most traditional commerce technologies differ from one nation to the next. For instance, television and radio standards differ around the world, as does cell telephone technology. The universal technical standards of the Internet and e-commerce greatly lower market entry costs—the cost merchants must pay simply to bring their goods to market. At the same time, for consumers, universal standards reduce search costs—the effort required to find suitable products. Richness Information richness refers to the complexity and content of a message. Traditional markets, national sales forces, and small retail stores have great richness: They are able to provide personal, face-to-face service using aural and visual cues when making a sale. The richness of traditional markets makes them powerful selling or commercial environments. Prior to the development of the Web, there was a trade-off between richness and reach: The larger the audience reached, the less rich the message. The Web makes it possible to deliver rich messages with text, audio, and video simultaneously to large numbers of people. Interactivity Unlike any of the commercial technologies of the twentieth century, with the possible exception of the telephone, e-commerce technologies are interactive, meaning they allow for two-way communication between merchant and consumer. Television, for instance, cannot ask viewers any questions or enter into conversations with them, and it cannot request that customer information be entered into a form. In contrast, all of these activities are possible on an e-commerce Web site. Interactivity allows an online merchant to engage a consumer in ways similar to a face-to-face experience but on a massive, global scale. Information Density The Internet and the Web vastly increase information density—the total amount and quality of information available to all market participants, consumers, and merchants alike. E-commerce technologies reduce information collection, storage, processing, and communication costs while greatly increasing the currency, accuracy, and timeliness of information. Information density in e-commerce markets make prices and costs more transparent. Price transparency refers to the ease with which consumers can find out the variety of prices in a market; cost transparency refers to the ability of consumers to discover the actual costs merchants pay for products. There are advantages for merchants as well. Online merchants can discover much more about consumers than in the past. This allows merchants to segment the market into groups that are willing to pay different prices and permits the merchants to engage in price discrimination—selling the same goods, or nearly the same goods, to different targeted groups at different prices. For instance, an online merchant can discover a consumer’s avid interest in expensive, exotic vacations and then pitch high-end vacation plans to that consumer at a premium price, knowing this person is willing to pay extra for 377 378 Part Three Key System Applications for the Digital Age such a vacation. At the same time, the online merchant can pitch the same vacation plan at a lower price to a more price-sensitive consumer. Information density also helps merchants differentiate their products in terms of cost, brand, and quality. Personalization/Customization E-commerce technologies permit personalization: Merchants can target their marketing messages to specific individuals by adjusting the message to a person’s name, interests, and past purchases. The technology also permits customization—changing the delivered product or service based on a user’s preferences or prior behavior. Given the interactive nature of e-commerce technology, much information about the consumer can be gathered in the marketplace at the moment of purchase. With the increase in information density, a great deal of information about the consumer’s past purchases and behavior can be stored and used by online merchants. The result is a level of personalization and customization unthinkable with traditional commerce technologies. For instance, you may be able to shape what you see on television by selecting a channel, but you cannot change the content of the channel you have chosen. In contrast, the Wall Street Journal Online allows you to select the type of news stories you want to see first and gives you the opportunity to be alerted when certain events happen. S o c i a l Te c h n o l o g y : U s e r C o n t e n t G e n e r a t i o n a n d S o c i a l Networking In contrast to previous technologies, the Internet and e-commerce technologies have evolved to be much more social by allowing users to create and share with their personal friends (and a larger worldwide community) content in the form of text, videos, music, or photos. Using these forms of communication, users are able to create new social networks and strengthen existing ones. All previous mass media in modern history, including the printing press, use a broadcast model (one-to-many) where content is created in a central location by experts (professional writers, editors, directors, and producers) and audiences are concentrated in huge numbers to consume a standardized product. The new Internet and e-commerce empower users to create and distribute content on a large scale, and permit users to program their own content consumption. The Internet provides a unique many-to-many model of mass communications. KEY CONCEPTS IN E-COMMERCE: DIGITAL MARKETS AND DIGITAL GOODS IN A GLOBAL MARKETPLACE The location, timing, and revenue models of business are based in some part on the cost and distribution of information. The Internet has created a digital marketplace where millions of people all over the world are able to exchange massive amounts of information directly, instantly, and for free. As a result, the Internet has changed the way companies conduct business and increased their global reach. The Internet reduces information asymmetry. An information asymmetry exists when one party in a transaction has more information that is important for the transaction than the other party. That information helps determine their relative bargaining power. In digital markets, consumers and suppliers can “see” the prices being charged for goods, and in that sense digital markets are said to be more “transparent” than traditional markets. Chapter 10 E-commerce: Digital Markets, Digital Goods For example, before auto retailing sites appeared on the Web, there was a significant information asymmetry between auto dealers and customers. Only the auto dealers knew the manufacturers’ prices, and it was difficult for consumers to shop around for the best price. Auto dealers’ profit margins depended on this asymmetry of information. Today’s consumers have access to a legion of Web sites providing competitive pricing information, and threefourths of U.S. auto buyers use the Internet to shop around for the best deal. Thus, the Web has reduced the information asymmetry surrounding an auto purchase. The Internet has also helped businesses seeking to purchase from other businesses reduce information asymmetries and locate better prices and terms. Digital markets are very flexible and efficient because they operate with reduced search and transaction costs, lower menu costs (merchants’ costs of changing prices), greater price discrimination, and the ability to change prices dynamically based on market conditions. In dynamic pricing, the price of a product varies depending on the demand characteristics of the customer or the supply situation of the seller. These new digital markets may either reduce or increase switching costs, depending on the nature of the product or service being sold, and they may cause some extra delay in gratification. Unlike a physical market, you can’t immediately consume a product such as clothing purchased over the Web (although immediate consumption is possible with digital music downloads and other digital products.) Digital markets provide many opportunities to sell directly to the consumer, bypassing intermediaries, such as distributors or retail outlets. Eliminating intermediaries in the distribution channel can significantly lower purchase transaction costs. To pay for all the steps in a traditional distribution channel, a product may have to be priced as high as 135 percent of its original cost to manufacture. Figure 10-2 illustrates how much savings result from eliminating each of these layers in the distribution process. By selling directly to consumers or reducing the number of intermediaries, companies are able to raise profits while charging lower prices. The removal of organizations or business process layers responsible for intermediary steps in a value chain is called disintermediation. FIGURE 10-2 THE BENEFITS OF DISINTERMEDIATION TO THE CONSUMER The typical distribution channel has several intermediary layers, each of which adds to the final cost of a product, such as a sweater. Removing layers lowers the final cost to the consumer. 379 380 Part Three Key System Applications for the Digital Age Disintermediation is affecting the market for services. Airlines and hotels operating their own reservation sites online earn more per ticket because they have eliminated travel agents as intermediaries. Table 10-3 summarizes the differences between digital markets and traditional markets. Digital Goods The Internet digital marketplace has greatly expanded sales of digital goods. Digital goods are goods that can be delivered over a digital network. Music tracks, video, Hollywood movies, software, newspapers, magazines, and books can all be expressed, stored, delivered, and sold as purely digital products. Currently, most of these products are sold as physical goods, for example, CDs, DVDs, newspapers, and hard-copy books. But the Internet offers the possibility of delivering all these products on demand as digital products. In general, for digital goods, the marginal cost of producing another unit is about zero (it costs nothing to make a copy of a music file). However, the cost of producing the original first unit is relatively high—in fact, it is nearly the total cost of the product because there are few other costs of inventory and distribution. Costs of delivery over the Internet are very low, marketing costs remain the same, and pricing can be highly variable. (On the Internet, the merchant can change prices as often as desired because of low menu costs.) The impact of the Internet on the market for these kinds of digital goods is nothing short of revolutionary, and we see the results around us every day. Businesses dependent on physical products for sales—such as bookstores, book publishers, music labels, and film studios—face the possibility of declining sales and even destruction of their businesses. Newspapers and magazines are losing readers to the Internet, and losing advertisers even as online newspaper readership soars. Record label companies are losing sales to music download sites and Internet piracy, and music stores are going out of business. Video rental firms, such as Blockbuster (now in bankruptcy), based on a physical DVD market and physical stores, lost sales to Netflix using an Internet catalog and streaming video model. Hollywood studios as well face the prospect that Internet pirates will distribute their product as a digital stream, bypassing Hollywood’s monopoly on DVD rentals and sales, which TABLE 10-3 DIGITAL MARKETS COMPARED TO TRADITIONAL MARKETS DIGITAL MARKETS TRADITIONAL MARKETS Information asymmetry Asymmetry reduced Asymmetry high Search costs Low High Transaction costs Low (sometimes virtually nothing) High (time, travel) Delayed gratification High (or lower in the case of a digital good) Lower: purchase now Menu costs Low High Dynamic pricing Low cost, instant High cost, delayed Price discrimination Low cost, instant High cost, delayed Market segmentation Low cost, moderate precision High cost, less precision Switching costs Higher/lower (depending on product characteristics) High Network effects Strong Weaker Disintermediation More possible/likely Less possible/unlikely Chapter 10 E-commerce: Digital Markets, Digital Goods now accounts for more than half of industry film revenues. To date, pirated movies have not seriously threatened Hollywood revenues in part because the major film studios and Internet distributors like YouTube, Amazon, and Apple are learning how to cooperate. Table 10.4 describes digital goods and how they differ from traditional physical goods. 10.2 E-COMMERCE: BUSINESS AND TECHNOLOGY E-commerce has grown from a few advertisements on early Web portals in 1995, to over 6 percent of all retail sales in 2010 (an estimated $255 billion), surpassing the mail order catalog business. E-commerce is a fascinating combination of business models and new information technologies. Let’s start with a basic understanding of the types of e-commerce, and then describe e-commerce business and revenue models. We’ll also cover new technologies that help companies reach over 221 million online consumers in the United States, and an estimated 800 million more worldwide. TYPES OF E-COMMERCE There are many ways to classify electronic commerce transactions. One is by looking at the nature of the participants in the electronic commerce transaction. The three major electronic commerce categories are business-to-consumer (B2C) e-commerce, business-to-business (B2B) e-commerce, and consumer-toconsumer (C2C) e-commerce. • Business-to-consumer (B2C) electronic commerce involves retailing products and services to individual shoppers. BarnesandNoble.com, which sells books, software, and music to individual consumers, is an example of B2C e-commerce. • Business-to-business (B2B) electronic commerce involves sales of goods and services among businesses. ChemConnect’s Web site for buying and selling chemicals and plastics is an example of B2B e-commerce. • Consumer-to-consumer (C2C) electronic commerce involves consumers selling directly to consumers. For example, eBay, the giant Web auction site, enables people to sell their goods to other consumers by auctioning their merchandise off to the highest bidder, or for a fixed price. Craigslist is the most widely used platform used by consumers to buy from and sell directly to others. TABLE 10-4 HOW THE INTERNET CHANGES THE MARKETS FOR DIGITAL GOODS Marginal cost/unit DIGITAL GOODS TRADITIONAL GOODS Zero Greater than zero , high Cost of production High (most of the cost) Variable Copying cost Approximately 0 Greater than zero, high Distributed delivery cost Low High Inventory cost Low High Marketing cost Variable Variable Pricing More variable (bundling, random pricing games) Fixed, based on unit costs 381 382 Part Three Key System Applications for the Digital Age Another way of classifying electronic commerce transactions is in terms of the platforms used by participants in a transaction. Until recently, most e-commerce transactions took place using a personal computer connected to the Internet over wired networks. Two wireless mobile alternatives have emerged: smartphones and dedicated e-readers like the Kindle using cellular networks, and smartphones and small tablet computers using Wi-Fi wireless networks. The use of handheld wireless devices for purchasing goods and services from any location is termed mobile commerce or m-commerce. Both business-to-business and business-to-consumer e-commerce transactions can take place using m-commerce technology, which we discuss in detail in Section 10.3. E-COMMERCE BUSINESS MODELS Changes in the economics of information described earlier have created the conditions for entirely new business models to appear, while destroying older business models. Table 10-5 describes some of the most important Internet business models that have emerged. All, in one way or another, use the Internet to add extra value to existing products and services or to provide the foundation for new products and services. Portal Portals such as Google, Bing, Yahoo, MSN, and AOL offer powerful Web search tools as well as an integrated package of content and services, such as news, e-mail, instant messaging, maps, calendars, shopping, music downloads, video streaming, and more, all in one place. Initially, portals were primarily “gateways” to the Internet. Today, however, the portal business model provides a destination site where users start their Web searching and linger to read news, find entertainment, and meet other people, and be exposed to advertising. Portals generate revenue primarily by attracting very large audiences, charging advertisers for ad placement, collecting referral fees for steering customers to other sites, and charging for premium services. In 2010, portals generated an estimated $13.5 billion in revenues. Although there are hundreds of portal/search engine sites, the top five sites (Google, Yahoo, MSN/Bing, AOL, and Ask.com) gather more than 95 percent of the Internet traffic because of their superior brand recognition (eMarketer, 2010e). E-tailer Online retail stores, often called e-tailers, come in all sizes, from giant Amazon with 2010 revenues of more than $24 billion, to tiny local stores that have Web sites. An e-tailer is similar to the typical bricks-and-mortar storefront, except that customers only need to connect to the Internet to check their inventory and place an order. Altogether, online retail generated about $152 billion in revenues for 2010. The value proposition of e-tailers is to provide convenient, low-cost shopping 24/7, offering large selections and consumer choice. Some e-tailers, such as Walmart.com or Staples.com, referred to as “bricks-and-clicks,” are subsidiaries or divisions of existing physical stores and carry the same products. Others, however, operate only in the virtual world, without any ties to physical locations. Amazon, BlueNile.com, and Drugstore.com are examples of this type of e-tailer. Several other variations of e-tailers—such as online versions of direct mail catalogs, online malls, and manufacturer-direct online sales—also exist. Chapter 10 E-commerce: Digital Markets, Digital Goods TABLE 10-5 INTERNET BUSINESS MODELS CATEGORY DESCRIPTION EXAMPLES E-tailer Sells physical products directly to consumers or to individual businesses. Amazon RedEnvelope.com Transaction broker Saves users money and time by processing online sales transactions and generating a fee each time a transaction occurs. ETrade.com Expedia Market creator Provides a digital environment where buyers and sellers can meet, search for products, display products, and establish prices for those products. Can serve consumers or B2B e-commerce, generating revenue from transaction fees. eBay Priceline.com ChemConnect.com Content provider Creates revenue by providing digital content, such as news, music, photos, or video, over the Web. The customer may pay to access the content, or revenue may be generated by selling advertising space. WSJ.com GettyImages.com iTunes.com Games.com Community provider Provides an online meeting place where people with similar interests can communicate and find useful information. Facebook MySpace iVillage , Twitter Portal Provides initial point of entry to the Web along with specialized content and other services. Yahoo Bing Google Service provider Provides Web 2.0 applications such as photo sharing, video sharing, and user-generated content as services. Provides other services such as online data storage and backup. Google Apps Photobucket.com Xdrive.com Content Provider While e-commerce began as a retail product channel, it has increasingly turned into a global content channel. “Content” is defined broadly to include all forms of intellectual property. Intellectual property refers to all forms of human expression that can be put into a tangible medium such as text, CDs, DVDs, or stored on any digital (or other) media, including the Web. Content providers distribute information content, such as digital video, music, photos, text, and artwork, over the Web. The value proposition of online content providers is that consumers can find a wide range of content online, conveniently, and purchase this content inexpensively, to be played, or viewed, on multiple computer devices or smartphones. Providers do not have to be the creators of the content (although sometimes they are, like Disney.com), and are more likely to be Internet-based distributors of content produced and created by others. For example, Apple sells music tracks at its iTunes Store, but it does not create or commission new music. The phenomenal popularity of the iTunes Store, and Apple’s Internetconnected devices like the iPhone, iPod, and iPad, have enabled new forms of digital content delivery from podcasting to mobile streaming. Podcasting is a method of publishing audio or video broadcasts via the Internet, allowing subscribing users to download audio or video files onto their personal computers or portable music players. Streaming is a publishing method for 383 384 Part Three Key System Applications for the Digital Age music and video files that flows a continuous stream of content to a user’s device without being stored locally on the device. Estimates vary, but total download and subscription media revenues for 2010 are somewhere between $8 billion and $10 billion annually. They are the fastest growing segment within e-commerce, growing at an estimated 20 percent annual rate (eMarketer, 2010b). Tr a n s a c t i o n B r o k e r Sites that process transactions for consumers normally handled in person, by phone, or by mail are transaction brokers. The largest industries using this model are financial services and travel services. The online transaction broker’s primary value propositions are savings of money and time, as well as providing an extraordinary inventory of financial products and travel packages, in a single location. Online stock brokers and travel booking services charge fees that are considerably less than traditional versions of these services. Market Creator Market creators build a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices. The value proposition of online market creators is that they provide a platform where sellers can easily display their wares and where purchasers can buy directly from sellers. Online auction markets like eBay and Priceline are good examples of the market creator business model. Another example is Amazon’s Merchants platform (and similar programs at eBay) where merchants are allowed to set up stores on Amazon’s Web site and sell goods at fixed prices to consumers. This is reminiscent of open air markets where the market creator operates a facility (a town square) where merchants and consumers meet. Online market creators will generate about $12 billion in revenues for 2010. Service Provider While e-tailers sell products online, service providers offer services online. There’s been an explosion in online services. Web 2.0 applications, photo sharing, and online sites for data backup and storage all use a service provider business model. Software is no longer a physical product with a CD in a box, but increasingly software as a service (SaaS) that you subscribe to online rather than purchase from a retailer (see Chapter 5). Google has led the way in developing online software service applications such as Google Apps, Gmail, and online data storage services. Community Provider Community providers are sites that create a digital online environment where people with similar interests can transact (buy and sell goods); share interests, photos, videos; communicate with like-minded people; receive interest-related information; and even play out fantasies by adopting online personalities called avatars. The social networking sites Facebook, MySpace, LinkedIn, and Twitter; online communities such as iVillage; and hundreds of other smaller, niche sites such as Doostang and Sportsvite all offer users community-building tools and services. Social networking sites have been the fastest growing Web sites in recent years, often doubling their audience size in a year. However, they are struggling to achieve profitability. The Interactive Session on Organizations explores this topic. Chapter 10 E-commerce: Digital Markets, Digital Goods CASE STUDY QUESTIONS 1. Based on your reading in this chapter, how would you characterize Twitter’s business model? 2. If Twitter is to have a revenue model, which of the revenue models described in this chapter would work? 3. What is the most important asset that Twitter has, and how could it monetize this asset? 4. What impact will a high customer churn rate have on Twitter’s potential advertising revenue? 387 MIS IN ACTION 1. Go to Twitter.com and enter a search on your favorite (or least favorite) car. Can you find the company’s official site? What else do you find? Describe the results and characterize the potential risks and rewards for companies that would like to advertise to Twitter’s audience. 2. How would you improve Twitter’s Web site to make it more friendly for large advertisers? 3. Teenagers are infrequent users of Twitter because they use their cell phones for texting, and most users are adults 18–34 years of age. Find five users of Twitter and ask them how long they have used the service, are they likely to continue using the service, and how would they feel about banner ads appearing on their Twitter Web screen and phone screens. Are loyal users of Twitter less likely (or more likely) to tolerate advertising on Twitter? E-COMMERCE REVENUE MODELS A firm’s revenue model describes how the firm will earn revenue, generate profits, and produce a superior return on investment. Although there are many different e-commerce revenue models that have been developed, most companies rely on one, or some combination, of the following six revenue models: advertising, sales, subscription, free/freemium, transaction fee, and affiliate. Advertising Revenue Model In the advertising revenue model, a Web site generates revenue by attracting a large audience of visitors who can then be exposed to advertisements. The advertising model is the most widely used revenue model in e-commerce, and arguably, without advertising revenues, the Web would be a vastly different experience from what it is now. Content on the Web—everything from news to videos and opinions—is “free” to visitors because advertisers pay the production and distribution costs in return for the right to expose visitors to ads. Companies will spend an estimated $240 billion on advertising in 2010, and an estimated $25 billion of that amount on online advertising (in the form of a paid message on a Web site, paid search listing, video, widget, game, or other online medium, such as instant messaging). In the last five years, advertisers have increased online spending and cut outlays on traditional channels such as radio and newspapers. Television advertising has expanded along with online advertising revenues. Web sites with the largest viewership or that attract a highly specialized, differentiated viewership and are able to retain user attention (“stickiness”) are able to charge higher advertising rates. Yahoo, for instance, derives nearly all its revenue from display ads (banner ads) and to a lesser extent search engine text ads. Ninety-eight percent of Google’s revenue derives from selling keywords to 388 Part Three Key System Applications for the Digital Age advertisers in an auction-like market (the AdSense program). The average Facebook user spends over five hours a week on the site, far longer than other portal sites. Sales Revenue Model In the sales revenue model, companies derive revenue by selling goods, information, or services to customers. Companies such as Amazon (which sells books, music, and other products), LLBean.com, and Gap.com, all have sales revenue models. Content providers make money by charging for downloads of entire files such as music tracks (iTunes Store) or books or for downloading music and/or video streams (Hulu.com TV shows—see Chapter 3). Apple has pioneered and strengthened the acceptance of micropayments. Micropayment systems provide content providers with a cost-effective method for processing high volumes of very small monetary transactions (anywhere from $.25 to $5.00 per transaction). MyMISlab has a Learning Track with more detail on micropayment and other e-commerce payment systems. Subscription Revenue Model In the subscription revenue model, a Web site offering content or services charges a subscription fee for access to some or all of its offerings on an ongoing basis. Content providers often use this revenue model. For instance, the online version of Consumer Reports provides access to premium content, such as detailed ratings, reviews, and recommendations, only to subscribers, who have a choice of paying a $5.95 monthly subscription fee or a $26.00 annual fee. Netflix is one of the most successful subscriber sites with more that 15 million subscribers in September 2010. The Wall Street Journal has the largest online subscription newspaper with more than 1 million online subscribers. To be successful, the subscription model requires that the content be perceived as a having high added value, differentiated, and not readily available elsewhere nor easily replicated. Companies successfully offering content or services online on a subscription basis include Match.com and eHarmony (dating services), Ancestry.com and Genealogy.com (genealogy research), Microsoft’s Xboxlive.com (video games), and Rhapsody.com (music). Free/Freemium Revenue Model In the free/freemium revenue model, firms offer basic services or content for free, while charging a premium for advanced or special features. For example, Google offers free applications, but charges for premium services. Pandora, the subscription radio service, offers a free service with limited play time, and a premium service with unlimited play. The Flickr photo-sharing service offers free basic services for sharing photos with friends and family, and also sells a $24.95 “premium” package that provides users unlimited storage, high-definition video storage and playback, and freedom from display advertising. The idea is to attract very large audiences with free services, and then to convert some of this audience to pay a subscription for premium services. One problem with this model is converting people from being “free loaders” into paying customers. “Free” can be a powerful model for losing money. Tr a n s a c t i o n Fe e R e v e n u e M o d e l In the transaction fee revenue model, a company receives a fee for enabling or executing a transaction. For example, eBay provides an online auction marketplace and receives a small transaction fee from a seller if the seller is successful in selling an item. E*Trade, an online stockbroker, receives transac- Chapter 10 E-commerce: Digital Markets, Digital Goods tion fees each time it executes a stock transaction on behalf of a customer. The transaction revenue model enjoys wide acceptance in part because the true cost of using the platform is not immediately apparent to the user. Affiliate Revenue Model In the affiliate revenue model, Web sites (called “affiliate Web sites”) send visitors to other Web sites in return for a referral fee or percentage of the revenue from any resulting sales. For example, MyPoints makes money by connecting companies to potential customers by offering special deals to its members. When members take advantage of an offer and make a purchase, they earn “points” they can redeem for free products and services, and MyPoints receives a referral fee. Community feedback sites such as Epinions and Yelp receive much of their revenue from steering potential customers to Web sites where they make a purchase. Amazon uses affiliates who steer business to the Amazon Web site by placing the Amazon logo on their blogs. Personal blogs may be involved in affiliate marketing. Some bloggers are paid directly by manufacturers, or receive free products, for speaking highly of products and providing links to sales channels. WEB 2.0: SOCIAL NETWORKING AND THE WISDOM OF CROWDS One of the fastest growing areas of e-commerce revenues are Web 2.0 online services, which we described in Chapter 7. The most popular Web 2.0 service is social networking, online meeting places where people can meet their friends and their friends’ friends. Every day over 60 million Internet users in the United States visit a social networking site like Facebook, MySpace, LinkedIn, and hundreds of others. Social networking sites link people through their mutual business or personal connections, enabling them to mine their friends (and their friends’ friends) for sales leads, job-hunting tips, or new friends. MySpace, Facebook, and Friendster appeal to people who are primarily interested in extending their friendships, while LinkedIn focuses on job networking for professionals. Social networking sites and online communities offer new possibilities for e-commerce. Networking sites like Facebook and MySpace sell banner, video, and text ads; sell user preference information to marketers; and sell products such as music, videos, and e-books. Corporations set up their own Facebook and MySpace profiles to interact with potential customers. For example, Procter & Gamble set up a MySpace profile page for Crest toothpaste soliciting “friends” for a fictional character called “Miss Irresistable.” Business firms can also “listen” to what social networkers are saying about their products, and obtain valuable feedback from consumers. At user-generated content sites like YouTube, high-quality video content is used to display advertising, and Hollywood studios have set up their own channels to market their products. The Interactive Session on Management looks more closely at social networking on Facebook, focusing on its impact on privacy. At social shopping sites like Kaboodle, ThisNext, and Stylehive you can swap shopping ideas with friends. Facebook offers this same service on a voluntary basis. Online communities are also ideal venues to employ viral marketing techniques. Online viral marketing is like traditional word-ofmouth marketing except that the word can spread across an online commu- 389 392 Part Three Key System Applications for the Digital Age argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts (Surowiecki, 2004). Obviously this is not always the case, but it can happen in interesting ways. In marketing, the wisdom of crowds concept suggests that firms should consult with thousands of their customers first as a way of establishing a relationship with them, and second, to better understand how their products and services are used and appreciated (or rejected). Actively soliciting the comments of your customers builds trust and sends the message to your customers that you care what they are thinking, and that you need their advice. Beyond merely soliciting advice, firms can be actively helped in solving some business problems using what is called crowdsourcing. For instance, in 2006, Netflix announced a contest in which it offered to pay $1 million to the person or team who comes up with a method for improving by 10 percent Netflix’s prediction of what movies customers would like as measured against their actual choices. By 2009, Netflix received 44,014 entries from 5,169 teams in 186 countries. The winning team improved a key part of Netflix’s business: a recommender system that recommends to its customers what new movies to order based on their personal past movie choices and the choices of millions of other customers who are like them (Howe, 2008; Resnick and Varian, 1997). Firms can also use the wisdom of crowds in the form of prediction markets. Prediction markets are established as peer-to-peer betting markets where participants make bets on specific outcomes of, say, quarterly sales of a new product, designs for new products, or political elections. The world’s largest commercial prediction market is Betfair, founded in 2000, where you bet for or against specific outcomes on football games, horse races, and whether or not the Dow Jones will go up or down in a single day. Iowa Electronic Markets (IEM) is an academic market focused on elections. You can place bets on the outcome of local and national elections. E-COMMERCE MARKETING While e-commerce and the Internet have changed entire industries and enable new business models, no industry has been more affected than marketing and marketing communications. The Internet provides marketers with new ways of identifying and communicating with millions of potential customers at costs far lower than traditional media, including search engine marketing, data mining, recommender systems, and targeted e-mail. The Internet enables long tail marketing. Before the Internet, reaching a large audience was very expensive, and marketers had to focus on attracting the largest number of consumers with popular hit products, whether music, Hollywood movies, books, or cars. In contrast, the Internet allows marketers to inexpensively find potential customers for which demand is very low, people on the far ends of the bell (normal) curve. For instance, the Internet makes it possible to sell independent music profitably to very small audiences. There’s always some demand for almost any product. Put a string of such long tail sales together and you have a profitable business. The Internet also provides new ways—often instantaneous and spontaneous—to gather information from customers, adjust product offerings, and increase customer value. Table 10-6 describes the leading marketing and advertising formats used in e-commerce. Many e-commerce marketing firms use behavioral targeting techniques to increase the effectiveness of banner, rich media, and video ads. Behavioral Chapter 10 E-commerce: Digital Markets, Digital Goods TABLE 10-6 ONLINE MARKETING AND ADVERTISING FORMATS (BILLIONS) MARKETING FORMAT 2010 REVENUE DESCRIPTION Search engine $12.3 Text ads targeted at precisely what the customer is looking for at the moment of shopping and purchasing. Sales oriented. Display ads $5.8 Banner ads (pop-ups and leave-behinds) with interactive features; increasingly behaviorally targeted to individual Web activity. Brand development and sales. Classified $1.9 Job, real estate, and services ads; interactive, rich media, and personalized to user searches. Sales and branding. Rich media $1.57 Animations, games, and puzzles. Interactive, targeted, and entertaining. Branding orientation. Affiliate and blog marketing $1.5 Blog and Web site marketing steers customers to parent sites; interactive, personal, and often with video. Sales orientation. Video $1.5 Fastest growing format, engaging and entertaining; behaviorally targeted, interactive. Branding and sales. Sponsorships E-mail $.4 $.27 Online games, puzzle, contests, and coupon sites sponsored by firms to promote products. Sales orientation. Effective, targeted marketing tool with interactive and rich media potential. Sales oriented. targeting refers to tracking the click-streams (history of clicking behavior) of individuals on thousands of Web sites for the purpose of understanding their interests and intentions, and exposing them to advertisements that are uniquely suited to their behavior. Proponents believe this more precise understanding of the customer leads to more efficient marketing (the firm pays for ads only to those shoppers who are most interested in their products) and larger sales and revenues. Unfortunately, behavioral targeting of millions of Web users also leads to the invasion of personal privacy without user consent (see our discussion in Chapter 4). When consumers lose trust in their Web experience, they tend not to purchase anything. Behavioral targeting takes place at two levels: at individual Web sites and on various advertising networks that track users across thousands of Web sites. All Web sites collect data on visitor browser activity and store it in a database. They have tools to record the site that users visited prior to coming to the Web site, where these users go when they leave that site, the type of operating system they use, browser information, and even some location data. They also record the specific pages visited on the particular site, the time spent on each page of the site, the types of pages visited, and what the visitors purchased (see Figure 10-3). Firms analyze this information about customer interests and behavior to develop precise profiles of existing and potential customers. This information enables firms to understand how well their Web site is working, create unique personalized Web pages that display content or ads for products or services of special interest to each user, improve the customer’s experience, and create additional value through a better understanding of the shopper (see Figure 10-4). By using personalization technology to modify the Web pages presented to each customer, marketers achieve some of the benefits of using individual salespeople at dramatically lower costs. For instance, 393 394 Part Three Key System Applications for the Digital Age FIGURE 10-3 WEB SITE VISITOR TRACKING E-commerce Web sites have tools to track a shopper’s every step through an online store. Close examination of customer behavior at a Web site selling women’s clothing shows what the store might learn at each step and what actions it could take to increase sales. General Motors will show a Chevrolet banner ad to women emphasizing safety and utility, while men will receive different ads emphasizing power and ruggedness. FIGURE 10-4 WEB SITE PERSONALIZATION Firms can create unique personalized Web pages that display content or ads for products or services of special interest to individual users, improving the customer experience and creating additional value. Chapter 10 E-commerce: Digital Markets, Digital Goods What if you are a large national advertising company with many different clients trying to reach millions of consumers? What if you were a large global manufacturer trying to reach potential consumers for your products? With millions of Web sites, working with each one would be impractical. Advertising networks solve this problem by creating a network of several thousand of the most popular Web sites visited by millions of people, tracking the behavior of these users across the entire network, building profiles of each user, and then selling these profiles to advertisers. Popular Web sites download dozens of Web tracking cookies, bugs, and beacons, which report user online behavior to remote servers without the users’ knowledge. Looking for young, single consumers, with college degrees, living in the Northeast, in the 18–34 age range who are interested purchasing a European car? Not a problem. Advertising networks can identify and deliver hundreds of thousands of people who fit this profile and expose them to ads for European cars as they move from one Web site to another. Estimates vary, but behaviorally targeted ads are 10 times more likely to produce a consumer response than a randomly chosen banner or video ad (see Figure 10-5). So-called advertising exchanges use this same technology to auction access to people with very specific profiles to advertisers in a few milliseconds. B2B E-COMMERCE: NEW EFFICIENCIES AND RELATIONSHIPS The trade between business firms (business-to-business commerce or B2B) represents a huge marketplace. The total amount of B2B trade in the United States in 2009 was about $12.2 trillion, with B2B e-commerce (online B2B) contributing about $3.6 trillion of that amount (U.S. Census Bureau, 2010; authors’ estimates). By 2014, B2B e-commerce should grow to about $5.1 trillion in the United States, assuming an average growth rate of about 7 percent. The process of conducting trade among business firms is complex and requires significant human interven- FIGURE 10-5 HOW AN ADVERTISING NETWORK SUCH AS DOUBLECLICK WORKS Advertising networks have become controversial among privacy advocates because of their ability to track individual consumers across the Internet. We discuss privacy issues further in Chapter 4. 395 396 Part Three Key System Applications for the Digital Age tion, and therefore, it consumes significant resources. Some firms estimate that each corporate purchase order for support products costs them, on average, at least $100 in administrative overhead. Administrative overhead includes processing paper, approving purchase decisions, spending time using the telephone and fax machines to search for products and arrange for purchases, arranging for shipping, and receiving the goods. Across the economy, this adds up to trillions of dollars annually being spent for procurement processes that could potentially be automated. If even just a portion of inter-firm trade were automated, and parts of the entire procurement process assisted by the Internet, literally trillions of dollars might be released for more productive uses, consumer prices potentially would fall, productivity would increase, and the economic wealth of the nation would expand. This is the promise of B2B e-commerce. The challenge of B2B e-commerce is changing existing patterns and systems of procurement, and designing and implementing new Internet-based B2B solutions. Business-to-business e-commerce refers to the commercial transactions that occur among business firms. Increasingly, these transactions are flowing through a variety of different Internet-enabled mechanisms. About 80 percent of online B2B e-commerce is still based on proprietary systems for electronic data interchange (EDI). Electronic data interchange enables the computer-tocomputer exchange between two organizations of standard transactions such as invoices, bills of lading, shipment schedules, or purchase orders. Transactions are automatically transmitted from one information system to another through a network, eliminating the printing and handling of paper at one end and the inputting of data at the other. Each major industry in the United States and much of the rest of the world has EDI standards that define the structure and information fields of electronic documents for that industry. EDI originally automated the exchange of documents such as purchase orders, invoices, and shipping notices. Although some companies still use EDI for document automation, firms engaged in just-in-time inventory replenishment and continuous production use EDI as a system for continuous replenishment. Suppliers have online access to selected parts of the purchasing firm’s production and delivery schedules and automatically ship materials and goods to meet prespecified targets without intervention by firm purchasing agents (see Figure 10-6). Although many organizations still use private networks for EDI, they are increasingly Web-enabled because Internet technology provides a much more flexible and low-cost platform for linking to other firms. Businesses are able to extend digital technology to a wider range of activities and broaden their circle of trading partners. FIGURE 10-6 ELECTRONIC DATA INTERCHANGE (EDI) Companies use EDI to automate transactions for B2B e-commerce and continuous inventory replenishment. Suppliers can automatically send data about shipments to purchasing firms. The purchasing firms can use EDI to provide production and inventory requirements and payment data to suppliers. Chapter 10 E-commerce: Digital Markets, Digital Goods Take procurement, for example. Procurement involves not only purchasing goods and materials but also sourcing, negotiating with suppliers, paying for goods, and making delivery arrangements. Businesses can now use the Internet to locate the lowest-cost supplier, search online catalogs of supplier products, negotiate with suppliers, place orders, make payments, and arrange transportation. They are not limited to partners linked by traditional EDI networks. The Internet and Web technology enable businesses to create new electronic storefronts for selling to other businesses with multimedia graphic displays and interactive features similar to those for B2C commerce. Alternatively, businesses can use Internet technology to create extranets or electronic marketplaces for linking to other businesses for purchase and sale transactions. Private industrial networks typically consist of a large firm using an extranet to link to its suppliers and other key business partners (see Figure 10-7). The network is owned by the buyer, and it permits the firm and designated suppliers, distributors, and other business partners to share product design and development, marketing, production scheduling, inventory management, and unstructured communication, including graphics and e-mail. Another term for a private industrial network is a private exchange. An example is VW Group Supply, which links the Volkswagen Group and its suppliers. VW Group Supply handles 90 percent of all global purchasing for Volkswagen, including all automotive and parts components. Net marketplaces, which are sometimes called e-hubs, provide a single, digital marketplace based on Internet technology for many different buyers and sellers (see Figure 10-8). They are industry owned or operate as independent intermediaries between buyers and sellers. Net marketplaces generate revenue from purchase and sale transactions and other services provided to clients. Participants in Net marketplaces can establish prices through online negotiations, auctions, or requests for quotations, or they can use fixed prices. FIGURE 10-7 A PRIVATE INDUSTRIAL NETWORK A private industrial network, also known as a private exchange, links a firm to its suppliers, distributors, and other key business partners for efficient supply chain management and other collaborative commerce activities. 397 398 Part Three Key System Applications for the Digital Age FIGURE 10-8 A NET MARKETPLACE Net marketplaces are online marketplaces where multiple buyers can purchase from multiple sellers. There are many different types of Net marketplaces and ways of classifying them. Some Net marketplaces sell direct goods and some sell indirect goods. Direct goods are goods used in a production process, such as sheet steel for auto body production. Indirect goods are all other goods not directly involved in the production process, such as office supplies or products for maintenance and repair. Some Net marketplaces support contractual purchasing based on longterm relationships with designated suppliers, and others support short-term spot purchasing, where goods are purchased based on immediate needs, often from many different suppliers. Some Net marketplaces serve vertical markets for specific industries, such as automobiles, telecommunications, or machine tools, whereas others serve horizontal markets for goods and services that can be found in many different industries, such as office equipment or transportation. Exostar is an example of an industry-owned Net marketplace, focusing on long-term contract purchasing relationships and on providing common networks and computing platforms for reducing supply chain inefficiencies. This aerospace and defense industry-sponsored Net marketplace was founded jointly by BAE Systems, Boeing, Lockheed Martin, Raytheon, and Rolls-Royce plc to connect these companies to their suppliers and facilitate collaboration. More than 16,000 trading partners in the commercial, military, and government sectors use Exostar’s sourcing, e-procurement, and collaboration tools for both direct and indirect goods. Elemica is another example of a Net marketplace serving the chemical industry. Exchanges are independently owned third-party Net marketplaces that connect thousands of suppliers and buyers for spot purchasing. Many exchanges provide vertical markets for a single industry, such as food, electronics, or industrial equipment, and they primarily deal with direct inputs. For example, Go2paper enables a spot market for paper, board, and kraft among buyers and sellers in the paper industries from over 75 countries. Exchanges proliferated during the early years of e-commerce but many have failed. Suppliers were reluctant to participate because the exchanges encour- Chapter 10 E-commerce: Digital Markets, Digital Goods aged competitive bidding that drove prices down and did not offer any long-term relationships with buyers or services to make lowering prices worthwhile. Many essential direct purchases are not conducted on a spot basis because they require contracts and consideration of issues such as delivery timing, customization, and quality of products. 10.3 THE MOBILE DIGITAL PLATFORM AND MOBILE E-COMMERCE Walk down the street in any major metropolitan area and count how many people are pecking away at their iPhones or BlackBerrys. Ride the trains, fly the planes, and you’ll see your fellow travelers reading an online newspaper, watching a video on their phone, or reading a novel on their Kindle. In five years, the majority of Internet users in the United States will rely on mobile devices as their primary device for accessing the Internet. M-commerce has taken off. In 2010, m-commerce represented less than 10 percent of all e-commerce, with about $5 billion in annual revenues generated by selling music, videos, ring tones, applications, movies, television, and location-based services like local restaurant locators and traffic updates. However, m-commerce is the fastest growing form of e-commerce, with some areas expanding at a rate of 50 percent or more per year, and is estimated to grow to $19 billion in 2014 (see Figure 10-9). In 2010, there were an estimated 5 billion cell phone subscribers worldwide, with over 855 million in China and 300 million in the United States (eMarketer, 2010d). M-COMMERCE SERVICES AND APPLICATIONS The main areas of growth in mobile e-commerce are location-based services, about $215 million in revenue in 2010; software application sales at stores such as iTunes (about $1.8 billion); entertainment downloads of ring tones, music, video, and TV shows (about $1 billion); mobile display advertising ($784 million); direct shopping services such as Slifter ($200 million); and e-book sales ($338 million). FIGURE 10-9 CONSOLIDATED MOBILE COMMERCE REVENUES Mobile e-commerce is the fastest growing type of B2C e-commerce although it represents only a small part of all e-commerce in 2010. 399 Chapter 12 Enhancing Decision Making 455 12.1 DECISION MAKING AND INFORMATION SYSTEMS D ecision making in businesses used to be limited to management. Today, lower-level employees are responsible for some of these decisions, as information systems make information available to lower levels of the business. But what do we mean by better decision making? How does decision making take place in businesses and other organizations? Let’s take a closer look. BUSINESS VALUE OF IMPROVED DECISION MAKING What does it mean to the business to make better decisions? What is the monetary value of improved decision making? Table 12-1 attempts to measure the monetary value of improved decision making for a small U.S. manufacturing firm with $280 million in annual revenue and 140 employees. The firm has identified a number of key decisions where new system investments might improve the quality of decision making. The table provides selected estimates of annual value (in the form of cost savings or increased revenue) from improved decision making in selected areas of the business. We can see from Table 12-1 that decisions are made at all levels of the firm and that some of these decisions are common, routine, and numerous. Although the value of improving any single decision may be small, improving hundreds of thousands of “small” decisions adds up to a large annual value for the business. TYPES OF DECISIONS Chapters 1 and 2 showed that there are different levels in an organization. Each of these levels has different information requirements for decision support and responsibility for different types of decisions (see Figure 12-1). Decisions are classified as structured, semistructured, and unstructured. TABLE 12-1 BUSINESS VALUE OF ENHANCED DECISION MAKING ESTIMATED VALUE TO FIRM OF A SINGLE IMPROVED DECISION ANNUAL VAUE 12 $ 100,000 $1,200,000 4 150,000 600,000 365 5,000 1,825,000 1 2,000,000 2,000,000 NUMBER OF ANNUAL DECISIONS EXAMPLE DECISION DECISION MAKER Allocate support to most valuable customers Accounts manager Predict call center daily demand Call center management Decide parts inventory levels daily Inventory manager Identify competitive bids from major suppliers Senior management Schedule production to fill orders Manufacturing manager 150 10,000 1,500,000 Allocate labor to complete a job Production floor manager 100 4,000 400,000 456 Part Three Key System Applications for the Digital Age FIGURE 12-1 INFORMATION REQUIREMENTS OF KEY DECISION-MAKING GROUPS IN A FIRM Senior managers, middle managers, operational managers, and employees have different types of decisions and information requirements. Unstructured decisions are those in which the decision maker must provide judgment, evaluation, and insight to solve the problem. Each of these decisions is novel, important, and nonroutine, and there is no well-understood or agreed-on procedure for making them. Structured decisions, by contrast, are repetitive and routine, and they involve a definite procedure for handling them so that they do not have to be treated each time as if they were new. Many decisions have elements of both types of decisions and are semistructured, where only part of the problem has a clear-cut answer provided by an accepted procedure. In general, structured decisions are more prevalent at lower organizational levels, whereas unstructured problems are more common at higher levels of the firm. Senior executives face many unstructured decision situations, such as establishing the firm’s five- or ten-year goals or deciding new markets to enter. Answering the question “Should we enter a new market?” would require access to news, government reports, and industry views as well as high-level summaries of firm performance. However, the answer would also require senior managers to use their own best judgment and poll other managers for their opinions. Middle management faces more structured decision scenarios but their decisions may include unstructured components. A typical middle-level management decision might be “Why is the reported order fulfillment report showing a decline over the past six months at a distribution center in Minneapolis?” This middle manager will obtain a report from the firm’s enterprise system or distribution management system on order activity and operational efficiency at the Minneapolis distribution center. This is the structured part of the decision. But before arriving at an answer, this middle manager will have to interview employees and gather more unstructured information from external sources about local economic conditions or sales trends. Chapter 12 Enhancing Decision Making Operational management and rank-and-file employees tend to make more structured decisions. For example, a supervisor on an assembly line has to decide whether an hourly paid worker is entitled to overtime pay. If the employee worked more than eight hours on a particular day, the supervisor would routinely grant overtime pay for any time beyond eight hours that was clocked on that day. A sales account representative often has to make decisions about extending credit to customers by consulting the firm’s customer database that contains credit information. If the customer met the firm’s prespecified criteria for granting credit, the account representative would grant that customer credit to make a purchase. In both instances, the decisions are highly structured and are routinely made thousands of times each day in most large firms. The answer has been preprogrammed into the firm’s payroll and accounts receivable systems. THE DECISION-MAKING PROCESS Making a decision is a multistep process. Simon (1960) described four different stages in decision making: intelligence, design, choice, and implementation (see Figure 12-2). FIGURE 12-2 STAGES IN DECISION MAKING The decision-making process is broken down into four stages. 457 458 Part Three Key System Applications for the Digital Age Intelligence consists of discovering, identifying, and understanding the problems occurring in the organization—why a problem exists, where, and what effects it is having on the firm. Design involves identifying and exploring various solutions to the problem. Choice consists of choosing among solution alternatives. Implementation involves making the chosen alternative work and continuing to monitor how well the solution is working. What happens if the solution you have chosen doesn’t work? Figure 12-2 shows that you can return to an earlier stage in the decision-making process and repeat it if necessary. For instance, in the face of declining sales, a sales management team may decide to pay the sales force a higher commission for making more sales to spur on the sales effort. If this does not produce sales increases, managers would need to investigate whether the problem stems from poor product design, inadequate customer support, or a host of other causes that call for a different solution. MANAGERS AND DECISION MAKING IN THE REAL WORLD The premise of this book and this chapter is that systems to support decision making produce better decision making by managers and employees, above average returns on investment for the firm, and ultimately higher profitability. However, information systems cannot improve all the different kinds of decisions taking place in an organization. Let’s examine the role of managers and decision making in organizations to see why this is so. M a n a g e r i a l Ro l e s Managers play key roles in organizations. Their responsibilities range from making decisions, to writing reports, to attending meetings, to arranging birthday parties. We are able to better understand managerial functions and roles by examining classical and contemporary models of managerial behavior. The classical model of management, which describes what managers do, was largely unquestioned for the more than 70 years since the 1920s. Henri Fayol and other early writers first described the five classical functions of managers as planning, organizing, coordinating, deciding, and controlling. This description of management activities dominated management thought for a long time, and it is still popular today. The classical model describes formal managerial functions but does not address what exactly managers do when they plan, decide things, and control the work of others. For this, we must turn to the work of contemporary behavioral scientists who have studied managers in daily action. Behavioral models state that the actual behavior of managers appears to be less systematic, more informal, less reflective, more reactive, and less well organized than the classical model would have us believe. Observers find that managerial behavior actually has five attributes that differ greatly from the classical description. First, managers perform a great deal of work at an unrelenting pace—studies have found that managers engage in more than 600 different activities each day, with no break in their pace. Second, managerial activities are fragmented; most activities last for less than nine minutes, and only 10 percent of the activities exceed one hour in duration. Third, managers prefer current, specific, and ad hoc information (printed information often will be too old). Fourth, they prefer oral forms of Chapter 12 Enhancing Decision Making communication to written forms because oral media provide greater flexibility, require less effort, and bring a faster response. Fifth, managers give high priority to maintaining a diverse and complex web of contacts that acts as an informal information system and helps them execute their personal agendas and short- and long-term goals. Analyzing managers’ day-to-day behavior, Mintzberg found that it could be classified into 10 managerial roles. Managerial roles are expectations of the activities that managers should perform in an organization. Mintzberg found that these managerial roles fell into three categories: interpersonal, informational, and decisional. Interpersonal Roles. Managers act as figureheads for the organization when they represent their companies to the outside world and perform symbolic duties, such as giving out employee awards, in their interpersonal role. Managers act as leaders, attempting to motivate, counsel, and support subordinates. Managers also act as liaisons between various organizational levels; within each of these levels, they serve as liaisons among the members of the management team. Managers provide time and favors, which they expect to be returned. Informational Roles. In their informational role, managers act as the nerve centers of their organizations, receiving the most concrete, up-to-date information and redistributing it to those who need to be aware of it. Managers are therefore information disseminators and spokespersons for their organizations. Decisional Roles. Managers make decisions. In their decisional role, they act as entrepreneurs by initiating new kinds of activities; they handle disturbances arising in the organization; they allocate resources to staff members who need them; and they negotiate conflicts and mediate between conflicting groups. Table 12-2, based on Mintzberg’s role classifications, is one look at where systems can and cannot help managers. The table shows that information systems are now capable of supporting most, but not all, areas of management life. TABLE 12-2 MANAGERIAL ROLES AND SUPPORTING INFORMATION SYSTEMS ROLE BEHAVIOR SUPPORT SYSTEMS Interpersonal Roles Figurehead Leader Telepresence systems Interpersonal Liaison Telepresence, social networks, Twitter Smartphones, social networks Informational Roles Nerve center Management information systems, ESS Disseminator Information E-mail, social networks Spokesperson processing Webinars, telepresence Entrepreneur Decision None exist Disturbance handler making None exist Decisional Roles Resource allocator Business intelligence, DSS systems Negotiator None exist Sources: Kenneth C. Laudon and Jane P. Laudon; and Mintzberg, 1971. 459 460 Part Three Key System Applications for the Digital Age R e a l - Wo r l d D e c i s i o n M a k i n g We now see that information systems are not helpful for all managerial roles. And in those managerial roles where information systems might improve decisions, investments in information technology do not always produce positive results. There are three main reasons: information quality, management filters, and organizational culture (see Chapter 3). Information Quality. High-quality decisions require high-quality information. Table 12-3 describes information quality dimensions that affect the quality of decisions. If the output of information systems does not meet these quality criteria, decision-making will suffer. Chapter 6 has shown that corporate databases and files have varying levels of inaccuracy and incompleteness, which in turn will degrade the quality of decision making. Management Filters. Even with timely, accurate information, some managers make bad decisions. Managers (like all human beings) absorb information through a series of filters to make sense of the world around them. Managers have selective attention, focus on certain kinds of problems and solutions, and have a variety of biases that reject information that does not conform to their prior conceptions. For instance, Wall Street firms such as Bear Stearns and Lehman Brothers imploded in 2008 because they underestimated the risk of their investments in complex mortgage securities, many of which were based on subprime loans that were more likely to default. The computer models they and other financial institutions used to manage risk were based on overly optimistic assumptions and overly simplistic data about what might go wrong. Management wanted to make sure that their firms’ capital was not all tied up as a cushion against defaults from risky investments, preventing them from investing it to generate profits. So the designers of these risk management systems were encouraged to measure risks in a way that minimzed their importance. Some trading desks also oversimplified the information maintained about the mortgage securities to make them appear as simple bonds with higher ratings than were warranted by their underlying components (Hansell, 2008). Organizational Inertia and Politics. Organizations are bureaucracies with limited capabilities and competencies for acting decisively. When environments change and businesses need to adopt new business models to survive, TABLE 12-3 INFORMATION QUALITY DIMENSIONS QUALITY DIMENSION DESCRIPTION Accuracy Do the data represent reality? Integrity Are the structure of data and relationships among the entities and attributes consistent? Consistency Are data elements consistently defined? Completeness Are all the necessary data present? Validity Do data values fall within defined ranges? Timeliness Area data available when needed? Accessibility Are the data accessible, comprehensible, and usable? Chapter 12 Enhancing Decision Making strong forces within organizations resist making decisions calling for major change. Decisions taken by a firm often represent a balancing of the firm’s various interest groups rather than the best solution to the problem. Studies of business restructuring find that firms tend to ignore poor performance until threatened by outside takeovers, and they systematically blame poor performance on external forces beyond their control such as economic conditions (the economy), foreign competition, and rising prices, rather than blaming senior or middle management for poor business judgment (John, Lang, Netter, et al., 1992). HIGH-VELOCITY AUTOMATED DECISION MAKING Today, many decisions made by organizations are not made by managers, or any humans. For instance, when you enter a query into Google’s search engine, Google has to decide which URLs to display in about half a second on average (500 milliseconds). Google indexes over 50 billion Web pages, although it does not search the entire index for every query it receives. The same is true of other search engines. The New York Stock Exchange is spending over $450 million in 2010–2011 to build a trading platform that can executes incoming orders in less that 50 milliseconds. High frequency traders at electronic stock exchanges execute their trades in under 30 milliseconds. The class of decisions that are highly structured and automated is growing rapidly. What makes this kind of automated high-speed decision making possible are computer algorithms that precisely define the steps to be followed to produce a decision, very large databases, very high-speed processors, and software optimized to the task. In these situations, humans (including managers) are eliminated from the decision chain because they are too slow. This also means organizations in these areas are making decisions faster than what managers can monitor or control. Inability to control automated decisions was a major factor in the “Flash Crash” experienced by U.S. stock markets on May 6, 2010, when the Dow Jones Industrial Average fell over 600 points in a matter of minutes before rebounding later that day. The stock market was overwhelmed by a huge wave of sell orders triggered primarily by high-speed computerized trading programs within a few seconds, causing shares of some companies like Proctor & Gamble to sell for pennies. How does the Simon framework of intelligence-design-choice-implementation work in high-velocity decision environments? Essentially, the intelligence, design, choice, and implementation parts of the decision-making process are captured by the software’s algorithms. The humans who wrote the software have already identified the problem, designed a method for finding a solution, defined a range of acceptable solutions, and implemented the solution. Obviously, with humans out of the loop, great care needs to be taken to ensure the proper operation of these systems lest they do significant harm to organizations and humans. And even then additional safeguards are wise to observe the behavior of these systems, regulate their performance, and if necessary, turn them off. 12.2 BUSINESS INTELLIGENCE IN THE ENTERPRISE Chapter 2 introduced you to the different types of systems used for supporting management decision making. At the foundation of all of these decision support systems are business intelligence and business analytics infrastructure 461 462 Part Three Key System Applications for the Digital Age that supplies the data and the analytic tools for supporting decision making. In this section, we want to answer the following questions: • What are business intelligence (BI) and business analytics (BA) • Who makes business intelligence and business analytics hardware and software? • Who are the users of business intelligence? • What kinds of analytical tools come with a BI/BA suite? • How do managers use these tools? • What are some examples of firms who have used these tools? • What management strategies are used for developing BI/BA capabilities? WHAT IS BUSINESS INTELLIGENCE? When we think of humans as intelligent beings we often refer to their ability to take in data from their environment, understand the meaning and significance of the information, and then act appropriately. Can the same be said of business firms? The answer appears to be a qualified “yes.” All organizations, including business firms, do indeed take in information from their environments, attempt to understand the meaning of the information, and then attempt to act on the information. Just like human beings, some business firms do this well, and others poorly. “Business intelligence” is a term used by hardware and software vendors and information technology consultants to describe the infrastructure for warehousing, integrating, reporting, and analyzing data that comes from the business environment. The foundation infrastructure collects, stores, cleans, and makes relevant information available to managers. Think databases, data warehouses, and data marts described in Chapter 6. “Business analytics” is also a vendor-defined term that focuses more on tools and techniques for analyzing and understanding data. Think online analytical processing (OLAP), statistics, models, and data mining, which we also introduced in Chapter 6. So, stripped to its essentials, business intelligence and analytics are about integrating all the information streams produced by a firm into a single, coherent enterprise-wide set of data, and then, using modeling, statistical analysis tools (like normal distributions, correlation and regression analysis, Chi square analysis, forecasting, and cluster analysis), and data mining tools (pattern discovery and machine learning), to make sense out of all these data so managers can make better decisions and better plans, or at least know quickly when their firms are failing to meet planned targets. One company that uses business intelligence is Hallmark Cards. The company uses SAS Analytics software to improve its understanding of buying patterns that could lead to increased sales at more than 3,000 Hallmark Gold Crown stores in the United Sates. Hallmark wanted to strengthen its relationship with frequent buyers. Using data mining and predictive modeling, the company determined how to market to various consumer segments during holidays and special occasions as well as adjust promotions on the fly. Hallmark is able to determine which customer segments are most influenced by direct mail, which should be approached through e-mail, and what specific messages to send each group. Business intelligence has helped boost Hallmark sales to its loyalty program members by 5 to 10 percent. Chapter 12 Enhancing Decision Making B u s i n e s s I n t e l l i g e n c e Ve n d o r s It is important to remember that business intelligence and analytics are products defined by technology vendors and consulting firms. They consist of hardware and software suites sold primarily by large system vendors to very large Fortune 500 firms. The largest five providers of these products are SAP, Oracle, IBM, SAS Institute, and Microsoft (see Table 12-4). Microsoft’s products are aimed at small to medium size firms, and they are based on desktop tools familiar to employees (such as Excel spreadsheet software), Microsoft Sharepoint collaboration tools, and Microsoft SQL Server database software. The size of the American BI and BA marketplace in 2010 is estimated to be $10.5 billion and growing at over 20% annually (Gartner, 2010). This makes business intelligence and business analytics one of the fastest-growing and largest segments in the U.S. software market. THE BUSINESS INTELLIGENCE ENVIRONMENT Figure 12-3 gives an overview of a business intelligence environment, highlighting the kinds of hardware, software, and management capabilities that the major vendors offer and that firms develop over time. There are six elements in this business intelligence environment: • Data from the business environment: Businesses must deal with both structured and unstructured data from many different sources, including mobile devices and the Internet. The data need to be integrated and organized so that they can be analyzed and used by human decision makers. • Business intelligence infrastructure: The underlying foundation of business intelligence is a powerful database system that captures all the relevant data to operate the business. The data may be stored in transactional databases or combined and integrated into an enterprise-data warehouse or series of interrelated data marts. • Business analytics toolset: A set of software tools are used to analyze data and produce reports, respond to questions posed by managers, and track the progress of the business using key indicators of performance. • Managerial users and methods: Business intelligence hardware and software are only as intelligent as the human beings who use them. Managers impose order on the analysis of data using a variety of managerial methods that define strategic business goals and specify how progress will be measured. These include business performance management and balanced scorecard approaches focusing on key performance indicators and industry strategic analyses focusing on changes in the general business environment, with special attention to competitors. Without strong senior management overTABLE 12-4 MARKET LEADERS AND SHARE FOR THE TOP BUSINESS INTELLIGENCE VENDORS VENDOR MARKET SHARE BUSINESS INTELLIGENCE SOFTWARE SAP 25% SAP BusinessObjects EPM Solutions SAS Institute 15% SAS Activity Based Management; financial, human capital, profitability, and strategy management Oracle 14% Enterprise Performance Management System IBM 11% IBM Cognos Microsoft 7% SQL Server with PowerPivot 463 464 Part Three Key System Applications for the Digital Age FIGURE 12-3 BUSINESS INTELLIGENCE AND ANALYTICS FOR DECISION SUPPORT Business intelligence and analytics requires a strong database foundation, a set of analytic tools, and an involved management team that can ask intelligent questions and analyze data. sight, business analytics can produce a great deal of information, reports, and online screens that focus on the wrong matters and divert attention from the real issues. You need to remember that, so far, only humans can ask intelligent questions. • Delivery platform—MIS, DSS, ESS. The results from business intelligence and analytics are delivered to managers and employees in a variety of ways, depending on what they need to know to perform their jobs. MIS, DSS, and ESS, which we introduced in Chapter 2, deliver information and knowledge to different people and levels in the firm—operational employees, middle managers, and senior executives. In the past, these systems could not share data and operated as independent systems. Today, one suite of hardware and software tools in the form of a business intelligence and analytics package is able to integrate all this information and bring it to managers’ desktop or mobile platforms. • User interface: Business people are no longer tied to their desks and desktops. They often learn quicker from a visual representation of data than from a dry report with columns and rows of information. Today’s business analytics software suites emphasize visual techniques such as dashboards and scorecards. They also are able to deliver reports on Blackberrys, iPhones, and other mobile handhelds as well as on the firm’s Web portal. BA software is adding capabilities to post information on Twitter, Facebook, or internal social media to support decision making in an online group setting rather than in a face-toface meeting. BUSINESS INTELLIGENCE AND ANALYTICS CAPABILITIES Business intelligence and analytics promise to deliver correct, nearly real-time information to decision makers, and the analytic tools help them quickly Chapter 12 Enhancing Decision Making understand the information and take action. There are 5 analytic functionalities that BI systems deliver to achieve these ends: • Production reports: These are predefined reports based on industry-specific requirements (see Table 12-5). • Parameterized reports. Users enter several parameters as in a pivot table to filter data and isolate impacts of parameters. For instance, you might want to enter region and time of day to understand how sales of a product vary by region and time. If you were Starbucks, you might find that customers in the East buy most of their coffee in the morning, whereas in the Northwest customers buy coffee throughout the day. This finding might lead to different marketing and ad campaigns in each region. (See the discussion of pivot tables in Section 12.3). • Dashboards/scorecards: These are visual tools for presenting performance data defined by users • Ad hoc query/search/report creation: These allow users to create their own reports based on queries and searches • Drill down: This is the ability to move from a high-level summary to a more detailed view • Forecasts, scenarios, models: These include the ability to perform linear forecasting, what-if scenario analysis, and analyze data using standard statistical tools. Who Uses Business Intelligence and Business Analytics? In previous chapters, we have described the different information constituencies in business firms—from senior managers to middle managers, analysts, and operational employees. This also holds true for BI and BA systems (see Figure 12-4). Over 80 percent of the audience for BI consists of casual users who rely largely on production reports. Senior executives tend use BI to monitor firm activities using visual interfaces like dashboards and scorecards. Middle managers and analysts are much more likely to be immersed in the data and software, entering queries and slicing and dicing the data along different FIGURE 12-4 BUSINESS INTELLIGENCE USERS Casual users are consumers of BI output, while intense power users are the producers of reports, new analyses, models, and forecasts. 465 466 Part Three Key System Applications for the Digital Age dimensions. Operational employees will, along with customers and suppliers, be looking mostly at prepackaged reports. Examples of Business Intelligence Applications The most widely used output of a BI suite of tools are pre-packaged production reports. Table 12-5 illustrates some common pre-defined reports from Oracle’s BI suite of tools. Predictive Analytics Predictive analytics, which we introduced in Chapter 6, are being built into mainstream applications for everyday decision making by all types of employees, especially in finance and marketing. For example, Capital One conducts more than 30,000 experiments each year using different interest rates, incentives, direct mail packaging, and other variables to identify the best potential customers for targeting its credit card offers. These people are most likely to sign up for credit cards and to pay back Capital One for the balances they ring up in their credit card accounts. Predictive analytics have also worked especially well in the credit card industry to identify customers who are at risk for leaving. Dealer Services, which offers inventory financing for used-car dealers, is trying to use predictive analytics to screen potential customers. Thousands of used-car dealers, who were formerly franchisees for General Motors and Chrysler, are seeking financing from companies such as Dealer Services so that they can go into business on their own. Using WebFOCUS software from Information Builders, the company is building a model that will predict the best loan prospects and eliminate up to 10 of the 15 hours required to review a financing application. The model reviews data including dealer size and type, number of locations, payment patterns, histories of bounced checks, and inventory practices and is revalidated and updated as conditions change. FedEx is using SAS Institute’s Enterprise Miner and predictive analytic tools to develop models that predict how customers will respond to price changes and new services, which customers are most at risk of switching to competitors, and how much revenue will be generated by new storefront or drop-box locations. The accuracy rate of the predictive analysis system ranges from 65 to 90 percent. FedEx is now starting to use predictive analytics in call centers to help TABLE 12-5 EXAMPLES OF BUSINESS INTELLIGENCE PRE-DEFINED PRODUCTION REPORTS BUSINESS FUNCTIONAL AREA PRODUCTION REPORTS Sales Forecast sales; sales team performance; cross selling; sales cycle times Service/Call Center Customer satisfaction; service cost; resolution rates; churn rates Marketing Campaign effectiveness; loyalty and attrition; market basket analysis Procurement and Support Direct and indirect spending; off-contract purchases; supplier performance Supply Chain Backlog; fulfillment status; order cycle time; bill of materials analysis Financials General ledger; accounts receivable and payable; cash flow; profitability Human Resources Employee productivity; compensation; workforce demographics; retention Chapter 12 Enhancing Decision Making 467 customer service representatives identify customers with the highest levels of dissatisfaction and take the necessary steps to make them happy. Data Visualization and Geographic Information Systems By presenting data in visual form, data visualization tools help users see patterns and relationships in large amounts of data that would be difficult to discern if the data were presented as traditional lists of text. For example, managers and employees of Day & Zimmermann, an industrial, defense, and workforce solutions provider, have detailed, real-time visibility into the company’s inventory of contractors and workers through a set of dashboards populated with real-time data from a SAP ERP Human Capital Management system. The dashboards make it much easier to understand the organization’s staffing levels than static paper reports. The real-time data indicate exactly what type of worker is available in what location and when a project is due to be completed. If a project is ahead of schedule, information from the dashboards helps decision makers rapidly determine when and where to reassign its workers. Geographic information systems (GIS) help decision makers visualize problems requiring knowledge about the geographic distribution of people or other resources. Their software ties location data to points, lines, and areas on a map. Some GIS have modeling capabilities for changing the data and automatically revising business scenarios. GIS might be used to help state and local governments calculate response times to natural disasters and other emergencies or to help banks identify the best location for installing new branches or ATM terminals. For example, Columbia, South Carolina-based First Citizens Bank uses GIS software from MapInfo to determine which markets to focus on for retaining customers and which to focus on for acquiring new customers. MapInfo also lets the bank drill down into details at the individual branch level and individualize Somerset County, New Jersey, developed a GIS based on ESRI software to provide Web access to geospatial data about flood conditions. The system provides information that helps emergency responders and county residents prepare for floods and enables emergency managers to make decisions more quickly. 468 Part Three Key System Applications for the Digital Age goals for each branch. Each branch is able to see whether the greatest revenue opportunities are from mining their database of existing customers or from finding new customers. With clearer branch segmentation and more focused service goals, the bank has moved from making cold sales calls to calls that are more service- and courtesy-oriented. Business Intelligence in the Public Sector Business intelligence systems are also used in the public sector. The Interactive Session on Organizations describes a school district’s move to quantify and analyze student performance data to make better decisions about how to allocate resources to enhance student and teacher performance. MANAGEMENT STRATEGIES FOR DEVELOPING BI AND BA CAPABILITIES There are two different strategies for adopting BI and BA capabilities for the organization: one-stop integrated solutions versus multiple best-of-breed vendor solutions. The hardware firms (IBM, HP, and now Oracle, which owns Sun Microsystems) want to sell your firm integrated hardware/software solutions that tend to run only on their hardware (the totally integrated solution). It’s called “one stop shopping.” The software firms (SAP, SAS, and Microsoft) encourage firms to adopt the “best of breed” software and that runs on any machine they want. In this strategy, you adopt the best database and data warehouse solution, and select the best business intelligence and analytics package from whatever vendor you believe is best. The first solution carries the risk that a single vendor provides your firm’s total hardware and software solution, making your firm dependent on its pricing power. It also offers the advantage of dealing with a single vendor who can deliver on a global scale. The second solution offers greater flexibility and independence, but with the risk of potential difficulties integrating the software to the hardware platform, as well as to other software. Vendors always claim their software is “compatible” with other software, but the reality is that it can be very difficult to integrate software from different vendors. Microsoft in particular emphasizes building on its desktop interface and operating system (Windows), which are familiar to many users, and developing server applications that run on Microsoft local area networks. But data from hardware and software produced by different vendors will have to flow seamlessly into Microsoft workstations to make this strategy work. This may not be adequate for Fortune 500 firms needing a global networking solution. Regardless of which strategy your firm adopts, all BI and BA systems lock the firm into a set of vendors and switching is very costly. Once you train thousands of employees across the world on using a particular set of tools, it is extremely difficult to switch. When you adopt these systems, you are in essence taking in a new partner. The marketplace is very competitive and given to hyperbole. One BI vendor claims “[Our tools] bring together a portfolio of services, software, hardware and partner technologies to create business intelligence solutions. By connecting intelligence across your company, you gain a competitive advantage for creating new business opportunities.” As a manager, you will have to critically evaluate such claims, understand exactly how these systems could improve your business, and determine whether the expenditures are worth the benefits.