lOMoARcPSD|20355431 Management Information Systems - Lecture notes, lectures 1 - 12 Management Information Systems (University of Ottawa) Studocu is not sponsored or endorsed by any college or university Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Information Systems & Business Strategy 09/11/2014 Information Systems (IS) Any computer-based tool that people use to work with information and that supports the information and information processing needs of an organization An IS can be an important enabler of business success and innovation Management Information Systems (MIS) The function that plans for, develops, implements, and maintains IS hardware, software, and applications that people use to support the goals of an organization MIS is a business function, similar to Accounting, Finance, Operations, and HR These 3 things are NOT the same: Data – raw facts that describe the characteristic of an event Information – data converted into meaningful and useful context Knowledge – information that can be enacted upon (actionable information) People use Information Systems to transform Data into Information and Information into Knowledge. IS Cultures Organizational information cultures include: Information-functional culture Information-sharing culture Information-inquiring culture Information-discovery culture Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 IS Roles & Responsibilities Chief Information Officer (CIO) Oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives Increasing enterprise growth, attracting and retaining new customers, reducing costs, innovation, delivering operational results, improving efficiency and profitability. Attracting and retaining the workforce, improving marketing and sales, expanding into new markets Chief Knowledge Officer (CKO) Responsible for collecting, maintaining, and distributing the organization’s knowledge Chief Privacy Officer (CPO) Responsible for ensuring the ethical and legal use of info Chief Security Officer (CSO) Responsible for ensuring safety of IT resources including data, hardware, software, and people Chief Technology Officer (CTO) Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT The Gap Between Business Personnel and IS Personnel Business personnel possess expertise in functional areas such as marketing, accounting, and sales IS personnel have the technological expertise This typically causes a communications gap between the business personnel and IS personnel Business Strategy Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Identifying Competitive Advantage To survive and thrive an organization must create a competitive advantage. Competitive Advantage A product or service that an organization’s customer place a greater value on than similar offerings from a competitor First-Mover Advantage Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage Organizations watch their competition through environmental scanning. Environmental Scanning The acquisition and analysis of events and trends in the environment external to an organization Three common tools used in industry to analyze and develop competitive advantages include: 1. Porter’s Five Forces Model 2. Porter’s Three Generic Strategies 3. Value Chains 1. Michael Porter’s Five Forces Model (figure 1.13) Buyer Power The ability of buyers to affect the price of an item Switching Cost o Manipulating costs that make customers reluctant to switch to another product Loyalty Program Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Rewards customers based on the amount of business they do with a particular organization Supplier Power (figure 1.14) High when buyers have few choices of whom to buy from and low when their choices are many Supply Chain o Consists of all parties involved in the procurement of a product or raw material Organizations can create a competitive advantage by locating alternative supply sources (decreasing supplier power) through B2B marketplaces B2B Marketplace – an internet-based service that brings together many buyers and sellers o Private Exchange – single buyer posts its needs and then opens the bidding to any supplier who would care to bid o Reverse Auction – an auction format in which increasingly lower bids are solicited from organizations willing to supply the desired product or service Threat of Substitute Product of Service High when there are many alternatives to a product or service and low when there are few alternatives Threat is reduced when switching costs are high Threat of New Entrants High when it is easy for new competitors to enter a market and low when there are significant entry barriers o Entry Barriers – a feature of a product or service that customer have come to expect and entering competitors must offer the same for survival Rivalry Among Existing Competitors High when competition is fierce in a market and low when competitors are more complacent Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Product Differentiation – occurs when a company develops unique differences in its products or services with the intent to influence demand 2. Three Generic Strategies for Creating a Business Focus (fig. 1.15) Based on Cost Strategy and Competitive Scope axis, the three generic strategies are: i. Cost Leadership (low cost, broad market) ii. Differentiation (high cost, broad market) iii. Focused Strategy (ranging cost, narrow market) 3. Value Chain Analysis – Executing Business Strategies (fig. 1.18) Business Process – a standardized set of activities that accomplish a specific task, such as a specific process Value Chain Analysis – views a firm as a series of business processes that each add value to the product or service Value creating, with the Porter’s Five Forces (fig. 1.19) Business-Driven IS’ and Business Strategy The Five Forces Model, Three Generic Strategies and Value Chain allow business to assess competitive advantage IS’ collect the data from from the business processes activities and provide analysis to give organizations insight into ways to behave more competitively IS’ are not used on their own. They are driven by the need of business for fast, accurate and insightful information Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Decision Making & Business Processes 09/11/2014 Making Good business decisions Analyze large amounts of information Apply sophisticated analysis techniques Make decisions quickly Protect the corporate asset of organizational information Operational Employees develop, control and maintain core business activities req’d to run the day to day operations Structured Decisions o Situations where establish processes offer potential solutions Managerial Employees evaluate company operations to identify adapt to and leverage change Semi-structured o Occur in situations in which a few established process help to evaluate potential solutions.. pg 30 Strategic Managers develop overall strategies, goals & objectives Unstructured decisions o Occurs in situations in which no procedures of rules exist to guide decision makers towards the correct choice Pg 32 Metrics Measurements that evaluate results to determine whether a project is meeting its goals Common types: Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 KPIs – Key Performance Indicators (The quantifiable metrics a company uses to evaluate progress toward critical factors) o Turnover rates of employees o Number of product returns o Number of new customers o Average customer spending Efficiency and Effectiveness Efficiency Metrics - Measure the performance of IS itself, such as throughput, transaction speed, and system availability Common types of Efficiency IS Metrics Throughput o Amount of info that can travel through a system at any point in time Transactions Speed o Amount of time a system takes to perform a transaction Web Traffic o Includes a host of benchmarks such as the number of page visits, and the average time spent viewing a web page Response Time o Time it takes to respong to user interactions such as a mouse click Effectiveness Metrics - Measures the impact IS has on business processes and activities, including customer satisfaction and customer conversation rates Common types of Effectiveness IS Metrics Usability o The ease with which people perform transactions and / or find info Customer Satisfaction o Measured by such benchmarks as satisfaction surveys, customer retention percentages and increasing revenue per customer Conversion Rates Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Number of customers an organization “touches” for the first time and persuades to purchase a product / service Financial o Such as RoI (earning power of an organization’s assets), Cost/Benefit Analysis and Break Even Analysis Benchmark – Baseline values the system seeks to attain Benchmarking – a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance Transaction Processing Sytems Transactional Processing Systems (TPS) Basic business system that serves the operational level and assists in making structured decisions Online Transaction Processing (OLTP) Capturing of transaction and event information using technology to process, store, and update Source Document The original transaction record Decision Support Systems Decision Support System (DSS) Models information to support managers and business professionals during the decision making process Online Analytical Processing (OLAP) Manipulation of information to create business intelligence in support of strategic decision making Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Three Quantitative Models Used by DSS Include: i. What-if Analysis ii. Sensitivity Analysis iii. Goal-seeking Analysis Slide 25 shows interaction between TPS and DSS Digital Dashboards Integrates information from multiple components and presents it in a unified display Verizon’s “Wall of Shaygan” updates every 15 seconds with the company’s performance Artificial Intelligence (AI) – Simulates human intelligence such as the ability to reason and learn Intelligence System – Various commercial applications of artificial intelligence 5 Most Common Categories of AI include: Expert System Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems Neural Network Attempts to emulate the way the human brain works Most useful for decisions that involve patterns or image recognition o Fuzzy Logic – a mathematical method of handling imprecise or subjective info Genetic Algorithm AI system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem (shopping bot) Intelligent Agent Special purpose knowledge based information system that accomplishes specific tasks on behalf of its users Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Virtual Reality A computer-simulated environment that can be simulation of the real or imaginary world 2.2 Business Processes Make sure IS actually fits processes (accounting / finance, environmental, HR, MIS) Customer Facing Processes – result in a product or service that is received by an organization’s external customer Business Facing Processes – invisible to the external customer but are essential to the effective management of the business 5 Step Order-to-Delivery Process, Slide 39 Business Process Re-Engineering Business Process – standardized set of activities that accomplish specific tasks, such as processing customers order Business process improvement – attempts to understand and measure current processes and upgrade them Business Process Re-Engineering (BPR) – analysis and redesign of workflow within and between enterprises Business Process Modelling (textbook pg 48) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Business and the Internet 09/11/2014 Disruptive Technology Digital Darwinism – implies that organizations which cannot adapt to the new demands placed to the new demands placed on them for surviving in the information age are doomed to extinction Disruptive vs. Sustaining Technology Disruptive Technology – a new way of doing things that opens new markets and destroys old one Sustaining Technology – produces improvements to product that customers are eager to buy The Internet – Disruptive Business Technology One of the biggest forces changing business is the Internet Organizations must be able to transform as markets, economic environments, and technologies change Focusing on the unexpected allows an organization to capitalize on the opportunity for new business growth from a disruptive technology Has impacted almost every industry; auto, publishing, financial services, retail Evolution of the Internet The Internet began as an emergency military communications system operated by the U.S. Department of Defense Gradually the internet moved from a military pipeline to a communication tool for scientists to business o Internet – computer networks that pass information from one to another using common computer protocols o Protocol – standards that specify the format of data as well as the rules to be followed during transmission World Wide Web (WWW) – a global hypertext system that uses the internet as its transport mechanism Hypertext Transport Protocol (HTTP) – the Internet standard that supports the exchange of information on the WWW Reasons for growth; figure 3.6 Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 The internet makes it possible to perform business in ways not previously imaginable It can also cause a gap between winners and losers in the game of business o Digital Divide – when those with access to technology have great advantages over those without access to technology o Web 2.0 – a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet Mashups Website or web application that uses content from more than one source to create a completely new product or service o Application programming interface o Mashup Editor Web 3.0 Based on “intelligent” Web applications using natural language processing, machine-based learning and reasoning, and intelligence applications Semantic Web – structuring data so web pages describe things in a way that computers can “understand” and, thus, find, share, and integrate ideas more effectively for people The Semantic Web encompasses one or more of the following: o Transforming the web into a database o An Evolutions Path to artificial intelligence o The realization of the semantic Web and SOA (ServiceOriented Architecture) o Evolution toward 3D Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Accessing Internet Information Four tools for accessing Internet information i. Intranet – internalized portion of the Internet, protected form outside access, for employees ii. Extranet – an intranet that is available to strategic allies iii. Portal – Web site that offers a broad array of resources and services iv. Kiosk – publicly accessible computer system that allows interactive information browsing Providing Internet Information Three common forms of service providers i. Internet Service Provider (ISP) – Provides individuals and other companies access to the Internet Wireless Internet Service Provider (WISP) Common ISP services include: Web Hosting Hard-disk Storage Space Availability Support ii. Online Service Provider (OSP) – offers and extensive array of unique Web services iii. Application Service Provider (ASP) – offers access over the internet to systems and related services that would otherwise have to be located in organizational computers ISPs, OSPs, and ASPs use service level agreements (SLA) which define the specific responsibilities of the service provider and set the customer expectations E-Business Basics How do e-commerce and e-business differ? E-Commerce – the buying adns elling of goods and services over the internet E-Business – the conducting of business on the internet including not only buying and selling, but also serving customers and collaborating with business partners Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Mass Customization – the ability of an organization to tailor its products or services to the customers’ specifications Personalization – occurs when a company knows enough about a customer’s like and dislikes that it can fashion offers more likely to appeal to that person Opening New Markets The Long Tail – refers to the tail of a typical sales curve (figure 3.13, 3.14) Intermediary – agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together o Disintermediation o Re-intermediation o Cybermediation Further Advantages of E-Business Reducing Costs – business processes that take less time and human effort Improving Operations – communication customized to meet consumer needs and available 24/7 Improving Effectiveness – web sites must increase revenue and new customers and reduce service calls Interactivity Metrics – measure E-Business success: number of repeat visits, times spent on site and number of pages viewed among other activities Improving Effectiveness through E-Business Marketing o Associate (Affiliate) Programs o Banner Ads o Tracking Click-Through o Cookies o Pop-Up Ads o Viral Marketing Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Measuring Website Success Stickiness – visit duration time Raw Visit Depth – total Web page exposures per session Unidentified Visitor – no info about visitor is available Unique Visitor – recognized and counted once in a period of time Identified Visitor – can be tracked across multiple web visits Hits – a single request made by a visitor to view a web page Business Models Types of Businesses: o Brick and Mortar – physical store, no web site o Pure-Play (Virtual) – only online o Click and Mortar – physical and online E-Auctions are a successful E-Business model o Forward Auction – seller offers to many buyers who bid with the highest bid winning the product o Reverse Auction – buyer specifies product or service an lowest seller bid wins contract Business-to-Business (B2B) Electronic Marketplace (E-Marketplace) o Interactive business communities providing a central market where multiple buyers and sellers can engage in e-business activities Business-to-Consumer (B2C) Common B2C e-business models include: o E-Shop – a version of a retail store where customers can shop any time without leaving their home (also called e-store or e-tailing) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o E-Mail – consists of a number of e-shops; it serves as a gateway through which a visitor can access other e-shops Marketing E-Business’ success in direct selling is evidenced by growth of the Internet sales of Dell Inc., eBay, Indigo, and Travelocity Innovative approaches are changing the face of retailing: o Sears installed Skype-enabled screens into 10 of its fashion outlets so that buyers could remotely show their friends potential clothing choices Financial Services Online consumer payments include: o Financial cybermediary o Electronic cheque o Electronic bill presentment and payment (EBPP) o Digital wallet Online business payments include: o Electronic data interchange (EDI) Value-added network (VAN) o Financial EDI Figure 3.27 Procurement Maintenance, repair, and operations (MRO) materials (also called indirect materials) – materials necessary for running an organization but do not relate to the company’s primary business activities o E-Procurement – the B2B purchase and sale of supplies and services over the internet Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Electronic Catalogue – presents customers with information about goods and services offered for sale, bid, or auction on the Internet Customer Service Customer service is the business process where the most human contact occurs between a buyer and a seller E-business strategists are finding that customer service via the Web is one of the most challenging and potentially lucrative areas of ebusiness The primary issue facing customer service departments using ebusiness is consumer protections E-Business Challenges Security o Encryption o Secure socket layer (SSL) TLS (Transport layer security) o Secure electronic transaction (SET) Other challenges include: Protecting consumers – against unsolicited, illegal or harmful goods, invasion of privacy, cyber fraud Leveraging existing systems – effectively integrating innovative systems with existing systems Increasing liability – identity theft, privacy, and the Internet’s global reach means dealing with laws of many countries Providing security – protection of consumer and business information and data assets Taxation rules – Adhering to often new rules Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 E-Business Benefits Highly accessible Increase customer loyalty Improved information content Increased convenience Increased global reach Decreased cost Figure 3.32 E-Government Involves the use of strategies and technologies to improve the delivery of services and enhance the quality of interaction between citizen-consumer within all branches of government Federal government portal, www.canada.gc.ca , connects citizens, immigrants, visitors, and other to all gov’t public communication Figure 3.33 M-Commerce Mobile Commerce – the ability to purchase goods and services through a wireless internet-enabled device Social Media & Business Companies advertise on Facebook, with their own pages on Facebook, active on Twitter Companies are advised to integrate social media in business communications, use social customer support, provide leadership and expertise through social media, and that social media can drive reputation Figure 3.36 Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Enterprise Computing Challenges and Enterprise Resource Planning 09/11/2014 ENTERPRISE COMPUTING CHALLENGES Innovation: Finding New The introduction of new equipment or methods Six Best Practices of Innovation 1. Find your relevant edge 2. Assemble innovation hothouses 3. Reward risk takers 4. Celebrate diversity 5. Look around 6. Mix practitioners and developers Social Entrepreneurship: Going Green Corporate Policy is the position a firm takes on social and political issues Sustainable or “Green” IT describes systems that minimize damage to the environment Responses to Energy Consumption Sun Microsystems: throughput computing Virtualization is a framework of dividing the resources of a computer into multiple execution environments Energy rebate programs Smart cooling Alternative energy sources Biology meets chips Government involvement Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Recycle IT Equipment E-Waste refers to discarded, obsolete or broken electronic devices Sustainable IT Disposal refers to the safe disposal of MIS assets at the end of their life cycle Electronic Product Stewardship Canada (EPSC) is an industry association that educates and encourages e-waste control Recent international laws restrict the use of hazardous materials Greener IT Ways to Save Energy in a Data Centre Use outside air for cooling Cool high-density areas Use low-power processors Incorporate cooling solutions Use server power management Buy high-efficiency power supplies Use virtualization to consolidate servers Social Networks: Who’s Who Organizing Social Networking Passive Search – finding people for new jobs who are happy and productive through business networking sites Boomerangs – former employees returning to old jobs Marketing Networks – using business networks for marketing and events Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Virtual Worlds: It’s a Whole New World Virtual World – an internet resource which presents a 3D virtual community Virtual Organizations – interactive web presence for businesses and their customers Virtual Workforce – working from home, or anywhere via the internet Tools for the Virtual Workforce Mobile commerce (m-commerce): the ability to purchase goods and services through a wireless internet-enabled device Telematics: the blending of computers and wireless telecommunications with the foal of efficiently conveying information over vast networks to improve business operations. The most notable example of telematics may be the internet itself, since it depends on a number of computer networks connected globally through telecommunication devices Electronic Tagging: the use of RFID (radio frequency identification) and other systems to identify and tracking digital assets ENTERPRISE RESOUORCE PLANNING (ERP) ERP – Integrates all departments and function throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprise-wide decisions by viewing enterprise-wide information on all business operations ERP: Is a solution to incompatible applications Addresses the need for global information sharing Avoids the expense of fixing legacy systems Legacy Systems are older computer technology still in use Functional Systems serve single business departments or units Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 ERP System Figure 4.9 – 4.15 Page 119 Figure 1.10 ERP Integration Data Flow At the heart of all ERP systems is a database; when a user enters or updates information in one module, it is immediately and automatically updated throughout the entire system Core and Extended ERP Components ERP II: Core and Extended Core ERP Components are the traditional components included in most ERP systems and they primarily focus on internal operations Extended ERP Components are the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations Three Most Common Core ERP Components 1. Accounting & Finance Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management 2. Production & Materials Management Handles the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control Figure 4.16 3. Human Resources Tracks employee information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax authorities Extended ERP Components 1. Business Intelligence Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Information people use to support their decision-making efforts 2. Customer Relationship Management Managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention, and profitability for the organization 3. Supply Chain Management Managing data flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability 4. E-Business Conducting business on the internet – not only buying and selling, but also serving customers and collaborating with business partners E-Logistics manages the transportation and storage of goods E-Procurement is the B2B purchase and sale of supplies and services over the internet Integrating SCM, CRM and ERP Integration Tools Middleware – several different types of software that sit between and provide connectivity for two or more software applications Enterprise Application Integration (EAI) Middleware – takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors SCM, CRM, and ERP are the backbone of e-business Integration of these applications is the key to success for many companies Integration allows the unlocking of information to make it available to any use, anywhere, anytime Measuring ERP Success Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Balanced Scorecard is a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action using 4 perspectives: o Learning & Growth o Internal Business Process o Customer o Financial Successful ERP Projects Share Three Attributes 1. Overall Fit Off the rack Off the rack and tailored to fit Custom made 2. Proper Business Analysis Successful companies spend up to 10% of the project budget on a business plan 3. Solid Implementation Plans A plan is needed to monitor the quality, objectives, and timelines ERP and SME Markets ERP is no longer the purview of large organizations In the hopes of expanding their client base many large-scale ERP vendors, such as SAP and Oracle, are attempting to enter the small to medium enterprise (SME) market Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Operations Management and Supply Chain Management 09/11/2014 OPERATION MANAGEMENT FUNDAMENTALS Production Management describes all the activities managers do to help companies create goods Operation Management (OM) is the management of systems or processes that convert or transform resources (including human resources) into goods and services A Transformation Process is often referred to as the technical core, especially in manufacturing organizations, and is the actual conversion of inputs and outputs Value-Added is the term used to describe the difference between the cost of inputs and the price value of outputs OM in Business Forecasting Capacity planning Scheduling Managing inventory Assuring quality Motivating and training employees Locating facilities Figures 5.1 – 5.4 IS Support for Operations Strategy Concerned with developing a long-term plan for how best to use the company’s resources IS support for operations strategy depends on: o Level of available technology o Skill level of workers o Degree of vertical integration, to what degree the suppliers are owned (or partnered) with the company Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Extent to which outside suppliers are used OM Strategic Business Systems Strategic Business Units (SBUs) – is a stand-alone business under a corporate umbrella Strategic Planning – the collection of decisions focused on doing the right things over a longer period of time Material Requirements Planning (MRP) Systems – use sales forecast to make sure parts and materials are available Tactical Planning – focuses on producing goods and services as efficiently as possible within the strategic plan Global Inventory Management System (GIMS) – locate, track, and predict materials and components by installing GPS in transportation vehicles Operational Planning and Control (OP&C) – deals with day-to-day operations Inventory Management and Control Systems – provides control and visibility to the status of individual items maintained in inventory Transportation Planning Systems – tracks and analyzes the movement of materials and products to ensure the delivery of materials and finished goods on time, at a low cost Distribution Management System – coordinate the process of transporting materials from a manufacturer, to distribution centres, to the final customers 1. 2. 3. 4. 5. Competitive OM Strategy Five key competitive priorities that can add value for customers Cost Quality o International Organization for Standardization (ISO) Delivery Flexibility Service OM and the Supply Chain Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Supply Chain consists of all parties involved, directly or indirectly, in the procurement of a product or raw material Supply Chain Management (SCM) involves the management of information flows between and among stages in a supply chain to maximize total effectiveness and profitability Four Basic Components of SCM are: 1. Supply Chain Strategy Managing all the resources required to meet customer demand for all products and services 2. Supply Chain Partners The partners chosen to deliver finished products, raw materials, and services, including pricing, delivery, and payment processes along with partner relationship monitoring metrics 3. Supply Chain Operation The schedule for production activities, including testing, packaging, and preparation for delivery. Measurements for this component include productivity and quality 4. Supply Chain Logistics The product delivery processes and elements, including orders, warehouses, carriers, defective product returns, and invoicing Figures 5.5 – 5.8 SUPPLY CHAIN FUNDAMENTALS The supply chain has three main links: i. Materials flow from suppliers and their “upstream” suppliers at all levels ii. Transformation of materials into semi-finished and finished products through the organization’s own production process iii. Distribution of products to customers and their “downstream” customers at all levels Figure 5.9 Five Basic Supply Chain Management Components: Plan Source Make Deliver Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Return Figure 5.10 Information Systems’ Role in the Supply Chain IS’s primary role is to create integrations or tight process and information linkages between functions within a firm (Figure 5.11) Factors Driving SCM Visibility is the ability to view all areas up and down the supply chain Bullwhip Effect occurs when distorted product demand information passes from one entity to the next throughout the supply chain Consumer Behaviour Demand Planning Systems generate demand forecast using statistical tools and forecasting techniques Competition Supply Chain Planning (SCP) Systems use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory Supply Chain Execution (SCE) Systems automate the different steps and stages of the supply chain Speed Supply Chain Management Metrics Common supply chain metrics include: Back Order An unfilled customer order, inventory is insufficient Inventory Replenishment Cycle Time Measure of the manufacturing cycle time plus the time included to deploy the product to the appropriate distribution centre Customer Order Promised Cycle Time Gap between the purchase order creation date and requested delivery date Customer Order Actual Cycle Time Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Average time it actually takes to fill an order Inventory Turnover Number of times an organizations inventory cycles per year 1. 2. 3. 4. 5. 6. 7. Seven Principles of SCM Segment customers by service needs, regardless of industry, and tailor service to those segments Customize the logistics network and focus intensively on the service requirements and on profitability of the pre-identified customer segments Listen to signals of market demand and plan accordingly. Planning must span the entire chain to detect signals of changing demand Differentiate products closer to the customer, since companies can no longer afford to hold inventory to compensate for poor demand forecasting Strategically manage sources of supply, by working with key suppliers to reduce overall costs of owning materials and services Develop a supply chain information technology strategy that supports different levels of decision making and provides a clear view (visibility) of the flow of products, services, and information Adopt performance evaluation measures that apply to every link in the supply chain and measure true profitability at every stage Supply Chain Success Factors SCM Industry Best Practices Include: Make the sale to suppliers Wean employees off traditional business practices Ensure the SCM system supports the organizational goals Deploy in incremental phases, measure, and communicate success Be future oriented Future Supply Chain Trends Instrumentation – data will be increasingly machine-generated. GIMS and RFID-enabled devices, meters and actuators Interconnectedness – every component from customer back to materials source and every element in between such as vehicles, containers and products will be identified and can be tracked Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Intelligence – data received from the smart objects in the supply chain will be processed with smart analytics which will create better models to support improved decisions in an increasingly complex world The Future of SCM Fastest Growing SCM Components: Collaborative Demand Planning Collaborative Engineering Selling Chain Management Supply Chain Event Management (SCEM) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Customer Relationship Management 09/11/2014 CRM: A management philosophy according to which a company’s goals can be best achieved through identification and satisfaction of the customers’ stated and unstated needs and wants A computerized system for identifying, targeting, acquiring, and retaining the best mix of customers Involves managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability CRM as a Business Strategy CRM enables an organization to: Provide better customer service Make call centres more efficient Cross-sell products more effectively Help sales staff close deals faster Simplify marketing and sales processes Discover new customers Increase customer revenues Organizations can find their most valuable customers through RFM – Recency, Frequency, and Monetary value The Evolution of CRM CRM Reporting Systems help organizations identify their customers across other applications CRM Analysis Systems help organizations segment their customers into categories such as best and worst customers CRM Predicting Systems help organizations make predictions regarding customer behaviour, such as which customers are at risk of leaving Operational CRM – supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Analytical CRM – supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers Figure 6.5 Marketing & Operational CRM Three primary operational CRM systems marketing can use to increase customer satisfaction: 1. List Generators – compile customer data from a variety of sources and segment the data for different marketing campaigns 2. Campaign Management Systems – guide campaign planners through key tasks, can calculate campaign ROI and track results for future fine tuning 3. Cross-Selling and Up-Selling – identify customers that would have interest in additional, related products or might respond to increasing the value of their purchase Sales & Operational CRM Sales Force Automation (SFA) is a system that automatically tracks all of the steps in the sales process Three primary operational CRM systems sales can use to increase customer satisfaction: 1. Sales Management CRM System – automates each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts 2. Contact Management CRM System – maintains customer contact information and identifies prospective customers for future sales 3. Opportunity Management CRM System – targets sales opportunities by finding new customers or companies for future sales CRM Pointers for Gaining Prospective Customer i. Get their attention ii. Value their time iii. Overdeliver iv. Contact frequently v. Generate a trustworthy mailing list Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 vi. Follow up Customer Service & Operational CRM Three primary operational CRM systems marketing can use to increase customer satisfaction: 1. Contact (Call) Centre 2. Web-base Self-service System Click-to-talk 3. Call Scripting System Tracking similar issues in a database and provider information to the customer service representative (CSR) Using IS to Drive Analytical CRM Analytical CRM – digs deep into the company’s historical customer data to expose patterns of customer behaviour on which a company can capitalize Personalization – when a web site knows enough about a person’s likes and dislikes that it can fashion offers that are more likely to appeal to that person Information Examples i. Give customers more of what they want ii. Find new customers similar to the best customers iii. Find out what the organization does best iv. Beat competitors to the punch v. Reactivate inactive customers vi. Let customers know they matter Implementing CRM CRM Industry Best Practices Include: Clearly communicate the CRM strategy Define data needs and flows Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 1. 2. 3. 4. 5. 6. 7. 8. Build an integrated view of the customer Implement in iterations Scalability for organizational growth Eight Building Block of CRM Creating a CRM vision that provides a “big picture” of what the customer-centric organization should look like Defining and weaving a CRM strategy that aligns with broader marketing and sales strategies, and informs operational and production strategies Understanding and engaging the customer Ensuring organizational collaboration between internal groups and external business partners Focusing on improving customer processes Achieving data integrity across the enterprise Leveraging information systems to implement CRM Defining, collecting, and analyzing CRM metrics CRM Marketing Metrics Number of marketing campaigns New customer retention rates Number of responses by marketing campaign Revenue generated by marketing campaign Cost per interaction by marketing campaign Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Number of new customers acquired by marketing campaign Customer retention rates Number of new leads by product CRM Sales Metrics Number of prospective customers Number of new customers Number of retained customers Number of sales calls Number of sales calls per lead Amount of new revenue generated Amount of recurring revenue Number of proposals given CRM Customer Service Metrics Cases closed the same day Number of cases handled by an agent Number of service calls Average number of service requests by type Average time to resolution Average number of service calls per day Percentage of compliance with service-level agreements Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Percentage of service renewals Customer satisfaction levels Managing Other Relationships Supplier Relationship Management (SRM) focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects Partner Relationship Management (PRM) focuses on keeping vendors satisfied by managing alliance partner, dealer, retailed, and reseller relationships that provide customers with an optimal sales channel Alliance Partners are competitors who cooperate in order to compete more successfully Dealers are agents who sell products or services on behalf of organizations Retailers sell smaller quantities of products to customers Resellers buy products in bulk and resell in order to make a profit Employee Relationship Management (ERM) is a management activity that focuses on managing an organization’s relationships with its employees Future CRM Trends CRM applications will continue to evolve and be used by a wide variety of partners CRM will continue to be a major strategic focus for companies CRM applications will continue to adapt wireless capabilities supporting mobile sales and mobile customers CRM suites will incorporate SRM, PRM, and ERM modules Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Databases & Data Warehouses 09/11/2014 DATABASES Data are raw facts that describe the characteristics of an event Information is data converted into meaningful and useful context Information Granularity refers to the extent of detail within the information (fine and detailed or coarse and abstract) Levels Individual, department, enterprise Formats Document, presentation, spreadsheet, database Granularities Detail (fine), summary, aggregate (coarse) Transactional Data encompasses all of data contained within a single business process of unit of work, and its primary purpose is to support performing daily operational tasks Analytical Information encompasses all organizational information, and its primary purpose is to support the performance of higher-level analysis tasks Information Timeliness Timeliness is an aspect of information that depends on the situation Real-time Data are immediate, up-to-date data Real-time Information is immediate, up-to-date information Real-time System provides real-time transactional data and / or realtime analytical information in response to query requests Characteristics of High Quality Information Accuracy: are all the values correct? Completeness: are any values missing? Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Consistency: does aggregate or summary information agree with detailed information Uniqueness: is each transaction, entity, and event represented only once in the information? Timeliness: is the info current with respect to business requirements 1. 2. 3. 4. The Four Primary Sources of Low Quality Info Include: Online customers intentionally enter inaccurate info to protect their privacy Data or info from different systems have different entry standards or formats Call centre operators enter abbreviated or erroneous info by accident or to save time Third party and external info contains inconsistencies, inaccuracies, and errors Potential Business Effects Resulting From Low Quality Info Include: Inability to accurately track customers, which directly affects strategic initiatives such as customer relationship management (CRM) and supply chain management (SCM) Difficulty identifying the organization’s most valuable customers Inability to identify selling opportunities Wasted revenue from marketing to non-existent customers and non-deliverable mail Difficulty tracking revenue because of inaccurate invoices Inability to build strong relationships with customers, which increases their buyer power Understanding the Benefits of Good Information High-quality information can significantly improve the chances of making a good decision Good decisions can directly impact an organization’s bottom line Storing Transactional Data Transactional data is stored in databases Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Database is a collection of records about various business categories such as resources (inventory), events (sales, payroll), people (employees), and places (warehouses, stores) Operational IS such as SCM and CRM maintain and access the transactional data in databases The most common business databases today are relational database management systems (DBMS) Database Fundamentals Hierarchical Database Model: information is organized into a treelike structure (using parent / child relationships) in such a way that it cannot have too many relationships Network Database Model: a flexible way of representing objects and their relationships Relational Database Model: stores info in the form of logically related two-dimensional tables. The most prevalent form of data basis structures used in business Entity: an individual person, place, thing, or an individual occurrence of an event about which info is stored Entity Class: a category of person, place, thing or event about which info is stored In a relational database each table collects the data for an entity class. ex. One table is for customers, another for orders, another for products In each table (entity class) each row, or record, contains the data for each entity belonging to that class Attributes: characteristics or properties of an entity class for which we collect data. In a DBMS, these are columns in the table called fields Relating Data through Keys Primary Key: a field (or group of fields) contain values that uniquely identify a given record in a table Foreign Key: a primary key of one table that appears a field in another table. A value in the foreign key of one table corresponds to the value in the primary key of another table Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Relationships: the data from one table is linked to another when the computer finds a match between the values in a primary key to the values in the foreign key of another table Relationship Database Advantages Database advantages from a business perspective include: 1. Increased Flexibility A well-designed database should: Handle changes quickly and easily Provide users with different views Have only one Physical View: deals with the physical storage information on a storage device Have multiple Logical Views: focuses on how users logically access information 2. Increased Scalability and Performance A database must increase or decrease in size to meet increased demand, while maintaining acceptable performance levels Scalability refers to how well a system can adapt its capacity to changing demands Performance measures how quickly a system performs a certain process of transaction 3. Reduced Redundancy Data Redundancy: the duplication of information or storing the same information in multiple places Problems Include: Inconsistency of data describing the same thing Waste of space, waste of time to enter and update Difficulty securing data in many places Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 4. Increased Integrity (Quality) Information Integrity: measure the quality of info Integrity Constraint: rules that help ensure the quality of info: Relational Integrity Constraint: rule that enforces basic and fundamental information-based constraints Business-Critical Integrity Constraint: rule that enforces business rules vital to an organization’s success and often requires more insight and knowledge than relational integrity constraints 5. Increased Security Information is an organizational asset and must be protected Databases offer several security features including Password: provides authentication of the user Access Level: determines who has access to the different types of information o RBAC – Role-Based Access Control allows groups to be assigned access levels, and people assigned to groups Access Control: determines types of user access, such as read-only access Database Management Systems (DBMS) is software through which users and application programs interact with a database (figure 7.6) Data-Driven Websites are interactive websites which use a database to keep it updated and relevant to the needs of its customers Advantages: Development Content management Future expandability Human error minimized Reduced production and update costs Increased efficiency Improved stability Data Integration Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Integration: allows separate systems to communicate directly with each other Forward Integration: takes information entered into a given system and sends it automatically to all downstream systems and processes Backward Integration: takes information entered into a given system and sends it automatically to all upstream systems and processes Figures 7.9 & 7.10 DATA WAREHOUSES Fundamentals: Data Warehouse: a logical collection of info – gathered from many different operational databases – that supports business analysis activities and decision-making tasks Data warehouse extend the transformation of data into info In the 1990’s executives became less concerned with the day-today business operations and more concerned with overall business function The data warehouse provided the ability to support decision making without disrupting the day-to-day operations The primary purpose of a data warehouse is to aggregate information throughout an organization into a single repository for decision-making purposes Extraction, Transformation, and Loading (ETL): a process that extracts information from the internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse Data Mart: contains a subset of data warehouse info extracted to be analyzed for specific units or objectives Figure 7.11 Multi-Dimensional Analysis Databases contain information in a series of two-dimensional tables Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 In a data warehouse and data mart, information is multi-dimensional. It contains layers of columns and rows Dimension: a particular characteristic of the information; an attribute Cube: common term for the representation of multi-dimensional information Information Cleansing or Scrubbing An organization must maintain high-quality data in the data warehouse Information Cleansing or Scrubbing: a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete info Software tools use sophisticated algorithms to parse, standardize, correct, match and consolidate warehouse info Figures 7.12 – 7.16 Business Intelligence (BI) BI: applications and technologies used to gather, provide access to, and analyze information to support decision-making The challenge is to make decisions in an environment that is data rich and information poor, to make data into information before said data is out of date, turning that information into knowledge by understanding how to use the info to increase profitability The Solution: Business Intelligence Businesses make hundreds of decisions a day based on facts but also on experience, accumulated knowledge and rules of thumb that take years to develop Improving business decisions has a direct positive effect on the bottom line BI systems can assist in better decisions, a more agile, intelligent enterprise Figures 7.17 – 7.21 Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 BI’s Operational Value Data Latency: the duration of time needed to make transactional data ready for analysis (extracting, transforming, and cleansing), and loading the summarized, aggregated, cleansed data (analytical info) into a data warehouse Analysis Latency: the time from which the analytical information is make available to the time when analysis is complete Decision Latency: is the time it takes for a human to comprehend the analytic result and determine an appropriate action Data Mining Data Mining: the process of analyzing data to extract information not offered by the raw data alone Drilling Down: increasing levels of detail Drilling Up: increasing summarization Data-Mining Tool: uses a variety of techniques to find patterns and relationships in large volumes of information and infers rules that predict future behaviour and guide decision making Data mining approaches decision making with a few different activities in mind including: Classification: assigns records to one of a predefined set of classes Estimation: determines values for an unknown continuous variable behaviour or estimated future value Affinity Grouping: determines which things go together Clustering: segments a heterogeneous population of records into a number of more homogeneous subgroups Techniques Cluster Analysis: a statistical technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Association Detection: reveals the relationship between variables along with the nature and frequency of the relationships Market Basket Analysis analyzes such items as web sites and checkout scanner information to detect customers’ buying behaviour and predict future behaviour buy identifying affinities among customers’ choices of products and services Statistical Analysis: performs such functions as information correlations, distributions, calculations, and variance analysis Forecasts are predictions made on the basis of time-series information Time-Series Information is time-stamped information collected at a particular frequency Business Benefits of BI Single point of access for all users BI across organizational departments Up-to-the-Minute info for everyone Categories of BI benefits: o Direct quantifiable benefits o Indirect quantifiable benefits o Unpredictable benefits o Intangible benefits Figures 7.24, 7.25 Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Helping Organizations Access, Share, and Use Information 09/11/2014 Peter Drucker “Knowledge has become the economic resource and the dominant and perhaps even the only - source of competitive advantage” Look up more info “now that knowledge is taking the place of capital as the driving force in organizations worldwide, it is all too easy to confuse data with knowledge and information technology with information” “the computer is a moron” Family miles instead of air miles, offered by IBM Introduction Knowledge Management (KM) involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. KM is the systematic, effective management and use of an organization’s information resources that contain or embody knowledge Knowledge Management System (KMS) supports capturing, organizing, and disseminating knowledge (i.e. know-how) throughout an organization Explicit Knowledge consists of anything that can be documented, archived, and codified, often with the help of information systems Tacit Knowledge is the knowledge in people’s heads, the challenge lies in how to share, generate, recognize, and manage this knowledge Shadowing: less experienced staff observe more experienced staff to learn how their more experience counterparts approach their work Joint Problem Solving is having an expert and novice work together to bring their independent processes to light and complete a given task KM Technologies generally fall into one or more of the following four: Knowledge repositories (databases) Expertise tools E-learning applications Discussion and chat technologies Search and data mining tools Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 KM Outside the Organization Crowdsourcing is the most common form of collective intelligence found outside the organization Asynchronous Communications are instant forms of communication KM and Social Networking Social Networking Analysis (SNA) is a process of mapping a group’s contacts (whether personal or professional) to identify who knows whom and who works with whom. This provides a clear picture of how groups work together and any clear leaders within the group Collaboration giving others the tools to share and receive knowledge Teams, Partnerships, and Alliances Core Competency of an organization is its key strength, a business function that it does better than any of its competitors Core Competency Strategy is one in which an organization chooses to focus specifically on what it does best (its core competency) and form partnerships and alliances with other specialist organizations to handle nonstrategic business processes Information Partnership occurs when two or more organizations cooperate by integrating their information systems, thereby providing customers with the best of what each can offer Collaboration Systems Collaboration System is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information Collaboration Systems fall into one of two categories: 1. Unstructured Collaboration (or Information Collaboration) includes document exchange, shared whiteboards, discussion forums, and email. These functions can improve personal productivity, reducing the time spent searching for information or chasing answers 2. Structured Collaboration (or Process Collaboration) involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules. This helps improve automation and the routing of information. Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Content Management Systems CMS provides tools to manage creating, storing, editing, and publishing information in a collaborative environment Wikis are web-based tools that make it east for users to add, remove, and change online content Business Wikis are collaborative web pages that allow users to edit documents, share ideas or monitor the status of a project Workflow Management Systems Workflow defines all the steps or business rules, from beginning to end, required for a business process Workflow Management Systems facilitate the automation and management of business processes and control the movement of work through the business process Messaging-Based Workflow Systems send work assignments through and email system Data-Based Workflow Systems store documents in a central location and automatically ask the team members to access the document when it is their turn to edit the document Groupware Systems Groupware is software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing Video Conference is a set of interactive telecommunication technologies they allow two or more locations to interact via two-way video and audio transmissions simultaneously Web Conferencing blends audio, video, and document-sharing technologies to create virtual meeting rooms Instant Messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real time over the internet M-Learning uses portable computing devices with wireless capability to enable mobility and mobile learning Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Enterprise Portals Enterprise Portals are single-point web browser interfaces used within an organization to promote gather, sharing, and disseminating information throughout and enterprise (also rarely referred to as corporate or business portals) The four features of Enterprise Portals are: Publishing Facility allowing users to post and index info directly Automatic Indexing Facility classifies info in the portal using an algorithm Subscription Facilities notifies and distributes info on a regular basis to specific or groups of users Intelligent Agents to understand a user’s preferences and toles, helping them find information of relevance Two broad categories of Enterprise Portals Vertical Enterprise Portals focusing on accessing specific applications or business functions, such as account or purchasing Horizontal Enterprise Portals seek to integrate and aggregate information from multiple cross-enterprise applications (i.e., a particular product or service, or specific line of business Potential of Enterprise Portals These three distinct areas must be comprised in order to leverage EP for knowledge work and promoted collaboration: 1. Content Space: provides access to corporate data and information 2. Communication Space: provides channels for conversations 3. Coordination Space: facilitates workflow and work routines Factors Affecting Enterprise Portal Adoption and Use Several broad factors were identified that affect the degree to which an enterprise portal would be used: 1. Information Politics: the human struggle over an enterprise portals content and functionality can lead to resultant designs that favour certain stake holder groups rather than address end-user needs Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 2. System Development Process: a perceived slowness in changes to an enterprise portals design or information content can lead to user dissatisfaction 3. Information Culture has 5 sub-factors: a. Information Sharing: the provision of protected, secure areas in an enterprise portal to pre-defined individuals or groups can lead to greater exchange of documents and ideas b. Information Overload: the filtering of info within an enterprise portal can lead to greater user acceptance c. Information Access: providing quick and universal access to an EP can lead to heightened usage d. Information Control: offering a means to tailor the display and presentation of info on an EP can increase user satisfaction e. Attitude Towards Using an EP: a positive perception towards an awareness of an EP’s functionality can lead to greater user adoption Computer-Supported Cooperative Work (CSCW) refers to a field of research concerned with the development and use of software to help groups increase their competency in working together. The following are insights on adoption and us of EPs: Ensure that everyone benefits Create incentives for use Promote multiple perspectives Understand current work practice Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Information, Ethics, Privacy, & Security 09/11/2014 Intro Ethics are the principles and standards that guide our behaviour toward other people Privacy is the right to be left alone when you want to be, to have control over personal possessions, and not to be observed without your consent Confidentiality is the assurance that messages and info are only available to those who are authorized to view them INFORMATION ETHICS Information Ethics concerns the ethical and moral issues arising from the development and use of information technologies and systems, as well as the creation, collection, duplication, distribution, and processing of information itself Individuals form the only ethical component of MIS o Individuals copy, use, and distribute software o Search organizational databases for sensitive and personal info o Individuals create and spread viruses o Indivs hack into computer systems and steal info o Employees destroy and steal info Acting ethically and legally are not always the same Technology Related Ethical Issues: Intellectual Property: intangible creative work that is embodied in physical form Copyright: the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents Fair Dealing: in certain situations, it is legal to use copyrighted material Pirated Software: the unauthorized use, duplication, distribution, or sale of copyrighted software Counterfeit Software: software that is manufactured to look like the real thing and sold as such Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Primary Reasons Privacy Issues Reduce Trust for E-Business: 1. Loss of personal privacy 2. Internet users a “a lot” more inclined to purchase a product on a site that has a privacy policy 3. Effective privacy would convert more internet users to buyers Information Ethics Issues in the Workplace Systems That Don’t Respect Human Dignity Tasks are overly simplified, removing the need for employee decision making Some systems interfaces require difficult navigation or overly long wait times between transactions Including users in systems design ensures that worker impact is considered Employee Monitoring May be unprecedented or intrusive and violating basic privacy and personal freedom Employees may not even be aware of it Org’s can be held financially responsible for their employees’ actions, may be liable for the risks the employees take, monitoring is required Communication with employees is necessary Effects of Employee Monitoring Employee Absenteeism o Taking care of personal business, given a few hours or whole days can make impacts on costs Lower Job Satisfaction o People believe the quantity of work is more important that the quality “Psychological Resistance” o If employees are told they can’t do something, they will want to even more than before Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Tracking People’s Activities Information Technology Monitoring is tracking people’s activities buy such measures as number of keystrokes, error rate, and number of transactions processed (cookies, adware, spyware, clickstream, etc.) Protecting Digital Content In Canada a new bill is in the process of being enacted to protect copyright and digital content. It will likely include the following: Legalizing format shifting Legalizing time shifting Creating back-up files Allowing mash up media for non-commercial use Enacting a system where copyright holders can inform ISPs of piracy by their customers The Canadian copyright legislation and protection of digital content would also include: Protecting search engines and ISPs from copyright violations of their users Differentiating commercial and individual penalties Criminalizing cracking a digital lock placed on a device, disc, or file Increasing fair dealing and use of material in education o Fair Dealing: is a long-standing feature of Canadian copyright law that permits certain uses of copyrighted material in ways that do not threaten the interests of copyright owners, but which could have significant social benefits Access Copyright: established in 2010, increased the tariff on gaining copyright permissions for things like articles or cases for classroom use Information Privacy Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Concerns the legal right or general expectation of individuals, groups, or institutions to determine from themselves when, and to what extent, information about them is communicated to others Information privacy legislation varies from Europe, the United States, and Canada Personal Information Protection and Electronic Documents Act (PIPEDA): Canada’s primary privacy law Types of Personal Info Covered Under PIPEDA: Pension and employment insurance files Medical records Tax records Security clearances Student loan applications Military records 1. 2. 3. 4. 5. 6. 7. 8. Exceptions to PIPEDA: Journalistic, artistic, or literary use Actions clearly benefit to the individual, or if obtaining permission could infringe on the information’s accuracy Information, or the disclosure of, aids a legal investigation, or an emergency where lives / safety are at stake Info disclosure facilitates that conservation of historically important records PIPEDA’s 10 Guiding Principles Accountability: an org is responsible for personal info under its control Identifying Purposes: the purposes for which personal info is collected shall be identifies Consent: the knowledge and consent of the individual are required Limiting Collection: the collection of personal info shall be limited to that which is necessary for the purposes identified Limiting Use, Disclosure, and Retention: personal info shall not be used or disclosed for purposes other than those for which it was collected Accuracy: personal info shall be as accurate, complete, and up-to-date as is necessary for the purposes for which it is to be used Safeguards: personal info shall be protected by security safeguards Openness: an org shall make readily avail specific info about its policies and practices Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 9. Individual Access: upon request, an individual shall be informed of the existence, use and disclosure of their personal info and shall be given access to said info 10. Challenging Compliance: an individual shall be able to address a challenge concerning compliance Developing Policies for Information Ethics and Information Privacy E-Policies: policies and procedures that address the ethical use of computers and Internet use in the business environment Ethical Computer Use Policy: contains general principles to guide computer user behaviour The ethical computer use policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules CIO Magazine’s Six Principals for Ethical Info Management 1. Info is a valuable corporate asset and should be managed as such, like cash, facilities, or any other corporate asset 2. The CIO is steward of corporate info and is responsible for managing it over its lifecycle – from its generation to its appropriate destruction 3. The CIO is responsible for controlling access to and use of info, as determined by governmental regulation and corporate policy 4. The CIO is responsible for preventing the inappropriate destruction of info 5. The CIO is responsible for bringing technological knowledge to the development of information management practices and policies 6. The CIO should partner with executive peers to develop and execute the organization’s info management policies Information Privacy Policy contains general principles regarding info privacy. A few guidelines for org’s creating an info privacy policy: Adoption and Implementation of a Privacy Policy Notice and Disclosure Choice and Consent Information Security Information Quality and Access (figure 9.9) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Acceptable Use Policy (AUP): a policy that a user must agree to follow in order to be provided access to a network of to the internet Non-Repudiation Clause: a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions AUP Stipulations: Not using the technologies in violating any law Not attempting to break the security of any computer network or user Not posting commercial messages to groups without prior permission Not performing any non-repudiation Not attempting to send junk email or spam to anyone who doesn’t want to receive it Email Privacy Policy details the extent to which email messages may be read by others (FIGURE 9.11) Email Privacy Policy Stipulations: Is complementary to the ethical computer use policy Defines who legitimate email users are Explains the backup procedure so users will know that at some point, even if a message is deleted from their computer, it will still be on the backup tapes Describes the legitimate grounds for reading someone’s email and the process req’d before such action can be taken Informs that the org has no control of email once it is transmitted outside the org Explains what will happen if the user severs their connection with the org Asks employees to be careful when making org’l files and docs available to other Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Internet Use Policy contains general principles to guide the proper use of the internet Anti-Spam Policy simply stats that users will not receive unsolicited emails (spam) Spam Prevention Tips: Disguise email addresses poster in a public electronic place Opt out of member directories that may place your email online Use a filter Employee Monitoring Policies 1. Be as specific as possible 2. Always enforce the policy 3. Enforce the policy in the same way for everyone 4. Expressly communicate that the company reserves the right to monitor all employee 5. Specifically state when monitoring will be performed 6. Specifically state what will be monitored (email, IM, etc.) 7. Describe the types of info that will be collected 8. State the consequences for violating the policy 9. State all provisions that allow for updates to the policy 10. Specify the scope and manner of monitoring for any information system 11. When appropriate, obtain a written receipt acknowledging that each party has, received, read, and understood the monitoring policies INFORMATION SECURITY Downtime can be unplanned and affect finances in many ways. Unplanned downtime can come in the form of an earthquake, fraud, a flood, shredded data, sabotage, theft, etc. Downtime can impact: Financial Performance: cash flow, stock price, credit rating, etc. Revenue: direct loss, future revenues, lost productivity, etc. Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Damaged Reputation: customers, suppliers, banks, etc. Other: temp employees, overtime costs, legal obligations, etc. Protecting Enterprise Information Information Security: the protection of info from accidental or intentional misuse by persons inside or outside an org Info must be protected to maintain a company’s competitive advantage as well as customer privacy The First Line of Defence – People Insiders: the greatest threat to a business IS, legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident Social Engineering: using social skills to trick others into revealing access credentials or other valuable information, dumpster diving is a lower form of social engineering Information Security Policies: identify the rules req’d to maintain info security Information Security Plan: how an org will implement the info security policies Things an Info Security Plan Should Do: Identify and assess risks to customer info Identify security plan roles and assign responsibilities Provide ways to identify and assess risk Develop written policies and procedures to manage and control identified risks Identify mechanisms to implement and assess the plan Areas That Should be Addressed by an Info Security Plan: Employee mgmt and training Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 1. 2. 3. 4. 5. Physical security of the data and info Safeguards Service providers Creating an Information Security Plan Develop the Info Security Policies: could be as simple as ensuring logging out, or frequent password changes Communicate the Info Security Policies: train all employees and establish clear expectations Identify Critical Info Assets and Risks: require the use of user IDs, passwords, and anti-virus software. a. Firewall: hardware or software that guards a private network by analyzing the info leaving and entering the network b. Intrusion Detection Software (IDS): searches out patterns in info and network traffic to indicate attacks and quickly responds to prevent any harm Test and Revaluate Risks: continually perform security reviews, audits, background checks, and security assessments Obtain Stakeholder Support: gain the approval and support of the info security policies from the board of directors and all stakeholders The Second Line of Defence – Technology There are three primary information technology security areas 1. Authentication and authorization Authentication: is a method for confirming users’ identities Authorization: is the process of giving someone permission to do or have something The most secure type of authentication involves: Something the User Knows, Such as a User ID and Password Identity Theft: is the forging of someone’s identity for the purpose of fraud Phishing: is a technique to gain personal information for the purpose of identity theft, usually by fraudulent email Something the User Has, Such as a Smart Card or Token Tokens: are small electronic devices that change user passwords automatically Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Smart Card: a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing Something That is Part of the User, Such as a Fingerprint or Voice Signature: Biometrics: the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting 2. Prevention and resistance Technologies available to help prevent & build resistance to attacks include: Content Filtering: prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading Encryption: is a method of transforming a message into an alternative form that requires a key or password to make it readable Public Key Encryption (PKE): is a method where the key to scramble the message is known to everyone but the key to unscramble it is held by the recipient only Firewall: hardware and / or software that guards a private network by analyzing the information leaving and entering the network 3. Detection and response Antivirus software is the most common type of detection and response technology. If prevention and resistance strategies fail and there is a security breach, an org can use detection and response technologies to mitigate the damage Hackers: experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge o Black-hat Hacker: work at the request of the system owners to find system vulnerabilities and plug the holes o White-hate Hacker: break into other people’s computers, might just look around, or steal / destroy info Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Hactivists: have philosophical and political reasons for breaking into systems and will often deface the web in protest o Script Bunnies: find hacking code in the internet and clickand-point their way onto systems to cause damage or viruses o Crackers: hackers with criminal intent o Cyberterrorists: seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction Virus: malicious software that spreads from computer to computer by a user activating the file in which it resides o Worms: a type of malicious software that spreads across networks and does not need a user to activate it o Backdoor Programs o Denial-of-Service (DoS) o Distributed Denial-of-Service (DDoS) o Polymorphic Virus o Trojan-horse Virus Security Threats to E-Business o Elevation of Privilege o Hoaxes o Malicious Code o Packet Tampering o Sniffer o Spoofing o Splogs o Spyware o Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Systems Development & Project Management 09/11/2014 SYSTEMS DEVELOPMENT Developing Information Systems: Information systems that are built correctly can transform as the organization and its business transform Information systems that effectively meet employee needs will help an organization become more productive and enhance decision making Information systems that do not meet employee needs may have a damaging effect on productivity and can cause a business to fail As org’s reliance on IS grows, so do the business-related consequences of IS development successes and failures including: An increase or decrease in revenue Repairs or damage to brand reputation Prevention or incurring of liabilities Increase of decrease productivity Global IS Development Global IS must support a variety of customers, users, products, languages, laws, currencies, and so on An efficient, effective and responsive IS to support global e-commerce must promote the involvement and ownership of all local system users Global standardization of data definition allows for sharing data among international businesses Strategies: 1. Transform and customize home office system into a global application to support all end-users 2. Set up multinational development teams to represent local sites as well as corporate headquarters 3. Use centres of excellence where development is sent to the subsidiary with the expertise 4. Outsource development offshore to take advantage of experience in building global IS Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 The Systems Development Lifecycle (SDLC) The overall process for developing IS from planning and analysis through implementation and maintenance Seven Distinct Phases of SDLC (IMPORTANT) 1. Planning Phase: establishes a high-level plan of the intended project and determines project goals 2. Analysis Phase: involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system o Business Requirement: specific business requests the system must meet to be successful 3. Design Phase: establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation 4. Development Phase: involves taking all of the detailed design documents from the design phase and transforming them into the actual system 5. Testing Phase: involves bringing all the project pieces together into a special testing environment to eliminate errors and bugs, and verify that the system meets all of the business requirements defined in the analysis phase 6. Implementation Phase: involves placing the system into production so users can begin to perform actual business operations with it 7. Maintenance Phase: involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet its business goals System Development Methodologies Methodology: a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Systems Development Methodologies Include: 1. Waterfall Methodology: a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implantation and maintenance Shortfalls: The Business Problem: any flaws in defining what is needed to complete one phase and move onto the next phase The Plan: the effects of unexpected contingencies, schedule delays, managing costs, resources, and time constraints The Solution: assumes that users can specify all requirements in advance, vision is limited at the beginning 2. Agile Software Development Methodologies Agile Methodology: aims for customer satisfaction with early and continuous delivery of useful system or software components meeting bare minimum requirements Iterative Development: consists of a series of fast, efficient, short, lower cost projects that achieve rapid feedback and acceptance. It’s speed, size, and focus account for end user satisfaction (figure 10.5) Primary Forms of Agile Methodologies: Rapid Application Development Methodology (RAD): emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes o Prototype: a smaller-scale representation or working model of the users’ requirement, or, a proposed design Extreme Programming (XP) Methodology: software project is broken down into small phases o 4 parts: planning, designing, coding, testing, which advance rapidly one after another o Users are embedded in the process narrowing the communications gap between developer and user o Method responds to changing customer requirements as the system is developed Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Rational Unified Process (RUP) Methodology: provides a framework for breaking down the development of software into four gates: o Gate One: Inception o Gate Two: Elaboration o Gate Three: Construction o Gate Four: Transition Scrum Methodology: uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal. Under this methodology, each day ends or begins with a stand-up meeting to monitor and control the development effort Agile Alliance Manifesto values: Individuals and interactions over processes and tools Working software over comprehensive documentation Customer collaboration over contract negotiation Responding to change over following a plan 3. Participatory Design Methodology: views the users, not the developers as experts: Create opportunities for mutual learning Utilize design tools familiar to users Use language familiar to users Start the design with current practice Encourage users to envision future situations of working with the final system Self-Sourcing: the systems are developed by those who use them Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Developing Successful Systems Five Primary Principles For Successful Agile Software Development Include: Slash the Budget If It Doesn’t Work, Kill It Keep Requirements to a Minimum o Scope Creep: occurs when the project scope increases o Feature Creep: occurs when developers add more features than were initially required Test and Deliver Frequently Assign Non-IT Executive to Software Projects PROJECT MANAGEMENT Consequences of failed projects include: Damaged brand Lost goodwill Dissolution of partnerships Lost investment opportunities Low morale Three Primary Project Variables: Time Cost Scope These three variables are all interdependent; all projects are limited in some way by these three constraints. Project Management Terms Project: temporary activities undertaken to create a unique product or service Project Management: the application of knowledge, skills, tools, and techniques to project activities to meet project requirements Project Manager: an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Project Deliverable: any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project Project Milestone: represents key dates when a certain group of activities must be performed Project Management Institute (PMI): the org that supports the profession of project management Project Management Office (PMO): an internal department that oversees all organizational projects Four Primary Activities of Project Management 1. Choosing Strategic Projects: org’s choose among possible projects that should be undertaken Project Stakeholders: are individuals and orgs actively involved in the project or whose interests might be affected as a result of project execution or project completion Executive Sponsor: the person or group that provides the financial resources for the project Techniques for Choosing Strategic Projects: Focus on Organizational Goals Categorize Projects (such as the following 3) o Problems undesirable situations o Opportunities chances to improve o Directives new requirements imposed by management Perform a Financial Analysis (net present value, ROI, payback) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 2. Understanding Project Planning: 2 key components, charters & plans Project Charter: a document issued by the project initiator or sponsor that formally authorizes the existence of a project and typically includes: o Project Scope: defines the work to be done (Use SMART) o Project Objectives: the quantifiable criteria to be met o Project Constraints: the factors that limit project options o Project Assumptions: factors believed to be true that impact the project (hours of the week, time of year) Project Plan: a formal, approved document that manages and controls project execution. A well defined plan should have: o Description of project scope o A list of activities o A schedule o Time and cost estimates o Risk factors o Assignments & responsibility o Kill Switch: a trigger that enables mgmt to close the project prior to completion Characteristics include: o Easy to understand & read o Communicated to all key participants (key stakeholders) o Appropriate to the project’s size, complexity, and criticality o Prepared by the team, rather than by an individual PM Two diagrams that provide visual support to a project: Program Evaluation and Review Technique (PERT) Chart: is a graphical network model that depicts a project’s tasks / milestones and the relationships between them, the dependencies (fig 10.15) Gantt Chart: is a simple bar chart that depicts project tasks against a calendar (fig 10.16) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 3. Managing Projects: managing a project includes: Identifying requirements Establishing clear and achievable objectives Balancing the competing demands of quality, scope, time, and cost Adapting the specifications, plans, and approach to the different concerns and expectations of the various stakeholders A PM must focus on managing 3 primary areas to ensure success: People Communications o Receiving Feedback Change o Change Management (Organizational Change Management): is a set of techniques that aid in evolution, composition, and policy management of the design and implementation of a system o Change Management System: includes a collection of procedures to document a change request, and define steps to consider the change based on the anticipated outcome o Change Control Board (CCB): responsible for approving or rejecting all change requests John Kotter’s 8 Steps for Leading Change i. Establish a sense of urgency ii. Create the guiding coalition iii. Develop the change vision and strategy iv. Communicate the change vision for buy-in v. Empower for broad-based action vi. Generate short-term wins vii. Never let up viii. Incorporate changes into the culture Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Measuring Project Value: Difficult to measure all the benefits as well as all the costs to determine ROI Not everything is quantifiable (morale) Not every cost or benefit is visible How to measure problems that were prevented Designing metrics requires expertise How to define success? How to apply quantitative measures to business process and qualitative deliverables? What info reflects progress or lack of? Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 4. Outsourcing Projects: two basic options Insourcing (in-house-development): a common approach within an org to develop and maintain the org’s info tech systems Outsourcing: is an arrangement by which one org provides a service for another that chooses not to perform them in-house Outsourcing Options: Onshore Outsourcing: engaging another company within the same country for services Nearshore Outsourcing: contracting an outsourcing arrangement with a company in a nearby country Offshore Outsourcing: using orgs from developing countries to write code and develop systems Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Benefits to Outsourcing IS Development: Core Competencies: allows a company to maintain an up-to-date infrastructure and invest in what it does best Financial Savings: often cheaper to hire labour offshore Acquire Best Practices: instead of keeping up with technology, buy the benefits from a company that has Industry Changes: keep managers busy with their own businesses and outsource to better focus on their own issues Globalization and the Internet: make off shore outsourcing easy and comfortable, deliver international services Challenges to Outsourcing: Contract Length o Difficulties in getting out of a contract o Problems in foreseeing future needs o Problems in reforming an internal IS department after the contract is finished Competitive Edge Confidentiality Scope Definition Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Enterprise Architectures 09/11/2014 Enterprise Architecture Enterprise Architecture (EA): includes the plans for how an org will build, deploy, use, and share its data, processes, and IT assets Enterprise Architect: a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT & business Goals of Enterprise Architecture Reduce Cost / Improve Productivity Improve Customer Satisfaction Create Competitive Advantages Generate Growth Generate New Revenue Streams Optimize the Supply Chain Global Enterprise Architectures The interent creates a borderless global enviro with opportunity for low cost communication / exchange Managing a global EA includes technology issues, and political and cultural considerations More than 2 dozen countries still attempt to restrict internet access Estimating operational expenses with international IT operations is a global challenge. Deciding on in-sourcing or out-sourcing Top International Telecommunications Issues Network Improving the operational efficiency of networks Dealing with different networks Controlling data and communication security Regulatory Issues Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Dealing with transborder data flow restrictions Managing international telecommunication regulations Handling international politics Continued on next page. Technology and Country-Oriented Issues Managing network infrastructure across countries Managing international integration of technologies Reconciling national differences Dealing with international tariff structures Building Blocks of EA Information Architecture: identifies where and how important data, like customer records, are maintained and secured Backup and Recovery Backup: an exact copy of a system’s info Recovery: the ability to get a system up and running in the even of a system crash or failure, including restoring info backup Fault Tolerance: a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service Failover: a backup operational mode in which the functions of a computer component is assumed by another when the first becomes available Disaster Recovery best practices include: o Mind the enterprise architectures o Monitor the quality of computer networks that provide data on power suppliers and demand o Make sure the networks can be restored quickly in the case of downtime o Set up disaster recovery plans Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 o Provide adequate staff training, including verbal communication protocols so that operators are aware of any IT-related problems Disaster Recovery Plan: a detailed process for recovering info or an IT system in case of a disaster (fire, flood, etc.) Disaster Recovery Cost Curve: charts the cost of the unavailability of information and technology, and, the cost of recovering from a disaster over time Hot Site: a separate, fully equipped facility that the company moves into after a disaster Cold Site: a separate, facility lacking computer equip where employees can move after a disaster Business Continuity Planning: indicates how an org will restore interrupted critical functions within a pre-determined time o Key incident-responding elements; the response itself, communications mgmt, and operations mgmt. o Then, critical services must be continued, followed by restoration and recover of normal business operations Info Security Managing User Access: preventing unauthorized access to the IS and it’s data, weakest link in securing an IS Anti-Virus Software and Patches: applications that prevent hackers, spammers and other malcontents from entering the network, constantly updated and changed Infrastructure Architecture (fig 11.6) Flexibility: watching business trends and adapting Scalability: how well a system can adapt to increased demands o Capacity Planning: determines future IT requirements for new equip and additional network capacity Reliability: ensures all systems are functioning correctly and providing accurate info Availability: addresses when a system can be used o High Availability: a system that is continuously operational for a long period of time o Measured on scale of 100 percent operational (5 9’s, 99.999) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Performance: measures how quickly a system performs a certain process or transaction (in terms of efficiency IT metrics, both speed and throughput) Application Architecture: determines how applications integrate and relate to each other Web Services: contain web-based data and procedures that use the same standards permitting different applications to relate to each other o Interoperability: two or more systems share data and resources, even though they are made by diff manufacturers Two Types of Web Services o Event: the type of application that monitors a business process for threats and opportunities and alerts those who can act on the info o Service: a software component that, no only provides code to be used by developers to create specific functionality in a larger program being developed, but also can be used by other applications to perform a task across a wide range of clients Open Systems: a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them o Open Source: refers to any program whose source code is made available for use or modification ARCHITECTURE TRENDS Service Oriented Architecture (SOA): is an approach to IT architecture which creates connections among a variety of applications and info sources so that the system can adapt quickly and easily (fig 11.8) SOA Business Benefits (fig 11.9) Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 SOA Service: is not merely a piece of software but a business task that is part of a business process. IT can be coupled and uncoupled with others as needed providing flexibility and agility Interoperability: a key characteristics of SOA, allowing component software to be used across platforms and applications Extensible Markup Language (XML): for documents containing structured info Loose Coupling: applications are built from a number of services that are distinct well-defined units that can be disconnected and replaced or reused elsewhere as needed. New applications may be assembled rather than coded from scratch SOA Solutions Figure 11.10 Virtualization A framework of dividing the resources of a computer into multiple execution environments Creates multiple “virtual machines” on a single computer Optimizes the use of computer processing and storage Can be performed on data-centre resources and peripherals such as printers System Virtualization: sometimes referred to as server or desktop virtualization, is the ability to present the resources of a single computer as if it is a collection of separate computers Benefits of Virtualized Computing With an exponential increase in capacity for every generation of processor improvement, there is capacity in most hardware to run multiple operating systems. Data Centres are running out of space. Collaborative projects, collection of transaction data, downloads from the Internet escalate the problem. By hosting multiple guests on single systems, the space utilization drops significantly. Benefits to sustainability arise as a single computer is supporting multiple users and consuming the energy for one computer instead of many. Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 GRID Computing A collection of computers, often geographically dispersed that are coordinated to solve a common problem (fig 11.13, 11.14) Cloud Computing Refers to the use of resources and applications hosted remotely on the internet Advantages: Convenient access to application programs and data Cost saving for data storage and software and client computers “pay as you go” rather than large capital expenditures Disadvantages: No control over applications, lack of customization Must trust a 3rd party with confidential information Possible data access issues Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Networks, Telecommunications, and Mobile Technology 09/11/2014 NETWORKS & TELECOMMUNICATIONS Network Basics Telecommunication System: enables the transmission of data over public or private networks Network: a system created by linking two or more computers and establishing standards, or protocols, so that they can work together The three types of networks include: Local Area Network (LAN) o Used in an office, school, or home, connects printers, etc. Metropolitan Area Network (MAN) o Covers a state, province, or country Wide Area Network (WAN) o Usually connects multiple LANs Data Sharing Through Networks The key advantage of providing data communication links between a company and its suppliers or customers is the sharing of data Data communication links enable data sharing allowing companies to be competitive Topics in this area include: Voice Over IP (VoIP): uses TCP/IP technology to transmit voice calls over long-distance telephone lines VoIP Business Advantages: Windows Installer / MSI package to make it easy to rollout the application to multiple machines Skype for Business Control Panel allowing a business to manage all of its Skype accounts from a central interface (Skype has long been a popular choice for business) Call forwarding and the ability to filter and block unwanted calls Conference calling for up to 10 people File transfer feature allowing the sharing of reports, pics, or files Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Networking Businesses Virtual Private Network (VPN): a way to use the public telecommunication infrastructure (ex. Internet) to provide secure access to an org’s network (fig 12.3) Value-Added Network (VAN): a private network, provided by a third party, for exchanging info through a high capacity, secure connection Increasing the Speed of Business Bandwidth: the difference between the highest and lowest frequencies that can be transmitted on a single medium Broadband: refers to high-speed internet connections transmitting data at speeds greater than 200Kbps Securing Business Networks MOBILE TECHNOLOGY Mobile & Wireless are often used synonymously, but actually denote two different technologies. Mobile Technology: means the technology can travel with the user, but it is not necessarily in real-time Wireless Technology: gives users a live (internet) connection via satellite or radio transmitters. The signal is carried on radio waves, microwaves & satellites. Refers to any type of electrical or electronic operation that is accomplished without the use of a “hard wired” connection Drivers of Wireless Growth Universal Access to Data and Applications The Automation of Business Processes User Convenience, Timeliness, and Ability to Conduct Business 24/7/365 Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Mobile Strategy Mobile Applications Can: Help track materials and shipments from suppliers and distributors to customers Manage inventory Support point of sale Collect data in an automated fashion Immediate data analysis Factors to Consider When Deploying Mobile Strategies fig. 12.9 Defining Risks Knowing the Limits of Technology Protecting Data from the Loss Compliance in the Mobile Enterprise Staying Flexible and Embracing Change Cellular Technologies Today 3G cellular networks are designed for high-speed transmission of multi-media data and voice 4G networks are set up to integrate radio and television transmission and to consolidate the world’s phone standards into one high-speed technology Convergence of voice, video, and data allow users to make calls, surf the Web, use touch controls, access music, audiobooks, videos, TV shows and movies Types of Cellular Technologies: Personal Digital Assistants (PDAs): small, handheld computers capable of entirely digital communications transmission Smartphone: combines the functions of a cell phone and a PDA in a single device Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Tablets: a mobile computer that is larger than a mobile phone, with an integrated flat touch screen. Recent improvements in memory and functionality have seen tablet sales sky-rocket Bluetooth: is a telecommunications industry specification that describes how mobile phones, computers, and PDAs can be easily interconnected using a short-range wireless connection Cellular Technology Overview Base Station transmits radio waves to Cells Cells transmit to users Each cell has a base station that consists of a tower and a small building containing radio equipment Each cell is typically sized at about 26 square kilometres Using Satellite Technologies in Business Satellite: a space station that orbits the Earth receiving and transmitting signals from Earth0based stations over a wide area Microwave Transmitter: uses the atmosphere as the transmission medium to send the signal to a microwave receiver. The microwave receiver then either relays the signal to another microwave transmitter or translates the signal to some other form, such as digital impulses Satellite Technologies Location Based Services (LBS): wireless mobile content services that provide location-specific data to mobile users moving from location to location Mass Market o Emergency, navigation, and tracking services, location advertising, and gaming Professional Market o Workforce organization, and security Global Position Systems (GPS): a constellation of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographical location (fig 12.15) Geographic Information System (GIS): is designed to work with data that can be shown on a map Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Consists of hardware, software, and data that provide location info for display on a multidimensional map Using Wireless Technologies in Business Wireless Fidelity (Wi-Fi): a means by which portable devices can connect wirelessly to a LAN, using access points that send and receive data via radio waves Wireless LAN (WLAN): a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet Wireless MAN (WMAN): a metropolitan area network that uses radio signals to transmit and receive data Worldwide Interoperability for Microwave Access (WiMAX): a communications technology aimed at providing high-speed wireless data over metropolitan area networks (fig 12.17, 12.18) Benefits: long range, low cost, wireless, high bandwidth, service RFID Tags: radio frequency identification The High Arctic Data Communication Systems (HADCS) of Ellesmere Island: "The HADCS is a secure data communication system between CFS Alert and Ottawa. The system is, in part, composed of a chain of six, line-of-sight microwave repeaters between CFS Alert to Eureka with a satellite link between Eureka and Ottawa." -Canadian Forces Mobile Trends Social Networking Gets Mobilized Mobile TV Multi-Function Devices Become Cheaper & More Versatile Location-Based Services Mobile Advertising Wireless Providers Move into Home Entertainment Wireless Security Moves to the Forefront Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 Enterprise Mobility Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 09/11/2014 Downloaded by Wendy vu (uwendyvu@gmail.com) lOMoARcPSD|20355431 09/11/2014 Downloaded by Wendy vu (uwendyvu@gmail.com)