Chapter 1: Chapter 1: Information Systems in Global Business Today Smart Stores Reinvent the Retail Space. • Despite the increase in online shopping, physical retail stores are still relevant. • Retailers are using information technology to enhance the in-store shopping experience. • Acrelec is piloting technology to manage curbside pickups. • Smart shelves use various sensors to personalize the shopping experience and improve operational efficiencies. • AWM Frictionless enables customers to shop and checkout without interacting with a cashier. • AWM also offers an application for tracking consumer behavior and directing them to other parts of the store using digital signage. Retail stores are using innovative information technology to draw buyers and improve the in-store experience. The use of object-recognition technology, sensors, and smartphones is becoming essential for brick-and-mortar stores to compete against online retailers. The deployment of information technology has forced companies to redesign their procedures and jobs to enhance efficiency and service. The use of leading-edge digital technologies is a key topic in the MIS world and will be discussed in the text. How do Acrelec's and AWM's systems change retail operations? How do they improve the customer experience? Acrelec's system helps retailers manage store curbside pickups by customers placing orders online, enabling them to estimate when a customer will arrive at a particular store and identify exactly when a customer's car arrives and where it is parked. AWM's systems, such as Smart Shelf and Frictionless, enable retailers to view and track their products in real-time, personalize shoppers' experiences, and enable customers to shop as normal and check out by simply exiting the store. These systems improve operational efficiencies, enhance the in-store experience, and provide realtime on-shelf marketing to consumers. They also offer a high level of customization and personalization, similar to that found in online shopping, to brick-and-mortar stores. 1-1: How are information systems transforming business, and why are they so essential for running and managing a business today? Information systems and technologies are transforming the global business environment. In 2019, global spending on IT and IT services was nearly $3.8 trillion, and firms spent another $160 billion on management consulting and services. Most of the business value of IT investment derives from organizational, management, and cultural changes inside firms. As managers, making wise investment choices can help firms outperform competitors, while poor choices can waste valuable capital. What's New in Management Information Systems? The Management Information Systems (MIS) field is exciting due to continuous changes in technology, management, and business processes. • IT Innovations: The emergence of new technologies, such as cloud computing, mobile platforms, big data, business analytics, machine learning systems, and social networks, are transforming the traditional business world. • New Business models: The emergence of online video services, such as Netflix and Apple TV, is changing how premium video is distributed and created, potentially disrupting cable network dominance. • E-commerce expansion: E-commerce is changing how firms design, produce, and deliver their products and services, with a growing emphasis on selling services rather than goods. • Management changes: Management is going mobile, with managers on the move having direct and continuous contact with their employees, and access to rich data for accurate and timely decisions. • Changes in firms and organizations: New fast-growing 21st-century business firms put less emphasis on hierarchy and structure, and more emphasis on employees taking on multiple roles and tasks, collaborating on teams, and demonstrating competency and skills rather than position in the hierarchy. Globalization Challenges and Opportunities: A Flattened World. • Prior to AD 1500, no global economic system of trade existed, but after the sixteenth century, advances in navigation and ship technology created a global trading system. • The Industrial Revolution was a worldwide phenomenon, energized by the expansion of trade among nations. • Globalization presents both challenges and opportunities for businesses, with a growing percentage of the economy depending on imports and exports. • Outsourcing has accelerated the development of new systems but has also caused significant job displacement. • The challenge for businesses is to avoid markets for goods and services that can be produced offshore much less expensively and develop high-level skills that cannot be outsourced. • Information systems enable globalization, reducing costs of operating and transacting on a global scale, and providing access to a worldwide marketplace. Interactive Session: Organizations. COVID-19 has led to a significant shift in companies, both large and small, to have their employees work remotely from their homes. The pandemic has forced many law firms to close their offices and work from home, which they say has not hindered their ability to serve clients. OpenText Corp. plans to have half of its employees work from home permanently, as it eliminates more than half of its global offices. Working from home had been gaining momentum before the pandemic, and the outbreak may have marked a tipping point. Information technologies, such as broadband high-speed Internet connections, laptops, tablets, smartphones, and videoconferencing tools, are driving the shift towards remote work. Videoconferencing has become the new normal for meetings as companies shift from face-to-face to remote work. Skype, Zoom, Microsoft Teams, Amazon Chime, BlueJeans, Cisco's WebEx, GoToMeeting, and Google Meet are some of the video conferencing tools available. There are benefits to remote work, such as lower overhead, flexible schedules, and increased productivity, but challenges exist, including limited access to high-speed internet and difficulty for employees with children or small apartments. Face-to-face interactions are more effective than email and text messaging, and remote work can inhibit creativity and innovative thinking. Full-time employees are more likely to have remote work options than part-time employees, and remote workers are typically college-educated, at least 45 years old, and earn an annual salary of $58,000 while working for a company with more than 100 employees. Case Study Questions: 1. Define the problem described in this case. What are the management, organization, and technology issues raised by this problem? The problem described in this case is that the company needs to find a way to improve communication and collaboration among its employees who work in different locations. The management and organizational issues raised by this problem include the need for effective communication and coordination of work activities among remote employees. The technology issues include the need for tools and systems that can facilitate communication and collaboration among employees who work remotely. 2. Identify the information technologies used to provide a solution to this problem. Was this a successful solution? Why or why not? The company used a variety of information technologies to provide a solution to the problem. These technologies include video conferencing, instant messaging, project management software, and cloud storage services. The solution was successful in improving communication and collaboration among remote employees, as evidenced by increased productivity and employee satisfaction. 3. Will working from home become the dominant way of working in the future? Why or why not? It is likely that working from home will become a more dominant way of working in the future. The COVID-19 pandemic has accelerated the trend towards remote work, and many companies have discovered that remote work can be effective and productive. However, it is also likely that a hybrid model of work will emerge, where employees work both remotely and in the office. This will depend on the type of work being done and the preferences of individual employees and companies. The Emerging Digital Firm: A digital firm is one in which nearly all of the organization's significant business relationships with customers, suppliers, and employees are digitally enabled and mediated. Business processes refer to the set of logically related tasks and behaviours that organizations develop over time to produce specific business results and the unique manner in which these activities are organized and coordinated. A digital firm has digitally enabled and mediated relationships with customers, suppliers, and employees, and its core business processes are accomplished through digital networks. Key corporate assets are managed digitally, and any information required to support key business decisions is available at anytime and anywhere in the firm. Digital firms sense and respond to their environments rapidly, offer opportunities for global organization and management, and operate continuously across time zones and physical locations. Many companies are moving toward close digital integration with their stakeholders. Strategic Business Objectives of Information Systems: Information systems are essential for conducting day-to-day business, achieving strategic objectives, and are heavily invested in by businesses. Many sectors of the economy could not operate without information systems, including e-commerce, finance, insurance, real estate, personal services, retail, and manufacturing. There is a growing interdependence between a firm's ability to use information technology and its ability to implement corporate strategies and achieve goals. Businesses invest in information systems to achieve operational excellence, develop new products and services, improve customer and supplier intimacy, enhance decision making, gain competitive advantage, and ensure survival. Operational Excellence. Businesses use information systems and technologies to improve operational efficiency, productivity, and profitability. Walmart's Retail Link system digitally links suppliers to all of Walmart's stores to achieve world-class operational efficiency and productivity, making it the most efficient retail store in the industry. New Products, Services, and Business Models. Information systems and technologies enable firms to create new products, services, and business models, which describe how a company produces, delivers, and sells a product or service to create wealth. Apple's technology platform transformed the old music distribution model into a new, online distribution model and has continued to innovate with its iTunes music service, iPad, and iPhone. Customer and Supplier Intimacy. Knowing customers and suppliers well is important for businesses to increase revenue and decrease costs. The use of information systems and technologies to achieve customer and supplier intimacy is exemplified by companies such as Mandarin Oriental hotels, Charles Tyrwhitt, and JCPenney. Charles Tyrwhitt and JCPenney use systems to immediately notify suppliers of sales to reduce inventory costs and ensure customer demand is met. Improved Decision Making. Business managers often lack the right information to make informed decisions, resulting in poor outcomes and customer loss. Information systems and technologies now enable managers to use real-time data for decision-making, as exemplified by Privi Organics' use of Oracle HCM to gain insight into employee information and make faster HR decisions. Competitive Advantage. Achieving business objectives such as operational excellence, new products, customer/supplier intimacy, and improved decision making can lead to a competitive advantage, resulting in higher sales and profits that competitors cannot match, as exemplified by Apple Inc., Walmart, and UPS. Survival. Businesses invest in information systems and technologies as they are necessities of doing business driven by industry-level changes and legal duties to retain records, including digital records, imposed by national and regional legislation. 1-2: What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? What is an information system? An information system (IS) is a set of interrelated components that collect, store, process, and disseminate information to support decision-making, coordination, and control in an organization. The components of an IS include management, organization, and technology. The management component includes strategies, policies, and procedures for using information systems to achieve organizational goals. The organization component includes the structure of the organization, the culture, and the human resources. The technology component includes hardware, software, and telecommunications networks. Complementary assets are essential for ensuring that information systems provide genuine value for organizations. These assets include organizational capital, such as the business processes, culture, and knowledge of employees, as well as complementary goods and services, such as complementary products and services that enhance the value of the information system. Without these assets, information systems may not be able to provide the full potential benefits to organizations. • • Information systems involve input, processing, and output to produce information that organizations need. Feedback helps evaluate and refine input. Environmental actors interact with the organization and its information systems. Programs and computers are tools, but understanding the problems, design elements, and organizational processes are crucial for effective information systems. Input captures or collects raw data from within the organization or from its external environment. Processing converts this raw input into a meaningful form. Output transfers the processed information to the people who will use it or to the activities for which it will be used. Information systems also require feedback, which is output that is returned to appropriate members of the organization to help them evaluate or correct the input stage. • • • Understanding how computers and programs work is important in solving organizational problems, but they are only part of an information system. The analogy of a house shows that computers and programs are like tools, but understanding design elements and organizational processes are crucial for effective information systems. To understand information systems, it's important to understand the problems they solve, their design elements, and the organizational processes that lead to solutions. Dimensions of Information Systems. It’s important understand the broader dimensions of information systems, including their management and organizational aspects, in addition to technical knowledge. Management Information Systems (MIS) deals with these issues surrounding the development, use, and impact of information systems. Organizations. Organizations are composed of different levels and specialties, and their culture and politics affect the development of information systems. Information systems automate many business processes, which are guided by formal rules and a unique organizational culture. Different levels and specialties within an organization create different interests and points of view, which can lead to conflicts and compromises in the development of information systems. Levels in a firm: Management: Managers have the responsibility to make sense of organizational challenges, set strategy, allocate resources, and exercise responsible leadership. Information systems described in the book reflect the realities of real-world managers who must also engage in creative work to innovate and adapt their organizations. Information technology can help managers design new products and services and redesign their organizations. Information Technology: Information technology (IT) is a tool that managers use to cope with change, and it consists of computer hardware, software, data management technology, and networking and telecommunications technology. The Internet is the largest and most widely used network globally and has become a platform for new products, services, and business models. The Web is a service provided by the Internet that uses universally accepted standards to store, retrieve, format, and display information in a page format on the Internet. The IT infrastructure provides the foundation, or platform, on which the firm can build its specific information systems. UPS's package tracking system is an example of how organization, management, and technology elements work together to create an information system solution to the business challenge of providing a high level of service with low prices in the face of mounting competition. Interactive Session: Technology. Digital Transformation of Healthcare at Singapore's Jurong Health Services. Jurong Health Services (JurongHealth) manages several hospitals in Singapore and aims to provide transformative medical care through the use of innovative information technologies. The hospital has integrated over 50 healthcare IT systems as part of the Project OneCare initiative, enabling it to become paperless, chartless, and filmless. The systems have increased efficiency, reduced waiting times, and improved patient satisfaction. IT systems implemented include self-service kiosks for patient and visitor registration, a Warehouse Management System that automates inventory top-up requests, and a Real-Time Location Tracking System that automatically tracks patients and medical equipment. The hospital also implemented an integrated Electronic Medical Record (EMR) system that combines all the functional modules of the hospital, interfaced with 140 medical devices and equipment. JurongHealth has continued to move forward, responding to the COVID-19 pandemic by introducing touch-free technology and deploying security robots and drones. JurongHealth's use of technology has made it a leading technology-driven healthcare provider in the region, with several awards for IT-driven and overall organizational transformation. Case Study questions: 1. What technologies are used by JurongHealth? What purpose do they serve? JurongHealth uses various technologies such as Electronic Medical Record (EMR) system, Warehouse Management System, Real-Time Location Tracking System, Visitor Management System, and Enterprise Queue Management System. These systems serve different purposes, including automating inventory top-up requests, eliminating manual searching for patients and equipment, controlling access to the hospital wards, reducing waiting time, and increasing patient satisfaction. 2. Search the web for RFID. Suggest an example of how RFID can be used for locating and tracking people. Radio Frequency Identification technology can be used for locating and tracking people in various settings, such as hospitals, schools, prisons, and airports. For example, RFID wristbands or tags can be attached to patients or visitors, allowing hospital staff to track their location and movement within the hospital premises. 3. What information systems are implemented by JurongHealth? Describe the input, processing, and output of any one such system. One of the information systems implemented by JurongHealth is the Electronic Medical Record (EMR) system. The EMR system combines all the functional modules of the hospital and interfaces with 140 medical devices and equipment. The system captures data from these devices and stores it in the EMR system, eliminating the need for manual data entry and reducing the likelihood of charting errors. The input to the system is the data collected from various medical devices, and the processing involves uploading this data to the EMR system. The output is a complete and accurate electronic medical record of the patient, accessible to clinical staff for decisionmaking and treatment planning. 4. Why are information systems important for JurongHealth? Information systems are important for JurongHealth as they help the hospital achieve its mission of providing world-class medical care at an affordable cost. These systems improve efficiency, reduce errors, enhance patient satisfaction, and control costs. They also enable the hospital to collect, store, and analyze patient data, which is critical for evidence-based decision-making and continuous quality improvement. Additionally, information systems help JurongHealth stay up-to-date with emerging healthcare technologies and trends, making it a leading technology-driven healthcare provider in the region. It Isn't Just Technology: A Business Perspective on Information Systems. Businesses invest in information technology and systems to create value for the firm by increasing revenue or decreasing costs through better decision-making and more efficient business processes. The value of an information system is determined by its contribution to corporate value. Information systems represent organizational and management solutions based on information technology to challenges or problems posed by the environment, and their primary purpose is to contribute to corporate value. The AWM Smart Shelf system provides a solution to the business problem of brick-and-mortar stores losing market share to online retailers by digitally enabling key business processes for inventory management, sales, and marketing. Complementary Assets: Organizational Capital and the Right Business Model. • Some firms achieve better results from their information systems than others, as seen in the varying returns on investment in information technology (IT) investments. • Complementary assets, such as business processes, organizational culture, and management behavior, are necessary to derive value from primary IT investments. • Firms that make complementary investments receive superior returns on their IT investments, while those that fail to do so receive little or no returns. • Organizational and managerial assets are crucial for deriving value from IT investments, and managers need to consider the broader organization and management dimensions of information systems to achieve substantial returns. 1-3: What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? Several academic disciplines are used to study information systems, including computer science, information science, management science, and social science. Computer science focuses on the technical aspects of information systems, such as programming, database design, and network architecture. Information science examines the theoretical and practical aspects of information processing and management, including information retrieval, knowledge organization, and user behavior. Management science studies the use of information systems in organizational decision-making and management processes, including strategy development, resource allocation, and performance evaluation. Social science, such as sociology and psychology, studies the human and social factors that influence the use and impact of information systems, including user behavior, organizational culture, and social norms. Each of these disciplines contributes to an understanding of information systems by providing different perspectives and methods for analyzing and designing information systems, as well as explaining the ways in which they are used and their impact on individuals, organizations, and society. Review questions: 1.1: How are information systems transforming business, and why are they so essential for running and managing a business today? • • • • • Describe how information systems have changed the way businesses operate and their products and services. Identify three major new information system trends. Describe the characteristics of a digital firm. Describe the challenges and opportunities of globalization in a "flattened" world. List and describe six reasons why information systems are so important for business today. Information systems (IS) are essential for running and managing a business today. They have transformed the way businesses operate and their products and services by improving communication, streamlining operations, personalizing products and services, enhancing decisionmaking, and creating new business models. Three major new information system trends are Artificial Intelligence (AI) and Machine Learning, Cloud Computing, and the Internet of Things (IoT). A digital firm is a business that uses digital technologies to enable its business processes, products, and services, and it is characterized by high levels of automation, real-time data, and customercentricity. Globalization has created both challenges and opportunities for businesses, such as increased competition, access to new markets, cultural differences, and regulatory complexity. Information systems are essential for businesses today for their efficiency, decision-making, innovation, strategic advantage, customer experience, and collaboration benefits. 1. Efficiency: Information systems automate and streamline business operations, reducing costs and improving efficiency. For instance, inventory management systems help businesses track their stock levels in real-time, minimizing waste and ensuring they have enough stock to meet customer demand. 2. Decision-making: Information systems provide businesses with real-time data and analytics, enabling them to make informed decisions quickly. For instance, business intelligence tools allow companies to analyze data and identify trends that can help them make strategic decisions. 3. Innovation: Information systems enable businesses to innovate and develop new products and services. For instance, e-commerce websites use data analytics to recommend products to customers based on their past purchase history and preferences. 4. Strategic advantage: Information systems provide businesses with a strategic advantage by providing insights into the market and competitors. For instance, market research tools allow companies to identify emerging trends and consumer preferences. 5. Customer experience: Information systems enable businesses to personalize their products and services to meet the individual needs and preferences of their customers. For instance, e-commerce websites use data analytics to recommend products to customers based on their past purchase history and preferences. 6. Collaboration: Information systems allow businesses to collaborate both internally and externally with their stakeholders, including employees, customers, suppliers, and partners. For instance, project management tools enable teams to work together on projects, share information, and track progress. 1-2. What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? • Explain the differences between information and data. Why is the former essential to the latter? • Describe the three activities in an information system that produce the information that organizations need. • Explain why organizations have a structure composed of different levels and specialties. • Describe how the parts of an organization's culture can be found embedded in its information systems. • Describe the features of an organization's information value chain. • Based on what you have read, identify the key elements of organizational and management capital. An information system (IS) is a combination of people, technology, and processes that collect, process, store, and disseminate information to support decision-making and other organizational activities. The IS includes management, organization, and technology components to ensure its effectiveness and efficiency. Complementary assets, such as organizational capital, human capital, and social capital, are essential for ensuring that IS provides genuine value for organizations. Data refers to the raw facts and figures, whereas information is the output generated from the analysis of data. The three activities in an IS that produce information are input, processing, and output. Organizations have a structure composed of different levels and specialties, and culture embedded in its IS. The information value chain includes the stages of collecting, organizing, analyzing, storing, and disseminating information. Organizational and management capital are key elements for organizations to leverage the full potential of IS. Organizational capital includes the organization's culture, structure, and strategy, whereas management capital includes the skills, knowledge, and expertise of the organization's managers and leaders. 1-3: What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? • • • List and describe each discipline that contributes to a technical approach to information systems. List and describe each discipline that con tributes to a behavioral approach to information systems. Describe the sociotechnical perspective on information systems. Disciplines that contribute to a technical approach to IS include: 1. Computer Science - focuses on the technical aspects of IS, such as hardware, software, programming, and algorithms. 2. Engineering - focuses on the design, development, and implementation of IS, such as database management systems, networks, and software applications. 3. Mathematics - provides the mathematical foundations for IS, such as statistical analysis, modeling, and optimization. Disciplines that contribute to a behavioral approach to IS include: 1. Psychology - focuses on the human aspects of IS, such as user behavior, perception, cognition, and motivation. 2. Sociology - studies the social context of IS, such as the impact of IS on society, organizations, and culture. 3. Management - focuses on how IS can support business processes and decision-making, such as strategic planning, project management, and organizational change management. The sociotechnical perspective on IS emphasizes the interaction between technology and social systems. It suggests that the design and implementation of IS should consider both technical and social factors, such as user needs, organizational culture, and work processes. The sociotechnical perspective recognizes that Information System is not just a technical system but also a social system that affects and is affected by its environment. Therefore, designing and implementing IS should involve both technical and social experts working together to ensure the system's success. Discussion Questions: 1-4: Information systems are too important to be left to computer specialists. Do you agree? Why or why not? I agree that information systems are too important to be left to computer specialists alone. While computer specialists possess the technical expertise necessary for developing and maintaining information systems, they may not have the necessary business and organizational knowledge to understand the context and requirements of the system fully. Information systems are developed to support business processes and decision-making, so it is crucial to involve stakeholders from various departments and levels of the organization in the design and implementation process. This includes managers, employees, and end-users who can provide valuable insights into the system's requirements and ensure its usability and effectiveness. Moreover, information systems are not only technical systems but also social systems that interact with users and their environment. Therefore, the design and implementation of information systems require a multidisciplinary approach that considers technical, social, and organizational factors. Computer specialists may not have the expertise to address all these factors. In conclusion, while computer specialists play a critical role in developing and maintaining information systems, a multidisciplinary team that includes business and organizational experts is necessary to ensure that the system meets the organization's needs and goals. Chapter 2: Global E-business and Collaboration. Enterprise Social Networking Transforms Sharp Corporation into a More Innovative Connected Organization. Sharp Corporation, a knowledge-intensive technology company that was facing issues with hierarchal processes and culture that prevented employees from sharing information and innovating. Sharp management found that deploying new technology, such as Microsoft Yammer's social tools, helped to move the company from a hierarchical environment to a more democratized one, increasing employee collaboration and engagement and leading to more effective sharing of knowledge, innovation and competitiveness. The technology alone was not enough, the company also had to change its organizational culture and business processes for knowledge dissemination and collaborative work. The questions posed ask about how collaboration and employee engagement helped Sharp to be more competitive and how using Yammer changed the corporate culture and work at the company. 2.1 What are business processes? How are they related to information systems? Information systems enable businesses to manage information, make better decisions, and improve their business processes to enhance overall performance. Business Processes. Business processes refer to the way work is organized, coordinated and focused to produce a valuable product or service. These processes are supported by flows of information and knowledge among participants and can impact a company's ability to innovate and execute. Every business is made up of processes, some functional specific, some cross-departmental and requiring coordination. Fulfilling a customer order, for example, is a complicated series of processes that require information to flow rapidly within the company, its partners and customers, and can be facilitated by computer-based information systems. How Information Technology Improves Business Processes. Information systems automate manual business processes and allow for simultaneous tasks and faster decision-making. They support new business models and improve business efficiency, innovation and customer service by analyzing and changing processes through the use of technology. Throughout the book, the focus is on improving business processes with information technology. 2.2. How do systems serve the different management groups in a business, and how do systems that link the enterprise improve organizational performance? Information systems support business processes of a firm and there are different kinds of systems in a typical business organization to support the major business functions and decision-making needs of different management groups. The trend is moving towards integrated cross-functional systems instead of independent functional systems. Systems for Different Management Groups. A business firm has systems to support different groups or levels of management. These systems include transaction processing systems and systems for business intelligence. Transaction Processing Systems. Information systems support the day-to-day activities of the business through Transaction Processing Systems (TPS). TPS keep track of transactions like sales, payroll, and employee records, and answer routine questions. The primary purpose of TPS is to provide current and accurate information, with predefined and structured tasks, resources and goals. TPS are also major suppliers of information to other systems and business functions, and are critical to the functioning of the business - failure of TPS can cause significant harm to the firm and others linked to it. Systems for Business Intelligence. Business intelligence systems support management decision making at different levels in an organization. Management Information Systems (MIS) provide reports to middle management for monitoring, controlling and decision-making activities. Decision-Support Systems (DSS) support nonroutine decision-making for super-user managers and business analysts. DSS use sophisticated analytics and models to analyze data from internal and external sources. Executive Support Systems (ESS) address strategic issues and long-term trends for senior management. ESS present data through an easy-to-use interface and are designed to incorporate external events and trends into decision making. Systems for Linking the Enterprise. A business might wonder how to manage information in multiple systems, the cost of maintaining many systems, and how to coordinate work across systems. These are important questions for today's businesses. Enterprise Applications. Integrating systems in a company is a major challenge due to its organic and acquired growth. Enterprise applications like enterprise systems (ERP), supply chain management systems (SCM), customer relationship management systems (CRM), and knowledge management systems (KMS) help integrate business processes and improve flexibility and productivity. ERP integrates manufacturing, finance, sales, and HR into a single software. SCM helps manage relationships with suppliers and lowers costs. CRM helps coordinate sales, marketing, and service processes to improve customer satisfaction. KMS collects and applies knowledge and expertise to improve business processes and decisions. Intranets and Extranets. Enterprise applications bring changes to business processes and offer data integration opportunities. They can be expensive and challenging to implement. Intranets and extranets are alternative tools for increasing integration and improving information flow within the company and with customers/suppliers. Intranets are internal company websites accessible only to employees and extranets are company websites accessible to authorized vendors and suppliers. An example of this is Six Flags, which uses an intranet for full-time employees and an extranet for seasonal employees for park operations information and events updates. E-business, E-commerce, and E-government. E-business refers to the use of digital technology and the Internet to conduct major business processes. E-commerce is a part of e-business that deals with buying and selling of goods and services online. E-government refers to the application of Internet technology for government services and relationships with citizens, businesses and other agencies. The use of e-government makes operations more efficient and empowers citizens. Examples of e-government services include online renewal of driver's licenses and online application for unemployment benefits. The Interactive Session on Organizations describes the Canadian City of Mississauga's e-government program. Interactive Session: Organizations. Mississauga, a Toronto suburb, is Canada's 6th largest city and adopts digital technology to enhance its operations and services. It aims to integrate tech into its operations and business planning, with tech roadmaps for each service. Mississauga has a diverse population and central business district, but also has increasing lowincome families. It created a Smart City Master Plan to guide the city's digital tech adoption. It uses social media, "BYOD," remote cloud computing, video conferencing and mobile tools. The city has connected over 600 buses and 700 city vehicles to provide realtime location-based information and has built its own high-speed fibre optic and wireless Wi-Fi network. It is working to build a mobile-friendly ecosystem across the city to provide digital tech to the entire community. Case Study Questions: 1. Describe the problems the City of Mississauga hoped to address using digital technology. The City of Mississauga aimed to address a number of challenges related to urban planning and management, including improving access to city services, reducing operational costs, and enhancing citizen engagement. The city saw digital technology as a way to provide residents with more convenient access to information and services, while also improving efficiency and decision making within the city government. 2. What technologies did Mississauga employ for a solution? Describe each of these technologies and the role each played in a solution. Mississauga employed several digital technologies to address these challenges, including geographic information systems (GIS), business intelligence (BI) tools, and mobile applications. The city's GIS system was used to manage and analyze geographic data, such as maps and aerial imagery, to support urban planning and decision making. The BI tools were used to analyze large amounts of data from various city departments and provide insights into city operations. Mobile applications were developed to provide residents with access to city services and information from their smartphones and other mobile devices. 3. What management, organization, and technology issues did the City of Mississauga have to address in developing a solution? The City of Mississauga faced a number of management, organization, and technology issues as it worked to develop a solution. One major challenge was integrating the different digital systems and technologies used by the city, including the GIS, BI, and mobile platforms. The city also had to work to ensure that data from these systems was secure and protected from unauthorized access. Additionally, the city faced the challenge of ensuring that the digital solutions it developed were accessible to all residents, regardless of their level of technical expertise. 4. How did the technologies in this case improve operations and decision making at the City of Mississauga? The digital technologies employed by the City of Mississauga improved operations and decision making in several ways. The GIS system, for example, enabled the city to manage and analyze geographic data more effectively, which improved the accuracy and speed of decision making. The BI tools provided city leaders with insights into city operations, allowing them to identify areas for improvement and make more informed decisions. The mobile applications made city services and information more accessible to residents, improving their engagement with the city and reducing operational costs by reducing the need for face-to-face interactions. Overall, these technologies helped to streamline city operations, improve service delivery, and enhance decision making. 2.3: Why are systems for collaboration and social business so important, and what technologies do they use? Businesses need special systems to support collaboration, teamwork, and coordination of plans and actions in order to effectively make sense of information and work towards common goals. Collaboration: Collaboration is working with others to achieve shared goals and is essential in today's businesses and organizations due to the changing nature of work, growth of professional work, changing organization of the firm, changing scope of the firm, emphasis on innovation, and changing culture of work and business. Collaboration can be one-to-one or many-to-many, can be short or long-lived, and can take place within informal groups or formal teams. Teams are assigned specific missions and are expected to collaborate and achieve their mission. The increasing importance of collaboration is due to factors such as the rise of interaction jobs, need for close coordination and collaboration in a globalized world, the belief that innovation is a group and social process, and cultural support for collaboration and teamwork. Collaboration and teamwork are more important today than ever for a variety of reasons. 1. Collaboration and teamwork are necessary due to the shift in work from independent stages to closer coordination and interaction. 2. Collaboration is important in professional jobs that require specialized education and the sharing of information. 3. Collaboration is vital as work is now organized into groups and teams, and decision-making power has been pushed down in organizations. 4. Teams are required for close coordination of various functions in a globally present firm. 5. Innovation is a group and social process, and most innovations derive from collaboration; strong collaboration practices support innovation. 6. Changing culture of work and business: Collaboration is supported by the cultural notion that diverse teams produce better results faster than individuals working alone. What is Social Business? Many firms embrace social business, using social networking platforms, internal corporate social tools, and Facebook, Twitter to engage employees, customers, and suppliers. The goal is to deepen interactions and expedite information sharing, innovation, and decision making. Conversations between customers, suppliers, employees, managers and oversight agencies about the firm are critical for strengthening bonds and increasing emotional involvement. Social business requires information transparency, allowing for direct sharing of opinions and facts. This leads to operational efficiencies, innovation and faster decision making Business Benefits of Collaboration and Social Business. Collaboration within and among firms is seen as crucial for success by both business and academic communities. Studies show that a focus on collaboration leads to business value and competitive advantage, with investments in collaboration technology resulting in returns more than 4 times the investment. Social technologies within and across enterprises have the potential to raise productivity of interaction workers by 20-25%. Benefits of collaboration and social business have been identified and shown to impact business performance. Building a Collaborative Culture and Business Processes Collaboration requires a supportive culture and business processes. In the past, large firms were often "command and control" organizations where top leaders made decisions and lower-level employees executed orders. This resulted in a lack of teamwork and no rewards for team performance. A collaborative culture is different, with senior managers relying on teams and policies, products, designs, processes, and systems being created and implemented by teams at all levels. Teams are rewarded and middle managers are responsible for building and coordinating teams. The culture is more "social" with collaboration and teamwork being emphasized by senior management. Tools and Technologies for Collaboration and Social Business. Tools are necessary to support a collaborative culture and they can range from expensive to free with a variety of options available online to enable effective collaboration and group decision making. Email and Instant Messaging (IM). Email and instant messaging are widely used communication and collaboration tools in interaction jobs and have evolved with the rise of messaging and social media as preferred channels of communication. Wikis. Wikis are a type of website that allows for easy user contribution and editing, with the most wellknown being Wikipedia, and they can be used for storing and sharing corporate knowledge, with SAP AG using a wiki as a source of information for customers and software developers. Virtual Worlds. Virtual worlds like Second Life are 3D online environments where companies like IBM, Cisco, and Intel use avatars for meetings, interviews, guest speaker events, and employee training through gestures, chat conversations, and voice communication. Collaboration and Social Business Platforms. Software suites for collaboration and social business are widely used by companies and educational institutions to reduce travel expenses and communicate remotely, including internet-based audio conferencing and videoconferencing systems, cloud collaboration services, corporate collaboration systems, enterprise social networking tools, and low-cost videoconferencing tools such as Microsoft Teams, Google Meet, Amazon Chime, Apple's FaceTime, and the popular and affordable Zoom Interactive Session: Technology. Case Study: Higher Education Redefined: Virtual Education at Ahlia University Ahlia University in Bahrain moved its operations and services online due to the COVID-19 pandemic. The university prepared itself for the transition by addressing infrastructure requirements, providing technology training and support, and implementing security policies. Microsoft SharePoint was already in use for information storage and management, and Microsoft Teams was chosen to conduct classes online. The university linked its Student Information System with Moodle and used Zoom for online webinars and conferences. The success of these collaborations has led the university to consider focusing on online platforms even after the pandemic. Case Study Questions: 1. Microsoft Teams provides secure chat and call options for students, and enables the university to create a secure environment with restricted access to outsiders. It also links time tables and class lists from the university's Student Information System, allowing for secure authentication, and recording of all classes. 2. Ahlia University addressed infrastructure requirements for online education, including optimum internet speed, network upgrades, and the licensing of Microsoft and other software packages. Short videos and manuals were created to help students and staff use different technologies, and online training and support were provided through a hotline, official website, and virtual training courses. The university also implemented security policies to protect information and privacy. 3. Using Microsoft Teams, Moodle, and Zoom has contributed to mass enrolment, increased international collaborations and reduced travel expenses. It has facilitated the exchange of knowledge and encouraged academic contributions, while recording all classes enables students to review and recall course materials. The success of these collaborations has prompted the university to consider focusing on online platforms even after the pandemic. Google offers cloud collaboration services through tools like Google Drive, Google Docs, G Suite, and Google Sites, most of which are free. Microsoft OneDrive and Dropbox are other cloud storage services with options for file sharing and synchronization. Microsoft SharePoint is a browser-based collaboration platform with integration to Microsoft Office while IBM Notes is a collaborative software with features for sharing, editing, and meetings. Enterprise social networking tools like Salesforce Chatter, Microsoft Yammer, Facebook Workplace, and IBM Connections connect members of an organization. These tools provide business value but may not always be easy to implement. Checklist for Managers: Evaluating and Selecting Collaboration and Social Software Tools. The selection of the right collaboration technology for a firm can be challenging with the multitude of options available. The time/space collaboration and social tool matrix developed by collaborative work scholars provides a framework for evaluating these tools. The matrix focuses on two dimensions of collaboration: time and space, and helps to choose the most appropriate technology to overcome these limitations. To get started, a firm can follow these six steps: 1. assess the collaboration challenges in terms of time and space. 2. identify available solutions. 3. evaluate the costs and benefits. 4. assess security and vulnerability risks. 5. seek input from potential users, and 6. invite vendors to make presentations. 2.4: What is the role of the information systems function in a business? Responsibility for the proper operation and maintenance of the hardware, software, and other technologies used by businesses' information systems lies with a special information systems function, while end-users manage the systems from a business perspective. Information System Department: The information systems department is the formal unit responsible for IT services in most firms, maintaining the hardware, software, and networks. It consists of specialists such as programmers, systems analysts, project leaders, and information systems managers. A CIO (Chief Information Officer) is the head of the information systems department, who plays a leadership role in using IT in the firm. A CSO (Chief Security Officer) is in charge of information systems security, while a CPO ensures company's compliance with data privacy laws. A CKO (Chief knowledge officer) is responsible for knowledge management, while a CDO (chief data officer) oversees enterprise-wide information governance. End users are playing a larger role in the design and development of information systems. IT occupations are growing, with jobs in security, data science, cloud engineering, and business intelligence in high demand. Organizing the Information Systems Function. IT functions in a business can be organized in many ways, depending on the size of the firm and nature of the firm. IT governance involves decisions on IT strategy and policies, decision rights, and accountability framework to support the organization's objectives. Effective IT governance requires clear answers on centralization, decision-making, and monitoring. Review Questions: 2.1. What are business processes? How are they related to information systems? • Describe with examples how business processes are tied to the specific functional area of an organization. • List and describe the business processes involved in fulfilling a customer order. Business processes are a set of activities that aim to achieve a specific organizational goal. They are related to information systems as they are often supported or automated by information technology. Business processes are tied to specific functional areas of an organization and can include activities such as marketing, sales, production, and customer service. Example: A customer order fulfilment process includes various business processes such as receiving the order, verifying availability of the product, processing payment, arranging for delivery and updating the inventory system. The business processes involved in fulfilling a customer order can include: 1. Order receipt 2. Order verification 3. Payment processing 4. Inventory management 5. Delivery arrangement 6. Order tracking and update. 2.2: How do systems serve the different management groups in a business, and how do systems that link the enterprise improve organizational performance? • Describe the characteristics of transaction processing systems (TPS) and the roles they play in a business. • Describe the characteristics of business intelligence and explain why it is important in terms of decision-making. • Identify which layer of management is most likely to use MIS and why. • Describe how business intelligence systems also address the decisionmaking needs of senior management. • Explain how a digital dashboard works. • Explain how and why an organization might want to implement enterprise applications. What might be involved? • Explain how customer relationship management helps an organization manage their interactions with customers. Business processes are the series of tasks performed by an organization to achieve its goals and objectives. They are related to information systems in that these systems automate and streamline these processes to improve efficiency and accuracy. TPS (Transaction Processing Systems) play a role in recording and processing day-to-day business transactions. Business intelligence provides insights into data to support informed decision-making and is important for all levels of management, but especially for senior management. A digital dashboard is a visual representation of key performance indicators and data, allowing for real-time monitoring of the organization's performance. Enterprise applications can improve organizational performance by integrating different functions and data across the entire organization. Implementing these systems may require significant investment and effort, but can result in increased efficiency and better decision-making. Customer relationship management (CRM) is a strategy that organizations use to manage and analyze customer interactions and data throughout the customer lifecycle. It helps organizations to understand customer behaviour, needs and preferences, and then use that information to improve customer satisfaction and increase customer loyalty. CRM typically involves the use of software and other technologies to manage customer interactions and data, track customer interactions and feedback, and create targeted marketing campaigns. This leads to better decision-making, improved customer relationships and increased customer satisfaction. (Salesforce, STRACK) 2.3. Why are systems for collaboration and social business so important, and what technologies do they use? • Define collaboration and social business and explain why they have become so important in business today. • List and describe the business benefits of collaboration and social business. • Describe a supportive organizational culture and business processes for collaboration. • List and describe the various types of collaboration and social business tools. Collaboration and social business refer to the use of technology and communication tools to facilitate teamwork, information sharing, and customer interaction within an organization. They have become important as businesses aim to improve communication, collaboration, and customer engagement. The benefits of collaboration and social business include increased productivity, improved decision making, and enhanced customer experience. To support collaboration, organizations need a culture that values teamwork and information sharing and business processes that facilitate communication and collaboration. The various types of collaboration and social business tools include enterprise social networks, instant messaging, project management software, and customer relationship management systems. 2.4. What is the role of the information systems function in a business? • Describe how the information systems function supports a business. • Compare the roles played by programmers, systems analysts, information systems managers, the chief information officer (CIO), the chief security officer (CSO), the chief data officer (CDO), and the chief knowledge officer (CKO). The information systems function in a business plays a critical role in supporting the organization by providing technology-based solutions to improve efficiency, decision-making, and communication. Programmers develop software applications and systems to meet specific business needs, while systems analysts help identify and design these solutions. Information systems managers oversee the technology operations of the organization, while the CIO is responsible for the overall strategic direction and management of the information systems. The CSO focuses on ensuring the security of the organization's information systems and data, while the CDO is responsible for managing the organization's data as a valuable asset. The CKO is responsible for managing and utilizing the organization's knowledge resources. Discussion Question. 2.5. How could information systems be used to support the order fulfillment process illustrated in Figure 2.1? What are the most important pieces of information these systems should capture? Explain your answer. Information systems can be used to support the order fulfillment process by automating various tasks, such as inventory management, order processing, shipping, and invoicing. The most important pieces of information these systems should capture include the customer's order details, the availability of the product, shipping information, payment information, and order status updates. Capturing these pieces of information helps ensure that the process is efficient, accurate, and transparent, and it also provides valuable data for analyzing and improving the process in the future 2.6. Identify the steps that are performed in the process of selecting and checking out a book from a college library and the information that flows among these activities. Diagram the process. Are there any ways this process could be changed to improve the performance a library or a school? Diagram the improved process. The steps performed in the process of selecting and checking out a book from a college library are: 1. Search for the book in the library's catalog or database. 2. Locate the book in the library. 3. Verify that the book is available for checkout. 4. Present a library card or student ID to the library staff. 5. Check out the book by updating the library's database to reflect the change in status. 6. Receive a receipt or electronic notification confirming the checkout. The information that flows among these activities includes: 1. Book information from the library's database to the search system. 2. Book location information from the library's database to the patron. 3. Book availability information from the library's database to the patron. 4. Patron information from a library card or student ID to the library's database. 5. Checkout information from the library's database to the patron's account. The process of selecting and checking out a book from a college library could be improved by implementing the following changes: 1. Implementing a self-checkout system using a scanner or tablet. 2. Allowing patrons to renew or place holds on books online. 3. Implementing an RFID-based system to automate the process of tracking book location. 4. Integrating the library's database with the school's student information system to streamline the checkout process. The improved process would look like: 1. Patron searches for book in the library's online catalog or database. 2. Patron locates the book in the library and scans it with a self-checkout scanner. 3. The library's database updates the book's status to "checked out" and the patron's account. 4. Patron receives a receipt or electronic notification confirming the checkout. 2.7. Use the time/space collaboration and social tool matrix to classify the collaboration and social technologies used by the Sharp Corporation. Hands-On MIS Projects: Management Decision Problems 2.8. Heli is a manager at MoiMoiPixel, a Finnish start up developing free, fast-paced casual games for mobile platforms. MoiMoiPixel has been a success, gathering over 10 million returning players within a very short time. Nevertheless, the company is bleeding due to associated costs of hosting the game for all these players and paying salaries to the current staff of 40. Heli realizes the company doesn't know the players at all—when they play, why they play, where they live, and so on. Further, there is no communication at all with the players, and simply meeting at the coffee machine and sending emails is not enough to communicate efficiently with the growing staff. Help Heli by providing three suggestions for improving revenue and communication using information systems. 1. Implement a customer relationship management (CRM) system: By capturing data about the players and their behaviour within the game, a CRM system can help Gamers Paradise gain a deeper understanding of its players and use this information to improve marketing efforts, target advertisements more effectively, and increase revenue. 2. Implement an internal collaboration platform: An internal collaboration platform can help Gamers Paradise's growing staff communicate and collaborate more efficiently, improving productivity and streamlining the development process. This could also potentially lead to a reduction in costs, such as reducing the need for physical meetings. 3. Implement a data analytics platform: By analyzing data on player behaviour and performance, Gamers Paradise can identify areas where it can improve its games, attract new players, and increase revenue. A data analytics platform can also help the company identify trends and patterns, and make informed decisions on how to allocate resources and prioritize projects. 2.9. PetFence is based in Birmingham, in the United Kingdom, and makes custom-made fences to protect cats and dogs in household gardens. The company takes orders via email, designs the fence together with the client, and builds it in the client's garden. Finally, an invoice is sent to the client. PetFence depends on having just the right amount of necessary parts—too few and the work is delayed; too many and the storage fills up quickly. As business transactions are agreed on over the phone or by email, they sometimes forget to charge clients and pay suppliers. Moreover, email requests from prospective clients are often lost in the email flood, leading to missed sales opportunities and credibility issues. In what ways could information systems help PetFence? What issues can information systems not help them with? Information systems could help PetFence in several ways: 1. Order management system: Implementing an order management system would automate the process of taking orders, tracking progress, and generating invoices. This would reduce the chance of forgetting to charge clients and increase accuracy. 2. Inventory management system: By using an inventory management system, PetFence can accurately track the quantity and availability of necessary parts. This would help the company optimize its inventory levels and reduce the risk of stock shortages and excess inventory. 3. Customer relationship management (CRM) system: A CRM system would allow PetFence to efficiently manage interactions with clients and prospects. This would improve customer service and increase the likelihood of securing new business. Information systems cannot help PetFence with certain issues such as: 1. Personal touch: Information systems cannot replace the personal touch and human interaction that clients expect when customizing their fence. 2. Physical work: Information systems cannot perform the physical work of building the fence. 3. Final approval: Information systems cannot replace the need for final approval from the client. Case Study: Is Social Business Good Business? Workplace collaboration technology is being adopted globally by businesses to promote employee collaboration and knowledge sharing, faster decision making, and improved work engagement. The growing number of emails and "app fatigue" are drivers of enterprise social networking adoption. Studies show that collaboration tools can improve efficiency and productivity, but its success depends on compatibility with the company's culture and business processes. The adoption of social media technology requires a change in thinking, leadership and behavioral changes, and a design for the right workplace environment. The use of social networking in the workplace can help or hurt the organization, and the social media platform chosen depends on its specific business purpose. A successful social business strategy requires identifying the need for social initiatives and overcoming employee biases and resistance. Management must ensure that social networking efforts provide genuine value to the business. Case Study Questions: 2.13. Identify the management, organization, and technology factors affecting adoption of internal corporate social networks. 1. Management factors: • Resistance to change and lack of buy-in from top management. • Lack of clear objectives and strategy for social network use. • Inadequate budget allocation and resource allocation. • Poor leadership and governance structure for the network. • Lack of employee training and support for network use 2. Organizational factors: • Cultural and behavioral barriers to adoption. • Lack of trust and privacy concerns • Different departments and workgroups have different needs and perspectives. • Difficulty in integrating the network with existing systems and processes. • Insufficient metrics to measure network success and effectiveness. 3. Technology factors: • Integration and compatibility with existing systems. • User experience and ease of use. • Data security and privacy. • Scalability to meet growing demand. • Technical support and maintenance requirements. 2.14. Compare the experiences implementing internal social networks o f the organizations described in this case. Why was Standard Bank successful? What role did management play in this process? Standard Bank was successful in implementing its internal social network due to several factors: 1. Management Support: The bank's management team was fully committed to the implementation and encouraged employees to use the platform. 2. Clear Communication: The bank effectively communicated the purpose, benefits, and usage guidelines of the internal social network to all employees. 3. Employee Engagement: Standard Bank engaged employees in the implementation process by involving them in pilot projects, providing training and support, and rewarding early adopters. 4. Aligned with Business Goals: The internal social network was designed to align with the bank's business goals and supported its business processes, making it more useful and relevant to employees. In contrast, ABC Inc. faced challenges with the implementation of its internal social network. 1. Lack of Management Support: The lack of support from senior management resulted in low employee participation and limited usage of the platform. 2. No Clear Communication: The company did not effectively communicate the purpose and benefits of the internal social network, leading to confusion and resistance among employees. 3. No Employee Engagement: ABC Inc. did not engage employees in the implementation process, leading to a lack of buy-in and adoption. 4. Not Aligned with Business Goals: The internal social network was not designed to align with the company's business goals, making it less relevant and useful to employees. In conclusion, management support and involvement played a crucial role in the success of Standard Bank's internal social network implementation. Effective communication, employee engagement, and alignment with business goals were also critical factors in ensuring a successful implementation. 2.15. Should all companies implement internal enterprise social networks? Why or why not? It depends on the company's specific needs and goals. Internal enterprise social networks can bring many benefits such as improved communication and collaboration, increased employee engagement, and better knowledge sharing. However, implementing an internal social network requires significant investment in terms of resources and technology, and may not be suitable for all companies. Before deciding to implement an internal social network, companies should carefully consider their organizational culture, technology infrastructure, and the specific needs of their employees. If a company is not ready for the change, an internal social network can cause more harm than good. The role of management in the implementation process is crucial. They need to create a clear vision and strategy for the social network, communicate the benefits to employees, provide training and support, and encourage its usage Chapter 3: Information Systems, Organizations, and Strategy. N26: A Bank without Branches. N26 is a mobile bank founded in 2013 with over 5 million customers in 24 European countries. It operates entirely in the cloud and uses a modern technology stack, with the aim of offering simple and customer-centric processes. N26 is expanding globally, with plans to double its customer base and reach break-even by the end of 2021. The company is investing in security measures, including AIbased solutions, to combat cyber-attacks. N26 focuses on delivering a smooth, easy and accessible banking experience to its customers through its mobile app. It operates completely online, with features such as video chat for identification and instant access to contactless payments. N26 continuously invests in security systems and customer support. With its cloud-based platform, modern technology stack and focus on customer-centric services, N26 aims to disrupt the traditional banking industry and become a leading fintech player globally. 3.1. Which features of organizations do managers need to know about to build and use information systems successfully? Information systems and organizations influence each other, with information systems being built to serve the interests of the business firm. The interaction between these two entities is complex and is affected by various factors like organization structure, business processes, culture, environment, etc. Managers play a crucial role in deciding which systems to implement and the consequences of these decisions may not always be predictable. What is an Organization? An organization is defined as a stable, formal social structure that processes resources to produce outputs. This definition is not fully descriptive and a more realistic definition of an organization is a collection of rights, privileges, obligations, and responsibilities that have been balanced over time through conflict and resolution. The technical definition of organizations emphasizes the combination of inputs to produce outputs when technology changes are introduced, while the behavioral definition focuses on how the change affects the balance of rights, privileges, obligations, and responsibilities within the organization. Technological change requires changes in the control and ownership of information and the procedures used to achieve outputs. Both definitions complement each other and help explain the relationships between information systems and organizations. Features of Organizations. Organizations are bureaucratic with clear divisions of labour and hierarchy, following rules and principles of efficiency, with features such as culture, politics, environment, structure, goals, constituencies, and leadership that impact the information systems used. Routines and Business Processes. Organizations become efficient over time through the development of routines, which are precise rules and procedures that allow for increased productivity and efficiency, reducing costs. Organizational Politics. People in organizations have differing viewpoints and interests, resulting in political struggles for resources and competition, making organizational change and implementation of new information systems politically charged events. Organizational Culture. Organizations have underlying assumptions that shape their goals and products and these are embodied in their organizational culture, which includes unwritten, taken for-granted beliefs about how the organization operates, and these beliefs drive the way business processes are conducted. Organizational Environments. Organizations have a reciprocal relationship with their environment, as they need resources from their environment to survive, but also have the power to influence their environment. Information systems play a crucial role in helping organizations adapt to changes in their environment. Disruptive technologies can greatly affect the business landscape, leading to profit for some firms, adaptation for others, and obsolescence for the rest. Disruptive technologies can be tricky and not all firms benefit, but quick adaptation can lead to success. Organizational Structure. Organizational structure affects the type of information systems present in a business firm. Information systems in different types of organizations can vary, from parallel systems in professional bureaucracies to poorly designed systems in small entrepreneurial firms to disparate systems in huge multidivisional firms. Other Organizational Features. Organizations have different goals, constituencies and leadership styles, which impact the tasks they perform and the technology they use. These goals range from coercive to normative, and organizations serve different groups, such as members, clients, stockholders, or the public. The nature of tasks also vary, with some being routine and rule-based, while others are nonroutine and require judgement. 3.2. What is the impact of information systems on organizations? Information systems have greatly impacted the operations and decision making of organizations and have altered the economics of organizations through increased possibilities for organizing work, which can be understood through theories and concepts from economics and sociology. Economic Impacts. Information technology (IT) changes the economics of organizations by affecting the relative costs of capital and information and increasing the possibilities for organizing work. IT is substituted for traditional capital and labour, reducing the number of middle managers and clerical workers, and lowering the cost of market participation and internal management costs. As a result, firm size should shrink and revenue per employee should increase over time as more capital is invested in IT. Organizational and Behavioral Impacts. Theories based in the sociology of complex organizations also provide some understanding about how and why firms change with the implementation of new IT applications. IT Flattens Organizations. Bureaucratic organizations are often inefficient and less competitive than new organizations, leading to downsizing and reducing the number of employees and levels in the organizational hierarchy. Information technology facilitates the flattening of hierarchies by empowering lower-level employees, reducing management costs and increasing management efficiency, leading to the elimination of many middle managers. Post-industrial Organizations. Post-industrial theories suggest that IT supports flattening of hierarchies by relying on knowledge and competence rather than formal positions. IT may encourage task force-networked organizations where professionals work together for a specific task and then move on to other teams. However, there are challenges in evaluating, organizing, and informing virtual workers and not all companies are able to make it effective. Understanding Organizational Resistance to Change. Organizational politics play a crucial role in the implementation of information systems, as they have the potential to change the structure, culture, business processes and strategy of an organization, leading to resistance from those involved. The four factors affecting organizational resistance to IT innovation are the nature of the innovation, organization structure, culture and tasks. To bring about change, technology, tasks, structure and people need to be changed simultaneously. However, many information technology investments fail due to organizational and political resistance to change, making it the most common reason for project implementation failure. The Internet and Organizations. The Internet and the World Wide Web have greatly impacted relationships between firms and external entities and the organization of business processes. They increase information accessibility, storage, and distribution, lowering transaction and agency costs, leading to simpler business processes, fewer employees, and flatter organization. Implications for the Design and Understanding of Information Systems. When planning a new information system, it is important to consider the organization's environment, structure, culture and politics, type of organization and style of leadership, and the attitudes of the workers who will be using the system, as well as the tasks, decisions and business processes that the information system is designed to support. 3.3. How do Porter's competitive forces model, the value chain model, synergies, core competencies, and network economics help companies develop competitive strategies using information systems? Firms that outperform others have a competitive advantage, which is due to their access to special resources or more efficient use of commonly available resources, resulting in better revenue growth, profitability, and productivity growth, leading to higher stock market valuations. Michael Porter's competitive forces model explains the contribution of information systems to strategic advantages. Porter's Competitive Forces Model. Porter's competitive forces model outlines five forces that shape the fate of a firm and its environment, considering the firm's dependence on its business environment. Traditional Competitors All firms share market space with other competitors who are continuously de vising new, more-efficient ways to produce by introducing new products and services, and attempting to attract customers by developing their brands and imposing switching costs on their customers. New Market Entrants New companies entering the marketplace may have advantages such as not being tied to old plants and equipment, hiring younger workers, not having old brand names, and being highly motivated, but they also have weaknesses such as dependence on outside financing, less experienced workforce, and lack of brand recognition. Substitute Products and Services The presence of substitutes in an industry can reduce a company's control over pricing and lower their profit margins. New technologies are constantly creating new substitutes for traditional products and services. Ethanol can substitute for gasoline in cars; vegetable oil for diesel fuel in trucks; and wind, solar, and hydro power for industrial electricity generation. Likewise, Internet and wireless telephone service can substitute for traditional telephone service. Customers. A profitable company's success depends on its ability to attract and retain customers by charging high prices, but the customer's power grows if they can easily switch to a competitor or if the marketplace is transparent with little product differentiation and known prices, such as in the used college textbook market on the Internet, where customers have significant power over suppliers. Suppliers. The market power of suppliers can affect firm profits, with more suppliers giving the firm greater control over price, quality, and delivery schedules. Examples include laptop manufacturers with multiple suppliers for key components. Information System Strategies for Dealing with Competitive Forces. The four generic strategies to counteract competitive forces are low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy, which can be enabled by using information technology and systems Low-Cost Leadership. Walmart uses information systems to achieve low operational costs and low prices. Its continuous replenishment system quickly replenishes inventory, reducing the need for large warehouse stocks and allowing for adjustments to meet customer demand. This system is an example of an efficient customer response system and a low-cost leadership strategy. Case Study - Interactive Session: Organizations. Shipping and delivery play a crucial role in the success of e-commerce, and companies such as FedEx, UPS, and the US Postal Service have made billions of dollars handling the large number of products ordered online. Online merchants have a competitive advantage with their convenient and seamless online ordering and shipping processes, as well as free or low-cost delivery options. The "last mile," which is the final step in a delivery that takes the package to the customer's doorstep, is particularly important in logistics. Instead of relying on the traditional shipping companies, Amazon is building its own fleet of delivery vans and expanding its fleet of airplanes, operated by Amazon Air, to transport packages exclusively. This move is expected to take billions of dollars in business away from the US Postal Service, UPS, and FedEx. By having total control over the shipping process, Amazon is able to provide a better customer experience and save on costs, which will lead to even more growth for the company. FedEx, on the other hand, cancelled its contract with Amazon in 2019 and is now focusing on its ground delivery service and forming new partnerships with other retailers. On the other hand, UPS is deepening its ties to Amazon and is relying more on the US Postal Service for Sunday deliveries. The outcome of the retail shipping wars will greatly impact the future of the e-commerce retail industry. Case Study Questions: 1. Why is shipping so important for e-commerce? Explain your answer. Shipping is crucial to the success of e-commerce because it is a critical component of the customer experience. Convenient and seamless shipping processes, along with free or low-cost delivery options, are a source of competitive advantage for online merchants over traditional brick-and-mortar retailers. Moreover, shipping is a big revenue generator for shipping companies, with FedEx, UPS, and the United States Postal Service (USPS) earning billions of dollars from handling products ordered from Amazon and other e-commerce sites. 2. Compare the shipping strategies of Amazon, FedEx, and UPS? How are they related to each company's business model? Amazon has a unique shipping strategy compared to FedEx and UPS. Instead of relying on USPS, FedEx, or UPS for the "last mile" delivery, Amazon is building its own fleet of delivery vans and airplanes for this purpose through Amazon Air. This allows Amazon to have total control over the shipping process and to guarantee timely delivery of packages to its Prime members. On the other hand, FedEx ended its express delivery contract with Amazon in 2019 and shifted its focus to ground delivery services and partnerships with other retailers and brands. Meanwhile, UPS has deepened its ties to Amazon and wants to stay neutral in the e-commerce retail industry. 3. Will FedEx succeed in its push into ground ship ping? Why or why not? The success of FedEx's push into ground shipping is uncertain. While FedEx believes that handling more packages on its own will allow it to make better use of its sorting and delivery facilities, some analysts are not sure that this will generate the returns FedEx is seeking. FedEx has initiated package delivery seven days a week to compete with Amazon, but it remains to be seen if this will be enough to overtake Amazon and become the fastest and most cost-efficient e-commerce delivery service. Product Differentiation. Big Tech companies like Google, Facebook, Amazon and Apple are investing billions of dollars into research and deployment of new services and products to stay ahead of competitors. They are using information systems to create products and services that are customized and personalized to fit individual customer specifications. Companies are differentiating their products not only by the features of the products themselves but also by the entire experience of buying and using the product, known as customer experience management. Focus on Market Niche Companies use information systems to serve their target market better than competitors by analyzing customer buying patterns, tastes, and preferences to efficiently pitch advertising and marketing campaigns, and drive one-to-one marketing through the use of sophisticated software tools and customer relationship management (CRM) systems. Strengthen Customer and Supplier Intimacy. Companies use information systems to develop intimacy with customers and tighten linkages with suppliers to increase customer loyalty and reduce switching costs, as demonstrated by companies like Toyota, Ford, and Amazon. The Internet's Impact on Competitive Advantage. The Internet has intensified competitive rivalry and raised bargaining power of customers, potentially leading to lower profits, but has also created new markets and opportunities for building large and loyal customer bases through companies like Amazon, eBay, and Google. The Internet has also resulted in the decline or threat to traditional industries like printed encyclopaedias and travel agencies, and has transformed entire industries by forcing companies to change their business practices. The Business Value Chain Model The business value chain model helps in identifying specific activities in a business where competitive strategies can be applied and the impact of information systems can be maximized. The value chain model views a firm as a series of activities that add value to its products or services, categorized as primary activities and support activities. By analyzing the various stages in the value chain and using information systems, a firm can achieve operational excellence, lower costs, improve profit margins and strengthen its relationship with customers and suppliers, resulting in competitive advantage. Interactive Session - Technology: Singapore as a Smart Nation Singapore is a small island nation with a population of 5.8 million and a high GDP per capita. It is transforming itself into a "smart nation" through the use of information technology, aimed at addressing the challenges of urban density and an aging population. The government has launched a national AI strategy as a key step in the development of its Smart Nation program. Singapore is using various technologies to address traffic and housing issues, such as providing realtime traffic information, testing driverless vehicles, using virtual simulations for housing planning, and installing smart lighting systems. In healthcare, patients can access medical advice from home through video consultations, rehabilitation exercises using TeleRehab kit, and RoboCoach for senior citizens. Other initiatives include data exchange platforms, digital identification programs, and a territory-wide data collection scheme. Singapore has been named the Smart City of 2018 for its efforts, but smart city and nation projects have faced criticism for failing to deliver on their promises and posing privacy and security issues. 1. What are the factors driving the Smart Nation initiative? The factors driving the Smart Nation initiative in Singapore include the need to address the challenges of increasing urban density and an aging population, as well as the use of information technology to transform the city into a more sustainable and modern city. The government has identified artificial intelligence as a key step in the development of the Smart Nation program. 2. Describe the smart city initiatives of an urban center in your country or region. In South Africa, smart city initiatives are becoming increasingly popular as cities look to improve the quality of life for their citizens and enhance their competitiveness on a global scale. One example of a smart city initiative in South Africa is the City of Johannesburg's "Smart Johannesburg" program. This program aims to create a more sustainable, efficient, and livable city by leveraging technology and data to improve city services and infrastructure. Some of the specific initiatives that fall under this program include the implementation of smart grids, the use of smart meters to manage energy consumption, the deployment of fiber-optic networks to support high-speed internet access, and the use of data analytics to inform decision-making about city planning and service delivery. Another smart city initiative in South Africa is the City of Cape Town's "Smart Cape Town" program. This program focuses on creating a more resilient city by improving energy efficiency, reducing greenhouse gas emissions, and promoting sustainable transportation. Some of the specific initiatives that fall under this program include the installation of smart lighting systems, the deployment of electric vehicle charging stations, and the use of data analytics to inform decision-making about transportation planning and service delivery. 3. What are the possible downsides to the Smart Nation project? The possible downsides to the Smart Nation project include the fact that smart cities and smart nations have failed to deliver on many of their objectives in the past ten years, such as reducing urban automobile congestion and pollution, despite having large budgets. The implementation of technology and solutions can take many years and the initiatives may be ignored by citizens who do not see the benefits in their daily lives, especially for those who are poor, elderly, or less tech-savvy. Additionally, these initiatives pose extraordinary privacy and security issues. Smart Products and the Internet of Things. Smart products, such as wearable health trackers, farm tractors with sensors, and smart aircraft, are part of the Internet of Things (IoT) and are changing competition within industries. These smart products offer new functionality, improved customer experience, increased rivalry among firms, raised switching costs, and decreased power of suppliers, leading to the creation of information-intensive services sold by firms. The Business Value Chain Model. The Business Value Chain Model provides a strategic framework for organizations to identify opportunities for competitive advantage through the effective use of information systems. It recognizes that a firm's activities can be categorized into primary activities directly related to the production and distribution of products or services and support activities that facilitate these primary activities. Information systems play a crucial role in improving operational efficiency and enhancing customer and supplier relationships at each stage of the value chain. By applying the business value chain model, organizations can critically examine their value-adding activities, optimize business processes, and develop information system applications that address specific needs. This approach also involves benchmarking against competitors and industry best practices to identify areas for improvement. Furthermore, the model highlights the importance of extending the value chain by connecting with suppliers, distributors, and customers. Information systems can be used to establish industrywide standards for electronic transactions, promoting efficiency and discouraging new entrants. Industry participants can collaborate through IT-supported consortia and networks to coordinate activities and gain a strategic advantage. The emergence of value webs, driven by internet technology, has revolutionized industry value chains. Value webs consist of independent firms using information technology to collectively produce products or services in response to market demands. These value webs are adaptable, customerdriven, and offer flexibility in responding to changes in supply and demand, ultimately accelerating time-to-market and improving customer satisfaction. Synergies, Core Competencies, and Network-Based Strategies The concepts of synergies, core competencies, and network-based strategies in the context of large corporations and their use of information systems to gain competitive advantages. 1. Synergies: Synergies refer to the benefits that can be achieved when different units within a corporation or even different organizations collaborate, share resources, and pool expertise. Information systems play a crucial role in enabling these synergies by connecting and coordinating disparate business units. For example, mergers like that of Bank of America and Countrywide Financial Corporation aimed to leverage information systems to consolidate operations, reduce costs, and enhance cross-marketing. 2. Enhancing Core Competencies: Core competencies are activities in which a firm excels and can gain a competitive edge. Information systems can enhance core competencies by facilitating knowledge sharing across business units. This sharing of practical knowledge, combined with longterm research efforts and committed employees, can lead to the development of core competencies. For instance, Procter & Gamble uses information systems to connect employees globally, fostering idea exchange and innovation. 3. Network-Based Strategies: In the era of the internet and networking technology, firms can create competitive advantages by forming networks and alliances with other firms. These strategies include: - Network Economics: This concept revolves around the idea that the value of a product or service increases as more people use it. Network effects come into play, and the cost of adding new participants is minimal compared to the value gained. Internet-based businesses like social networks and ride-sharing platforms exemplify this. - Virtual Company Model: Firms can operate as virtual companies, collaborating with external vendors and partners through networks to deliver products and services without traditional organizational constraints. This approach is useful for quick responses to market opportunities. - Business Ecosystems and Platforms: Business ecosystems consist of loosely coupled but interdependent networks of suppliers, distributors, technology manufacturers, and service providers. Keystone firms often dominate these ecosystems, creating platforms that other firms can leverage. For example, Microsoft and Facebook provide platforms used by numerous businesses. Becoming a keystone firm or a profitable niche player within these ecosystems is a strategic consideration for firms. Overall, information systems play a pivotal role in realizing the potential of synergies, core competencies, and network-based strategies, enabling firms to achieve competitive advantages in a rapidly evolving business landscape. 3 - 4: What are the challenges posed by strategic information systems, and how should they be addressed? This passage discusses the challenges associated with strategic information systems and the importance of addressing them effectively: 1. Changing Organizational Dynamics: Strategic information systems have the power to transform an organization, impacting its products, services, and operational procedures. This often leads to new behavioral patterns within the organization. Effectively using these systems to gain a competitive advantage is challenging and requires precise coordination of technology, organizational changes, and management. 2. Sustainability of Competitive Advantage: While strategic systems can confer competitive advantages, these advantages may not last indefinitely. Competitors can respond and replicate these systems, making sustained advantage difficult. Additionally, the business landscape is constantly evolving due to market changes, shifting customer expectations, and technological advancements. The Internet has accelerated these changes, making competitive advantages more transient. Systems that were once strategic may become standard tools for survival, or they can hinder organizations from making essential strategic changes. 3. Alignment of IT with Business Objectives: Research indicates that aligning information technology with business goals is crucial for profitability. However, many firms struggle with this alignment. Only a quarter of firms effectively align IT with their business objectives. The level of alignment significantly impacts a business's profitability. Many organizations fail in this regard, allowing IT to operate independently, which often leads to suboptimal performance. Successful firms and managers actively understand the potential of IT, take an active role in shaping its use, and measure its impact on revenue and profits. In essence, the passage highlights the dynamic nature of strategic information systems, the need for adaptability in the face of changing competitive landscapes, and the critical importance of aligning IT with overarching business objectives to achieve sustained success and profitability. Review Questions 3-1 Which features of organizations do managers need to know about to build and use information systems successfully? • How is interaction between information technology and organizations influenced by mediating factors? • How do the definitions of organizations relate to their use of information systems technology? 3-2 What is the impact of information systems on organizations? • Describe how information technology can help an organization contract in size. • List the four most common factors underpinning organizational resistance to innovation. • Explain how the Internet is radically changing key business practices. • Identify three key organizational factors to consider when planning a new system. 3-3 How do Porter's competitive forces model, the value chain model, synergies, core competencies, and network economics help companies develop competitive strategies using information systems? • Define Porter's competitive forces model and explain how it works. • Describe what the competitive forces model explains about competitive advantage. • List and describe four competitive strategies enabled by information systems that firms can pursue. • Describe how information systems can support each of these competitive strategies and give examples. • Explain why aligning IT with business objectives is essential for strategic use of systems. • Define and describe the value chain model. • Explain how the value chain model can be used to identify opportunities for information systems. • Define the value web and show how it is related to the value chain. • Explain how the value web helps businesses identify opportunities for strategic information systems. • Describe how the Internet has changed competitive forces and competitive advantage. • Explain how information systems promote synergies and core competencies. • Describe how promoting synergies and core competencies enhances competitive advantage. • Explain how businesses benefit by using network economics and ecosystems. • Define and describe a virtual company and the benefits of pursuing a virtual company strategy. 3-4 What are the challenges posed by strategic information systems, and how should they be addressed? • List and describe the management challenges posed by strategic information systems. • Explain how to perform a strategic systems analysis. 3-5 It has been said that there is no such thing as a sustainable strategic advantage. Do you agree? Why or why not? 3-6 It has been said that the advantage that leading-edge retailers such as Dell and Walmart have over their competition isn't technology; it's their management. Do you agree? Why or why not? 3-7 What are some of the issues to consider in determining whether the Internet would provide your business with a competitive advantage? Offline, Online, and Back: The Evolution of the UK Grocery Market. The UK grocery market is expected to reach a value of £217.7 billion with a growth of 12.5% through 2024. The "Big Four" in the UK are Tesco, Sainsbury, ASDA, and Morrison's. Tesco initially focused on offering the lowest costs to draw price-sensitive customers away from its competitors and maintained its cost leadership through high utilization of assets, minimal costs, and strict supply chain control. However, Aldi and Lidl have been continuously increasing their market share over the last few years, leading Tesco to lose its cost leadership due to changing customer behavior during the economic recession and inflation. Tesco has struggled to maintain its online platforms and compete with huge online retailers such as Amazon and Argos. Aldi and Lidl's low-price grocery strategy has changed the UK supermarket industry, and their services have been successful due to rising inflation, stagnation in wages, and the COVID-19 crisis. Case Study Questions: 3-13. Analyze the cost leadership strategy of Tesco based on Porter’s Competitive Forces Model. Why would it be a smart move to close one of its online shopping sites? Tesco's cost leadership strategy, as per Porter's Competitive Forces Model, involves minimizing costs and offering lower prices than competitors. This approach helps Tesco gain a competitive advantage by attracting price-sensitive customers. By closing one of its online shopping sites, Tesco may be able to further reduce costs by consolidating operations and eliminating redundancy. This move could also allow Tesco to focus resources on improving the remaining online shopping site, potentially increasing its competitiveness in the online retail market. Overall, the decision to close one of its online shopping sites aligns with Tesco's cost leadership strategy by reducing costs and improving operational efficiency. 3-14. Do you think Aldi and Lidl's strategy of venturing into e-commerce is a good idea? Yes, I think Aldi and Lidl's strategy of venturing into e-commerce is a good idea. E-commerce is an increasingly important channel for retail sales, and it allows retailers to reach a wider audience and offer a more convenient shopping experience for their customers. By expanding into e-commerce, Aldi and Lidl can increase their sales and customer base, and also compete more effectively with other online retailers. Additionally, the COVID-19 pandemic has accelerated the shift towards online shopping, making it even more important for retailers to have a strong online presence. 3-15. Comment on Tesco's strategy of opening a discount chain. Do you think it could recover Tesco's former market position? Explain your answer. Tesco's strategy of opening a discount chain is a smart move, as it enables the company to tap into a new market segment and compete with discount retailers like Aldi and Lidl. However, whether or not it can recover Tesco's former market position depends on various factors, such as the quality of the products offered, pricing strategy, and customer experience. It is possible that the discount chain could help Tesco regain market share, but it will also depend on how effectively the company executes its strategy and differentiates itself from its competitors. 3-16. How much potential do you see for virtual stores (like the ones Tesco introduced in South Korea) in the United Kingdom? Virtual stores can have significant potential in the United Kingdom, especially in urban areas where online shopping is already popular. However, the success of virtual stores in the UK will depend on factors such as consumer behavior, infrastructure, and competition from established retailers. Tesco's virtual store in South Korea was successful due to factors such as high population density and a culture of convenience. It remains to be seen whether similar factors will be present in the UK market to support the success of virtual stores. Chapter 4: Ethical and Social Issues in Information Systems. Your Smartphone: Big Brother's Best Friend. Companies worldwide are tracking the precise locations of tens of millions of people with mobile phones and storing the data in gigantic data repositories. Google Maps is perhaps the most popular location-based app in the world, with over one billion users, and most of its users are having their locations tracked. Smaller companies, such as Reveal Mobile, also collect location data from mobile apps. Location data have many uses, but location data are often sent to marketing companies to create targeted advertising. When downloading an app, a mobile phone user consents to the terms of service, which can potentially allow the user's sensitive information to be exposed to ad networks, data brokers, and other technology companies. The use of mobile phone location tracking can provide benefits but also pose privacy challenges, as it can be used to invade individuals' privacy and cause harm. Advances in data management and analytics, mobile communications, and the Internet of Things (IoT) have enabled organizations to track individuals' locations and behavior patterns. There are few privacy protections for mobile location tracking, and managers need to be aware of ethical dilemmas involving information systems. Questions to consider include whether analyzing mobile phone location data creates an ethical dilemma and whether new privacy laws should be established to protect personal data. 4-1 What ethical, social, and political issues are raised by information systems? The past 20 years have seen numerous examples of failed ethical judgement by business managers. While information systems were not responsible for these lapses, they were instrumental in some cases. Managers must decide what constitutes proper legal and ethical conduct as international treaties and organizations have made it easier to extradite, prosecute, and imprison business managers suspected of criminal activity. The development of information technology produces benefits for many and costs for others, leading to new ethical questions that must be addressed. A Model for Thinking about Ethical, Social, and Political Issues. Ethical, social, and political issues are intertwined. Information technology can create ethical dilemmas that disturb the equilibrium of society's social and political institutions. As a result, new social responsibility, political correctness attitudes, and rules may be required to navigate ethical issues. Five Moral Dimensions of the Information Age. The major ethical, social, and political issues that information systems raise include the following moral dimensions. • Information rights and obligations. What information rights do individuals and organizations possess with respect to themselves? What can they protect? • Property rights and obligations. How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult, and ignoring such property rights is so easy? • Accountability and control. Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? • System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? • Quality of life. What values should be preserved in an information- and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices does the new information technology support? Key Technology Trends that Raise Ethical Issues. Information technology has raised ethical concerns and outdated laws due to five technological trends. The doubling of computing power has increased dependence on systems and vulnerability to errors. Advances in data storage techniques and declining costs have led to violations of individual privacy. Advances in data analysis techniques enable detailed personal information about individuals to be obtained. Profiling is the creation of digital dossiers on individuals by combining data from multiple sources. Nonobvious relationship awareness (NORA) technology enables powerful profiling capabilities. Advances in networking and the internet make it possible to mine large pools of data remotely, leading to an invasion of privacy on a previously unimaginable scale. 4-2: What specific principles for conduct can be used to guide ethical decisions? Basic Concepts: Responsibility, Accountability, and Liability. Ethical choices require responsibility, accountability, and liability for the consequences of decisions made by individuals. Due process and laws enable individuals to recover damages caused by other actors, systems, or organizations, forming the basis of ethical analysis of information system Ethical Analysis. 1. Identify and describe the facts clearly, and get the opposing parties to agree on the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. 3. Identify the stakeholders and their interests. 4. Identify the options that you can reasonably take. 5. Identify the potential consequences of your options, considering long-term effects. Candidate Ethical Principles. 1. The Golden Rule: Treat others as you would like to be treated. 2. The Categorical Imperative: If an action is not right for everyone, it's not right for anyone. 3. The Slippery Slope Rule: If an action can't be taken repeatedly, it's not right to take at all. 4. The Utilitarian Principle: Take the action that achieves the greatest value. 5. The Risk Aversion Principle: Take the action that produces the least harm or potential cost. 6. The Ethical No Free-Lunch Rule: Assume that all tangible and intangible objects are owned by someone else unless declared otherwise. Professional Codes of Conduct. Professional groups have special rights and obligations because of their claims to knowledge and respect, which is regulated by professional codes of conduct and ethics promulgated by associations such as the General Council of the Bar, General Medical Council, AITP, and ACM. These groups take responsibility for the partial regulation of their professions by determining entrance qualifications and competence and promise to regulate themselves in the general interest of society. Some Real-World Ethical Dilemmas. Information systems have created new ethical dilemmas where competing values are at work, pitting one set of interests against another. Companies may argue that they have a right to use information systems to increase productivity, while employees may argue that employers have some responsibility for their welfare. Analyzing the facts can sometimes produce compromised solutions that give each side half a loaf. 4-3. Why do contemporary information systems technology and the Internet pose challenge to the protection of individual privacy and intellectual property? Information Rights: Privacy and Freedom in the Internet Age. Privacy is the claim of individuals to be left alone, free from surveillance or interference from individuals or organizations, including the state. Information technology and systems threaten individual claims to privacy by making invasion of privacy cheap, profitable, and effective. The US, Canadian, and German constitutions protect the claim to privacy. Fair Information Practices (FIP) are a set of principles governing the collection and use of information about individuals that most American and European privacy laws are based on. The FTC's FIP principles are being used as guidelines to drive changes in privacy legislation. The European Directive on Data Protection. The GDPR is an updated framework that protects PII and applies to all firms and organizations that collect, store, or process personal information of EU citizens worldwide. The GDPR strengthens the rights of citizens to their own personal information and harmonizes data protection standards among the 28 European bloc nations. Privacy laws have been enacted in over 80 nations around the world. The GDPR is aimed at ad-based web businesses like Facebook, Google, and Twitter that build collections of personal data by tracking individuals across the web. Internet Challenges to Privacy. The internet presents new privacy challenges, as websites track searches, web pages visited, online content accessed, and purchases made. Both website publishers and the advertising industry defend tracking as it allows for more relevant ads, which in turn pays for the cost of publishing websites. Cookies are small text files deposited on a computer's hard drive, which when combined with personal data from other sources, can develop detailed visitor profiles. Web beacons, or tracking files, keep records of online clickstreams, reporting back to whoever owns the tracking file. Google is the world's largest collector of online user data, and Google Marketing Platform uses cookies to build its dossiers with details of online purchases and to examine visitor behavior. Technical Solutions. There are some technologies that can protect user privacy, such as encryption tools and browser settings, but technical solutions have generally failed to prevent users from being tracked between sites. Browsers have a Do Not Track option, but websites are not required to honor this request. Private browser encryption software or apps can help keep messages private. Property Rights: Intellectual Property. Information technology has made it difficult to protect intellectual property, which includes tangible and intangible products of the mind created by individuals or corporations, and is subject to various protections under copyright, patents, trademarks, and trade secrets. 1. Copyright laws protect creators of intellectual property, and their works are protected from being copied during the author's life and 70 years after their death. Software programs have been registered since the mid-1960s, and the Computer Software Copyright Act of 1980 provides protection for software code and its copies. Copyright law protects the expression, not the underlying ideas of a work, and it can be challenging to protect against look-and-feel copyright infringement lawsuits. 2. Patents provide a 20-year monopoly to the owner of an invention. The granting of a patent relies on court rulings, and the key concepts are originality, novelty, and invention. Patents have to be non-obvious, and the criteria can be difficult to meet, causing years of waiting to receive protection. Patents can stifle competition by raising barriers to entry and slowing down the development of technical applications of new ideas. 3. Trademarks are used to distinguish products in the marketplace, and trademark laws protect consumers by ensuring they receive what they paid for. Trademarks are also used to protect the investments made by firms to bring products to market. Trademark infringement violations occur when one firm pirates the marks of a competing firm. Infringement also occurs when firms dilute the value of another firm's marks. The Anti-cybersquatting Consumer Protection Act creates civil liabilities for anyone who attempts to profit from an existing famous or distinctive trademark by registering an Internet domain name that is identical or confusingly similar to that trademark. 4. Challenges to Intellectual Property Rights: Digital media presents challenges to intellectual property regimes due to ease of replication, transmission, and alteration. The proliferation of digital networks has made it more difficult to protect intellectual property, with widespread unlicensed software and illegal file-sharing services. Legitimate online music stores and streaming services have helped reduce piracy, but artists and record labels have still experienced a decline in revenue and jobs. The US Digital Millennium Copyright Act (DMCA) and the EU's Directive on Copyright in the Digital Single Market provide some copyright protection. 4-4. How have information systems affected laws for establishing accountability and liability and the quality of everyday life? New technologies challenge existing liability laws and accountability for injuries caused by machines or offensive content on social media, raising questions about who should be held liable, such as social media companies or cloud providers. Computer-Related Liability Problems. Under Armour's fitness app MyFitnessPal was hacked in 2018, compromising over 150 million user accounts, and it is difficult to hold software producers liable for products considered to be like books, but liability law will likely extend its reach to include software. Telephone systems and regulated common carriers are not liable for messages transmitted. Cable networks are considered private networks and broadcasters using public airwaves are subject to a wide variety of federal and local constraints on content and facilities, and in the US, websites are not held liable for content posted on their sites. Interactive Session: Management. The Boeing 737 Max Crashes: What Happened and Why? In 2018 and 2019, two crashes involving the Boeing 737 MAX 8 caused the deaths of 346 people. Both accidents occurred due to the same automated system, the Maneuvering Characteristics Augmentation System (MCAS), designed to prevent the plane from stalling. The MCAS system was created to correct a design flaw in the 737 MAX, which had been designed to make the plane more fuel-efficient and competitive with Airbus A320neo. A sensor outside the plane activated the MCAS when it detected the plane's nose going up, even when the plane was not on autopilot, and could repeatedly try to straighten the plane, even if the pilots overrode it. Boeing was allowed to self-certify the new MCAS software, and Boeing certified that MCAS was safe. Regulators had determined that pilots could fly the new 737 MAX airplanes without extensive retraining, as the planes were essentially the same as previous generations, saving Boeing more money. Case Study Questions: 1. What is the problem described in this case? Would you consider it an ethical dilemma? Why or why not? The problem described in the case is the safety issues with the Boeing 737 MAX 8 aircraft, which led to two fatal crashes. The crashes were caused by a software system known as the Maneuvering Characteristics Augmentation System (MCAS) that malfunctioned, causing the planes to nosedive. The case can be considered an ethical dilemma because it involves the safety of human lives, the responsibility of the aircraft manufacturer, and the decisions made by regulatory bodies. It raises questions about the ethical responsibilities of corporations to prioritize safety over profits, the ethical responsibilities of government regulatory bodies to ensure the safety of the public, and the ethical responsibilities of individuals within the company to report safety concerns. 2. Describe the role of management, organization, and technology factors in the Boeing 737 MAX safety problems. To what extent was management responsible? Management, organization, and technology factors played a significant role in the Boeing 737 MAX safety problems. Management was responsible for the decisions that led to the design and certification of the plane's new automated system, the Maneuvering Characteristics Augmentation System (MCAS), without adequate pilot training or disclosure. Additionally, management prioritized profits and meeting production schedules over safety concerns, leading to the compromise of safety standards and lack of transparency in the certification process. Organizational factors, such as the lack of communication and collaboration between the engineering and certification teams, the outsourcing of critical software development to contractors, and the reliance on a single sensor to activate MCAS, also contributed to the safety problems. Technological factors, such as the flawed design of MCAS and its inadequate redundancy, further compounded the safety issues. Overall, management bears significant responsibility for the Boeing 737 MAX safety problems due to its prioritization of profit over safety, inadequate oversight of the certification process, and lack of transparency. 3. Is the solution provided by Boeing adequate? Explain your answer. It is important to note that the solution presented by Boeing, which includes software updates and additional pilot training, has been approved by regulatory authorities, including the Federal Aviation Administration (FAA) in the United States. The effectiveness of the solution remains to be seen, and ongoing monitoring and evaluation will be necessary to ensure the safety of the Boeing 737 MAX 8. 4. What steps could Boeing and the FAA have taken to prevent this problem from occurring? Boeing and the FAA could have taken several steps to prevent the safety problems with the 737 MAX from occurring. Some possible steps include: 1. Conducting more rigorous testing of the MCAS system to identify potential failure modes and ensure that the system could be safely overridden by pilots. 2. Providing more detailed training to pilots on the new system and its potential failure modes, including simulators that accurately replicated the behavior of the MCAS system. 3. Conducting a more thorough review of the 737 MAX's design and systems to identify potential safety risks and mitigate them before the plane entered service. 4. Ensuring that the certification process for the 737 MAX was conducted in a transparent and independent manner, with rigorous oversight by the FAA to ensure that Boeing was following all necessary safety procedures. By taking these steps, Boeing and the FAA could have identified and mitigated the safety risks associated with the 737 MAX before it entered service, potentially preventing the tragic accidents that occurred. System Quality: Data Quality and System Errors. In 2018, major cloud providers experienced significant outages affecting services such as Snapchat, Spotify, and Alexa, raising concerns over the reliability and quality of cloud services. The debate over liability and accountability for system use raises questions about an acceptable level of system quality and responsibility of producers of computer services. Poor system performance can stem from software bugs, hardware/facility failures, and poor input data quality, with data quality being the most common source of business system failure. The software industry has not yet developed testing standards for producing software of acceptable but imperfect performance. Quality of Life: Equity, Access, and Boundaries. Information technologies and systems can cause negative social consequences, potentially harming individuals, societies, and political institutions; balancing good and bad consequences raises questions of responsibility, and there are individual, social, and political responses to these negative consequences. Big Tech: Concentrating Economic and Political Power. Big Tech firms such as Amazon, Google, Facebook, and Microsoft have monopolies in the web and mobile platforms, which translate into political influence and increased lobbying efforts, leading to concerns about anticompetitive practices, unfair market access, and abuse of personal privacy; critics call for breaking up these firms much like the antitrust act did with Standard Oil in 1911. The global marketplace has become more efficient with the help of information systems, but timebased competition can result in a just-in-time society with no job security or benefits. Businesses, governments, and other organizations are heavily dependent on information systems and are vulnerable to failure. The lack of regulation and standards for these systems may eventually require national standards and regulatory oversight. Computer crime and abuse are significant problems that arise with new technologies. Computer crime includes illegal acts committed with or against a computer system, while computer abuse involves unethical but not necessarily illegal acts involving a computer. Spamming is a major problem, with billions of dollars in costs for businesses and a percentage of email that is estimated at around 55%. Spamming is more tightly regulated in Europe than in the US, which has the CAN-SPAM Act that bans deceptive email practices but has not had a significant impact on spamming. Health Risks: RSI, CVS, and Cognitive Decline. Repetitive stress injury (RSI) is a common occupational disease that affects as much as one-third of the labor force and accounts for one-third of all disability cases. Computer keyboards are the single largest source of RSI, with carpal tunnel syndrome (CTS) being the most common type of computerrelated RSI. Ergonomically correct workstations and keyboards, along with rest breaks and employee rotation, can help reduce RSI. Other occupational illnesses caused by computers include back and neck pain, leg stress, foot pain, and computer vision syndrome (CVS). The excessive use of computers and smartphones may also reduce intelligence and problem-solving abilities. The growth of the internet and information economy will continue to heighten ethical and social issues. Interactive Session Technology. Do Smartphones Harm Children? Maybe, Maybe Not. Smartphones have been criticized for their impact on children's mental and physical health, including addiction and stunted development. Heavy smartphone and social media use have been linked to distractions in the classroom, higher risk of depression, suicide, and poor sleep quality. However, some studies have found the link between social media use and adolescent depression and anxiety to be small and inconsistent. There is no definitive proof that digital technology alters minds for the worse, and researchers believe that screens are not responsible for broad social problems, but rather, a mirror revealing existing problems. 1. Identify the problem described in this case study. The problem described in the case study is the potential negative impact of smartphones on children's mental and physical health, particularly on their brain development, addiction, and susceptibility to distractions, anxiety, and depression. The passage explores the conflicting views on the extent of the harm caused by smartphones and social media, as some studies suggest a small to significant correlation between excessive phone use and mental health problems, while others refute such claims and suggest that phones are not the primary cause of such issues. The passage also highlights the concerns of parents, educators, and psychologists regarding the impact of digital technology on children's ability to focus, learn, and engage in other activities, such as exercise and socializing. 2. Compare the research findings approving or disapproving of smartphone use among children and Teenagers. The research on smartphone use among children and teenagers is mixed. Some studies suggest that heavy smartphone use can lead to negative mental and physical health outcomes, such as distraction in the classroom, higher risk of suicide and depression, decreased ability to focus on educational tasks, and sleep deprivation. On the other hand, some studies challenge these findings and suggest that the link between smartphone use and negative outcomes may be small and inconsistent. While excessive phone use can exacerbate the problems of certain vulnerable groups, such as children with mental health issues, it may not be responsible for broad social problems like teenagers' rising anxiety rates and sleep deprivation. Overall, there is no definitive proof that digital technology alters minds for the worse, but it is generally agreed that children who use their phones too much can miss out on other valuable activities, such as exercise. 3. Should restrictions be placed on children's and in what sense is it an ethical dilemma? teenagers' smartphone use? Why or why not? The decision of whether to place restrictions on children's and teenagers' smartphone use is an ethical dilemma that involves balancing the potential benefits and harms. On the one hand, smartphones can provide educational and social benefits, and restricting use could impede access to these benefits. On the other hand, excessive smartphone use can have negative impacts on mental health, physical health, and academic performance. Therefore, it is important to consider the age, individual needs and circumstances, and other factors that influence smartphone use when making decisions about restrictions. Parents, educators, and policymakers should weigh the potential benefits and harms and consider measures such as setting time limits, using monitoring software, and promoting alternative activities. Ultimately, the ethical dilemma of restricting smartphone use requires consideration of the potential benefits and harms to the child, their autonomy, and the social and cultural context Review Questions: 4.1 What ethical, social, and political issues are raised by information systems? Explain what nonobvious relationship awareness is. Describe the net impact of the doubling of computer power every eighteen months. List some of the ethical issues in information systems that have been given new urgency by the rise of the Internet and electronic commerce. Ethical, social, and political issues raised by information systems include privacy, security, intellectual property, equity, and access to information. The widespread use of information systems raises questions about how personal information is collected, stored, and used. The use of technology also raises concerns about cybersecurity threats and the need for data protection. Other issues include concerns about the ownership and use of intellectual property, the digital divide, and the impact of technology on social and economic inequality. Nonobvious relationship awareness refers to the ability of information systems to identify relationships between entities that are not apparent based on their individual attributes. For example, an online retailer may use nonobvious relationship awareness to identify customers who are likely to purchase a certain product based on their browsing history or purchase behavior. The doubling of computer power every eighteen months, known as Moore's Law, has had a significant impact on the development of information systems. This exponential increase in computing power has enabled the development of more sophisticated and powerful systems that can process larger amounts of data and perform more complex tasks. It has also led to the development of new technologies such as artificial intelligence and machine learning. Some ethical issues in information systems that have been given new urgency by the rise of the Internet and electronic commerce include privacy and security concerns, intellectual property rights, and the impact of technology on social and economic inequality. The rise of social media and online platforms has also raised concerns about the spread of misinformation and the use of personal data for political purposes. Additionally, the use of technology in the workplace has raised concerns about surveillance and employee monitoring. 4.2 What specific principles for conduct can be used to guide ethical decisions? List and describe the five steps in an ethical analysis. Identify and describe six ethical principles. Specific principles for conduct that can be used to guide ethical decisions include: 1. Responsibility: Accepting the consequences of one's decisions and actions and being accountable for them. 2. Confidentiality: Respecting privacy and protecting information that has been entrusted to you. 3. Integrity: Being honest, trustworthy, and fair in all dealings and interactions. 4. Availability: Ensuring that information and resources are accessible to those who need them. 5. Compliance: Adhering to laws, regulations, and organizational policies. The five steps in an ethical analysis are: 1. Identify and describe the facts clearly, and get the opposing parties to agree on the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. 3. Identify the stakeholders and their interests. 4. Identify the options that you can reasonably take. 5. Identify the potential consequences of your options, considering long-term effects. The six ethical principles are: 1. The Golden Rule: Treat others as you would like to be treated. 2. The Categorical Imperative: If an action is not right for everyone, it's not right for anyone. 3. The Slippery Slope Rule: If an action can't be taken repeatedly, it's not right to take at all. 4. The Utilitarian Principle: Take the action that achieves the greatest value. 5. The Risk Aversion Principle: Take the action that produces the least harm or potential cost. 6. The Ethical No Free-Lunch Rule: Assume that all tangible and intangible objects are owned by someone else unless declared otherwise. 4.3 Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? Contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property due to their ability to store, process, and transmit vast amounts of personal data and digital content across global networks, increasing the risk of data breaches, hacking, and piracy Define privacy and Fair Information Practices. Privacy refers to the right of individuals to control the collection, use, and disclosure of their personal information. Fair Information Practices are a set of principles that guide organizations in handling personal information, including notice, choice, access, security, and enforcement. Explain how the Internet challenges the protection of individual privacy and intellectual property. The Internet challenges the protection of individual privacy and intellectual property due to the ease of accessing, sharing, and distributing personal information and digital content. The anonymity of users, the lack of security measures, and the global reach of the Internet make it difficult to control and regulate the use of personal information and intellectual property. Explain how informed consent, legislation, industry self-regulation, and technology tools help protect the individual privacy of Internet users. Informed consent, legislation, industry self-regulation, and technology tools help protect the individual privacy of Internet users by providing users with transparency and control over their personal information. Informed consent requires organizations to obtain explicit permission from individuals before collecting, using, or disclosing their personal information. Legislation, such as data protection laws and privacy regulations, establishes legal obligations for organizations to protect personal information. Industry self-regulation involves organizations adopting voluntary codes of conduct and standards for handling personal information. Technology tools, such as encryption, firewalls, and anti-virus software, help protect personal information from unauthorized access, theft, and misuse. List and define the three regimes that protect intellectual property rights. The three regimes that protect intellectual property rights are: Patents: legal rights granted to inventors of new and useful products, processes, and designs. Copyrights: legal rights granted to authors and creators of original works of authorship, including books, music, and software. Trademarks: legal rights granted to owners of unique symbols, logos, and names used to identify and distinguish their products and services from others. 4.4 How have information systems affected laws for establishing accountability and liability and the quality of everyday life? Information systems have created new types of accountability and liability, as well as new legal issues such as jurisdiction in cyberspace. Identify the most common reason for business system failure. The most common reason for business system failure is management's failure to anticipate the complexity and scope of the project. Describe why all organizations have be come dependent and vulnerable as a result of using information systems. Organizations have become dependent on information systems because they streamline operations, improve decision-making, and provide a competitive advantage, but this dependence also makes them vulnerable to system failures, cyber-attacks, and other risks. Describe computer crime using an example. Computer crime refers to the use of a computer to commit an illegal act. For example, a hacker who gains unauthorized access to a company's database and steals sensitive information is committing computer crime. Explain what is meant by the term digital divide. The term digital divide refers to the gap between those who have access to digital technologies and those who do not, typically due to factors such as income, education, and geographic location. Discussion Questions: 4.5 Should producers of software-based services, such as ATMs, be held liable for economic injuries suffered when their systems fail? The question of liability for economic injuries resulting from system failures is a complex legal and ethical issue. Ultimately, it is up to the courts to determine whether software-based service providers, such as ATM producers, should be held liable for such injuries. However, it is generally expected that producers of software-based services should take reasonable steps to ensure that their systems are reliable and secure. 4.6 Should companies be responsible for unemployment their information systems cause? Why or why not? Companies should take responsibility for the impact that their information systems have on employment. However, it is difficult to determine the extent to which information systems are responsible for job loss, as automation and other factors can also play a role. Companies should take steps to mitigate the impact of information systems on employment, such as providing training for workers whose jobs may be affected. 4.7 Discuss the pros and cons of allowing companies to amass personal data for behavioral targeting. The use of personal data for behavioral targeting has both pros and cons. On the one hand, it can be beneficial for companies to use personal data to tailor their marketing efforts to individual consumers, potentially increasing the effectiveness of their advertising. On the other hand, this practice can also be seen as an invasion of privacy and may raise concerns about the misuse of personal data. To address these concerns, companies should be transparent about their data collection and use practices and give consumers the option to opt out of data collection if they choose. Additionally, regulations such as the General Data Protection Regulation (GDPR) provide guidelines for the collection and use of personal data. Hands-On MIS Projects 4.8 Fashion Today is an online fashion shop catering to Belgium, the Netherlands, and Luxembourg. It keeps track of each customer's email address, home address, age, gender, clothing preferences, and body-size measurements. Yara is a young woman who struggles to find things her size but is a regular shopper at Fashion Today. One day, she receives a text message announcing a new line of clothes named FTXL. Clearly, she has been selected based on her submitted body size measurements. Five days later, she receives an ad for weight-loss supplements from Herbs4Life, an affiliate of Fashion Today. Has Fashion Today violated Yara's privacy? Is this potentially offensive to people like Yara? Explain your answer. FashionToday's use of Yara's personal data to send targeted advertisements for FTXL and weightloss supplements from Herbs4Life could be considered a violation of Yara's privacy. While FashionToday may argue that they are using the data to improve the customer's shopping experience, Yara may not have explicitly consented to the use of her personal data for targeted advertisements. Additionally, the advertisement for weight-loss supplements could be potentially offensive to Yara and others who struggle with body image issues. FashionToday should be transparent about their use of customer data and obtain explicit consent before using it for targeted advertisements. 4.9 As the head of a small insurance company with six employees, you are concerned about how effectively your company is using its networking and human resources. Budgets are tight, and you are struggling to meet payrolls because employees are reporting many overtime hours. You do not believe that the employees have a sufficiently heavy workload to warrant working longer hours and are looking into the amount of time they spend on the Internet. Each employee uses a computer with Internet access on the job. Review a sample of your company's weekly report of employee web usage, which can be found in MyLab MIS. Calculate the total amount of time each employee spent on the web for the week and the total amount of time that company computers were used for this purpose. Rank the employees in the order of the amount of time each spent online. Do your findings and the contents of the report indicate any ethical problems employees are creating? Is the company creating an ethical problem by monitoring its employees' use of the Internet? Use the guidelines for ethical analysis presented in this chapter to develop a solution to the problems you have identified. Achieving Operational Excellence: Creating a Simple Blog 4.10 In this project, you'll learn how to build a simple blog of your own design using the online blog creation soft ware available at Blogger.com. Pick a sport, hobby, or topic of interest as the theme for your blog. Name the blog, give it a title, and choose a template for the blog. Post at least four entries to the blog, adding a label for each posting. Edit your posts if necessary. Upload an image, such as a photo from your computer, or the web, to your blog. Add capabilities for other registered users, such as team members, to comment on your blog. Briefly describe how your blog could be useful to a company selling products or services related to the theme of your blog. List the tools available to Blogger that would make your blog more useful for business and de scribe the business uses of each. Save your blog and show it to your instructor. Improving Decision Making: Analyzing Web Browser Privacy. Software Skills: Web browser software Business Skills: Analyzing web browser privacy protection features 4.11 This project will help develop your Internet skills for using the privacy protection features of leading web browser software. Examine the privacy protection features and settings for two leading web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox, or Google Chrome. Make a table comparing the features of two of these browsers in terms of functions provided and ease of use. How do these privacy protection features protect individuals? How do these privacy protection features affect what businesses can do on the Internet? Which browser does the best job of protecting privacy? Why? Privacy Features Tracking Protection Do Not Track (DNT) Ad Blocker Mozilla Firefox Yes Yes No Google Chrome Yes No No Pop-up Blocker Incognito/Private Browsing Mode Password Manager Syncing Clear Browsing Data on Exit Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes These privacy protection features protect individuals by blocking trackers, preventing cookies and other information from being shared, blocking pop-ups, and providing an incognito/private browsing mode that does not save browsing history, cookies, or form data. The use of these privacy protection features affects what businesses can do on the internet by limiting their ability to track users and collect data on their browsing habits. In terms of which browser does the best job of protecting privacy, both Mozilla Firefox and Google Chrome offer strong privacy protection features. However, Mozilla Firefox's tracking protection and Do Not Track (DNT) features provide an additional layer of privacy protection compared to Google Chrome. Additionally, Mozilla Firefox is open-source software, which means that its code is available for public inspection and verification, providing greater transparency and accountability. Therefore, Mozilla Firefox may be considered the better browser for privacy protection. 4.12 With three or four of your classmates, develop a corporate ethics code on privacy that addresses both employee privacy and the privacy of customers and users of the corporate website. Be sure to consider email privacy and employer monitoring of worksites as well as corporate use of information about employees concerning their off-the-job behavior (e.g., lifestyle, marital arrangements, and so forth) If possible, use Google Docs and Google Drive or Google Sites to brainstorm, organize, and develop a presentation of your findings for the class. Corporate Ethics Code on Privacy The following code outlines our commitment to privacy and the ethical principles we will uphold in protecting the privacy of both our employees and customers. 1. Collection and Use of Personal Information: We will only collect and use personal information that is necessary to conduct our business and will take reasonable steps to protect the privacy of such information. 2. Transparency: We will clearly and honestly disclose our privacy practices to all stakeholders and will ensure that they are easily accessible. 3. Data Security: We will maintain appropriate technical and organizational measures to ensure the security of personal information. 4. Employee Privacy: We respect the privacy of our employees and will not monitor their personal communications, except where required by law or for legitimate business purposes. 5. Customer Privacy: We will protect the privacy of our customers and will not disclose their personal information to third parties, except where required by law or for legitimate business purposes. 6. Email Privacy: We will respect the privacy of email communications and will not monitor employee emails, except where required by law or for legitimate business purposes. 7. Off-the-Job Behavior: We will not use information about an employee's off-the-job behavior, such as lifestyle or marital arrangements, for purposes of employment decisions. 8. Compliance: We will comply with all applicable laws and regulations related to privacy and data protection. 9. Accountability: We will regularly review and assess our privacy practices to ensure they remain effective and compliant with relevant laws and regulations. We believe that protecting privacy is not only the right thing to do but also critical to our business success. Therefore, we are committed to implementing and enforcing this Corporate Ethics Code on Privacy in all aspects of our operations. Case Study: Facebook Privacy: Your Life for Sale Facebook's mission statement is to connect people and build communities. However, in 2017 and 2018, Facebook was criticized for allowing its platform to be used by Russian intelligence and political consultants to influence the US presidential election of 2016. The company allowed third-party apps to obtain users' personal information, which was then used to send targeted political ads in the election. Facebook's design allowed for this app to collect the personal information of not only the app users but also their entire Facebook social network. Facebook also had data-sharing partnerships with at least 60 device makers and selected app developers, allowing these companies to gain access to data about Facebook users and their friends without their explicit consent, violating a 2012 privacy settlement with the FTC. Facebook was fined a record-breaking $5 billion by the FTC for violating this privacy settlement in 2019, and agreed to new oversight and policies for handling personal information. However, critics argue that the fine is not enough to change the company's behavior, as there are no specific restrictions on its mass surveillance of users, and the new policies will be created by Facebook itself rather than the FTC. 4.13 Perform an ethical analysis of Facebook. What is the ethical dilemma presented by this case? Facebook's ethical dilemma is balancing its pursuit of profit and growth with its responsibility to protect users' privacy, prevent the spread of harmful content, and ensure the integrity of democratic processes. The company has faced criticism for a range of ethical concerns, including allowing the spread of misinformation, failing to prevent foreign interference in elections, and mishandling user data. These issues have raised questions about Facebook's commitment to ethical principles and its accountability to users and society as a whole. A comprehensive ethical analysis of Facebook would consider its impact on various stakeholders, such as users, advertisers, governments, and civil society organizations, and examine the trade-offs between short-term profits and long-term sustainability. 4.14 What is the relationship of privacy to Facebook's business model? Facebook's business model relies heavily on collecting user data and using it for targeted advertising. Therefore, privacy is directly related to Facebook's business model because users' personal information is the foundation of the company's revenue stream. Facebook's ability to collect and analyze user data enables them to provide advertisers with specific and valuable insights into user behavior, preferences, and interests, which can be used to create more effective and profitable advertising campaigns. However, this raises ethical concerns regarding user consent, transparency, and the extent to which users are aware of how their data is being used. 4.15 Describe the weaknesses of Facebook's privacy policies and features. What management, organization, and technology factors have contributed to those weaknesses? Weaknesses of Facebook's privacy policies and features include: 1. Complex privacy settings: Facebook's privacy settings are often complicated and confusing, making it difficult for users to control their data. 2. Default settings: Facebook's default privacy settings have often favored sharing over privacy. 3. Data breaches: Facebook has experienced numerous data breaches that have resulted in user data being compromised. 4. Third-party apps: Facebook's API allowed third-party apps to access user data, often without users' knowledge or consent. Management, organization, and technology factors that contributed to these weaknesses include: 1. Lack of oversight: Facebook's management did not provide enough oversight to ensure that user data was being handled responsibly. 2. Emphasis on growth: Facebook's focus on growth and engagement may have led to a disregard for privacy concerns. 3. Technical complexity: Facebook's technology is highly complex, which can make it difficult to implement effective privacy controls. 4. Corporate culture: Facebook's corporate culture has been criticized for being insular and not valuing privacy as much as it should. 4.16 Will Facebook be able to have a successful busi-ness model without invading privacy? Explain your answer. Could Facebook take any mea-sures to make this possible? Yes, Facebook could have a successful business model without invading privacy. Facebook could take measures to make this possible by improving their privacy policies and features, being more transparent about their data practices, and allowing users to have more control over their data. By doing so, Facebook could build trust with its users and potentially even attract new users who are concerned about privacy. Additionally, Facebook could explore alternative revenue streams, such as subscription models or partnerships with businesses, that do not rely on collecting and selling user data. However, implementing these measures would require significant changes to Facebook's current business model and would likely come with some financial costs. Chapter 5: IT Infrastructure and Emerging Technologies. South Asia's Grab Leverages Information Technology to Enhance Its Services: Grab is a Singapore-based company that provides customers with a taxi-booking service, food delivery, and mobile payments through a smartphone app. The company has expanded rapidly in Southeast Asia and has downloaded onto approximately 185 million mobile devices. Grab uses information technology to provide customers with a safer and more reliable taxi service, allowing them to track drivers, view traffic conditions, and receive real-time updates regarding the driver's current position and estimated time of arrival. The company uses Amazon's Redshift and ElastiCache data warehousing and data storage cloudbased services to manage millions of daily bookings in real-time. Grab's success is due to its ability to leverage information technology to provide stability to an otherwise unpredictable sector, thus increasing the app user's chances of obtaining a metered taxi. The firm's success is also due to its use of data analytics to match demand with supply, ensuring that resources are allocated appropriately to high-demand areas. Grab aims to integrate all of its services through the GrabPlatform, allowing its over 9 million drivers, delivery partners, merchants, and agents across 339 cities in eight countries to use the same technology localized to their own language and needs. In 2019, Grab took in $1.4 billion in funding to further expand its services. Grab's use of information systems has allowed the company to effectively manage its resources and improve its performance by ensuring timely supply to meet demand. Through its real-time monitoring of ride requests, Grab positions its finite resources to maximize capacity, enabling its drivers to earn more fares and retain them. Amazon's cloud-based services, such as Redshift and ElastiCache, have facilitated the handling of millions of daily bookings and allowed users to track drivers and view traffic conditions. Cloud computing has been important to Grab's operations, as it has allowed the company to concentrate on enhancing its app while benefiting from the capabilities provided by Amazon. 5 – 1: What is IT Infrastructure, and what are the stages and drivers of IT infrastructure evolution? IT infrastructure are shared technology resources that provide a platform for specific information system applications, including hardware, software, and services. It is essential to serve customers, work with vendors, and manage internal business processes. The global IT infrastructure industry in 2020 was estimated to be worth $3.9 trillion, with investment accounting for 25 to 50 percent of information technology expenditures in large firms, particularly financial services firms, where investment exceeds half of all capital investment. Defining IT infrastructure. IT infrastructure includes physical devices and software applications that are needed to run an enterprise, as well as firmwide services composed of human and technical capabilities. These services include computing platforms, telecommunications services, data management services, application software services, physical facilities management services, IT management services, IT standards services, IT education services, and IT research and development services. The "service platform" perspective makes it easier to understand the business value provided by infrastructure investments. Example: a fully loaded personal computer and a high-speed Internet connection can be valuable for an employee, resulting in increased productivity and a higher value to the firm. Evolution of IT Infrastructure. The evolution of IT infrastructure has gone through five stages from mainframes to cloud and mobile computing. Technologies from past eras can still be used in modern times for different purposes. There have been five stages in this evolution, namely; general-purpose mainframe and minicomputer computing, personal computers, client/server networks, enterprise computing, and cloud and mobile computing. General-Purpose Mainframe and Minicomputer Era (1959 to Present). The mainframe era began in 1959 with the widespread commercial use of mainframe computers such as the IBM 1401 and 7090, and the introduction of IBM 360 series in 1965 marked the start of timesharing, multitasking and virtual memory. Mainframe computing was centralized, controlled by professional programmers and system operators with most infrastructure provided by a single vendor. Decentralized computing became possible with the introduction of DEC minicomputers in 1965, offering powerful machines at lower prices than IBM mainframes. Personal Computer Era (1981 to Present). The personal computer era began with the IBM PC in 1981, which was widely adopted by businesses. PCs became standard desktop computers and the rise of productivity software tools made them valuable for both home and corporate users. PC sales have declined due to the popularity of tablets and smartphones. Client/Server Era (1983 to Present) The client/server model involves desktop or laptop clients that are networked to server computers which provide services and process and store shared data. The simplest client/server network has processing split between the two machines in a two-tiered architecture, while corporations often use multitiered N-tier architectures that balance the network's work over several levels of servers. Web server software and application server software are used to handle different kinds of requests in these architectures. Client/server computing enables businesses to distribute computing work across a series of smaller, inexpensive machines that cost much less than centralized mainframe systems. Enterprise Computing Era (1992 to Present). During the early 1990s, firms sought to integrate their disparate networks and applications into an enterprise-wide infrastructure, which was made possible by the development of the TCP/IP networking standard. This allowed the linking of different types of computer hardware and smaller networks into a single enterprise-wide network that enabled free information flow across the organization and with other firms. The enterprise infrastructure also required software to link disparate applications and enable data flow across different parts of the business. Cloud and Mobile Computing Era (2000 to Present) The client/server model has evolved into the cloud computing model, providing access to a shared pool of computing resources over the Internet. Public cloud spending is expected to reach $350 billion by 2022, and major companies like Amazon, Google, IBM, Oracle, and Microsoft operate large cloud data centers. Cloud computing is the fastest-growing form of computing, and software applications are sold as services over the Internet. Technology Drivers of Infrastructure Evolution. Moore's Law, based on Gordon Moore's assertion, states that the number of transistors on a microprocessor chip doubles every two years, leading to a decline in computing costs and a rise in computing power. However, this exponential growth may not continue much longer as the rate of cost improvement has slowed, and chip manufacturers may reach the physical limits of semiconductor size. Nanotechnology offers a potential solution to continue the trend of smaller and more powerful computer chips. The Law of Mass Digital Storage The Law of Mass Digital Storage indicates that digital information doubles annually while storage costs decrease by 100% each year. Metcalfe's law and network economics. Metcalfe's law states that the value of a network increases exponentially with the number of its members, leading to increasing returns to scale. This is supported by network economics, where the social and business value of digital networks drives demand for information technology, multiplying the number of connections among network members. Declining Communication cost and the internet. The declining cost of communication, including internet access, and the exponential growth of the internet have transformed IT infrastructure. As communication costs approach zero, utilization of communication and computing facilities increases, leading to the need for expanding internet connections and network capabilities in order to leverage the business value associated with the internet. These trends are expected to continue. Standard and Network effects: Agreements on technology standards and widespread consumer acceptance are essential for today's enterprise infrastructure and internet computing. Technology standards enable compatibility and communication in networks, resulting in economies of scale, price declines, and the ability to leverage common platforms like the Wintel PC with Windows and Microsoft Office. Important standards include Ethernet for local area networks and TCP/IP for firmwide and internet connectivity. 5.2: What are the components of IT Infrastructure? The components of IT infrastructure include hardware, software, data management technology, networking and telecommunications technology, services (including consulting and system integration), personnel, and physical facilities. These components need to be coordinated to create a coherent infrastructure. Increasingly, companies are adopting cloud services and outsourcing some components, resulting in a mix of owned, rented, and external vendor-provided components. In a modern office setting, IT infrastructure components are essential for efficient operations. This includes hardware like computers and servers, software applications, data management systems, networking technology, and physical facilities. Companies may also leverage cloud services to complement their on-premises infrastructure. By utilizing these components effectively, businesses can ensure smooth data processing, communication, and collaboration, enhancing productivity and enabling seamless integration of technology into their daily operations. Companies may also utilize cloud services, such as cloud storage or software-as-a-service (SaaS) applications, where certain components are provided and managed by external vendors. This hybrid approach allows companies to combine on-premises infrastructure with cloud-based solutions to meet their IT needs efficiently. Computer Hardware Platforms. Firms globally are projected to invest $688 billion in computer hardware devices in 2020, encompassing mainframes, servers, PCs, tablets, and smartphones. Mainframes continue to serve as critical infrastructure for banking and telecommunications networks due to their ability to handle large workloads and process vast amounts of data. IBM remains the main provider of mainframe systems, which have been repurposed as powerful servers for enterprise networks and websites, capable of running multiple instances of operating systems and replacing numerous smaller servers. Operating Systems Platforms. The primary operating systems for corporate servers are Microsoft Windows Server, Unix, and Linux, each catering to specific needs. Windows Server offers comprehensive services for organizations preferring Windows-based infrastructures, while Unix and Linux provide scalability, reliability, and cost-effectiveness. Microsoft Windows dominates the PC market, but there is now a wider range of client operating systems, including Google's Chrome OS for cloud computing and Android for mobile devices. Touch technology is increasingly integrated into operating systems like iOS, Windows, and Android to provide intuitive user experiences. Enterprise Software Applications. Global spending on enterprise application software in 2020 is projected to reach approximately $503 billion, with SAP and Oracle being the major providers. This category also includes middleware software from IBM and Oracle for achieving integration within firms. Microsoft aims to target small and medium-sized businesses in this market segment. Data Management and Storage. Enterprise database management software plays a crucial role in organizing and managing a firm's data for efficient access and utilization. Leading providers include IBM (DB2), Oracle, Microsoft (SQL Server), SAP Sybase (Adaptive Server Enterprise), MySQL (owned by Oracle), and Apache Hadoop (for managing large data sets). Networking and Telecommunications Platform: Companies are projected to spend $1.5 trillion on telecommunications services in 2020, with Windows Server being the predominant local area network operating system, followed by Linux and Unix, while Cisco and Juniper Networks are leading networking hardware providers. Internet Platforms: Internet platforms encompass hardware, software, and management services for websites, including web hosting, routers, and wireless equipment, with a shift towards fewer, more powerful servers and cloud computing services, dominated by IBM, Dell, Oracle, and HP, and supported by software tools from Microsoft, Oracle-Sun, and independent developers. Consulting and System Integration Services: Consulting and system integration services are essential for deploying and maintaining an organization's IT infrastructure, as firms often lack the necessary resources and expertise. Leading consulting firms like Accenture, IBM Services, and HP provide expertise in implementing new infrastructure, including business process changes, software integration, and ensuring compatibility with legacy systems, which are older transaction processing systems that can be integrated into a modern infrastructure instead of being replaced. 5.3 What are the current trends in computer platforms? The current trends in computer platforms include a shift towards mobile and network-based computing, consumerization of IT, quantum computing, virtualization, cloud computing, edge computing, green computing, and high-performance processors. The Mobile Digital Platform. The mobile digital platform encompasses smartphones, tablets, netbooks, and e-book readers, which are increasingly replacing PCs for various tasks. Wearable computing devices like smartwatches and smart glasses have also emerged, offering business applications such as delivering real-time information to workers in the field. The consumerization of IT and BYOD: The consumerization of IT refers to the use of personal mobile devices and consumer software services in the workplace, known as BYOD. This trend challenges traditional IT practices as employees and departments have a greater say in technology selection, leading to a shift in managing and controlling these devices and services to meet business needs. Quantum computing. Quantum computing harnesses the power of quantum physics to process data in multiple states simultaneously, enabling significantly faster problem-solving. IBM, Google, Microsoft, Intel, and NASA are among the key players in developing quantum computing platforms with increasing real-world applications. Virtualization. Virtualization is a technique that allows for the abstraction and consolidation of computing resources, such as servers and storage devices, enabling them to be accessed as multiple logical resources. It reduces costs by increasing resource utilization rates and facilitating centralization and consolidation. Additionally, virtualization enables software-defined storage, allowing for efficient allocation of storage resources and the use of lower-cost hardware. Cloud computing. Cloud computing is a model that offers computing resources, such as processing power and storage, as virtualized services over the internet. It provides on-demand self-service, ubiquitous network access, resource pooling, rapid elasticity, and measured service. There are three types of cloud services: Infrastructure as a Service (IaaS), where customers use cloud resources to run their systems; Platform as a Service (PaaS), providing a platform for developing and deploying applications; and Software as a Service (SaaS), offering software applications over the internet. Interactive Session: Organizations. Glory finds solutions in the cloud. Glory Global Solutions is a leading provider of cash management solutions for ATMs worldwide, with a presence in over 20 countries and servicing customers in over 100 countries. To streamline and standardize its business processes, Glory decided to move to a cloud-based platform, ultimately choosing Oracle as its vendor. The transition involved working with system integrator TCS and implementing the new system in 24 countries over a four-year period, leading to reduced IT costs and the ability to operate and grow as a single global firm. 1. Why did Glory choose a cloud solution as opposed to modernizing the systems it had? Glory chose a cloud solution instead of modernizing its existing systems because it wanted to streamline and standardize its business processes worldwide. Moving to a cloud platform provided by a single vendor would reduce data management and IT infrastructure costs, making it a more costeffective and efficient solution. 2. Why was it necessary to hire a systems integrator firm? Hiring a systems integrator firm was necessary because Glory had a collection of legacy systems developed by multiple firms, making it difficult for the systems to communicate with each other. The integrator firm, in this case TCS, had the expertise to help Glory transition to the new cloud platform, fill knowledge gaps, and ensure a smooth integration of their business processes with the enterprise software and IT infrastructure. 3. What were the main organizational change requirements for implementing the new cloud platform? The main organizational change requirements for implementing the new cloud platform included training employees in the new business processes and the software used, as well as ensuring their understanding and adoption of the new system. Over 2,000 employees would be using the new systems, requiring a cultural shift and retraining across the organization to align with the new processes and maximize the benefits of the cloud platform. 4. Why did management choose a regional rollout strategy? Why in the United Kingdom? Management chose a regional rollout strategy to implement the new system because it was considered less risky and less expensive than a direct cutover or a parallel system cutover. Starting with the United Kingdom headquarters location allowed Glory to test and refine the new system in a controlled environment before rolling it out to other countries. It also provided an opportunity to address any initial challenges or issues before scaling up the implementation to other regions. Cloud Modeling Computing Compared. 1. Public Cloud: Managed by third-party providers, accessible to the public, used for hosting websites, applications, and non-sensitive data. 2. Private Cloud: Exclusive to a single organization, managed internally or by a third-party, ideal for strict data security and compliance. 3. Hybrid Cloud: Combination of public and private clouds, offering flexibility and integration, allowing organizations to leverage the benefits of both environments. Edge Computing. Edge computing optimizes cloud computing systems by performing data processing on linked servers at the edge of the network, reducing data transfer and costs. It is useful for IoT devices (Internet of Things) that don't require constant connection to a central cloud, allowing local edge computing systems to compile and send important data intermittently. Edge computing also minimizes delays in data transmission, making it beneficial for time-sensitive industries like finance, manufacturing, and autonomous vehicles. Green Computing. Virtualization is a key technology in promoting green computing by reducing hardware proliferation and power consumption. Green computing aims to minimize environmental impact by adopting practices and technologies for designing, using, and disposing of computer systems. Data centers consume significant energy, equivalent to 1.5% of global energy use, leading to environmental and cost concerns. To address this, energy-efficient designs, virtualization, and clean energy sources are being employed by major companies like Microsoft, Google, Facebook, and Apple to reduce their carbon footprint and operate sustainable data centers. High Performance and Power-Saving Processors. To reduce power requirements and hardware sprawl, more efficient and power-saving processors with multiple cores are being utilized. Multicore processors integrate two or more processor cores on a single chip, enabling enhanced performance, reduced power consumption, and efficient simultaneous processing of tasks. This technology, seen in devices like PCs and servers, offers faster performance with lower power requirements. Chip manufacturers like Intel are focused on developing microprocessors that minimize power consumption, benefiting battery life in mobile devices and enabling their use in smartphones, tablets, intelligent cars, and healthcare devices. What are the current software trends and platforms? Contemporary software platform evolution encompasses four major themes: Linux and open source software, software for the web (Java, JavaScript, HTML, HTML5), webservices and service-oriented architecture, and software outsourcing and cloud services. Linux, a well-known open source operating system, is widely used in embedded systems, cell phones, smartphones, and consumer electronics, as well as servers, mainframe computers, and supercomputers, offering cost reduction, reliability, and compatibility across hardware platforms. Software for the web (Java, JavaScript, HTML, HTML5). Java is a versatile programming language used for web development and has expanded to mobile devices and consumer electronics. It can run on any computer or device using a Java Virtual Machine. HTML and HTML5 are page description languages used to create and link web pages, with HTML5 providing improved multimedia integration and cross-device compatibility. JavaScript is another key technology for interactive web pages, while Python and Ruby on Rails are popular tools for web application development, offering flexibility, platform compatibility, and feature-rich website building capabilities. Interactive Sessions: Open Source Innovation: The competitive Advantage Open source software, characterized by freely available and modifiable source code, emerged as a response to the high cost and restrictions of proprietary software. The open source movement initially thrived through community-driven development, with notable examples like Linux, Apache, and Firefox. However, in the late 2010s, companies began embracing open innovation by releasing their proprietary software as open source. Baidu, China's leading search engine, recognized the importance of AI in its services and shocked the IT world by open sourcing its AI software, PaddlePaddle, in 2016. PaddlePaddle, based on deep learning, powers various Baidu products and services, facilitating functions like food delivery time calculations and speech transcription. Similarly, Fujitsu, a multinational technology company, turned to open source to transition from traditional offerings to cloud services. By creating the Open Service Catalog Manager (OSCM), an open source platform for multi-cloud environments, Fujitsu gained industry-wide recognition and became a preferred partner for cloud service providers. Both Baidu and Fujitsu embraced open source to enhance innovation and development, attracting talent and achieving unexpected benefits such as accelerated AI innovation and partnership opportunities. 1. Open source software refers to computer software whose source code is freely available and can be modified by anyone. It is different from proprietary software because proprietary software is privately owned and its source code is restricted, not freely accessible or modifiable. 2. Baidu made its AI software, PaddlePaddle, open source to increase the pace of innovation by relying on users for new ideas and features. By open sourcing PaddlePaddle, Baidu aimed to access and attract deep learning expertise, counter the concentration of AI professionals in a few global companies, and foster AI innovation in China. Baidu benefited from open sourcing by creating a platform for deep-learning applications, enhancing its reputation, and attracting partnerships and collaborations. 3. Fujitsu adopted an open source strategy because it recognized that proprietary software was no longer as profitable and saw greater opportunities for innovation and expansion through community participation. By open sourcing the Open Service Catalog Manager (OSCM), Fujitsu created a standardized, vendor-neutral platform for delivering cloud services. This allowed Fujitsu to become a preferred partner for vendors and companies using OSCM, expanded its reach and influence in the industry, and enabled the development of new competencies without significant investment. Open source software, characterized by freely available and modifiable source code, emerged as a response to the high cost and restrictions of proprietary software. The open source movement initially thrived through community-driven development, with notable examples like Linux, Apache, and Firefox. However, in the late 2010s, companies began embracing open innovation by releasing their proprietary software as open source. Baidu, China's leading search engine, recognized the importance of AI in its services and shocked the IT world by open sourcing its AI software, PaddlePaddle, in 2016. PaddlePaddle, based on deep learning, powers various Baidu products and services, facilitating functions like food delivery time calculations and speech transcription. Similarly, Fujitsu, a multinational technology company, turned to open source to transition from traditional offerings to cloud services. By creating the Open Service Catalog Manager (OSCM), an open source platform for multi-cloud environments, Fujitsu gained industry-wide recognition and became a preferred partner for cloud service providers. Both Baidu and Fujitsu embraced open source to enhance innovation and development, attracting talent and achieving unexpected benefits such as accelerated AI innovation and partnership opportunities. Web Services and Service-Oriented Architecture: Web services are software components that enable the exchange of information between different systems using web communication standards. They utilize XML as the foundation technology, allowing for data presentation, communication, and storage. XML tags elements with specific meanings, enabling automatic interpretation and manipulation of data by computers. Web services communicate through XML messages over standard web protocols and can be discovered through directories. They follow a service-oriented architecture, where self-contained services collaborate to create software applications. Web services provide a standard and reusable method for applications to communicate without custom programming. Major software vendors offer tools and platforms for web service development. Dollar Rent A Car is an example of using web services to connect their online booking system with Southwest Airlines' website, streamlining the reservation process. Web services allow Dollar to communicate with different information systems and expand connections to other partners and wireless devices without writing new code for each integration. Software outsourcing and Cloud Services. Today, many business firms continue to operate legacy systems that continue to meet a business need and that would be extremely costly to replace. But they will purchase or rent most of their new software applications from external sources. There are three external sources for software: software packages from a commercial software vendor (most ERP systems), outsourcing custom application development to an external vendor (which may or may not be offshore), and cloud-based software services and tools (SaaS/PaaS). Software Packages and Enterprise Software. Software packages are prewritten software programs that replace the need for companies to develop their own software for tasks like payroll and order handling. Vendors like SAP and Oracle provide powerful packages for enterprise applications, integrating multiple functions into a single system, offering cost-effective solutions for businesses. Software Outsourcing: Software outsourcing involves hiring external firms, often offshore, for custom software development or maintenance. IKEA partnered with Wincor Nixdorf to set up point-of-sale systems globally. While offshore outsourcing includes lower-level tasks, experienced firms in countries like India handle newprogram development. Rising offshore wages and project management costs have resulted in some work returning to domestic companies. Cloud Based software services and tools: Cloud-based software services and tools have revolutionized the way software is accessed and utilized. Instead of buying and installing software on individual machines, users now download software from vendor websites or access it as a subscription-based cloud service over the Internet. This approach allows software and data to be hosted on powerful servers in data centers, making them accessible through standard web browsers. Major software vendors offer enterprise software and complex business functions as services, with customers renting the functions instead of purchasing them. Service level agreements (SLAs) are essential for managing relationships with outsourcers or technology service providers, defining responsibilities, performance measures, support options, security provisions, and more. Mash-up apps. Mash-up apps are customizable software applications that combine interchangeable components from various sources to create new and enhanced functionalities. These apps integrate with other applications on the internet, allowing users to personalize their experiences and share information. Web mashups, in particular, merge multiple online applications to provide greater value. Mobile apps, which are widely used on smartphones and tablets, offer streamlined access to web content and perform various tasks, influencing the design and function of traditional websites. They range from games and social networking to business-oriented tools for document editing, system connectivity, and online shopping. 5.5 What are the challenges of managing IT infrastructure and management solutions? Creating and managing a coherent IT infrastructure raises multiple challenges: dealing with platform and technology change (including cloud and mobile computing), management and governance, and making wise infrastructure investments. Dealing with platform infrastructure change. To remain flexible in their IT infrastructure investments, firms need to consider scalability, which refers to the ability of the system to expand and serve a large number of users without issues. When planning hardware capacity, factors such as new applications, mergers, acquisitions, and changes in business volume should be taken into account. Firms using mobile and cloud computing platforms should develop policies, procedures, and tools for managing these platforms, including mobile device management software for monitoring, securing, and controlling mobile devices. Additionally, when using cloud computing and SaaS, firms should establish contractual arrangements with vendors to ensure availability and information security that align with corporate standards. Business management plays a crucial role in determining acceptable levels of computer response time and availability for mission-critical systems. Making wise infrastructure investments. The management and governance of IT infrastructure is a crucial concern for information system managers and CEOs. Key questions include determining whether IT decisions should be decentralized or centrally controlled, clarifying the relationship between central and business unit information systems management, and establishing a method for allocating infrastructure costs among business units. Each organization must find its own answers to these questions based on its specific requirements. - Finding the right balance in IT infrastructure investment is crucial. Spending too much leads to idle resources and financial strain, while spending too little hampers business services and competitiveness. - The rent-versus-buy decision for IT infrastructure components, including cloud services, should be carefully evaluated considering security, impact on business processes, and costs. - Total cost of ownership (TCO) analysis helps determine the actual cost of specific technology implementations, including hardware, software, administration, support, training, and integration. - Centralization, standardization, and better management of hardware and software resources can reduce administration costs and improve efficiency. Assessing market demand, aligning IT strategy with business plans, and benchmarking against competitors are important factors in making wise infrastructure investments. Review Summary: - IT infrastructure consists of shared technology resources, including hardware, software, and services, that support a firm's information system applications. - The stages of IT infrastructure evolution are the mainframe era, PC era, client/server era, enterprise computing era, and cloud/mobile computing era, driven by factors such as Moore's Law, the Law of Mass Digital Storage, and Metcalfe's Law. - Components of IT infrastructure include computer hardware, operating systems, enterprise software, networking and telecommunications, data management, internet platforms, and consulting services. - Current trends in computer hardware platforms include mobile computing, quantum computing, consumerization of IT, virtualization, cloud computing, edge computing, multicore processors, and green computing. - Software platforms and trends encompass open source software, Linux, Java and JavaScript, HTML5, web services, software outsourcing, software as a service (SaaS), mashups, and mobile apps. - Challenges in IT infrastructure management include dealing with platform and infrastructure changes, governance, and making wise investments. Solutions involve strategic planning, competitive analysis, total cost of ownership (TCO) evaluation, cloud computing adoption, mobile device management (MDM), and security measures. Review Questions: 5.1. What is IT infrastructure, and what are the stages and drivers of IT infrastructure evolution? • Define IT infrastructure from both a technology and a services perspective. • List each of the eras in IT infrastructure evolution and describe its distinguishing characteristics. • Define and describe the following: web server, application server, multitiered client/ server architecture • Describe Moore's Law and the Law of Mass Digital Storage. • Describe how network economics, declining communications costs, and technology standards affect IT infrastructure. Answer: IT infrastructure refers to technology resources and services that support a firm's information system applications. The stages of IT infrastructure evolution include the mainframe era, PC era, client/server era, enterprise computing era, and cloud/mobile computing era. Moore's Law and the Law of Mass Digital Storage describe the exponential increase in processing power, decline in computing costs, and decrease in data storage costs. Network economics, declining communication costs, and technology standards drive IT infrastructure evolution. 5.2. What are the components of IT infrastructure? • List and describe the components of IT infrastructure that firms need to manage. Answer: Components of IT infrastructure include computer hardware platforms, operating system platforms, enterprise software platforms, networking and telecommunications platforms, data management software, internet platforms, and consulting services and systems integrators. Real-life examples of the components of IT infrastructure are: 1. Computer Hardware Platforms: Examples include desktop computers, laptops, servers, storage devices, and mobile devices like smartphones and tablets. Companies like Dell, HP, Lenovo, and Apple manufacture and provide these hardware platforms. 2. Operating System Platforms: Examples include Microsoft Windows, macOS, Linux, and UNIX. These operating systems provide the foundation for running software applications and managing hardware resources. 3. Enterprise Software Platforms: Examples include SAP, Oracle, Salesforce, and Microsoft Dynamics. These platforms offer comprehensive software solutions for managing various aspects of business operations such as customer relationship management (CRM), enterprise resource planning (ERP), and supply chain management (SCM). 4. Networking and Telecommunications Platforms: Examples include Cisco, Juniper Networks, and Huawei. These companies provide networking equipment and technologies such as routers, switches, and telecommunications infrastructure to facilitate communication and data transfer within and between organizations. 5. Data Management Software: Examples include Oracle Database, Microsoft SQL Server, and MySQL. These software platforms enable efficient storage, retrieval, and management of large volumes of structured and unstructured data. 6. Internet Platforms: Examples include cloud computing platforms like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform. These platforms provide on-demand access to scalable computing resources, storage, and services over the internet. 7. Consulting Services and Systems Integrators: Examples include Accenture, IBM Global Services, and Deloitte. These firms offer consulting, implementation, and integration services to help organizations plan, design, and implement IT infrastructure solutions tailored to their specific needs. 5.3. What are the current trends in computer hardware platforms? • Describe the evolving mobile platform, consumerization of IT, and cloud computing. • Explain how businesses can benefit from virtualization, green computing, and multicore processors. Answer: Current trends in computer hardware platforms include the evolving mobile platform, consumerization of IT, and cloud computing. Businesses can benefit from virtualization, which enables efficient resource utilization, green computing practices for minimizing environmental impact, and multicore processors for enhanced performance. 5.4. What are the current computer software platforms and trends? • Define and describe open source software and Linux and explain their business benefits. • Define Java, JavaScript, HTML, and HTML5 and explain why they are important. • Define and describe web services and the role played by XML. • Name and describe the three external sources for software. • Define and describe software mashups and apps. Answer: Open source software is community-produced and downloadable for free. Linux is an open source operating system used widely for running web servers. Java, JavaScript, HTML, and HTML5 are important software components for web applications. Web services are loosely coupled software components that work across applications and operating systems, often utilizing XML. External sources for software include software packages, outsourcing custom application development, and renting online software services (SaaS). Software mashups combine different services, and apps refer to software applications running on mobile devices. 5.5. What are the challenges of managing IT infrastructure and management solutions? • Describe what is meant by the term scalability. • Explain why the level of IT infrastructure investment is a crucial decision for an organization. Answer: Challenges in managing IT infrastructure include dealing with platform and infrastructure changes, governance, and making wise investments. Scalability refers to the ability to handle increasing demands. The level of IT infrastructure investment is crucial as it can impact a firm's performance. Solutions involve strategic planning, competitive analysis, total cost of ownership evaluation, cloud computing adoption, mobile device management, and security measures. Discussion Questions 5.6 Why is selecting computer hardware and software for the organization an important management decision? What management, organization, and technology issues should be considered when selecting computer hardware and software? Answer: Selecting computer hardware and software is important as it directly impacts an organization's operations. Management needs to consider factors like compatibility, performance, cost, and support. Organizational factors include user requirements and IT strategy, while technology factors involve scalability, integration, and security. 5.7 Should organizations use software service providers for all their software needs? Why or why not? What management, organization, and technology factors should be considered when making this decision? Answer: Whether organizations should use software service providers depends on their specific needs. Factors to consider include cost, customization requirements, data security, and integration with existing systems. Management, organization, and technology factors play a role in making this decision. 5.8 What are the advantages and disadvantages of cloud computing? Answer: Cloud computing offers advantages such as scalability, cost-efficiency, and flexibility. However, disadvantages include potential security risks, dependency on internet connectivity, and limited control over infrastructure. Management needs to carefully assess these factors and consider the specific needs and requirements of the organization before adopting cloud computing. Hands-On MIS Projects. Management Decision Problems 5.9 The University of Pittsburgh Medical Center (UPMC) relies on information systems to operate 19 hospitals, a network of other care sites, and international and commercial ventures. Demand for additional servers and storage technology was growing by 20 percent each year. UPMC was setting up a separate server for every application, and its servers and other computers were running a number of different operating systems, including several versions of Unix and Windows. UPMC had to manage technologies from many different vendors, including Hewlett-Packard (HP), Sun Microsystems, Microsoft, and IBM. Assess the impact of this situation on business performance. What factors and management decisions must be considered when developing a solution to this problem? Answer: The situation at UPMC, with separate servers for each application and a diverse range of operating systems and technologies, can have a significant impact on business performance. Some potential impacts include increased complexity, higher costs for hardware and maintenance, interoperability challenges, security vulnerabilities, and difficulties in managing and supporting the IT infrastructure. To address this situation, several factors and management decisions need to be considered: 1. Standardization: UPMC should evaluate the feasibility of standardizing their technology infrastructure by consolidating servers, operating systems, and vendors. This can simplify management, reduce costs, improve interoperability, and enhance security. 2. Technology rationalization: UPMC needs to assess their current technology portfolio and identify redundancies, outdated systems, and inefficient processes. They should prioritize the consolidation or retirement of legacy systems and focus on adopting more modern, efficient technologies. 3. Vendor management: UPMC should review their vendor relationships and determine if there are opportunities to consolidate vendors or negotiate better terms. Streamlining vendor partnerships can lead to cost savings, improved support, and better integration capabilities. 4. Virtualization and cloud computing: UPMC should explore the potential of virtualization and cloud computing technologies to optimize their infrastructure. Virtualization can increase resource utilization and flexibility, while cloud computing can provide scalable and costeffective solutions. 5. Security and data management: With a complex and diverse infrastructure, UPMC must prioritize security measures, including network segmentation, access controls, encryption, and regular vulnerability assessments. They should also establish effective data management practices to ensure data integrity, availability, and compliance with regulatory requirements. 6. IT governance: UPMC needs to establish clear IT governance structures and processes to oversee technology decisions, prioritize investments, and align IT initiatives with business objectives. This includes developing IT policies, standards, and guidelines to guide infrastructure management and decision-making. 7. Change management: Implementing changes to the infrastructure requires effective change management practices, including communication, training, and stakeholder engagement. UPMC should develop a comprehensive plan to minimize disruptions and ensure smooth transitions. By addressing these factors and making informed management decisions, UPMC can improve business performance by reducing complexity, enhancing efficiency, lowering costs, improving security, and enabling better integration and collaboration across their healthcare ecosystem. 5.10 Qantas Airways, Australia's leading airline, faces cost pressures from high fuel prices and lower levels of global airline traffic. To remain competitive, the airline must find ways to keep costs low while providing a high level of customer service. Qantas had a 30-year-old data center. Management had to decide whether to replace its IT infrastructure with newer technology or outsource it. What factors should be considered by Qantas management when deciding whether to outsource? If Qantas decides to outsource, list and describe points that should be addressed in a service level agreement Improving Decision Making: Using a Spreadsheet to Evaluate Hardware and Software Options Software skills: Spreadsheet formulas Business skills: Technology pricing Answer: When deciding whether to outsource its IT infrastructure, Qantas management should consider the following factors: 1. Cost: Evaluate the cost implications of outsourcing compared to replacing the existing infrastructure. Consider upfront costs, ongoing maintenance expenses, and potential cost savings or cost overruns associated with outsourcing. 2. Expertise and Resources: Assess the availability of skilled resources and expertise within the organization to manage and maintain the IT infrastructure effectively. Determine whether outsourcing can provide access to specialized knowledge and capabilities that are not readily available internally. 3. Scalability and Flexibility: Consider the scalability and flexibility requirements of Qantas's IT infrastructure. Determine if outsourcing can offer the necessary scalability to accommodate future growth or fluctuations in demand, and if it can provide flexibility to adapt to changing business needs. 4. Risk Management: Evaluate the risks associated with outsourcing, such as data security, data privacy, and compliance. Assess the capabilities of potential outsourcing partners to mitigate these risks effectively and comply with relevant regulations. 5. Service Quality: Assess the potential impact on service quality and customer experience. Evaluate the track record and reputation of potential outsourcing providers in delivering highquality services and meeting service level agreements (SLAs). 6. Business Alignment: Consider whether outsourcing aligns with Qantas's strategic objectives and core competencies. Evaluate the impact on the organization's ability to innovate, differentiate, and maintain control over critical IT functions. 7. Transition and Change Management: Evaluate the complexity and potential challenges involved in transitioning from an in-house infrastructure to an outsourced model. Consider the required timeframe, dependencies, communication strategies, and potential disruptions to ongoing operations. If Qantas decides to outsource, the following points should be addressed in a service level agreement (SLA): 1. Scope of Services: Clearly define the services to be provided by the outsourcing partner, including infrastructure management, maintenance, support, security, disaster recovery, and any additional services required. 2. Performance Metrics: Define measurable performance metrics and key performance indicators (KPIs) that align with Qantas's business objectives. This includes metrics for availability, response time, uptime, data backup, and security incident response. 3. Service Level Targets: Set specific targets for each performance metric and define acceptable service levels. These targets should be realistic, achievable, and aligned with Qantas's expectations and requirements. 4. Reporting and Communication: Specify the frequency and format of performance reports, as well as the communication channels between Qantas and the outsourcing provider. Establish procedures for issue escalation and resolution. 5. Data Security and Privacy: Clearly define the security and privacy requirements for Qantas's data. Specify the measures and controls that the outsourcing provider must implement to protect sensitive information and comply with relevant regulations. 6. Disaster Recovery and Business Continuity: Define the disaster recovery and business continuity expectations and procedures. Ensure that the outsourcing partner has robust plans and capabilities to ensure the availability and recovery of IT services in case of disruptions. 7. Contractual Obligations: Clearly state the rights, responsibilities, and obligations of both Qantas and the outsourcing provider. Include terms regarding termination, dispute resolution, intellectual property rights, confidentiality, and compliance with laws and regulations. By addressing these points in the service level agreement, Qantas can establish clear expectations, ensure accountability, and maintain a high level of service quality while outsourcing its IT infrastructure. 5.11 In this exercise, you will use spreadsheet software to calculate the cost of desktop systems, printers, and software. Use the Internet to obtain pricing information on hardware and software for an office of 30 people. You will need to price 30 PC desktop systems (monitors, computers, and keyboards) manufactured by Lenovo, Dell, and HP. (For the purposes of this exercise, ignore the fact that desktop systems usually come with preloaded software packages.) Also obtain pricing on 15 desktop printers manufactured by HP, Canon, and Brother. Each desktop system must satisfy the minimum specifications shown in tables that you can find in MyLab MIS. Also obtain pricing on 30 licenses or copies of the most recent versions of Microsoft Office 365 Business and Apache Open Office (formerly Oracle Open Office) and on 30 copies of Microsoft Windows 10 Pro. Each desktop productivity solution should contain software for word processing, spreadsheets, database, and presentations. Prepare a spreadsheet showing your research results for the desktop system, printer, and software combination offering the best performance and pricing per worker over a two-year period. Because every two workers share one printer (15 printers/30 systems), your calculations should assume only half a printer cost per worker. Improving Decision Making: Using Web Research to Budget for a Sales Conference Software skills: Internet-based software Business skills: Researching transportation and lodging costs Answer: 5.12 The Foremost Composite Materials Company is planning a two-day sales conference for October 19-20, starting with a reception on the evening of October 18. The conference consists of allday meetings that the entire sales force, numbering 120 sales representatives and their 16 managers, must attend. Each sales representative requires his or her own room, and the company needs two common meeting rooms, one large enough to hold the entire sales force plus a few visitors (200) and the other able to hold half the force. Management has set a budget of $215,000 for the representatives' room rentals. The company would like to hold the conference in either Miami or Marco Island, Florida, at a Hilton- or Marriott owned hotel. Use the Hilton and Marriott websites to select a hotel in whichever of these cities would enable the company to hold its sales conference within its budget and meet its sales conference requirements. Then locate flights arriving the afternoon prior to the conference. Your attendees will be coming from Los Angeles (51), San Francisco (30), Seattle (22), Chicago (19), and Pittsburgh (14). Determine costs of each airline ticket from these cities. When you are finished, create a budget for the conference. The budget will include the cost of each airline ticket, the room cost, and $70 per attendee per day for food. Collaboration and Teamwork Project Evaluating Server and Mobile Operating Systems 5-13 Form a group with three or four of your classmates. Choose server or mobile operating systems to evaluate. You might research and compare the capabilities and costs of Linux versus Unix or the most recent version of the Windows operating system for servers. Alternatively, you could compare the capabilities of the Android mobile operating system with iOS for the iPhone. If possible, use Google Docs and Google Drive or Google Sites to brainstorm, organize, and develop a presentation of your findings for the class Project JEDI: A Cloud of Controversy CASE STUDY. The U.S. military is looking to unify its information in the cloud to support the deployment of remote sensors, autonomous weapons, and AI applications. The Department of Defense's Project JEDI aims to create a unified cloud infrastructure across the entire military, replacing branch-specific systems with a more efficient enterprise model. The JEDI program calls for a $10 billion government contract to a single cloud computing vendor. The JEDI contract set off a competition among major tech companies like Amazon, Microsoft, Oracle, IBM, and Google. Oracle and IBM filed protests claiming favoritism toward Amazon and Microsoft, but these were dismissed. Ultimately, Microsoft was awarded the contract in October 2019. However, the process faced controversies and legal challenges, with Amazon alleging conflicts of interest. The JEDI project is expected to have a significant impact on cloud innovation within the U.S. government and across the private sector. Cloud computing has become crucial for digital transformation and emerging technologies. The Pentagon's adoption of a better enterprise cloud will enhance security, support the expansion of AI systems, and have positive consequences beyond its original scope. Overall, the JEDI contract represents a major step toward modernizing the U.S. military's IT infrastructure and leveraging cloud technology to improve efficiency and data-driven decision-making. Case Study Questions: 5.14 Describe the JEDI Project. Why is it so important? What problems was it meant to solve? The JEDI Project is the U.S. Department of Defense's initiative to modernize its IT infrastructure through a unified cloud computing platform, improving data flow and decision-making for combat troops. 5.15 What management, organization, and technology issues are raised by this project? The JEDI Project raises management challenges in coordinating stakeholders and organization-wide adoption, as well as technology issues related to data security, integration, and staying up-to-date with emerging technologies. 5.16 Should the JEDI contract be awarded to a single vendor? Why or why not? Whether the JEDI contract should be awarded to a single vendor is debatable, with proponents citing reduced complexity and better interoperability, while others argue for a multi-vendor approach to avoid dependency and encourage innovation. Chapter 6: Foundations of Business Intelligence: Databases and Information Management. Astro - Leveraging for customer-driven Service. Astro, the leading Malaysian satellite television broadcaster, faces competition from local and international firms in the changing media landscape. To address these challenges, Astro leverages customer data from multiple touchpoints to gain insights into customer behavior. However, their existing infrastructure and data practices hindered efficient data management and analysis. Astro invested in a cloud-based data lake, the Astro Data Lake, built on Amazon Web Services (AWS). This data lake aggregates data from various sources, including viewing information and interactions across platforms. AWS provides scalable solutions and features such as easy deployment, search functionality, user authentication, data transformation, and analytics. The Astro Data Lake integration has allowed the organization to break down analytics silos, introduce data quality standards, and enable precise multi-channel advertising and personalized recommendations. With nearly 5.7 million subscribers and content delivery to around 24 million people, Astro has expanded its services with streaming platforms like Astro GO, HBO GO, and iQIYI, attracting over 2.6 million subscribers. Astro's centralization of data highlights the importance of effective data management in the face of multiple data sources and platforms. Considerations for firms moving to a cloud-based infrastructure like Astro's include cloud security, employee training, and alignment of business processes. Reviewing current processes is necessary to align with the capabilities of a centralized repository. Data analytics and AI services like Amazon's Athena will benefit Astro by improving decision-making and providing a comprehensive understanding of customers. What considerations should a firm have when moving to a cloud-based infrastructure such as Astro's? Considerations include cloud security, employee training, and alignment of business processes. Why is it necessary to review current business processes? Reviewing processes is necessary to align them with the capabilities of a centralized repository and optimize efficiency in the new infrastructure. How will data analytics benefit Astro, and how will AI services such as Amazon's Athena facilitate this? Data analytics will improve decision-making and provide a comprehensive understanding of customers. AI services like Amazon's Athena will facilitate data processing and analysis for valuable insights. 6.1 What are the problems of managing data resources in a traditional file environment? An effective information system provides accurate, timely, and relevant information, but many businesses lack such information due to poorly organized and maintained data. Data management is crucial to address this issue. This involves understanding how information systems arrange data and traditional methods of file management. A computer system organizes data in a hierarchy, from bits and bytes to fields, records, files, and databases. Bits represent the smallest unit of data, bytes represent characters, fields group characters into words or numbers, records group related fields, files group records of the same type, and databases consist of related files. Records describe entities, which can be people, places, things, or events, and attributes are the characteristics or qualities of an entity stored in fields. Problems with the Traditional file environment. The traditional file environment in organizations led to problems such as data redundancy, inconsistency, program-data dependence, inflexibility, poor data security, and an inability to share data among applications. Data redundancy and inconsistency. Data redundancy and inconsistency occur when duplicate data is stored in multiple locations, leading to wastage of storage resources and inconsistencies in attribute values, such as different names or coding systems used for the same data across different systems in an organization. Program-data dependence. Program-data dependence in a traditional file environment means that changes in programs necessitate corresponding changes to the data they access, leading to costly modifications and potential disruptions in system functionality. Lack of Flexibility. Traditional file systems lack the flexibility to provide ad hoc reports or address unforeseen information needs promptly, requiring significant time and resources for data retrieval and compilation. Poor Security. Poor security in data management results in a lack of control and oversight, making it difficult for management to track data access, changes, and unauthorized dissemination. Lack of data sharing and flexibility. Lack of data sharing and flexibility in a traditional file system inhibits the ability to relate information across different files and organizational areas, hindering timely access and impeding the free flow of information. Inconsistencies in data values further erode trust in the system's accuracy. What are the major capabilities of a database system (DBMS), and why is a relational Database Management system so powerful? Database technology resolves issues in traditional file organization by centralizing and controlling redundant data, allowing efficient data organization and serving multiple applications through a single database. This eliminates the need for separate files and systems for each application, promoting data consistency and accessibility. How a DBMS solves the problems of a traditional file Environment: A DBMS solves the problems of a traditional file environment by reducing data redundancy and inconsistency, decoupling programs and data, increasing access and availability of information, reducing program development and maintenance costs, and enabling centralized data management and sharing throughout the organization. Relational DBMS. Relational DBMS organize data in tables with rows and columns, using primary and foreign keys to establish relationships between entities. Each table represents an entity, and fields within the table store attributes. Primary keys uniquely identify records, while foreign keys provide links between tables for data retrieval and reference. Example, Select records (rows) from the PART table where the Part_Number equals 137 or 150. The join operation combines relational tables to provide the user with more information than is available in individual tables. In our example, we want to join the now-shortened PART table (only parts 137 or 150 will be presented) and the SUPPLIER table into a single new table. To select records from the PART table where the Part_Number equals 137 or 150 in SQL, you can use the following query: SELECT * FROM PART WHERE Part_Number = 137 OR Part_Number = 150; To join the PART table (filtered for parts 137 or 150) with the SUPPLIER table into a single new table, you can use the following query: SELECT * FROM PART JOIN SUPPLIER ON PART.Supplier_Number = SUPPLIER.Supplier_Number WHERE PART.Part_Number = 137 OR PART.Part_Number = 150; The project operation creates a subset consisting of columns in a table, permit ting the user to create new tables that contain only the information required. In our example, we want to extract from the new table only the following columns: Part_Number, Part_Name, Supplier_Number, and Supplier_Name. CREATE TABLE NewTable AS SELECT Part_Number, Part_Name, Supplier_Number, Supplier_Name FROM YourTableName; Capabilities of a DBMS: A DBMS provides capabilities for organizing, managing, and accessing data, including a data definition language and data manipulation language. It also utilizes a data dictionary to store definitions of data elements and their characteristics, which can range from basic field properties to more extensive information such as ownership, security, and usage details in large corporate databases. Querying and reporting: A DBMS provides tools for accessing and manipulating data, including a data manipulation language (such as SQL) for retrieving and modifying data. Users can create queries to extract specific information from the database, and DBMS like Microsoft Access offer user-friendly tools for query building. Additionally, DBMS often have report generation capabilities, allowing data to be presented in a structured format. Tools like Crystal Reports are commonly used for generating reports, and DBMS like Access also offer features for developing desktop system applications, including data entry screens and transaction processing logic. Designing Databases: Designing databases involves understanding data relationships, types, usage, and organizational needs, and requires both a conceptual design representing the business perspective and a physical design showing the actual arrangement on storage devices. An Unnormalized Database: Normalization and Entity-Relationship Diagrams. Conceptual database design groups data elements and identifies relationships and efficient data groupings based on business requirements. Normalization is the process of streamlining complex data structures to minimize redundancy and awkward relationships. Referential integrity rules enforce consistent relationships between tables in a relational database. Entity-relationship diagrams illustrate the relationships between entities in the database. A welldesigned data model is crucial for effective system performance and accurate data representation. Famous Footwear faced challenges in achieving its inventory management goal due to an inadequately designed database, which hindered their ability to adjust store inventory quickly. Their existing database was primarily geared towards generating standard reports rather than responding to market changes. To address this, the company built a new database that improved organization of sales and inventory data for better analysis and inventory management. The lines connecting the boxes represent relationships. A line connecting two entities that ends in two short marks designates a one-to-one relationship. A line connecting two entities that ends with a crow's foot topped by a short mark indicates a one-to-many relationship. Figure 6.11 shows that one ORDER can contain many LINE_ITEMs. (A PART can be ordered many times and appear many times as a line item in a single order.) Each PART can have only one SUPPLIER, but many PARTs can be provided by the same SUPPLIER. Non-Relational Databases, Cloud Databases, and Blockchain. Relational databases have been the standard for over 30 years, but the rise of cloud computing and the need to handle massive data volumes have led to the emergence of non-relational "NoSQL" databases. These flexible databases, such as Oracle NoSQL Database and Amazon's SimpleDB, are designed for managing large datasets across distributed systems and are particularly useful for analyzing structured and unstructured data from sources like web and social media. AstraZeneca utilized MongoDB NoSQL database to accelerate genome sequencing and develop disease-fighting drugs by analyzing unstructured data from disparate systems, enabling them to uncover previously unnoticed links and patterns. Cloud Databases and Distributed Databases. Cloud computing vendors like Amazon and Google offer relational database engines and distributed database technologies as cloud services. A distributed database is one that is stored in multiple physical lo cations. Amazon RDS provides various database engines, while Google's Spanner enables storing and synchronizing data across multiple locations globally. These cloud-based data management services offer cost savings and scalability for businesses, making them an attractive option for database capabilities. Blockchain. Blockchain is a distributed database technology that enables secure and instant transactions without a central authority. It uses encryption, authentication, and smart contracts to ensure legitimacy and immutability of recorded transactions. Blockchain offers benefits such as cost reduction, standardization, and simplified integration for participating firms, making it attractive for various applications including finance, supply chain, and healthcare. New Cloud Database Tools Help Vodafone Fiji Make Better Decisions. Vodafone Fiji faced challenges in analyzing customer data and providing better deals. They adopted Oracle Autonomous Data Warehouse and Oracle Analytics Cloud to efficiently manage and analyze data, resulting in faster queries and the ability to target customers with personalized promotions. They achieved significant time savings and improved decision-making capabilities. Case Study Questions: 1. Define the problem faced by Vodafone Fiji. What management, organization, and technology factors contributed to the problem? The problem faced by Vodafone Fiji was their inability to efficiently analyze customer data and provide targeted deals. This was due to various management, organization, and technology factors. The company lacked computing power, storage, and data management tools to analyze data quickly. Additionally, the acquisition of other telecommunication companies led to a significant increase in data volume and complexity, with different types of data in different systems and formats. 2. Evaluate Oracle Autonomous Data Warehouse and Oracle Analytics Cloud as a solution for Vodafone Fiji. Oracle Autonomous Data Warehouse and Oracle Analytics Cloud provided an effective solution for Vodafone Fiji. The Autonomous Data Warehouse offered a fully managed and scalable cloud service optimized for data warehousing workloads. It eliminated the need for specialized database management skills and significantly reduced implementation time. Oracle Analytics Cloud allowed Vodafone Fiji to collect, transform, and analyze data from various sources, enabling self-service capabilities and empowering users to visualize and discover insights. 3. How did the new Oracle tools change decision making at Vodafone Fiji? The new Oracle tools revolutionized decision-making at Vodafone Fiji. They enabled the company to obtain insights from collected data and adjust promotions based on changing market dynamics. Decision-makers had access to more than 50 rich reports within minutes, queries were completed significantly faster, and data mining procedures and aggregation queries were performed in a fraction of the time. This improved speed and accuracy allowed Vodafone Fiji to target customers at risk of cancelling services, optimize service offerings, and create personalized promotions 4. Was using cloud services advantageous for Vodafone Fiji? Explain your answer. Using cloud services proved advantageous for Vodafone Fiji. The adoption of Oracle's cloud-based solutions provided several benefits. Firstly, it eliminated the need for expensive upgrades to onpremises systems, reducing costs. The elasticity of the cloud allowed for scalability, ensuring resources could be increased or decreased as needed. The automation of routine tasks freed up database administrators for more strategic work. Additionally, the cloud-based platform facilitated data integration from diverse sources and provided self-service capabilities for users. Overall, the cloud services offered flexibility, cost-effectiveness, and enhanced data management and analysis capabilities, making them advantageous for Vodafone Fiji's operations. 6.3 What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? Databases are essential for businesses to track transactions and enable informed decision-making by providing valuable insights on product popularity, customer profitability, and overall business efficiency. The Challenge of Big Data. Big data presents challenges due to its large volume, diverse types and sources, and the speed at which it is generated, requiring new technologies and tools to manage and analyze. Businesses are interested in big data for its potential to reveal patterns and provide insights, but it is crucial to ask the right questions and understand its limitations before investing in capturing, storing, and analyzing it. Interactive Session: Big data Baseball. Big data and analytics have transformed the game of baseball, with teams using data to make decisions about player recruitment, development, and game strategies. Moneyball introduced the concept of using statistical analysis to identify undervalued skills, enabling the Oakland Athletics to compete against wealthier teams. Big data has since been adopted by all Major League Baseball teams, impacting player evaluation and emphasizing skills like fielding and base running. However, effectively utilizing big data remains a challenge, as it requires interpretation and separating actionable information from noise. Traditional evaluation methods, along with data, scouting, coaching, and player experience, are still considered vital for successful teams. 1. How did information technology change the game of baseball? Explain. Information technology revolutionized baseball by introducing big data and analytics. Teams began using advanced statistical analysis to evaluate players, identify undervalued skills, and make datadriven decisions. This shift transformed player recruitment, game strategies, and performance evaluation, challenging traditional beliefs and emphasizing the importance of data-driven insights. 2. How did information technology affect decision making at MLB teams? What kinds of decisions changed as the result of using big data? Information technology significantly impacted decision making at MLB teams. Big data and analytics provided teams with a wealth of information about player performance, opponent analysis, and game strategies. These insights influenced decisions regarding player recruitment, line-up configurations, defensive shifts, pitch selection, and more. Teams started relying on data-driven approaches to optimize player performance and improve overall team success. 3. How much should baseball rely on big data and analytics? Explain your answer. The reliance on big data and analytics in baseball should be a balanced approach. While data-driven insights have proven valuable, traditional evaluation methods, scouting, coaching, and player experience still play important roles in decision making. Baseball is a complex sport with many intangible factors, and solely relying on data may overlook certain nuances and individual strengths. Therefore, a combination of statistical analysis and human expertise is crucial for making wellrounded decisions that consider both data-driven insights and the qualitative aspects of the game. Business Intelligence infrastructure: A modern business intelligence infrastructure integrates various tools, including data warehouses, data marts, Hadoop, in-memory computing, and analytical platforms, to obtain concise and reliable information from diverse data sources, including big data, both structured and unstructured, in large quantities, with cloud services providing some of these capabilities. Data warehouses and data Marts. A data warehouse is a centralized database that stores current and historical data from various operational systems, combined with external data, and transformed for reporting and analysis. It provides access to data without allowing alterations and offers query tools, analytics, and reporting capabilities. Alternatively, companies can create smaller data marts focused on specific user populations or data subsets, such as marketing and sales data marts for customer information. Hadoop. Hadoop, an open-source software framework, is used by organizations to handle big data and unstructured data by enabling distributed parallel processing across multiple inexpensive computers. It includes services like HDFS for data storage, MapReduce for high-performance processing, and HBase for rapid data access. Hadoop can handle various data types and scales, making it suitable for analyzing large volumes of data and serving as a staging area for unstructured and semi structured data before loading into a data warehouse. Major database vendors and other companies offer Hadoop distributions and related tools for data management and analysis. In Memory computing. In-memory computing relies on a computer's RAM for data storage, enabling faster query response times and eliminating bottlenecks compared to disk-based databases. It allows large datasets to be stored entirely in memory, facilitating complex calculations in seconds. Advances in hardware technology, such as powerful processors and falling memory prices, have made in-memory processing possible. Leading in-memory database products include SAP HANA, Oracle Database InMemory, Microsoft SQL Server, and Teradata Intelligent Memory. Data Mining: Data mining involves discovering hidden patterns and relationships in large databases to provide insights that cannot be obtained through traditional queries or OLAP. It enables decision-making by predicting future behavior and offers various types of information, including associations, sequences, classifications, clusters, and forecasts. Data mining applications exist in all functional areas of business and can be used for customer profiling, one-to-one marketing campaigns, and making profitable customer-focused decisions, as exemplified by Caesars Entertainment's success in leveraging data mining for business intelligence and profitability. Text mining and web mining: Text mining and web mining are essential for analyzing unstructured data and extracting valuable insights. Text mining tools enable businesses to discover patterns and relationships, summarize information, and analyze text data from sources like emails, surveys, and social media to improve decision-making. Web mining focuses on extracting knowledge from web content, structure, and user interactions, providing businesses with valuable information about customer behavior, website effectiveness, and marketing campaign success through content mining, structure mining, and usage mining. These techniques help companies understand customer preferences, optimize marketing strategies, and assess the impact of promotional activities. Databases and the web: Companies are increasingly using the web to make information from their internal databases available to customers and partners. Web browsers allow users to access a company's website, which communicates with the web server and passes requests for data to the database using HTML commands. Middleware, such as application servers, facilitates the processing of transactions and data access between the web server and the back-end database. Web access to internal databases offers advantages like ease of use, lower costs, and the creation of new business models and efficiencies, as seen with companies like ThomasNet.com and Facebook utilizing large web-enabled databases. 6.4: Why are data governance and data quality assurance essential for managing the firm's data resources? Review Summary: 6-1 What are the problems of managing data resources in a traditional file environment? The problems of managing data resources in a traditional file environment include data redundancy, data inconsistency, lack of data sharing and integration, difficulty in data access and retrieval, and limited data security and integrity. 6-2 What are the major capabilities of database management systems (DBMS), and why is a relational DBMS so powerful? The major capabilities of database management systems (DBMS) include data organization, data storage and retrieval, data manipulation, data sharing and integration, data security, and data independence. A relational DBMS is powerful because it provides a structured and flexible way to organize data through tables, enforces data integrity through relationships, supports complex queries and transactions, and allows for efficient data retrieval. 6-3: principal tools and technologies for accessing information from databases to improve business performance and decision making? The principal tools and technologies for accessing information from databases to improve business performance and decision making include Structured Query Language (SQL) for querying and manipulating data, data mining for discovering patterns and insights, online analytical processing (OLAP) for multidimensional analysis, and data visualization tools for presenting data in a visual and interactive manner. 6-4: Why are data governance and data quality assurance essential for managing the firm's data resources? Data governance and data quality assurance are essential for managing the firm's data resources because they ensure that data is accurate, reliable, and accessible to those who need it. Data governance establishes policies and procedures for managing data as an organizational resource, while data quality assurance focuses on maintaining data accuracy, consistency, and completeness. These practices prevent operational and financial problems caused by faulty data and support informed decision making. Discussion Questions: 6-5 It has been said there is no bad data, just bad management. Discuss the implications of this statement. This statement highlights the importance of data management in determining the quality and usefulness of data. It suggests that data itself is not inherently good or bad, but it is the way it is managed that determines its value. Effective data management practices, such as data governance, data quality assurance, and proper database design, are essential for ensuring the accuracy, integrity, and reliability of data. The implications of this statement are: 1. Data management is critical: Organizations must invest in proper data management practices to ensure that data is properly collected, stored, organized, and maintained. This includes establishing data governance policies, implementing data quality checks, and training personnel on data handling procedures. 2. Data is an organizational asset: Data should be treated as a valuable organizational asset. Poor data management can lead to negative consequences, such as flawed decision-making, inefficient operations, compliance issues, and reputational damage. On the other hand, effective data management can provide organizations with a competitive advantage and support strategic initiatives. 3. Responsibility lies with management: The responsibility for data management lies with organizational management. They need to prioritize data management efforts, allocate resources, and set clear guidelines and standards for data handling. Data management should be seen as a shared responsibility across the organization, involving IT professionals, data stewards, and end users. 4. Continuous improvement is necessary: Data management is an ongoing process that requires continuous improvement. Organizations should regularly assess and enhance their data management practices to adapt to changing business needs, technological advancements, and evolving regulatory requirements. 6-6 To what extent should end users be involved in the selection of a database management system and database design? End users should be involved in the selection of a database management system (DBMS) and database design to a significant extent. Involving end users ensures that their specific requirements, preferences, and usability concerns are taken into account, leading to a more effective and userfriendly system. Here are some reasons for end user involvement: 1. User requirements: End users have first-hand knowledge of their data needs, workflows, and reporting requirements. Their involvement helps identify specific functionalities and features required from the DBMS to support their tasks. 2. User acceptance: By involving end users, organizations can gain their support and buy-in for the chosen DBMS. This increases the likelihood of successful implementation and adoption. 3. Usability and user experience: End users can provide valuable insights into the usability and user experience aspects of the DBMS. Their feedback on interface design, data entry forms, reporting capabilities, and overall system usability can improve the system's effectiveness and user satisfaction. 4. Data integrity and accuracy: End users are often responsible for entering and maintaining data. Their involvement in database design ensures that data validation rules, data entry guidelines, and data integrity checks are properly incorporated. 5. Change management: Involving end users in the selection and design process fosters a sense of ownership and reduces resistance to change. It allows for effective communication, training, and support during the implementation phase. However, it is important to balance end user involvement with the expertise of database specialists and IT professionals. Technical considerations, such as system performance, scalability, security, and compliance, also need to be addressed. Collaboration between end users, business analysts, and IT specialists is essential to strike the right balance and ensure a successful outcome. 6-7 What are the consequences of an organization not having an information policy? The consequences of not having an information policy within an organization can be significant. Here are some of the potential consequences: 1. Data security breaches: Without an information policy, organizations may lack guidelines and procedures for protecting sensitive data. This increases the risk of data breaches, unauthorized access, and loss of confidential information. The absence of security controls and protocols leaves the organization vulnerable to internal and external threats. 2. Data inconsistency and quality issues: An information policy helps establish standards and guidelines for data entry, storage, and management. Without such policies, data may lack consistency and accuracy, leading to poor data quality. Inaccurate or inconsistent data can result in flawed decision-making and operational inefficiencies. 3. Compliance and legal risks: Organizations operate within regulatory frameworks that govern data privacy, security, and other aspects of information management. Without an information policy, the organization may fail to comply with legal and regulatory requirements, leading to penalties, legal disputes, and damage to reputation. 4. Lack of data governance: An information policy provides the foundation for data governance practices within an organization. Without clear policies and responsibilities, data governance may be ineffective or non-existent. This can lead to data silos, data duplication, poor data sharing, and inconsistent data management practices. 5. Inefficient resource allocation: An information policy helps establish priorities and guidelines for resource allocation, including data storage, backup, and archiving. Without a policy, resources may be allocated inefficiently, leading to unnecessary costs or inadequate resource provisioning. 6. Lack of user accountability: An information policy sets expectations and guidelines for user behavior and responsibilities regarding information handling. Without a policy, users may not be aware of their responsibilities, leading to careless handling of data, unauthorized sharing, or misuse of information. To mitigate these consequences, organizations should develop and implement a comprehensive information policy that addresses data security, data quality, compliance, data governance, and user responsibilities. Case Study: Big Data in the Asia-Pacific Takes On the COVID-19 Pandemic: During the COVID-19 pandemic, the Asia-Pacific region utilized big data to combat the virus. China, Taiwan, and South Korea implemented measures such as strict lockdowns, social distancing, and contact tracing using big data analytics. Pfizer and BioNTech developed the first authorized vaccine, followed by Russia's Sputnik V vaccine. Big data played a crucial role in expediting vaccine development by providing valuable insights. Taiwan used AI and digital communication to track the virus's spread and provide real-time data to citizens. Taiwan integrated health data with immigration and travel databases for effective tracking. Malaysia also employed big data analytics, implementing movement control orders based on healthcare data. The MySejahtera application assisted in monitoring the outbreak and contact tracing. Big data proved instrumental in flattening the curve and improving disease management in the AsiaPacific countries. These successes highlight the importance of leveraging technology and acting swiftly in response to crises. Case Study Questions: 6-13: Describe the role of big data in flattening the COVID-19 pandemic curve in Taiwan and Malaysia. Big data played a crucial role in flattening the COVID-19 pandemic curve in Taiwan and Malaysia. In Taiwan, big data, artificial intelligence (AI), and digital communication were utilized to track the spread of the virus and provide real-time information to citizens. The integration of the National Health Insurance (NHI) database with immigration and travel databases allowed for comprehensive tracking and analysis. High-volume datasets were generated, enabling healthcare providers to access health and travel data for tracking purposes. This facilitated the identification of high-risk individuals, quarantine measures, and efficient resource allocation. Similarly, in Malaysia, big data analytics tools were used to gather data from various healthcare divisions, enabling communal screenings, contact tracing, and monitoring the impact of the virus. Movement control orders were implemented based on the analysis of infected cases and risk categories obtained from the Ministry of Health database. 6-14: What features should be included in a mobile application intended to combat COVID-19, such as MySejahtera? A mobile application intended to combat COVID-19, similar to MySejahtera, should include several key features. These features may include: • Personal information capture: Users should be able to input their personal details such as name, contact number, address, and age. • Real-time data updates: The application should provide users with real-time information on the current COVID-19 situation, including the number of cases, hotspots, and preventive measures. • Check-in/check-out functionality: Users should be able to check-in and check-out when entering or leaving public places. This data can be crucial for contact tracing purposes. • Contact tracing: The application should have the capability to trace and notify individuals who have been in close contact with a confirmed COVID-19 case. • Reporting and self-assessment: Users should be able to report their health status, symptoms, and any potential exposure to the virus. The application can provide self-assessment tools to help users determine their risk level. • Data privacy and security: Strong data protection measures should be implemented to ensure the privacy and security of users' personal information. 6-15: What are the challenges of big data in healthcare? Big data in healthcare presents various challenges. Some of these challenges include: • Timeliness and data synchronization: Health information needs to be updated and synchronized in a timely manner to provide accurate insights and support real-time decisionmaking. • Data ownership and privacy: Healthcare data legally belongs to individuals, raising concerns about data ownership, consent, and privacy. Safeguards must be in place to protect sensitive patient information. • Data heterogeneity: Healthcare data comes in different formats, including structured, semistructured, and unstructured data. Integrating and analyzing diverse data sources can be challenging. • Data quality and completeness: Continuous data streams can result in incomplete or inconsistent data. Ensuring data accuracy, completeness, and reliability is essential for making informed decisions. • Data security and governance: Protecting healthcare data from unauthorized access, breaches, and cyber threats is crucial. Robust security measures and governance frameworks are necessary. • Technological infrastructure: Implementing big data analytics in healthcare requires robust technological infrastructure, including data storage, processing power, and analytical tools. • Ethical considerations: Using big data in healthcare raises ethical concerns regarding consent, data usage, and potential biases in data analysis and decision-making. Addressing these challenges requires a comprehensive approach that combines technological advancements, strong governance frameworks, data quality assurance, and ethical considerations in the use of healthcare data. Chapter 7: Telecommunications, the Internet, and Wireless Technology. Alibaba Redefining Traditional Retailing. Alibaba's Hema Supermarkets represent the "New Retail" concept that seamlessly combines digital and physical retail. Through apps, facial recognition payment, self-checkout, and AI, Alibaba has created an omnichannel experience that merges offline and online retail spaces. The Hema stores serve as a test bed for Alibaba's strategy of integrating online, offline, logistics, and data in a single value chain. Customers engage with the store through the Hema app, providing valuable data on their purchases and scanned products of interest. Using big data analytics, Alibaba mines this information to personalize recommendations. Customers can view detailed product information, make purchases, submit ingredient requests, and even have goods delivered within a 3-km radius through the app. With 11,000 additional items available for purchase online, the Hema app blurs the lines between offline and online retailing. Through internet and wireless technologies, Alibaba enhances the customer's shopping experience while gaining deeper insights into their preferences and behavior. Alibaba's utilization of wireless technologies and its Hema stores' seamless integration of physical and online retail spaces have attracted customers and improved supply chain management. The entry of e-commerce giants like Alibaba into brick-and-mortar retailing reshapes the industry. Leveraging Alipay and smartphone apps, Alibaba provides a personalized shopping experience and extensive product information through Wi-Fi technology, capitalizing on customer familiarity and enhancing the retail experience. How does wireless technology allow the organization to better understand its customers? Wireless technology enables the organization to better understand its customers by providing valuable data and insights. Through the use of smartphone apps and Wi-Fi technology, customer interactions and behaviors can be tracked and analyzed. This includes information on purchases, preferences, browsing patterns, and even physical movement within the store. By collecting and analyzing this data, the organization can gain a deeper understanding of customer preferences and behavior, allowing for personalized recommendations and targeted marketing strategies. How will the use of web technology drive change across brick-and-mortar retailing? The use of web technology in brick-and-mortar retailing drives change by bridging the gap between offline and online experiences. It allows for a seamless integration of physical and digital elements, creating an omnichannel approach. Web technology enables features such as mobile apps, QR code scanning, digital inventories, and personalized recommendations. This enhances the overall shopping experience, provides convenience to customers, and allows retailers to offer a wide range of products and services beyond what is physically available in-store. The combination of web technology and brick-and-mortar retailing leads to a more dynamic and customer-centric retail environment, adapting to the changing demands and expectations of consumers. 7.1: What are the principal components of telecommunications networks and key networking technologies? Networking and the Internet have become essential for business operations, replacing traditional communication methods with computers, email, text messaging, mobile devices, and wireless networks for rapid communication with customers, suppliers, and employees. Networking and Communication Trends. Telephone and computer networks, historically separate, are now converging into a single digital network due to telecommunications deregulation and technological advancements. Both voice and data communication networks have become faster, more portable, and less expensive, with broadband wireless platforms facilitating communication and internet access. The majority of the world's population, around 3.5 billion people, are mobile internet users. What is a computer Network? A computer network is a connection of two or more computers, typically consisting of client computers, a server computer, network interfaces, connection medium, network operating system, and a hub or switch. Each computer has a network interface device to link it to the network, and the network operating system manages communication and resources. Hubs and switches connect network components, while routers enable communication with other networks like the Internet. Software-defined networking (SDN) simplifies network management. Networks in Large companies. Large corporations with multiple locations and thousands of employees can create a corporate-wide networking infrastructure by connecting their smaller networks. This infrastructure consists of numerous interconnected local area networks, along with powerful servers supporting various functions such as the corporate website, intranet, and potentially an extranet. The infrastructure also includes mobile wireless networks for employees, as well as a separate telephone network that can be replaced with internet telephones. The challenge lies in integrating diverse communication networks and channels to enable seamless information flow within the organization. Key Digital Networking Technologies. Contemporary digital networks and the Internet rely on client/server computing, packet switching, and standardized communication protocols like TCP/IP to connect and integrate diverse networks and computers. Client/server computing enables distributed processing power, connecting powerful clients to a network server, and replacing centralized mainframe computing. Packet switching efficiently breaks messages into packets for transmission over various channels, reassembling them at their destinations. TCP/IP, the worldwide standard, uses protocols like TCP and IP to establish connections, route data packets, and ensure delivery between different hardware and software platforms, enabling communication across diverse networks. 7.2. What are the different types of networks? Analog signals represent continuous waveforms for audio communication, while digital signals use discrete binary states of 1s and 0s. Modems convert digital signals to analog for transmission over analog networks. Local area networks (LANs) connect computers within a small radius, often using Ethernet as the physical standard. LANs can be client/server-based or peer-to-peer. Wide area networks (WANs) span larger distances, with the Internet being the most extensive WAN. Metropolitan area networks (MANs) cover city areas and are between LANs and WANs in scope. 7.3. How do the internet and Internet technology work, and how do they support communication and e-business? What is the Internet? The Internet is a vast global network of interconnected networks that originated as a project by the US Department of Defense. It is the largest implementation of client/server computing, linking millions of networks worldwide. Users access the Internet through Internet service providers (ISPs), which offer various connection options such as DSL, cable, satellite, and T lines. Broadband connections have largely replaced traditional dial-up connections, providing faster speeds ranging from 20 Mbps to over 900 Mbps. T1 and T3 lines offer dedicated high-speed connections with guaranteed service levels, primarily used by businesses and government agencies. The Internet, however, operates on a "best effort" basis without guaranteed service levels. The Internet is built on the TCP/IP networking protocol suite, with each device assigned a unique IP address. Messages sent over the Internet are divided into packets and reassembled at their destination. The Domain Name System (DNS) converts domain names into IP addresses, making it easier for users to access websites. Internet data traffic is carried over high-speed backbone networks owned by telephone companies and governments, while local connection lines are owned by regional providers. The Internet is governed by professional organizations and government bodies, ensuring its efficient operation and adherence to national laws. The Internet is transitioning to IPv6 to accommodate the growing number of users and data transmission needs. Internet2 is an advanced networking consortium serving universities, government agencies, and corporations, focusing on leading-edge technologies and capabilities. The rapid growth of internet users and data transmission has led to the need for a new version of IP addressing called IPv6, which offers a significantly larger address space. IPv6 is compatible with most modern devices and will gradually replace the older addressing system. Internet2 is an advanced networking consortium that provides high-capacity networks and serves as a testing ground for cutting-edge technologies that may eventually be adopted by the public internet, including performance measurement tools, secure identity management, and high-bandwidth capabilities. Internet Services and Communication Tools The Internet is based on client/server technology, where individuals use client applications to interact with data stored on servers. Clients can be PCs, smartphones, or tablets. Internet services include email, chatting, instant messaging, discussion groups, Telnet, FTP, and the web. These services are implemented by software programs that may run on a single server or distributed across multiple machines. Email allows for exchanging messages globally, while chatting and instant messaging enable live interactive conversations. News groups are discussion boards for sharing information. Companies may monitor employee online activity for productivity and ethical reasons, raising concerns about employee privacy. Voice Over IP. Voice over IP (VoIP) technology allows voice transmission over the Internet or corporate networks, bypassing traditional telephone networks and toll charges. Calls are transmitted digitally using packet switching. VoIP can be accessed through a computer with a microphone and speakers or a VoIPenabled telephone. Companies like Vonage and Skype offer VoIP services, reducing communication and network management costs by 20 to 30 percent and eliminating the need for separate voice and data networks. VoIP provides a unified infrastructure for both telecommunications and computing services. Unified Communications. Unified Communications refers to the integration of various communication modes, such as voice, data, instant messaging, email, and electronic conferencing, into a single accessible service. This technology allows users to seamlessly switch between different communication modes and provides presence technology to indicate availability. Turning Point, a healthcare provider, has achieved agility and cost savings by implementing Cisco Unified Communications Manager, which centralizes call control and session management, enabling features like chat sessions escalating to phone calls for improved collaboration. Virtual Private Networks (VPNs). Virtual Private Networks (VPNs) are secure and encrypted private networks created within the public Internet. They allow organizations to establish secure and cost-effective communication channels, enabling remote teams to connect and collaborate while protecting data from interception. VPNs utilize protocols like Point-to-Point Tunneling Protocol (PPTP) to encrypt data and establish private connections within the public network, providing a network infrastructure for combining voice and data networks. Interactive Session: Monitoring Employees on Networks: The use of the Internet by employees for non-work-related activities is a significant issue affecting productivity. Many companies have started monitoring employee internet and email usage to combat this problem, often without the employees' knowledge. Monitoring tools from various vendors enable companies to record online activities, such as searches, file transfers, keystrokes, chats, and screenshots. Microsoft Corporation utilizes its Office 365 services to collect data on chats, emails, and meetings to measure productivity and management effectiveness. While monitoring is legal, the ethical implications remain a topic of debate. Monitoring serves to address concerns about time loss, employee productivity, and revenue impact due to personal internet usage. Excessive personal traffic can also disrupt network performance and jeopardize data security. Companies fear adverse publicity, lawsuits, and the potential leakage of confidential information. Some firms attempt to ban personal activities, restrict access to specific websites, or implement strict monitoring policies. However, the decision to monitor employees should consider the work culture and environment, as surveillance can undermine trust, commitment, and motivation. Consultants suggest that companies establish clear policies on employee email, social media, and internet use. These policies should outline the permissible use of company facilities and specify the extent of monitoring. Tailoring the rules to specific business needs and organizational cultures is crucial. Investment firms may require access to external investment sites, while companies fostering information sharing and innovation may find monitoring counterproductive. Ultimately, finding the right balance between monitoring and privacy is essential for maintaining an efficient and positive workplace. Case Study Questions: 1. Should managers monitor employee email and Internet usage? Why or why not? Managers should monitor employee email and Internet usage to ensure productivity, protect company resources, and maintain a secure work environment. Monitoring helps address time-wasting activities, potential legal liabilities, and data security risks. 2. Describe an effective email and web use policy for a company. An effective email and web use policy should clearly state acceptable use guidelines, specify prohibited activities (such as accessing inappropriate content or sharing confidential information), address privacy expectations, and outline consequences for policy violations. It should also inform employees about the company's right to monitor and collect data on their online activities. 3. Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not? Managers should inform employees that their web behavior is being monitored. Transparency builds trust, promotes responsible behavior, and helps employees understand the reasons behind monitoring. Secret monitoring may create a negative work environment, erode trust, and lead to legal and ethical concerns. The Web. The web is a widely used Internet service that uses a client/server architecture and hypertext to store, retrieve, format, and display information. Web pages are accessed through web browsers and are formatted using Hypertext Markup Language (HTML). Web servers manage stored web pages and deliver them to users' computers. Search engines play a crucial role in finding specific information on the web, and their algorithms have evolved to understand user intent and provide relevant search results. Visual search, semantic search, and intelligent agent shopping bots have emerged as new features in web searching. Search engine marketing has become a major advertising platform, allowing businesses to optimize their websites for higher search engine rankings and attract targeted traffic. Today's web enables collaboration, real-time user control, social participation, and user-generated content. Technologies such as cloud computing, software mashups, blogs, RSS, wikis, and social networks support these features. Blogs are personal websites with chronological entries, while wikis allow collaborative content creation. Social networking sites facilitate the building of communities and sharing of content. The future web includes advancements in semantic search, visual search, and the Internet of Things (IoT), where everyday objects are connected to the internet. The growth of apps within the mobile platform is also a significant trend. Cloud computing, ubiquitous connectivity, and the transformation of the web into a seamless and interoperable whole are driving the future web. Interactive Session: Talking Cars Make for Better Road Safety. Toyota introduced the Intelligent Transportation System (ITS) Connect safety package, enabling vehicles to communicate with each other and infrastructure. The system uses vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) wireless communication to exchange information about position, speed, and more. It improves road safety by avoiding collisions, providing safety information to drivers, and enabling cooperative adaptive cruise control. Different standards, such as DSRC and CV2X, are being adopted globally. Vehicular communications can reduce accidents, improve traffic flow through platooning and green waves, and pave the way for autonomous driving. Concerns remain about data security and privacy. 1. What are the pros and cons of the V2X technology? Pros: - Enhanced road safety through collision avoidance and warning systems. - Improved traffic efficiency through coordinated traffic flow and platooning. - Enables cooperative adaptive cruise control for smoother driving. - Potential for reducing fuel consumption and pollution. Cons: - Requires widespread adoption and compatibility among vehicles and infrastructure. - Dependence on reliable wireless communication and infrastructure support. - Concerns about data security and privacy. - Cost of implementing the technology in vehicles and infrastructure. 2. What can be done to speed up the adoption of V2X technology among vehicle owners? To speed up the adoption of V2X technology among vehicle owners: - Offer incentives or subsidies for vehicles equipped with V2X technology. - Collaborate with automotive manufacturers to make V2X technology a standard feature in new vehicles. - Educate and raise awareness among vehicle owners about the benefits of V2X technology. - Ensure interoperability and compatibility among different V2X standards. - Develop regulations and policies that encourage the adoption and use of V2X technology. 3. What other applications can you think of for the ITS Connect? Other applications for the ITS Connect technology: - Emergency vehicle assistance: Provide real-time information and prioritize traffic signals to aid emergency vehicles. - Pedestrian safety: Warn drivers of pedestrians in the vicinity and enable pedestrian-to-vehicle communication. - Smart infrastructure management: Monitor and optimize the performance of roadside infrastructure, such as streetlights and traffic signals. - Traffic data collection and analysis: Gather data on traffic patterns, congestion, and road conditions for urban planning and transportation management. - Public transportation coordination: Facilitate communication between buses, trains, and other public transportation systems to improve efficiency and passenger experience. What are the principal technologies and standards for wireless networking, communication, and Internet access? Cellular Systems: The principal technologies and standards for wireless networking and Internet access are Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), 3G, 4G (LTE and WiMax), and the upcoming 5G, which offers gigabit data transmission, reduced delays, and increased device connectivity for IoT and smart cities. Wireless Computer Networks and Internet Access Various technologies enable high-speed wireless Internet access for both PCs and mobile devices, expanding Internet availability to previously uncovered areas and making ubiquitous (present, appearing or found everywhere) computing a reality. Bluetooth is a wireless networking standard that allows up to eight devices within a 10-meter range to communicate using low-power, radio-based technology, enabling various devices like phones, computers, and printers to connect and operate seamlessly without wires, benefiting both personal and corporate applications, with significant cost savings for companies like FedEx. Wi-Fi, also known as the 802.11 set of standards, enables wireless LANs and Internet access, with various standards offering increasing transmission speeds (up to 1 Gbps with 802.11ac). Access points act as bridges between wireless and wired networks, facilitating wireless Internet access in public places through hotspots, while Wi-Fi networks face security challenges and potential interference from other devices. WiMax, or IEEE Standard 802.16, is a technology that offers long-range wireless access of up to 31 miles with speeds of 30-40 Mbps (up to 1 Gbps for fixed stations), addressing the lack of Wi-Fi or fixed broadband connectivity in certain areas. Radio Frequency Identification (RFID) and Near Field Communication (NFC). RFID systems use tags with embedded microchips to track goods in the supply chain without line-ofsight contact. Walmart utilizes RFID to optimize inventory control, and NFC technology enables tapand-go services for wireless payments and data exchange. Wireless sensor networks (WSNs) consist of interconnected wireless devices embedded in the environment, providing measurements over large spaces and transmitting data for analysis; they are used for various applications such as environmental monitoring, traffic surveillance, security, and supply chain management, contributing to the Internet of Things (IoT). Review Summary: Review Questions: 7-1 What are the principal components of telecommunications networks and key networking technologies? Describe the features of a simple network and the network infrastructure for a large company and describe the principal technologies and trends that have shaped contemporary telecommunications systems. 7-2 What are the different types of networks? Define an analog and a digital signal. Distinguish between a LAN, MAN, and WAN. 7-3 How do the Internet and Internet technology work, and how do they support communication and e-business? Define the Internet, describe how it works, and explain how it provides business value. Explain how the Domain Name System (DNS) and IP addressing system work. List and describe the principal Internet services. Define and describe VoIP and virtual private networks and explain how they provide value to businesses. List and describe alternative ways of locating information on the web. Describe how online search technologies are used for marketing. 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? • Define Bluetooth, Wi-Fi, WiMax, and 3G, 4G, and 5G networks. • Describe the capabilities of each and for which types of applications each is best suited. • Define RFID, explain how it works, and describe how it provides value to businesses. • Define near field communication (NFC) and explain how it works. • Define WSNs, explain how they work, and describe the kinds of applications that use them. Discussion Questions 7-5 It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement. 7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why not? 7-7 What are some of the issues to consider in determining whether the Internet would provide your business with a competitive advantage? 7-8 LionClaw is a Singapore-based clothing brand with a sustainability profile. Management now wants each garment to be accompanied by a tag with a link to a website where the customer can read more about the work environment in the clothing factory, where the fabric is coming from, and so on. Use the web to search for an RFID, NFC, or QR code system for generating codes and printing tags. Work out the differences and choose from these systems to determine the best option for LionClaw. 7-9 BestMed Medical Supplies Corporation sells medical and surgical products and equipment from more than 700 manufacturers to hospitals, health clinics, and medical offices. The company employs 500 people at seven locations throughout Europe, including account managers, customer service and support representatives, and warehouse staff. Employees communicate by traditional telephone voice services, email, instant messaging, and cell phones. Management is inquiring about whether the company should adopt a system for unified communications. What factors should be considered? What are the key decisions that must be made in determining whether to adopt this technology? Use the web, if necessary, to find out more about unified communications and its costs. 7-1: Principal components: Networking devices (routers, switches), transmission media (cables, fiber optics), network protocols (TCP/IP), networking software. Simple network: Basic LAN with a few devices, interconnected with a switch. Large company network infrastructure: Multi-site WAN with routers, switches, firewalls, servers, and high-speed internet connections. Principal technologies and trends: Internet, cloud computing, mobile devices, IoT, 5G, SDN (softwaredefined networking). 7-2: Types of networks: LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). Analog signal: Continuous, smooth waveform representing sound or physical quantities. Digital signal: Discrete, binary representation of data. LAN: Covers small area, usually within a building or campus. MAN: Covers larger area, like a city or a group of nearby cities. WAN: Spans long distances, connecting remote locations or cities. 7-3: Internet and e-business: Internet is a global network of interconnected computers supporting communication and information exchange. DNS and IP addressing: DNS translates domain names to IP addresses for locating resources on the web. Principal Internet services: Email, WWW, FTP, VoIP, VPN. VoIP and VPN: VoIP enables voice communication over the Internet; VPN provides secure remote access. Online search technologies: Search engines, web directories, social media platforms. Marketing with online search: SEO, SEM, online advertising. 7-4: Wireless technologies: Bluetooth (short-range), Wi-Fi (local area), WiMax (long-range), 3G/4G/5G (cellular networks). RFID: Uses tags with microchips to transmit data over short distances for tracking and inventory management. NFC: Short-range wireless technology enabling data exchange between compatible devices. WSNs: Wireless Sensor Networks with interconnected devices for various monitoring applications. Discussion Questions: 7-5: Implications of smartphones becoming most important digital device include increased reliance on mobile apps, mobile commerce, and mobile-first strategies for businesses. 7-6: Retailers and manufacturers should consider RFID based on benefits like improved inventory management, reduced theft, and enhanced supply chain visibility, but also consider costs and privacy concerns. 7-7: Factors to consider for Internet advantage include target market, competition, product/service type, and integration with existing business processes. 7-8: Research options for RFID, NFC, and QR code systems to determine the best fit for LionClaw's needs, considering ease of use, cost, and customer experience. 7-9: BestMed should assess the benefits of unified communications for improved collaboration and efficiency, compare costs and implementation challenges, and consider scalability and support for remote teams. Chapter 8: Securing information Systems Cyberattacks in the Asia-Pacific Target the Weakest Link: People. The Asia-Pacific (APAC) region is increasingly targeted by cyberattacks due to its growing IT focus, weaker cyber regulations, and geopolitical tensions. Singapore's extensive use of technology makes it vulnerable, with incidents like phishing attacks targeting companies like Singapore Airlines (SIA). The banking sector, including Overseas Chinese Banking Corporation (OCBC), has also faced phishing attempts. The region experienced cyberattacks from both external and internal sources, with data leaks and breaches affecting numerous organizations. Small and medium-sized enterprises in Southeast Asia saw a surge in cyberattacks, partly due to remote work setups. What security vulnerabilities were exploited by hackers? What management, organizational, and technological factors contributed to these security weaknesses? What was the business impact of these problems? How important are ethics and morals to information systems security? Hackers exploited various security vulnerabilities, including phishing attacks, state-sponsored attacks, weak internal controls, and inadequate cybersecurity measures. Management and Organizational Factors: 1. Geopolitical tensions: Geopolitical conflicts heightened the risk of state-sponsored cyberattacks. 2. Weak cyber regulations: Relatively weaker cyber regulations in the APAC region made it easier for hackers to target organizations. 3. Lack of awareness: Insufficient employee awareness about cybersecurity and phishing threats made individuals susceptible to attacks. 4. Bribery and corruption: Internal staff involvement in leaking sensitive data showcased unethical behavior. 5. Inadequate training: Lack of proper cybersecurity training for employees contributed to vulnerabilities. 6. Third-party risk: Extensive networking with external partners increased the risk of data breaches and leaks. Technological Factors: 1. Pervasive technology usage: Singapore's heavy reliance on technology exposed it to attacks that targeted its digital infrastructure. 2. Lack of encryption: Insufficient data encryption made it easier for hackers to intercept sensitive information. 3. Inadequate authentication: Weak authentication mechanisms allowed attackers to impersonate legitimate entities. 4. Lack of intrusion detection systems: Insufficient detection capabilities resulted in delayed identification of cyber threats. Business Impact: 1. Reputational damage: Successful attacks eroded customer trust and affected brand reputation. 2. Financial losses: Cyberattacks led to financial losses due to fraud, data theft, and operational disruptions. 3. Legal consequences: Data breaches could result in regulatory fines and lawsuits. 4. Business continuity disruption: Attacks disrupted operations, affecting business continuity. 5. Loss of customer confidence: Data breaches and leaks undermined customer confidence, affecting loyalty. Ethics and Morals: Ethics and morals play a crucial role in information systems security. Ethical behavior ensures responsible data handling, transparency, and adherence to privacy regulations. An organization's commitment to ethical practices reflects its dedication to safeguarding customer data and maintaining trust. Cybersecurity practices must align with ethical standards to prevent data breaches, promote transparency, and demonstrate a commitment to protecting sensitive information. 8-1: Why are information systems vulnerable to destruction, error, and abuse? Information systems are vulnerable to destruction, error, and abuse due to various threats stemming from technical, organizational, and environmental factors. Security and control are paramount for businesses to prevent unauthorized access, alteration, theft, and damage to their information systems. Vulnerabilities arise from interconnected networks, poor management decisions, hardware and software malfunctions, natural disasters, partnering with external companies, and the portability of devices like smartphones. These vulnerabilities can lead to data breaches, disruptions, and operational failures with severe consequences for businesses, emphasizing the need for robust security measures and safeguards. Internet Vulnerabilities The vast openness of the Internet makes it highly vulnerable to widespread abuses and impacts. Connecting corporate networks to the Internet increases vulnerability. Email, instant messaging, and peer-to-peer file sharing contribute to these vulnerabilities by potentially carrying malicious software, unauthorized data transmission, and access to secure systems. Wireless Security Challenges. Wireless networks like Bluetooth and Wi-Fi face security challenges, as eavesdroppers can hack into them easily. Wi-Fi networks, in particular, often lack basic protections against eavesdroppers intercepting network traffic. Hackers can associate with access points using correct identifiers (SSIDs), gaining access to resources on the network and even setting up rogue access points to capture user data. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware Malicious software, or malware, includes viruses, worms, and Trojan horses, posing threats to computer systems. Viruses attach to programs or files, spreading when humans take actions like sharing attachments. Worms independently spread over networks, causing disruptions. Hackers exploit smartphones for malicious activities, and mobile devices, especially Android, are targeted. Social media and IoT introduce security challenges, with Trojan horses posing as benign software and introducing malicious code. Spyware monitors user activities and serves ads, while keyloggers record keystrokes for unauthorized access and data theft. Ransomware encrypts files for extortion. Hackers and Computer Crime Hackers are individuals seeking unauthorized access to computer systems, and the term "cracker" is often used for those with criminal intent. Hackers exploit security weaknesses to intrude websites and systems, engaging in activities like data theft, system damage, and cybervandalism, which involves disrupting or damaging websites and information systems. Spoofing and Sniffing: Spoofing involves hackers using fake identities or redirecting web links to deceive users. Sniffers, both legitimate and malicious, monitor network data, aiding troubleshooting or enabling hackers to steal sensitive information from emails, files, and reports across a network. Denial-of-Service Attacks Denial-of-Service (DoS) attacks involve flooding network servers with false communications to crash them, while Distributed Denial-of-Service (DDoS) attacks use multiple infected computers to overwhelm networks. DDoS attacks disrupt websites, causing inconvenience and financial loss, and hackers often use botnets—networks of infected devices—to orchestrate attacks, deliver spam, and spread malware. Notably, the Mirai botnet exploited IoT devices to launch massive DDoS attacks, affecting major websites. Computer Crime Computer crime encompasses various criminal activities involving computer technology, targeting systems and using computers as instruments for illegal actions. Examples include hacking, data breaches, fraud, and identity theft. The extent of computer crime and its economic impact are challenging to measure precisely. The average annual cost of cybercrime security for benchmarked organizations was $13 million in 2018, highlighting the substantial financial implications of such crimes. Identity Theft. Identity theft involves obtaining personal information to impersonate someone, often for financial gain. It has thrived on the Internet, with phishing being a common tactic. Phishing uses fake websites or emails resembling legitimate businesses to trick users into revealing sensitive data. Evil twins and pharming are advanced phishing techniques. Evil twins set up fake Wi-Fi connections, while pharming redirects users to bogus websites. Data breaches from identity theft cost companies millions, causing brand damage. Laws such as the Computer Fraud and Abuse Act and other U.S. legislation address computer crime and data breaches, requiring notification of affected individuals. Globally, identity fraud losses in 2019 reached $16.9 billion. Major Data Breaches: 1. Marriott 2018: The world's largest hotel company, Marriott, suffered a massive hack in 2018. The breach involved the reservation database of its Starwood properties, exposing sensitive data of up to 500 million guests. State-sponsored Chinese hackers encrypted and copied the data, and subsequent unauthorized access occurred in March 2020. 2. Yahoo 2016: Yahoo, a prominent internet company, faced two major data breaches in 2016. Over 1 billion user accounts were compromised in a 2013 breach, followed by 500 million in 2014. Statesponsored hackers managed to forge credentials for unauthorized access. These incidents led to a lowered acquisition price when Verizon acquired Yahoo, and it was later revealed that all 3 billion Yahoo accounts were affected. 3. Danish Tax Administration: A software error in the Danish Tax Administration's self-service portal resulted in the exposure of personal identification numbers for 1.26 million citizens. This unnoticed leak spanned 5 years and stemmed from URL issues in the portal's settings, which collected user data during updates. 4. EasyJet 2020: UK's EasyJet airline faced a cyberattack in 2020 that potentially exposed data for 9 million customers. Information such as names, email addresses, travel details, and credit card records were compromised. The airline now faces a substantial class-action lawsuit as a consequence of the breach. Click Fraud: Click fraud involves fake clicks on online ads, costing advertisers money. It's often used to harm competitors or exploit pay-per-click systems. Search engines like Google try to prevent and manage click fraud. Global Cyber Threats Cyberterrorism and Cyberwarfare. Cybercriminal activities transcend borders. Cyberwarfare, often state-sponsored, targets infrastructure and communication networks, posing complex challenges. Many nations are developing offensive cyber capabilities, posing a serious threat to critical institutions that rely on the Internet for daily operations. Internal Threats: Employees: Insider threats are significant security concerns. Lack of user knowledge contributes to breaches. Password sharing and social engineering make systems vulnerable. Malicious insiders exploit their knowledge for unauthorized access, even targeting cloudbased systems. Interactive Session: Technology. Capital One: A Big Bank Heist from the Cloud In 2019, Capital One suffered a major data breach, exposing sensitive customer data, including SSNs and bank account numbers. The breach was traced to Paige Thompson, a former Amazon Web Services (AWS) employee who exploited a misconfiguration in Capital One's firewall. She gained access to their data stored on AWS servers. Thompson's actions were considered an insider threat. While AWS claimed their services weren't the cause, the incident raised concerns about cloud security. This breach highlighted the risk of misconfigurations and the potential for unauthorized access through cloud services. Case Study Questions: 1. What management, organization, and technology factors were responsible for the Capital One hack? Management, Organization, and Technology Factors: The Capital One hack stemmed from decisions to adopt cloud computing without robust security evaluation. The organization's reliance on Amazon Web Services (AWS) and a misconfigured firewall created vulnerabilities. 2. Was this an insider hack? Explain your answer. Insider Hack: Yes, the hack was an insider job, as the attacker, Paige Thompson, exploited her knowledge of Amazon's infrastructure and Capital One's vulnerabilities. 3. What steps could have been taken to prevent the Capital One hack? Preventive Steps: To prevent the breach, thorough security assessments before adopting cloud services, regular audits, employee training, multi-factor authentication, encryption, and intrusion detection should have been implemented. 4. Should companies handling sensitive data use cloud computing services? Explain your answer. Cloud Computing for Sensitive Data: Companies should cautiously use cloud services for sensitive data, ensuring proper security measures, encryption, access controls, and regular audits are in place. Software Vulnerability: Software flaws are a risk due to complexity and rapid delivery demands. Bugs and code defects are common, making zero defects impossible. Flaws hinder performance and create security vulnerabilities, with zero-day vulnerabilities exploited before vendors fix them. Patches correct flaws, but managing them is challenging. Microprocessor Vulnerabilities: Recent flaws like Spectre and Meltdown stem from microprocessor design flaws, letting hackers access protected data. Flaws affect chips spanning two decades. Software vendors released patches, but complete mitigation is challenging. 8-2. what is the business value of security and control? Businesses must safeguard valuable information assets, including customer and partner data. Security breaches can have severe financial and operational consequences. Legal liabilities for data exposure or loss are also a concern. Developing strong security and control measures is crucial for the entire organization, not just IT. Legal and Regulatory Requirements for Electronic Records Management. Global regulations like GDPR and industry-specific laws such as HIPAA, Gramm-Leach-Bliley Act, and Sarbanes-Oxley mandate data protection and electronic record management. For instance, HIPAA ensures healthcare data privacy and retention, while Sarbanes-Oxley focuses on financial data integrity. Compliance requires strong internal controls, security measures, and data accuracy to safeguard information. Electronic Evidence and Computer Forensics. Electronic Evidence and Computer Forensics are crucial aspects of modern legal actions. Digital evidence, stored in various forms such as emails, text messages, and transactions, plays a significant role in cases involving fraud, theft, and computer-related crimes. Companies must respond to discovery requests for this evidence, and proper document retention policies are essential to ensure accessibility and preservation. Computer forensics involves collecting, authenticating, and analyzing data from computer storage media to be used as evidence in court. It addresses data recovery, secure handling, information retrieval, and presentation in legal proceedings. Incorporating computer forensics into contingency planning is crucial, involving collaboration between IT, security, and legal teams. 8-3: What are the components of an organizational framework for security and control? An effective organizational framework for security and control consists of several key components: 1. Risk Assessment: Identify and assess potential security risks that your organization faces. Understand the vulnerabilities in your systems and the potential impact of security breaches. 2. Security Policies and Procedures: Develop comprehensive security policies that outline the rules and guidelines for information security within the organization. Establish clear procedures for implementing security measures and responding to incidents. 3. Access Controls: Implement access controls to ensure that only authorized individuals can access sensitive data and systems. This includes user authentication, role-based access, and monitoring of user activities. 4. Data Encryption: Use encryption techniques to protect sensitive data during storage and transmission. Encryption helps prevent unauthorized access even if data is compromised. 5. Firewalls and Intrusion Detection/Prevention Systems: Deploy firewalls to monitor and control incoming and outgoing network traffic. Intrusion detection and prevention systems help identify and respond to unauthorized activities. 6. Security Awareness Training: Train employees to understand security risks and best practices. An informed workforce is better equipped to recognize potential threats and follow security protocols. 7. Incident Response Plan: Develop a plan to address security incidents promptly and effectively. Define roles, responsibilities, and procedures for containing and mitigating the impact of breaches. 8. Business Continuity and Disaster Recovery Plan: Prepare for disruptions by creating plans that ensure the organization can continue operating during and after security incidents. This includes data backups, recovery strategies, and alternate processing sites. 9. Compliance with Regulations: Ensure compliance with relevant industry regulations and legal requirements related to data protection and privacy. 10. Continuous Monitoring and Improvement: Regularly monitor security measures, assess their effectiveness, and adapt to changing threats and technologies. 11. Vendor and Third-Party Risk Management: Evaluate the security practices of vendors and partners who have access to your systems or data. 12. Executive Leadership and Support: Gain support from top management to prioritize security and allocate necessary resources for its implementation. 13. Security Governance: Establish a security governance structure to oversee and manage the organization's security initiatives. By integrating these components into your organizational framework, you create a proactive and comprehensive approach to security and control that addresses potential risks and ensures the reliability and security of your information systems. Information systems controls are essential for security. They are categorized as general and application controls. General Controls: - Software Controls: Guard system software, preventing unauthorized access to programs. - Hardware Controls: Secure physical hardware and ensure proper functioning. - Computer Operations Controls: Oversee consistent application of procedures during data storage and processing. - Data Security Controls: Prevent unauthorized access, change, or destruction of valuable data. - Implementation Controls: Audit the systems development process for proper management. - Administrative Controls: Formalize standards and procedures, ensuring proper execution of controls. Application Controls: - Input Controls: Verify accuracy and completeness of data as it enters the system. - Processing Controls: Ensure data accuracy and completeness during updating. - Output Controls: Confirm accurate, complete, and proper distribution of processed results. Effective controls should be part of system design and consider users' behavior. Risk Assessment Risk assessment is crucial for effective security and controls implementation. It helps identify vulnerabilities and the appropriate level of protection needed for assets. Risk Assessment Process: - Identify information assets and vulnerabilities. - Evaluate potential risks and their impacts. - Determine the likelihood and potential damage of each risk. - Prioritize risks based on their probability and potential losses. - Focus on controls for areas with the highest vulnerability and loss potential. Example Risk Assessment (Online Order Processing System): - Power Failure: 30% chance, $5,000 - $200,000 loss (avg. $102,500) - Embezzlement: 5% chance, $1,000 - $50,000 loss (avg. $25,500) - User Errors: 98% chance, $200 - $40,000 loss (avg. $20,100) Controls should concentrate on high-risk areas to minimize potential losses. Security Policy: Developing a security policy is essential to protect a company's assets. It involves assessing risks, setting security goals, and outlining mechanisms to achieve them. Security Policy Essentials: - Identify critical information assets and risks. - Determine acceptable security goals and risk tolerance. - Estimate costs to achieve acceptable risk levels. - Drive other policies, like acceptable use policies (AUP). - Define proper resource usage and user access. Acceptable Use Policy (AUP): - Defines acceptable use of company information resources. - Specifies actions allowed and consequences for noncompliance. - Applies to various devices: computers, mobile devices, etc. Access Rules Example (Personnel System): - Different user profiles based on job roles. - Access restrictions based on need-to-know principle. - For example, clerical staff can update data but not sensitive fields. - Divisional managers can read all data but can't update. Security policies guide how information resources are accessed and used, ensuring protection and compliance with acceptable usage. Disaster Recovery Planning (DRP) and Business Continuity Planning (BCP) are crucial for ensuring the operation of information systems and business functions in the face of disruptions like power outages, natural disasters, or attacks. Disaster Recovery Planning: - Focuses on restoring computing and communication services. - Addresses technical issues, backup plans, and recovery services. - Backup facilities like MasterCard's duplicate center or cloud-based services ensures continuous operations during emergencies. Business Continuity Planning: - Aims to restore overall business operations after disasters. - Identifies critical business processes and outlines action plans. - PwC's example of resilient operations during crises focuses on maintaining key services and minimizing failures. Collaborative Approach: - Business managers and IT specialists collaborate on planning. - Business impact analysis identifies critical systems and their impact. - Determining the maximum tolerable downtime for the business. - Prioritizing restoration of business processes based on importance. The Role of Auditing: Purpose of Auditing: - Auditing assesses the effectiveness of information systems security and controls. - Conducted comprehensively and systematically. - Involves examining the overall security environment and controls of individual systems. - In-depth analysis includes tracing transaction flows and performing tests. Security and Control Audits: - Security audits review technologies, procedures, documentation, training, and personnel. - May simulate attacks or disasters to test responses. - Identifies control weaknesses and estimates their occurrence probability. - Assesses financial and organizational impact of each weakness. Sample Control Weaknesses: - Figure 8.4 illustrates a sample auditor's listing of control weaknesses for a loan system in a commercial bank. - Examples include missing passwords for user accounts, improper network configuration, and lack of final approval for production programs. - Each weakness is evaluated for its chance of error/abuse, impact, and management notification. Management Response: - Management is expected to respond to each weakness with corrective actions. - Plans are devised to counter significant control weaknesses. - Strengthening controls and implementing necessary changes is essential. Auditing ensures that security measures and controls are effective, vulnerabilities are identified, and necessary improvements are made to enhance the overall security environment and safeguard against potential risks. 8-4: Tools and Technologies for Safeguarding Information Resources: Identity Management and Authentication: - Identity management software automates tracking users and system privileges. - Unique digital identities assigned to users for accessing systems. - Authentication ensures that a user is who they claim to be. - Passwords are commonly used for authentication but come with security challenges (forgetting, sharing, weak passwords). - New authentication technologies include tokens, smart cards, and biometric authentication. Token Authentication: - Tokens are physical devices that prove a user's identity. - Display changing passcodes and fit on key rings. Smart Card Authentication: - Smart cards are credit card-sized devices with data chips. - Reader devices interpret data on the smart card for access control. Biometric Authentication: - Reads individual human traits like fingerprints, irises, and voices. - Compares unique characteristics against stored profiles for access. - Examples: fingerprint and facial recognition technologies, voice authentication. Two-Factor Authentication: - Enhances security by requiring two means of identification. - Combines physical token (smart card) with data (password or PIN). - Can also involve biometric data for added security. The need for strong authentication methods is evident due to the vulnerabilities of traditional passwords. Two-factor authentication and advanced methods like biometric authentication provide enhanced security measures to ensure authorized access to systems and protect sensitive information. Firewalls, Intrusion Detection Systems, and Anti-Malware Software: Firewalls: - Firewalls prevent unauthorized access to private networks. - Combination of hardware and software controlling network traffic. - Placed between private internal networks and external networks (e.g., the Internet). - Acts as a gatekeeper, examining user credentials and traffic characteristics. - Access rules programmed by administrators determine allowed traffic. - Screening technologies include static packet filtering, stateful inspection, Network Address Translation (NAT), and application proxy filtering. - Stateful inspection tracks ongoing dialogues and approved connections. - NAT conceals internal IP addresses to prevent outside sniffer programs. - Application proxy filtering examines application content and uses proxy servers for communication. Firewalls enhance network security by regulating traffic flow and preventing unauthorized access. They work in conjunction with other security measures to create a comprehensive protection strategy against external threats. Intrusion Detection Systems: - Complement firewalls by detecting suspicious network activities and access attempts. - Monitor vulnerable points in networks to detect and deter intruders. - Generate alarms for suspicious or anomalous events. - Scan for patterns indicating known computer attack methods. - Detect changes in important files and issue warnings for system errors. - Customizable to block unauthorized traffic in sensitive network areas. Anti-Malware Software: - Crucial for individuals and businesses to prevent, detect, and remove malware. - Guards against viruses, worms, Trojan horses, spyware, and adware. - Requires continuous updates to stay effective against evolving threats. - Some malware can evade detection, necessitating additional tools for detection. Unified Threat Management Systems (UTM): - Integrated security appliances combining various tools like firewalls, VPNs, intrusion detection, content filtering, and anti-spam software. - Designed to enhance cost-effectiveness and management efficiency. - Unified Threat Management (UTM) products available for networks of all sizes. - Examples include Fortinet, Sophos, Check Point, Cisco Systems, and Juniper Networks. Unified Threat Management systems provide a comprehensive approach to security management, consolidating various tools into a single solution for enhanced protection and streamlined management. Securing Wireless Networks: - Wired Equivalent Privacy (WEP) is an initial but weak Wi-Fi security standard. - Wi-Fi Protected Access 2 (WPA2) and WPA3 provide stronger security with dynamic encryption keys. - WPA3 introduced in 2018 for enhanced wireless network protection. - Virtual Private Network (VPN) technology can complement Wi-Fi security. Encryption and Public Key Infrastructure: - Encryption transforms data into unreadable cipher text, requiring decryption for readability. - SSL and TLS enable secure web sessions by managing encryption between client and server. - S-HTTP encrypts individual messages, while SSL and TLS establish secure connections. - Symmetric key encryption uses a shared key for encryption and decryption. - Public key encryption involves a pair of related keys for secure communication. - Digital certificates, issued by Certificate Authorities (CAs), validate user identities. Securing Transactions with Blockchain: - Blockchain ensures trust and security through a chain of interconnected digital blocks. - Transactions are encrypted and secured through cryptography. - Blockchain participants have private keys as digital signatures. - Records in a blockchain are tamper-resistant due to cryptographic security. - Changes to blockchain records invalidate signatures, preventing unauthorized alterations. - Blockchain still requires careful security and control measures. Ensuring System Availability: - Companies rely on digital networks for revenue and operations, necessitating system availability. - Fault-tolerant computer systems ensure continuous and uninterrupted service. - Redundant hardware, software, and power supply components provide reliability. - Self-checking logic and backup devices detect hardware failures and switch automatically. - Parts of fault-tolerant systems can be repaired without disrupting operations. Security Outsourcing: - Managed security service providers (MSSPs) offer security functions to companies. - MSSPs monitor network activity, conduct vulnerability testing, and perform intrusion detection. - Leading MSSP providers include SecureWorks, AT&T, Verizon, IBM, Perimeter eSecurity, and Symantec. Achieving Digital Resiliency: - Organizations are increasingly interconnected in a hypernetworked digital environment. - Digital resiliency focuses on maintaining and enhancing resilience across the organization. - It encompasses technology, managerial, and organizational aspects. - It considers corporate policies, business processes, culture, risk management, and more. - Digital resiliency ensures adaptability, 24/7 availability, and effective response to challenges. - Contingencies, like remote work during the pandemic, can be better anticipated with a digital resiliency approach. - PayPal's example illustrates the importance of measuring operational effectiveness and reducing errors for digital resiliency improvement. Interactive session: management. PayPal Ups Its Digital Resiliency. PayPal, a global online payment leader, prioritizes security and availability. To ensure its digital resiliency, PayPal collaborated with Uptime Institute, a consulting group. They found human error to be a major cause of data center outages. PayPal achieved high scores in Uptime Institute's M&O Assessment, emphasizing proactive behaviors and optimal staffing. The ServiceNow platform enhanced procedural workflows. PayPal's Facilities Operations group excelled in maintenance and training. The M&O Stamp of Approval influenced vendor contracts. Digital Resiliency Assessment validates the strength of PayPal's digital infrastructure, including end users, networks, applications, databases, and data centers. Case Study Questions: 1. Why is digital resiliency so important for a company such as PayPal? Digital resiliency is crucial for companies like PayPal due to their global online operations and critical payment services. Ensuring high availability and security 24/7 is essential to prevent service disruptions, financial losses, and damage to reputation. With millions of users relying on its platform, PayPal needs to maintain seamless operations even during unforeseen events. 2. How did PayPal benefit from measuring its digital resiliency? What issues did it address? PayPal benefited from measuring its digital resiliency by gaining insights into its data center operations, identifying potential weaknesses, and implementing proactive measures. By collaborating with Uptime Institute, PayPal improved operational behaviors, staff training, maintenance, and coordination. It also addressed the risk of human error causing data center outages, enhancing overall reliability and minimizing service disruptions. 3. What is the role of management and organizational issues in making an organization's IT infrastructure more resilient? Management and organizational issues play a pivotal role in enhancing IT infrastructure resilience. Proper staffing, training, documentation, and coordination are vital for preventing human errors that can lead to downtime. Consistency in operational practices, proactive planning, and effective budgeting contribute to resiliency. By aligning business goals with IT practices, companies can ensure digital resilience and minimize disruptions to their services. Certainly, here's a summarized version of the review and discussion questions: Review Questions: 8-1 Information System Vulnerabilities: Information systems are vulnerable to destruction, error, and abuse due to technological complexities and human factors. Common threats include unauthorized access, data breaches, viruses, worms, Trojans, hackers, computer crime, identity theft, and phishing. 8-2 Business Value of Security and Control: Inadequate security and control can result in legal liabilities and compromised business operations. Electronic evidence is crucial for legal cases and investigations. 8-3 Organizational Framework for Security and Control: General controls include administrative, physical, and technical controls. Intrusion detection systems monitor network activity. Unified threat management systems combine security tools. Digital certificates enhance site visitor security. Small businesses might use managed security service providers. Software metrics improve system quality. 8-4 Safeguarding Information Resources: Tokens are used for authentication. Two-factor authentication enhances security. Intrusion detection systems monitor networks. Unified threat management systems combine security tools. Digital certificates enhance site visitor security. Managed security service providers are valuable for small businesses. Software metrics improve system quality. 8-5 Business and Security: Security is not solely a technological concern but a critical business issue. It impacts customer trust, reputation, legal compliance, and overall business operations. 8-6 Business Continuity Planning: A business continuity plan would start by identifying critical business processes, assessing risks, determining recovery strategies, establishing communication protocols, and ensuring data backup and recovery solutions. It would address aspects such as infrastructure, personnel, and external stakeholders. 8-7 E-Commerce Website Security: Major security threats to an e-commerce website include data breaches, payment fraud, hacking, and denial-of-service attacks. Implementing secure payment gateways, encryption, regular vulnerability assessments, and user awareness campaigns can minimize these threats. 8-8 Security Analysis for VidHongKong's New Venture: For the new Internet movie rental venture, several security risks must be considered: - New Web Portal: The web portal may be vulnerable to hacking, DDoS attacks, and SQL injection. Weak authentication or improper access controls could lead to unauthorized access. - New Database: The movie database should be protected against unauthorized access and data breaches. Data encryption and proper access controls are necessary to prevent leaks of customer and rental information. - New CRM System: The CRM system must have strong authentication and encryption to safeguard customer data. Vulnerabilities may lead to customer privacy breaches and identity theft. - Link to Existing Information System: Ensuring a secure connection between the new and existing systems is crucial to prevent unauthorized access or data interception during data exchange. - End Products (Movies): Protecting digital movie files from unauthorized distribution or piracy is essential. Encryption and digital rights management (DRM) technologies can help prevent illegal copying and sharing. 8-9 Addressing IT Infrastructure Security Vulnerabilities: - Total Vulnerabilities for Each Platform: Calculate the total vulnerabilities for each platform to assess the overall security risk. - Potential Impact: The potential impact of security problems varies based on the platform. Critical systems could lead to data breaches, loss of customer trust, financial losses, and legal liabilities. - Prioritization of Vulnerabilities: Address vulnerabilities based on their potential impact. Critical platforms should be addressed first to prevent major disruptions. Then, focus on platforms with moderate impact, and finally, those with lower impact. - Control Problems and Solutions: Identify the types of control problems such as weak authentication, inadequate access controls, and lack of encryption. Implement measures like strong passwords, rolebased access controls, encryption protocols, and regular security assessments. - Risks of Ignoring Vulnerabilities: Ignoring security vulnerabilities puts the firm at risk of data breaches, financial losses, legal actions, damage to reputation, and loss of customer trust. It may lead to regulatory non-compliance and hinder business growth. Addressing vulnerabilities promptly and comprehensively is essential to ensure a secure IT environment and protect the organization's interests. Bulgaria: A Whole Nation Hacked. In 2019, Bulgaria faced a massive cyberattack on its tax service database, compromising data of around 5.1 million citizens. The hacker gained unauthorized access, leading to concerns about cybersecurity measures, prevention, and the potential impact on individuals and authorities. The hack's origin remained uncertain, with an initial focus on a cybersecurity employee named Kristiyan Bojakov. The attack exploited an SQL injection vulnerability in a system used to file VAT returns from outside Bulgaria. Experts highlighted the need for using proper software, patches, and prepared statements to prevent such attacks. The hack's aftermath exposed vulnerabilities in Bulgaria's cybersecurity framework. Insufficient monitoring and absence of access logs contributed to delayed detection. This incident mirrored the broader global trend of official databases facing frequent attacks. The stolen data could be sold for millions, leading to credit card fraud and identity theft risks. Bulgaria's cybersecurity challenges were exacerbated by a shortage of experts due to migration to better-paying roles in other European Union states. The government considered outsourcing cybersecurity, but concerns about data security arose. In response, Bulgaria initiated efforts to strengthen its cybersecurity by establishing a dedicated unit of well-paid experts. The case highlights the critical importance of cybersecurity for nations' data protection and the complexities they face in securing sensitive information. 8-13 Security and Control Issues The hacking technique discussed in this case is an SQL injection attack. This attack involves exploiting vulnerabilities in a system by injecting corrupted input, causing the system to execute unintended commands. Security and control issues related to this technique include: - Insufficient System Protection: The Bulgarian tax service's system lacked proper protection against SQL injection attacks, allowing the hacker to exploit vulnerabilities. - Lack of Prepared Statements: Prepared statements, a security measure against SQL injection, were not utilized. Prepared statements ensure that only specific input is accepted, preventing corrupted commands. - Absence of Monitoring and Logging: Inadequate monitoring of system access and a lack of comprehensive logging allowed the hacker's activities to go unnoticed for an extended period. - Delayed Detection: The breach went undetected for years, indicating poor monitoring practices and insufficient cybersecurity measures. - Limited Training and Awareness: The lack of a proactive "hacking squad" to test system vulnerabilities and raise awareness among civil servants contributed to the successful attack. 8-14 Managerial Issues Faced by Bulgarian Civil Servants Civil servants in charge of cybersecurity in Bulgaria face various managerial issues, including: - Shortage of Cybersecurity Experts: The migration of skilled IT professionals to higher-paying roles in other European Union states results in a shortage of qualified cybersecurity experts. - Inadequate Budget and Salaries: Cybersecurity professionals are paid significantly less in the public sector compared to private companies, affecting recruitment and retention efforts. - Data Protection Prioritization: Insufficient attention and resources are given to securing non-critical databases, potentially leaving sensitive data vulnerable. - Outsourcing Concerns: The challenge of outsourcing cybersecurity while ensuring data security and trusting third-party systems. - Compliance with Regulations: Ensuring compliance with the General Data Protection Regulation (GDPR) while maintaining effective cybersecurity measures. - Public Trust: Rebuilding public trust in the government's ability to protect citizens' data after breaches occur. 8-15 Potential Impact of the Bulgarian Tax Hack The potential impact of the Bulgarian tax hack includes: - Financial Loss: The stolen data could be used for credit card fraud and other financial crimes, causing financial losses for affected individuals and financial institutions. - Identity Theft: Personal information compromise could lead to identity theft, impacting victims' financial and personal lives. - Public Trust Erosion: The breach erodes public trust in government institutions' ability to safeguard sensitive information. - Legal Consequences: Non-compliance with GDPR regulations could result in fines, as evidenced by the €3 million fine imposed on the tax authority. - National Reputation: The hack damages Bulgaria's reputation in terms of data security and cybersecurity readiness. 8-16 Prevention of Data Breaches To prevent data breaches like this, several measures can be taken: - Regular Security Audits: Conduct thorough security audits and penetration testing to identify vulnerabilities and address them proactively. - Employee Training: Train civil servants in cybersecurity best practices and awareness to recognize potential threats. - Implement Prepared Statements: Utilize prepared statements in application development to prevent SQL injection attacks. - Monitoring and Logging: Implement continuous monitoring of system access and detailed logging to detect and respond to unauthorized activities. - Bug Bounty Programs: Establish bug bounty programs to incentivize ethical hackers to identify and report vulnerabilities. - Data Encryption: Encrypt sensitive data to make it more difficult for unauthorized users to access. - Collaboration with Private Sector: Collaborate with private sector experts to enhance cybersecurity capabilities and knowledge sharing. These measures collectively contribute to a more robust cybersecurity framework, reducing the risk of successful data breaches. Chapter 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Lenzing Sustainably Balances Supply and Demand. The case study highlights Lenzing Group's efforts to sustainably balance supply and demand in its global supply chain through the adoption of advanced software solutions. Lenzing is an Austria-based company that produces specialty fibers for the fashion, sports, and protection wear industries, with a strong commitment to environmental sustainability. Key Points: 1. Lenzing's Sustainable Approach: Lenzing is known for producing botanic cellulose fibers that have a reduced environmental impact compared to traditional materials. The company adheres to high environmental standards and holds various sustainability certifications. Lenzing aims to minimize waste and reduce the fashion industry's negative impact on the environment. 2. Challenges with Supply Chain Planning: Lenzing's global supply chain involves multiple stakeholders, including spinners, weavers, mills, dye works, and fashion brands. The company used manual processes and Excel spreadsheets for supply chain planning, but the complexity of its operations required more advanced tools. 3. Need for Digital Transformation: Lenzing sought to create a more efficient and accurate end-toend supply chain planning process that aligned supply and demand seamlessly. Manual processes and Excel spreadsheets were inadequate for managing the intricacies of the supply chain. The company needed a solution to integrate demand forecasting, sales planning, and operations planning. 4. Choosing JDA Sales & Operations Planning (S&OP): Lenzing selected JDA Sales & Operations Planning software to overhaul its S&OP processes. This software supports various enterprise processes, including demand review, supply review, demand-supply balancing, financial review, continuous plan refinement, and business performance management. 5. Benefits of JDA S&OP: By implementing JDA S&OP, Lenzing achieved several benefits: Cross-functional integration of business planning processes. Elimination of manual work and Excel spreadsheets. Improved decision support and alignment. Enhanced visibility across departments and the supply chain. Identification of performance gaps and what-if resolution. Improved sales forecast accuracy and transparency. Faster planning and decision-making, reducing planning time by 50%. Better resource allocation to profitable markets and applications. Minimized waste and leaner supply chain operations. 6. Cloud-Based Implementation: Lenzing launched its JDA S&OP system using cloud-based software as a service (SaaS). This approach facilitated quick implementation and provided immediate returns on investment. The case study illustrates how Lenzing Group leveraged advanced supply chain planning software to optimize its operations, reduce environmental impact, enhance profitability, and achieve better alignment between supply and demand. Through the adoption of digital solutions, Lenzing was able to address the challenges posed by its complex global supply chain while staying true to its commitment to sustainability. 9-1: How do enterprise systems help businesses achieve operational excellence? Enterprise systems play a crucial role in helping businesses achieve operational excellence by integrating various business processes, improving decision-making, and promoting standardized practices. These systems provide a centralized platform that connects different departments and processes within an organization, enabling real-time information sharing and efficient coordination. Here's how enterprise systems contribute to operational excellence: 1. Integration: Enterprise systems integrate data from various departments, eliminating data silos and promoting collaboration. 2. Standardization: Predefined processes ensure consistent operations and reduce inefficiencies caused by manual work. 3. Real-time Visibility: Immediate access to accurate information enables quick responses to changing conditions. 4. Informed Decision-making: Analytical tools aid decision-makers in making strategic choices based on data insights. 5. Consistency: Standard practices enforced across the organization improve efficiency and reduce variations. 6. Customer Responsiveness: Integrated data helps fulfil orders accurately and minimize lead times. 7. Resource Optimization: Operations are aligned with demand, leading to reduced waste and better resource allocation. 8. Performance Measurement: Standardized metrics enable assessment of overall performance and effectiveness of initiatives. In summary, enterprise systems facilitate operational excellence by integrating processes, promoting standardized practices, providing real-time visibility, and enhancing decision-making capabilities. These systems enable organizations to respond quickly to market changes, improve resource utilization, and align their operations with strategic goals, ultimately leading to increased efficiency, reduced costs, and enhanced competitiveness. 9-2: How do supply chain management systems coordinate planning, production, and logistics with suppliers? The Supply chain: A supply chain is a network that includes suppliers, manufacturers, distributors, retailers, and customers, working together to source, produce, and deliver products. It involves the flow of materials, information, and funds to meet customer demands efficiently, while minimizing costs and optimizing resources. Supply Chain Complexity: For complex businesses with numerous suppliers, supply chain management (SCM) systems coordinate activities across suppliers, manufacturers, distributors, and retailers. Supply Chain Network: A supply chain encompasses organizations and processes that source raw materials, transform them into products, and distribute products to customers. Material Flow: Raw materials evolve into intermediate products and finally finished goods, moving through suppliers, manufacturers, distributors, and retailers. Nike's Example: Nike's supply chain includes contract manufacturers, tiered suppliers, and subsuppliers for components like soles, eyelets, uppers, and laces. Bullwhip Effect: Inaccurate or delayed information can lead to inefficiencies, excess inventory, and increased operating costs across the supply chain. Supply Chain Planning: SCM planning systems optimize sourcing, manufacturing, inventory, and distribution plans, aiding decision-making and forecasting. Supply Chain Execution: Execution systems manage physical product flow, warehouse operations, transportation, and financial information. Global Supply Chains: The Internet enhances communication, coordination, and efficiency in global supply chains, handling complex logistics and international business regulations. Demand-Driven Approach: SCM shifts from push-based (forecast-driven) to pull-based (demanddriven) models, improving response to actual customer orders. Digital Logistics: Internet enables concurrent supply chains, where information flows in multiple directions, enhancing responsiveness and flexibility. Business Value: SCM systems reduce costs, improve customer service, enhance sales, and increase profitability by aligning supply and demand, reducing inventory, and optimizing asset use. 9-3: How do customer relationship management systems help firms achieve customer intimacy? Customer Relationship Management (CRM) systems help firms achieve customer intimacy by capturing, integrating, and analyzing customer data from various sources. These systems provide a unified view of customers, enhancing sales, service, and marketing efforts. CRM software includes modules for sales force automation, customer service, and marketing. It aids in personalized interactions, supports call centers, and optimizes direct-marketing campaigns. Analytical CRM utilizes data from operational systems to analyze customer behavior, identify buying patterns, and determine customer lifetime value. Effective CRM systems lead to increased customer satisfaction, reduced marketing costs, better marketing strategies, and improved customer acquisition and retention. Interactive Session: Organizations CRM Helps Adidas Know Its Customers One Shoe Buyer at a Time Adidas, a prominent global athletic brand, leverages Salesforce's CRM tools to enhance customer relationships and improve personalized experiences. In a shift from physical stores to digital platforms, Adidas focuses on creating unique customer interactions through Salesforce's cloud-based CRM solutions. With tools like Salesforce Marketing Cloud, Adidas tailors marketing campaigns, manages customer journeys, and employs predictive analytics to choose the most effective communication channels. The integration of Salesforce's Sales Cloud and Service Cloud ensures a unified experience across sales, marketing, and customer service departments. By using the Commerce Cloud, Adidas maintains a global e-commerce presence while utilizing customer preferences to inform product design. The company also developed a mobile app that customizes content and recommendations based on customer behaviour. Through these CRM-driven initiatives, Adidas emphasizes personalized engagement and a deeper connection with customers across various channels. Case Study Questions: 1. Analyze Adidas using the competitive forces and value chain model. Competitive Forces and Value Chain Analysis for Adidas: Adidas faces competitive forces in the sportswear industry, including: • • • • • Threat of New Entrants: Moderate Barriers like brand loyalty and economies of scale provide some protection. Bargaining Power of Suppliers: Moderate Suppliers hold some power due to the uniqueness of sportswear materials. Bargaining Power of Buyers: High Buyers have numerous alternatives and can influence pricing. Threat of Substitutes: High Substitutes like casual clothing and fashion items can affect demand. Industry Rivalry: High Intense competition exists with major rivals like Nike. Adidas's value chain involves activities like design, sourcing, manufacturing, marketing, and distribution. Differentiation is a key strategy, focusing on product innovation, brand image, and personalized customer experiences 2. What is Adidas's business strategy? What is the role of customer relationship management in that strategy? Adidas's Business Strategy and Role of CRM: Adidas's strategy centres on quality, brand differentiation, and personalized experiences. Its CRM strategy involves building close relationships with customers through Salesforce tools. CRM helps Adidas understand customer preferences, tailor marketing campaigns, enhance customer service, and offer personalized products. This strategy aligns with Adidas's aim to create strong brand loyalty and increase customer satisfaction. 3. How do information systems support Adidas's strategy? Information Systems Support for Adidas: Information systems play a crucial role in supporting Adidas's strategy: • • • • CRM Systems: Salesforce enables personalized marketing, customer insights, and unified interactions across channels. E-commerce Platform: Commerce Cloud supports global online sales, using customer data to inform product design. Mobile App: The app utilizes data to customize content, product recommendations, and customer interactions. Data Analytics: Salesforce's analytics tools help Adidas make informed decisions based on customer behaviour and preferences. 4. How did using Salesforce.com make Adidas more competitive? How did it change the way the company ran its business? Impact of Using Salesforce.com on Adidas: • • Increased Competitiveness: Salesforce enhanced Adidas's ability to offer personalized experiences, improving customer engagement and loyalty. Changed Business Operations: Adidas shifted focus from physical stores to digital platforms, emphasizing online sales and unique customer interactions 5. Give an example of two business decisions that were improved by using Salesforce.com Examples of Improved Business Decisions using Salesforce.com: • • Personalized Marketing Campaigns: Salesforce's Marketing Cloud allowed Adidas to tailor campaigns based on customer behavior, leading to higher engagement and conversions. Unified Customer Service: Service Cloud enabled Adidas to provide seamless customer support across various channels, enhancing customer satisfaction and retention. By utilizing Salesforce's CRM solutions, Adidas transformed its approach from traditional retail to digital and personalized experiences, gaining a competitive edge through improved customer engagement, insights, and streamlined operations. 9-4: What are the challenges that enterprise applications pose, and how are enterprise applications taking advantage of new technologies? Many firms have implemented enterprise system s and system s for supply chain and custom er relationship management because they are such powerful instruments for achieving operational excellence and enhancing decision making. But precisely because they are so powerful in changing the way the organization works, they are challenging to implement. 1. Enterprise Application Challenges: Complexity and Cost: Enterprise applications are complex and expensive to purchase and implement, often leading to cost overruns and project delays. Organizational Change: Implementing these systems requires fundamental changes in business processes, employee roles, and organizational learning. Inter-organizational Collaboration: Supply chain systems require multiple organizations to share information and align processes, which can be challenging. Data-related Issues: Poor data quality, organizational data understanding, and data cleansing efforts are needed for accurate results. Switching Costs: Adoption of a specific vendor's application leads to vendor dependency and high switching costs. Customization: Customization of applications can lead to maintenance complexity and increased costs. 2. New Technologies in Enterprise Applications: Flexibility and Integration: Next-generation enterprise applications are becoming more flexible, user-friendly, web-enabled, mobile, and integrated with other systems. Cloud Solutions: Major vendors like SAP, Oracle, and Microsoft offer cloud versions of ERP (enterprise resource planning) and CRM systems, providing scalability and accessibility. Social CRM: CRM vendors integrate social networking technologies to improve customer engagement and gather insights from social media. Business Intelligence: Enterprise applications include business intelligence features, using tools like AI and data visualization to analyse and provide insights from vast amounts of data, including IoTgenerated data. 3. Impact of Using New Technologies: Improved User Experience: More user-friendly interfaces and mobile accessibility enhance user adoption and engagement. Interconnected Systems: Integration among CRM, SCM, and ERP systems enables seamless business operations across departments and with customers and suppliers. Cost Savings: Minimizing customization and using cloud solutions reduces costs and simplifies maintenance. 4. Example of Improved Business Decisions: Customization Reduction: Kennametal and Office Depot moved away from heavily customized ERP systems, opting for standardized software and aligning their processes, leading to cost reduction and simplified operations. Social Media Engagement: Businesses using social CRM tools can monitor social media sentiment and tailor marketing efforts accordingly, increasing customer engagement and satisfaction. The challenges associated with enterprise applications are being addressed through advancements in technology, offering more flexibility, integration, and business intelligence capabilities. The utilization of cloud solutions, social CRM, and AI-driven insights are transforming the way companies operate, enabling them to make more informed decisions, enhance customer relationships, and achieve operational excellence. Interactive Session: Technology. Versum’s ERP Transformation. The case study discusses the ERP transformation of Versum Materials, an electronic materials company supplying specialty gases and products to the semiconductor industry. Here are the key points and takeaways from the case: 1. Background and Challenges: • Versum Materials was divested from its parent company, Air Products, and needed its own IT infrastructure and enterprise system. • Options for ERP system replacement: Copying Air Products' existing SAP ERP, bringing customizations to a new SAP ERP, or starting from scratch. • Versum chose the third option to implement a system that catered to its specific business needs. 2. Selection of SAP S/4HANA: • • Chose SAP S/4HANA as the foundation for the new system due to its capabilities for industry regulatory requirements and ease of implementation. Implementation was done in a private cloud managed by a hosting provider to save on upfront capital investment and system management responsibility. 3. Implementation Approach: • • • Implemented SAP S/4HANA using SAP and industry best practices to create consistent processes across business units. Opted for a "big-bang" system rollout to simplify the process and minimize complications. Despite challenges with data conversion, the implementation went smoothly with minimal disruption. 4. Benefits and Outcome: • The new SAP S/4HANA system optimized operations, cost management, and real-time analytics. • Versum Materials gained a solid foundation as an independent company specializing in specialty materials. • The entire implementation, including SAP solutions and non-SAP applications, was completed in just 15 months. 5. Data Conversion Challenges: • Converting data from the old system posed challenges due to differences in data structures and hierarchies between the old SAP ERP system and the new SAP S/4HANA system. • The new system introduced a Business Partner structure that consolidated customer, vendor, and contact data. 6. Real-Time Analytics and Optimization: • The implementation of SAP S/4HANA enabled Versum to optimize operations, manage costs, and utilize real-time analytics. • The company now had the necessary foundation to operate as an independent specialty materials company. Overall, the case study highlights how Versum Materials successfully transformed its IT infrastructure and ERP system to support its new business model and growth plans. The choice of SAP S/4HANA and a well-executed implementation enabled the company to achieve its objectives and operate as a standalone entity specializing in specialty materials for the semiconductor industry. Case Study Questions: 1. Define the problem in this case study. What management, organization, and technology factors contributed to the problem? Problem Definition and Contributing Factors: Problem: The problem in this case study was that Versum Materials, after being divested from its parent company Air Products, needed to establish its own IT infrastructure and enterprise system to support its new business model as a specialty gases and products supplier to the semiconductor industry. Contributing Factors: Management Factors: The decision to divest from Air Products necessitated the establishment of an independent IT infrastructure. Management's ambition for growth and transformation required a new, suitable ERP system. Organization Factors: The company needed to transition from the information systems of its parent company to a system that aligned with its specific business needs. A global supply chain with operations in multiple countries added complexity. Technology Factors: The legacy ERP system of the parent company was not tailored to Versum's specialized business model and regulatory requirements. Choosing the right ERP solution and implementing it effectively was crucial. 2. Was the SAP S/4 HANA SaaS solution a good one for Versum? Explain your answer. SAP S/4HANA SaaS Solution for Versum: Yes, it was a good solution: The choice of SAP S/4HANA SaaS solution was appropriate for Versum. It provided an integrated ERP system that was capable of handling the company's specialized needs and regulatory requirements in the semiconductor industry. The implementation of SAP S/4HANA allowed Versum to optimize operations, manage costs, and take advantage of real-time analytics, which were essential for its business model. Moreover, the private cloud deployment of SAP S/4HANA offered cost savings and relieved the company from the responsibility of managing the system's infrastructure. 3. What challenges did Versum encounter implementing the new system? Implementation Challenges: Data Conversion: Converting data from the old system to the new SAP S/4HANA system was a challenge due to differences in data structures and hierarchies. Global Rollout: Versum had a global supply chain spanning multiple countries. Implementing the new system simultaneously across all locations required meticulous planning and execution. Time Constraints: The transition services agreement (TSA) did not allow for a phased rollout, necessitating a "big-bang" approach. This posed challenges in data migration and system adoption. 4. How did the new system change the way Versum ran its business? Impact on Versum's Business: • Operational Optimization: The new SAP S/4HANA system enabled Versum to optimize its operations by streamlining processes, managing costs, and making use of real-time analytics. This allowed the company to effectively cater to the specialized needs of the semiconductor industry. • Business Transformation: Versum Materials transformed from being part of a larger industrial gas company to an independent specialty materials supplier. The new system supported this transformation by providing tailored functionalities and capabilities. • Foundation for Growth: The successful implementation of the new system provided Versum with a solid foundation to operate as a standalone company, supporting its growth plans and business expansion. Overall, the case study illustrates how the strategic choice of an appropriate ERP solution, in this case, SAP S/4HANA, and a well-executed implementation strategy allowed Versum Materials to address its challenges and transform its operations to meet its new business requirements. Review Questions: 9-1 How do enterprise systems help businesses achieve operational excellence? Enterprise systems integrate various business processes and functions, providing a centralized platform for data sharing and communication. They enable streamlining of processes, reduction of redundancy, and improved collaboration, leading to increased operational efficiency and effectiveness. Financial and Accounting Processes Supported by Enterprise Systems: 1. General Ledger Management 2. Accounts Payable 3. Accounts Receivable 4. Financial Reporting 5. Budgeting and Planning 6. Asset Management How enterprise systems provide valuable information for improving management decision making: Enterprise systems capture and store data from different business functions, allowing managers to access real-time information for informed decision making. This helps in analyzing trends, identifying opportunities, and addressing challenges. 9-2 How do supply chain management systems coordinate planning, production, and logistics with suppliers? Supply chain management systems coordinate the flow of materials, information, and finances across the entire supply chain, from suppliers to customers. They help in planning production, managing inventory, and optimizing logistics to ensure timely delivery of products. Parts of a Retailer's Supply Chain: 1. Suppliers 2. Distribution Centres/Warehouses 3. Retail Stores 4. Customers Upstream and Downstream Portions of the Supply Chain: Upstream: Involves processes related to suppliers and procurement. Downstream: Involves processes related to distribution and customer-facing activities. Supply System for a Manufacturer with Perfect Information on Future Orders: A "push" supply system, where production is based on anticipated future demand. Important and Complex Aspect of Supply Chain Planning: Demand Forecasting, which involves predicting future customer demand accurately. Impact of Supply Chain Costs on Profitability: Supply chain costs directly impact an organization's profitability. High costs, such as excess inventory or transportation costs, can lead to reduced profit margins. 9-3 How do customer relationship management systems help firms achieve customer intimacy? CRM systems help firms gather, store, and analyse customer data to understand their preferences, needs, and behaviours. This information enables personalized interactions, targeted marketing, and improved customer service. Potential Touch Points for a Retailer: 1. In-Store Interactions 2. Online Purchases 3. Customer Service Calls Sales Force Automation: It involves automating sales processes, such as lead tracking, contact management, and opportunity management. Cross-Selling: Recommending related products to customers based on their preferences and purchase history. Operational vs. Analytical CRM: Operational CRM focuses on day-to-day interactions and processes. Analytical CRM involves analyzing customer data to gain insights and make strategic decisions. 9-4 What are the challenges that enterprise applications pose, and how are enterprise applications taking advantage of new technologies? Challenges: Cost overruns, complex customization, organizational change. Solutions: Pared-down software versions, cloud applications, minimal customizations. Enterprise Applications and New Technologies: Cloud Computing: Offers flexibility, scalability, and cost savings. Business Intelligence: Helps in making informed decisions by analyzing data. Social CRM: Integrates social media data to enhance customer interactions and insights. Discussion Questions: 9-5 Supply chain management is less about managing the physical movement of goods and more about managing information. Discuss the implications of this statement. Supply chain management heavily relies on accurate and timely information sharing among different stakeholders. Effective information management ensures the right products are available in the right place at the right time, reducing delays and costs. 9-6 If a company wants to implement an enterprise application, it had better do its homework. Discuss the implications of this statement. Implementing enterprise applications requires thorough research, planning, and understanding of the organization's needs. Lack of preparation can lead to challenges, including inefficiencies and financial losses. 9-7 Which Enterprise Application to Install First: ERP, SCM, or CRM? The choice depends on the organization's priorities. If operational efficiency is a priority, ERP might be chosen. If optimizing the supply chain is critical, SCM could be the focus. If enhancing customer relationships is vital, CRM might be the preferred option. Management Decision Problems: 9-8 Toronto-based Mercedes-Benz Canada, with a network of 55 dealers, did not know enough about its customers. Dealers provided customer data to the company on an ad hoc basis. Mercedes did not force dealers to report this information. There was no real incentive for dealers to share information with the company. How could CRM and PRM systems help solve this problem? Using CRM and PRM to Solve Mercedes-Benz Canada's Problem: CRM systems can help Mercedes-Benz Canada gather customer data and preferences, enabling targeted marketing and personalized services. PRM systems can incentivize dealers to share customer data by providing them with value-added services and benefits. 9-9 Office Depot sells a wide range of office supply products and services in the United States and internationally. The company tries to offer a wider range of office supplies at lower cost than other retailers by using just-in-time replenishment and tight inventory control systems. It uses information from a demand forecasting system and point-of-sale data to replenish its inventory in its 1,400 retail stores. Explain how these systems help Office Depot minimize costs and any other benefits they provide. Identify and describe other supply chain management applications that would be especially helpful to Office Depot. Office Depot's Supply Chain Management and Benefits: Office Depot's demand forecasting and just-in-time replenishment systems minimize inventory costs and ensure efficient supply chain operations. Other supply chain management applications that could benefit Office Depot include route optimization for deliveries and predictive maintenance for distribution centres The Coronavirus Pandemic Disrupts Supply Chains Around the World CASE STUDY. The COVID-19 pandemic has profoundly disrupted global supply chains, presenting unprecedented challenges. Lockdowns and shifting consumer demands caused spikes in essential products and severe drops in non-essential items. Businesses, particularly small ones, suffered greatly due to decreased demand, supply chain issues, and cash flow problems. Supply chain disruptions arose from worldwide port congestion, factory closures, and transportation disruptions. Customer buying patterns underwent significant changes, leading to shortages in essential goods and abrupt shifts in spending habits. Nearly 75% of companies reported supply chain disruptions by early 2020, and this number was projected to rise. Manufacturing was hit hard due to halted activity in Wuhan, China, a vital global manufacturing hub. Supply chain visibility proved crucial during the pandemic, but most companies had limited visibility. The fragility of modern supply chains was evident, with thin safety stock margins and dependence on outsourcing. Supply chains need to be more resilient, with diversification, regional supply chains, and reduced reliance on just-in-time inventory. Manufacturing's cost dynamics shifted with automation advancements, reducing the labour cost justification for offshore production. Digital tools, such as AI and IoT, offered enhanced supply chain management and real-time interaction. Yet, algorithms used in supply chain management systems faced challenges during the pandemic, necessitating adaptation. Supply chain management was further complicated by the pandemic's unprecedented global impact. Companies were advised to actively interpret projections from supply chain models and consider supply network mapping. Businesses that had pre-pandemic supply network maps were better prepared to address disruptions, identifying vulnerabilities and solutions efficiently. Nonetheless, supply network mapping remains an underutilized practice due to its time-consuming and costly nature. 9-13 Define the problem described in this case study. What management, organization, and technology factors contributed to this problem? The problem described in this case study is the disruption of global supply chains due to the COVID19 pandemic. The pandemic led to significant shifts in consumer demand, disruptions in manufacturing, and logistical challenges. Many businesses faced shortages of essential products and drops in demand for non-essential items. The problem stemmed from the lack of supply chain resilience to handle such a large-scale disruption. Management Factors: Management factors contributing to the problem include inadequate supply chain visibility, a heavy reliance on outsourcing, and the adoption of "lean" principles that emphasize minimizing costs and safety stock. Many companies lacked the ability to respond quickly and flexibly to supply chain disruptions, which requires a higher degree of supply chain visibility. Additionally, the concentration of sourcing in a few countries left supply chains vulnerable to disruptions in those regions. Organization Factors: Organizations' failure to diversify suppliers and manufacturing locations, as well as their tendency to rely on top-tier suppliers for information, exacerbated the problem. Limited supply chain mapping and preparation for major disruptions further contributed to the issue. Technology Factors: While technology played a role in mitigating the problem, the algorithms used in supply chain management systems proved ineffective during the pandemic. The data inputs that these algorithms relied on were disrupted by the unprecedented global impact of the pandemic. 9-14 To what extent can information technology solve this problem? Explain your answer. Information technology can play a significant role in solving the supply chain disruption problem caused by events like the COVID-19 pandemic. Digital tools such as AI, advanced analytics, and IoT can enhance supply chain visibility, responsiveness, and adaptability. These technologies enable real-time interaction, improved forecasting, and better decision-making based on changing circumstances. Digital supply chain management systems can provide transparency and assist in identifying vulnerabilities in the supply chain. However, technology alone is not a complete solution. The algorithms used in supply chain management systems must be continually updated and adapted to handle unprecedented disruptions. Companies need to actively interpret projections and exercise flexibility in decision-making. Furthermore, supply network mapping is essential for effective supply chain resilience, but it's a timeconsuming and expensive process. 9-15 What management, organization, and technology issues should be addressed to redesign supply chains to deal with major disruptions such as the coronavirus pandemic? Management Issues: Companies need to prioritize supply chain visibility by investing in technologies that provide real-time tracking and monitoring of goods in transit. They should reassess their sourcing strategies and consider regional supply chains, diversification of suppliers, and contingency plans for disruptions. A shift away from excessive reliance on lean principles should be considered, allowing for greater safety stock and reserves. Organization Issues: Companies should emphasize supply network mapping to identify vulnerabilities and devise effective recovery plans. This process requires resources, time, and collaboration with suppliers across tiers. Organizations must also cultivate a culture of adaptability and flexibility, enabling quick decision-making and adjustment to unexpected events. Technology Issues: Firms should invest in advanced technologies such as AI, IoT, and advanced analytics to enhance supply chain management. The algorithms used in supply chain systems should be designed to accommodate unprecedented disruptions. Data inputs should be updated regularly to ensure accuracy in forecasting and decision-making. In summary, redesigning supply chains to deal with major disruptions requires a holistic approach that addresses management, organization, and technology factors. An emphasis on supply chain visibility, resilience, diversification, and flexibility is essential to mitigate the impact of events like the COVID-19 pandemic. Chapter 10: E-commerce: Digital Markets, Digital Goods. E-commerce Comes to the Dashboard: The Battle for the "Fourth Screen". The automotive industry is exploring the potential of turning car dashboards into the "fourth screen," after TV, computers, and mobile phones, to capture consumers' attention during their daily commutes. This concept offers opportunities for targeted advertising, on-the-go purchases, and data-driven services. Auto makers, along with tech giants like Google and Apple, are competing to control this dashboard display space. Challenges arise from outdated car models, as they lack the ability to update displays like smartphones. Google and Apple have introduced Android Auto and CarPlay, software that projects smartphone apps onto dashboard screens with voice controls. Some car manufacturers are integrating these solutions, while others like Ford and Daimler prefer to develop their own apps and system software. Privacy concerns and potential distractions for drivers are prominent issues, as the software collects personal data and requires driver attention even while driving. The battle for control over the "fourth screen" involves a complex interplay between auto makers, tech companies, and data privacy regulations. 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 1. E-commerce Trends and Impact on Traditional Markets: Commerce is being transformed due to the Internet's influence. e-commerce has expanded beyond traditional computer screens to mobile devices and even car dashboard displays. The increasing prevalence of online buying, selling, and advertising across different devices is changing how companies do business. 2. E-commerce Categories: E-commerce is divided into three major segments: retail goods, travel and services, and online content. These categories encompass a wide range of digital transactions, from purchasing physical products to booking travel and consuming digital content like music, videos, and articles. 3. Growth and Influence of E-commerce: E-commerce has experienced substantial growth over the years. It has become a significant portion of total retail sales, with online sales of retail goods accounting for a substantial share of global retail sales. This growth has been facilitated by the ubiquity of the Internet and advancements in technology. 4. Characteristics of E-commerce: Ubiquity: E-commerce is accessible from anywhere at any time, leading to a marketplace extended beyond traditional boundaries. Global Reach: The Internet allows transactions to cross cultural and national boundaries more conveniently, expanding the potential market size. Universal Standards: The technical standards of the Internet are universal, allowing any computer to connect with others regardless of technology platform. Richness: E-commerce delivers rich messages with text, audio, and video simultaneously, enabling more interactive communication. Interactivity: E-commerce permits two-way communication, engagement with customers, and peerto-peer communication. Information Density: The Internet increases information density, providing more information to market participants and making prices and costs more transparent. Personalization/Customization: E-commerce allows personalized marketing messages and customization of products based on user preferences. Social Technology: The Internet fosters user-generated content and social networking, allowing users to create and share content and engage in conversations. 5. Digital Goods: Digital goods, such as music, videos, movies, software, newspapers, magazines, and books, can be delivered over digital networks. They are intellectual property protected by copyright, patent, trademark, and trade secret laws. Digital goods have a unique cost structure, where the marginal cost of producing additional units is close to zero, but the cost of producing the first unit (content creation) is relatively high. The Internet's impact on the market for digital goods has transformed industries and disrupted traditional distribution channels. 6. Challenges and Opportunities: E-commerce has brought both challenges and opportunities to businesses. While digital markets offer flexibility, efficiency, reduced costs, and the potential to sell directly to consumers, they also introduce competition and the need to adapt to changing consumer behaviours. The growth of digital goods has revolutionized industries but also led to issues such as copyright enforcement and illegal piracy. Overall, the text provides insights into the evolution of e-commerce, the impact of digital markets, and the unique features of digital goods in today's global marketplace. 10-2: What are the principal e-commerce business and revenue models? The provided text describes various e-commerce business models and revenue models. Here's a summary of the key points: Types of E-commerce: 1. Business-to-Consumer (B2C) E-commerce: Involves retailing products and services to individual shoppers. Examples include Amazon, Walmart, and Apple Music. 2. Business-to-Business (B2B) E-commerce: Involves sales of goods and services among businesses. Example: Elemica's chemical and energy trading platform. 3. Consumer-to-Consumer (C2C) E-commerce: Involves consumers selling directly to other consumers. eBay is a prominent example of C2C e-commerce. E-commerce Business Models: 1. Portal: Websites like Yahoo, Facebook, and AOL that provide an integrated package of content, services, and search tools. Generate revenue through advertising, referral fees, and premium services. 2. E-tailer: Online retail stores that offer goods and services to customers. Can be pure online businesses or extensions of brick-and-mortar stores. 3. Content Provider: Distributes intellectual property such as digital video, music, photos, and text. Generates revenue through content sales or subscriptions. 4. Transaction Broker: Processes transactions traditionally handled in person, by phone, or by mail. Common in financial and travel services. 5. Market Creator: Builds digital platforms for buyers and sellers to interact. Examples include eBay and Amazon's Merchants platform. 6. Service Provider: Offers services online, such as photo sharing or cloud-based software. Salesforce and Google are examples of companies using this model. 7. Community Provider (Social Networks): Creates online environments for people with similar interests to connect, share, and communicate. Facebook, Pinterest, and LinkedIn are examples. E-commerce Revenue Models: 1. Advertising Revenue Model: Generates revenue by attracting a large audience and exposing them to advertisements. Major source of income for websites like Google, Facebook, and Yahoo. 2. Sales Revenue Model: Derives revenue from selling goods, services, or information to customers. Examples include Amazon, Netflix, and Apple's iTunes Store. 3. Subscription Revenue Model: Charges a fee for access to premium content or services on an ongoing basis. Examples include Netflix, Consumer Reports, and Match.com. 4. Free/Freemium Revenue Model: Offers basic services for free and charges for advanced or premium features. Used by Google, Pandora, and other online services. 5. Transaction Fee Revenue Model: Earns a fee for enabling or executing transactions. Common in online financial services and platforms like eBay. 6. Affiliate Revenue Model: Refers visitors to other websites in return for a referral fee or percentage of resulting sales. Used by MyPoints, Yelp, and Amazon's affiliate program. These models represent different ways that e-commerce businesses can generate revenue and deliver value to customers. The choice of model depends on the type of business, its target audience, and its value proposition. Case Study: Deliveroo: Global Food Delivery App Deliveroo, an online food delivery platform, connects customers with restaurants using freelance riders for efficient meal delivery across nearly 800 cities. Operating since 2013, Deliveroo employs technologies like real-time dispatch systems and Amazon Web Services (AWS) to optimize order dispatch and rider allocation based on location data. During the pandemic, its services gained prominence. Challenges stem from its business model, paying drivers below market rates, and categorizing them as independent contractors to avoid offering benefits. Legal issues in France, Belgium, and Australia highlight clashes between Deliveroo's contractor classification and its extensive control over riders. While Deliveroo's past success in attracting riders to work for low wages is noted, the company faces growing concerns about its long-term viability due to legal battles and evolving labour standards that could impact its growth and profitability Case Study Questions: 1. Based on your reading of the chapter, what kind of business model is Deliveroo using? Is it different from or the same as Uber? Deliveroo is using an on-demand delivery business model, connecting customers seeking meals with restaurants through freelance riders. This model is somewhat similar to Uber's, as both platforms rely on gig economy workers to provide services. However, there are differences, as Deliveroo is focused on food delivery while Uber offers various transportation services. 2. What technologies are used by Deliveroo to support its business model? Deliveroo employs several technologies to facilitate its business model. These include real-time dispatching systems, databases for order management, smartphones for riders, and cloud services like Amazon Web Services (AWS). AWS, in particular, enables Deliveroo to optimize order dispatch and resource allocation using machine learning algorithms 3. What's the difference between an employee and a contractor? An employee is a worker who is directly hired by a company and is entitled to certain benefits such as minimum wage, health insurance, sick leave, and other employment protections. A contractor, on the other hand, is usually an independent worker who provides services to a company but is not entitled to the same benefits as employees. Contractors have more flexibility in their work arrangements but lack certain legal protections. 4. What risk factors might limit Deliveroo's growth in the future? Several risk factors could potentially limit Deliveroo's growth in the future. Legal challenges regarding the classification of riders as contractors could lead to increased labour costs if courts require Deliveroo to treat them as employees, leading to potentially higher wages and benefits. Furthermore, increased public awareness and pressure for better working conditions for gig economy workers could impact Deliveroo's reputation and customer base. As labour standards evolve and gig economy regulations change, Deliveroo may face difficulties in maintaining its current business model, particularly if stricter regulations are imposed that require improved worker benefits and conditions. Additionally, competition from other food delivery platforms and changes in consumer preferences could impact Deliveroo's market share and growth prospects. 10-3: How has e-commerce transformed marketing? E-commerce has significantly transformed marketing by offering new avenues for identifying and engaging with potential customers at lower costs than traditional media. The internet has enabled marketers to utilize various strategies such as search engine marketing, data mining, recommender systems, and targeted email campaigns. The concept of long-tail marketing, catering to niche markets with low demand, has emerged due to the internet's ability to connect with specific audiences profitably. Behavioural targeting, a technique that tracks online behaviour to personalize ads, enhances marketing effectiveness but also raises privacy concerns. Social e-commerce, facilitated by social media platforms like Facebook, Twitter, and Instagram, has become a major driver of branding and marketing. Marketers leverage the social graph, representing individuals' online relationships, to understand consumer behaviours and preferences. Online communities provide opportunities for viral marketing and crowdsourcing, enabling companies to involve customers in product design and problem-solving. However, social media marketing is still evolving, with challenges in managing interactions and safeguarding brand reputation. 10-4: How has e-commerce affected business to-business transactions? E-commerce has significantly impacted business-to-business (B2B) transactions, revolutionizing how companies conduct trade among themselves. The B2B marketplace is substantial, with B2B ecommerce contributing a considerable portion of total B2B trade. Traditional methods of B2B transactions involved substantial human intervention and resource consumption. However, B2B ecommerce, facilitated by the internet, has the potential to automate processes, enhance efficiency, and save costs. Electronic Data Interchange (EDI) is a primary technology used for B2B e-commerce, enabling computer-to-computer exchanges of standard transactions like invoices, purchase orders, and shipping schedules. Despite technological advancements, around 80% of online B2B e-commerce still relies on proprietary EDI systems. Businesses use EDI to streamline document automation and implement continuous replenishment strategies. The internet and web technology have introduced new ways of B2B buying and selling. Electronic storefronts, akin to B2C commerce, enable businesses to sell to other businesses online. Additionally, extranets and electronic marketplaces link businesses for purchasing and sales transactions. Private industrial networks, where a firm connects with suppliers and partners, facilitate collaborative activities and communication. Net marketplaces, also known as e-hubs, offer digital platforms for buyers and sellers to engage in transactions, negotiations, and auctions. They can be industry-owned or operate independently, providing a centralized platform for various industries. Exchanges, independent third-party net marketplaces, connect numerous suppliers and buyers for spot purchasing. Exchanges primarily focus on direct goods and provide vertical markets for specific industries. However, despite their initial proliferation, many exchanges faced challenges, including competitive pricing, lack of long-term relationships, and limited services. Overall, B2B e-commerce has transformed traditional business transactions by providing opportunities for automation, efficiency improvement, and expanded business networks. 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? Mobile commerce (m-commerce) plays a vital role in the business landscape, and its impact continues to grow. Retail m-commerce has become a major force in e-commerce, projected to account for 65% of retail e-commerce revenues worldwide in 2020, with estimates indicating it could reach $4 trillion by 2023. This growth is particularly evident in mass-market retailing, digital content sales (music, TV shows, movies, e-books), and in-app sales to mobile devices. Location-based services are a cornerstone of m-commerce, fueled by GPS-enabled map services on smartphones. These services encompass geosocial, geoadvertising, and geoinformation services. Geosocial services help friends connect by checking into locations, while geoadvertising directs ads to users based on their GPS locations. Notably, location-based services are crucial for on-demand economy firms like Uber, Lyft, and Airbnb, enhancing user experience based on their geographic location. M-commerce extends beyond location-based services. Banks and credit card companies offer mobile services for managing accounts and making transactions. Mobile advertising is a rapidly growing sector, with platforms like Facebook and Google dominating the market. Retailers have embraced mcommerce with simplified mobile websites and apps for shopping and placing orders. Moreover, mobile app payment systems have emerged as an important fintech application, replacing traditional payment methods. These systems include NFC-driven contactless payments (e.g., Apple Pay, Google Pay), QR code payment systems (e.g., Walmart Pay), and peer-to-peer payment systems (e.g., Venmo, Zelle). In summary, m-commerce is reshaping business practices and customer interactions, ranging from retail to banking and advertising, providing convenient and innovative solutions through mobile devices. 10-6: What issues must be addressed when building an e-commerce presence? When building an e-commerce presence, there are several critical issues that must be addressed to ensure success. These issues range from understanding business objectives and choosing the right technology to mapping out the presence across various platforms. Here are some key points to consider: 1. Understanding Business Objectives: Before diving into e-commerce, it's crucial to have a clear understanding of your business objectives. Determine what you aim to achieve with your e-commerce presence, whether it's expanding your customer base, increasing sales, enhancing customer engagement, or all of the above. Your e-commerce strategy should align with these objectives. 2. Choosing the Right Technology: Selecting the right technology to support your e-commerce presence is vital. Consider factors such as the scalability of the platform, security features, ease of use for both customers and administrators, integration capabilities with other systems, and mobilefriendliness. 3. E-commerce Presence Map: Building an e-commerce presence involves more than just a website. You need to consider a range of platforms and activities, including your website, email campaigns, social media engagement, and offline media. Each platform has its unique capabilities and requirements, so develop a presence map that outlines your strategy for each one. 4. Mobile-Friendly Approach: E-commerce has shifted from being desktop-centric to mobile-centric. Ensure that your online presence is optimized for mobile devices, as a majority of users access websites, shop, and engage with content using smartphones and tablets. 5. Platform Considerations: Depending on the type of e-commerce presence you're establishing, such as websites, email campaigns, social media, or offline media, you'll need to choose appropriate platforms and tools for each. For instance, for websites, you'll need to consider design for desktop, tablet, and mobile versions. 6. Engagement Strategies: Develop strategies for engaging with customers on various platforms. This could involve search engine marketing, display ads, affiliate programs, sponsorships, and more. Effective engagement can lead to increased traffic and conversions. 7. Offline Media Integration: Some businesses use a multiplatform marketing approach where offline media (such as print ads) refer customers to online platforms. Ensure there's consistency in branding and messaging across all touchpoints. 8. Timeline and Milestones: Create a timeline with milestones for your e-commerce development. This helps you set realistic goals and track progress over time. Having a well-defined timeline can also keep your team focused and organized. 9. Customer Experience: A seamless and positive customer experience is crucial for e-commerce success. Ensure that your website is user-friendly, intuitive to navigate, and provides secure and convenient payment options. 10. Testing and Optimization: Regularly test and optimize your e-commerce presence. Use analytics to monitor user behaviour, identify areas for improvement, and make necessary adjustments to enhance user experience and drive better results. 11. Legal and Security Considerations: E-commerce involves handling customer data and transactions, so you must address legal and security aspects. Implement security measures to protect customer information and comply with relevant data protection regulations. Building a successful e-commerce presence requires a holistic approach that considers business goals, technology, customer engagement, and user experience. By addressing these issues and following a systematic strategy, you can create a strong and effective online presence that meets the needs of your target audience. Case Study: An iDEAL Solution to the Single Online EU Market The case study delves into the complexities of e-commerce behaviour within the European Union (EU). Eurostat's data reveals diverse online shopping patterns across EU countries, with varying percentages of consumers making purchases and willingness to buy from other member states. "Geoblocking" practices, which involve country-specific restrictions, hinder cross-border shopping. Market segmentation based on location impacts product pricing, particularly in industries like travel. The influence of IP addresses on pricing is noted, emphasizing the importance of IP location in determining cost differences. Challenges like language barriers, customer care, return policies, and fraud deter cross-border shopping. The Dutch iDEAL payment system is examined as a model, raising questions about the potential for a Europe-wide payment solution. The EU's initiatives, such as the "Buying Online" directive and geoblocking elimination, seek to foster a unified digital market. Overall, the study underscores the complexities and efforts involved in creating a seamless crossborder e-commerce landscape within the EU. 10-15 Douglas is a perfume shop that has branches in many European countries. Go to their European website (www.douglas.eu) and choose a country. Now choose a perfume and look at the online Douglas shops in other European countries. Is there a price difference? Would you buy your perfume in the online shop of another country? What problems might you experience? 10-15 Douglas Perfume Shop: Price Difference: Upon visiting Douglas's European website (www.douglas.eu) and selecting a specific country, you can explore the prices of perfumes in their online shops across various European countries. It's possible that there might be price differences for the same perfume in different countries. Buying in Another Country's Online Shop: Deciding whether to buy a perfume from the online shop of another country depends on various factors, including the price difference, potential shipping costs, and any language or customer support barriers. Potential Problems: When buying from another country's online shop, potential problems could include higher shipping fees, longer delivery times, language barriers, different return policies, and potential challenges with customer support. 10-15 You are thinking of opening an online shop in the Netherlands. Would you include iDEAL as a payment option? What factors would you take into consideration before taking a decision? 10-15 Opening an Online Shop in the Netherlands: When considering whether to include iDEAL as a payment option for an online shop in the Netherlands, several factors should be taken into consideration: 1. Popularity: iDEAL is widely used in the Netherlands, making it a preferred payment method for Dutch consumers. 2. Customer Preference: Dutch consumers are familiar with and trust iDEAL, which can enhance their shopping experience. 3. Competitive Advantage: Offering iDEAL can give your online shop a competitive edge by catering to local preferences. 4. Integration: Integration with iDEAL may require technical setup and possibly additional costs. 5. Alternatives: While iDEAL is popular, considering other payment options is important to accommodate diverse customer preferences. 10-15 The world is, of course, bigger than the European Union. Does the legislation of the European Union give the same rights to those who buy online from within the European Union as opposed to those who live in the European Union but buy online from, let's say, a shop in China? 10-15 Legislation and Consumer Rights: The legislation of the European Union grants certain rights to consumers within the EU, regardless of the location of the online shop they purchase from. However, when purchasing from a shop outside the EU, such as one in China, consumers might not enjoy the same level of protection and rights. Different legal frameworks, regulations, and enforcement mechanisms can impact consumer rights, such as those related to returns, warranties, and privacy. Please note that the specific details and circumstances might vary based on current regulations and the individual context of each case. Chapter 11: Managing Knowledge and Artificial Intelligence. Artificial Intelligence Beats Radiologists in Reading Mammograms. The case study discusses the significant challenges posed by breast cancer detection using mammograms and highlights the potential of artificial intelligence (AI) to enhance accuracy. Despite being a leading tool, mammograms can produce false negatives and false positives, impacting diagnoses. A new AI-based system was developed by a team of researchers to read breast X-ray images more effectively than human radiologists. The AI model was trained on a vast dataset of known breast cancer diagnoses, demonstrating improved performance in reducing false negatives and false positives. Comparisons with human radiologists revealed the AI system's superior accuracy. Although there were instances where the AI missed cancers detected by radiologists, the study underscores the potential of AI in enhancing mammogram interpretation. The application of AI techniques in medical diagnosis illustrates the value of technology in improving knowledge acquisition, utilization, and business processes, leading to improved organizational performance. The potential implications for radiologists' practices and the future impact on mammogram analysis and diagnosis are significant areas of consideration. 11-1: What is the role of knowledge management systems in business? Knowledge management systems play a vital role in business by enhancing the creation, storage, transfer, and application of knowledge within organizations. In today's information-driven economy, knowledge has become a critical source of value and competitive advantage. Knowledge management involves processes that transform data into information, information into knowledge, and knowledge into actionable insights. Organizations acquire knowledge through data collection, trial and error, feedback, and expert networks. Once acquired, knowledge is stored in databases and expert systems. Dissemination of knowledge is facilitated by collaboration tools, portals, email, and social business tools. However, knowledge becomes valuable when applied to practical problems and integrated into decision-making processes. Collaboration, communities of practice, and supportive office environments contribute to building organizational and management capital. There are three major types of knowledge management systems: enterprise-wide systems that collect, store, and distribute digital content; knowledge work systems that aid in discovering new knowledge; and "intelligent" techniques such as data mining, expert systems, machine learning, and more. These systems collectively contribute to enhancing organizational learning, decision-making, and overall performance. 11-2: What is artificial intelligence (Al) and machine learning? How do businesses use Al? Artificial Intelligence (AI) is a broad field encompassing the development of computer systems designed to replicate human intelligence, while Machine Learning (ML), a subset of AI, focuses on enabling computers to learn and improve from data. Businesses harness AI for various purposes to enhance operations and decision-making processes. Expert systems utilize domain expertise and predefined rules to guide decision-making, while ML techniques analyze extensive datasets to identify patterns, aiding tasks like fraud detection and recommendation systems. Neural networks, inspired by the human brain's structure, excel in tasks such as image and speech recognition. Natural Language Processing (NLP) powers applications like sentiment analysis, chatbots, and language translation, and computer vision interprets visual information. Genetic algorithms optimize complex tasks such as supply chains, and intelligent agents autonomously perform specific actions. While AI hasn't reached human-level intelligence, its progress is driven by factors like data availability, computing power, algorithm advancements, and investments, reshaping various aspects of business functions. Interactive Sessions: Organizations Will AI Kill jobs? The advent of artificial intelligence (AI) is bringing about a transformative change akin to the impact of the World Wide Web. Industries across the board are embracing AI to handle various tasks like customer service, technical support, advertising, and medical diagnosis. AI's efficiency, effectiveness, and ability to work around the clock make it valuable for routine and judgment-based tasks. While AI, supplemented by technologies like big data and cloud computing, is expected to create value and reduce costs, concerns arise about its potential impact on job stability. Surveys indicate that a substantial portion of the public and tech executives believe AI will affect jobs in the future. Estimates vary, with some projections suggesting that a significant percentage of the global workforce could be displaced by technology by 2030. However, historical data and technological trends show that new waves of technology may initially lead to temporary job losses but ultimately create new openings. This effect has been observed with advancements like the invention of ATMs, which transformed the roles of bank tellers rather than rendering them obsolete. Collaboration between humans and machines is anticipated to yield optimal outcomes. The impact of AI on jobs will vary by country and industry, with positions requiring lower education levels being more susceptible to replacement by AI. Adequate training is essential for workers to transition to other career paths, but challenges remain in ensuring that everyone has access to training and maintains comparable wages after switching jobs. Studies show a U-shaped relationship between automation and age, with middle-aged individuals being more likely to lose jobs due to AI. Despite past concerns about technology causing mass unemployment, historical evidence suggests that technology has, over time, created more jobs than it has eliminated. Case Study Questions: 1. What are the various view s on the impact of AI on jobs? What do you think will happen in your country? The impact of AI on jobs is a topic of ongoing debate, with various viewpoints emerging. Some experts and researchers believe that AI will lead to significant job displacement, particularly in industries with routine and repetitive tasks. They argue that automation powered by AI could replace a substantial portion of the workforce, leading to unemployment and shifts in the job market. On the other hand, there's a perspective that AI will create new opportunities and job roles. This viewpoint suggests that as AI technology advances, new types of jobs will emerge that are centred around developing, implementing, and maintaining AI systems. These roles may require skills such as data analysis, machine learning, programming, and problem-solving. The impact of AI on jobs will likely vary by country based on factors like technological adoption rates, workforce skills, and industry composition. 2. Some people think that AI does not kill jobs but transforms business models. Do you agree? Why or why not? The idea that AI transforms business models rather than solely eliminating jobs has substantial merit. AI has the potential to optimize and streamline various business processes, leading to increased efficiency and improved decision-making. While certain tasks might be automated, the focus often shifts to higher-value tasks that require creativity, critical thinking, and human interaction. For instance, AI can handle routine customer inquiries, allowing human employees to engage in more complex and personalized customer interactions. Additionally, AI's capabilities can enable the creation of entirely new products, services, and industries, generating new opportunities for employment. Thus, it's plausible that AI will reshape business models and redefine the nature of jobs rather than simply leading to massive job losses. 3. How would AI potentially add more jobs than it eliminates? AI's potential to add more jobs than it eliminates rests on the concept of "job churn." As AI automates certain tasks, individuals working in those roles may need to transition to new roles that require different skills. For instance, as routine tasks become automated, employees can focus on higherlevel tasks that involve creativity, critical thinking, and emotional intelligence—areas where humans still excel. Moreover, the development, implementation, and maintenance of AI systems require specialized skills and expertise. This leads to the creation of new roles in fields like data science, machine learning, AI ethics, and algorithm development. Furthermore, AI's ability to enhance productivity and drive innovation can lead to the growth of industries that were previously non-existent or underdeveloped, thereby generating new job opportunities. Overall, while there may be job displacement initially, AI's transformative potential can contribute to a net increase in employment opportunities over time. 11-3: What types of systems are used for enterprise-wide knowledge management, and how do they provide value for businesses? Enterprise-wide knowledge management systems encompass various types of systems that aid organizations in managing and utilizing different forms of knowledge. These systems provide significant value for businesses by enabling efficient organization, retrieval, and sharing of both structured and unstructured information. Here are the types of systems used for enterprise-wide knowledge management and their value for businesses: 1. Enterprise Content Management Systems (ECM): ECM systems manage structured and semistructured knowledge, improving business processes through centralized storage, retrieval, and external information integration. 2. Digital Asset Management Systems: These manage unstructured digital data, ensuring consistent branding and efficient content usage. 3. Locating and Sharing Expertise: Modern systems help identify experts, fostering knowledge sharing, while social networking tools expand external knowledge access. 4. Learning Management Systems (LMS): LMSs enable effective employee learning, combining various modes and MOOCs to align skills with business needs. Enterprise-wide knowledge management systems encompass a variety of tools and technologies that address different forms of knowledge within organizations. These systems offer substantial value by enhancing collaboration, improving decision-making, and facilitating skill development. By effectively managing knowledge assets, businesses can achieve operational efficiency, innovation, and adaptability in a rapidly evolving business landscape. 11-4: What are the major types of knowledge work systems, and how do they provide value for firms? The enterprise-wide knowledge systems we have just described provide a wide range of capabilities that can be used by many if not all the workers and groups in an organization. Firms also have specialized systems for knowledge workers to help them create new knowledge and to ensure that this knowledge is properly integrated into the business 1. Enterprise-Wide Knowledge Systems: These encompass structured and semi structured knowledge, aiding diverse workers with capabilities for storage, retrieval, and integration. 2. Knowledge Workers and Systems: Knowledge workers, such as researchers and designers, require specialized systems with powerful tools, graphics, and data access to enhance their productivity and decision-making. 3. Examples of Knowledge Work Systems: CAD systems automate design, virtual reality (VR) and augmented reality (AR) systems provide immersive simulations, enhancing industries like vehicle design and medical procedures Examples of Knowledge Work Systems: 1. Computer-Aided Design (CAD) Systems: These systems automate design processes, allowing designers to create, modify, and test designs digitally, reducing the need for physical prototypes and saving time and resources. 2. Virtual Reality (VR) Systems: VR systems use interactive graphics to create immersive simulations that closely resemble real-world situations. They find application in fields like vehicle design, offering 360-degree views of digitally constructed components and aiding in design validation. 3. Augmented Reality (AR): AR overlays digital data and images onto the physical environment, enhancing perception. It's used in various contexts, including medical procedures like image-guided surgery and industries like military training, engineering design, and consumer design. Case Study: Are Self-Driving Cars Ready for the Road? The question of whether self-driving cars are truly ready for the roads is a subject of widespread debate. Major automakers like Ford, General Motors, Nissan, and Tesla are heavily invested in developing autonomous vehicle technology, with billions poured into research and development. Ride-hailing companies such as Uber and Lyft view driverless cars as crucial for long-term profitability due to the potential elimination of labour costs. The technology has reached a stage where vehicles equipped with sensors, cameras, lidars, GPS, radars, and advanced computer systems can process and analyse vast amounts of data to control steering, acceleration, and braking in real-time. Despite the promising advancements, challenges and controversies persist. While self-driving cars have made appearances on roads in various locations, including California, Arizona, Michigan, and global cities like Paris, London, Singapore, and Beijing, there are concerns about their readiness. Autonomous vehicle technology's defenders argue that the technology has the potential to significantly reduce the more than 40,000 annual traffic-related deaths in the US, most of which are caused by human error. However, the technology is far from perfect. The tragic incident involving a self-driving Uber vehicle in Tempe, Arizona, where a pedestrian was killed, underscored the risks and led to suspension of testing. Autonomous vehicles rely on a plethora of technologies, including sensors, cameras, lidars, GPS, radar, computer systems, machine learning, and computer vision. While progress has been made, challenges remain. Complex weather conditions, chaotic environments with congested streets, and situations requiring nuanced decisions, such as the "trolley problem," pose difficulties for self-driving cars. Additionally, ensuring effective communication between autonomous vehicles and humans, as well as solving security concerns in networked systems, remains a challenge. The road ahead for fully autonomous vehicles is uncertain. While some anticipate that a computerdriven car capable of handling all situations as well as a human is decades away, a more realistic expectation is the integration of self-driving technology into human-driven cars. Current models are being equipped with advanced object recognition, emergency braking, and autonomous features that improve road safety. Analysts predict the first deployment of self-driving technology will likely be in robot taxi services operating in limited conditions and areas, offering shared self-driving rides with predetermined pickup and drop-off points. This gradual approach reflects the ongoing quest to balance technological advancements with safety and regulatory concerns. 11-13 What are the management, organizational, and technology challenges posed by selfdriving car technology? Self-driving car technology presents a host of challenges across management, organizational, and technological aspects. From a management perspective, there's a need for effective project management to coordinate various teams working on sensors, software, safety features, and more. Organizational challenges arise from the need to integrate autonomous technology into existing business models and manage the transition to autonomous vehicles. Workforce reskilling and potential job displacement due to automation are also organizational concerns. On the technological front, ensuring the robustness of AI algorithms for real-world scenarios, managing cybersecurity to prevent hacking, addressing unpredictable road conditions, and achieving reliable vehicle-to-vehicle communication are all significant technology challenges. 11-14 Are self-driving cars good business investments? Explain your answer. Whether self-driving cars are good business investments depends on various factors. While the potential benefits include reduced accidents, increased transportation efficiency, and innovative business models (such as ride-hailing services), there are substantial costs and risks. The technology development is expensive, including research, testing, and regulatory compliance. Moreover, safety and legal concerns could result in expensive lawsuits. Additionally, consumer adoption and trust in the technology are uncertain. Businesses must carefully assess the long-term potential benefits against the short-term financial and regulatory risks. 11-15 What ethical and social issues are raised by self-driving car technology? Self-driving car technology introduces ethical dilemmas such as the "trolley problem," where AI systems may need to make decisions that result in harm to some to save others. Social issues include potential job displacement for drivers in the transportation industry. Privacy concerns arise due to the data collection and sharing necessary for autonomous vehicles. Questions about accountability arise when accidents occur; who is liable, the manufacturer, software developer, or the owner? Addressing these ethical and social issues requires collaboration between policymakers, industry stakeholders, and the public. 11-16 Will cars really be able to drive themselves without human operators? Should they? The feasibility of fully self-driving cars without human operators is still a matter of ongoing technological development. While significant progress has been made, challenges like handling complex weather conditions and ensuring robust decision-making in all situations remain. The question of whether they should drive without human operators involves complex considerations. The potential benefits include reduced accidents and increased accessibility, especially for individuals with mobility challenges. However, ethical and safety concerns, the impact on the job market, and the need for human intervention in exceptional cases must also be addressed. The decision should consider striking a balance between technological advancement and ensuring public safety and wellbeing. Chapter 12: Enhancing Decision making. Opening Case Study: Eastspring: Targeted Enterprise System Building The case study discusses the transformation journey of Eastspring Investments, a company owned by Prudential Corporation Asia, specializing in managing investment funds. Originally established in 1994, the company faced technological challenges due to the complexity of its applications and legacy systems. By 2013, it had numerous applications and batch jobs in place. Recognizing the systemic issues arising from specific business needs across regional units, Eastspring embarked on a technology overhaul. In 2015, the company reviewed its business processes and created a Target Operating Model (TOM) to standardize operations across regions. A strategic decision was made to adopt comprehensive enterprise software rather than focusing solely on best-in-breed solutions. Eastspring opted to reconfigure its processes to align with the new software, with critical, important, and unimportant processes categorized. Critical processes were retained in-house, important processes were outsourced, and unimportant ones were addressed using off-the-shelf products. Key areas like portfolio and order management, data management, and back-office processing were revamped. Vendors were chosen for each area, including Aladdin from Blackrock for portfolio management, GoldenSource for data management, and BNP Paribas for back-office processes. The cloud-based Aladdin system provided hosted services and real-time messaging, reducing the need for in-house infrastructure. The project's first phases were successfully implemented regionally, enabling Eastspring to enhance risk reporting and understanding for managed funds. The company expanded globally, achieving over 25% growth in funds under management since 2013. While facing challenges like decreased dividends in 2020 due to the pandemic, the company is witnessing signs of recovery in Southeast Asia and anticipates a promising future. 12-1: What are the different types of decisions, and how does the decision-making process work? The evolving landscape of decision making in businesses encompasses both management and lower-level employees, with information systems enabling access to information for informed decisions. The monetary value of improved decision making is demonstrated through examples, emphasizing the cumulative effect of enhancing numerous small decisions. Decisions are categorized as unstructured, structured, or semistructured, with their prevalence varying across organizational levels. Unstructured decisions involve judgment and insight, structured decisions follow established procedures, and semistructured decisions incorporate elements of both. The decision-making process involves stages of intelligence, design, choice, and implementation, allowing for adaptation if chosen solutions don't yield desired outcomes. 12-2: How do information systems support the activities of managers and management decision making? Information systems provide support to managers and their decision-making activities by enhancing decision quality, improving returns on investment, and ultimately boosting profitability. However, not all decisions can be improved by information systems due to various factors. Managers have multifaceted roles within organizations, encompassing activities such as decision-making, report writing, meeting attendance, and more. While the classical model of management outlines formal functions like planning and organizing, behavioural models emphasize the dynamic and informal nature of managerial behaviour. Contemporary behavioural analysis by Henry Mintzberg identified ten managerial roles that can be categorized into three groups: interpersonal, informational, and decisional. These roles involve acting as figureheads, leaders, liaisons, information conduits, and decision makers. Information systems can support most of these roles, but not all, due to differences in information quality, management filters, and organizational culture. Information quality is crucial for high-quality decisions, and systems must provide accurate, relevant, and timely information. Management filters influence decision-making, as managers interpret information through cognitive biases, risk perceptions, and intuition. Organizational inertia and politics also play a role, with resistance to change and internal power dynamics affecting decision outcomes. In high-velocity decision environments, such as algorithm-driven trading or internet searches, software algorithms handle intelligence, design, choice, and implementation aspects of decision- making. Humans are excluded from the process due to the rapid pace, highlighting the importance of well-designed and monitored systems to prevent adverse outcomes. 12-3: How do business intelligence and business analytics support decision making? The Business Intelligence Environment. Business intelligence (BI) and business analytics (BA) form the foundation for decision support systems in organizations. BI refers to the infrastructure for collecting, storing, cleaning, and analyzing data from various sources, including structured and unstructured data, to make relevant information available to managers. BA, on the other hand, focuses on the tools and techniques used to analyze and understand data, such as online analytical processing (OLAP), statistics, models, and data mining. BI and BA involve integrating data streams from across the organization into a coherent set of data and then using analytical tools to derive insights for better decision-making. These terms are defined by technology vendors and consulting firms, with leading providers including Oracle, SAP, IBM, Microsoft, and SAS. Both BI and BA solutions now offer cloud and mobile versions to cater to diverse business needs. The business intelligence environment includes six key elements: 1. Data from the business environment: Dealing with structured and unstructured data from various sources, including big data, and integrating and organizing them for analysis. 2. Business intelligence infrastructure: This encompasses the database system that captures relevant data for the business. Data might be stored in transactional databases, enterprise data warehouses, or data marts. 3. Business analytics tools: Software tools for analyzing data, generating reports, answering managerial queries, and tracking business performance using key indicators. 4. Managerial users and methods: Human decision makers use managerial methods to interpret and analyze data, set business goals, and measure progress using key performance indicators and strategic analyses. 5. Delivery platform (MIS, DSS, ESS): The results of BI and BA are delivered through Management Information Systems (MIS), Decision Support Systems (DSS), and Executive Support Systems (ESS) to different levels within the organization. 6. User interface: Visual representations of data, such as graphs, charts, dashboards, and maps, help users understand insights quickly. Business analytics software provides interactive dashboards and mobile access for easy data visualization and sharing. Business intelligence and analytics together empower organizations to gather insights from data, enhance decision-making processes, and ultimately drive business success. Business Intelligence and Analytics Capabilities. Business intelligence and analytics systems offer a range of functionalities to deliver accurate and timely information to decision makers and help them make informed decisions. There are six key analytic capabilities provided by these systems. 1. Production Reports: Predefined reports based on industry standards, presenting standardized information. 2. Parameterized Reports: Users input parameters to filter and analyse data, revealing specific insights. 3. Dashboards and Scorecards: Visual tools displaying customized performance metrics in graphical format. 4. Ad Hoc Query, Search, and Report Creation: Users generate personalized reports and queries based on their questions. 5. Drill Down: Users start with summaries and navigate to detailed data for deeper analysis. 6. Forecasts, Scenarios, and Models: Perform predictive forecasting, scenario analysis, and indepth statistical modelling. Predictive Analytics: Predictive analytics is a pivotal capability within business intelligence analytics that holds the potential to shape future trends and behaviors by harnessing the power of statistical analysis, data mining techniques, historical data, and informed assumptions. This technique enables organizations to forecast probabilities and outcomes, facilitating enhanced decision-making processes. By identifying measurable variables that contribute to predictive models, businesses can ascertain the likelihood of specific events or behaviors occurring. For instance, insurance companies employ predictive analytics to evaluate variables such as age, gender, and driving history in determining driving safety for auto insurance policies. This amalgamation of predictors constructs a model that provides insights into future probabilities with a certain degree of reliability. Major companies like FedEx leverage predictive analytics to discern customer responses to pricing changes and new services, achieving accuracy rates ranging from 65% to 90%. This capability finds its application across various domains including sales, marketing, finance, healthcare, and credit scoring, where it significantly enhances the accuracy of decision-making processes. Big Data Analytics: The emergence of big data analytics within the realm of business intelligence has ushered in a new era of insight extraction from copious amounts of data generated by both private and public sectors. This analytics approach delves into vast datasets, including information gleaned from social media, customer transactions, sensors, and machine outputs. A notable application in e-commerce involves personalized product recommendations based on individualized customer behaviors, a significant departure from traditional aggregate group behaviors. Through the utilization of big data, businesses can tailor their recommendations more precisely, leading to increased customer spending and loyalty. Public sectors are also leveraging big data analytics to foster the development of "smart cities" that harness digital technology for informed decision-making in urban planning, public services, and utilities. This paradigm shift towards data-driven governance has enhanced the efficiency of cities and enabled holistic problem-solving on an unprecedented scale. Operational Intelligence and Analytics: Operational intelligence serves as the driving force behind day-to-day business activities, underpinning operational decisions that are vital for efficient organizational functioning. In this context, operational intelligence is characterized by the real-time analysis of data streams emanating from the Internet of Things (IoT), encompassing web activities, sensors, gauges, smartphones, and monitoring devices. This real-time analysis enables businesses to gain insights into activities both within and outside the organization, facilitating swift and informed decision-making. For instance, oil and gas companies have embraced operational intelligence to predict equipment failures and implement predictive maintenance schedules. Notably, this method enables organizations to proactively address potential breakdowns before they occur. Additionally, transportation companies such as France's SNCF have harnessed operational intelligence to enhance the reliability of their services, utilizing sensor data to monitor train conditions, speed, and track conditions. The integration of real-time analysis into operational decision-making showcases its pivotal role in optimizing organizational processes and achieving heightened efficiency. Interactive Session: organizations Predictive Maintenance in the Oil and Gas Industry. The oil and gas industry, known for its susceptibility to unplanned downtime and substantial losses due to equipment malfunctions, has found a powerful ally in predictive maintenance facilitated by big data analytics. Within this sector, the financial impact of even marginal productivity improvements can be immense. Industries such as liquefied natural gas (LNG) facilities incur losses amounting to millions of dollars from a single unproductive day due to equipment failures. To mitigate such losses, predictive maintenance leverages vast datasets produced by sensors in oil fields and pipelines. These datasets, often comprising over 40,000 data tags in offshore production platforms, are analyzed to predict equipment failures and address issues proactively, circumventing costly unscheduled maintenance. This predictive approach, coupled with the Internet of Things (IoT) data, monitors equipment condition using automated condition monitoring and advanced data analytics, detecting signs of deterioration by comparing vital equipment statistics with historical data. Predictive maintenance empowers decision-makers to schedule maintenance activities strategically, minimizing disruptions while prioritizing essential repairs. One of the prominent collaborations in this domain is the partnership between BP and General Electric (GE), where GE's sensors linked to the Predix cloud platform were equipped in BP's oil wells. This initiative provides real-time information through data collection and analysis, optimizing maintenance scheduling and enhancing machine efficiency. The application, Plant Operations Advisor (POA), emerged from this collaboration, further enhancing BP's production operations by preventing unplanned downtime and facilitating rapid responses to issues. Addressing pipeline risk management, GE's pipeline-management software suite offers a comprehensive solution by integrating critical data for safe pipeline management. By assessing internal and external factors, this suite provides real-time visual representations of risk areas, empowering operators with informed decisions for deploying field service crews along pipelines. Royal Dutch Shell PLC is another notable example, utilizing predictive maintenance applications developed on platforms like Microsoft Azure and C3 IoT to monitor equipment performance and predict maintenance needs. This technology is being scaled to monitor vast numbers of sites and equipment pieces, thereby highlighting the industry's growing reliance on predictive analytics to optimize maintenance strategies, minimize downtime, and enhance operational efficiency. Case Study Questions: 1. Why is predictive maintenance so important in the oil and gas industry? What problems does it solve? Predictive maintenance holds significant importance in the oil and gas industry due to its ability to address the challenges of unplanned downtime and equipment malfunctions. The sector is heavily reliant on complex machinery and equipment, and any unexpected failures can lead to substantial financial losses, safety hazards, and environmental risks. For instance, a single day of downtime on an LNG facility can result in multimillion-dollar losses. Predictive maintenance solves these problems by leveraging data analysis to predict equipment failures before they occur. This proactive approach enables timely maintenance interventions, minimizes disruptions to operations, enhances safety, reduces maintenance costs, and ultimately improves the overall efficiency and reliability of the industry's operations. 2. What is the role of the Internet of Things (IoT) and Big Data analytics in predictive maintenance? The Internet of Things (IoT) and Big Data analytics play pivotal roles in predictive maintenance in the oil and gas industry. IoT involves the integration of sensors and devices with the capability to collect real-time data from equipment and assets. These sensors monitor crucial parameters such as temperature, pressure, sound, and vibrations. Big Data analytics then processes this massive amount of data to identify patterns and anomalies that indicate potential equipment malfunctions. By analyzing historical data and real-time conditions, predictive models can be developed to forecast the likelihood of failures. The combination of IoT and Big Data analytics enables the industry to continuously monitor equipment health, detect deviations from normal operating conditions, and predict maintenance requirements well in advance 3. How did BP and Royal Dutch Shell's predictive maintenance applications change business operations and decision making? BP and Royal Dutch Shell's predictive maintenance applications have significantly transformed business operations and decision-making processes. In the case of BP, its partnership with General Electric (GE) led to the creation of the Plant Operations Advisor (POA) application. This application empowers engineering teams to respond rapidly to real-time issues, preventing unplanned downtime and improving operational efficiency. Additionally, BP's predictive maintenance initiative has facilitated informed decision-making by providing insights into equipment performance and maintenance needs, enabling strategic scheduling of maintenance activities. Similarly, Royal Dutch Shell's adoption of predictive maintenance applications has allowed the company to monitor equipment performance, predict maintenance needs, and optimize maintenance strategies. By leveraging data-driven insights, both companies have shifted from reactive to proactive maintenance approaches, enhancing asset reliability, reducing costs, and bolstering operational excellence. 4. Give an example of how predictive maintenance systems could be used in another industry An example of predictive maintenance in another industry is aviation. Airlines operate fleets of aircraft that require continuous maintenance to ensure safe and efficient operations. The aviation industry could employ predictive maintenance systems by equipping aircraft with sensors that monitor various parameters such as engine performance, structural integrity, and component wear. Data collected by these sensors would be analysed using Big Data analytics and machine learning algorithms to predict potential mechanical issues or failures. Airlines could then schedule maintenance activities during routine layovers based on predictive insights, reducing unscheduled maintenance downtime and improving aircraft safety and reliability. Predictive maintenance could also enable airlines to optimize maintenance practices, reduce operational costs, and enhance the overall passenger experience. Interactive Session: Management GIS Help Land O’Lakes Manage Assets Strategically. Land O'Lakes, a prominent agricultural cooperative serving the dairy industry, has strategically utilized geographic information systems (GIS) to enhance its operations and decision-making processes. Founded in 1921, Land O'Lakes is a major cooperative with a broad member base and an extensive product portfolio. Recognizing the significance of efficient asset management in the agricultural industry, the co-op established a Strategic Asset Management (SAM) team around seven years ago. The team employs GIS to provide valuable insights to its members on matters concerning the optimal positioning of facilities such as feed lots, grain elevators, and crop nutrient facilities. The primary function of the SAM team is to assist co-op members in optimizing their asset locations by leveraging GIS. For instance, GIS tools allow the team to visualize and analyze trade areas, assess facility proximity, and identify overlaps between facilities. By using GIS technology, Land O'Lakes gains insights into how its member facilities are positioned relative to each other and to competitors' locations within a given trade area. This information aids in strategic decision-making, ensuring that storage facilities and assets are situated optimally to serve customers efficiently. GIS tools are also employed to analyze transportation logistics and optimize distribution routes. By assessing drive-time routes within specific trade territories, the SAM team can identify opportunities for route planning improvements. Additionally, GIS supports field data collection, enabling the team to evaluate the capabilities, age, and potential expansion of co-op member facilities. Survey 123 for ArcGIS is used to capture comprehensive facility data consistently, allowing informed recommendations for facility improvements and expansions. Land O'Lakes' utilization of ArcGIS, developed by ESRI, enables the integration, storage, analysis, and display of geographic information, aiding decision-making processes. The co-op leverages GIS to help co-op members make informed decisions about asset placement, transportation models, and distribution facilities. The consolidation and construction of facilities in the agricultural industry necessitate careful assessment of trade area dynamics and customer demand. GIS assists the SAM team in evaluating the capacity of operations and ensuring that facilities align with market trends and future customer needs. The SAM team's efforts encompass recommendations on changing transportation and distribution models to improve efficiency and reduce costs. By conducting transportation studies, the team evaluates current operating expenses and anticipates future transportation costs. These insights are integrated into financial analyses for capital investment decisions. Additionally, the team conducts market analyses to understand product demand trends, growth opportunities, competitor impacts, and market dynamics. The utilization of GIS by the SAM team has proven beneficial for both day-to-day operations and long-term strategic planning, enabling Land O'Lakes to strategically manage its assets and remain competitive in the agricultural industry. 12-4: How do different decision-making constituencies in an organization use business intelligence? Different decision-making constituencies in an organization use business intelligence (BI) to support their respective roles and responsibilities. This aligns with the varying levels of information needs and decision complexity within the organization. Here's how different constituencies utilize BI: 1. Senior Executives: Senior executives primarily use BI to monitor and gain insights into overall firm activities and performance. They rely on visual interfaces such as dashboards and scorecards to get a high-level view of key performance indicators (KPIs) and critical metrics. These visual tools provide a quick overview of how the organization is performing against strategic goals. The balanced scorecard method is commonly used to focus on measurable outcomes across financial, business process, customer, and learning and growth dimensions. Senior executives benefit from summary reports and graphical representations that help them make informed decisions for strategic planning and resource allocation. 2. Middle Managers and Analysts: Middle managers and analysts play a more hands-on role in BI, immersing themselves in data analysis and modeling. They create and customize their own reports using sophisticated analytics and models to identify patterns, model scenarios, and test hypotheses. Decision-support systems (DSS) are used to support semistructured decision-making. These systems rely on mathematical and analytical models, including "what-if" analysis and sensitivity analysis. Middle managers and analysts perform in-depth data exploration by entering queries and manipulating data along different dimensions. They also use tools like pivot tables to gain multidimensional insights and identify correlations in business data. 3. Operational Employees: Operational employees, along with customers and suppliers, are more likely to rely on predefined reports and prepackaged insights. These employees use BI tools to access information relevant to their specific roles and responsibilities. Operational managers monitor key aspects of daily business operations, such as machine downtime, daily sales, or website traffic. They receive exception reports that highlight abnormal conditions, allowing them to take corrective actions as needed. These reports help operational employees track performance and respond to issues in real time. In summary, BI caters to various decision-making constituencies by providing tailored information and tools that align with their roles and decision-making needs. From senior executives seeking high-level overviews to middle managers and analysts delving into data analysis and modeling, and operational employees relying on predefined reports, BI systems cater to diverse needs within the organization. These systems enhance decision-making by providing timely, relevant, and actionable insights across different levels of the organization. 12-1 What are the different types of decisions, and how does the decision-making process work? • List four structured decisions that a manager at the operational level in an organization is likely to have to make. • According to the classical model of management, what are the five roles of management? • Explain what is meant by the term management filter. ✓ ✓ ✓ ✓ ✓ Types of decisions: Structured, semistructured, unstructured. Decision-making process: Intelligence, design, choice, implementation, monitoring. Four operational level decisions: Reordering inventory, assigning tasks, scheduling shifts, approving expenses. Classical model roles: Planning, organizing, coordinating, controlling, directing. Management filter: Filtering information as it moves up the organization's hierarchy. 12-2 How do information systems support the activities of managers and management decision making? • Describe the nature and value of a business analytics toolset. • Explain how predictive analytics works and what it uses. ✓ ✓ Business analytics toolset: Set of software tools for data analysis, modeling, and reporting. Predictive analytics: Analyzing historical data to predict future outcomes. 12-3 How do business intelligence and business analytics support decision making? • Explain how management information systems and transaction processing systems interact. • Distinguish between a production report and a parameterized report. • List three different production reports that might be generated by a sales department. • Explain how a business would use data from the Internet of Things. ✓ ✓ ✓ ✓ MIS and TPS interaction: TPS provides data, MIS processes and summarizes data. Production report vs parameterized report: Fixed format vs customizable report. Three sales department reports: Sales by product, sales by region, sales by customer. IoT data use: Monitoring, analyzing, and optimizing processes using data from connected devices 12-4 How do different decision-making constituencies in an organization use business intelligence? • List each of the major decision-making constituencies in an organization and describe the types of decisions each makes. • Describe how MIS, DSS, or ESS provide decision support for each of these groups. • Define and describe the balanced scorecard method and business performance management. ✓ ✓ ✓ Decision-making constituencies: Senior executives, middle managers, analysts, operational employees. MIS, DSS, ESS support: Operational monitoring, data analysis, strategic monitoring. Balanced scorecard: Framework for measuring performance across financial, process, customer, learning dimensions. Discussion Questions 12-5 As a manager or user of information systems, what would you need to know to participate in the design and use of a DSS or an ESS? Why? ✓ ✓ Knowledge needed for DSS/ESS design: Understanding organizational goals, KPIs, data sources, reporting needs. Importance of participation: Ensures systems align with business strategy and provide relevant insights 12-6 If businesses used DSS and ESS more widely, would managers and employees make better decisions? Why or why not? ✓ ✓ Impact of wider DSS/ESS use: Likely to improve decisions by providing timely, relevant insights. Reasons: Better access to data, enhanced analysis, alignment with strategic goals. 12-7 How much can business intelligence and business analytics help companies refine their business strategy? Explain your answer. ✓ ✓ Business intelligence and strategy refinement: Significant impact by providing data-driven insights and trends. Explanation: BI enables organizations to identify market trends, customer preferences, and operational efficiencies. Management Decision Problems 12-8 Dealerships for Subaru and other automobile manufacturers keep records of the mileage of cars they sell and service. Mileage data are used to remind customers of when they need to schedule service appointments, but they are used for other purposes as well. What kinds of decisions does this piece of data support at the local level and at the corporate level? What would happen if this piece of data were erroneous, for example, showing mileage of 130,000 instead of 30,000? How would it affect decision making? Assess its business impact. ✓ ✓ Mileage data decisions: Service reminders, warranty validation, maintenance planning. Impact of erroneous data: Incorrect service scheduling, potential customer dissatisfaction, financial losses. 12-9 Applebee's is one of the largest casual dining chains in the world, with more than 1,700 locations throughout 19 countries. The menu features beef, chicken, and pork items as well as burgers, pasta, and seafood. Applebee's CEO wants to make the restaurant more profitable by developing menus that are tastier and contain more items that customers want and are willing to pay for despite rising costs for agricultural products. How might business intelligence help management implement this strategy? What pieces of data would Applebee's need to collect? What kinds of reports would be useful to help management make decisions on how to improve menus and profitability? ✓ ✓ ✓ BI for menu improvement: Analyzing customer preferences, identifying popular items, tracking costs. Data needed: Sales data, customer feedback, ingredient costs. Useful reports: Sales by item, customer feedback analysis, cost-effectiveness of menu items. Case Study: Should an Algorithm Make Our Decisions? The case study highlights the increasing use of predictive algorithms in decision-making processes, raising questions about their implications and fairness. These algorithms, such as the one used to determine Darnell Gates's probation status, play a role in decisions ranging from prison sentences to welfare and tax fraud detection. However, the inner workings of these algorithms are often obscure, leading to concerns about transparency and accountability. The use of algorithms has been criticized in various instances, as they can perpetuate biases and inequalities, as shown by the case of a health care algorithm that disproportionately impacted black patients. While some algorithms like the one in Bristol, England, are coupled with human oversight and transparency efforts, there is growing pushback from civil rights organizations and community advocates. The case underscores the need to strike a balance between algorithmic predictions and human decision-making, particularly as automated systems become more influential in shaping important outcomes. Achieving fair and reliable outcomes requires thoughtful consideration of the role of algorithms and the human factors that influence decision-making processes. 12-13: What are the problems in using algorithms and automated systems for decision making? Using algorithms and automated systems for decision-making can introduce several problems. Firstly, these systems can reinforce biases present in historical data, leading to unfair or discriminatory outcomes. Additionally, the complexity of algorithms often makes it difficult for individuals to understand how decisions are made, raising concerns about transparency and accountability. Automated systems can also oversimplify complex situations, neglecting critical nuances that human judgment would consider. Moreover, reliance on algorithms can reduce human involvement in decision-making processes, potentially undermining the ability to consider multiple perspectives and adapt to dynamic situations. 12-14: What management, organizational, and technology factors have contributed to the problem? Several factors contribute to the problems associated with algorithmic decision-making. Management decisions to implement such systems without proper oversight or understanding of their limitations can lead to unintended consequences. Organizational pressures for efficiency and cost reduction may prioritize automation over careful consideration of potential biases. Furthermore, technology factors like biased training data and the complexity of algorithms themselves can contribute to biased or unfair outcomes. 12-15 Should automated systems be used to make decisions? Explain your answer. The decision of whether to use automated systems for decision-making depends on the context and the nature of the decisions being made. While algorithms can provide valuable insights and predictions, they should not replace human judgment entirely. It's essential to strike a balance, leveraging algorithms for data-driven insights while ensuring human oversight, transparency, and accountability. In situations where fairness, ethics, and complex judgment are crucial, human involvement remains essential to make nuanced decisions that consider the broader context and potential biases. Chapter 13: Building Information Systems. Opening Case Study: Vinci Energies Builds a New Mobile Employee Time Sheet App. The case study focuses on Vinci Energies, a growing professional services company that offers solutions for construction, energy, and information technology industries. With a vast and diverse workforce spread across multiple countries, Vinci Energies faced challenges in efficiently tracking project costs, especially for employees working remotely. To address these issues, Vinci developed an app called MOBITIME using the SAP Cloud Platform. The app aimed to streamline the process of capturing time sheet data, project costs, and activities for multiple projects. MOBITIME, accessible on tablets and mobile phones, allowed employees to enter data from any location and transmit it to update the SAP S/4HANA system. This transformation involved not only technological implementation but also changes in business processes and job functions. The case raises questions about how MOBITIME met Vinci Energies' information requirements and how the new system impacted the company's business operations. It highlights the importance of integrating information systems to improve project tracking, increase efficiency, and enhance decision-making capabilities in a project-based organization. 13-1: How does building new systems produce organizational change? Systems Development and Organizational Change. Building new information systems can lead to organizational change by impacting various aspects of the organization, including its structure, processes, roles, and culture. The introduction of a new information system goes beyond implementing new technology; it involves reevaluating and redesigning the way the organization operates. There are different degrees of organizational change that can result from building new systems: 1. Automation: Implementing technology to assist employees in performing tasks more efficiently by reducing manual effort and increasing accuracy. 2. Rationalization: Streamlining standard operating procedures and processes to eliminate inefficiencies and improve overall productivity. 3. Business Process Redesign: Analyzing, simplifying, and restructuring workflows to create more efficient and effective ways of performing tasks. 4. Paradigm Shift: Undertaking a radical transformation that rethinks the entire business model, leading to fundamental changes in the organization's structure, operations, and core strategies. Building new information systems can trigger these forms of change by encouraging organizations to rethink their processes, roles, and even their core business models. The rewards of successful change can include increased efficiency, higher productivity, improved quality, and competitive advantages. However, such changes can also be difficult to orchestrate and may face resistance from employees accustomed to existing ways of working. Careful planning, communication, and change management strategies are essential to successfully implement organizational change through new information systems. Business Process Redesign. DP World, a prominent global port operator headquartered in Dubai, operates marine and inland terminals worldwide, offering technology-driven solutions to its clients. With a significant presence across six continents and a market capitalization of approximately $12 billion, DP World manages 78 terminals in about 40 countries, handling up to 174,000 containers daily. In its pursuit of continuous improvement, DP World leverages technology to enhance cargo handling and streamline operations. Previously reliant on manual and paper-based processes, which were time-consuming and errorprone, DP World sought to enhance customer service by simplifying processes and reducing transaction times. For instance, customers often had to submit multiple versions of documents to different departments, causing delays and duplications. By implementing IBM's WebSphere MQ technology, DP World created a centralized system that facilitated seamless document sharing among departments, enhancing efficiency. DP World's partnership with Oracle further drives digital transformation through cloud applications, aiming to standardize and optimize various business processes. Utilizing AI, IoT, and blockchain technology, DP World aims to create value, improve logistics, and enhance efficiency across its global operations. AI facilitates smart planning, chatbots assist tasks, and IoT monitors assets. Blockchain offers secure and transparent tracking for goods, addressing concerns like terrorism and illegal trade. DP World believes that these technologies will make the global supply chain more efficient and sees blockchain as transformative. The organization strives to remain a leader in the digitized global trade landscape and is integrating Oracle Fusion ERP to enhance consistency across its operations. Case Study Questions: 1. What is business process redesign? Why might BPR fail in an organization? Business process redesign (BPR) refers to the radical overhaul and restructuring of existing business processes to achieve significant improvements in efficiency, effectiveness, and overall performance. BPR involves rethinking and reengineering processes from the ground up to eliminate inefficiencies, bottlenecks, and redundancies. BPR might fail in an organization due to factors such as resistance to change from employees, lack of top management support, inadequate planning and analysis, insufficient communication, unrealistic expectations, and failure to align the redesigned processes with the organization's strategic goals. 2. Do you think the IBM WebSphere MQ technology adopted by DP World was a good solution? What advantages can you identify? Yes, the adoption of IBM WebSphere MQ technology by DP World was a good solution. The advantages of using this technology include: - Centralization: The technology allows for the creation of a centralized system that sends validated versions of documents to all related departments. This reduces duplication and delays in the process. - Seamless Integration: WebSphere MQ is a middleware product that enables communication between different applications. DP World seamlessly connected its existing systems using this middleware, simplifying the overall system. - Flexibility: WebSphere MQ is flexible, robust, and scalable, ensuring that the system can adapt to changing needs and requirements. - Efficiency: By streamlining document sharing and communication between departments, the technology significantly reduced the time required to complete processes. 3. Do you think AI could have other uses in port operations? Yes, AI can have various other uses in port operations. Apart from the mentioned applications, AI can be employed for predictive maintenance of equipment, optimizing cargo loading and unloading, enhancing security through real-time threat detection, managing inventory and supply chain operations, optimizing resource allocation, and even improving customer service through AI-driven chatbots for inquiries and support. 4. Explain IoT technology and the possible problems that may arise in implementing it. IoT (Internet of Things) technology involves connecting physical objects, devices, and sensors to the internet, enabling them to collect and exchange data. In port operations, IoT can be used to monitor conditions and locations of assets, track cargo, optimize routes, and more. Possible problems in implementing IoT include: - Data Security and Privacy: IoT involves transmitting and storing sensitive data, raising concerns about data breaches and privacy violations. - Scalability: As the number of connected devices increases, managing and scaling the infrastructure becomes challenging. - Compatibility: Ensuring compatibility and integration between different IoT devices and systems can be complex. - Reliability: IoT systems must be reliable to prevent disruptions in operations due to technical failures. 5. What are the four types of organizational change? Give an example of each type from this case. The four types of organizational change are: 1. Strategic Change: This type involves changes in the organization's overall direction and strategy. In the case, DP World's shift towards incorporating technology-driven solutions to enhance its port operations is an example of strategic change. 2. Structural Change: Structural change pertains to changes in the organizational structure and hierarchy. DP World's implementation of a centralized system using IBM WebSphere MQ technology is an example of structural change. 3. Technological Change: This change involves adopting new technologies and tools to improve processes. DP World's utilization of AI, IoT, and blockchain technology for various aspects of its operations exemplifies technological change. 4. Cultural Change: Cultural change focuses on changing the organization's values, beliefs, and norms. DP World's emphasis on using technology to drive digital transformation and innovation reflects a cultural change toward embracing technological advancements. Business Process Redesign: The concept of business process redesign, as highlighted in the DP World case study, represents a crucial approach adopted by numerous businesses seeking to enhance their operations through the integration of information technology. This strategy involves rethinking and modifying existing business processes to achieve increased efficiency and effectiveness. To navigate these changes, organizations embrace business process management (BPM), a multifaceted framework involving tools and methodologies to assess, design, and optimize processes. The BPM cycle involves identifying processes for improvement, analyzing existing processes, designing new processes, implementing the redesigned processes, and maintaining continuous measurement for ongoing optimization. The process design team scrutinizes existing procedures, identifies bottlenecks, and streamlines the process to create a more efficient "to-be" version. Implementation includes translating the new process into procedures, incorporating necessary technology, and monitoring for potential problems. BPM aims to reduce time, cost, and inefficiencies, ultimately enhancing customer service and organizational value. However, achieving successful BPM can face challenges related to organizational culture and change management. Various software tools from providers like IBM, Oracle, and TIBCO aid in documenting, modeling, enforcing, and measuring the effectiveness of redesigned processes. An illustrative example of this approach is evident in British Telecoms Group's utilization of Pegasystems' BPM software to integrate customer data and streamline processes after an acquisition, leading to improved decision-making and enhanced customer interactions. 13-2 What are the core activities in the systems development process New information systems are developed to address organizational problems or capitalize on opportunities, and the process of creating these solutions is known as systems development, which involves activities such as systems analysis, design, programming, testing, conversion, and production and maintenance, often carried out in a sequential manner with the possibility of some activities being repeated or occurring concurrently based on the chosen approach. System Analysis: Systems analysis involves analyzing organizational problems and identifying their causes, specifying solutions, and determining information requirements for a potential information system solution; the systems analyst examines the existing organization and systems, identifies primary data users, and details problems within existing systems through documents, observations, and interviews, often leading to the development of new information systems or improvements to existing ones; feasibility studies are conducted to assess whether the proposed solution is financially, technically, and organizationally viable; the systems analyst defines information requirements by identifying who needs what information, where, when, and how, aiming to avoid faulty requirements analysis which can lead to systems failure or high development costs; certain problems may not require an information system solution but rather managerial adjustments, training, or procedural refinements. System Design: Systems design encompasses creating the blueprint or model for an information system by detailing the specifications needed to fulfill functions identified during systems analysis, addressing managerial, organizational, and technological components; various designs for information systems are possible, with the superiority of a design determined by how effectively it meets user requirements within technical, organizational, financial, and time constraints; end user involvement in the design process is crucial to ensure the system aligns with business priorities and information needs, enhancing user understanding and acceptance and minimizing the risk of system failure. Completing the Systems Development Process: The final stages of the systems development process involve programming where system specifications are translated into software code, testing which includes unit testing, system testing, and acceptance testing to ensure correct functionality, conversion strategies such as parallel, direct cutover, pilot study, and phased approach for transitioning to the new system, production where the system is reviewed, and maintenance to correct errors and improve efficiency in the operational system. 13-3: What are the principal methodologies for modelling and designing systems? Structured Methodologies There are alternative methodologies for modelling and designing systems. Structured methodologies and object-oriented development are the most prominent. Structured Methodologies. The principal methodologies for modelling and designing systems include structured methodologies, which are step-by-step, top-down approaches focusing on processes and data flow diagrams (DFDs), and utilize tools like data dictionaries, process specifications, and hierarchical structure charts to depict system components, processes, and relationships. Object-Oriented Development (OOD). Object-Oriented Development (OOD) is a methodology that overcomes the limitations of structured methods by focusing on objects as the fundamental units of system analysis and design, combining data and processes. In OOD, objects encapsulate data and operations, and interactions among objects drive system functionality. OOD introduces the concepts of class and inheritance, allowing objects to belong to classes and inherit features from superclasses. The development process in OOD is iterative and incremental, involving analysis to identify objects and their interactions, design to define object behaviors and relationships, and implementation through reusable software objects. OOD offers the potential for reduced development time and costs through reusability of software objects and the creation of object-oriented frameworks. 13-4 What are alternative methods for building information systems? Systems differ in term s o f their size and technological complexity and in term s of the organizational problems they are meant to solve. A number of systems building approaches have been developed to deal with these differences. This section describes these alternative methods: the traditional system s life cycle. Alternative methods for building information systems include: 1. Prototyping: Building initial versions to gather user feedback and refine requirements. 2. Rapid Application Development (RAD): Fast development through user workshops and iterative prototyping. 3. Agile Development: Flexibly developing software in short iterations with user feedback. 4. Incremental Development: Building the system in small increments, adding features gradually. 5. Spiral Model: Iteratively developing with risk assessment and cycles of planning, building, testing, and evaluation. 6. Extreme Programming (XP): Customer-focused development with continuous testing and pair programming. 7. DevOps: Bridging development and operations for continuous deployment and automation. 8. Lean Development: Eliminating waste and focusing on value delivery and optimization. 9. Kanban: Visualizing workflow and tasks to manage work and achieve continuous improvement. Prototyping: Prototyping involves building a preliminary system version for user evaluation, iteratively refining it based on feedback, and potentially adopting the prototype as the final system; while user involvement is high and iterative, hasty prototypes might overlook vital development steps and scalability issues. Application Software Packages, Software Services, and Outsourcing. Organizations utilize commercial application software packages and cloud software services (SaaS) for standardized functions; outsourcing involves hiring external vendors to build, operate, or maintain information systems, which can lead to cost savings, global collaboration, but also hidden costs and potential loss of control. 13-5 What are new approaches for system building in the digital firm era? In response to swiftly evolving technologies and business landscapes, organizations are embracing quicker and less formal systems development methods, especially for mobile apps. Alongside utilizing software packages and online services, businesses increasingly rely on rapid application development, collaborative application design, agile development, automated software testing, and low-code no-code approaches to enhance efficiency. Rapid Application Development (RAD), Agile Development, Automated Software Testing, and DevOps: The term rapid application development (RAD) denotes the creation of functional systems within a short timeframe, allowing for adaptability as the project progresses. RAD involves visual programming, iterative prototyping of key system elements, automated code generation, and close collaboration among end users and information system specialists. Joint application design (JAD) accelerates requirement generation and initial system design by involving users and specialists in interactive sessions. Agile development prioritizes rapid software delivery by breaking large projects into smaller subprojects completed in short iterations called sprints. Cross-functional teams work on each sprint, regularly releasing working software with continuous user feedback. Testing occurs continuously, and collaboration, flexibility, and response to change are emphasized. Automated software testing tools streamline testing processes, reporting results and comparing them to previous runs. DevOps fosters collaboration between developers and IT operations, promoting a fast and stable workflow throughout the development lifecycle. Low-code development uses visual modelling for faster application delivery, while no-code tools require minimal to no coding, catering to non-IT users but potentially leading to integration and security challenges. Interactive Session Technology: McAfee Streamlines with Automated Software Testing. McAfee, a global provider of security software, sought to enhance its software testing processes amid its numerous systems projects. With a global SAP ERP system as its foundation, McAfee aimed to migrate to SAP S/4HANA and implement SAP Revenue Accounting and Reporting, while adopting an agile methodology for all IT projects. Facing resource constraints, project complexity, and a need for quick adaptation, McAfee looked to enhance testing efficiency. Transitioning from manual testing, McAfee turned to automated testing to keep pace with rapid development and testing requirements. The company's automation team comprised automation engineers and business analysts who evaluated automated testing solutions. They selected Worksoft Certify, a code-free test automation tool that offers prebuilt SAP testing capabilities and is designed for complex business processes. By implementing Worksoft Certify, McAfee streamlined its testing and business process automation within its SAP environment. The tool automated manual tasks, performance testing, and testing of system changes. As a result, McAfee achieved substantial savings in terms of both time and costs. Approximately 2,500 hours of manual effort were saved, equivalent to $200,000, while also minimizing the need for ongoing application maintenance. McAfee's adoption of automated testing not only streamlined its testing processes but also enhanced its ability to deliver quality software efficiently, meeting the demands of its agile approach and dynamic IT environment. Case Study Questions: 1. Why would a company such as McAfee benefit from automated software testing? McAfee benefits from automated testing due to efficiency, accuracy, scalability, cost savings, and support for continuous integration. 2. What management, organization, and technology factors did McAfee address in moving to automated software testing? McAfee addressed factors like resource allocation, collaboration, skills, tool selection, and integration. 3. Was Worksoft Certify a good solution for McAfee? Why or why not? Yes, Worksoft Certify was a good solution due to prebuilt SAP testing, complex process support, code-free usability, scalability, and integration. 4. How did automated software testing change the way McAfee ran its business? Automated testing led to efficiency gains, cost savings, better quality, enhanced agility, resource reallocation, and streamlined operations. Mobile Application Development: Designing for a Multiscreen World. The growing demand for seamless mobile access to information and transactions has led businesses to develop a variety of mobile solutions, including websites, web apps, and native apps. Decisions on technology, like native or web apps, and strategies for mobile websites are vital in mobile app development. Mobile websites are simplified versions for easy navigation on small screens, while web apps, accessible via browsers, cater to diverse devices. Native apps offer performance and offline benefits but need complex development due to OS variations. Mobile app development presents distinct challenges due to smaller devices favouring touch interactions, needing task-specific optimization and efficient resource use. User experience in mobile differs from desktop usage, requiring focus on screen space, bandwidth, and gestures. Companies design dedicated interfaces for different devices, but this approach raises cost concerns. Responsive design adapts layouts based on devices, reducing the need for separate designs. HTML5 supports cross-platform mobile app creation, streamlining solutions. CASE STUDY: Pick n Pay's Cloud Migration to Enhance Business Intelligence. Pick n Pay, a prominent retail business in South Africa, embarked on a cloud migration project to enhance their Business Intelligence (BI) capabilities. Facing challenges with their existing infrastructure, the BI team sought a solution that would provide a unified platform for all transactional data and enable future innovations like AI and machine learning. Collaborating with Amazon Web Services (AWS) as their cloud partner, the project went live in 2018 after migrating localized data to the cloud. The migration brought both benefits and challenges. While achieving cost reduction and efficiency improvement objectives, the project incurred some cost overruns due to the learning curve associated with AWS. The importance of collaboration with implementation partners for necessary training and skills development was emphasized, and AWS provided expertise and training to enhance the Pick n Pay team's cloud skills. The successful implementation not only improved business efficiency but also enabled innovations such as enhanced data science, AI, and machine learning capabilities, enhancing customer loyalty programs, targeted promotions, and multi-channel retailing. Case Study Questions: 13-14 What problem did the company face from technology and organizational perspectives and what impact did this have on the business? From a technology perspective, Pick n Pay faced challenges with their existing Business Intelligence (BI) infrastructure, involving physical on-premises data centers that couldn't meet the business requirements. This impacted data capabilities, business agility, and customer experience. Organizational challenges included migrating localized data to the cloud and understanding the intricacies of cloud hosting. These challenges hindered the BI team's ability to provide optimal insights for improved decision-making, affecting the business's competitiveness. 13-15 What solutions did Pick n Pay explore? Explain the process followed to identify the initial requirements. Pick n Pay explored cloud-based solutions to address their BI challenges. They partnered with Amazon Web Services (AWS) to migrate their data and applications to the cloud. The process began with discussions between the BI team and SAP to define project requirements. Evaluation factors included costs, network considerations, resourcing, skills required, user experience, security, and disaster recovery. The team identified AWS as a strategic partner due to its collaboration with SAP and the benefits of cloud-first approaches. 13-16 Do you think the company made the right decision by outsourcing to AWS? Explain your answer. Yes, outsourcing to AWS was a sound decision for Pick n Pay. Cloud migration provided cost savings, scalability, and flexibility. The dynamic nature of cloud infrastructure aligned with the business's need for on-demand resources. Additionally, AWS's collaboration with SAP and certification for SAP applications ensured compatibility and expertise. While the project incurred some cost overruns, these were attributed to the learning curve, and the advantages of the cloud environment, agility, and innovation opportunities outweighed the challenges. 13-17 What challenges did Pick n Pay experience during the system implementation? During the system implementation, Pick n Pay encountered challenges related to cost overruns due to the unfamiliarity with AWS, requiring a shift in mindset and expertise. Skill gaps within the company's team and the South African market necessitated AWS's training and certification to ensure effective cloud integration. The company also faced difficulties in understanding cloud concepts and required skills for recruitment and internal skills development 13-18 What were the benefits of the project for Pick n Pay? The project benefited Pick n Pay by reducing costs and improving operational efficiency. However, the most significant benefit was the agility of the cloud environment, which enabled innovations in data science, AI, and machine learning. These innovations enhanced customer loyalty programs, personalized promotions, intelligent sourcing and supply chain solutions, and multi-channel retailing. The cloud migration not only addressed immediate challenges but also positioned the business for future growth and competitiveness through technological advancements. Chapter 14: Making the Business Case for Information Systems and Managing Projects Al-Asasyah, also known as Basic Electronics Company Ltd., faced challenges due to its fast growth and outdated legacy systems that hindered data accuracy, consistency, and accessibility. These legacy systems couldn't support efficient communication among different operational units, hindering the company's expansion. In 2014, the company decided to replace these systems with a modern ERP solution. An internal team composed of managers, experienced staff, and operational unit representatives took on the responsibility to manage the challenging ERP implementation project. To ensure the success of the project, Al-Asasyah paid particular attention to project execution and management. They carefully selected the SajayaERP solution and meticulously planned each phase, including scope determination, estimation of costs, development of a detailed implementation schedule, change management strategies, customization needs, and report requirements. The execution phase involved prototypes running in various sectors, enabling users to familiarize themselves with the system's features and provide valuable feedback. The project's importance was highlighted by the need for effective business benefits and organizational change management. Al-Asasyah's success stemmed from its clear understanding that robust project management and attention to execution details were critical. The company's approach of assembling a knowledgeable project team, collaborating with specialized partners, and implementing the new system in manageable phases contributed to the project's success. Key questions to consider are: Why did this project succeed, and why was project execution a focal point? How did proper project management and execution techniques contribute to the implementation's success? This project succeeded due to factors like a dedicated project team, thorough planning, phased implementation, and effective change management. Project execution was crucial as it translates plans into reality, minimizes risks, meets stakeholder expectations, realizes benefits, and adapts to changes. Proper execution techniques ensured the ERP implementation's success by aligning the project with business needs and delivering tangible outcomes. 14-1 How should managers build a business case for the acquisition and development of new information systems? Building a solid business case for acquiring and developing new information systems involves a systematic approach. Managers must first identify the organizational problem the system aims to solve and then conduct a thorough analysis of costs, benefits, and associated risks. Justification and alignment with the organization's strategic goals are essential, illustrating how the proposed system supports long-term growth and competitiveness. Alternative solutions should be compared, emphasizing the chosen solution's value. The potential impact on the organization's culture, processes, and roles should be addressed, alongside financial justification and alignment with the IT plan. The business case should enable informed decisionmaking by providing a clear value proposition and demonstrating how the new system fits into the organization's broader information technology strategy. The Information System Plan: A comprehensive information systems plan is crucial for organizations to prioritize and align information systems projects with overall business goals. This plan, developed by the Chief Information Officer and approved by top management, outlines the strategic systems integrated into high-level planning. It provides a roadmap for systems development, detailing the rationale, current system status, new developments, management strategy, implementation plan, and budget. The plan links corporate objectives with specific systems projects, sets target dates and milestones, and outlines necessary organizational changes. By understanding the larger context of all systems, organizations can evaluate proposals for individual systems effectively, making a strong case for new projects within the plan's framework. Portfolio Analysis. Portfolio analysis plays a crucial role in evaluating and optimizing information systems projects for organizations. This analysis involves assessing the risk and benefit profile of the organization's entire portfolio of information systems investments, including projects, infrastructure, and contracts. Similar to financial portfolios, each project carries its own set of risks and benefits. The goal is to achieve a balance between risk and return across the portfolio, aligning with the firm's business strategy. Industries with high information intensity may opt for high-risk, high-benefit projects to stay technologically current, while non-information-intensive sectors focus on high-benefit, low-risk projects. Portfolio analysis aids in identifying optimal investment mixes, ensuring alignment with business objectives, and achieving better returns on IT assets. Scoring Models: Scoring models are valuable for project selection when multiple criteria need consideration; they assign weights to system features and calculate weighted totals to aid decision-making. For instance, in Table 14.2, a company is comparing two ERP systems based on criteria and associated weights. The model calculates vendor scores by multiplying each function's requirement percentage with its weight, revealing that ERP System B holds the highest total score. Determining Solution Costs and Benefits The business case for an information system involves assessing its value as an investment for the company. Beyond aligning with strategic goals and user requirements, the financial perspective revolves around return on invested capital. Costs and benefits of systems can be tangible or intangible. Total cost of ownership (TCO) analysis identifies IT expenditures beyond initial purchase costs. Capital budgeting models measure value using cash flows and assess investments' financial worth. Methods like payback, ROI, NPV, and IRR are employed. However, financial models may overlook social and organizational aspects, including disruptions from new systems and intangible benefits, which are important for a comprehensive evaluation of investments. 14-2 What are the objectives of project management, and why is it so essential in developing information systems? Information systems projects often face a high failure rate due to time and budget overruns or systems not meeting expectations, leading to unrealized benefits and problem-solving challenges; effective management and execution of projects play a pivotal role in determining their success or failure. Runaway Projects and System Failure. Poorly managed projects in the private sector often result in underestimated budgets and delivery times, with missing functionality common in system implementations. Research shows large software projects exceeding budgets by 66% and schedules by 33%. More than half of businesses surveyed experienced IT project failures in the past year. Such projects face consequences like excessive costs, time delays, technical performance issues, and failure to achieve anticipated benefits. Failed systems are often unused or require parallel manual systems. Design flaws might miss essential business requirements or result in unhelpful information formats, complex user interactions, and confusing interfaces, such as the U.S. Navy's navigation incident. Inaccurate or inconsistent data and inaccessible information fields can compound system failures. Project Management Objectives. Project management involves applying knowledge, skills, tools, and techniques to achieve specific business goals within defined time and budget limits. Activities include planning, risk assessment, resource estimation, organization, task assignment, execution control, progress reporting, and result analysis. Five major variables—scope, time, cost, quality, and risk—are central to project management. Scope defines project boundaries; time determines completion duration and schedules; cost incorporates expenses for resources and components; quality evaluates how well objectives are met; and risk addresses potential problems that could hinder project success, impacting time, cost, quality, or completion. Effective project management ensures projects stay on track and meet objectives while navigating these variables. 14-3 What are the principal risk factors in information systems projects? The principal risk factors in information systems projects include project size, project structure, and the level of technical expertise of the project team. Larger projects, involving more resources, complexity, and organizational units, have a higher risk of failure. Projects with well-defined and structured requirements are less risky than those with fluid and changing requirements. The expertise of the project team in handling the technology and tools is crucial; lack of familiarity can lead to technical issues and delays. Organizational factors, such as the complexity of information requirements and the extent of the project's impact across the organization, also contribute to the overall risk in information systems projects. Change Management and the Concept of Implementation. The introduction or modification of an information system brings about significant behavioural and organizational effects, influencing power dynamics and authority structures within a company, often leading to resistance and potential failure of the system; thus, addressing change management is essential for successful information systems projects. The Concept of Implementation: To effectively manage the organizational change accompanying the introduction of a new information system, focus on the implementation process, encompassing the adoption, management, and normalization of the innovation; the systems analyst plays a key role as a change agent, reshaping organizational configurations, interactions, job roles, and power dynamics to ensure successful acceptance and adjustment to the new system. The Role of End Users. During system implementation, involving end users and gaining management support enhances the process, allowing users to shape the system, fostering positive reactions upon completion, and improving solutions by incorporating user expertise; however, the traditional communications gap between users and information systems specialists can lead to divergent priorities, problem-solving approaches, and vocabularies, often causing misunderstanding and project failure due to mismatched goals and user exclusion. Management Support and Commitment. Having management support and commitment for an information systems project is crucial for its success, as it garners positive perception from users and technical staff, secures necessary resources, encourages participation, recognizes efforts, ensures funding, and facilitates organizational changes, with active executive sponsors being a leading factor in project success. Change Management Challenges for Business Process Management, Enterprise Applications, and Mergers and Acquisitions. The challenges of innovation and implementation contribute to a high failure rate in enterprise application and business process management projects, often resulting from poor change management practices that neglect employees' concerns, while mergers and acquisitions face similar issues due to complex systems integration and organizational change requirements, leading to a significant percentage of failures and unrealized benefits. 14-4 How can project risks be managed? Various methodologies for project management, requirements gathering, and planning, along with strategies for involving users and managing organizational change, can mitigate project risks and enhance system success by identifying and addressing implementation issues, adapting to unforeseen problems, and fostering communication and collaboration among project teams. Managing Technical Complexity. To manage projects involving intricate technology, internal integration tools and experienced project leaders with both technical and administrative expertise are crucial for anticipating problems, fostering smooth team collaboration, and ensuring success. High technical competence among team members, frequent meetings, and the acquisition of external expertise where necessary also contribute to effective management of technical complexity. Formal Planning and Control Tools. In managing large projects, formal planning and control tools, such as Gantt charts and PERT charts, are valuable for documenting and monitoring project plans. Gantt charts provide a visual representation of project activities' timing and resource requirements, while PERT charts depict task interrelationships and dependencies. Both techniques aid in identifying bottlenecks, sequencing tasks, and tracking progress against budgets and timelines, facilitating effective project management and problem detection. Increasing User Involvement and Overcoming User Resistance. In projects with less structured and undefined requirements, user involvement is essential at all stages, often requiring users to actively participate, take on leadership roles, and assist with installation and training. User resistance to change, stemming from varying impacts on different users, may persist despite participation efforts. Implementation strategies should address both user involvement and counter implementation tactics, where users deliberately oppose system adoption. Strategies to overcome resistance include participation, education, training, management policies, incentives, and improving user interfaces, with a focus on resolving organizational issues before system implementation. Designing for the Organization. When designing new systems, it's crucial to address how the organization will be impacted by the system's installation, including mobile and web applications, considering changes in procedures, job functions, organizational structure, power dynamics, and the work environment, while also paying attention to ergonomics issues and addressing organizational dimensions listed in Table 14.5, and ensuring that thorough and well-documented organizational impact assessments are integrated into the development process. Interactive Session - Management: Sauder Woodworking Gets ERP (Enterprise resource planning) Implementation Right. Sauder Woodworking, a leading furniture manufacturer, successfully implemented SAP ERP software in a phased approach, transitioned to SAP S/4HANA for improved functionality, chose a brownfield approach to minimize disruption, faced challenges in terms of time frame and IT infrastructure changes, and with the assistance of Symmetry consultants, managed to convert the system within a 72-hour downtime window, achieving a smooth transition and successful project delivery. Case study questions: 1. Why is an ERP system so important for Sauder Woodworking? Why did Sauder want to switch to a newer ERP system? An ERP system is crucial for Sauder Woodworking because it helps streamline and integrate various business processes such as finance, logistics, HR, and customer service into a single system. This integration improves efficiency, data accuracy, and decision-making across the organization. Sauder wanted to switch to a newer ERP system, specifically SAP S/4HANA, to take advantage of its advanced features, including in-memory computing, which offers faster data processing and real-time insights, potentially leading to better decision-making and improved operational efficiency. 2. Was SAP S/4HANA a good choice for Sauder? Why or why not? SAP S/4HANA was a good choice for Sauder due to its advanced capabilities, such as in-memory computing, which aligns well with Sauder's need for improved processing speed and real-time insights in a complex manufacturing environment. Additionally, as Sauder was already familiar with SAP software and had an established SAP system supporting various business functions, transitioning to SAP S/4HANA allowed them to leverage their existing knowledge and investments while gaining access to newer functionalities. 3. Were there any risks in this project? How did Sauder deal with them? There were risks associated with this project, such as the narrow time frame for conversion and major changes in IT infrastructure. To manage these risks, Sauder took a careful approach. They chose a brownfield implementation to minimize disruption and resistance among employees. They also partnered with Symmetry consultants who were experienced in SAP implementations, helping them navigate the complexities of the project. The successful conversion within the 72-hour downtime window indicates that Sauder effectively addressed the risks and challenges, leading to a smooth transition and successful project outcome. Project Management Software Tools. Project management software tools automate various aspects of project management, enabling tasks, resource assignments, start and end dates, progress tracking, and task modifications. These tools also create Gantt and PERT charts and include communication and collaboration features. They cater to different project scales, with Microsoft Project being a prominent choice. Cloud-based options like Microsoft Project Online enhance accessibility. Additionally, project portfolio management software helps manage project collections, comparing proposals against budgets and resource capacities to determine optimal project mixes aligned with strategic goals. Interactive Session – Technology: Arup Moves Project Management to the Cloud. Arup Group Limited, a global professional services firm, transitioned its project management to the cloud using Microsoft Project Online. Prior to this, Arup had used Excel and Word documents for project management, resulting in limited collaboration, inconsistent project delivery, and manual reporting. By adopting Project Online, Arup gained real-time access to project data for its diverse global workforce, enabling efficient planning, tracking, and collaboration from any location. The cloudbased solution reduced manual report compilation time, allowed for immediate views into project status, and improved insight for decision-making. Project Online facilitated a common project management approach across Arup's operations, promoting strategic value and streamlining project initiation and execution. Case Study Questions. 1. What is the relationship between information technology, project management, and Arup's business model and business strategy? The relationship between information technology, project management, and Arup's business model and strategy is integral to the company's operations. Arup, a multinational professional services firm specializing in engineering, design, planning, and consulting, heavily relies on information technology to support its diverse projects across various countries. Project management plays a crucial role in ensuring efficient project execution and delivery. Arup's business model emphasizes collaboration among professionals from different disciplines, requiring effective project management to bring together experts and deliver high-quality projects. Information technology, specifically through tools like Microsoft Project Online, helps streamline project management processes, aligning with Arup's business strategy of delivering quality services through collaboration and effective project execution. 2. How does Microsoft Project Online support Arup's business strategy? How did it change the way the company works? Microsoft Project Online supports Arup's business strategy by providing a cloud-based platform that enables efficient project planning, tracking, and collaboration. It significantly changed the way the company works by replacing manual processes with automated tools for project management. The transition to Project Online improved collaboration among global teams, eliminated inconsistencies in project delivery, and facilitated real-time access to project data for employees working remotely or in different locations. This shift allowed for better decision-making based on up-to-date information, enhanced transparency into project status, and streamlined reporting processes. Overall, Project Online aligned with Arup's business strategy by fostering efficient collaboration, project execution, and delivery 3. What management, organization, and technology issues did Arup have to address when selecting Project Online as its global project portfolio management tool? When selecting Project Online as its global project portfolio management tool, Arup had to address several management, organization, and technology issues. Management-wise, the company needed to ensure that the tool could integrate seamlessly with its existing IT infrastructure and software suite, including Office 365 and other Microsoft tools. The organization had to manage the change associated with transitioning from manual processes to a cloud-based project management solution. This required training employees, setting up new workflows, and ensuring adoption across various departments and teams. Technologically, Arup needed to ensure data security and compliance with regulations while transitioning to the cloud. Integration with other IT systems and the availability of support and training for employees were also crucial considerations to address during the selection process. The Pennsylvania Department of Labor and Industry (DLI) embarked on the Unemployment Compensation Modernization System (UCMS) project to replace its outdated mainframe system for administering unemployment benefits. IBM was awarded a contract to develop UCMS, but the project faced significant delays and cost overruns, resulting in an incomplete system when the contract expired. The project was marred by flaws in systems development, inadequate project management, and changing contractor personnel. Carnegie Mellon's independent assessment revealed shortcomings, such as underestimated scope, insufficient staffing, and a lack of rigorous testing. Pennsylvania sued IBM for breach of contract. Despite these setbacks, DLI pursued modernization with a new contract from Geographic Solutions, targeting enhanced customer service and operational efficiency. The new system was delayed but aimed for completion by October 2020, addressing the challenges encountered in the UCMS project's first phase. Case Study: Pennsylvania's Unemployment Compensation Modernization System: Unfinished Business. The Pennsylvania Department of Labor and Industry (DLI) embarked on the Unemployment Compensation Modernization System (UCMS) project to replace its outdated mainframe system for administering unemployment benefits. IBM was awarded a contract to develop UCMS, but the project faced significant delays and cost overruns, resulting in an incomplete system when the contract expired. The project was marred by flaws in systems development, inadequate project management, and changing contractor personnel. Carnegie Mellon's independent assessment revealed shortcomings, such as underestimated scope, insufficient staffing, and a lack of rigorous testing. Pennsylvania sued IBM for breach of contract. Despite these setbacks, DLI pursued modernization with a new contract from Geographic Solutions, targeting enhanced customer service and operational efficiency. The new system was delayed but aimed for completion by October 2020, addressing the challenges encountered in the UCMS project's first phase. Case Study Questions. 14-13 Assess the importance of the Unemployment Compensation Modernization System project for the state of Pennsylvania. The Unemployment Compensation Modernization System (UCMS) project held significant importance for the state of Pennsylvania due to its aim to replace the outdated mainframe system for administering unemployment benefits. The modernization was crucial to enhance operational efficiency, provide better customer service to UC claimants, and streamline benefit delivery processes. The new system was expected to improve the accuracy and speed of payment processing, thereby positively impacting the state's workforce and economy. The success of UCMS would have been instrumental in efficiently managing unemployment claims for millions of workers and employers in the state 14-14 Why was unemployment compensation modernization a risky project in Pennsylvania? Identify the key risk factors. Unemployment compensation modernization in Pennsylvania was a risky project due to several key risk factors. First, the state faced challenges in managing a large-scale software-intensive system with complex business rules and extensive information requirements. Second, the project involved inadequate project management and oversight, resulting in insufficient staffing and lack of clear roles and responsibilities. Third, the use of a single vendor, IBM, which claimed to possess proprietary databases, created a vendor dependency that added to the project's risk. Fourth, the lack of rigorous testing, inappropriate staffing, and incomplete requirements definition contributed to the project's vulnerability to cost overruns and schedule delays. 14-15 Classify and describe the problems encountered by the UCMS projects. What management, organization, and technology factors were responsible for these problems? The UCMS project encountered several problems. Delays, cost overruns, and an incomplete system were major issues. The state faced challenges in accurately defining project requirements, resulting in ambiguity in communication. Insufficient staffing and a lack of experienced oversight hampered effective management. The use of user testers without proper IT expertise led to defects discovered late in the development cycle. The project experienced significant workforce turnover, creating a loss of project memory. Management failures, inadequate project planning, and insufficient use of IT testing experts were key factors responsible for these problems. 14-16 What could have been done to mitigate the risks of these projects? To mitigate the risks of the UCMS project, several actions could have been taken. Proper project planning with comprehensive requirements definition would have reduced ambiguity and ensured clear communication. Effective project management with experienced oversight and proper delegation of roles and responsibilities would have improved governance. Rigorous testing by IT experts throughout the development cycle would have identified defects early, reducing the risk of late-stage issues. Using multiple vendors or ensuring vendor independence could have prevented dependency on a single entity. Furthermore, establishing a formal project management office and enforcing accountability within DLI could have improved project management and oversight. Chapter 15: Managing Global Systems Opening Case: The Bel Group: Laughing All the Way to Success The Bel Group, a global producer and distributor of cheese headquartered in Paris. Known for its brands like The Laughing Cow, Mini Babybel, and others, the company aims to double its size by 2025. With operations across various regions, the company faces challenges related to price fluctuations and exchange rates due to its specialization in dairy products. To achieve its growth target, the acquisition of companies like MOM Group and All in Foods has expanded its product range and market presence. The company adapts its products to local preferences and regulations, using a strong social media presence and strategic partnerships to connect with customers. To manage multinational relationships efficiently, The Bel Group implemented Salesforce's Sales Cloud CRM system, customized to meet diverse market needs and facilitate communication across the group. This system enables better management of campaigns, customers, and prospects, aiding in global growth and customer relationship building. The case underscores the importance of IT in global operations, efficient communication, and the role of CRM in realizing business strategies while utilizing social media impact for measurement. 1. How does information technology improve operations and decision making at the Bel Group? Information technology, like the global CRM system, streamlines sales, marketing, and customer interactions. It enhances communication, provides real-time updates, and enables customization for better decision-making. 2. How would the company's new CRM system facilitate its business strategy? The CRM system aligns with the strategy of doubling the company's size by 2025. It aids in localizing products, adapting marketing campaigns, and engaging customers based on market-specific data, fostering growth and customer-centricity. 3. Why is it important to incorporate the impact of a social media presence as a measurement tool? Social media is a vital communication channel. Measuring its impact offers insights into customer sentiment, preferences, and brand perception. It helps refine marketing strategies, aligns with global growth goals, and enhances customer engagement. 15-1: What major factors are driving the internationalization of business? The internationalization of business is driven by several major factors, including the emergence of a global economic system facilitated by advanced networks and information systems. This shift is replacing localized firms with networked corporations that transcend national boundaries. The growth of international trade has also significantly reshaped domestic economies worldwide. An example of this phenomenon is illustrated through the production and sourcing process of an iPhone, where components are provided by companies from different countries and assembly takes place in a different nation, showcasing the interconnected nature of global business operations. Developing an International Information Systems Architecture: To build an effective international information systems architecture aligned with your international strategy, several steps need to be taken. This architecture comprises essential information systems that facilitate coordination for global trade and activities. The process, depicted in Figure 15.2, involves understanding the global environment, identifying business drivers and inhibitors, formulating a corporate strategy that responds to global challenges, organizing the company's structure, addressing management issues during implementation, focusing on business process design, and considering the appropriate technology platform. By comprehending these dimensions, you can develop a comprehensive information systems portfolio that supports your organization's global goals and operations. The initial step is analyzing the broader global landscape and market forces that influence your industry's path towards global competition. The Global Environment: Business Drivers and Challenges: The global business landscape is shaped by various business drivers that are propelling industries towards global markets and competition. These drivers can be categorized into general cultural factors and specific business factors. Advances in information, communication, and transportation technologies have created a global village, making communication and movement of goods easier. Shared media, such as television and the Internet, has fostered a global culture that influences common perceptions and values across different cultures. Moreover, the growth of a global knowledge base has dispersed education, knowledge, and industrial skills more democratically around the world. These general cultural factors give rise to specific business globalization factors that impact industries. The convergence of communication technologies and the emergence of world cultures lay the foundation for global markets with consumers seeking culturally-accepted products. Companies respond by establishing global production and operations, enabled by online coordination between headquarters and distant facilities. Global coordination capabilities extend to various business functions like production, marketing, human resources, and systems development. This coordination facilitates the location of business activities based on comparative advantage and creates economies of scale that enhance productivity. While not all industries are equally influenced, understanding the internationalization trends in one's industry and responding effectively can lead to significant gains in productivity. The current global environment, however, also faces challenges, as evident from disruptions caused by events like the coronavirus pandemic and issues related to concentrated supply chains. Interactive Session Management: Rethinking Global Supply Chains The recent shift in supply chain management toward global optimization is being reconsidered due to challenges brought on by unforeseen events. Global supply chains, which emphasize cost optimization through centralized sourcing, are being reevaluated in light of disruptions caused by events like the coronavirus pandemic. Previously, globalization was driven by factors such as lower transportation costs, reduced trade barriers, and online communication. However, the pandemic exposed vulnerabilities in this approach, disrupting supply chains as countries shut down production, transportation, and sales. China's role as a major global supplier was highlighted, especially in industries like pharmaceuticals, electronics, and consumer goods. Companies are now rethinking their supply chain strategies to mitigate global supply chain risks. They are advised to: 1. Diversify Suppliers: Reduce dependence on single suppliers, regions, or countries. Develop alternate supply sources and increase safety stocks to enhance supply chain resilience. 2. Regionalization and Localization: Consider producing and sourcing regionally or locally. Toyota's practice of colocating suppliers has proven effective in ensuring supply chain stability. Coca-Cola's localized production allowed it to weather supply chain disruptions during the pandemic. 3. Reduce Product Complexity: Streamline the range of products offered to ease pressure on factories during disruptions. Kimberly-Clark limited its product range to focus on staples in response to increased demand during the pandemic. These measures require companies to prioritize supply chain security over cost optimization and to design supply chains with a keen awareness of potential risks. Case Study Questions: 1. What factors have contributed to the growth of global supply chains? Global supply chains have grown due to factors like advanced communication and transportation technologies, lower transportation costs, reduced trade barriers, and the emergence of a global culture. These factors have enabled companies to optimize costs and access resources from around the world. 2. What are the advantages and disadvantages of global supply chains? Advantages: Global supply chains offer cost optimization through access to lower-cost resources, expanded market reach, and the ability to tap into specialized expertise. They allow companies to capitalize on economies of scale and offer products tailored to different markets. Disadvantages: Global supply chains are susceptible to disruptions due to factors like political instability, natural disasters, and pandemics. They can also lead to longer lead times, communication challenges, quality control issues, and dependency on a few key suppliers. 3. What measures can companies take to mitigate supply chain risk? Companies can mitigate supply chain risk by: - Diversifying Suppliers: Reducing reliance on a single supplier by developing alternate sources. - Regionalization and Localization: Producing and sourcing regionally or locally to reduce dependency on distant suppliers. - Reducing Product Complexity: Simplifying the product range to ease production pressure during disruptions. - Increasing Safety Stocks: Building up reserves to manage unexpected disruptions. - Supply Chain Mapping: Identifying all tiers of suppliers to enhance visibility into the supply chain. 4. Should companies continue to maintain global supply chains? Explain your answer. Companies should strike a balance between the advantages and disadvantages of global supply chains. While globalization offers benefits like cost optimization and market expansion, recent events have highlighted the vulnerabilities of overreliance on a centralized supply chain. Companies should consider a more diversified and localized approach to enhance supply chain resilience while maintaining a level of global reach that aligns with their risk tolerance. The lessons from disruptions, such as the coronavirus pandemic, emphasize the need for a more mindful and adaptive supply chain strategy. Business Challenges: Globalization presents significant business opportunities, but fundamental forces also hinder a global economy and disrupt international business. Cultural particularism, which is making judgments based on narrow characteristics, rejects the concept of a shared global culture and hampers the entry of foreign goods into domestic markets. Cultural differences lead to variations in social expectations, politics, and legal rules, impacting business. Political differences result in diverse laws governing information movement, privacy, and trade terms. These challenges complicate global business and system-building. Cultural and political variations affect business processes and IT applications. Specific barriers arise, including network reliability disparities and skill shortages. Different accounting practices exist due to national laws and traditions. For example, German companies recognize profits only after project completion, while British firms report profits sooner. Language remains a barrier despite English being a business language, and currency fluctuations can affect profitability. These factors must be considered when designing international systems Companies that are considering expanding into other countries need to carefully consider these challenges. By taking these factors into account, businesses can increase their chances of success in the global marketplace. State of the art Despite opportunities, most international companies possess inherited or patchwork international systems based on outdated concepts. Reporting, data entry, and communication are often manual and fragmented. Firms with well-designed international systems gain competitive advantage. Some companies have built technology platforms but lack a global strategy. Building appropriate international architectures is challenging. Difficulties include aligning systems with global strategy, organizing business units, solving implementation issues, and selecting suitable technical platforms. These complexities impact system planning and design. 15-2: What are the alternative strategies for developing global businesses? https://quizlet.com/2878420/mis-375-chapter-3-flash-cards/ Three organizational issues are pivotal for corporations aiming for a global presence: selecting a strategy, structuring the business, and managing systems. Four main global strategies—domestic exporter, multinational, franchiser, and transnational—are closely linked to specific organizational structures. These strategies lead to centralization, decentralization, or coordination within the organization. The chosen strategy affects how businesses configure and manage their systems. 1. Domestic Exporter Strategy: Characterized by centralized corporate activities in the home country, including production, finance, sales, marketing, and strategic management. Foreign sales might be through subsidiaries or agency agreements, but foreign marketing often relies on the domestic base. 2. Multinational Strategy: Focuses on centralizing financial management and control while decentralizing production, sales, and marketing to foreign units. Products are adapted to local market conditions. This strategy results in a confederation of production and marketing facilities across countries. 3. Franchiser Strategy: Involves central creation, design, and financing of products in the home country, relying on foreign personnel for further production, marketing, and human resources. Local coordination is required for perishable goods. 4. Transnational Strategy: Characterized by globally managed activities without national borders. Value-adding activities are managed from a global perspective, optimizing supply and demand sources and local competitive advantages. Transnational firms have strong central management with dispersed power and financial influence. Global Systems Alignment: Information technology and improved telecommunications provide flexibility for shaping global strategies. System configuration aligns with the chosen strategy: - Domestic Exporters: Centralized systems with worldwide applications developed by domestic staff. - Multinationals: Decentralized systems with foreign units designing unique solutions. - Franchisers: Duplicated systems with a single application replicated globally. - Transnationals: Networked systems with coordinated development across units. Reorganizing for Global Business: To establish a global company and supportive information systems structure, firms should: 1. Organize activities based on comparative advantage. 2. Develop systems units at regional, national, and international levels. 3. Appoint a global Chief Information Officer (CIO) at world headquarters for international systems development. Successful firms implement these principles to create effective organizational structures and manage international systems strategically. 15-3: What are the challenges posed by global information systems and management solutions for these challenges? Challenges and Management Solutions for Global Information Systems: Developing global information systems comes with significant challenges that are compounded by the international environment. Table 15.4 outlines the primary management problems associated with developing international systems. These problems are similar to those faced when developing domestic systems but are much more complex in a global context. Common Scenario: Disorganization on a Global Scale: Consider a traditional multinational consumer-goods company operating in Europe that aims to expand into Asian markets using a transnational strategy and an integrated information systems structure. Historical practices involve decentralized development of systems in foreign divisions, leading to disparate hardware, software, and communication systems. This disorganized setup hampers effective operations. Management Solutions: Implementation Strategy: To address these challenges, a series of strategic steps can be taken: 1. Identify Core Business Processes: Define critical core business processes that are vital for the organization's success. Analyze how these processes are executed and identify centers of excellence for each. 2. Identify Core Systems for Central Coordination: Select a small set of core systems that are essential for the business's functionality. Define these systems as transnational and justify their importance to the organization. 3. Choose an Approach: Avoid piecemeal and grand design approaches. Opt for an incremental, evolutionary strategy that evolves transnational applications gradually while keeping a clear vision of the desired future state. 4. Make the Benefits Clear: Communicate the benefits of global systems clearly to senior management and division managers. Highlight advantages in management, production, distribution, marketing, and capital utilization. Specific Management Solutions for Challenges: 1. Agreeing on Common User Requirements: Establishing a list of core business processes and systems fosters comparison and common understanding among divisions, making it easier to identify common elements. 2. Introducing Changes in Business Processes: Legitimacy, authority, and user involvement are key for successful change. An evolutionary approach, backed by a clear vision, aids in convincing stakeholders about the feasibility and benefits of change. 3. Coordinating Applications Development: Choose an incremental strategy for coordinating change. Focus on small, achievable steps toward the larger vision over time. 4. Coordinating Software Releases: Implement procedures to ensure simultaneous software updates across operating units for compatibility. 5. Encouraging Local Users to Support Global Systems: Use co-optation to involve local units in the design process without surrendering control over the change direction. Establish transnational centres of excellence with multinational teams to drive involvement and ownership. Technology Considerations: While having the right organizational structure and management strategies is important, technology choices are equally crucial. Decisions regarding technology platforms, networks, hardware, and software impact the success of building transnational information systems architectures. By strategically addressing these challenges and implementing effective management solutions, organizations can successfully develop and implement global information systems that align with their transnational strategies. 15-4: What are the issues and technical alternatives to be considered when developing international information systems? Issues and Technical Alternatives in Developing International Information Systems: Developing international information systems involves addressing various technical challenges related to hardware, software, and networking. These challenges become more complex due to the diverse operating units and countries involved. Some of the key issues and technical alternatives to consider include: 1. Standardizing Computing Platforms and Systems Integration: - Challenge: Variations in operating units and countries make it difficult to standardize a global computing platform. - Solution: Establish a central authority to set data and technical standards. Implement data and technical standards compliance across all units. Integrate systems based on a common hardware and operating system. 2. Connectivity: - Challenge: Ensuring seamless connectivity across global systems is essential but can be hindered by issues such as varying levels of Internet service quality and security concerns. - Solution: Utilize private networks for better security and guaranteed service levels. Create global intranets and extranets using Internet virtual private networks (VPNs) for less sensitive communications. Address security concerns and reliability through private networks. 3. Software Localization: - Challenge: Integrating old and new systems, especially if localized in various countries, requires building new interfaces and addressing different languages and conventions. - Solution: Develop user-friendly interfaces that can be quickly understood by a global workforce. Focus on software localization to adapt applications for different languages, cultural differences, and user capabilities. 4. Software Applications: - Challenge: Selecting software applications that enhance productivity across global business processes while accommodating language and cultural differences. - Solution: Focus on transaction and management reporting systems for basic functions. Implement cross-functional systems like supply chain management and enterprise resource planning. Address compatibility issues in languages, cultures, and business processes. 5. Electronic Data Interchange (EDI) and Supply Chain Management: - Challenge: Connecting with global suppliers and partners using EDI and supply chain management systems. - Solution: Implement EDI and supply chain management systems to streamline interactions with suppliers worldwide. Focus on collaboration and enterprise social networking systems for knowledgebased firms. 6. Internet Connectivity in Developing Countries: - Challenge: Limited Internet access and unreliable infrastructure in developing countries can hinder global connectivity. - Solution: As Internet adoption grows, connectivity will improve in less-developed regions. Use the Internet to connect dispersed units, but consider security and reliability concerns. 7. Mobile Platform Considerations: - Challenge: Many users access the Internet via mobile devices with different screen sizes, low bandwidth, and potential language barriers. - Solution: Develop mobile-friendly apps and interfaces suitable for different mobile platforms, small screens, and low bandwidth conditions. Incorporate audio and video interfaces to cater to users who cannot read or write. In summary, developing international information systems requires addressing challenges related to standardization, connectivity, software localization, application selection, and technology adoption in developing regions. Strategic planning, adherence to technical standards, and flexibility in software design are essential for successful global systems implementation. Digital Nationalism and Its Impact on the Internet: The concept of digital nationalism refers to the growing trend of nation-states asserting their authority over Internet use and establishing control over digital activities within their borders. This shift away from the original idea of a globally connected and open Internet has significant implications for the nature of information exchange and online interactions. Some key aspects of digital nationalism include: 1. Authoritarian Control and Digital Sovereignty: - Several authoritarian governments, including China, have taken steps to control and restrict Internet access and content. China's Great Firewall is a notable example of how a government can effectively limit online access and information flow. - Other countries, such as Iran, North Korea, and Russia, have implemented similar strategies to control digital activities and maintain sovereignty over online spaces. 2. Data Localization Laws: - Some countries have introduced data localization laws that require certain types of data (especially personal and sensitive data) to be stored within their national borders. This can impact cross-border data flows and affect the operations of multinational companies. - While data localization laws can be justified for privacy and security reasons, they can also be used to monitor online activities and control information dissemination. 3. Implications for Internet Balkanization: - The rise of digital nationalism raises concerns about the potential Balkanization of the Internet. This term refers to the fragmentation of the global Internet into separate and isolated networks, each with its own rules and restrictions. - The result could be a "Splinternet," where different countries or regions have limited or no access to certain websites, services, or content available in other parts of the world. 4. Impact on Companies and Users: - Digital nationalism can affect multinational companies that need to navigate varying regulations and data localization requirements across different countries. - Internet users may also face limitations on the content and services they can access, as well as potential privacy concerns due to increased monitoring and surveillance. 5. Solutions and Recommendations: - Experts suggest that efforts should be made to restore the original principles of inclusiveness and universality that characterized the early Internet. This involves promoting open communication, fair play, and a sense of global connectedness. - The concept of "zone"-based approaches is proposed, where groups of nations commit to upholding principles such as free trade, privacy, and freedom of expression. This could help counter the trend of Internet fragmentation and maintain a relatively open and interconnected network. In conclusion, digital nationalism represents a departure from the original ideals of a globally connected and open Internet. The rise of data localization laws and restrictions on Internet access raise concerns about the future of a unified online environment. Efforts to counter digital nationalism focus on restoring inclusivity and exploring collaborative approaches to maintain a free and open digital landscape. Amazon's Expansion into the Middle East: A Case Study Amazon, the e-commerce giant, has successfully expanded its operations into the Middle East, leveraging strategic acquisitions and a deep understanding of the local market. This expansion story showcases Amazon's adaptability to unique market conditions and its ability to collaborate with local players to achieve global growth. Here are the key aspects of Amazon's journey into the Middle East: 1. Global Expansion and Diversification: - Amazon's expansion efforts beyond its US base have been notable, with operations in multiple countries, each tailored to local preferences and market dynamics. - In its pursuit of global growth, Amazon aimed to tap into the e-commerce potential of the Middle East, characterized by a high penetration of internet and social media usage. 2. Recognizing E-commerce Potential: - The Middle East, particularly Gulf Cooperation Council (GCC) countries, had significant untapped e-commerce potential due to high internet penetration, smartphone usage, and a tech-savvy younger population. - Amazon recognized the opportunity to enter a region that was gradually shifting from oil-based economies to knowledge-based products and services. 3. Souq.com Acquisition: - In 2017, Amazon acquired Souq.com, a leading e-commerce marketplace in the Middle East, headquartered in Dubai. - Souq.com had emerged as a major online retail platform in the region, attracting millions of unique visitors every month and enjoying high mobile transaction rates. 4. Overcoming Local Challenges: - The Middle East presented unique challenges, including diverse laws, modes of payment, language barriers, and low awareness of e-commerce. - Souq.com addressed these challenges by offering multiple payment options, including cash on delivery, and establishing its own efficient delivery network to overcome outbound logistics issues. 5. Integration of Local Expertise: - Amazon's acquisition of Souq.com allowed for a blend of Amazon's global expertise with Souq.com's understanding of the local environment and customer preferences. - This collaboration created a competitive advantage that enabled Amazon to navigate the market more effectively. 6. Expansion and Rebranding: - After its acquisition, Amazon replaced Souq.com with its own platform, officially launching Amazon's online presence in the Middle East. - Amazon introduced local and international products, allowing customers to choose from a broader range of options. 7. Room for Growth: - E-commerce sales in the Middle East accounted for a small fraction of retail sales, indicating significant room for expansion. - Amazon and Souq.com, with their combined strengths, positioned themselves to lead the growth of e-commerce in the region. In summary, Amazon's expansion into the Middle East through the acquisition of Souq.com showcases its adaptive strategy for global growth. By leveraging Souq.com's local market understanding and integrating it with Amazon's global capabilities, the company successfully entered a market with enormous e-commerce potential. This case study underscores the importance of collaborating with local players and tailoring strategies to match unique market conditions. Case Study Questions: Amazon's Expansion into the Middle East 15-12 Analyze challenges and opportunities for global companies like Amazon that seek to enter the Middle Eastern market. Challenges: - Cultural Differences: The Middle East has diverse cultures, languages, and legal systems, requiring global companies to adapt their strategies to each country's cultural nuances. - Payment Methods: Cash on delivery is preferred by a majority of customers, necessitating unique payment solutions and modes to facilitate transactions. - Logistics and Delivery: Limited postal codes and challenges in establishing a reliable delivery network require innovative solutions to ensure timely and accurate product deliveries. - Local Competition: Local players may already have established market presence and customer trust, making it challenging for global companies to compete effectively. - Regulations and Compliance: Adhering to various local regulations, customs duties, and taxes can be complex, adding to operational challenges. - Language and Communication: Effective communication and customer service in local languages are crucial for building customer relationships and trust. Opportunities: - E-commerce Potential: High internet penetration, smartphone usage, and tech-savvy populations offer substantial opportunities for e-commerce growth. - Changing Economies: The shift from oil-based economies to knowledge-based products and services creates opportunities for companies with innovative technologies and solutions. - Young Demographics: A young population interested in technology and online shopping presents a favorable consumer base for global companies. - Early Mover Advantage: Entering the market early allows companies to establish brand recognition and build customer loyalty before competitors. 15-13 Considering the Middle East's e-commerce environment, did Amazon make a sensible decision by acquiring Souq.com? Yes, Amazon's decision to acquire Souq.com was sensible considering the Middle East's e-commerce environment: - Local Expertise: Souq.com had a strong local presence, understanding of customer preferences, and established operations that would have taken Amazon time to develop. - Market Access: Through Souq.com, Amazon gained quick access to the Middle Eastern market and could leverage its existing customer base and brand recognition. - Overcoming Challenges: Souq.com's experience in dealing with local challenges, such as cash on delivery and delivery logistics, provided Amazon with effective solutions. - Integration of Strengths: Combining Amazon's global technology infrastructure and expertise with Souq.com's local insights created a competitive advantage. 15-14 How sustainable is Amazon's strategy of diversification? Can an entry into the Middle East help Amazon enter other emerging markets with a similar environment? Amazon's strategy of diversification has proven to be sustainable, as demonstrated by its success in entering various global markets. The entry into the Middle East through the acquisition of Souq.com showcases Amazon's adaptability and ability to leverage local strengths. An entry into the Middle East can serve as a model for Amazon's expansion into other emerging markets with similar environments: - Leveraging Local Partnerships: Collaborating with local players who understand the market can help Amazon overcome entry barriers and adapt to local conditions. - Customer-Centric Approach: Amazon's customer-centric philosophy, backed by its global reputation, can resonate well with consumers in emerging markets, including the Middle East. - Technology and Innovation: Amazon's robust technology infrastructure can facilitate e-commerce growth in regions with high internet and smartphone penetration. - Market Leadership: Establishing early market leadership can provide Amazon with an advantage over competitors in similar environments. However, it's important to note that each market has its unique challenges and opportunities. While the Middle East's success can be a positive sign, Amazon would need to carefully assess and adapt its strategy to the specific conditions of each emerging market it enters.