Chapter 12 Information System Trends 2012 What managers need to know about the emerging and enduring trends in Information Systems management Chapter 12 2012 1 The Hype Cycle • Technology Trigger: When a new technology becomes available • Peak of Inflated Expectations: When over enthusiasm and unrealistic expectations fuel rapid adoption • Through of disillusionment: When failures become public • Slope of Enlightenment: when the true benefits of the technology become apparent to the organizations • Plateau of Productivity: the phase when the benefits and risks of the technology become widely understood and accepted Chapter 12 2012 2 Chapter 12 2012 3 The Hype Cycle -2005 Chapter 12 2012 4 The Hype Cycle - 2010 Chapter 12 2012 5 Chapter 12 2012 6 Current & Emerging IS/IT Trends • • • • • • • • • • Enterprise Systems Supply Chain Management Customer Relationship Management Business Intelligence Digital Data Genius Knowledge Management Systems Mobile Computing Web 2.0 Technology Social Media Gesture Based Computing Chapter 12 2012 7 Enterprise Systems Chapter 12 2012 8 Enterprise Systems • In the early 1990s developers realized the limitations of the functional approach • This led to a class of standardized software applications that would enable and support integrated business processes • These applications are known as Enterprise Systems (ESs) Chapter 12 2012 9 Enterprise Systems • Provide native integration • Attempt to support all components of the firm’s IT infrastructure. • Defining characteristics: – – – – – Modular Integrated Software applications Span all organizational functions Rely on one database at the core. • Custom developed or purchased off-the-shelf Chapter 12 2012 10 Characteristics of ESs • Modularity – Enables the organization to decide which functionalities to enable and which ones not to – Allows for flexibility at the design stage – No need to pay for unnecessary components Chapter 12 2012 11 Characteristics of ESs • Application Integration: – Events in one module automatically trigger events in one or more separate modules • Data Integration – Data is stored in one central database Chapter 12 2012 12 Characteristics of ESs • Configurable – Enterprise Systems are parameterized – Firms choose among a predefined set of configuration options during the implementation of the application – The firm can extend the capabilities of the standard application by creating “bolt-on modules” – This customization process further tailors the ES to the specific needs of the organization Chapter 12 2012 13 Advantages of Enterprise Systems • Efficiency – ESs are able to rein in complex, generally hard-tomange and support legacy IT infrastructures – Potential to reduce direct costs • Example: No redundant data entry – Potential to reduce indirect costs by streamlining business processes and operations Chapter 12 2012 14 Advantages of Enterprise Systems • Responsiveness – ESs can deliver improvements in the firm’s ability to respond to customers and market demands • Knowledge Infusion – The application embeds the state of the art in industry practice – ES can be used to update obsolete business processes within the firm Chapter 12 2012 15 Advantages of Enterprise Systems • Adaptability – Offer a degree of customizability rarely offered by off-the-shelf applications – Achieved through the use of configuration tables and bolt-on functionality Chapter 12 2012 16 Limitations of Enterprise Systems • Standardization and Flexibility – Organizations are encouraged to implement as close to a standard version of the software as possible. – So called “Vanilla” implementation ensure that firms take advantage of the economies of scale created by the vendor – But flexibility is sacrificed by this approach – ESs are often referred to as software concrete • Much of the adaptability only occurs during the implementation process. • Once set, ESs are difficult to change Chapter 12 2012 17 Limitations of Enterprise Systems • Limitations of best practice software – It will force the firm to adapt – It is unclear how “best practices” are defined – The “best” practice may differ for different firms – Its not enough to implement a software program to enact a new practice – A firm’s own best practices may not be supported by the new ES Chapter 12 2012 18 Limitations of Enterprise Systems • Strategic Clash – A firm will have to choose amongst the set of business processes supported by the software – What if one of your unique and differentiating practices is not supported by the ES? Return to Current & Emerging IS/IT Trends Chapter 12 2012 19 Supply Chain Management Chapter 12 2012 20 Supply Chain Management • The set of coordinated entities that contribute to move a product or service from its production to its consumption – Upstream Supply Chain – Downstream Supply Chain Chapter 12 2012 21 Modern Supply Chain Management • Tight linkages between upstream (i.e., suppliers) and downstream firms (i.e., customers) • Inter-organizational systems increasingly supported by the Internet • Integration with enterprise systems • Increasing attention to IT-enabled supply chain management Chapter 12 2012 22 Supply Chain Management Chapter 12 2012 23 Supply Chain Management Trends • Radiofrequency Identification (RFID) • A new frontier in SCM: – No line of sight requirements – Embedding potential – Writing capabilities – Storage capacity – Speed up the receiving process – Improve monitoring and control of inventories Return to Current & Emerging IS/IT Trends Chapter 12 2012 24 Knowledge Management “All the value of this company is in its people. If you burned down all out plants, and we just kept out people and out information files, we should soon be as strong as ever.” --Thomas Watson, the CEO of IBM Chapter 12 2012 25 Knowledge • Knowing What: Based on the ability to collect, categorize, and assimilate information • Knowing How: Ability to recognize or create the sequence of steps that are needed to complete a task • Knowing Why: Based on understanding of cause-effect relationships Chapter 12 2012 26 Knowledge • Categories of Knowledge – Explicit Knowledge • Can be articulated • Codified • Transferred with relative ease. – Tacit Knowledge • The type of knowledge that individuals possess but find difficult to articulate Chapter 12 2012 27 Knowledge Management • Set of activities and processes used to: – Create – Codify – Disseminate knowledge in the organization • IT is a key component and enabler • Aspects of knowledge management: – – – – Creating Capturing Storing Disseminating Chapter 12 2012 28 Creating Knowledge • Knowledge creation is the first stage in knowledge management: – Generate new information – Devise solutions to existing problems – Identify new explanations for events Chapter 12 2012 29 Capturing and Storing Knowledge • Enables the organization to: – Codify new knowledge – Maintain an organizational memory • Content Management Systems (CMSs): – Applications used to capture and store knowledge – A knowledge repository is a central location and search point for relevant knowledge Chapter 12 2012 30 Disseminating Knowledge • The last phase in a knowledge management initiative • When knowledge is formatted and easily accessible, dramatic improvements in effectiveness and efficiency can be achieved. Return to Current & Emerging IS/IT Trends Chapter 12 2012 31 Business Intelligence • The ability to gather and make sense of information about your business – A set of techniques – Processes – Technologies • Designed to enable managers to: – Gain superior insight about the organization – Gain superior understanding of the business – Make better decisions Chapter 12 2012 32 Business Intelligence Chapter 12 2012 33 Components of BI • Data Warehouse: – A data repository – Collects and consolidates data – Multiple sources • Characteristics: – Large in size – Large in scope – Enabling data integration – Designed for analytics Chapter 12 2012 34 Components of BI • Data Mart: – A scaled-down version of a data warehouse – Focuses on the needs of a specific audience – Smaller in scope, thus easier to build • Online Analytical Processing (OLAP): – User-driven – Enables a knowledge worker to easily and selectively extract and view data from analytical databases Chapter 12 2012 35 Components of BI • Data Mining: – The process of automatically discovering non-obvious relationships in large databases. – Used to analyze historical information – Machine-driven • Possible Patterns: – – – – Associations Sequences Classifications Forecasting Return to Current & Emerging IS/IT Trends Chapter 12 2012 36 Customer Relationship Management • CRM is a strategic initiative, not a technology • CRM relies on transactional data and is designed to help the firm learn about customers • Designed to use data to make inferences about customer: – Behaviors – Needs • The objective is to create value for the firm by optimizing the relationship with each customer Chapter 12 2012 37 CRM Infrastructure 38 Limitations of CRM • CRM is firm centric – Only relies on transactional and behavioral data pertaining to the interactions of the customer with the firm • Limited predictive ability – Some events are unforeseeable and only the customer knows about their occurrence 39 Customer Managed Interactions • In CMIs customer data is stored and managed by the customer • CMI solves the limitations of CRM initiatives: – The customer’s personal data warehouse holds complete historical information – Future events are more likely known – Inferences are more precise • Infomediaries may maintain customers’ data warehouses 40 Customer Managed Interactions • CMI is not only about the lowest prices – CMI completion may depend on lower price – More likely will stem from the quality of the recommendation • CMI technology – The Internet provides the infrastructure for data transfer – Falling costs of storage make personal data warehouses a feasible alternative 41 Customer Interactions in the CMI Paradigm Return to Current & Emerging IS/IT Trends 42 Web 2.0 Space • Some of them are technological components (e.g., AJAX, RIA‘s, and XML/DHTML) • Some are principles (e.g., participation, collective intelligence, and rich user experience) • Some are applications and tools (e.g., Wikipedia, Flickr, and Mashups). 43 Technology Push/Demand Pull Theory • Demand Pulls Technology – Market and consumer needs may create a demand for new technology/service – Forces research and development efforts to accelerate innovation. • Technology Pushes Demand – New technology/service may evolve to spawn innovative uses – Thereby generate demand. 44 Examples • Technology Push – – – – Early internet allows for early version of e-mail I/O devices move from teletype machines to CRT Networking PCs Cell Phone Displays – LCD • Demand Pull – – – – E-mail Servers & Clients GUI’s – MAC, Windows 3.0, etc. Graphical Web Browsers Custom Graphics & Ringtones 45 46 Conceptual Framework of Web 2.0 Paradigm 47 Web 2.0 Tech Push/ Demand Pull Layers • Web 2.0 Technology Layer – Enabling technologies or technological concepts – Provide the infrastructure and building blocks for Web 2.0 RIAs – Supports Web 2.0 principles. • Web 2.0 Principle Layer – Common fundamental characteristics observed from current web 2.0 platforms – Different from traditional applications or platforms. • Web 2.0 Application Layer – Web 2.0 RIAs that implement the lower layer principles using the enabling technologies in the technology layer. • Web 2.0 Driver Layer – Market/social/user driving forces that pull the fundamental shifts in technology, online business networks, online communities, and individual online behaviors. 48 Return to Current & Emerging IS/IT Trends The Web 2.0 Revolution, Social Media, and Industry Disruptors • social media The online platforms and tools that people use to share opinions, experiences, insights, perceptions, and various media, including photos, videos, and music, with each other • disruptors Companies that introduce a significant change in their industries, thus causing a disruption in normal business operations Chapter 12 2012 49 Chapter 12 2012 50 Social Media • Social Media Makes History Return to Current & Emerging IS/IT Trends Chapter 12 2012 51 Digital Data Genius • We are rapidly moving toward a world where events, transactions, and processes are all digitized – Purchasing a book online – Using RFID devices to track items – Using a search engine (Google, Bing) to locate information – Using our cell phone to retrieve voice-mail messages 52 Digital Data Genius Requirements • In order to take advantage of the opportunities afforded by digital data genesis, a firm must develop a digital data genesis capability – Choosing IT to generate and capture data in its native digital form – Integrating IT in the business processes that generate the data of interest – Managing the digital data so produced 53 Digital Data Genius Strategies & Decisions • Digital data genesis strategies require a disciplined approach to digital data generation and capture, predicated on the recognition of the value of data and the consequent need to architect systems that originate it in a digital format • Digital data genesis decisions about digital data genesis should be driven by the desire to seamlessly and unobtrusively collect data that answers basic questions about a transaction 54 Digital Data Genius Basic Questions • • • • • • When did the transaction take place? Where did the transaction occur? What was the nature of the transaction? How was the transaction executed? Who initiated the transaction? What was the outcome? 55 Digital Data Genius Automation • Machine to Machine (M2M) – IT-enabled everyday objects (e.g., utility meters) and pervasive connectivity (e.g., wireless networks) make it is possible to leverage data that is born digital to let the machine generating an event communicate directly with the other machines that can act upon that event. • Machine to Person (M2P) – When the actuator on the receiving end of the digital data generated by IT-enabled everyday objects is a person, rather than an object, we talk about M2P transactions. 56 Digital Data Genius Opportunities • The proliferation of sensors and sensor data that produce usable information with unprecedented speed and granularity provides the opportunity to design information systems expressly designed to take advantage of this environmental change • At its most fundamental level, digital data genesis offers the opportunity to bridge the gap between the digital and physical world. In other words, as more and more physical activities come with an automatically generated information representation of the activity, it is increasingly possible to extract value from the symbiotic relationship of physical and digital systems • One approach to analyzing this symbiotic relationship between physical activities and information is through the lens of ubiquity, uniqueness, unison, and universality 57 Digital Data Genius Opportunities • Ubiquity – Information access that is unconstrained by time and space ranks high on the ubiquity scale. – Data that are generated natively in digital form are theoretically available in real time. – Ubiquitous information provides opportunities for rationalizing the use of resources. • Uniqueness – Information access that is personalized and individually tailored to the needs of a person or other entity ranks high in uniqueness – Digital data genesis enabled unprecedented levels of uniqueness 58 Digital Data Genius Opportunities • Unison – Information that is consistent and devoid of redundancies ranks high in unison – At a procedural level unison translates into the standardization of the activities necessary to perform an activity • Universality – Information that is standardized and easily shareable across platforms ranks high in universality – At a procedural level universality describes the ease with which separate processes can interlock and coordinate 59 The Super Crunchers • “In an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes” • Digital data genesis exacerbates this problem by enabling the creation of unprecedented amounts of information • Because data is in a digital form, some argue that the future belongs the supercrunchers – Those who will be able to exploit the availability of data to their advantage and the advantage of their organizations by quickly and effortlessly testing their hunches and intuitions with data Return to Current & Emerging IS/IT Trends 60 The Mobile Platform • The most visible trend in computing today is the widespread adoption of the mobile platform • A recent development in the area of mobile computing is the rise to prominence of tablets, characterized by their light weight, multi-touch input screens and sustained battery power • hanks to its technological characteristics – portability and connectivity –the mobile platform gives users the opportunity for constant access to computing power and access to the data grid 61 Characteristics • Ubiquity – Ubiquity represents the idea that users of the device can access needed resources from (in theory) anywhere • Identifiabilty – Identifiabilty represents the idea that mobile devices uniquely identify their user. In order to access the data grid, both smartphones and tablets utilize the cellular network and use a Subscriber Identification Module (SIM card) • Context Awareness – Context Awareness is enabled by the fact that mobile devices can be geolocated. In other words, modern smartphones that incorporate a Global Positioning System (GPS) receiver can communicate their position to any software application running on them 62 Mobile Commerce • Mobile commerce – Refers to the ability to complete commercial transactions using mobile devices, such as smartphones and tablets – Also known as M-Commerce or mCommerce • Has recently received significant impetus as consumers have shown its viability by adopting electronic commerce and self-service through digital mobile devices 63 Location-Based Social Networking • The rise to prominence of the mobile platform has enabled social networking firms to allow users to reach (some would say annoy!) their contacts more often and in a more timely manner using mobile versions of their service • Location-based social networking – Extension of mobile social networking whereby the geographical location of the user becomes an integral component of the service enabling efficient access to context-dependent services – Enable social network users to bridge the gap from access to their friends ratings and reviews (what friends say), to their actual behavior (what friends do) – the ultimate high tech version of “voting with your feet! 64 Augmented Reality • Augmented reality is a field of computing that has recently received increased attention thanks to the launch of a few augmented reality applications for smartphones, such as Wikitude and Layar • Augmented reality consists of superimposing an information layer on top of a real image. • Augmented reality is not confined to the mobile platform 65 Green IS vs. IT • Environmental sustainability: – The notion that it is imperative for the human species to take the lead in the conservation of the natural environment and the sustainable management of its resources • Green IT – Focus on reducing energy consumption of IT devices and data centers • Green IS – Focus on broadening the role of IT in minimizing adverse impacts on environmental sustainability Return to Current & Emerging IS/IT Trends 66 Gesture-Based Computing Prototype of Mouse - 1965 Gesture-Based Computing • Gesture-based Computing refers to the ability to interface with devices through natural human movement. • Gesture Based Computing is already used widely today. – – – – – • iPod touch, Smart Phones, Tablets, Nintendo Wii, Kenect Playstation Move and SMART Boards all respond to natural human gestures. Gesture-Based Computing • Different devices can recognize a variety of Gesture-Based inputs. • Touch Screens and Surfaces recognize – Touch – Taps – Swipes – Multiple Fingers/Touches • Handheld Devices respond when they are – Tilted – Shaken – Moved in space Gesture-Based Computing • Game Systems (like the Wii) use hand held remote and an infared sensor to determine players location and movement in 3-D space • Hands-Free Systems (like Xbox 360 Kenect) require no controls. A set of cameras recognizes full-body motion. Gesture-Based Computing • Gesture-based interfaces are changing the way we interact with computers • Provide with us a more intuitive way to control devices. • New devices take advantage of certain motions that are easy and intuitive to perform • Allowing an unprecedented level of control over the surrounding devices. • Cameras and sensors translate movements of our bodies without the need of remotes or hand held tracking tools. • As the underlying technologies evolve, a variety of approaches to gesture-based input are being explored. • The most common applications for gesture-based computing are: – computer games, – file and media browsing, and – simulation and training Examples • • • • • • • iPhone - iPad Children’s Demo Control Surgical Device Hands Free Access Information Marketing Technique Add a Sixth Sense – Information Access The Future - BCI Gesture-Based Computing • "Good Bye" to the mouse and keyboard • "Hello" to Gesture Based Computing! • BCI is next • Comments and/or Questions? Return to Current & Emerging IS/IT Trends