31
Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Embed Size (px)

Citation preview

Page 1: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 1

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc.Copyright 2005

Page 2: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

THE ORGANIZATION IN THE DIGITAL ECONOMY

Page 3: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 1

The IT- Based Organization in the Digital Economy

1

Page 4: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Chapter Outline

Doing Business in the Digital Economy Business Pressures, Organizational

Responses, and IT Support Competitive Advantage and Strategic

Information Systems Strategic Information Systems: Examples Why Should you Learn About Information

Technology?

2

Page 5: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Learning Objectives

Describe The characteristics of the digital economy and e-business.

Discuss the relationships among business pressures, organizational responses, and information systems.

Describe strategic information system (SISs) and how information technology helps companies improve their competitive positions.

Describe Porter’s competitive force model

Describe 12 strategies that companies can use to achieve competitive advantage in their industries.

3

Page 6: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Doing Business in the Digital Economy

Concluding business in the digital economy using Web-based systems on the Internet and other electronic networks.

4

Page 7: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Networked Computing

e-business/ e-commerce the conducting of business functions (e.g., buying and selling goods and services, servicing customers, collaborating with business partners) electronically, in order to enhance an organization’s operations.

The infrastructure for e-business is network computing, which connects computers and other electronic devices via telecommunication networks.These computers may be connected to the global networked environment, known as the internet, or to its counter part within organizations, called an intranet, many companies link their intranet to those of their business partners over networks called extranets.

5

Page 8: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Information Technology

The collection of computing systems used by an organization

6

Page 9: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Major Capabilities of Information System

Perform high-speed, high-volume, numerical computation. Provide fast, accurate, and inexpensive communication within

and between organizations. Automate both semiautomatic business processes and manual

tasks. Store huge amounts of information in an easy-to-access, yet

small space. Allow quick and inexpensive access to vast amount of

information, worldwide. Facilitate the interpretation of vast amounts of data Enable communication and collaboration anywhere, any time. Increase the effectiveness and efficiency of people working in

groups in one place or in several locations, anywhere. Facilitate work in hazardous environment .

7

Page 10: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Digital Economy

An economy based on digital technologies, including communication networks (the Internet , intranets, and extranets), computers, software, and other related technologies; also sometimes called the Internet economy, the new economy, or the Web economy .

8

Page 11: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Digital networking and communications infrastructures includes:

A vast array of digitizable product -data bases, news and information, books, magazines, TV and radio programming , movies, electronic games, musical CDs, and software- which are delivered over the digital infrastructure any time, anywhere in the world

Consumers and firm conducting financial transaction digitally-through digital currencies or financial tokens carried via networked computers and mobile devices

Physical goods such as home appliances and automobiles that are embedded with microprocessors and networking capabilities.

9

Page 12: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

The New Economy VS. The Old Economy

Example Old New

Buying and selling text book

Visit the bookstore Visit web site for publishers and retailers

Registering for classes Walk around campus to Departments, Registrar’s office, etc.

Access campus web site

Photography Buy film, use camera, take picture, take it for processing

Use digital camera

Paying for Gasoline Fill up your car, go inside, pay cash or credit card

Use speed pass token wave over the sensor and go

Paying the Transportation Pay cash, metal tokens Metro cards electronic cards

Paying for goods Visit store, take the item, pay , go Use self – service kiosks

Supplying commercial photos

Use newspapers, paper, catalog or on line

Use hub-like supply chain with digitized picture

10

Page 13: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Business Model in the Digital Economy

The Internet is revolutionizing the economic, societal, and technological foundations of the old economy. Organization are developing new models for business, the economy, and government

11

Page 14: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Changing a linear supply chain to a hub

12

Page 15: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Business Model

A method of doing business by which a company can generate revenue to sustain itself; spells out how the company adds value to its products or services.

13

Page 16: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Five Representative Business Models of the Digital Age.

Name- your- Own- Price: allow the buyer to state a price he or she is willing to pay for a specific product or service.

Bidding Using Reverse Auctions: Via a request for quote, the buyer indicates a desire to receive bids on a particular item, and would-be sellers bid on the job

14

Page 17: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Five Representative Models cont…

Affiliate Marketing: Marketing partners place a banner ad for a company on their Web site

Group Purchasing: The purchase orders of many buyers are aggregated, a small business, or even an individual, can get a discount

E-Marketplace: Markets in which buyers and sellers negotiate online

15

Page 18: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

1-2 Business Pressures, Organizational Responses, and IT Support Business Pressure , The business

environment is the combination of social, legal, economic, physical, and political factors that affect business activities. Significant changes in any of these factor are likely to create business pressure on organization . Three Types of business pressures that

organizations face- market, technology, and societal pressures .

16

Page 19: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

IT support for organizational responses

17

Page 20: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

The Three Types of Business Pressure

Market Pressure: The global economy and strong competition

free trade & varying labor costs The changing nature of the workforce

Diverse workforce with more women, minorities & disabled Powerful customers.

Internet has made customers more informed & demanding e.g. customer demand for customizable product (e.g. nike)

Technology Pressures: Technological Innovation and Obsolescence Information Overload.

Societal Pressure: Social responsibility (education, digital divide) Government regulation and Deregulation Spending for social programs Protection Against Terrorist Attacks (cyberattack, reserves) Ethical Issues (email privacy, databases)

18

Page 21: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Customer Relationship Management

An enterprise wide effort to acquire and retain customers, often supported by IT

19

Page 22: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Build- to- order

The strategy of producing customized products and services.

20

Page 23: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Mass customization

Production process in which items are produced in a large quantity but are customized to fit the desires of each customers.

21

Page 24: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Virtual corporation

A business that operates through telecommunications networks, usually without a permanent headquarters, to produce a product or service.

22

Page 25: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

1.3 Competitive advantage and SIS

Competitive Advantage: An advantage over competitors in some measure such as cost, quality, or speed, leads to control of a market and to larger- than average profits.

23

Page 26: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Strategic Information Systems (SISs)

Systems that help an organization gain a competitive advantage through their contribution to the strategic goals of an organization and /or their ability to significantly increase performance and productivity.

24

Page 27: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Competitive forces model

A business framework, devised by Michael Porter, for analyzing competitiveness by reorganization five major forces that could endanger a company’s position.

25

Page 28: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Porter’s five forces Model

26

Page 29: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Potter’s competitive forces model

Threat of entry of new competitors (esp. intermediaries)

Bargaining power of suppliers (supply chain integration, digital exchanges)

Bargaining power of customers Threat of substitute products or services (esp.

information-based or digitizable industries) Rivalry among existing firms in industry

(destructive price competition)

Page 30: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

Strategies for competitive advantage

1. Cost-leadership (e.g. Wal-mart)2. Differentiation (e.g. southwest airlines)3. Niche (e.g. dogtoys.com)4. Growth (e.g. web-based selling)5. Innovation (e.g. Citibank & ATM’s)6. Alliances (e.g. amazon & toysRus, Star)7. Operational effectiveness strategies (Delta)8. Customer orientation9. Time (customer response, time to market)10. Entry-barriers (patents, good service)11. Lock in customers or suppliers (freq fly, e-procure)12. Increase switching costs

Page 31: Chapter 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

“ Copyright 2005 John Wiley & Sons, Inc.”

All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein.