76
INFORMATION SYSTEM STRATEGY MODULE CONTENT BUSINESS & ADVANCED TECHNOLOGY CENTRE UNIVERSITY TECHNOLOGY MALAYSIA Day 1 The Information Systems Strategy Triangle Strategic Use of Information Resources Group/Case Study Information Technology and the Design of Work Information Technology and Changing Business Processes Day 2 Architecture and Infrastructure Doing Business on the Internet Group/Case Study The Management Information Systems Organization Funding IT & (Legalities) Module review and PMA discussion Main reference: Saunders, Carol S.. Managing and Using Information Systems: A Strategic Approach. New York, NY: Wiley, 2003. Full module slides from Chapter 1 to 12 may be downloaded from: http://www.zaipul.com/download/informationsystemstgy/

INFORMATION SYSTEM STRATEGY - Wikispaceszaipul.wikispaces.com/file/view/Information+System+Strategy+-+Sen… · INFORMATION SYSTEM STRATEGY MODULE CONTENT BUSINESS & ADVANCED TECHNOLOGY

Embed Size (px)

Citation preview

INFORMATION SYSTEM STRATEGY  

MODULE CONTENT  

BUSINESS & ADVANCED TECHNOLOGY CENTRE UNIVERSITY TECHNOLOGY MALAYSIA 

 Day 1 

 

• The Information Systems Strategy Triangle 

• Strategic Use of Information Resources 

• Group/Case Study • Information Technology and the Design of Work 

• Information Technology and Changing Business Processes 

 

Day 2 

 

• Architecture and Infrastructure • Doing Business on the Internet • Group/Case Study • The Management Information Systems Organization 

• Funding IT & (Legalities) • Module review and PMA discussion 

 

Main reference: Saunders, Carol S.. Managing and Using Information Systems: A Strategic Approach. New York, NY: Wiley, 2003. 

 

Full module slides from Chapter 1 to 12 may be downloaded from:  

http://www.zaipul.com/download/information‐system‐stgy/ 

 LECTURER INFORMATION 

 

1. Module: Information System Strategy 

2. Lecturer Name: Zaipul Anwar Bin Zainu  

3. Tel: 019‐3262427  

4. E‐mail: [email protected] 

 

5. Orgasisation: Inst. Of Product Design & Manufacturing, Universiti 

Kuala Lumpur, City Campus, Room Number: 2211  

6. Website: http://www.zaipul.com & http://www.zaipul.net 

7. Facebook: Zaipul Anwar 

8. Consultation: By Appointment (or through email, YM Chat or 

Facebook). In the future through eLearning: 

http://eLearning.zaipul.com  

 

9. Teaching materials: Lectures, Websites, Softwares, Videos, 

Background Music, Assignment/Group Discussion/Case Study 

 

Ch t 1Chapter 1Th I f ti S tThe Information Systems

Strategy TriangleStrategy TriangleManaging and Using Information Systems: A

Strategic ApproachStrategic Approach

by Keri Pearlson & Carol Saunders

Introd ctionIntroduction• How knowledgeable must a general

manager be about IS?manager be about IS?• What are the ramifications of an

improperly implemented IS?C IS b i d i i l ti ? Wh• Can IS be examined in isolation? Why or why not?y

• What function does IS play in the business t t f i ti ?strategy of an organization?

Copyright 2006 John Wiley & Sons, Inc. 2

The Impact of ISThe Impact of IS• The Information Systems Strategy Triangle is a

simple framework for understanding the impact p g pof IS on organizations.Successful firms have an overriding business• Successful firms have an overriding business strategy.

• This business strategy drives both Organizational and Information strategy.Organizational and Information strategy.

• All decisions are driven by the firm’s business objectivesobjectives.

Copyright 2006 John Wiley & Sons, Inc. 3

Figure 1.1 The Information Systems Strategy Triangle

Copyright 2006 John Wiley & Sons, Inc. 4

IS Strategy TriangleIS Strategy Triangle

• Business Strategy drives all other strategies.Organizational and Information Strategy are• Organizational and Information Strategy are then dependent upon the Business Strategy.

• Changes in any strategy requires changes in the others to maintain balance.

• IS Strategy is affected by the other strategies a firm usesfirm uses.

• IS strategy always involves consequences.

Copyright 2006 John Wiley & Sons, Inc. 5

BRIEF OVERVIEW OFBRIEF OVERVIEW OF BUSINESS STRATEGYBUSINESS STRATEGY

FRAMEWORKS

Think About ITThink About IT

• What is a business strategy?Whi h f t i fl b i• Which factors influences a business strategy?gy

• How does a business change its strategy without losing balance within itswithout losing balance within its organization and IS structure?

• Are there specific events that induce a business to change its strategies and whatbusiness to change its strategies and what are they?

Copyright 2006 John Wiley & Sons, Inc. 7

Generic Strategies Frame orkGeneric Strategies Framework

• Michael Porter describes how businesses b ild t i bl titican build a sustainable competitive

advantage.g• He identified three primary strategies for

hi i titi d tachieving competitive advantage:• Cost leadership – lowest-cost producerCost leadership lowest cost producer.• Differentiation – product is unique.• Focus – limited scope.

Copyright 2006 John Wiley & Sons, Inc. 8

Figure 1.2 Three strategies for achieving competitive advantage.

Copyright 2006 John Wiley & Sons, Inc. 9

Porter’s Competiti e Ad antagePorter’s Competitive Advantage• Remember that a companies overall business

strategy will drive all other strategies. gy g• Porter defined these competitive advantages to

represent various business strategies found in p gthe marketplace.

• Cost leadership strategy firms include Walmart, p gy ,Suzuki, Overstock.com, etc.

• Differentiation strategy firms include Coca Cola, gy ,Progressive Insurance, Publix, etc.

• Focus strategy firms include the Ritz Carlton, gy ,Marriott, etc.

Copyright 2006 John Wiley & Sons, Inc. 10

Differentiation Strateg VariantsDifferentiation Strategy Variants • Shareholder value model: create advantage

through the use of knowledge and timing g g g(Fruhan)

• Unlimited resources model: companies with a• Unlimited resources model: companies with a large resource can sustain losses more easily than ones with fewer resources (Chain Store vsthan ones with fewer resources (Chain Store vs Mom & Pop).The problem with Porter and these variants are• The problem with Porter and these variants are that the rate of change is no longer easily managed and sustainedmanaged and sustained.

Copyright 2006 John Wiley & Sons, Inc. 11

IS Planning and StrategicIS Planning and Strategic Advantage ModelsAdvantage Models

• General Managers cannot afford to rely solely g y yon IS personnel to make IS decisions.

• Business strategy drives IS decision making.gy g• Changes in IS potential should trigger business

reassessments (i.e. the Internet).( )• Information Systems Strategy Triangle shows

the proper balance of strategies.p p g• The models are helpful in discussing the role of

IS in building and sustaining competitive g g padvantage.

Copyright 2006 John Wiley & Sons, Inc. 12

F k K Id A li ti t I f ti S tFramework Key Idea Application to Information Systems

Porter’s i

Firms achieve competitive

Understanding which strategy is chosen by a firm is critical to choosing IS togeneric

strategies framework

competitive advantage through cost leadership, diff ti ti

a firm is critical to choosing IS to complement that strategy.

differentiation, or focus.

D’A i’ S d d Th 7 S i th tiD’Aveni’s hyper-competition

Speed and aggressive moves and countermoves

The 7 Ss give the manager suggestions on what moves and countermoves to make. IS are critical to achieve the speed needed competition

model by a firm create competitive advantage

for these moves.

g

Figure 1.3 Summary of key strategy frameworks.

Copyright 2006 John Wiley & Sons, Inc. 13

BRIEF OVERVIEW OFBRIEF OVERVIEW OF ORGANIZATIONALORGANIZATIONAL

STRATEGIES

Copyright 2006 John Wiley & Sons, Inc. 14

Organizational StrategyOrganizational Strategy• Organizational strategy includes the g gy

organization’s design as well as the choices it makes in its work processes.

• How will the company organize in order to achieve its goals and implement its business t t ?strategy?

• Business Diamond – simple framework for id tif i i l t fidentifying crucial components of an organization’s plan (Figure 1.4)M i l L th f k f• Managerial Levers – another framework for organizational design, states that successful execution of the firm’s organizational strategy isexecution of the firm s organizational strategy is the best combination of organizational, control, and cultural variables (Figure 1 5)

Copyright 2006 John Wiley & Sons, Inc. 15

and cultural variables (Figure 1.5).Figure 1.4 The Business Diamond

Copyright 2006 John Wiley & Sons, Inc. 16

Figure 1.5 Managerial Levers

Copyright 2006 John Wiley & Sons, Inc. 17

Understanding Organization StrategyUnderstanding Organization Strategy

T d t d i ti l t t tTo understand organizational strategy we must answer the following questions:

1. What are the important structures and reporting relationships within the organization?p g2. What are the characteristics, experiences, and skill levels of the people within the organization?skill levels of the people within the organization?3. What are the key business processes?4 What control systems are in place?4. What control systems are in place?5. What is the culture of the organization?

Copyright 2006 John Wiley & Sons, Inc. 18

Framework Key Idea Usefulness in IS Discussions

Business Di d

There are 4 key components of an

Using IS in an organization will affect each of these components Use thisDiamond components of an

organization: business processes, values and b li f t

each of these components. Use this framework to identify where these impacts are likely to occur

beliefs, management control systems, and tasks and structures.

Managerial levers

Organizational variables, control

i bl d lt l

This is a more detailed model than the Business diamond and gives

ifi h IS b dvariables, and cultural variables are the levers managers can use to

specific areas where IS can be used to manage the organization and to change it

affect change in their organizations

Figure 1.6 Summary of organizational strategy frameworks

Copyright 2006 John Wiley & Sons, Inc. 19

BRIEF OVERVIEW OFBRIEF OVERVIEW OF INFORMATION SYSTEMSINFORMATION SYSTEMS

STRATEGYSTRATEGY

IS StrategIS Strategy

• The plan an organization uses in providing information servicesinformation services.

• IS allows business to implement its business strategy.

• IS helps determine the company’s capabilities• IS helps determine the company s capabilities.• Four key IS infrastructure components are key to

IS t t (Fi 1 7)IS strategy (Figure 1.7)• These key components are sufficient to allow the y p

general manager to assess critical IS issues.

Copyright 2006 John Wiley & Sons, Inc. 21

What Who Where

Hardware List of physical components of the system

Individuals who use itIndividuals who manage it

Physical location

system manage it

Software List of programs, applications, and

Individuals who use itIndividuals who

What hardware it resides upon and

utilities manage it where that hardware is located

Networking Diagram of how Individuals who use Where the nodes areNetworking Diagram of how hardware and software components are

Individuals who use it/ Individuals who manage it/Company service

Where the nodes are located, where the wires and other transport media arecomponents are

connectedCompany service obtained from

transport media are located

Data Bits of information Individuals who use it Where the stored in the system Individuals who

manage itinformation resides

Figure 1.7 Information systems strategy matrix.

Copyright 2006 John Wiley & Sons, Inc. 22

FOOD FOR THOUGHT:FOOD FOR THOUGHT: ECONOMICS OFECONOMICS OF

INFORMATION VS. ECONOMICS OF THINGS

Information s ThingsInformation vs Things

• Every business is in the information business (Evans and Wurster).(Evans and Wurster).

• All forms of industry rely heavily on IS.M d ti• Mercedes cars computing power.

• Marketing research, logistics, advertising, inventory management all rely on IS.

• Things wear out.g• Information never wears out.

Fi 1 8 thi ith i f ti• Figure 1.8 compares things with information.

Copyright 2006 John Wiley & Sons, Inc. 24

Things Information

Wear out Doesn’t wear out, but can become obsolete or untrue

Are replicated at the expense of the manufacturer

Is replicated at almost zero cost without limit

Exist in a tangible form May exist in the ether

When sold, seller ceases to own When sold, seller may still possess and sell again

P i b d d ti t P i b d l tPrice based on production costs Price based on value to consumer

Figure 1.8 Comparison of the economics of things with the economics of information

Copyright 2006 John Wiley & Sons, Inc. 25

SUMMARYSUMMARY

Copyright 2006 John Wiley & Sons, Inc. 26

S mmarSummary

• Competitive advantage is gained through cost leadership differentiation or focusleadership, differentiation, or focus.

• The Information Systems Strategy Triangle shows that business strategy always drives organizational and information strategies.g g

• Hypercompetition defines competitive advantage as temporaryas temporary.

• Understanding the influence of IS in organizational strategy is paramount.

Copyright 2006 John Wiley & Sons, Inc. 27

Chapter 2Chapter 2Strategic Use ofStrategic Use of

Information ResourcesInformation ResourcesManaging and Using Information Systems: A Strategic Approach

by Keri Pearlson & Carol Saunders

IntroductionIntroduction• How have successful businesses utilized IS• How have successful businesses utilized IS

strategically?• What resources are involved in crafting a

strategic IS policy? Which one is moststrategic IS policy? Which one is most important?Many of today’s most successful companies• Many of today’s most successful companies have created strategic alliances. How has this helped them to create strategic advantage?

Copyright 2006 John Wiley & Sons, Inc. 2

Real World ExamplesReal World Examples• In 1994 Dell finally stopped selling PCs through• In 1994 Dell finally stopped selling PCs through

retail stores.• It moved completely to using an integrated IT

platform that allow the order of customized systems.• Strategic use of IS produced Cost savings from

reduced inventories passed on to customers.p• This innovation created a competitive advantage for

Dell which used its information resources to achieveDell, which used its information resources to achieve high volumes without the high costs of the industry’s traditional distribution channels (see www dell com)traditional distribution channels (see www.dell.com)

Copyright 2006 John Wiley & Sons, Inc. 3

EVOLUTION OFEVOLUTION OF INFORMATIONINFORMATION RESOURCESRESOURCES

Copyright 2006 John Wiley & Sons, Inc. 4

Information ResourcesInformation Resources• Over the past decades the use of information• Over the past decades the use of information

resources has changed.O i ti h d f “ ffi i• Organizations have moved from an “efficiency model” of the 1960’s to a “value creation model”

f th 2000’of the 2000’s.• Companies seek to utilize those technologies that g

give them competitive advantage.• Maximizing the effectiveness of the firm’sMaximizing the effectiveness of the firm s

business strategy requires the general manager to identify and use information resources.to identify and use information resources.

• Figure 2.1 shows this change.

Copyright 2006 John Wiley & Sons, Inc. 5

Primary EfficiencyA

EffectivenessS l bl

StrategicI i di id l

StrategicT f

Value creationC

1960s 1970s 1980s 1990s 2000+

Role of IT Automate existing paper-based processes

Solve problems and create opportunities

Increase individual and group effectiveness

Transform industry/organization

Create collaborative partnerships

Justify IT expenditure

ROI Increasing productivity and decision making

Competitiveposition

Competitiveposition

AddingValue

Target of systems

Organization Individual manager/Group

Businessprocesses

Business processes ecosystem

Customer,supplier,ecosystemy

Information model

Applicationspecific

Data-driven User-driven Business-driven Knowledge-driven

D i t Mainframe Minicomputer Microcomputer Client Server InternetDominant technology

Mainframe-based

Minicomputer-based

Microcomputer “decentralized intelligence”

Client-Server “distribution intelligence”

Internet “ubiquitous intelligence”

Basis of Scarcity Scarcity Scarcity Plentitude PlentitudeBasis of Value

y y y

Underlying economics

Economic of information

Economic of information

Economic of information bundled

Economic of information

Economic of information economics bundled w/

economics of things

bundled w/ economics of things

w/ economics of things

separated f/ economics of things

separated f/ economics of things

Fi 2 1 E f i f ti i i tiCopyright 2006 John Wiley & Sons, Inc. 6

Figure 2.1 Eras of information usage in organizations

INFORMATION RESOURCES AS

STRATEGIC TOOLS

Copyright 2006 John Wiley & Sons, Inc. 7

Information ResourcesInformation ResourcesI f ti i d fi d th il bl• Information resources is defined as the available data, technology, and processes available to

f b i d t kperform business processes and tasks.• Relationships between general managers and IS

managers.• Resources available include:Resources available include:

– IS Infrastructure– Information and knowledgeInformation and knowledge– Proprietary technology

Technical skills of IT staff– Technical skills of IT staff– End users of the IS and more.

Copyright 2006 John Wiley & Sons, Inc. 8

Advantages or Information gResources

• General managers evaluating an information resource for competitive advantage needs toresource for competitive advantage needs to ask:

What makes the information reso rce al able?– What makes the information resource valuable?– Who appropriates the value created by the

information resource?information resource?– Is the information resource equally distributed across

firms?firms?– Is the information resource highly mobile?

How quickly does the information resource become– How quickly does the information resource become obsolete?

Copyright 2006 John Wiley & Sons, Inc. 9

HOW CAN INFORMATION RESOURCES BE USED

STRATEGICALLY?

Copyright 2006 John Wiley & Sons, Inc. 10

The Strategic LandscapeThe Strategic Landscape

• Managers confront elements that influence the competitive environmentcompetitive environment.

• Slim tolerance for error.• Managers must take multiple view of the

strategic landscape such as:strategic landscape, such as:– First view - Porter’s five competitive forces model.

S d i P t ’ l h i– Second view - Porter’s value chain.– Third view – focuses on the types of IS resources

needed (Resource Based View).

Copyright 2006 John Wiley & Sons, Inc. 11

Using Information Resources to gInfluence Competitive Forces

• Porter’s five forces model show the major forces that shape the competitive environment p pof the firm.

1. Threat of New Entrants: new firms that may enter a companies marketcompanies market.

2. Bargaining Power of Buyers: the ability of buyers to use their market power to decrease a firm’s competitive position

3. Bargaining Power of Suppliers: the ability suppliers of the inputs of a product or service to lower a firm’s competitive position

4. Threat of Substitutes: providers of equivalent or superior alternative products

5. Industry Competitors: current competitors for the same5. Industry Competitors: current competitors for the same product.

• Figure 2.2 and 2.3 show this model in detail.

Copyright 2006 John Wiley & Sons, Inc. 12

Figure 2.2 Five competitive forces with potential strategic use of information resources.

Copyright 2006 John Wiley & Sons, Inc. 13

Competitive Force IT Influence on Competitive Force

Threat of New Entrants Can be lowered if there are barriers to entry. Sometimes IS can be used to create barriers to entry

Bargaining Power of Buyers Can be high if it’s easy to switch. Switching costs are increased by giving buyers things they value in

h h l t f l i f tiexchange such as lower costs or useful information

Bargaining Power of Suppliers Forces is strongest when there are few firms to choose from quality is inputs is crucial or the volumechoose from, quality is inputs is crucial or the volume of purchases is insignificant to the supplier

Threat of Substitute Products Depends on buyers’ willingness to substitute and the level of switching costs buyer’s face

Industrial Competitors Rivalry is high when it is expensive to leave and industry, the industry’s growth rate is declining, or products have lost differentiation

Figure 2.3 Application of five competitive forces model.

Copyright 2006 John Wiley & Sons, Inc. 14

Porter’s Val e Chain ModelPorter’s Value Chain Model

• Value chain model addresses the activities that create deliver and support a company’screate, deliver, and support a company s product or service.

• Two broad categories:– Primary activities – relate directly to the value created Primary activities relate directly to the value created

in a product or service.– Support activities – make it possible for the primarySupport activities make it possible for the primary

activities to exist and remain coordinated.

Copyright 2006 John Wiley & Sons, Inc. 15

Altering the Value ChainAltering the Value Chain• The Value Chain model suggest that competition• The Value Chain model suggest that competition

can come from two sources:Lowering the cost to perform an activity and– Lowering the cost to perform an activity and

– Adding value to a product or service so buyers will be willing to pay morebe willing to pay more.

• Lowering costs only achieves competitive d t if th fi i f tiadvantage if the firm possesses information on

the competitor’s costs• Adding value is a strategic advantage if a firm

possesses accurate information regarding its customer such as: which products are valued? Where can improvements be made?

Copyright 2006 John Wiley & Sons, Inc. 16

Figure 2.4 Value chain of the firm.

Copyright 2006 John Wiley & Sons, Inc. 17

The Val e Chain S stemThe Value Chain System• The value chain model can be extended by

linking many value chains into a value systemlinking many value chains into a value system.• Much of the advantage of supply chain

management comes from understanding howmanagement comes from understanding how information is used within each value chain of the systemthe system.

• This can lead to the formation of entirely new b i d i d t h th i f tibusinesses designed to change the information component of value-added activities. (Figure 2 5)2.5)

Copyright 2006 John Wiley & Sons, Inc. 18

Figure 2.5 The value system: interconnecting relationships between organizations.

Copyright 2006 John Wiley & Sons, Inc. 19

Activity Grocery Chain’s Value Chain Supplier’ Value Chain

Primary ActivitiesInbound Logistics Analysis of buying patterns suggest

items should be stocked at local stores including amounts and optimum

Analysis of buying patterns can aid grocery chains in better determining demand leading to better forecasting

Primary Activities

Operations

stores, including amounts and optimum delivery timesAutomated checkout can speed ckt. operations; may lead to reduced

demand, leading to better forecasting for both chain and supplierAnalysis of buying patterns can reduce ‘last-minute’ orders and

staffing of registers/ lower operating costs

improve suppliers processing of orders

Outbound logistics Sharing analysis of buying patterns by grocery chain can aid supplier in schedulingSuppliers may be able to offer

Marketing and Sales

Service

Analysis of b. patterns can aid development of promotional strategies/ highlight customer preference Automated checkout lanes shorten

Suppliers may be able to offer economies of scale in its purchases

Sharing analysis of b patterns allowsService Automated checkout lanes shorten customer waiting times

Sharing analysis of b. patterns allows better supplier service

Figure 2.6 Application of Value Chain Model

Copyright 2006 John Wiley & Sons, Inc. 20

S d A ti iti

OrganizationShopping card can provide data to help grocery chain plan for trends and

Shopping card can provide data to help supplier plan for trends

Secondary Activities

Organization g y pdemographic changes in its target market.

p pp pand demographic changes in its target market.

Human Resources Staffing needs for cash registers may be reduces with automated checkout

Sh i d id d t fTechnology

Shopping card can provide data for market research

Grocery chain can provide information to help supplier’s marketing research

Purchasing Grocery chain may be able to capture more discounts for volume purchases

Supplier chain may be able to capture more discounts for volume purchasesvolume purchases

Figure 2.6 Application of Value Chain Model (continued)

Copyright 2006 John Wiley & Sons, Inc. 21

CRM and the Val e ChainCRM and the Value Chain

• Customer Relationship Management (CRM) is a natural extension of applying the value chainnatural extension of applying the value chain model to customers.

• CRM includes management activities performed to obtain, enhance relationships with, and retain , p ,customers.

• CRM is a coordinated set of activities• CRM is a coordinated set of activities.• CRM can lead to better customer service, which

leads to competitive advantage for the business.

Copyright 2006 John Wiley & Sons, Inc. 22

The Resource-Based ViewThe Resource Based View• The Resource-Based View (RBV) looks atThe Resource Based View (RBV) looks at

gaining competitive advantage through the use of information resourcesof information resources.

• Two subsets of information resources have been identified:identified:– Those that enable firms to attain competitive

advantage (rare and valuable resources that are notadvantage (rare and valuable resources that are not common place).Those that enable firms to sustain competitive– Those that enable firms to sustain competitive advantage (resources must be difficult to transfer or relatively immobile).y )

Copyright 2006 John Wiley & Sons, Inc. 23

S G C C SSTRATEGIC ALLIANCES

Copyright 2006 John Wiley & Sons, Inc. 24

The Value System and Strategic y gAlliances

• Many industries are experiencing the growth of strategic alliances that are directly linked to g ysharing information resources across existing value systems.

• E.g., Delta recently formed an alliance with e-Travel Inc to promote Delta’s inline reservation

tsystem.• This helps reduce Delta’s agency fees while

ff i T l t l doffering e-Travel new corporate leads.• Also, Supply Chain Management (SCM) is

th t f IT f ilit t d t t i llianother type of IT-facilitated strategic alliance.

Copyright 2006 John Wiley & Sons, Inc. 25

Types of Strategic AlliancesTypes of Strategic Alliances• Supply Chain Management: improves the way a

company finds raw components that it needs to p y pmake a product or service.– Technology, especially Web-based, allows the supply chain of a gy p y pp y

company’s customers and suppliers to be linked through a single network that optimizes costs and opportunities for all companies in the supply chainin the supply chain

– Wal-Mart and Proctor & Gamble.

• Co-opetition: a new strategy wherebyCo opetition: a new strategy whereby companies cooperate and compete at the same time with companies in their value nettime with companies in their value net– Covisint and General Motors, Ford, and DaimlerChrysler.

Copyright 2006 John Wiley & Sons, Inc. 26

RISKSRISKS

Copyright 2006 John Wiley & Sons, Inc. 27

Potential Risksote t a s s• There are many potential risks that a firm faces when

tt ti t IT t t th i titiattempting to use IT to outpace their competition. • Executives should be aware of these risks before they

surfacesurface.• They are:

– Awakening a sleeping giant – a large competitor with deeper a e g a s eep g g a t a a ge co pet to t deepepockets may be nudged into implementing IS with even better features

– Demonstrating bad timing – sometimes customers are notDemonstrating bad timing sometimes customers are not ready to use the technology designed to gain strategic advantage

– Implementing IS poorly – information systems that fail because– Implementing IS poorly – information systems that fail because they are poorly implemented

– Failing to deliver what users what – systems that don’t meet the firm’s target market likely to failthe firm s target market likely to fail

– Running afoul of the law – Using IS strategically may promote litigation

Copyright 2006 John Wiley & Sons, Inc. 28

FOOD FOR THOUGHT:FOOD FOR THOUGHT: TIME-BASEDTIME BASED

COMPETITIVECOMPETITIVE ADVANTAGE

Copyright 2006 John Wiley & Sons, Inc. 29

Time-based CompetitiveTime based Competitive Advantageg

• The 21st Century will see organizations increasingly seeking to use technology to neutralize the competitionseeking to use technology to neutralize the competition as quickly as possible.

• Reaching individual customers and meeting their needsReaching individual customers and meeting their needs as close to instantaneously as possible will leave no room for competitive actions to change the customer’s mindmind

• Typical planning cycles are thrown out the window because the organization needs to respond quickly tobecause the organization needs to respond quickly to customer, competitor and environmental changes.

• Some firms, like Dell, have embraced this opportunity.

Copyright 2006 John Wiley & Sons, Inc. 30

SUMMARYSUMMARY

Copyright 2006 John Wiley & Sons, Inc. 31

S mmarSummary• Using IS for strategic advantage requires more

than just knowing the technologythan just knowing the technology.• Remember that not just the local competition is a

f t i b t th 5 titi ffactor in success but the 5 competitive forces model reminds us of other issues.

• Value chain analysis show us how IS add value to the primary activity of a businessto the primary activity of a business.

• Know the risks associated with using IS to gain strategic advantage.

Copyright 2006 John Wiley & Sons, Inc. 32

Chapter 4Chapter 4Information TechnologyInformation Technology and the Design of Workand the Design of Work

Managing and Using Information Systems: A Managing and Using Information Systems: A Strategic Approach

b K i P l & C l S dby Keri Pearlson & Carol Saunders

Introd ctionIntroduction• How can the automation of work lower morale

and job satisfaction?and job satisfaction?• How can management help to prevent or at least

minimize this impact?minimize this impact?• What is a job design framework?• How does IT change the way work is done and

where it is done?• Discuss the advantages and disadvantages of

telecommuting?telecommuting?

Copyright 2006 John Wiley & Sons, Inc. 2

JOB DESIGN FRAMEWORK

Copyright 2006 John Wiley & Sons, Inc. 3

JOB DESIGN FRAMEWORKJOB DESIGN FRAMEWORK• A simple framework can be used to assessA simple framework can be used to assess

how emerging technologies may affect work.Thi f k i f l i d i i k• This framework is useful in designing key characteristics of jobs by asking key questions (see figure 4.1). Such as:– What tasks will be performed?p– How will the work be performed?– Who will do the work?– Who will do the work?– Where will the work be performed?

H IS i f ti f ti d– How can IS increase performance, satisfaction and effectiveness of the workers doing the work?

Copyright 2006 John Wiley & Sons, Inc. 4

Figure 4.1 Framework for job design impacts.

Copyright 2006 John Wiley & Sons, Inc. 5

HOW INFORMATION TECHNOLOGY CHANGES THE NATURE OF WORKTHE NATURE OF WORK

Creating New Types of WorkCreating New Types of Work• IT has created many new jobs or types of work.IT has created many new jobs or types of work.• Examples of newly created jobs now common in

traditional organizations include: g– Knowledge managers – Systems analysts – Database and network administrators– Webmasters and web site designers

IT S it f i l d– IT Security professionals, and more.• It has changed not only the organizational decision-

making process the information used in makingmaking process, the information used in making decisions, plus the amount and type of information available to workers.

• The ITAA places the number of IT workers at 10.5 million in 2004.

Copyright 2006 John Wiley & Sons, Inc. 7

New Ways to do Traditional WorkNew Ways to do Traditional Work• Many traditional tasks are now done byMany traditional tasks are now done by

computers, while many work processes have been greatly changed by the introduction of ITbeen greatly changed by the introduction of IT

• Communication patterns have also changed, workers now use mobile devices to send andworkers now use mobile devices to send and receive messages and tap into databases, greatly affecting sales and service tasksaffecting sales and service tasks.

• The cost and time needed to access information i d ti ll l i i k t lis dramatically lower, giving workers new tools.

• Work has become much more team oriented - an effect amplified by the Internet.

Copyright 2006 John Wiley & Sons, Inc. 8

New Challenges in IT HR ManagementNew Challenges in IT HR Management

• Organizations face the challenge of managing• Organizations face the challenge of managing a work force that is no longer in a single locationlocation.

• Work is more team oriented, making it more diffi lt t i di id l t ib tidifficult to assess individual contributions.

• One solution is to use electronic employee ymonitoring systems automating supervision, but possibly hurting morale and undermining p y g gefforts encourage workers to contribute their ideas to the organization.g

Copyright 2006 John Wiley & Sons, Inc. 9

Traditional Approach: Subjective Observation

Newer Approach; Objective Assessment

Supervision Personal. Manager is usually present or relies on others to ensure that employee is present

Electronic, or assessed by deliverable. As long as the employee is producing value, he

and productive. does not need formal supervisions

Evaluation Focus is on process through Focus is on output by deliverableEvaluation Focus is on process through direct observation. Manager sees how employee performed at work. Subjective (personal) factors are

Focus is on output by deliverable or by target. As long as deliverables are produced and/or targets achieved the employee isSubjective (personal) factors are

very important.targets achieved, the employee is meeting performance expectations adequately.

C ti Oft i di id ll b d Oft t b d t t llCompensation and Rewards

Often individually-based. Often team-based or contractually spelled out

Hiring Personal with little reliance on Often electronic with recruiting computers. Often more reliance on clerical skills

websites and electronic testing. More informated work that requires a higher level of IT skills.

Figure 4.2. Changes to supervision, evaluation, compensation, and hiring

Copyright 2006 John Wiley & Sons, Inc. 10

Work It creates millions of new jobs, some in

W ki

j ,entirely new industries.

M k i t i t d bl d bWorking Arrangements

More work is team-oriented, enabled by communications and collaboration technologies. Geographic constraints of g g psome professions are eliminated, enabling telecommuting.

Human ResourcesNew strategies are need to supervise,evaluate, and compensate remotely , p yperformed, team-oriented work. ITrequires new skills workers often lack.

Fig. 4.3 Summary of IT’s Effects on Employee Life

Copyright 2006 John Wiley & Sons, Inc. 11

HOW INFORMATIONHOW INFORMATION TECHNOLOGY CHANGESTECHNOLOGY CHANGES WHERE WORK IS DONEWHERE WORK IS DONE

Copyright 2006 John Wiley & Sons, Inc. 12

The Growth of TelecommutingThe Growth of Telecommuting• Telecommuting has gained popularity since the

late 1990s because:– It lowers corporate overhead. Telecommuting workers

don’t take up office space, lowering facilities costs– Workers who are giving increased flexibility are more

productive and express higher levels of job satisfaction

2/3’ f Ci l i ll k f• 2/3’s of Cisco employees occasionally work from home. – This has saved them $1M in overhead and increased

productivity by 25%, as workers prefer to set their h d l d k i f t blown schedules and work in more comfortable

surroundings.

Copyright 2006 John Wiley & Sons, Inc. 13

Enabling Factors for TelecommutingEnabling Factors for Telecommuting

Th f t t th th f t l ti• Three factors support the growth of telecommuting growth (Figure 4.4):– Work is increasingly knowledge-based so workers

don’t need to be “at work” to do their jobs.– Telecommuting enables workers to shift their work to

accommodate their lifestyles, esp. parenting or living in locations far from the office.

– More powerful PCs + cheap, high speed telecom (ADSL, cable modem) mean telecommuters can connect to corporate network efficiently.

Copyright 2006 John Wiley & Sons, Inc. 14

Driver Effect:Shift to knowledge-based work

Eliminates need that some work be done in a specific pplace

Changing demographics and lifestyle preferences

Provide workers with geographic and time-and lifestyle preferences geographic and timeshifting flexibility

New technologies Make remotely performed work practical and costg work practical and cost-effective

Figure 4.4 Driving factors of telecommuting

Copyright 2006 John Wiley & Sons, Inc. 15

New Technologies SupportingNew Technologies Supporting Telecommuting & Mobile Workg

• Sales and service personnel can now quote p qorders at point of sale, improving customer satisfaction, reducing sales cycle time and , g ycutting costs.

• Roles changing due to heavy use of fourRoles changing due to heavy use of four technologies: laptops, PDAs, handheld terminals and mobile phones (See Figure 4 5)terminals and mobile phones (See Figure 4.5).

• High quality laptops are the most important and widely used of all mobile work technologieswidely used of all mobile work technologies.

Copyright 2006 John Wiley & Sons, Inc. 16

Disadvantages of TelecommutingDisadvantages of Telecommuting and Mobile Work

• More difficult for managers to evaluate and t fcompensate performance

• Workers must be extremely self-disciplinedy p• Can disconnect them from corporate culture

L b i liti i t b t• Labor unions, politicians, etc., worry about foreign outsourcing of software development and computer services enabled by the same technologies g

Copyright 2006 John Wiley & Sons, Inc. 17

Technology Used By ImpactsTechnology Used By ImpactsLaptop computers

Professionals, particularly consultants and salespeople

Eliminate constraints of travel. Enables workers to

PDAs Mostly professionals, but gaining mass acceptance

be productive anywhereProvides a low-cost, simple way of organizing

Handheld

gaining mass acceptance

Service professionals,

way of organizing information and data

Handheld terminals

Service professionals, particularly delivery, technical support, and service and repair technicians

Enhances productivity and adds capabilities and real-time communication

Portable phones

repair technicians

Any worker who travels during

time communication

Allows immediate voice y ghis or her work routine communication

(and sometimes data)

Figure 4.5 Key technologies in redesigning work

Copyright 2006 John Wiley & Sons, Inc. 18

Employee Advantages of Potential ProblemsTelecommutingReduced stress due to increased ability to meet schedules heightened

Harder to evaluate performance, Increased stress from inability toability to meet schedules, heightened

morale, and lower absenteeism Increased stress from inability to separate work from home life

Geographic flexibility Employee may become disconnected from company culture

Higher personal productivity Telecommuters are more easily replaced by electronic immigrants

Housebound individuals can join the

replaced by electronic immigrants

Not suitable for all jobs or employees jworkforce

Figure 4.6 Advantages and disadvantages of telecommuting

Copyright 2006 John Wiley & Sons, Inc. 19

Managerial Issues In a age a ssuesTelecommuting and Mobile Work

• Planning, business and support tasks must g ppbe redesigned to support mobile and remote workersworkers

• Training should be offered so all workers can d t d th k i tunderstand the new work environment

• Employees selected for telecommuting jobs p y g jmust be self-starters

Copyright 2006 John Wiley & Sons, Inc. 20

INFORMATION SYSTEMS ENABLE MOREENABLE MORE GROUP WORKGROUP WORK

Groupware and Electronic Collaboration

• Groupware tools such as Lotus Notes, and technologies such as video conferencingtechnologies, such as video conferencing have made it cost-effective for distant workers t t dit d h l t ito create, edit and share electronic documents and processes.

• Collaboration adds value to many types of tasks particularly those that benefit from antasks, particularly those that benefit from an exchange of ideas.

Copyright 2006 John Wiley & Sons, Inc. 22

Whirlpool’s Product DesignWhirlpool s Product Design Management (PDM) systemg ( ) y

• PDM unites design teams electronically using aPDM unites design teams electronically using a central data repository.E i d th ld ll b t li• Engineers around the world collaborate online to create several basic designs using PDM.

• Each region then customizes generic design for local use.for local use.

• PDM halves design time, saves money and b i d t t k t i klbrings products to market more quickly.

Copyright 2006 John Wiley & Sons, Inc. 23

F d M t CFord Motor Company

• Ford now develops cars for world markets by electronically linking design and engineering centers via videoconferencing and corporate g pintranets.

• Faster more efficient communication allows• Faster more efficient communication allows Ford to design and produce cars in less time.

Copyright 2006 John Wiley & Sons, Inc. 24

GAINING ACCEPTANCEGAINING ACCEPTANCE FOR IT-INDUCED CHANGEFOR IT INDUCED CHANGE

Gaining acceptance for g pIT-induced Change

• To avoid resistance to change, system implementers and managers must activelyimplementers and managers must actively manage the change process

• The Technology Acceptance Model (TAM) (Figure 4.7) suggests that employee attitudes ( g ) gg p ymay change if they think the new system will help them to do more or better work for thehelp them to do more or better work for the same effort, and that it’s easy to use.E l ti i ti i th t ’ d i• Employee participation in the system’s design and implementation also helps.

Copyright 2006 John Wiley & Sons, Inc. 26

Perceived Usefulness

B h i l A lExternalVariables

Attitude Toward

Using

Behavioral Intention

to Use

ActualSystem

Use

Perceived Ease of Use

Figure 4.7 Technology Acceptance Model

Copyright 2006 John Wiley & Sons, Inc. 27

FOOD FOR THOUGHTFOOD FOR THOUGHT: THE PRODUCTIVITYTHE PRODUCTIVITY

PARADOXPARADOX

Does IS/IT Investment ImproveDoes IS/IT Investment Improve Worker Productivity?

• Some researchers argue ongoing costs outweigh productivity gainsoutweigh productivity gains

• Other research suggests employee productivity is risingproductivity is rising

• Some argue the measurement of productivity i fl d f il t t i iis flawed; e.g., fails to capture gains in service.

• Recent research suggests that heavy investment in IT is finally paying off.y p y g

Copyright 2006 John Wiley & Sons, Inc. 29

SUMMARYSUMMARY

S mmarSummary• Technology has played a major role in

transforming the way work is donetransforming the way work is done.• Individuals must become comfortable with new

technologies to stay marketabletechnologies to stay marketable.• Managers must be sensitive to employees as

t h l i ll d tnew technologies are rolled out.• Telecommuting is a reality and many g y y

corporations have a percentage of their workforce involved in this practice.p

Copyright 2006 John Wiley & Sons, Inc. 31

Ch t 5Chapter 5I f ti T h lInformation Technology

d Ch i B iand Changing Business ProcessesProcesses

Managing and Using Information Systems: A Strategic Approach

by Keri Pearlson & Carol Saunders

Copyright 2006 John Wiley & Sons, Inc.

IntroductionIntroduction• How can IT enable business change?How can IT enable business change?

– Think of several examples.• How can IT impede business change?• What problems are caused by the• What problems are caused by the

functional (silo) perspective of a business?• The process perspective keeps the big

picture in view. How can IT help with this p ctu e e o ca e p t t smanagement style?Ho are TQM and BPR sed to transform• How are TQM and BPR used to transform a business?

Copyright 2006 John Wiley & Sons, Inc.

SILO PERSPECTIVESILO PERSPECTIVE VERSESVERSES

BUSINESS PROCESSBUSINESS PROCESS PERSPECTIVE

Copyright 2006 John Wiley & Sons, Inc.

Silo (Functional) PerspectiveSilo (Functional) Perspective• The silo perspective views the business asThe silo perspective views the business as

discrete functions (accounting, sales, production, etc.). Figure 5.1 shows a traditional org chart etc.). Figure 5.1 shows a traditional org chart which is how a functional business is organized.

• Each functional area determines its coreEach functional area determines its core competencies and focuses on what it does best.

• Advantages:Advantages:– Allows optimization of expertise.– Group like functions together for learning.p g g

• Disadvantages:– Significant sub-optimization.Significant sub optimization.– Tend to lose sight of overall organizational objectives.

Copyright 2006 John Wiley & Sons, Inc.

Figure 5.1 Hierarchical Structure

Copyright 2006 John Wiley & Sons, Inc.

Process PerspectiveProcess PerspectiveK th bi i t i i• Keeps the big picture in view.

• Focuses on work being done to create optimal l f th b ivalue for the business.

• Advantages:– Helps avoid or reduce duplicate work.– Facilitate cross-functional communication.– Optimize business processes.

• Figure 5.2 shows a typical procurement process.• Figure 5.3 shows the cross-functional view of

processes as they cross departments (f i )(functions).

Copyright 2006 John Wiley & Sons, Inc.

Figure 5.2 – Sample business processg p p

Copyright 2006 John Wiley & Sons, Inc.

Figure 5.3 Cross-functional nature of business processes

Copyright 2006 John Wiley & Sons, Inc.

Process Perspective (continued)Process Perspective (continued)

• When managers gain the process perspectiveWhen managers gain the process perspective they begin to lead their organizations to change.Q ti t t• Question status quo.

• Don’t accept “because we have always done it p ythat way” as an answer to why business is done in a particular way.a particular way.

• Allows managers to analyze business’s processes i li ht f l lin light of larger goals.

• Figure 5.4 summarizes the silo and process g pviews.

Copyright 2006 John Wiley & Sons, Inc.

Silo Perspective Business Process Perspective

D fi iti S lf t i d f ti l it I t l t d ti l tDefinition Self-contained functional units such as marketing, operations, finance, and so on

Interrelated, sequential set of activities and tasks that turns inputs into outputs

Focus Functional Cross-functional

Goal Optimizes on functional goals, Optimizes on organizational Accomplishment which might be a suboptimal

organizational goal.goals, or “big picture”

Benefits Highlighting and developing core Avoiding work duplication Benefits g g g p gcompetencies; Functional efficiencies

g pand cross-functional communication gaps; organizational effectiveness

Figure 5.4 Comparison of Silo Perspective and

g

Business Process Perspective

Copyright 2006 John Wiley & Sons, Inc.

OO S O C GTHE TOOLS FOR CHANGE

Copyright 2006 John Wiley & Sons, Inc.

TQMTQM

• Total Quality Management (TQM) is a tool f h th t ll i t lfor change that uses small incremental changes.g

• Personnel often react favorably to TQM.• Greater personnel control and ownership.

Change is viewed as less of a threat• Change is viewed as less of a threat.• Six-Sigma is one popular approach toSix Sigma is one popular approach to

TQM

Copyright 2006 John Wiley & Sons, Inc.

BPRBPRB i P R i i (BPR) i• Business Process Reengineering (BPR) is a more “radical” change management tool.

• Attain aggressive improvement goals.• Goal is to make a rapid, breakthrough impact on Goa s o a e a ap d, b ea oug pac o

key metrics.• Figure 5 6 shows the difference over time of the• Figure 5.6 shows the difference over time of the

radical (BPR) and incremental (TQM) approaches to changeapproaches to change.

• Greater resistance by personnel.• Use only when radical change is needed.

Copyright 2006 John Wiley & Sons, Inc.

Figure 5 5 Comparison of radical and incremental improvementFigure 5.5 Comparison of radical and incremental improvement

Copyright 2006 John Wiley & Sons, Inc.

The Process for Radical RedesignThe Process for Radical Redesign• The different approaches for radical redesign all pp g

include:– Begin with a vision of which performance metrics bestBegin with a vision of which performance metrics best

reflect the success of overall business strategy.– Make changes to the existing process.g g p– Measure the results using the predetermined metrics.

• Figure 5 6 illustrates a general view of radicalFigure 5.6 illustrates a general view of radical design.

• Figure 5 7 illustrates a method for redesigning a• Figure 5.7 illustrates a method for redesigning a business process.

• Tool used to understand a business process is a workflow diagram.

Copyright 2006 John Wiley & Sons, Inc.

Figure 5.6 – Conceptual flow of process design

Copyright 2006 John Wiley & Sons, Inc.

Figure 5.7 – Method for redesigning a business process

Copyright 2006 John Wiley & Sons, Inc.

Risks of Radical RedesignRisks of Radical Redesign

• Difficult to manage the process.– Manager needs a strong set of skills.

• Insuring acceptance of the new process• Insuring acceptance of the new process.• Transformation champion needed.p• Clear and well thought out plan.• Risk of failure of the new process.

Copyright 2006 John Wiley & Sons, Inc.

INTEGRATED SUPPLY CHAINS

Copyright 2006 John Wiley & Sons, Inc.

Integrated S ppl ChainsIntegrated Supply Chains

• Processes linked across companies.• Supply chain begins with raw materials

and ends with a product/serviceand ends with a product/service.• Globalization of business and ubiquity of

communication networks permits use of suppliers from anywheresuppliers from anywhere.

• Requires coordination among partners of q g pthe integrated supply chain.

Copyright 2006 John Wiley & Sons, Inc.

Integrated Supply Chain ( ti d)Integrated Supply Chain (continued)

Ch ll i l d• Challenges include:– Information integration.g– Synchronized planning.

Workflow coordination– Workflow coordination.• Leads to new business models.

– For example when banks link up to businesses new financial services are offeredbusinesses new financial services are offered such as on-line payments.

– Companies list needs and vendors– Companies list needs and vendors electronically bid to be the supplier.

Copyright 2006 John Wiley & Sons, Inc.

ENTERPRISE SYSTEMS

Copyright 2006 John Wiley & Sons, Inc.

Enterprise S stemsEnterprise Systems• A set of information systems tools used to• A set of information systems tools used to

enable information flow within and between processesprocesses.

• Enterprise systems are comprehensive software packagespackages.

• ERP (Enterprise Resource Planning) software packages are the most frequently discussedpackages are the most frequently discussed type of enterprise system.

• Designed to manage the potentially hundreds of• Designed to manage the potentially hundreds of systems throughout a large organization.

• SAP is the most widely used ERP software• SAP is the most widely used ERP software package.

Copyright 2006 John Wiley & Sons, Inc.

Characteristics of Enterprise pSystems

• Integration – seamlessly integrate information flows throughout the companyflows throughout the company.

• Packages – they are commercial packages purchased from software vendors (like SAPpurchased from software vendors (like SAP, Oracle, Peoplesoft, etc.).

• Best practices reflect industry best practices• Best practices – reflect industry best practices.• Some assembly required – the systems need to

be integrated with the existing hardware OS’sbe integrated with the existing hardware, OS s, databases, and telecommunications.

• Evolving the systems continue to change to fit• Evolving – the systems continue to change to fit the needs of the diverse marketplace.

Copyright 2006 John Wiley & Sons, Inc.

Benefits and Disadvantages of gEnterprise Systems

• Benefits:– All modules easily communicate together– All modules easily communicate together.– Useful tools for centralizing operations and decision

makingmaking.– Can reinforce the use of standard procedures.

• Disadvantages:• Disadvantages:– Implementation is an enormous amount of work.

M t i l l f d i i b i– Most require some level of redesigning business processes.H ft i t ( ld it )– Hefty price tag (sold as a suite).

– They are risky.

Copyright 2006 John Wiley & Sons, Inc.

The Adoption DecisionThe Adoption Decision• Sometimes it is appropriate to let the enterprise

system drive business process redesign.– When just starting out.– When organizational processes not relied upon for

strategic advantage.When current systems are in crisis– When current systems are in crisis.

• Sometimes it is inappropriate to let the enterprise system drive business processenterprise system drive business process redesign.

When changing an organizations processes that are– When changing an organizations processes that are relied upon for strategic advantage.

– When the package does not fit the organization.p g g– When there is a lack of top management support.

Copyright 2006 John Wiley & Sons, Inc.

FOOD FOR THOUGHTFOOD FOR THOUGHT: THE RISKS OF RADICALTHE RISKS OF RADICAL

REDESIGN ALONEREDESIGN ALONE

Copyright 2006 John Wiley & Sons, Inc.

Risks of Radical RedesignRisks of Radical Redesign

• Research shows some of the common reasons why companies fail to reach their goals:why companies fail to reach their goals:– Lack of senior management support.– Lack of coherent communications.– Introducing unnecessary complexity.g y y– Underestimating the amount of effort needed.– Combining reengineering with downsizingCombining reengineering with downsizing.

• Hammer argues that radical redesign is often di t t d i f fi li t d 5distorted in one of five ways as listed on page 5-19.

Copyright 2006 John Wiley & Sons, Inc.

Real World ExamplesReal World Examples• Cigna needed to radically improve operational efficiency due to the

following factorsfollowing factors.– Income had fallen 11%.– Exceeded market costs of other companies.

S i d i i i i l– Sagging productivity in crucial areas.• IT investments were not supporting the strategic direction of the

company and sophisticated new applications were being layered on top of existing organizations and processes.

• Cigna decided to initiate a program to radically redesign the company’s operating processes in key areas.p g p y

• Successes were replicated to other areas and the company realized savings of more than $100 million from more than 20 reengineering initiatives.initiatives.– Operating expenses reduced by up to 42%.– Cycle time improvements of 100%

Customer satisfaction increased 50%– Customer satisfaction increased 50%– Quality improvements of 75%

Copyright 2006 John Wiley & Sons, Inc.

SUMMARYSUMMARY

Copyright 2006 John Wiley & Sons, Inc.

SummarySummary

• IS can enable or impede business change.• You must look at business process to• You must look at business process to

understand the rule IS plays in business transformationtransformation.

• TQM or BRP are normally used to make h t b ichanges to business processes.

• ERP systems can be used to affect yorganizational transformation.

• Information systems are useful tools to bothInformation systems are useful tools to both enable and manage business transformation.

Copyright 2006 John Wiley & Sons, Inc.

Chapter 6Chapter 6Architecture andArchitecture and

InfrastructureInfrastructureManaging and Using Information Systems: A

Strategic Approach

by Keri Pearlson & Carol Saunders

Copyright 2006 John Wiley & Sons, Inc.

Introd ctionIntroduction

• What is the architecture of an i ti ?organization?

• What is the infrastructure of anWhat is the infrastructure of an organization?

• How should a manager influence a companies architecture and infrastructure?companies architecture and infrastructure?

• How does a company move from p yarchitecture to infrastructure?

Copyright 2006 John Wiley & Sons, Inc.

Real World Examplesp• In 1998 People’s Bank decided that its existing

IT hit t li itiIT architecture was limiting.• They needed seamless links to external partners

f t f l ti d t t ffor support of real-time data transfer.• They developed a new 4-tier architecture that

d i b O t b 2000was up and running by October 2000 – Figure 6.1 shows this 4-tier architecture.

B fit• Benefits –– The ability to introduce new services more rapidly at

lower costs and improved operational efficiency inlower costs, and improved operational efficiency in many areas.

– Also cut customer response time 30% and savedAlso, cut customer response time 30% and saved more than $100,000 on desktop administration.

Copyright 2006 John Wiley & Sons, Inc.

About InfrastructureInfrastructureArchitecture

The first (client) tier is composed of web browsers serving as the interface for customers and employees

ClientPeople’s

Bank Customers

Call CenterRepre-

sentatives

Tellers atBranches

In the second tier, IBM WebSphereApplication Server, Advanced Edition, serves as the Web

employeesCustomers sentatives

In the third tier transactionServers

,application server.Web and

ApplicationTier 2

Web Servers

In the third tier, transaction processing control is built around IBM WebSphere Application Server, Enterprise Edition. The architecture is integrated with

Servers

3rd Party Tier 3

The tier 3 servers and legacy Legacy

architecture is integrated with external data sources via TCP/IP sockets

yData Sources Web Servers

g ysystems communicate through message broker hub. Unisys mainframe runs core banking systems, while IBM S/390 runs

Legacy Systems

IBMS/390

Client ServerApplications

UnisysMainframe systems, while IBM S/390 runs

general ledger, payroll and HR systems.

Figure 6 1 Architecture/Infrastructure of People’s BankCopyright 2006 John Wiley & Sons, Inc.

Figure 6.1 Architecture/Infrastructure of People s Bank

FROM VISIONFROM VISIONTOTO

IMPLEMENTATION

Copyright 2006 John Wiley & Sons, Inc.

From Vision to ImplementationFrom Vision to Implementation• Architecture translates strategy into

infrastructure (see Figure 6.2).( g )• The architect develops plans based on a vision

of the customer of the system (or in this example y ( pa house) which is a blueprint of the companies systems.

• This “blueprint” is used for translating business strategy into a plan for IS.

• The IT infrastructure is everything that supports the flow and processing of information (h d ft d t d t k )(hardware, software, data, and networks).

Copyright 2006 John Wiley & Sons, Inc.

Figure 6.2 From abstract to concrete – building vs. IT.

Copyright 2006 John Wiley & Sons, Inc.

The Manager’s RoleThe Manager’s Role

• Must understand what to expect from IT hit t d i f t tarchitecture and infrastructure.

• Must clearly communicate their businessMust clearly communicate their business vision.

• May need to modify the plans if IT cannot realistically support themrealistically support them.

• Manager MUST be involved in the gdecision making process.

Copyright 2006 John Wiley & Sons, Inc.

THE LEAP FROMTHE LEAP FROM STRATEGY TOSTRATEGY TO

ARCHITECTURE TOARCHITECTURE TO INFRASTRUCTURE

Copyright 2006 John Wiley & Sons, Inc.

From Strategy to ArchitectureFrom Strategy to Architecture• Manager must start out with a strategy• Manager must start out with a strategy.• This strategy must then be used to gy

develop more specific goals as seen in Figure 6 3Figure 6.3.

• Business requirements must be fleshed t f h l i d t id thout for each goal in order to provide the

architect with a clear picture of what IS pmust accomplish.

• Figure 6 4 shows how this detailed• Figure 6.4 shows how this detailed process is accomplished.

Copyright 2006 John Wiley & Sons, Inc.

Figure 6.3 – From Strategy to Business Requirements

Copyright 2006 John Wiley & Sons, Inc.

Fi 6 4 F B i R i t t A hit tFigure 6.4 – From Business Requirements to Architecture

Copyright 2006 John Wiley & Sons, Inc.

From Architecture to InfrastructureFrom Architecture to Infrastructure• This stage entails adding more detail to the• This stage entails adding more detail to the

architectural plan.• This detail comprises the actual hardware,

software, data, and networking.g– Figure 6.5 shows this phase.

• These components must be combined in a• These components must be combined in a coherent fashion.

• Global level – focus at the enterprise level; Inter-organizational level – focus on communications gwith customers, suppliers or other stakeholders.

Copyright 2006 John Wiley & Sons, Inc.

Fi 6 5 F A hit t t I f t tFigure 6.5 – From Architecture to Infrastructure

Copyright 2006 John Wiley & Sons, Inc.

A Framework for the TranslationA Framework for the TranslationC id th f ll i h d l i• Consider the following when developing a framework for transforming business strategy into architecture and then infrastructure:– Hardware – physical components.Hardware physical components.– Software – programs.

Network software and hardware– Network – software and hardware.– Data – quantity and format of data is of utmost

concern.• The framework that guides analysis of these

components is found in Figure 6.6a.

Copyright 2006 John Wiley & Sons, Inc.

Component What Who Where

Hardware What hardware does the organization have?

Who manages it?Who uses is?

?

Where is it located? Where is it used?have? Who owns it? is it used?

Software What software does Who manages it? Where is it the organization have?

Who uses is?Who owns it?

located? Where is it used?

Network What networking does the organization have?

Who manages it?Who uses is?

Where is it located? Where is it used?have? Who owns it? is it used?

Data What data does the Who manages it? Where is it ataorganization have?

gWho uses is?Who owns it?

located? Where is it used?

Figure 6.6a Information systems analysis framework.

Copyright 2006 John Wiley & Sons, Inc.

Anal sis of ComponentsAnalysis of Components• Managers must begin with an overview that is

completecomplete.• The framework must answer the what, who and

where questions for each infrastructurewhere questions for each infrastructure component.

Wh t i th ifi t f t h l ?– What is the specific type of technology?– Who is involved (individuals, groups, departments)?

?– Where is everything located?• Table 6.6b shows the connections between

strategy and systems.

Copyright 2006 John Wiley & Sons, Inc.

Component What Who WhereArchitecture Infrastructure Architecture Infrastructure Architecture Infrastructure

Hardware Does fulfillment or our strategy require thick

What size hard drivers do we equip our thick clients with?

Who knows the most about servers in our

Who will operate the server?

Does our architecture require centralized or

Must we hire a server administrator for the Tokyorequire thick

or thin clients?

clients with? in our organization?

centralized or distributed servers?

for the Tokyo office?

Software Does f lfill t

Shall we go ith SAP

Who is ff t d b

Who will need SAP t i i ?

Does our hi l

Does Oracle id thSoftware fulfillment or

our strategy require ERP software?

with SAP or Oracle applications?

affected by a move to SAP?

SAP training? geographical organization require multiple database

provide the multiple-database functionality we need?database

instances?we need?

Network What kind of bandwidth do

Will 10BaseT Ethernet

Who needs a connection to

Who needs an ISDN line to

Does our WAN need to

Shall we lease a cable or use

we need to fulfill our strategy?

suffice? the network? his or her home?

span the Atlantic?

satellite?

Data Do our Which VAN Who needs Who needs Will backups Which storage Data vendors all use the same EDI format?

provides all the translation services we need?

access to sensitive data?

encryption software?

pbe stored on-site or off-site?

gservice shall we select?

Figure 6.6b Infrastructure and architecture analysis framework with sample questions.

Copyright 2006 John Wiley & Sons, Inc.

y p q

Architecture ExamplesArchitecture Examples• The following are examples of architectures that are g

used in organizations.– Client/server - widely used and relies and clients that

t i d th t d t threquest services and servers that respond to these requests. The workload is shared and distributed.

– Mainframe – employs a large centralized computer that– Mainframe – employs a large centralized computer that handles all of the functionality of the system.

– Peer-to-peer – networked computers share resources, p p ,every system is equal.

– Wireless (mobile) – allow communication from remote locationslocations.

• Managers must be aware each ones trade-offs.Fi 6 7 i th h t i ti f h• Figure 6.7 summarizes the characteristics of each of the architectures.

Copyright 2006 John Wiley & Sons, Inc.

Other FrameworksOther FrameworksS i l l• Some companies apply even more complex frameworks.

• Two popular examples (built on an enterprise architecture) are:architecture) are:– Zachman – goes farther by asking how, when, and

why?why? – TOGAF (The Open Group Architecture Framework) –

k t id ti l t d di dseeks to provide a practical, standardized methodology to successfully implement an Enterprise Architecture into a companyArchitecture into a company.

Copyright 2006 John Wiley & Sons, Inc.

OTHER MANAGERIAL CONSIDERATIONS

Copyright 2006 John Wiley & Sons, Inc.

Understanding existing g garchitecture

• Understanding existing architecture allows t l t th IT i t fmanagers to evaluate the IT requirements of

an evolving business strategy vs. their current IT.

• Plans for the future architecture can then be• Plans for the future architecture can then be compared with the current infrastructure to h l id tif hi h t f thhelp identify which components of the current system can b e used in the system being developed.

Copyright 2006 John Wiley & Sons, Inc.

Relevant questions for managers:

• What IT architecture is already in place?I th d l i th IT• Is the company developing the IT architecture from scratch?

• Is the company replacing an existing architecture?

• Does the company need to work within• Does the company need to work within the confines of an existing architecture?

• Is the company expanding an existing architecture?

Copyright 2006 John Wiley & Sons, Inc.architecture?

Strategic IT planning andStrategic IT planning and legacy systemsg y y

• Managers usually must deal with adapting existing architectures as part of planning their new systemsof planning their new systems.

• In so doing they encounter both:– the opportunity to leverage the existing

architecture and infrastructure andarchitecture and infrastructure and– the challenge to overcome the old system’s

h t ishortcomings.

Copyright 2006 John Wiley & Sons, Inc.

Optimal conversion of legacy systems:

• The following steps allow managers to derive the most value and suffer the fewest problems when working with legacy systems:legacy systems:– 1. Objectively analyze the existing

hit t d i f t tarchitecture and infrastructure– 2. Objectively analyze the strategy served by

the existing architecture.– 3. Objectively analyze the ability of the3. Objectively analyze the ability of the

existing architecture and infrastructure to further the current strategic goals.

Copyright 2006 John Wiley & Sons, Inc.

further the current strategic goals.

Distinguishing Current vs. FutureDistinguishing Current vs. Future Requirements

• Strategic Time FrameWh t i th lif f th t ?– What is the life span of the system?

• Technological Advancesg– Can the infrastructure and architecture

support these advances? SOA (Servicesupport these advances? SOA (Service Oriented Architecture) defines a service or an interface as a reusable piece of softwareinterface as a reusable piece of software.

• Growth Requirements– Will it meet future demand? Is it scalable?

Copyright 2006 John Wiley & Sons, Inc.

• Assessing Financial Issues– Evaluate on expected financial value.– Can be difficult to quantify.Can be difficult to quantify.– Steps

• Quantify costs• Determine the anticipated life cycles of system

components• Quantify benefitsy• Quantify risks• Consider ongoing dollar costs and benefitsConsider ongoing dollar costs and benefits

Copyright 2006 John Wiley & Sons, Inc.

• Assessing Technical Issues– ScalabilityScalability.

• Plight of AOL (improperly estimated growth).Standards– Standards.

– Maintainability.– IT staff skill set.

• Differentiating Between Architecture andDifferentiating Between Architecture and Infrastructure

Fi 6 8 h h hit t d– Figure 6.8 shows how architecture and infrastructure are evaluated based on the

i i iprevious criteria.

Copyright 2006 John Wiley & Sons, Inc.

Criteria Architecture InfrastructureStrategic time frame Very applicable Not applicable

Technological advances Very applicable Somewhat applicable

Assessing financial issuesNet present value

Somewhat applicable Very applicable

Payback analysisIncidental investments

G th i t / V li bl V li blGrowth requirements/ scalability

Very applicable Very applicable

Standardization Very applicable Very applicableStandardization Very applicable Very applicable

Maintainability Very applicable Very applicable

Staff experience Very applicable Very applicableStaff experience Very applicable Very applicable

Figure 6 8 Applicability of evaluation criteria to discussionFigure 6.8 Applicability of evaluation criteria to discussion of architecture and infrastructure.

Copyright 2006 John Wiley & Sons, Inc.

FROM STRATEGY TOFROM STRATEGY TO ARCHITECTURE TOARCHITECTURE TO

INFRASTRUCTURE: AN EXAMPLE

Copyright 2006 John Wiley & Sons, Inc.

BluntCo fictitious caseBluntCo. fictitious case• BluntCo a fictitious cigar clipper maker• BluntCo., a fictitious cigar clipper maker,

serves to illustrate the process of creating IT architecture and infrastructureinfrastructure.

• The process includes four steps:Step 1: Defining the Strategic GoalsStep 2: Define Related Architectural GoalsStep 2: Define Related Architectural GoalsStep 3: Apply Strategy-to-Infrastructure y gy

FrameworkStep 4: Evaluate Additional Issues

Copyright 2006 John Wiley & Sons, Inc.

Step 4: Evaluate Additional Issues

Hardware Software Network Data

3 servers:•Sales

ERP system with modules for:

Cable modem to ISP

Database:•SalesSales

•Manufacturing•Accounting

•Manufacturing•Sales Dial-up lines

Sales•Manufacturing•AccountingAccounting

Storage systems

•Accounting•Inventory

pfor backup

Accounting

g y

Enterprise

RoutersHubs

Application Integration (EAI) software

SwitchesFirewalls

software

Figure 6.10 Blunt Co’s infrastructure components

Copyright 2006 John Wiley & Sons, Inc.

Step 1: Defining the Strategic Goalsp g g

• Blunt Cos. business strategy is to respond to gy ppossible changes in demand by outsourcing clipper manufacturing.clipper manufacturing.

• The company’s strategic goals are as follows:– To lower costs by outsourcing manufacturing– To lower costs by clipper distribution– To improve market responsiveness by outsourcing

clipper manufacturingpp g– To improve market responsiveness by outsourcing

clipper distributionpp

Copyright 2006 John Wiley & Sons, Inc.

Step 2: Define Related Architectural Goalsp

• Consider the first goal: outsourcing clipper manufacturing. How can the company’s IT architecture support this goal?

• It must provide the following interfaces to its new manufacturing partners:– Sales to manufacturing partners: send forecasts,

fi d i dconfirm orders received– Manufacturing partners to sales: send capacity,

fi d hi dconfirm orders shipped– Manufacturing partners to accounting: confirm orders

shipped electronic invoices various inventory levelsshipped, electronic invoices, various inventory levels, returnsAccounting to manufacturing partners: transfer funds– Accounting to manufacturing partners: transfer funds for orders fulfilled

Copyright 2006 John Wiley & Sons, Inc.

Step 3: Apply Strategy to Infrastructure Framework

• Translating the strategic goals to the architectural and infrastructural framework means asking the what, who and where questions discussed before.

• For example, for the network:– Arch.: What is the anticipated volume of transactionsArch.: What is the anticipated volume of transactions

between BluntCo and its manufacturing partners?– High volume may require leased lines to carry g y q y

transaction data, dial-up connections may suffice for low volume (i.e., what’s the best leased line to use?).

• See Fig. 6.7 for a detailed list of such questions

Copyright 2006 John Wiley & Sons, Inc.

Step 4: Evaluate Additional IssuesStep 4: Evaluate Additional IssuesTh l t t i t i l• The last step is to compare managerial considerations such as strategic time frame, t h l i l d t ith thtechnological advances, etc., with the architectural goals listed in step 2.

• For example, regarding HR compatibility:– Architecture: The new model will displace some p

current human resources. BluntCo must analyze costs and the effect on morale.

– Infrastructure: Current staff not familiar with EDI; must be trained, some new staff hired. BluntCo must analyze associated costsanalyze associated costs.

Copyright 2006 John Wiley & Sons, Inc.

FOOD FOR THOUGHT: BUSINESS CONTINUITYBUSINESS CONTINUITY

PLANNINGPLANNING

Copyright 2006 John Wiley & Sons, Inc.

Business Continuity Planning (BCP)us ess Co t u ty a g ( C )• BCP is an approved set of preparations andBCP is an approved set of preparations and

sufficient procedures for responding to a range of disaster events such as:range of disaster events, such as:

1. Planning stage – alternative business recovery operating strategies are determinedoperating strategies are determined

2. Emergency Response Procedures – designed to prevent/limit injury to personnel on site, damage toprevent/limit injury to personnel on site, damage to structures/equipment and the degradation if vital business functions

3. Employee Awareness and Training Programs –must be well communicated throughout the

i tiorganization

Copyright 2006 John Wiley & Sons, Inc.

SUMMARYSUMMARY

Copyright 2006 John Wiley & Sons, Inc.

Summaryy• Strategy drives architecture.

M t d t d h t l IT t li• Managers must understand how to plan IT to realize business goals.Logical framework is used to guide the translation from• Logical framework is used to guide the translation from business strategy to IS design.

• Know the state of existing architecture and infrastructure• Know the state of existing architecture and infrastructure when translating strategy into architecture and then infrastructure.infrastructure.

• A business continuity plan is an approved set of preparations and sufficient procedures for responding to p p p p ga disaster event.

• It is becoming more important that business managers g p geffectively translate business strategy into IT infrastructure.

Copyright 2006 John Wiley & Sons, Inc.

Chapter 7Chapter 7Doing Business on theDoing Business on the

InternetInternetManaging and Using Information Systems: A

Strategic Approach

by Keri Pearlson & Carol Saunders

Copyright 2006 John Wiley & Sons, Inc.

IntroductionIntroduction• How has the Internet changed business?g• What is the difference between the Internet and

Intranets and Extranets?Intranets and Extranets?• What is EDI and why did it not grow as

predicted?predicted?• What is disintermediation and how has it

i t d th i i d t ?impacted the music industry?• What are the four key building blocks of e-y g

commerce?• How can managers assist in the prevention ofHow can managers assist in the prevention of

identify theft?

Copyright 2006 John Wiley & Sons, Inc.

Real World E amplesReal World Examples

• VeriSign, Inc. helps millions of Internet users each dayeach day.

• VeriSign makes money by providing security, billing, and payment services to telecommunications and online retail customers.

• They are an example of a completely new business made possible by the Internetbusiness made possible by the Internet.

• They have grown their reputation for “trust” into a business customers are willing to pay a fee.

Copyright 2006 John Wiley & Sons, Inc.

OVERVIEW OF THE INTERNET

Copyright 2006 John Wiley & Sons, Inc.

InternetInternet• The Internet is a global, interconnected network ofThe Internet is a global, interconnected network of

millions of computers (hosts).Began in 1969 with the US DOD’s ARPANET– Began in 1969 with the US DOD s ARPANET.

– In 1985 NSF built NSFNET.• Today no single “owner” owns the Internet but it is

shared.• Relies on the TCP/IP protocol.

Fi 7 1 h l f TCP/IP k t– Figure 7.1 shows an example of a TCP/IP packet.• Broadband has permitted many to gain fast access

to the Internet making it a very useful tool.

Copyright 2006 John Wiley & Sons, Inc.

TCP/IP PacketComputer address Computer address Packet length Data Checksum pof sender (HEADER)

pof receiver (HEADER)

g(HEADER) (TRAILER

)

Regular Mail

Return address Address Letter

Figure 7.1 Comparison of regular mail and TCP/IP packet.

Copyright 2006 John Wiley & Sons, Inc.

World Wide WebWorld Wide WebA i i l l th d f i th• An increasingly popular method of accessing the Internet.

• Documents transmitted over the “web” are in HTML format (Hypertext Markup Language) orHTML format (Hypertext Markup Language), or in any number of other compatible languages.

• HTML was created in 1989 by Tim Berners-Lee at CERN.

• Web browsers (Internet Explorer and Netscape) are commonly used tools for accessing the webare commonly used tools for accessing the web.

Copyright 2006 John Wiley & Sons, Inc.

More NetsMore Nets• Intranets, extranets, and virtual privateIntranets, extranets, and virtual private

networks (VPN’s) are other networks that use web technologyuse web technology.– Intranet looks like the Internet but is used only

i t ll b i ti ( i itinternally by an organization (university, business, etc.).

– Extranet is similar to an intranet but includes access available to partners, or customers.p

– VPN’s are used to connect private data using the public telecommunications system VPN’sthe public telecommunications system. VPN s use tunneling.

Copyright 2006 John Wiley & Sons, Inc.

Evolution of E-BusinessEvolution of E Business• Conducting business over electronic channels• Conducting business over electronic channels

has been a reality for decades.• EDI (Electronic Data Interchange) is one of the

oldest forms of e-business.– EDI is the direct computer to computer transfer of

business information, using a standard format., g– Software programs on different systems can

exchange information without human intervention.exchange information without human intervention.• Quote requests, order forms, etc.

– EDI was never widely used due to substantial setup– EDI was never widely used due to substantial setup effort.

Copyright 2006 John Wiley & Sons, Inc.

Evolution of E-Business ( ti d)

With th th f th I t t b i

Evolution of E-Business (continued)

• With the growth of the Internet more businesses are using it to transact business between

t (B2B Fi 7 2)partners (B2B – see Figure 7.2).• Now, the term e-business refers to business

conducted over the Internet.• Business on the Internet has evolved through aBusiness on the Internet has evolved through a

number of stages:– Content Provider: Stage IContent Provider: Stage I– Transaction Forum: Stage II– Integrator: Stage III– Integrator: Stage III– Catalyst for Industry Restructuring: Stage IV

Copyright 2006 John Wiley & Sons, Inc.

B2B Business-to-business targets sales and services primarily to otherB2B Business to business targets sales and services primarily to other businesses.

B2C Business-to-consumer targets sales and services primarily to consumers.

B2E Business-to-employee provides services other companies can use to interface with employees (like retirement funds management, health care p y ( gmanagement, and other benefits management).

B2G Business-to-government involves companies who sell the bulk of their goods and services to state, local, and national governments.

C2C Consumer-to-consumer sites primarily offer goods and services to assist consumers to interact (e g auctions)consumers to interact (e.g., auctions).

Hybrid Combines B2B and B2C modelsHybrid Combines B2B and B2C models.

Fi 7 2 B i b i d l f th I t tFigure 7.2 Basic business models for the Internet.

Copyright 2006 John Wiley & Sons, Inc.

E-channel PatternsE channel Patterns• An e-channel is a chain of electronic

“relationships between companies and partners/resellers”

• They can lead to industry restructuring when there are massive changes brought about by:– e-channel compression (disintermediation –

Figure 7.3), and – e-channel expansion (the adding of brokering

functionality)• These brokers provide information for users (like

Edmunds.com, or KBB.com for automobile research).• E-channel expansion is also seen in e-marketplaces (special p p ( p

kind of B2B network).

Copyright 2006 John Wiley & Sons, Inc.

Old Music Industry New Music Industry

Few Record Distributor Retailer Customer Many Artists E-Business Website CustomerArtists Company Pays+$1 +$9 +$1 +$5 $16/Album

PaysAlbum: + $3 +$7 $10Song: +$.30 +$.70 $1g

Figure 7.3 Example of Channel Compression

Copyright 2006 John Wiley & Sons, Inc.

FRAMEWORK OF ELECTRONIC COMMERCE

Copyright 2006 John Wiley & Sons, Inc.

E Commerce Frame orkE-Commerce Framework

• Kalakota and Whinston offer a generic f k fframework for e-commerce (see Figure 7.4).

• This framework assumes that newThis framework assumes that new technology will be built on existing t h l i f t ttechnology infrastructure.

• It uses four key building blocks and two• It uses four key building blocks and two supporting pillars.

Copyright 2006 John Wiley & Sons, Inc.

Four key building blocks:Four key building blocks:1. Common business services infrastructure2. Message and information distribution3 Multimedia content and network3. Multimedia content and network

publishing4. The Internet (infrastructure)

Two supporting pillars:Two supporting pillars:1. Public policy (“governance”)2. Technical standards

Fig. 7.4 Kalakota and Whinston’s E-commerce framework

Copyright 2006 John Wiley & Sons, Inc.

Common Business ServicesCommon Business Services Infrastructure

• The common business infrastructure for electronic commerce consists of four main elements:– Security

Authentication– Authentication– Encryption– Electronic Payments

Copyright 2006 John Wiley & Sons, Inc.

SecuritySecu y• Major concern for doing business on the Internet.• Businesses feel vulnerable to attack.• Encryption is used to help secure data.yp p• HTTPS (HTTP with SSL) is used to encrypt data

to ensure its integrity and safety.g y y– Secure Sockets Layer (SSL) is a standard for secure

interactions use on the Web. SSL, uses a combination of private key encryption (using a one time session key)of private key encryption (using a one-time session key) and digital signatures to enhance the security of transmission.

• Concerns remain for e-commerce transactions since there are numerous examples of data and pprivacy issues.

Copyright 2006 John Wiley & Sons, Inc.

AuthenticationAuthentication

• Authentication is the security process of verifying that a user is who he or she saysverifying that a user is who he or she says they are.P d th t t f• Passwords are the most common type of authentication.– It is important that users understand strong

passwords.p• Digital signatures are now gaining popularity

for authenticating transmitted informationfor authenticating transmitted information.

Copyright 2006 John Wiley & Sons, Inc.

A th ti ti Di it l Si tAuthentication: Digital Signatures• Digital signatures take the place of ordinary

signatures in online transactions to prove thatsignatures in online transactions to prove that the sender of a message is who he or she claims to beclaims to be.

• When received, the digital signature is compared with a known copy of the sender’s digital signature.g g

• Digital signatures are also sent in encrypted form to ensure they have not been forgedform to ensure they have not been forged.

Copyright 2006 John Wiley & Sons, Inc.

EncryptionEncryption• Encryption systems translate data into a secretEncryption systems translate data into a secret

code (many types of encryption used).• Encryption systems include 4 main components:• Encryption systems include 4 main components:

– Plaintext: the unencrypted messageA ti l ith th t k lik th l ki– An encryption algorithm: that works like the locking mechanism to a safeA k th t k lik th f ’ bi ti– A key that works like the safe’s combination

– Ciphertext is produced from the plaintext message by the encryption functionthe encryption function.

– Decryption is the same process in reverse (like a modulation/demodulation) but it doesn’t always use themodulation/demodulation), but it doesn t always use the same key or algorithm. Plaintext results from decryption.

Copyright 2006 John Wiley & Sons, Inc.

dec ypt o

Encryption TechniquesEncryption Techniques

• The two main encryption techniques now in use (see figure 7.5):– Symmetric encryption in which both– Symmetric encryption in which both

sender and receiver use the same key.– Asymmetric or public key encryption,

which uses two separate keys, called ypublic and private keys.

Copyright 2006 John Wiley & Sons, Inc.

Symmetric EncryptionSymmetric Encryption• Symmetric or private key encryption uses• Symmetric or private key encryption, uses

the same algorithm and key to both encrypt and decrypt a messageand decrypt a message.

• Historically, this is the most common ti t h iencryption technique.

• Since the key must be distributed, however, it yis vulnerable to interception. This is an important weakness of symmetric key p y yencryption.

• DES uses symmetric encryption.DES uses symmetric encryption.

Copyright 2006 John Wiley & Sons, Inc.

Asymmetric or Public Key Encryptiony y yp

• A second popular technique is asymmetric orA second popular technique is asymmetric or public key encryption (PKE).

• PKE is called asymmetric since it uses two• PKE is called asymmetric since it uses two different “one way” keys:– a public key used to encrypt messages anda public key used to encrypt messages, and– a private key used to decrypt them.

• PKE greatly reduces the key management• PKE greatly reduces the key management problem since the private key is never distributeddistributed.

• PGP (pretty good privacy) is a popular form of PKE available as sharewarePKE available as shareware.

Copyright 2006 John Wiley & Sons, Inc.

Figure 7.5 Encryption

Copyright 2006 John Wiley & Sons, Inc.

Electronic PaymentsElectronic PaymentsA b f t th d d b• A number of payment methods are used by businesses to make and receive payments on the Internet.

• These methods are basically the equivalent of• These methods are basically the equivalent of off-line payment methods.

• Here are a few of the most popular types:– Virtual Terminals.– Transaction Processors.– Internet CheckingInternet Checking.– Electronic Funds Transfer (EFT).

Copyright 2006 John Wiley & Sons, Inc.

Search EnginesSearch Engines• Search engines are used to index the contents

of the Internet so that information about aof the Internet so that information about a specific topic can be located.

• Managers should pay attention to search• Managers should pay attention to search engines for two reasons:

Th id f l d t i t– They provide useful and extensive access to information.And they can provide the visibility that becoming– And, they can provide the visibility that becoming listed with them provides.

Google founded in 1991 by two Stanford Ph D• Google, founded in 1991 by two Stanford Ph.D. students, is the most popular search engine.

Copyright 2006 John Wiley & Sons, Inc.

Web Services & PersonalizationWeb Services & Personalization• A web service is a standardized way of y

integrating web-based applications.– Organizations can share data transparently.Organizations can share data transparently.– Web services are the basic building blocks of the

SOA (Service Oriented Architecture).( )– They are excellent for integrating systems across

organizational boundaries.g• Personalization is the “selective delivery of

content and services to customers andcontent and services to customers and prospective customers”.– Can offer customized services to meet the past andCan offer customized services to meet the past and

future interests of customers.

Copyright 2006 John Wiley & Sons, Inc.

Messaging and InformationMessaging and Information Distribution Infrastructure

• Second building block of supporting g pp gframework for e-commerce.

• Includes email instant messaging Voice• Includes email, instant messaging, Voice over IP (VoIP), point-to-point file transfers (FTP) d(FTP), and groupware.

• E-mail is still largest use in this areaE mail is still largest use in this area.– ISP (Internet Service Provider) connects the

user to the Internetuser to the Internet.

Copyright 2006 John Wiley & Sons, Inc.

Multimedia ContentMultimedia Content• Third building block of supportingThird building block of supporting

framework for e-commerce. Includes t d d f i lti di fil tstandards for various multimedia file types.

Examples of materials transported in thisExamples of materials transported in this way include:

Vid– Video – AudioAudio– Text/Electronic documents– Graphics & Photos– Realtime/Non-realtime applications

Copyright 2006 John Wiley & Sons, Inc.

Realtime/Non realtime applications

Internet InfrastructureInternet Infrastructure• Fourth building block of supporting framework• Fourth building block of supporting framework

for e-commerce. Includes data communications circuits over which information travels Includes:circuits over which information travels. Includes:– Packet-switched networking (telephony is circuit-

switched)– Packets contain overhead information including

addressing – They are also routed, like maily– All of this flows across Internet backbones– Newer Internet access technologies include wireless– Newer Internet access technologies include wireless

access, cable access and DSL.

Copyright 2006 John Wiley & Sons, Inc.

Figure 7.6 A sample journey of information f I t t t t thfrom one Internet computer to another.

Copyright 2006 John Wiley & Sons, Inc.

Public PolicyPublic Policy• Public policy is one of two supporting pillars for

P bli li i i l de-commerce. Public policy issues include: – universal access, – privacy, – information pricing, – information access.

• Privacy issues include what information is private y pand/or who should have the right to use/sell information about Internet users:information about Internet users:– Requesting personal information on visiting a web site– Creating customer profilesCreating customer profiles– Leaving electronic footprints when visiting a web site

Copyright 2006 John Wiley & Sons, Inc.

Technical Standards

• Standardization is the second supporting pillar forStandardization is the second supporting pillar for e-Commerce. Standards are critical for electronic interactioninteraction.

• Secure Electronic Transaction (SET) for secure payments of online credit card transactions is onepayments of online credit card transactions is one of the most heavily promoted standardsOth li ti t d d i l d fil t f• Other application standards include file transfer protocol (FTP), hypertext transfer protocol (HTTP) i l t k t t l(HTTP), simple network management protocol (SNMP), post office protocol (POP), and

lti di i t t il t i (MIME)multimedia internet mail extensions (MIME)

Copyright 2006 John Wiley & Sons, Inc.

Identity Thefty• Managers must be aware of this danger and properly

t i l th h dli f l d ttrain employees on the proper handling of personal data.• Identity theft takes place when a thief steals a person’s

identity to open a credit card account or steal funds fromidentity to open a credit card account, or steal funds from their bank.

• It can be categorized in two ways:• It can be categorized in two ways:– True name – thief uses personal information to open new

accounts.– Account takeover – uses personal information to gain access to

the person’s existing accounts.I 2004 ID h f l $ 00 illi• In 2004 ID theft losses cost over $500 million.

• There were over 388,000 cases reported.• See figure 7.7 for ways to combat identify theft.

Copyright 2006 John Wiley & Sons, Inc.

•Do not share passwords or PIN numbers with anyone (95%).D t l t li k li k ithi il th t•Do not reply to, or click on links within emails or pop-up messages that

ask for personal or financial information (92%).•Update virus protection software regularly (91%)p p g y ( )•Update security patches for web browsers and operating systems regularly (90%).P t t i l it b t ll t (i d t i it t•Protect your social security numbers at all costs (i.e., do not give it out

unless it is mandatory) (90%).•Shred, or otherwise destroy, all documents with personal information prior , y, p pto disposal (90%).•Monitor personal credit reports and statements from financial accounts

l l (89%)regularly (89%).•Install firewall software (88%).•Before transmitting personal information online, verify that the connection g p , yis secure (84%).•Do not email personal or financial information (71%).

Figure 7.7 Precautions to take to avoid identity theft.

Copyright 2006 John Wiley & Sons, Inc.

FOOD FOR THOUGHT 1:E LEARNINGE-LEARNING

Copyright 2006 John Wiley & Sons, Inc.

E-LearningE Learning• Businesses do not want their employees to ever

stop learning.• E-Learning is using the Internet to enable g g

learning (eliminates time and distance barriers).• Include:Include:

– Computer-based training.Distance learning– Distance learning.

– Online learning.O d d l i– On-demand learning.

• Embedding learning within the business processes.

Copyright 2006 John Wiley & Sons, Inc.

FOOD FOR THOUGHT 2:WEB LOGS AND BLOGSWEB LOGS AND BLOGS

Copyright 2006 John Wiley & Sons, Inc.

Logs and BlogsLogs and Blogs• Online journals that link together into a large• Online journals that link together into a large

network of information sharing.• Blogs discuss topics from poetry to political• Blogs discuss topics from poetry to political

opinions.• In 2005 there were 9 million blogs with an• In 2005 there were 9 million blogs with an

estimated 40,000 new ones generated every dayday.

• Can take on different forms:Moblogging– Moblogging

– VloggingPodcasting– Podcasting

• Make every individual a virtual publisher.

Copyright 2006 John Wiley & Sons, Inc.

SUMMARYSUMMARY

Copyright 2006 John Wiley & Sons, Inc.

SummarySummary• 1. The Internet is an entirely new marketplace that will y p

soon be second nature to consumers.• 2. Intranets and Extranets, similar to the Internet, are

used for private communications within an organizationused for private communications within an organization or between organizations.

• 3 Managers must understand the elements that3. Managers must understand the elements that comprise e-commerce.

• 4. Building blocks of e-commerce include: g– Common business services infrastructure.– Messaging and information distribution infrastructure.

Multimedia content– Multimedia content.– Information superhighway infrastructure.

• 5. Managers can expect a future in which the Internet5. Managers can expect a future in which the Internet becomes larger, faster, more powerful and commonplace.

Copyright 2006 John Wiley & Sons, Inc.

Chapter 9The Management

Information Systems Organization

Managing and Using Information Systems: A Strategic ApproachStrategic Approach

by Keri Pearlson & Carol Saunders

Copyright 2006 John Wiley & Sons, Inc.

Introd ctionIntroduction• What are the major MIS positions in an

organizations?organizations?• What is the main role of the CIO?

Wh t h ld t f th MIS• What should a manager expect from the MIS organization?

• What does the MIS organization NOT do?• How can outsourcing be used to provideHow can outsourcing be used to provide

competitive advantage?• What are some of the disadvantages of• What are some of the disadvantages of

outsourcing?

Copyright 2006 John Wiley & Sons, Inc.

Real World ExamplesReal World Examples• The Southern Company is the dominant utilityThe Southern Company is the dominant utility

company in the southeast.• Every year since 1948 they have paid a• Every year since 1948 they have paid a

dividend.Th h d ti i IT billi• The company has seen a reduction in IT billings across the company by $54 million while f ti hfunctions have grown.

• Much of the success can be attributed to its IT chargeback system.– This system helps to assure that IT initiatives align y p g

with business goals.

Copyright 2006 John Wiley & Sons, Inc.

UNDERSTANDINGUNDERSTANDING THETHE

MIS ORGANIZATION

Copyright 2006 John Wiley & Sons, Inc.

CIO• The CIO (Chief Information Officer) is the head of ( )

the IS organization.• CIO’s primary goal is to manage IT resources to• CIO s primary goal is to manage IT resources to

implement enterprise strategy.• Provide technology vision and leadership for

developing and implementing IT initiatives to help p g p g pthe enterprise maintain a competitive advantage.

• As the importance of technology has increased• As the importance of technology has increased so has the position of the CIO.– Reports directly to the CEO.

Copyright 2006 John Wiley & Sons, Inc.

Twelve Main Responsibilitiesp• The following responsibilities often define the g p

role of the CIO:1. Championing the organization.p g g2. Architecture management.3. Business strategy consultant.4. Business technology planning.5. Application development.6 IT infrastructure management6. IT infrastructure management.7. Sourcing.8. Partnership developer.8. Partnership developer.9. Technology transfer agent.10. Customer satisfaction management.11. Training.12. Business discontinuity/disaster recovery planning.

Copyright 2006 John Wiley & Sons, Inc.

CTO CKO and OthersCTO, CKO, and Others• The CIO particularly in larger organizations• The CIO, particularly in larger organizations,

cannot guide the enterprise toward the future alonealone.

• Other strategic areas require more focused guidanceguidance.

• New positions created to deal with this growing needneed.– Figure 9.1 shows a list of other IT managers and their

responsibilities.espo s b es– Figure 9.2 lists other IT responsibilities within an

organization (such as DBA, Business Analyst, etc.).– Figure 9.3 shows the reporting relationships between

the CIO and other IT positions.

Copyright 2006 John Wiley & Sons, Inc.

Title ResponsibilityChief technology officer (CTO) Track emerging technologiesChief technology officer (CTO) Track emerging technologies

Advise on technology adoptionDesign and manage IT architecture to insure consistency and compliance

Chief knowledge officer (CKO) Create knowledge management infrastructureBuild a knowledge cultureBuild a knowledge cultureMake corporate knowledge pay off

Chief telecommunications officer (CTO)

Manage phones, networks, and other i ti t h l ti(CTO) communications technology across entire

enterpriseChief network officer Build/maintain internal and external networks

Chief resource officer Manage outsourcing relationships

Chief information security officer Insures information management practices are y g pconsistent with security requirements

Chief privacy officer Responsible for processes and practices that insure privacy concerns of customersinsure privacy concerns of customers, employees and vendors are met

Figure 9 1 The CIO’s lieutenantsCopyright 2006 John Wiley & Sons, Inc.

Figure 9.1 The CIO s lieutenants

Job Title Job Description Job DescriptionIS Manager Implements strategy; leads Understands both business andIS Manager Implements strategy; leads

systems implementation projectsUnderstands both business and technology

System Developer Writes new software applications; Programming abilities, cross-Upgrades and maintains existing systems

technology knowledge, etc

Business Analyst Translates business requirements Understands core businessBusiness Analyst Translates business requirements into implementable IT solutions

Understands core business requirements

Database Administrator

Implements and maintains the software/hardware

Knowledge of database management systems etcAdministrator software/hardware management systems, etc

Operations Personnel

Implements/maintains software and hardware needed

Knowledge of database management systems, etc

Support Personnel Run, monitor and maintain the production applications

Monitor and maintain hardware and software

Developer Help desk project management Skills vary depending upon roleDeveloper Help desk, project management and desktop services, etc

Skills vary depending upon role

Webmaster Responsible for all web activities Knowledge of web trends

Web Designer Designs interface for web pages Knowledge of interface design

Figure 9 2 IS organization rolesCopyright 2006 John Wiley & Sons, Inc.

Figure 9.2 IS organization roles

Chief InformationInformation

Officer

Chief Chief ChiefKnowledge

OfficerTechnology

OfficerNetworkOfficer

IS ManagersNameTitle

Systems Developers/Developers

Business Analysts

Database Administrators

Support Personnel/Operations

OtherDevelopers Operations

Figure 9.3 Sample IS organization chart

Copyright 2006 John Wiley & Sons, Inc.

INFORMATION SYSTEMSINFORMATION SYSTEMS ORGANIZATIONORGANIZATION

PROCESSESPROCESSES

Copyright 2006 John Wiley & Sons, Inc.

Systems DevelopmentSystems DevelopmentTh d t d t d th• The manager needs to understand the processes internal to the IS group.

• Systems development is the primary processes performedperformed.– Building and developing systems.

I l b i l t t– Involves business analysts, programmers, systems analysts, users, etc. to test and make sure the system

k d t th b i bj tiworks and meets the business objectives.• Includes installation and configuration.

Copyright 2006 John Wiley & Sons, Inc.

Systems MaintenanceSystems Maintenance

• Includes a number of personnel to keep the system running and performingsystem running and performing.– Such as DBAs, systems developers, business

l dit tpersonnel, managers, auditors, etc.• Some of the functions of systems maintenance y

include –– Daily transaction processingDaily transaction processing.– Report writing

Problem reporting and repairing– Problem reporting and repairing.– Compliance conforming (Sarbanes-Oxley Act).

Copyright 2006 John Wiley & Sons, Inc.

Other IS Processes• Data center operations.

– Core computing systems location.– Managers have little interaction with.

I f ti t d d t b• Information management and database administration.

A ti iti f ll ti d t i th t l d t– Activities of collecting and storing the actual data created, developed, or discovered.

• Internet services• Internet services.– Includes intranets, extranets, email, etc.

Networking services• Networking services.– Responsible for designing network architecture.

G l t• General support.– Help desk.

Copyright 2006 John Wiley & Sons, Inc.

WHAT A MANAGER CANWHAT A MANAGER CAN EXPECT FROM THEEXPECT FROM THE

IS DEPARTMENTIS DEPARTMENT

Copyright 2006 John Wiley & Sons, Inc.

Eight Core Activitiesg• Anticipating new technologies.

IT must keep an eye on emerging technologies– IT must keep an eye on emerging technologies.– Work closely with management to make appropriate

decisionsdecisions.– Weigh risks and benefits of new technologies.

• Strategic directionStrategic direction.– IS can act as consultants to management.– Educate managers about current technologies/trendsEducate managers about current technologies/trends.

• Process innovation.– Review business processes to innovate– Review business processes to innovate.– Survey best practices.

• Supplier management• Supplier management.– Carefully manage outsourced IT.

Copyright 2006 John Wiley & Sons, Inc.

Eight Core Activitiesg(continued)

• Architecture and standards• Architecture and standards.– Be aware of incompatibilities.

I i t t d t d i i t it– Inconsistent data undermines integrity.• Security

– Important to all general managers.– Much more than a technical problem.

• Business continuity planning– Disaster recoveryDisaster recovery.– “What if” scenarios.

• Human resource management• Human resource management.– Hiring, firing, training, outsourcing, etc.

Copyright 2006 John Wiley & Sons, Inc.

Figure 9.4 User management activities

Copyright 2006 John Wiley & Sons, Inc.

WHAT THE IS ORGANIZATION DOES NOT DO

Copyright 2006 John Wiley & Sons, Inc.

What IS Does Not DoWhat IS Does Not Do

• Does not perform core business functions such as:such as:– Selling– Manufacturing– AccountingAccounting.

• Does not set business strategy.– General managers must not delegate critical

technology decisions.

Copyright 2006 John Wiley & Sons, Inc.

ORGANIZING ANDORGANIZING AND CONTROLLINGCONTROLLING IS PROCESSESIS PROCESSES

Copyright 2006 John Wiley & Sons, Inc.

Outsourcingg• The purchase of a good or service that was

i l id d i t llpreviously provided internally.• Drivers include:

– Reducing costs; Transition to new technologies; Focus on core business strategies; Provide better management and focus of IT personnel;management and focus of IT personnel;

• Disadvantages are present in outsourcing and include losing control expensive to undueinclude losing control, expensive to undue decisions, etc.

• Figure 9 5 provides details on drivers andFigure 9.5 provides details on drivers and disadvantages.

• Backsourcing is when a company brings backBacksourcing is when a company brings back previously outsourced IS functions.

Copyright 2006 John Wiley & Sons, Inc.

Drivers Disadvantagesg•Offer cost savings•Ease transition to new technologies

•Abdication of control•High switching costs•Ease transition to new technologies

•Offer better strategic focus•Provide better mgmt of IS staff

•High switching costs•Lack of technological innovation•Loss of strategic advantage•Provide better mgmt of IS staff

•Handle peaks•Consolidate data centers

•Loss of strategic advantage•Reliance on outsourcer•Problems withConsolidate data centers

•Infuse cash Problems with

security/confidentiality•Evaporization of cost savingsg

Fi 9 5 D i d di d t f t iFigure 9.5 Drivers and disadvantages of outsourcing

Copyright 2006 John Wiley & Sons, Inc.

Outsourcing ModelsOutsourcing ModelsCl i d l• Classic model – Outsource only those functions that do not give the

titi d t ( ili th dcompany competitive advantage (prevailing method of the 70s and 80s).

K d k ff t• Kodak effect.– Put ALL functions of IS up for “grabs” (can include

ff h i )offshoring).• New models:

– Application Service Provider – rents the use of an application to the customer.

– Full vs. Selective Outsourcing – complete outsourcing vs. only outsourcing specific functions.

Copyright 2006 John Wiley & Sons, Inc.

Avoiding Outsourcing Pitfallsg g• Decisions must be made with adequate care

d d lib tiand deliberation.• Offshoring is an increasingly popular form of

t i ( i l i th t ioutsourcing (using employees in other countries like India).

Functions include routine IT transactions to higher– Functions include routine IT transactions, to higher end knowledge-based business processes.

– Labor savings range from 40-70%Labor savings range from 40 70%.– Long transition periods.– Workers often have advanced degrees.Workers often have advanced degrees.– Countries with high levels of English proficiency are

more attractive.– Risks can be considerable as the project size grows.– What could/should be offshored?

Copyright 2006 John Wiley & Sons, Inc.

•Do not focus negotiation solely on priceC ft f ll lif l i t t th t i t t d•Craft full life-cycle services contracts that occur in stated.

•Establish short-term supplier contracts.U lti l b t f b d li•Use multiple, best-of-breed suppliers

•Develop skills in contract management.•Carefully evaluate your company’s own capabilities•Carefully evaluate your company s own capabilities.•Thoroughly evaluate outsourcers’ capabilities.•Choose an outsourcer whose capabilities complement yours•Choose an outsourcer whose capabilities complement yours.•Base a choice on cultural fit as well as technical expertise.•Determine whether a particular outsourcing relationship produces a netDetermine whether a particular outsourcing relationship produces a net benefit for your company.•Plan transition to offshoring.g

Figure 9.6 Steps to avoid pitfalls.

Copyright 2006 John Wiley & Sons, Inc.

CENTRALIZED VSVS.

DECENTRALIZEDDECENTRALIZED ORGANIZATIONALORGANIZATIONAL

STRUCTURESSTRUCTURES

Copyright 2006 John Wiley & Sons, Inc.

OverviewOverview• Centralized bring together all staff hardware• Centralized – bring together all staff, hardware,

software, data, and processing into a single location.

• Decentralized – the components in theDecentralized the components in the centralized structure are scattered in different locations to address local business needslocations to address local business needs.

• Federalism – a combination of centralized and decentralized structures.

• Figure 9.7 shows the continuum of where theseFigure 9.7 shows the continuum of where these structures fall.

Copyright 2006 John Wiley & Sons, Inc.

Figure 9.7 Organizational continuum

Copyright 2006 John Wiley & Sons, Inc.

The 5 Eras of Information Usageg1 1960s - mainframes dictated a centralized1. 1960s - mainframes dictated a centralized

approach.2 1970s - remained centralized due in part to the2. 1970s - remained centralized due in part to the

constraints of mainframe computing3 1980s - advent of the PC and decentralization3. 1980s - advent of the PC and decentralization 4. 1990s - the Web, with its ubiquitous presence

and fast network speeds shifted someand fast network speeds, shifted some businesses back to a more centralized approachapproach

5. 2000+ - the increasingly global nature of many businesses makes complete centralizationbusinesses makes complete centralization impossible

Copyright 2006 John Wiley & Sons, Inc.

FederalismFederalism

• Most companies would like to achieve the advantages derived from both centralized and gdecentralized organizational paradigms.

• This leads to federalism a structuring• This leads to federalism – a structuring approach which distributes, power, h d f d d lhardware, software, data and personnel between a central IS group and IS in business units.

Copyright 2006 John Wiley & Sons, Inc.

Figure 9.10 Federal IT

Copyright 2006 John Wiley & Sons, Inc.

Managing the GlobalManaging the Global ConsiderationsConsiderations

• Large global MIS organizations face many of the g g g ysame organizational issues as any other global department.p

• For IS, a number of issues arise that put the business at risk beyond the typical globalbusiness at risk beyond the typical global considerations.

• Table 9 11 summarizes how a global IT• Table 9.11 summarizes how a global IT perspective affects six information management issuesissues.

Copyright 2006 John Wiley & Sons, Inc.

Issue Global IT Perspective Example

Political How risky is investment in a India a country that facesPolitical Stability

How risky is investment in a country with an unstable government ?

India, a country that faces conflict with Pakistan

Transparency Domestically, an IT network can be end-to-end with little effort

d t l b l t k

SAP-R3 can be used to support production processes but only if i t ll dcompared to global networks installed

Business Continuity

When crossing borders, it is important to make sure that

Concern when crossing boarders is will data center be Continuity

Planningcontingency plans are in place available when/if needed

Cultural IT systems must not offend or Using images or artifacts may

Differences insult those of a different culture be insulting to another culture

Sourcing Some technologies cannot be Exporting it to some countries, gexported or imported into specific countries

especially those who are not political allies is not possible

Data Flow Data, especially private or For example: BrazilData Flow across Borders

p y ppersonal data, is not allowed to cross some borders.

p

Fi 9 11 Gl b l C id ti f th MIS O i tiCopyright 2006 John Wiley & Sons, Inc.

Figure 9.11 Global Considerations for the MIS Organization

FOOD FOR THOUGHT: GOING OFFSHORE FOR

IS DEVELOPMENT

Copyright 2006 John Wiley & Sons, Inc.

Managing a Global NetworkManaging a Global Network• Managing a global network is a challengeManaging a global network is a challenge,

particularly when different parts of it are owned by different enterprises.by different enterprises.

• Offshoring is used (as covered earlier) by more and more companies.and more companies.

• Offshoring has resulted in a high number of lost IT jobs (500,000 in 2004 in the U.S.).IT jobs (500,000 in 2004 in the U.S.).– Some states are attempting to curb this trend by

regulating the privatization of state services. – There is likely to be continued pressure on curbing

offshoring by government and major corporations.H ff h i h t t b 10– However, offshoring has cut consumer costs by 10-30%.

Copyright 2006 John Wiley & Sons, Inc.

SUMMARYSUMMARY

Copyright 2006 John Wiley & Sons, Inc.

SummarySummary• The CIO is a high level IS officer• The CIO is a high-level IS officer.• There are a variety of key job titles in the IS

organizationorganization.• IS organizations can be expected to anticipate

new technologies set strategic direction etcnew technologies, set strategic direction, etc.• Managers must work with IT leaders to develop

a lean competitive enterprise where IT acts asa lean, competitive enterprise, where IT acts as a strategic enable.Full or selective outsourcing offers organizations• Full or selective outsourcing offers organizations alternatives to keeping strategic IT services.Offshoring is gro ing and is a contro ersial• Offshoring is growing and is a controversial issue.

Copyright 2006 John Wiley & Sons, Inc.

Chapter 10pFunding IT & (Legalities)g ( g )

Managing and Using Information Systems: A Managing and Using Information Systems: A Strategic Approach

by Keri Pearlson & Carol Saundersby Keri Pearlson & Carol Saunders

Copyright 2006 John Wiley & Sons, Inc.

Introd ctionIntroduction• How are IT costs best allocated across an

organization?organization?• Is there a method that is most likely to be fair

and accurate?and accurate?• How do companies determine what the real

t f IT i t t ?costs are for IT investments?• What metrics (ROI, NPV, etc.) should be used to ( )

evaluate IT investments?• What is TCO (Total Cost of Ownership)?What is TCO (Total Cost of Ownership)?

Copyright 2006 John Wiley & Sons, Inc.

FUNDING THE IT DEPARTMENT

Copyright 2006 John Wiley & Sons, Inc.

Funding the IT departmentFunding the IT departmentH t i t d ith d i i• How are costs associated with designing, developing, delivering and maintaining IT

t d?systems recovered? • There are three main funding methods:

• Chargeback • Allocation• Allocation • Corporate budget

• The first two are done for management reasons, while the latter recovers costs using corporate coffers

Copyright 2006 John Wiley & Sons, Inc.

ChargebackChargeback

• IT costs are recovered by charging individuals, departments, or business units p ,

• Rates for usage are calculated based on the actual cost to the IT group to run the systemactual cost to the IT group to run the system and billed out on a regular basis

• They are popular because they are viewed as the most equitable way to recover IT coststhe most equitable way to recover IT costs

• However, creating and managing a chargeback t i tl dsystem is a costly endeavor

Copyright 2006 John Wiley & Sons, Inc.

AllocationAllocation• Recovers costs based on something otherRecovers costs based on something other

than usage, such as revenues, log-in accounts or number of employeesaccounts, or number of employees

• Its primary advantage is that it is simpler to implement and applyimplement and apply

• True-up process is needed where total IT d t t t l IT f dexpenses are compared to total IT funds

recovered from the business units.• There are two major problems:

• The 'free rider' problemp• Deciding the basis for charging out the costs

Copyright 2006 John Wiley & Sons, Inc.

Corporate BudgetCorporate Budget• Here the costs fall to the corporate P&L• Here the costs fall to the corporate P&L,

rather than levying charges on specific users or business units

• In this case there is no requirement to• In this case there is no requirement to calculate prices of the IT systems and hence no financial concern raised monthly by the business managersmonthly by the business managers

• However, there are drawbacks, as shown in the next slide (Figure 10.1).

Copyright 2006 John Wiley & Sons, Inc.

Funding Method

Description Why do it? Why not do it?Method

Chargeback Charges are calculated based

Fairest method for recovering costs

Must collect details on usage;calculated based

on actual usagerecovering costs since it is based on actual usage

details on usage; often expensive and difficult

Allocation Expenditures are divided by non-usage basis

Less bookkeeping for IT

IT department must defend allocation ratesusage basis allocation rates

Corporate Corporate No billing to the Have to competeCorporate Budget

Corporate allocates funds to IT in annual budget

No billing to the businesses. Good for encouraging use of new

Have to compete with all other budgeted items for fundsbudget of new

technologies.for funds

Figure 10.1 Comparison of IT funding methods

Copyright 2006 John Wiley & Sons, Inc.

HOW MUCH DOES ITHOW MUCH DOES IT COST?

Copyright 2006 John Wiley & Sons, Inc.

O er ieOverview

• The most basic method of determining t i t dd ll f th h dcosts is to add up all of the hardware,

software, network, and people involved in , , p pIS.R l t i t t d t i• Real cost is not as easy to determine.

• Most companies continue to use the over-• Most companies continue to use the over-simplistic view of determining cost and never really know the real cost.

Copyright 2006 John Wiley & Sons, Inc.

Activity Based CostingActivity Based Costing• Activity Based Costing (ABC) counts the actual

activities that go into making a specific product g g p por delivering a specific service.

• Activities are processes functions or tasks thatActivities are processes, functions, or tasks that occur over time and have recognized results. They consume assigned resources to produceThey consume assigned resources to produce products and services.

• Activities are useful in costing because they are• Activities are useful in costing because they are the common denominator between business process improvement and informationprocess improvement and information improvement across departments

Copyright 2006 John Wiley & Sons, Inc.

Total Cost of OwnershipTotal Cost of OwnershipT t l C t f O hi (TCO) i f t• Total Cost of Ownership (TCO) is fast becoming the industry standardIt l k b d i iti l it l i t t t• It looks beyond initial capital investments to include costs associated with technical support administration and trainingsupport, administration, and training.

• This technique estimates annual costs per user for each potential infrastructure choice;user for each potential infrastructure choice; these costs are then totaled. Careful estimates of TCO provide the best• Careful estimates of TCO provide the best investment numbers to compare with financial return numbers when analyzing the netreturn numbers when analyzing the net returns on various IT options

Copyright 2006 John Wiley & Sons, Inc.

TCO Component BreakdownTCO Component Breakdown• For shared components like servers and p

printers, TCO estimates should be computed per component and then divided among all p p gusers who access them

• For more complex situations such as whenFor more complex situations, such as when only certain groups of users possess certain components it is wise to segment thecomponents, it is wise to segment the hardware analysis by platform

• Soft costs such as technical support• Soft costs, such as technical support, administration, and training are easier to estimate than they may first appearestimate than they may first appear

Copyright 2006 John Wiley & Sons, Inc.

TCO as a Management ToolTCO as a Management Tool

• TCO also can help managers understand how infrastructure costs break down

• It provides the fullest picture of where managers spend their IT dollars as TCOmanagers spend their IT dollars as TCO results can be evaluated over time against industry standardsindustry standards

• Even without comparison data, the numbers that emerge from TCO studies assist inthat emerge from TCO studies assist in decisions about budgeting, resource allocation and organizational structureallocation, and organizational structure

Copyright 2006 John Wiley & Sons, Inc.

IT PORTFOLIOIT PORTFOLIO MANAGEMENT

Copyright 2006 John Wiley & Sons, Inc.

IT Portfolio ManagementIT Portfolio Management• IT investments should be managed as any other

investment would be managed by aninvestment would be managed by an organization.

• IT Portfolio Management refers to the process of• IT Portfolio Management refers to the process of evaluating and approving IT investments as they relate to other current and potential ITrelate to other current and potential IT investments.Oft i l i ki th i ht i f• Often involves picking the right mix of investments.

• Goal is to invest in most valuable IT initiatives.

Copyright 2006 John Wiley & Sons, Inc.

Asset ClassesAsset Classes

• According to Weill and Aral, there are four asset classes of IT investments:classes of IT investments:– Transactional systems – systems that streamline or

t t b i ticut costs on business operations.– Informational systems – any system that provides

information used to control, manage, communicate, analyze or collaborate.

– Strategic systems – any system used to gain competitive advantage in the marketplace.

– Infrastructure systems – the base foundation or shared IT services used for multiple applications.

Copyright 2006 John Wiley & Sons, Inc.

Relative Investment ProfileRelative Investment Profile• Average firm allocates 54% to infrastructureAverage firm allocates 54% to infrastructure

each year and only 13% to transactional systems.systems.

• Service companies (such as food service) allocate:allocate:– 26% to informational systems– 18% to transactional systemsy– 45% to infrastructure systems– 11% to strategic systemsg y

• Figure 10.4 summarizes a typical IT portfolio.• Table 10 5 summarizes the differences ofTable 10.5 summarizes the differences of

strategies.

Copyright 2006 John Wiley & Sons, Inc.

Informational Strategic20% 13%

Figure 10.4 Average Company’s IT Portfolio Profile

Copyright 2006 John Wiley & Sons, Inc.

Infrastructure investments

Transactional investments

Informational investments

Strategicinvestmentsinvestments investments investments investments

Average 54% 13% 20% 13%Firm

Cost 42% 40% 13% 5%CostFocus

42% 40% 13% 5%

AgilityFocus

58% 11% 14% 17%

T bl 10 5 IT I t t t t i dTable 10.5 IT Investment strategies compared

Copyright 2006 John Wiley & Sons, Inc.

Project and Portfolio ManagementProject and Portfolio Management

• Collecting information needed is a challengechallenge.

• Project and Portfolio Management (PPM) j g ( )systems exist that often have expanded capabilities.capabilities.

• These tools are called IT governance tsystems.

• Several successful companies produceSeveral successful companies produce systems used for PPM.

Copyright 2006 John Wiley & Sons, Inc.

VALUING ITVALUING IT INVESTMENTSINVESTMENTS

Copyright 2006 John Wiley & Sons, Inc.

Valuing IT Investmentsg• Soft benefits, such as the ability to make future

decisions make it difficult to measure thedecisions, make it difficult to measure the payback of IT investment

First IT can be a significant part of the ann al b dget– First, IT can be a significant part of the annual budget, thus under close scrutiny. Second the systems themselves are complex and– Second, the systems themselves are complex, and calculating the costs is an art, not a science. Third because many IT investments are for– Third, because many IT investments are for infrastructure, the payback period is much longer than other types of capital investments. o e ypes o cap a es e s

– Fourth, many times the payback cannot be calculated because the investment is a necessity rather than a ychoice, and there is no tangible payback

• Figure 10.6 show the valuation methods used.Copyright 2006 John Wiley & Sons, Inc.

g

Valuation Method DescriptionR t I t t (ROI) ROI (E ti t d lif ti b fit E ti t d lif tiReturn on Investment (ROI) ROI= (Estimated lifetime benefits- Estimated lifetime

costs)/Estimated lifetime costsNet Present Value (NPV) Calculated by discounting the costs and benefits for

each year of system’s lifetime using present value Economic Value Added (EVA) EVA = net operating profit after taxes

Payback Analysis Time that will lapse before accrued benefits overtake accrued and continuing costs

I t l R t f R t (IRR) R t th t th IT i t t i d t thInternal Rate of Return (IRR) Return that the IT investment is compared to the corporate policy on rate of return

Weighted Scoring Methods Costs and revenues/savings are weighted based on their strategic importance, etc

Prototyping A scaled-down version of a system is tested for its costs and benefitsand benefits

Game Theory or Role-playing These approaches may surface behavioral changes or new tasks attributable to a new system

Simulation A model is used to test the impact of a new system or series of tasks; low-cost method

Fi 10 6 V l ti M th dCopyright 2006 John Wiley & Sons, Inc.

Figure 10.6 Valuation Methods

MONITORING ITMONITORING IT INVESTMENTSINVESTMENTS

Copyright 2006 John Wiley & Sons, Inc.

IT In estment MonitoringIT Investment Monitoring

• “If you can’t measure it, you can’t manage it”it”.

• Management needs to make sure thatManagement needs to make sure that money spent on IT results in

i ti l b fitorganizational benefit.• Must agree upon a set of metrics for• Must agree upon a set of metrics for

monitoring IT investments.• Often financial in nature (ROI, NPV, etc.).

Copyright 2006 John Wiley & Sons, Inc.

The Balanced ScorecardThe Balanced ScorecardF tt ti th i ti ’ l• Focuses attention on the organization’s value drivers (which include financial performance)C i it t th f ll i t f• Companies use it to assess the full impact of their corporate strategies on their customers and workforce as well as their financial performanceworkforce, as well as their financial performance

• This methodology allows managers to look at their business from four perspectives: customertheir business from four perspectives: customer, internal business, innovation/learning, and financialfinancial

• Figure 10.7 shows the relationship of these perspectivesperspectives.

Copyright 2006 John Wiley & Sons, Inc.

Figure 10.7 The Balanced Scorecard perspectives

Copyright 2006 John Wiley & Sons, Inc.

g p p

The Balanced Scorecard applied to IT

• Applying the categories of the balanced scorecard to IT might mean interpreting them more broadly than originally conceived y g y

• For example, for the MIS scorecard, the customer is a user within the company not ancustomer is a user within the company, not an external customer

• The questions asked when using this methodology within the IT department are gy psummarized in the next slide

Copyright 2006 John Wiley & Sons, Inc.

Dimension Description Example IT MMeasures

Customer Perspective

Measures that reflect factors that really matter

User defined operational metricsPerspective factors that really matter

to customersmetrics

Internal Business Measures of what the IT process metrics, project Perspective company must do

internally to meet customer expectations.

p p jcompletion rates, system operational performance metricscustomer expectations. metrics

Innovating and Learning

Measures of the company’s ability to

IT R&D, New technology introduction success rate,

Perspective innovate, improve and learn

training metrics

Financial Measures to indicate IT project ROI NPV IRRFinancial Perspective

Measures to indicate contribution of activities to the bottom-line

IT project ROI, NPV, IRR, cost/benefit, TCO, ABC

Figure 10.8 Balanced Scorecard applied to IT departments

Copyright 2006 John Wiley & Sons, Inc.

The IT Balanced ScorecardThe IT Balanced Scorecard

• A scorecard used within the IT department.Helps senior IS managers understand their– Helps senior IS managers understand their organization’s performance, and measure it in a way that supports its business strategyway that supports its business strategy

• The IT scorecard is linked to the corporate scorecard, by insuring that the measures used by IT are those that support the y ppcorporate goals

Copyright 2006 John Wiley & Sons, Inc.

IT DashboardsIT Dashboards• IT dashboards summarize key metrics for• IT dashboards summarize key metrics for

senior managers in a way that provides quick identification of the status of the organizationidentification of the status of the organization

• Dashboards provide frequently-updated i f ti f i t t ithi th ITinformation on areas of interest within the IT department.

• The data tends to focus on project status or operational systems status.p y

• Problems can also be identified and handled without waiting for the monthly CIO meetingwithout waiting for the monthly CIO meeting

Copyright 2006 John Wiley & Sons, Inc.

FOOD FOR THOUGHT:FOOD FOR THOUGHT: OPTIONS PRICINGOPTIONS PRICING

Copyright 2006 John Wiley & Sons, Inc.

Options PricingOptions Pricing• Options pricing offers management the

opportunity to take some future action in response to uncertainty about changes in the business and its environment.

• It offers a risk-hedging strategy to minimize the g g gynegative impact of risk when uncertainty can be resolved by waiting to see what happens. eso ed by a t g to see at appe s

• To be applied, managers need to have a project that can be divided into investmentproject that can be divided into investment stages, and be armed with estimates of costs of the project at each stage the projectedthe project at each stage, the projected revenues or savings and the probability of these costs and revenues/savings being

Copyright 2006 John Wiley & Sons, Inc.

these costs and revenues/savings being realized.

NPV vs Option Pricing ViewNPV vs. Option Pricing View

• The next slide offers a very simple example of how options pricing would work for a newhow options pricing would work for a new Customer Relations Management (CRM)

t th t h t j tsystem that has two major components: • A customer identification module• A customer tracking module

• (NB: in this model all costs and revenues• (NB: in this model all costs and revenues reflect discounting)

Copyright 2006 John Wiley & Sons, Inc.

Th N t P t V l ViThe Net Present Value ViewJune, 2005 June, 2006

(0.5) ($350,000-$120,000)

(0.5) ($20,000 - $90,000)

The Option Pricing View

June, 2005 June, 2006

(0.5) ($350,000-$120,000)

(0.5) ($0)

Figure 10.8 NPV vs. Option Pricing View.

Copyright 2006 John Wiley & Sons, Inc.

SECURITYSECURITYANDAND

CONTROLSCONTROLS

Copyright 2006 John Wiley & Sons, Inc.

Security and ControlsSecurity and Controls• Ernst and Young survey suggests that mostErnst and Young survey suggests that most

companies rely on luck rather than proven IS controls.

• Companies turn to technical responses to deal with security threats (worms, viruses, etc.).y ( )

• Managers go to great lengths to make sure that their systems are secure.y– Firewalls, IDS systems, password systems, and more.

• Future solutions will include hardware and software.

• Managers must be involved in the decisions gabout security and control.

Copyright 2006 John Wiley & Sons, Inc.

Sarbanes-Oxley ActSarbanes Oxley Act• The Sarbanes-Oxley Act of 2002 was enacted toThe Sarbanes Oxley Act of 2002 was enacted to

increase regulatory visibility and accountability of public companies and their financial healthof public companies and their financial health.– All companies subject to the SEC are subject to the

requirements of the actrequirements of the act.– CEO’s and CFO’s must personally certify and be

accountable for their firm’s financial records andaccountable for their firm s financial records and accounting.

– Firms must provide real-time disclosures of any p yevents that may affect a firm’s stock price or financial performance.

– IT departments realized that they played a major role in ensuring the accuracy of financial data.

Copyright 2006 John Wiley & Sons, Inc.

IT Control and Sarbanes-Oxleyy• In 2004 and 2005 IT departments began to identify

controls determined design effectiveness andcontrols, determined design effectiveness, and validated operation of controls through testing.

• Five IT control weaknesses were uncovered by• Five IT control weaknesses were uncovered by auditors:1. Failure to segregate duties within applications, and failure to set g g pp ,

up new accounts and terminate old ones in a timely manner.2. Lack of proper oversight for making application changes,

including appointing a person to make a change and another toincluding appointing a person to make a change and another to perform quality assurance on it.

3. Inadequate review of audit logs to not only ensure that systems q g y ywere running smoothly but that there also was an audit log of the audit log.

4 Failure to identify abnormal transactions in a timely manner4. Failure to identify abnormal transactions in a timely manner.5. Lack of understanding of key system configurations.

Copyright 2006 John Wiley & Sons, Inc.

FOOD FOR THOUGHT: ETHICS AND THE INTERNET

Copyright 2006 John Wiley & Sons, Inc.

Ethics and the InternetEthics and the Internet• The Internet crosses international boundariesThe Internet crosses international boundaries

posing challenges that are not readily resolved.• Different cultures laws customs and habits• Different cultures, laws, customs, and habits

insure that different countries police the Internet in very different ways.in very different ways.

• Managers face challenges in navigating their organizations through the murky waters oforganizations through the murky waters of ethical use of the Internet.

• Example: Free speech and censorship.Example: Free speech and censorship.– The U.S. provides for free speech protection, but

other countries do not.– An Internet code of ethics by the IFIP is being

debated.

Copyright 2006 John Wiley & Sons, Inc.

Summaryy• IT is funded using either chargeback, allocation,

t b d tor corporate budget.• Chargeback is viewed as most equitable.• TCO is used to understand ALL costs

associated with a technology.• Activity-based costing can be a meaningful

measure of determining cost.• The portfolio of IT investments must be carefully

evaluated and managed.• Balanced scorecards and IT dashboards are

used to communicate the status and benefits of ITIT.

• Options pricing offers risk-hedging.Copyright 2006 John Wiley & Sons, Inc.

SummarySummary• Ethics is important to the IS field particularlyEthics is important to the IS field particularly

since new technologies and innovations are arriving at an untold pace.

• IS professionals must seek to uphold the ethical handling and dissemination of information gadhering to international, federal, state, and local laws concerning the ethical handling of d t d th i i idata under their supervision.

• Improper handling and use of IS can lead not l t i t l i ti bl b t tonly to internal organization problems but to

legal problems as well.D ’t j di f t b th i h dli• Don’t jeopardize your future by the mishandling of IS

Copyright 2006 John Wiley & Sons, Inc.

INFORMATION SYSTEM STRATEGY  

EXECUTIVE DIPLOMA POST MODULE ASSIGNMENT  

BUSINESS & ADVANCED TECHNOLOGY CENTRE UNIVERSITY TECHNOLOGY MALAYSIA 

 Develop an  Information System Strategic Plan  for your company. Your report  could be a working document  for  the board of directors,  so  it shouldn’t be too long and complicated.  Your report may include:‐  

• Company background (summary) • Business problem to be solved (summary) • Analysis of the options considered • Your proposed business solution and your justification • Relevance of the solution to the business problem • How IS/IT will be uses • Expected business benefits • Implementation plan • Any other management issues. 

 60%  of  the  marks  are  awarded  for  this  PMA  which  must  be  an individual assignment and not group work. You may use power point presentation to present your plan with text attachments to explain the details of each slide otherwise you may use a full text report format for the plan.   End.