IT in Management
IT in Management
1.1 Objectives,
1.1 Objectives
● Data can come from the internal operations of the firm and from external entities; for
example suppliers or customers. Data also collected from external databases and services,
for example, organizations purchase a great deal of marketing and competitive
information.
● In IT, Management is the process through which all resources related to information
technology are managed according to an organization's priorities and their basic needs.
This includes actual resources like networking, hardware, computers and people, as well
as intangible resources like software and data. The main aim of IT management is to
generate importance through the use of technology. To achieve this, business strategies
and technology must be lined up.
The expansion of the Internet has been called the most complete development in the
history of human communications. It is all-over and is changing politics, economics, and
social relations. The borderless nature of the Internet produces particular needs for global
institutions and has opened the door for inventive approaches
In order to be able to respond quickly, enterprises must provide their employees with
immediate access to accurate and updated information. This greater vulnerability on
information translates into greater dependence on the effectiveness of IT infrastructure as
a whole.
Over past years, information and computer-based systems have larger and more complex,
the importance of and dependence on IT systems have grown substantially. Information
technology has all the indication of an infrastructural technology. Infrastructural
technologies offer far more value when used in isolation. The value of infrastructure
sharing has come out as a business model to increase the bottom line. Information
technology is, first of all, a transport system. It carries digital information like as railroads
carry goods and power grids carry electricity.
In IT, companies have worked hard to reduce the cost of IT infrastructure data center,
networks, databases, and software tools that support businesses. These attempt to
consolidate; standardize; and streamline assets, technologies, and processes have
delivered major savings.
4. According to the IT Governance Institute (ITGI), there are four critical questions
for value delivery. These are as follows.
a. Are we doing the right things?
b. Are we getting the benefits?
c. Are we getting them done well?
d. Are we doing them the right way?
5. A comprehensive understanding of risk measures will assist the CIO to take the
right decisions.
There are four key business requirements have been analyze for the success of an
organization.
Information technology can have a significant impact on the quality of services (QaS)
and solutions and the performance of a company. Efficiently and effectively managed IT
investments that meet business and mission needs can create new value in revenue generation,
build important competitive advantages and barriers to entry, improve productivity and
performance, and decrease costs. Similarly, imperfectly aligned and uncontrollable IT
investments can sink a company. Concurrent to cutbacks in IT expending and a short-term focus,
management within companies is demanding an increase in IT productivity, expanding its role
from internally focused to customer facing and making IT more relevant to business strategy.
Rumpled between information technology and the strategic intent, impotence to establish
a common IT architecture, and a highly redundant and nonfactual as-is architecture will result in
high operations and maintenance costs. Business and IT relationships are more critical because
web services and services-oriented development of applications (SODA) will continue to build
as IT continues to become increasingly more integral to business processes.
The Value business is the output of the collection of processes through which businesses
today try to maximize the age-old equation of profit equals revenue minus expenses. Most
businesses today rely on information technology to realize some of their business value.
The remarkable growth of IT has enormous potential for improving the performance of
organizations. The large investment made in IT puts increasing pressure on the management to
justify the expenses by specifying the business value of IT. In today’s fast growing competitive
business environment, companies increasingly demand that IT investments demonstrate business
value through measurable results.
Information technology directs innovation and innovation is the path to business success.
Innovation in business has the same effect that steam had on the industrial revolution.
In fact, it’s difficult to imagine any business that has not benefited from the digital
revolution. Today, in agriculture we use computers. Farmers use computers for recording
production, financial planning, research on technical issues, and procurement.
The value of IT in a business production process has long been a debatable issue.
Explanation of the so-called “productivity paradox” has been one of the central topics in this
field. Much work has been focused on firm-level analyses. It disallows the relationship between
IT value and productivity based on grouping of countries, when the individual analytical method
is applied and technical efficiency is used as the performance touchstone.
Technology offers the opportunity to see things from a new perspective, and to resemble
what we were already doing from a new perspective.
Business value refers to the contribution of IT to corporate performance. Business value can be
measured along dimensions such as corporate efficiency and effectiveness, competitiveness,
product and service innovation, and customer and supplier relationships.
To identify the range of business value impacts of IT, the extent to which they appear to be
realized, and the patterns of association between IT business value and corporate characteristics.
The business value can be measure through following 10 dimensions:
Organizational effectiveness
a. Improve the process and content of decision making
b. Improve internal communication within your corporation
c. Provide better coordination among functional areas in your corporation
d. Improve strategic planning
e. Facilitate the implementation of new processes that constitute a better way of doing
business
Organizational efficiency
a. Increase your corporation's profit margins.
b. Increase your corporation's market shares.
c. Reduce your corporation's labor and related expenses.
d. Reduce your corporation's selling and general administrative expenses.
Economies of production
a. Reduce the cost of designing new products/ services.
b. Improve levels of production or throughput.
c. Reduce the production cost of tailoring products/services to market segments.
d. Improve the productivity of production labor through automation.
e. Improve the utilization of machinery.
Customer relations
a. Allow your corporation to provide administrative support (such as billing, collection,
inventory, management, etc.) to customers.
b. Provide on-line access of your corporation's products/services database to customers.
c. Position customers to rely increasingly on your corporations' electronic support
systems (e.g., order entry terminals, order tracking)
Supplier relations
a. Help your corporation gain leverage over its suppliers.
b. Reduce your suppliers' transaction costs by making it easier for them to handle
orders.
c. Reduce uncertainty and variance in lead times for suppliers.
d. Enhance the ability of your corporation to monitor the quality of products and
services received from suppliers.
Product and service enhancement
a. Provide your corporation with unique opportunities for product and service
innovation.
b. Reduce the cycle time for development of new products/services.
c. Reduce variance and uncertainty in product/ service quality.
d. Reduce variance and uncertainty in product/ service delivery time.
e. Become part of existing products/ services to enhance their value.
Inter-organizational coordination
a. Help to enlarge your geographic market area.
b. Help your corporation coordinate closely with its customers and suppliers.
Marketing support
a. Play an important role in identifying market trends.
b. Assist your corporation in serving new market segments.
c. Enhance sales forecast accuracy.
d. Track market response to discounts.
e. Track market response to promotional or introductory pricing.
f. Facilitate targeted response to competitors' pricing strategies.
Competitive dynamics
a. Delay competitor entry into new products/ services because of the investments now
required in complex software and hardware in your industry.
b. Support your corporation in making a first strike against your competitors.
c. Help your corporation to provide substitute products/services for your competitor's
products/services,
d. Make it easier to capture distribution channels and thereby increase the cost and
difficult for competitors to enter a new or existing market segment.
UNIT-1
1.7 Summary
● Computers are used to process, store, and exchange information in digital form.
● Computers have today become the backbone of business processes.
● The act of computing is built over computing software which runs on top of bare metal
computing hardware.
● A variety of computing and processing software are available for various kinds of
applications.
● Different computer applications generate different kinds of data.
● It is easy to imagine that the requirements for a network linking a bank’s automatic teller
machines (ATMs) to its computers are different from those of a network of computers
that control air traffic or a car manufacturer’s assembly line.
● In today’s modern world, for almost every activity whether it is personal, or business-
related, in some or the other way, we relay / commit to the computer system.
● Due to the growing dependency on computers, every small and big firms and other
business companies have started offering computer-based service.
● The advancement of communications, electronic service networks, and multimedia have
opened a new door for corporations by providing an effective way of business
processing, payment transfer, and service delivery.
1. Independency
As computer systems help in making the business automated, the businesses are
becoming more and more independent. No more, there is the need to put man-power for
every work, as with the help of computers most of the work can be automated. Starting
from ticket booking to luxury car manufacturing, everything is automated.
2. Cost Cutting
3. Marketing
With the use of computer systems with Internet facilities, it is very simple to
make a business global in a given period of time. Websites, email, social media
websites, online advertisements, etc. are the important tools of online marketing.
Businesses need to store and maintain large data and other records; manually, it is
very difficult to maintain, but the use of computers not only increases the storage
capacity, but also ease the processing and retrieval of data anytime.
As most of the tasks in almost every industry have become automated, it has now
become much easier to manufacture a huge bulk of products in very less time. Through
computer technology, services also became faster and easier.
7. High Accuracy
There is hardly any scope of errors in an automated system; however, if any error
occurs, it is largely a human error.
Data sharing has now become very simple just the way it is simple to link one
computer system to another.
9. Competition
Computers also help keep the data of businesses secure. However, this security
can face threats too. For instance, if someone hacks the system or there is a virus attack,
it can have the potential to damage all the data that is secured.
a. Smartphone
Smartphones are essentially a computer now, and they may not be as steady and
unflappable In fact, some think smartphones could even replace computers for some
businesses.
Then there are tablets and all-in-one desktop computers where a thicker monitor
holds the entire computer system.
c. Laptops
There are laptops and even desktops and laptops that offer touchscreen input now,
and what you pay often prescribes how long your tech will be relevant.
Problem in the computer world now, it's that disuse is a constant threat.
Technology moves so fast and changes so quickly that many products are rendered
obsolete inside of two to three years. Staying up to date with hardware and apps can
make all the difference in program firmness, up time and the opportunities offered
through technology.
● Project management
● Accounting/payables
● Scheduling
● Production and productivity management
● Design and engineering
● Navigation
● Expense tracking and budgeting
● Inventory management and shipping tracking
● Industry oversight and alerts
● Communication
● Database and information management
● Client care
● Tracking related industry news via alerts
Even a hardware shop can have software to record transactions for their
customers, making orders and client care easier than ever before. Businesses can track
individual employee performance online, monitor divisional sales and accomplishments
and much more.
Infrastructure Management
Elements of IT Infrastructure
Fig. 2 7S Model
The 7S model includes servers, systems, storage, security, supervision, services, and
staff. All the seven components work together to achieve the overall business benefit.
The modern business runs on data. Data centers have thousands of servers that
power applications, provide information, and automate a range of processes. The data
center is a physical place that has computers, computer networks, critical computing
systems, data storage, including backup power supplies, air conditioning, and security
applications.
For example, Wikipedia defines a data center as a facility used to house computer
systems and associated components such as telecommunications and storage systems. It
generally includes redundant or backup power supplies, redundant data communications
connections, environmental controls (for example, air conditioning, fire suppression), and
security devices.
Today, the IT industry finds that for every kilowatt of power it uses to drive a
server, another kilowatt is needed to cool it. Businesses are looking to minimize energy
waste and reduce the carbon footprint of computing Resources. Green IT efficiently
utilizes computing resources reducing carbon footprint based on reduction of energy
requirements and decrease in total energy usage.
1.5.4 Virtualization
Customers focused on day-to-day business and have created large storage islands
of committed storage. As these storage have expanded to more significant capacity levels,
total storage utilization across the business and the inability to share data between
applications have become forbidden to further growth. The multiplication of data
throughout every facet of industry, combined with an increasing demand for secure
access from a variety of devices, make data storage a critical component of every
business strategy and organization.
Consolidating the storage systems, platforms, and applications can help the
organization ease manageability and improve capacity utilization factors. Storage
consolidation, also called storage convergence, is a method of centralizing data storage
among multiple servers.
CBS provides a bank with a solid, flexible, and scalable foundation on which
other systems can be easily built and coordinated into a robust scalable banking solution.
As per RBI guidelines, the CBS in RRBs should be geared towards better
management control and monitoring, wider range of services offered and enhanced level
of customer satisfaction.
The electronic clearing service (ECS) and electronic funds transfer (EFT) are also
being enhanced in terms of security by means of implementation of public key
infrastructure (PKI) and digital signatures using the facilities offered by the certifying
authority as per the guidelines of the RBI.
Digital economy is one of the collective words for all economic transactions that
occur on the internet. It is also called the Web Economy or the Internet Economy. With
the emergence of technology and the process of globalization, the digital and traditional
economies are merging into one.
● e-business
● e-business infrastructure
● E-commerce
Digital Economy is integrated into every aspect of the user’s life – healthcare, education,
banking, entertainment etc.
The business in the digital economy has given rise to a number of new business
models. The types of business models discussed include several varieties of e-commerce,
app stores, online advertising, cloud computing, participative networked platforms, high
speed trading, and online payment services.
1.6.1 Electronic commerce
● Business-to-business models
E-commerce consists of transactions in which a business sells products or
services to another business, B2B model.
● Business-to-consumer models
B2C business model sells goods or services to individuals outside the
extent of their profession. B2C models come into several categories, including,
online vendors with no physical stores or offline presence, existing consumer-
facing businesses with online sales, and manufacturers that use online business to
allow customers to order and custom-make directly.
● Consumer-to-consumer models
In C2C e-commerce plays the role of mediator, helping individual
consumers to sell or rent their assets (for example such as residential property,
cars, motorcycles, etc.) by presenting their information on the website and
facilitating transactions. These businesses may or may not charge the consumer
for these types of services, conditional on their revenue model. This type of e-
commerce comes in various forms, including, but not limited to:
Mobile payment solutions, which encompass all types of technologies that enable
payment using a mobile phone or smartphone, including, among others, mobile card
processing using card readers connected to smartphones, in-app payments for virtual
products.
a. Infrastructure-as-a-service
b. Platform-as-a-service
c. Software-as-a-service
Fig. 5 Cloud computing service models
(iii) Business functions as a consequence of the decreased need for local personnel to
perform certain functions as well as the flexibility in many cases to choose the location of
servers and other resources.
1.7 Summary
● In this chapter we learn the business value of IT, role of computer in modern business.
● In this chapter we discussed the basic IT components, networks, and the types of
resources networks can share.
● The topics discussed include data center, grid computing, cloud computing,
virtualization, server consolidation, and storage consolidation.
● An overview of current trends in the field of IT has been discussed to enable the reader to
get a feel of it.
● The chapter outlined the basic need for IT infrastructure and the various components that
go with it. An overview of current trends in the field of IT has been discussed to enable
the reader to get a feel of it.
● The topics discussed include data center, grid computing, cloud computing,
virtualization, server consolidation, and storage consolidation.
Unit Structure
1.0 Objectives:................................................................................................................................. 32
1.1 Introduction to Information System ........................................................................................... 33
1.2 Digital Impact on Business ......................................................................................................... 33
1.3 Basic Terminology in Information Systems ................................................................................. 35
1.4 Information Systems .................................................................................................................. 38
1.4.1 Hardware ............................................................................................................................ 39
1.4.2 Software ............................................................................................................................. 39
1.4.3 Communication Network .................................................................................................... 39
1.4.4 Database............................................................................................................................. 40
1.4.5 People ................................................................................................................................ 41
1.5 Classification of Information Systems......................................................................................... 42
1.5.1.Transaction Processing System ........................................................................................... 42
1.5.2Process Control Systems ...................................................................................................... 42
1.5.3 Enterprise Collaboration System ......................................................................................... 43
1.5.4 Management Information System ....................................................................................... 43
1.5.5 Decision Support System ..................................................................................................... 43
1.5.6 Executive Information System ............................................................................................. 44
1.6 IS Infrastructure and Architecture .............................................................................................. 45
1.6.1 IS Architecture .................................................................................................................... 45
1.6.2 IS Infrastructure ................................................................................................................. 47
1.7 Summary ................................................................................................................................... 48
1.8 Review Your Learnings: .............................................................................................................. 48
1.9 Sample Questions: ..................................................................................................................... 49
1.10 References for further reading ................................................................................................. 49
1.0 Objectives:
1. Define what an information system is by identifying its major components
2. Describe the basic history of information systems
3. Distinguish data from information and explain the characteristics used to evaluate
importance of data
4. Identify the basic types of business information systems and discuss who uses them, how
they are used, and what kind of benefits they deliver
5. Define the types of roles, functions and careers available in information systems
Here we have used terms data and information interchangeably? But what is difference
between these terms?
Data is known as raw facts. These raw facts are in unorganized manner. To convert these
unorganized facts into organized one, we need to do some processing where data is
cleaned, arranged in organized fashion. This cleaned, organized data is called as
information. This information can be used for answering various questions, we can
retrieve the information in various formats as per requirement. Thus, it has a very high
importance.
Information: Collection of facts organized in such a way that they have additional value beyond
the value of the facts themselves.
The transformation
process (Applying
knowldege by
Data Information
selecting, organizing
and manipulating
data)
1. People can make poor decisions, costing thousands, or even millions, of dollars
2. Information can be of little value to the organization
If information is not relevant, not delivered to decision makers in a timely fashion, or too
complex to understand.
Information Technology (IT) refers to any computer-based tool that people use to work with
information and to support the information and information-processing needs of an organization.
An Information System (IS) collects, processes, stores, analyzes, and disseminates information
for a specific purpose.
This chapter will let you know many ways in whichIT has transformed modern organizations,
you will also learn about the significant impacts ofIT on individuals and societies, the global
economy, and our physical environment. In addition, IT is making our world smaller, enabling
more and more people to communicate, collaborate, and compete, thereby levelling the digital
playing field.
When you graduate, you either will start your own business or you will work for an organization,
whether it is public sector, private sector, for-profit, or not-for-profit. Your organizationwill have
to survive and compete in an environment that has been radically transformedbyinformation
technology. This environment is global, massively interconnected, intensely competitive,
24/7/365, real-time, rapidly changing, and information intensive. To compete successfully, your
organization must use IT effectively.
You need to keep in mind that the information technologies you will learn about are important to
businesses of all sizes. No matter what area of business you major in, what industry you work
for, or the size of your company, you will benefit from learning about IT.
Who knows? Maybe you will use the tools you learn about in this class to make
your great idea a reality! The modern environment is intensely competitive not only for your
organization, but for you as well. You must compete with human talent from around the world.
Therefore, you will also have to make effective use of IT.
This chapter will make you understand why you should become knowledgeable about IT. It also
distinguishes among data, information, and knowledge, and it differentiates computer-based
information systems from application programs. Finally, it considers the impacts of information
systems on organizations and on society in general. As you see in IT’s About small business
owners do not need to beexperts in information technology to be successful. Rather, the
company’s business model is its core competency. However, the firm is effectively using IT to
support its business model and, thus, to create a successful business.
PositionJob Description
Chief Information Highest-ranking IS manager; is responsible for all strategic
Officerplanning in the organization
IS DirectorManages all systems throughout the organization and the day-to-
day operations of the entire IS organization
Information Centre Manages IS services such as help desks, hot lines, training, and
Manager consulting
Applications Coordinates and manages new systems development projects
Development Manager
Project Manager Manages a particular new systems development project
Systems Manager Manages a particular existing system
Operations Manager Supervises the day-to-day operations of the data and/or
computer centre
Programming Manager Coordinates all applications programming efforts
Systems Analyst Interfaces between users and programmers; determines
information requirements and technical specifications for new
applications
Business Analyst Focuses on designing solutions for business problems; interfaces
closely with users to demonstrate how IT can be used
innovatively
Systems Programmer Creates the computer code for developing new systems software
or maintaining existing systems software
Applications Creates the computer code for developing new applications or
Programmer maintaining existing applications
Emerging Technologies Forecasts technology trends; evaluates and experiments with
Manager new technologies
Network Manager Coordinates and manages the organization’s voice and data
networks
Database Administrator Manages the organization’s databases and oversees the use of
database management software
Auditing or Computer Oversees the ethical and legal use of information systems
Security Manager
Webmaster Manages the organization’s World Wide Web site
Web Designer Creates World Wide Web sites and pages
An Information system is broadly divided in three parts viz., People, Process, Technology.
Following diagram show their inter-relationship.
1. Hardware
2. Software
3. Communication Networks
4. Data
5. People
1.4.1Hardware
Hardware is required in all systems. There can be basic or advanced hardware requirement based
on the applications. It consists of devices such as the processor, monitor, keyboard, and printer.
Together, these devices accept, process, and display data and information. Following are some of
the hardware examples:
1.4.2 Software
Software is a program or collection of programs that enable the hardware to process data as per
requirement. Following are the examples of software:
a. Windows XP
b. Graphics Card Driver Software
c. PowerPoint
d. mySAP Customer Relationship Management
e. Peachtree Accounting
f. iTunes Software
a. Ethernet
b. Netgear Wireless Router
c. Cable Modem
d. Cell Phone
e. WiFi, WiMax card
f. Bluetooth device
1.4.4 Database
Database is a collection of related files or tables containing data. There are many database
resource management technologies which are listed below:
a. End User
b. Data Entry Person
c. Manager
d. Programmer
e. DB Administrator
f. Cashier
g. Secretary
h. Professor
There are three main roles of Information Systems, viz., Support Strategies for Competitive
Advantage, Support Business Decision Making, Support Business Processes and Operations.
These are shown in figure below:
Information Systems are being used in more areas, especial at the strategic level. At the same
time, Information Systems are expanding participation of End Users. Biggest advantages of IS is
Information can flow up the pyramid faster and more effectively.
1.5 Classification of Information Systems
Information System is broadly classified in two parts namely Operations Support System and
Management Support Systems.
Operations Support System maintains all data flows through various processes in an
organization. It is required in any business for maintaining daily basis operations. This is further
classified in three parts, viz., Transaction Processing Systems, Process Control Systems and
Enterprise Collaboration Systems.
1.6.1 IS Architecture
In first chapter, we have seen the importance of Information Systems to people with different
roles in an organization. We had seen some related application examples in previous chapter.
Now, in this chapter we need to look upon the infrastructure and architecture of these system.
No, what do you mean by infrastructure and architecture? Infrastructure is the basic systems and
services that are necessary for an organization to run any business. And architecture is internal
the fundamental structure of various software components which enables transmitting of data
from one module to another.
Figure: Information Flow to Information System Components
Above figure shows the information flow through-out the information systems. Figure shows
major modules from information system like Process Control System (PCS), Transaction
Processing Systems (TPS), Management Information Systems (MIS), Decision Support Systems
(DSS). This information flow shows that basic staff workers deal with TPS, PCS and MIS based
on their role. Various managers deal with DSS and MIS. And Executive officers deal with
External Information, DSS, MIS and analytical information provided by various managers.
The above diagram is divided in 2 parts viz., Information Exchange / Communication and
System Information Flow. Information Exchange / Communication represents information
shared between various basic processes transactions. For example, for any supermarket, there
can be various processes like purchase in wholesale, selling in retail at different store, shipping
of the items, maintaining daily transactions at each point of sale, merging overall transactions
done by all point of sale on daily basis, selling items as per pre-decided offer prices maintaining
stock in store, paying daily wages to worker, etc. So, information flowing through all these
processes come under category of Information Exchange / Communications.
On the other hand, when we say about System Information, it deals with the information
provided to various managers, information coming from external units regarding competitive
business in market, decisions provide by Decision Support System, and Management
Information System so that as and when required, higher management can have access to any
information for verification, etc.
These partitions of the Information Flow can also be called as Operations and Management
based on the information flowing to a process criterion. Please refer to below diagram for the
same.
Figure: Information Flow
1.6.2 IS Infrastructure
Infrastructure of Information systems contains many different hardware / software applications
which are needed to run an information system of a business and it should be able to cover all
business process requirements.
Information system’s infrastructure contains following elements which are shown in below
figure:
1. Internet Platform
2. Computer Hardware
3. Operating System
4. Enterprise Resource Planning Systems
5. Telecommunication and Networking System
6. Consultants and System Integrators
7. Database Management and Storage Systems
For any business to run, it needs various software and hardware. For example, we need computer
/ mobile / ipad / PDA etc in basic hardware. Along with this, we need licenced user-friendly
Operating Systems to work with hardware.
We need internet to access internal and external data required for business processes. For this,
we also need telecommunication hardware and software which is used for networking for basic
requirements as well as to business communications. There is requirement of Enterprise resource
planning (ERP) systems to manage all business transaction data. And to store these vast data we
need database management and storage systems. And,finaly to integrate all these different
modules we need consultants and System Integrators.
1.7 Summary
In this chapter we have studied about Information System and some basic terminologies associated with
it. We have seen the various people roles in a business and their data requirement for running a
business successfully. We have seen the infrastructure and architecture of Information System.
Role of IS in Business
Unit Structure
2.0 Objectives.................................................................................................................................. 52
2.1 Role of IS in Business ................................................................................................................. 52
2.1.1 Functional Areas in Business ............................................................................................... 53
2.1.1.1 Manufacturing and Production ..................................................................................... 53
2.1.1.2 Sales and Marketing ..................................................................................................... 54
2.1.1.3 Finance and Accounting ............................................................................................... 54
2.1.1.4 Human Resource Management .................................................................................... 54
2.2 Perspective on IS ....................................................................................................................... 55
2.3 Software & Hardware Platforms to Improve Business Performance ........................................... 58
2.3.1 Software in IS ...................................................................................................................... 61
2.3.1.1 Customer Relationship Management ........................................................................... 61
2.3.1.2 Supply Chain Management........................................................................................... 61
2.3.1.3 Customized Software ................................................................................................... 62
2.3.1.4 Commercial and Open-Source Software ....................................................................... 62
2.3.1.5 Cloud Computing.......................................................................................................... 63
2.3.1.6 Enterprise Resource Planning ....................................................................................... 64
2.3.1.7 Utility Software ........................................................................................................ 65
2.3.2 Hardware in IS .................................................................................................................... 66
2.3.2.1 Motherboard ............................................................................................................... 66
2.3.2.2 Random-Access Memory .............................................................................................. 67
2.3.2.3 Hard Disk...................................................................................................................... 67
2.3.2.4 Solid-State Drives ......................................................................................................... 67
2.3.2.5 Removable Media ........................................................................................................ 68
2.3.2.6 Network Connection .................................................................................................... 68
2.3.2.7 Input and Output ......................................................................................................... 69
2.3.2.8 Bluetooth ..................................................................................................................... 69
2.3.2.9 Input Devices ............................................................................................................... 69
2.3.2.10 Output Devices ........................................................................................................... 70
2.3.2.11 Portable Computers ................................................................................................... 70
2.3.2.12 Smartphones .............................................................................................................. 70
2.3.2.13 Tablet Computers ....................................................................................................... 70
2.3.2.14 The Rise of Mobile Computing .................................................................................... 71
2.3.2.15 Integrated Computing ................................................................................................ 71
2.3.2.16 Servers ....................................................................................................................... 71
2.4 Summary ............................................................................................................................. 72
2.5 Review Your Learnings ............................................................................................................... 72
2.6 Questions .................................................................................................................................. 72
2.7 Further Reading ......................................................................................................................... 72
2.0 Objectives
6. Understand role of IS in business
7. Describe the role ERP software plays in an organization
8. Analyse and identify best software and hardware required for IS in business
9. Describe cloud computing and its advantages and disadvantages for use in an
organization
10. Explain the term open-source and its characteristics
11. Identify major steps in system development process and state the goal of each step.
12. Identify the value-added processes in the supply chain and describe the role of
information systems within them
13. Identify some of the strategies employed to lower costs or improve service
14. Define the term competitive advantage and discuss how organizations are using
information systems to gain such an advantage
Every business has its own information system depending upon the size of the organization, and
it plays a vital role in running a business successfully. Business is divided into broad functional
areas like Manufacturing and Production, Sales and Marketing, Finance & Accounting and
Human Resource Management. Following diagram shows the basic functional areas of any
business. Because of dividing business in small areas, one can focus on the required outcome for
that functional unit and take necessary steps as per requirement. This is to maximize the profit of
the business either by manufacturing, or by improving selling / advertising process or by giving
discounts or selling combination of items for more sales or profit of the organization can be
increase by hiring best candidates for the required roles and utilize the man-power at required
works. So, all these units play a vital role for business improvement.
Functional Areas
of Business
Producing organization’s goods and services is the main function of this function. There are
three stages of manufacturing:
a. Inbound Logistics
b. Production
c. Outbound Logistics
Once the products or services are ready, they need marketing in market so increase the sell.
For marketing, businesses create their offers at launching the products or later depending
upon the market situation. The products / services can be sold from their own retail stores or
online as per business. Or sometime by creating tie-ups with other organizations, the
products are launched. Example: When we buy a new laptop, stre give s other accessories
like wired/wireless mouse, keyboard, speaker, headphone, hard-disk, laptop bag, etc, in
small amounts compared to their original prices. This is a marketing strategy for all these
items.
This function is responsible for managing the firm's financial assets and maintaining the
firm's financial records. The finance process involves managing the firm's financial assets,
whereas the accounting process is involved primarily in financial record keeping.
For any business to work, there is need of Finance and Accounting department to fulfill the
requirements of a company. Let us understand what are these requirements? In Finance, it is
related with managing funds for the company, may be from banks, stakeholders, other
external agencies etc. And these funds received may be taken as loan with some interest
rate, so a company needs to repay it as soon as possible to reduce payment of interest as well
as whenever required company need to take loan as required capital to run a business.
People working in finance need to manage all these funds correctly to have maximum profit
of the company. And they need the various statistical information of the company to take
important high-level decisions.
On the contrary, to maintain these statistics of finance data, people in Accounting need to
maintain all transaction details, track each and every inbound and outbound processes, and
maintain transparency to these processes. After gathering these data, it needs to be verified.
As you have seen the people with different roles in business in previous chapter, these
people need to be managed for smoothly conduction of all business processes. Now, what do
we mean by managing people? Its regarding managing their employment details, their
salary, hiring new employees, terminating employees if required etc. These all details are
managed by information system of a business.
2.2 Perspective on IS
Information System plays major part in all micro level to macro level business processes. Starting
from data collection to processing and to decision making and increasing profitability of business
everywhere there is important role of Information System. Please refer to following diagram for
reference.
From a business perspective, information systems are part of a series of value-adding activities
or processes for obtaining, transforming, and supplying information to the managers who can use
to improve decisions regarding the business processes.
The business outlook calls attention to the organizational and managerial type of information
systems. An information system symbolizes an organizational and management solution based
on information technology to a challenge by the environment.
Some firms achieve better results from their information systems than others. Various studies
have shown that information technology investments give a considerable variation in the returns
of the business firms. Reasons for lower return on investment include failure to adopt the right
business model that suits the new technology or seeking to preserve an old business model that is
doomed by new technology.
Information technology investments cannot make organizations and managers more effective
unless they are accompanied by corresponding assets: assets required to gain value from a
primary investment. For instance, to realize value from automobiles requires complementary
investments in highways, roads, repair facilities, and a legal regulatory structure to set standards
and control drivers.
1. Organizational Assets: These include a supportive business culture that values efficiency
and effectiveness, an appropriate business model, efficient business processes,
decentralization of authority, highly distributed decision rights, and a strong information
system (IS) development team.
2. Managerial Assets: These include strong senior management support for change,
incentive systems that monitor and reward individual innovation, an emphasis on
teamwork and collaboration, training programs, and a management culture that values
flexibility and knowledge.
3. Social Assets: These are not made by the firm but by the society at large, other firms,
governments, and other key market actors, such as the Internet, educational systems,
network and computing standards, regulations and laws, and the presence of technology
and service firms.
Research indicates that firms that support their technology investments with investments in
complementary assets, such as new business processes or training, receive superior returns.
These investments in organization and management are also known as organizational and
management capital.
Following table shows a list of information systems which you can find in many businesses:
American Apparel Point-of-Sale (POS) POS data (the data recorded when
System merchandise is sold) is integrated
with an inventory database, so
more merchandise can be ordered.
Orange County Employee Hiring System Web based system that posts job
Department of opportunities and lets people
Education apply online. Hiring systems
often filter resumes using the
digital keywords from the online
application. Hiring systems also
manage the application through
the hiring process.
Apart from this, not only based on organizational size, but its cost also depends on number of
features available in the information system. If as per requirement of the business the complete
solution package is not available in market, then one can go for customized software or
hardware.
Information
System Software &
Hardware
Solutions
Al-a-carte
Complete Single Customized
(Separate for each
Solution Modules
module)
For making any business profitable, we need to do the groundwork first on purchasing software
and hardware for firm. We need to do the market survey for various available solutions, compare
the solutions with their available features and find the best solutions according to organization’s
budget.
MIS combines the work of computer science, management science, and operations research with
a practical orientation toward developing system solutions to real-world problems and managing
information technology resources. It is also concerned with social issues encircling the
development, use, and impact of information systems, which are typically discussed in the fields
of sociology, economics, and psychology
The brief history of business computing with it’s hardware and software availability is
mentioned in table below for your reference.
2.3.1 Software in IS
Software can be broadly divided into two types: operating systems and application software.
Operating systems control the hardware and establish the interface between the hardware and the
user. Application software is the class of programs that do something useful for the user.
A supply chain management (SCM) system manages the interconnection between these links, as
well as the inventory of the products in their various stages of development. A full definition of a
supply chain management system is provided by the Association for Operations Management:
“The design, planning, execution, control, and monitoring of supply chain activities with the
objective of creating net value, building a competitive infrastructure, leveraging worldwide
logistics, synchronizing supply with demand, and measuring performance globally”. Most ERP
systems include a supply chain management module.
Open-source software is software is the software which source code is available and open to
anyone who wants to modify it fir betterment of the application.
Many businesses are distrustful of open-source software because the code is available for anyone
to work on. This increases the threat of an attack. There are many arguments on both sides of the
aisle for the benefits of the two models. Some benefits of the open-source model are:
1. By providing financial incentive for software development, some of the brightest minds
have chosen software development as a career.
2. Technical support from the company that developed the software.
Today there are thousands of open-source software applications available for download. For
example, as we discussed previously in this chapter, you can get the productivity suite from
Open Office. One good place to search for open-source software is sourceforge.net, where
thousands of software applications are available for free download.
In this era, you are already using cloud computing in many forms. For example, using Gmail,
Google Drive where you store the data. Salesforce.com is a good example of cloud computing,
their entire suite of CRM applications areoffered via the cloud. Cloud computing is not limited to
web applications: it can also be used for services such as phone or video streaming.
Nowadays, almost all applications are online and using cloud platforms like Amazon Web
Services (AWS), IBM Cloud or Microsoft Azure etc for deployment of the applications.
“utilizing a central database”: All users of the ERP edit and save their information from the data
source. What this means practically is that there is only one customer database, there is only one
calculation for revenue, etc.
“that is implemented throughout the entire organization”: ERP systems include functionality that
covers all of the essential components of a business. Further, an organization can purchase
modules for its ERP system that match specific needs, such as manufacturing or planning.
ERP systems were originally marketed to large corporations. However, as more and more large
companies began installing them, ERP vendors began targeting mid-sized and even smaller
businesses. Some of the more well-known ERP systems include those from SAP, Oracle, and
Microsoft.
Figure: Components in Enterprise Resource Planning Application
For effectively implementing an ERP system in an organization, the organization must be ready
to make a full dedication. All parts of the organization are affected as old systems are replaced
by the ERP system. Generally, implementing an ERP system can take two to three years and
several million dollars. In most cases, the cost of the software is not the most expensive part of
the implementation: it is the cost of the consultants!
What is need of installing an ERP system? An ERP system can bring an organization a good
return on their investment, can enfore rules and regulations on basic business processes across
the enterprise and using the software to enforce best practices, most organizations see an overall
improvement after implementing an ERP.
2.3.2 Hardware in IS
Computer hardware contains digital devices. This includes the following:
1. Desktop Computers
2. Laptop Computers
3. Mobile Phones
4. Tablet Computers
5. e-Readers
6. Storage Devices
7. Input Devices
8. Networking elements like Routers, Switches, Cables, etc.
2.3.2.1 Motherboard
The motherboard is the important circuit board on the computer. The CPU, memory, and storage
components, among other things, all connect into the motherboard. Motherboards come in
different shapes and sizes, depending upon how compact or expandable the computer is designed
to be. Most modern motherboards have many integrated components, such as video and sound
processing, which used to require separate components.
The motherboard provides much of the bus of the computer (the term bus refers to the electrical
connection between different computer components). The bus is an important determiner of the
computer’s speed: the combination of how fast the bus can transfer data and the number of data
bits that can be moved at one time determine the speed. [1]
2.3.2.3Hard Disk
While the RAM is used as working memory, the computer also needs a place to store data for the
longer term. Most of today’s personal computers use a hard disk for long-term data storage. A
hard disk is where data is stored when the computer is turned off and where it is retrieved from
when the computer is turned on. Why is it called a hard disk? A hard disk consists of a stack of
disks inside a hard metal case. A floppy disk (discussed below) was a removable disk that, in
some cases at least, was flexible, or “floppy.”
2.3.2.4Solid-State Drives
A relatively new component becoming more common in some personal computers is the solid-
state drive (SSD). The SSD performs the same function as a hard disk: long-term storage. Instead
of spinning disks, the SSD uses flash memory, which is much faster.
Solid-state drives are currently quite a bit more expensive than hard disks. However, the use of
flash memory instead of disks makes them much lighter and faster than hard disks. SSDs are
primarily utilized in portable computers, making them lighter and more efficient. Some
computers combine the two storage technologies, using the SSD for the most accessed data (such
as the operating system) while using the hard disk for data that is accessed less frequently. As
with any technology, Moore’s Law is driving up capacity and speed and lowering prices of solid-
state drives, which will allow them to proliferate in the years to come [3].
2.3.2.5Removable Media
Besides fixed storage components, removable storage media are also used in most personal
computers. Removable media allows you to take your data with you. And just as with all other
digital technologies, these media have gotten smaller and more powerful as the years have gone
by. Early computers used floppy disks, which could be inserted into a disk drive in the computer.
Data was stored on a magnetic disk inside an enclosure. These disks ranged from 8″ in the
earliest days down to 3 1/2″ [3].
Around the turn of the century, a new portable storage technology was being developed: the USB
flash drive (more about the USB port later in the chapter). This device attaches to the universal
serial bus (USB) connector, which became standard on all personal computers beginning in the
late 1990s. As with all other storage media, flash drive storage capacity has skyrocketed over the
years, from initial capacities of eight megabytes to current capacities of 64 gigabytes and still
growing.
2.3.2.6Network Connection
When personal computers were first developed, they were stand-alone units, which meant that
data was brought into the computer or removed from the computer via removable media, such as
the floppy disk. Beginning in the mid-1980s, however, organizations began to see the value in
connecting computers together via a digital network. Because of this, personal computers needed
the ability to connect to these networks. Initially, this was done by adding an expansion card to
the computer that enabled the network connection, but by the mid-1990s, a network port was
standard on most personal computers. As wireless technologies began to dominate in the early
2000s, many personal computers also began including wireless networking capabilities [3].
2.3.2.7Input and Output
In order for a personal computer to be useful, it must have channels for receiving input from the
user and channels for delivering output to the user. These input and output devices connect to the
computer via various connection ports, which generally are part of the motherboard and are
accessible outside the computer case. In early personal computers, specific ports were designed
for each type of output device. The configuration of these ports has evolved over the years,
becoming more and more standardized over time. Today, almost all devices plug into a computer
through the use of a USB port. This port type, first introduced in 1996, has increased in its
capabilities, both in its data transfer rate and power supplied[3].
2.3.2.8Bluetooth
Besides USB, some input and output devices connect to the computer via a wireless-technology
standard called Bluetooth. Bluetooth was first invented in the 1990s and exchanges data over
short distances using radio waves. Bluetooth generally has a range of 100 to 150 feet. For
devices to communicate via Bluetooth, both the personal computer and the connecting device
must have a Bluetooth communication chip installed.
2.3.2.9Input Devices
All personal computers need components that allow the user to input data. Early computers used
simply a keyboard to allow the user to enter data or select an item from a menu to run a program.
With the advent of the graphical user interface, the mouse became a standard component of a
computer. These two components are still the primary input devices to a personal computer,
though variations of each have been introduced with varying levels of success over the years. For
example, many new devices now use a touch screen as the primary way of entering data.
Besides the keyboard and mouse, additional input devices are becoming more common. Scanners
allow users to input documents into a computer, either as images or as text. Microphones can be
used to record audio or give voice commands. Webcams and other types of video cameras can be
used to record video or participate in a video chat session.
2.3.2.10Output Devices
Output devices are essential as well. The most obvious output device is a display, visually
representing the state of the computer. In some cases, a personal computer can support multiple
displays or be connected to larger-format displays such as a projector or large-screen television.
Besides displays, other output devices include speakers for audio output and printers for printed
output.
2.3.2.11Portable Computers
As more organizations and individuals are moving much of their computing to the Internet,
laptops are being developed that use “the cloud” for all of their data and application storage.
These laptops are also extremely light because of compresses components and are preferred in
this emerging technology era.
2.3.2.12Smartphones
The first modern-day mobile phone was invented in 1973. Resembling a brick and weighing in at
two pounds, it was priced out of reach for most consumers at nearly four thousand dollars. Since
then, mobile phones have become smaller and less expensive; today mobile phones are a modern
convenience available to all levels of society. As mobile phones evolved, they became more like
small computers. These smartphones have many of the same characteristics as a personal
computer, such as an operating system and memory. The first smartphone was the IBM Simon,
introduced in 1994.
In January of 2007, Apple introduced the iPhone. Its ease of use and intuitive interface made it
an immediate success and solidified the future of smartphones. Running on an operating system
called iOS, the iPhone was really a small computer with a touch-screen interface. In 2008, the
first Android phone was released, with similar functionality.
2.3.2.13Tablet Computers
A tablet computer is one that uses a touch screen as its primary input and is small enough and
light enough to be carried around easily. They generally have no keyboard and are self-contained
inside a rectangular case. The first tablet computers appeared in the early 2000s and used an
attached pen as a writing device for input. These tablets ranged in size from small personal
digital assistants (PDAs), which were handheld, to full-sized, 14-inch devices. Most early tablets
used a version of an existing computer operating system, such as Windows or Linux.
These early tablet devices were, for the most part, commercial failures. In January, 2010, Apple
introduced the iPad, which ushered in a new era of tablet computing. Instead of a pen, the iPad
used the finger as the primary input device. Instead of using the operating system of their
desktop and laptop computers, Apple chose to use iOS, the operating system of the iPhone.
Because the iPad had a user interface that was the same as the iPhone, consumers felt
comfortable and sales took off. The iPad has set the standard for tablet computing. After the
success of the iPad, computer manufacturers began to develop new tablets that utilized operating
systems that were designed for mobile devices, such as Android.
2.3.2.15Integrated Computing
Along with advances in computers themselves, computing technology is being integrated into
many everyday products. From automobiles to refrigerators to airplanes, computing technology
is enhancing what these devices can do and is adding capabilities that would have been
considered science fiction just a few years ago. Here are two of the latest ways that computing
technologies are being integrated into everyday products:
2.3.2.16 Servers
Servers are high end configuration computers.a server is a piece of computer hardware or
software (computer program) that provides functionality for other programs or devices,
called "clients". This architecture is called the client–server model. Servers can provide
various functionalities, often called "services", such as sharing data or resources among
multiple clients, or performing computation for a client. A single server can serve multiple
clients, and a single client can use multiple servers. A client process may run on the same
device or may connect over a network to a server on a different device. Typical servers are
database servers, file servers, mail servers, print servers, web servers, game servers, and
application servers [4].
By using the latest technology both in terms of software and hardware, a business can grow
and achieve maximum profitability either by making low-cost transactions, low maintenance
cost for data handling or doing more marketing / selling etc. One need to understand the
capability of hardware and software and chose a best platform suitable for an organization.
2.4Summary
In this chapter, we have learned the role of information system in every process of the
organization. Software and hardware requirements for incorporation of IS for organization.
We have discussed the ways for selection of hardware and software for an organization.We
have discussed the various software tools and hardware used in Information Systems. Based
on the features of software and hardware one can find the best suitable tool for any
information system.
2.6 Questions
1. Explain the role of Information System in business.
2. Explain the various classification of business functions. Give examples of software
applications used for these business functions.
3. Explain various software requirement in IS and give examples of IS software solutions.
4. Explain need for hardware in IS and express yourself for improvising the efficiency of
the IS by choosing software and hardware.
5. Express in your language about the term information systems hardware means.
6. What are the advantages of solid-state drives over hard disks?
7. How IS adds value to a business?
References:
1. openlibrary-repo.ecampusontario.ca
2. bus206.pressbooks.com
3. courses.lumenlearning.com
4. https://en.wikipedia.org
Unit - 2
Chapter-5
Contents
3.0 Objectives ................................................................................................................................. 73
3.1 Introduction ............................................................................................................................... 73
3.2 Management Opportunities Challenges & Solutions ................................................................... 74
3.2.1 The Challenges and Problems of Information Systems ........................................................ 74
3.2.2 Issues in Managing IT .......................................................................................................... 78
3.2.3 Solutions to Various Business Problems .............................................................................. 79
3.3 Business Applications ................................................................................................................ 80
3.4 Role of IT in E-Commerce and M-Commerce ............................................................................ 84
3.5 Summary ................................................................................................................................... 90
3.6 Review Your Learning ............................................................................................................... 90
3.7 Questions ............................................................................................................................. 90
3.8 Further Reading ......................................................................................................................... 91
3.9 References ................................................................................................................................. 91
3.0 Objectives
1. To identify major factors for executing a business successfully
2. To create technical solution to a business problem
3. To demonstrate how IS and IT support E-Commerce and M-Commerce
4. To analyse various business applications of MIS
5. To analyse the business process and find the probable supporting IT solution
6. To evaluate and find technical alternatives on business challenges
3.1 Introduction
When we say information, its likely to be a piece of relevant information, but many a times while
doing a business we might get the information which is not needed, and the information which
we need is not available…so, this will create a problem in taking decisions at higher level as well
as working on low order processes in an organization. There are many more differ job roles and
different process as per departments in an organization. This is shown in figure below. There are
many different types of problems faced by the organization and many more challenges are there
in day-to-day business. We will see their classification in below sections.
Figure: Relationship Between Organizational Problem and Levels
1. Human-centred factors:
1. The lack of understanding of the needs of the users by designers (the lack of
correct definition of the needsand their analysis).
2. The lack of information of the managers and users as they don’t know exactly
what they want and whattheir information needs are.
3. The lack of participation of the managers and users in system design.
4. The lack of understanding of the managers of software and information systems.
5. The lack of accuracy in the data collected.
2. Environmental factors:
1. The lack of procedures and methodology and stages of creating the system.
2. The lack of suitable consultants for designing the system and software.
3. The lack of evaluation of environmental aspects in management information
systems.
4. The lack of serious consideration and adequate investment in this regard.
3. Organizational factors:
a. The lack of good conditions for participation and collaboration of the managers,
users and system directors.
b. The lack of existing systems and methods analysis before the system design.
c. The lack of evaluation of the existing power.
d. Bad condition of educating the specialized forces.
e. Unsuitable implementation of the system.
f. Inadequate education of the users.
g. Inadequate and incomplete documentation.
Apart from this, there are other challenges as well for achieving business objectives. These are
listed below:
3. Accounting for The Cost of Systems and Managing Demand for Systems
As the cost of information falls because of the power of information technology, demands for
information and technology services proliferate throughout the firm. Unfortunately, if employees
and managers believe information services are free, their demands will be infinite. One of the
challenges facing business managers is understanding which systems are truly necessary, truly
productive with high returns on investment, and which are merely conveniences that cost a great
deal but deliver little.
A number of solutions exist to the challenges, some of them are explained here.
You should develop a list of firmwide information requirements to get a 360-degree view of the
most important information needs for your company as a whole. Once you have this list
developed, examine how your existing systems—most built to service specific groups and levels
in the firm—provide this information to corporate-wide systems. You’ll need to inventory your
firm’s existing information systems and those under construction. (Many organizations have no
idea of all the systems in their firm, or what information they contain.) Identify each system and
understand which group or level in the firm benefits from the system.
Systems are usually not obvious or self-taught for most people. You will need to ensure that you
understand how much training is required to support new systems, and budget accordingly. Once
you have an inventory of just the major systems in a firm that are used every day by thousands of
employees, try to identify how they learn how to use the system, how effective their training is,
and how well they use the systems. Do they exploit all the potential value built into the systems?
Apart from above mentioned points, there are other solutions as well.
Many organizations obtain remarkable business value from enterprise applications because of
their power to enhance process coordination and management decision making.
But,
In business applications, MIS plays an important role. There are many vendors who provide
solutions as a full-fledged MIS system for an organization. Ex. Microsoft Dynamics, LS Retail,
ERP, CRM.
Application of MIS
The application of MIS in an organization requires involvement of many key team players,
including systems analysts, information technology specialists, computer programmers,
management, executives, quality-control personnel, help-desk specialists, information security
and more. Proper application of MIS should result in the following advantages:
Increased Profits: MIS application can result in new product development, changed marketing,
changed packaging, improved customer service, a growing product line, better communication
with different levels of customers, competitive pricing and higher customer retention rates.
Increased Quality: MIS application contributes to increased quality through reducing waste,
helping in the selection of quality materials and implementing warranties/guarantees that match
material quality.
Decreased Costs: MIS application helps management become more strategic about material
sourcing, staffing, scheduling, increasing efficiency, improving processes, managing inventory
appropriately and manufacturing goods at the right time.
When management has an accurate report, they do not have to guess about who is doing well or
what needs to be improved or wonder where their blind spots are. The data help them see a
clearer, less-biased picture than they could come up with on their own.
Once management information systems are in place, implementing them into management
workflow is vital to their effectiveness. Management needs to be aware of how to access the
data, run regular reports and find help when they need it. Visual presentations and opportunities
for hands-on exploration of the systems help managers to get used to accessing data before they
need to.
Help-desk personnel could choose to host a class or webinar that walks management through
every step needed to navigate through your company's MIS. Due to the importance of MIS data
in decision making, it is imperative that management has a thorough understanding of how and
when to best use the system.
Managers regularly make decisions that impact the daily lives of their employees, so having
accurate data is important. Changes introduced by management have the power to alter
someone's life by:
Decision-Making Processes
Many companies train their managers to make decisions using a structured decision-making
process. While these processes vary slightly from organization to organization, a basic seven-
step process is common:
1. Identify the problem.
2. Gather data related to the problem.
3. Identify possible solutions to the problem.
4. Consider pros and cons of each solution.
5. Choose the solution that minimizes risks while increasing benefits.
6. Execute your plan, adjusting as needed.
7. Review the effectiveness of your plan to help inform future decisions.
Importance of MIS in Decision Making
The importance of MIS in decision making can be seen throughout the typical corporate
decision-making process. MIS reports typically alert management about problems by
highlighting poor performance, lower than expected sales, problems in efficiency and so forth.
These same reports allow managers to gather data related to the problem by looking at trends
over a certain period of time and seeing where improvements can be made. This information
empowers managers to brainstorm a wide variety of possible solutions to the given problem so
that they can consider the pros and cons of each one. This makes it possible for management to
choose and execute a plan to solve the problem.
Future MIS reports should show improvement in the problem areas so that managers can
accurately evaluate the success of their given plan and make adjustments going forward.
The importance of MIS in decision making lies in its ability to help managers become proactive
versus reactive decision makers. Without proper data, crises can build in the background and
then explode, causing managers to go into survival mode and make reactive decisions that Band-
Aid the problem rather than prevent it in the first place.
Because MIS provides a plethora of information that helps with proactive decision making, it is
also helpful for goal setting and review. When your management team sets goals for the week,
month, quarter or year, those can be programmed into your management information system.
Then, it is easy to track actual performance against your goals and then either increase or
decrease your goals in the future to make them more probable and make profit margins more
accurate [4].
3.4 Role of IT in E-Commerce and M-Commerce
As you are aware now that every firm needs IT support from low-level processes to high-level
processes. In any organization, IT plays a vital role in automating many processes as well as to
reduce paperwork and human-errors. Apart from this, at management level, IT has different
aspects to learn. When we implement IT support, it increases the chances of business
development a lot but at the same time, an organization needs hardware, software, IT expert
employees to maintain this IT support. So, there is always a trade-off between the gain by IT
Systems and then cost incurred to have IT support systems in organizations. Few perceptions
about IT are mentioned in below figure.
As the technology has developed from few decades, there is drastic change in working strategies
in big organizations. In 1950s, if there would have change in business process then it would be
limited to some technical changes. In 1960s, majorly changes reflected in managerial control and
in around 1990 the major changes in information systems are in organizational core activities.
But if you see the case studies after 2005, there is change in the system as organizations used to
have different vendors for different operations. But nowadays, in this cloud computing era, a
business doesn’t need more vendors, rather than they can have a single Management Information
System and which will be working on cloud platform. This enables all employees and customers
for easy access to the system and is more cost effective than purchasing the actual hardware
setups for IT Systems.
Now, we have studied the importance of IT in an organization, now let’s study its role in e-
commerce and m-commerce. What do you mean by e-commerce and m-commerce?
1. E-commerce:
The process of buying and selling products or services over the Internet by using electronic mode
is called as E-commerce. It refers to Electronic commerce. Generally, e-commerce activities are
performed with the help of desktop computers and laptops, so users have to look for a place to do
their transactions. It is broad term which refers doing shopping and making payments online with
help of electronic devices like Laptop and computers.
2. M-commerce:
The process of buying and selling products or services over the internet by using wireless
handheld devices is called as M-commerce. It refers to Mobile Commerce. M-commerce implies
the use of Mobile devices for shopping activities and making business transactions anywhere
they go they can do this with just internet connectivity. It is subcategory of ecommerce which
does the same this via mobile devices.
Examples of M-commerce includes mobile banking like paytm, in-app purchasing Amazon
mobile app.
08. Its reachability is comparatively low Its reachability is more than that of e-
than the m-commerce as it is not so commerce only due to the use of mobile
good in portability. devices.
E-commerce is divided into two types, viz.: business-to-consumer (B2C) e-commerce refers to
transactions that occur between a business and the finalconsumer of the product e-commerce
business to business(business-to-business-B2B) refers to inter-businesstransactions where no
party becomes the final consumer,involves relatively few people, and the parties involved
arehighly trained in using information systems and getting toknow business processes.Trade
Through Electronic NetworksSome people define electronic commerce (e-commerce)narrowly,
namely trade, which only covers businesstransactions that relate to customers and suppliers.
Thisdefinition means that only transactions that only crosscompany boundaries can be classified
as e-commerce. If atransaction remains within the company boundary, thesepeople will call it an
electronic business transaction. Limitinginternal versus external transactions will not offer much
help,because most people consider electronic business andelectronic commerce to be the same
thing.Key Success Factors in E-CommerceIn many cases, an e-commerce company can survive
not onlyon the strength of the product, but with a reliable managementteam, timely delivery,
good service, good businessorganization structure, network infrastructure and security,website
design good, several factors include:
In traditional trade,it is very difficult for a company to find the geographicallocation of its
business partners in other countries or othercontinents. Efficient. It is considered very efficient,
becauseevery company does not need equipment to run this business,and only needs internet.
And reduce all levels of operationalcosts, so that it doesn't seem expensive. Because it is
runthrough online channels. Market expansion. The reach will beincreasingly very broad,
because it is not limited by thegeographical location wherever the company is located.Shortening
Distance. Companies can get closer to consumers.By just clicking on the links on the sites.
consumers can go tocompanies wherever they are.
1. Effective. Consumers can obtain information about products orservices needed and
transact in a fast and inexpensive way.
2. Physically safe. Consumers do not need to go to the storewhere the company sells its
goods, and this allows consumersto trade safely because in certain areas it may be
verydangerous to drive and carry very large amounts of cash.
3. Flexible. Consumers can make transactions from variouslocations, both from home,
office, internet cafe or other places.
The increasing number of products and services available fordigital shipping and the increasing
number of customers areable to overcome their reluctance to make purchases usingthe web. The
faster speed of communication from homecomputers has also made the delivery of digital
products morepractical.
1. Digital Products
Certain products and services can be sent to consumersdirectly through the internet. Examples of
digital products suchas songs, movies, software. Products and services can bedirectly consumed
after downloading.
2. Physical Products
Certain products and services that cannot be directlyconsumed via the internet but must be sent
to consumers.Sales and payment orders can be received through theinternet, after which they are
sent to the buyer.
Virtual sales are sales made by a company that does notoperate a physical selling place. With
virtual sales, there is noshop where customers can enter and buy products. Hybridsales occur
when a company has a place to sell physically anda website where customers can buy products.
These two retailsales strategies need to inform customers of product costs andfeatures, manage
customer payments, and produce productshipments. Virtual sales are most often used when
companiescannot build a place to sell physically or find a place to selleconomically feasible
physical sales. Mixed sales aresometimes referred to as brick-and-click operations.
Mostcompanies have a place to sell because usually this is neededfor their business plans. The
most popular example at this timeis the sale of products through social networks such
asFacebook or other sites such as www.kaskus.us, where thesales they do are usually virtual
sales or mixed sales.
4. Electronic Governance
Mobile Trade
Mobile commerce is the use of cellular telephones andpersonal digital assistants (PDA) to
conduct wireless ecommerce. Along with the development of cellular telephonetechnology from
analog generation to the digital generation,the term third generation telecommunications
(thirdgeneration-3G) have loosely used for wireless technologycapable of transferring data.
• High costs
Thus, if an organization is fully updated with latest IT support systems and Information System,
then it work as a boon for the organization in its development .
3.5 Summary
In this chapter we have studied the business opportunities and challenges associated with it from
various factor. We have seen the probable solution steps in overcoming these challenges. We
have seen the applications of IS/IT in organization and various business systems. IT is very
important in any business but at the same time it incurs some cost for implementations. So, there
is trade-off between IT and business opportunities. We have seen the e-commerce & m-
commerce and effective role of IT in this.
3.7 Questions
1. What do you think a CEO wants from information technology?
2. What is the role of the chief information officer?
3. Why do you think organizations have established the CIO position? What kind of
individual should fill it?
4. Describe how at least one organization gained a competitive advantage with information
systems.
5. How should corporate and IT planning be coordinated?
6. What is meant by the statement that a key challenge for management is the integration of
information technology and the business?
7. Give an example of how information systems can constrain the opportunities available to
management.
8. What are the motivations for outsourcing or vendor management?
9. What are the options for structuring information processing in an organization?
10. How do managers react in a organization that views IT as a liability compared with a
company where it is seen as an asset?
11. If you became the CEO of an organization, how would you evaluate its information
technology effort?
12. Why should a manager insist on seeing different alternatives when a new system is being
designed?
13. Describe how a manager provides leadership with respect to information technology in
the organization.
14. Discuss the problems with the different political models of IT in the organization.
15. How should an organization decide on proposed investments in IT?
16. What kind of changes does information technology either create or facilitate within and
between organizations? What other changes are associated with IT?
17. What is e-commerce and m-commerce?
18. What is role of IT in e-commerce and m-commerce?
19. What are the different factors creating business challenges?
20. Write difference between e-commerce and m-commerce.
3.9 References
1. http://infokara.com/, ISSN NO: 1021-9056, 691, INFOKARA RESEARCH, Volume 8
Issue 10 2019
2. http://basselelgammal.blogspot.com/2013/05/management-opportunities-challenges-
and.html
3. https://www.ijstr.org/final-print/jan2019/The-Role-Of-Information-Technology-In-E-
commerce.pdf
4. https://bizfluent.com/facts-6938756-application-mis-business.html
Unit 3 (Chapter 6)
6.0 Objectives
6.1 Introduction
6.0 OBJECTIVES
6.1 INTRODUCTION
Technology can be acquired in many different ways depending upon the firm’s
necessity of using that technology.
Step 1: Acquisition context:- This step leads to the definition of a detailed framework for
the acquisition, including the aquisition motives, the different types of partners that could
be involved, the desired technology readiness level and an overview of the most likely
technology acqusition scenarios.
Step 2: Acquisition evaluation:- This step involves assessing the match between
technological capabilities and market oppotunities, as well as the capability of the firm to
absorp and make great use of the technologies that other firms are developing and also
this step gives a checklist of questions to evaluate the partner-technology-absorptive
capacity combination.
Step 3: Acquisition options:- This step provides assistance to evaluate the different
options associated with such issues as future technological development, exploitation
routes,protection strategies, the type of contract governing the relationship and the
transaction ‘currency’.It also provides open ended questions and case study examples
to support evaluation of pros and cons of each strategic option.
1. As organization’s motive for wanting to acquire a technology will affect the kind of
technology they are looking for.
2. The partners from whom they decide to acquire it and the process they follow to
make the acquisition.
4. Academics have used two main models to understand technology acquisition. The
first, a linear model, suggest that only developing country firms acquire increasingly
complex capabilities (allowing them to use and maintain technology) in order to develop
innovative technologies for themselves.
5. The second model is the non linear model, in which employees of the company
update their skills upon introduction of new technology acquisition in the firm.
6.1 Firms uses training and learning programmes to acquire design, engineering and
project management technolgies.
6.2 Successful firms used post graduate training programs for engineers and managers
to acquire problem solving skills.
improve their selection of training instructors and 'experts' by being more active
in the screening process;
stay in regular contact with their suppliers;
make sure suppliers and clients share the same objectives;
involve clients in a wide range of acquisition activities;
improve access to social networks within supplier firms;
use joint learning mechanisms like equipment trials and test sites;
ask suppliers to disclose more information before contracting them;
make use of scan and search mechanisms like trade fairs and exhibitions;
negotiate bilateral and multilateral funding terms that do not reduce technological
choice;
encourage participation of technological specialists in regional organisations and
industry forums;
actively seek out information from shareholders and strategic investors;
establish strong and effective management systems, particularly for
organisational development;
support technological experimentation;
engage senior leadership in technological acquisition strategies; andpromote
higher-order learning.
1. One of the fundamental motivation for the acquisition of external technologies is the
need to develop new technological capabiliites and to fill gaps in the Research and
Development knowledge base.
2. The objective of these acquisition is sometimes to fill holes in an existing product line,
while in other cases it is to create and establish a brand new product.
3. This need may arise as specialist technical expertise and capabilities are often
difficult to obtain and firms may not have the ability to develop these valuable
knowledge based resources internally.
4. This may be the case, for eg when the technological knowledge of a firm is close to
exhaustion and most of the possible technological combination have already been tried.
9.Developing country firms actively search for technological solutions and install, test
and commission technologies, work with international suppliers as partners.This type of
active engagement produces better returns on investment in technology and fosters
improved familiarity and confidence. So the process is better described as technology
'acquisition'.
10. The ability to acquire technology varies across firms in developing countries. For eg
a single foreign company may sell the same technology to different domestic firms, but
the service will be different for each firm.
11. The capability is both embodied that is held in people and non-embodied as a
property of components as shown in figure below.
12. The tasks and the associated technological capabilities can b classifed in two broad
category 1)Investment capability 2)Production capabilitis as shown in table given below
Table 1 Illustrative matrix of Technological capabilities
Investment Production
Level of Pre investment Project Process Product Industrial
Complexity execution engineering engineering engineering
Simple Pre-feasibility Civil Debugging, Assimilation of Work flow,
Routine and feasibility construction, balancing, product design, scheduling,
(experience studies, site ancillary quality control, minor adaptation time motion
based) selection, services, preventive to market needs studies,
(experience erection, commissioning maintenance, inventory
based ) scheduling of assimilation of control
investment process
technology
Adaptive Search for Equipment Equipment Product quality Monitoring
Duplicative technology procurement, stretching, improvement, productivity,
(search source, detailed process licensing and improve
based) negotiation of engineering, adaptation and assimilating new coordination
contracts, training and cost saving, imported product
bargaining recruitment of licensing new technology
suitable terms, skilled technology
information personnel
systems
Innovative, Basic process In-house process In-house product
Risky design, innovation, basic innovation, basic
(Research equipment research research
Based) design and
supply
2. Increasing its internal technological capabilities, can give the company more strategic
options, allowing it to select the best available technology.
3. For eg
3.1 Acquisitions can encourage innovation, countering inertia and rigidity and increasing
R and D productivity.
3.2 Relying on incremental improvements to existing technologies may limit a firm’s
poetential.
3.3 Experimenting with novel and emerging technologies can provide opportunities for
more radical innovation.
4. Eg Acquisitions can open new markets by allowing the knowledge of new customers,
channels, inputs, processes and markets to be exploited.
5. Acquisitions may help to deal with uncertainty and risk. Companies operating in high-
tech industries are often dependent on uncertain future outcomes or developments. In
such cases, managers are more likely to avoid risky internal investments in R and D
with long term pay back periods, investing way of keeping their options open until the
risks and uncertainty diminish.
6. The firm’s have a different strategic options for regulating and managing the
acquisition. Like as follows
6.7 IP protection
7. Future technology development- There are three main approaches to this a)The
technology can be developed internally by the acquiring company b) It can be done
externally by the technology provider c)It can be carried out collaboratively between the
two. The choice of development path will depend on a number of things including the
type of technology involved, the resources available, the degree of control the acquiring
firm needs to maintain over the technology and the strategy driving the acquisition.
11. Rights to use a technology:- The IP can be exploited along multiple dimensions,
ensuring that each party can take full advantage of the rights of the IP in their particular
area. The major dimensions are geography, time frame and field of use, but the IP can
also be divided alon the technology axis. For eg when two companies are woring on
same project, so one company is located in India and another in USA, so if both
companies wants to file a patent for same product, they has a right to do so as area of
both the companies diffier due to their locations.
Figure 8 Division of technology rights
12. Acquisition currency: The acquirer can offer the seller a number of different kinds
of benefits in exchange for the technology. The terms of an exchange are spcified in the
contract under th legal terms of consideration. It is helpful to be clear about what is
exchanged in return for a technology as the implicit benefits of collaboration can often
be overlooked.
Figure 9 The three main kinds of ‘currency’ that are used in exchange of technology
13. IP protection:- Transferring technology knowledge from one organisation to
another (whether in the form of know-how, know-what or know-who) is well known to be
problematic as far as IP is concerned.
Figure 10: The preferred protection mechanism for different types of knowledge
1 The need to innovate more rapidly is another motivation for technology acquisition as
it can reduce the time to market.
2. The internal development of new capabilities may take too long time or too costly.
3. Technology acquisition can create these more quicky so that firm can be more
responsive to market demands.
5. Firms substitute fixed investment costs with variable acquisition costs and such costs
can be recovered via profits from new businesses that follow a partnership based
strategy.
Figure 10 checklist for identifying firms motives for acquiring technology
The above figure can be greatly explained with the help of case study
The company decided to opt for an embedded exploitation strategy for this new IP,
using the technology for its products which, as a result, could be highly customised
and uniquely shaped. This was considered a potential unique selling proposition for
the firm which would be the only world supplier offering such a range of products.
Furthermore, the new processing technology left an unmistakable fingerprint on the
products which could be used to uncover potential emulators and patent infringers.
The company obtained three process patents covering this production process and
proceeded to commercialise its new range of products with its customers.
It was a struggle to create the market for this particular product, with customers still
sceptical of the advantages of adopting the new product lines. Several years after
the patents were granted, the legal department realised that a competitor was
launching similarly shaped products and that there was almost certainly an
infringement of their IP.
To investigate the issue, neutral assessors were sent to the competitor’s production
plant to evaluate the patent infringement. They estimated that only one of the three
patents had been infringed and that there was only a 50 per cent chance of winning
a case in court. Furthermore, due to the small scale of the market, the potential
damages which could be recovered if Firm A was successful were smaller than the
expected costs of the trial itself. Firm A decided not to pursue the case.
In their retrospective analysis of this situation, Firm A realised that they had been
focusing too much on the ‘embedded’ exploitation route and that the protection in
place was not adequate for this approach. The patent was a good means of
protecting the technology and of identifying potential infringements, but this
protection route would only have worked if they could claim damages for infringed
rights.
Firm A realised that an alternative approach would have been to adopt the
technology in their products and to also license it to competitors. This would have
had the advantage of growing the market as the customers could use multiple
suppliers. It would also have meant that some of their competitors would have
depended on their technology.
Weight(0-10) Description
Fill hole in
an existing
product line
Created and
established
a new
product to
the firm
Is firm
created a
interest
among the
customers to
buy this
product
Questions
Q3. Explain the concept of developing technological capabilities w.r.t to need to acquire
of technology.
Q4. Illustrate what is importance of increasing strategic option for any firm with the help
of case study.
7.0 Objectives
7.1 Introduction
7.0 OBJECTIVES
Choose a technology perfect for a firm to handle the market and to their
competitors.
7.1 Introduction
New technology can be acquired in the firm through many channels or sources, one
of the channel is through collaboration.
Sometimes collaboration with new industry partner for the technology acquisition
can be risky due to the prior limited experience of working with the new one.
If a firm chooses a collaboration method for technology acquisition then, the firm
and its partner should agree on how costs and benefits of the outcomes will be
shared, cultural differences might reduce the quality of coordination and
communication and the acquisition project may not be considered successful if the
outcomes are not deployed.
It may be acquired from a single organization or more than one can be involved in
the form of consortium.
1. Universities
1. Universities are more seeking interested in the commercialisation of research but are
generally inexperienced in commercialising IP.
3. The Bayh Dole Act has drastically modified the relationship between firms and US
academia for instance.
4. An element of tension exists between academics who want to publish the work with
the industry who want to filing a patent for that same work.
5. Another issue is that high turnover of people in academia might lead to information
leaks.
6. Universities fall in to two categories.
6.1 Universities with a track record of new technologies which have already been
brought to the market, along with good technology transfer office are considering by
firm’s an easiest way of acquiring new technology. For eg open innovation manager or
any electronics company
6.2 Sometimes universities are difficult to work with a firm, if universities want to own IP
and want to become a inventors of new technology, but that is not fit a firm as firm’s are
bearing the costs of scaling up a new technology in the market. For eg Acquisitions
manager, large company
2. Start-up companies
2. However, they are typically lacking in resources and business knowledge and are
often subject to the influence of their investors(eg venture capitalists).
3. They may be more flexible but also more volatile than established firms.
4. They may own only one technology and the fear of losing control over it might lead to
over protective attitudes.
6. Research shows that making such partnerships work may be mutually beneficial.
7. Research shows that making such partnerships work may be problematic, but there
are ways to increase the chances of success.
3. Consortia
3. Consortia are more common in industries with long technology life cycles such as
pharmaceuticals.
4. This industry require access to a wider set of competences beyond the traditional
areas of chemistry and pharmacology-such as molecular biological, nano technology
and computational science to guarantee future innovation.
5. Types of consortia
5.1 Pre-competitive research consortia: these are an important mechanism to share risk
and investment with others.
5.2 Policy maker consortia: these could be a bad investment as the government dream
for a particular project and fund it. But these consortia do not work well due to lack of
motivation between the collaborators.
5.3 Supply chain consortia: they resemble joint Research and Development projects in
which many companies are paying for one firm to do the work, this work well if there is
strong bond of collaboration is there. Eg senior manager, large energy firm
1. If the firm want to acquire the technology in its own space then require certain level of
maturity between the development of product till the product is not reached to a market.
2. The maturity level and the amount of work needed to bring it up to the level your firm
requires are highly significant factors for considering in the context of any acquisition.
3. There are many ways of measuring maturity of a technology. This will be shown
below
8. A Firm asks useful question before acquiring any technology from a source/channel
8.1 What type of organizations could be considered as a source for the technology?
8.6 What degree of maturity will the technology have at the end of the acquisition?
Above figure explains framework of technology souces, along with maturity levels . So if
any firm is using above framework to meaure the maturity level of technology sources ,
will get an proper feedback about new technology which is aquired newly in the firm.
For eg Casestudy depicted here shows how a aerospace company is done
collaboration with goverenment’s scientific organization.
the Government, a key stakeholder. Being clear about the expectations of its
prospective partner helped the aerospace company to anticipate future problems. The
framework above supported a discussion concerning the possible forms such a
partnership could take in relation to the acquisition
of very early stage technology. The discussion showed that there was an alternative to
a one-to- one relationship between the aerospace firm and the not-for-profit
organisation. This involved a consortium of industrial and academic partners. Forming a
consortium could require those involved
to contribute to its cost. Alternatively, external funding could be found, for example
through European grants. A grant might impose constraints on the partnership
composition. For example, the consortium might need to include different kinds of
members.
Now we will solve above case study using the STAM framework depicted above
X X X X X X
X X X X X X
X X X X X X (M)
X- Indicates that firm is not using any of the matuirty levels of technology from one to
one sources
2. Acquiring technologies helps the firm to feel less vulnerable and more competitive.
4. To remain competitve, large technology companies must clearly define their growth
aspirations, establish a feasible business growth strategy, and align the operating model
and appropriate capabilities to deliver on the strategy efficiently and effectively.
5. Deploying an integrated strategy-through-execution approach will help companies
guide the strategic planning processes and accelerate deployment of the growth
strategy.
6. By using approaches shown in above diagram, the company can improve their
growth in an timely manner and company will b better able to
6.1 Create a seamless connection between strategic growth aspirations and operational
implications:- Execution teams should define the end state of their growth aspirations
and think positively for different approaches of strategies. For eg For example, strategy
implications on operations may include a shift in sales channels, geographic footprint,
strategic partners, information systems, or changes in cultural norms to foster the
desired results of the strategy.
6.2 Establish a systematic approach for aligning effective operating models to growth
strategy plans:-By design, business models and their supporting operating models shift
over time.
6.3 Right-size assets and capabilities to improve alignment and focus on strategic
plans:-For example, a Silicon Valley company going through separation optimized two
separate cost structures and deployed a team to optimize operations in parallel with
deploying a growth strategy investment. Doing these activities in parallel allowed this
company to realize its strategic agenda much quicker than if it did these activities in
series.
6.4 Increase transparency on goals and expectations for all stakeholders:- To increase
the speed of strategy deployment, changes spurred by innovation cannot be deployed
in series. Many elements must work together to improve response time, and employees,
suppliers and distribution partners all have key roles to play.
7. Case study depicted here will resemble how an firm research for a market to stand in
an competitive market- A chemical company
A) The readiness level of the technology:- At what point in the innovation process will
the technology be acquired? This might be at the research stage, during the
development stage, or close to commercialisation.
B) The market in which the technology will be employed:- Will the technology be applied
in an existing market or one which is new to the firm?
Market in Technology readiness level
which the
Research Development Commercialisation
technology
will be Current Not very This is most Not common
employed Market common- as common
company’s situation.
own internal Here a
team is company go
strong to for licensing,
achieve joint venture
progress or merger
and
acquisition
with other
companies
Miscellaneous
and integrity of gas pipelines. At that time, the latest progress on fibre optic seemed to
enable this technology for a new range of applications in industry.
Kaza Oil asked Erwin Optoelectronics, a firm specialised in fibre optic sensing
technologies, to carry out a state of the art and technical feasibility study to
use fibre optics to monitoring the integrity of gas pipelines. The results of the study
pointed out that additional research work was needed to determine the
Kaza and Erwin pushed the formation of a consortium to develop new technical
knowledge on this technology. After some months, the consortium
provided such positive results that both firms became interested in developing
technology concepts.
The concepts they developed worked so well that both companies signed a joint
development agreement to develop products based on this technology for gas pipelines
integrity surveillance. Erwin was in charge
of laboratory tests and product development while
Both companies jointly own all the intellectual property rights emerged from the
partnership; however, Erwin is in charge of the commercialisation
of the resulting products and services. Kaza, on the other hand, has a substantial
discount on the public prices of the family of products and services based on this
technology.
The case studies suggest that there are three conditions to achieve effective acquisition
of technology by collaboration.
4. The framework also indicates three key tasks that need to be effectively managed in
order to achieve success.
4.3 Third key task is transfering the technology to the recipient system.These three
tasks seem to be critical to success in technology acquisition projects. Effective
partnership management becomes particularly important when an industry partner is
involved.
Figure 7: Key activities and influential factors in technology acquisiion by collaboration.
Questions
Q2. Why universities are not conidered is better way of acquiring technology?
Q5. Consider the STAM model for Chemical company if company wants to collaborate
with government organization?
Q6. Why start-up companies as a source of acquiring technology is suitable for small
companies?
Unit 4 - IMPACT OF INFORMATION TECHNOLOGY ON ORGANIZATION AND
STRATEGIC ISSUES OF INFORMATION TECHNOLOGY
Chapter 8
8.0 Objectives
8.1 Introduction
8.2.7 Conclusions
8.0 OBJECTIVES
8.1 INTRODUCTION
1. Technology impacted the business also as organization change their way of doing
business they had done in the past before technology came in to existence.
5. The activities of the group of people are coordinated that is there is a joint effort
between the group of peoples.
6. The formal organizational chart structure shows that there is a well defined
relationship between the managers and workers which shows the rational coordination
among them.
7. In Organization when a group of people interact with each other, so this interaction is
nothing but creation of social organization which lacks goals to achieve and does not
possess any structure.
I. Uncertainty
2. An organization and its managers has come across many different types of
uncertainties.
6. For eg A chip manufacturing company like Intel is not facing any uncertainty as they
have a decentralizing decision at management level which handled uncertainty at a
great level.
2. Specialization
3. Co-ordination
4.Interdependence
I Pooled interdependence –
i)This occurs when two organizations depend on each other as they are all
components of a larger organization.
iii)For example – the small companies that are part of a larger company exhibit
pooled interdependence.
II Sequential interdependence –
i)This means when the output of one unit becomes the input of another firm.
I Introduction
i)Flexibility is the ability to adapt when confronted with the new circumstances.
ii)Flexibility provides the organisation with the ability to adapt to change and
respond quickly to market forces and uncertainty in its environment
iii)Technology changes the pace of work i.e in general technology speeds up the pace
of work and increases the capacity of the organization to process information.
iv)For example – technology has made it faster to search a library book catalogue, to
communicate with someone at a remote location and to perform a number of tasks.
v)Technology also alter time and space boundaries for work, for example – using
electronicmail and computer conferencing- colleagues working on a project do not have
to be in the same physical location.
vii) Thus organization can increase its ability to respond to customers, competitors and
the environment in general.
To describe the above point, here we start with an example which will clearly
explain this point.
i) For several years the airline industry waited for an agreement on a common
reservation.
ii) So, finally United kingdom and Americans began placing terminals
connected to their system in travel agencies.
iii) This move proved to be tremendous benefit for both the agent and the airline
iv) First order impact –
a) was a dramatic increase in the productivity of the travel agent.
b) once the travel agent made a reservation he or she could have the ticket
printed automatically, so effect of this is each employee of the agency would
write more tickets in a day.
c) Another impact is the change in organizational structure and boundaries for
reservation.
d) As enhancement to the system allows agents to issue boarding passes with
tickets.
e) Information technology takes care of the first part of boarding the plane well
before the day of the flight
f) Today many airline systems offer etickets which cost less than $1 whereas
printed ticket costs for $8.
g) Each airline system tried various approaches to using a CRS to increase its own
bookings.
h) A second order impact of the System is a revenue-generating feature. For eg
when an agent using American books a ticket on Northwest, northwest must pay
American a booking fees of about $2.50 to $3.00 per leg.
i) So in short, the airline CRS provide flexibility for the airlines, travel agents and
travelers.
j) Technology has affected the booking of flight and managing of passengers from
reservation to flight completion.
k) So service is speeded up and is more convenient. Eg Security Industry
8.2.7 Conclusions
Above examples show how information technology affects organizations flexibility in two
major industries
9.0 OBJECTIVES
After reading this unit, the student will be able to
Infer the examples of Technology and Strategy
Outline the concept of value chain.
Explain the framework for the strategic use of the IT.
Rephrase the concept of protecting an IT innovation
Summarize the knowledge of Integrating Technology with the Business
Environment.
9.1 INTRODUCTION
1. As technology becomes integrated with strategy, the nature of business
changes.
2. So, technology and strategy are responsible for major changes in the structure
and operations of the organizations.
3. Eg Baxtex laboratories, a firm dedicated to providing hospital supplies and to
helping hospitals m,anage their costs through information technology.
4. A recent poll of more than 200 executives showed that they feel information
technology is key to a competitive edge.
5. This unit discusses how technology can be used to gain a strategic,
competitive advantage.
6. This unit also discusses IT and strategy that manager should use to manage
technology so that it can contribute to corporate strategy.
7. What is competitve strategy?
a. A firm has a competitve advantage when it is able to perform some function
“better” than its competitors.
b. ‘Better’ may mean that it has a superior product, the most efficient
manufacturing process, unique knowledge or some other capability that is
competitors lack.
c. For eg Intel considers its knowledge of how to build and operate a
semiconductor manufacturing plant a competitve advantage.
d. After obtaining a competitve advantage, the firm faces the challenge of
sustaining it as competitors fight back.
9.2 Information Technology and Corporate Strategy
1. A key task of top management is formulating corporate strategy.
2. What opportunities for new directions are available ? what are competitors
doing?
3. The Corporation can dramatically change its strategy by deciding among
competing alternatives for new ventures.
4. IT and strategy became interwined, with each influencing the other.
5. A well managed firm will strive for this kind of integration.
9.2.1 Eg of Technology and strategy
1. Merrill lynch is the largest stock brokerage firm in the united states and plans to
become one of the major financial institution in the world.
2. The firm developed a new financial product called the cash management
account.
3. Now, the small investor, instead of being limited to bank or savings and loan
passbook accounts can take advantage of higher interest rates previously available
only to those with a large amount to invest.
4. The firm decided an account that automatically invested idle cash in merrill
lynch’s own ready assets fund would appeal to its customers.
5. Has it been successful? At first the account was slow to win acceptance, but
today merrill Lynch than a million CMA customers.
6. Other brokerage firms have hired merill lynch employees to develop similar products.
7. Merill Lynch gained a significant competitive advantage with its cash management
account system.
8. Could this system have developed without confidence in information technology.
Infact, this product could never be offered unless a firm hold computer technology and
could manage it.
9. Eg on a Smaller scale, information processing technology made it possible for a new
market research firm to offer a service it could not obtain from its competitors.
10. The firm purchased grocery store point-of-sale scanning equipment and at first,
gave it free to 15 supermarkets in two town selected on the basis of their demographic
makeup.
11.There are 2000 households in each of the two test markets using the scanning
equipment and purchases are recorded on the firm’s computer in chicago.
12.Since each product is marked with the universal product code, researchers can pin
paint a family’s purchases by price, brand and size and then correlate the purchase
information with promotions such as coupons, free samples, price adjustments,
advertising and store displays.
13. For eg Through cooperation with a cable TV network, the firm can target different
TV commercials to selected households and analyze the resulting purchases.
14. The imaginative use of the technology has allowed the firm to gain a competitive
lead over much larger, more well-established market research firms.
Conclusion
The above given examples illustrate how the integration of information-processing
technology with strategy formulation expanded the opportunities for each firm.
5.Right-Sizing- a) In the U.S, the first part of the 1980’s was an economic boom
leading to a number but the early’s 1990’s were marked by economic downturns and
slow growth. b)To compete in a different economy firms have attempted to determine
their right size.c)Blue chip companies such as IBM have reduced their levels of
employment by tens of thousands of workers.
6. Quality -a) Japanese manufacturers gained a large market share in a number of
industries partially through a financial devotion to quality.b)Quality is an obvious
component in the manufacturing sector, but the services firm can also be concerned
about the quality of its output.
9.3.2Protecting an IT innovation
1. Many innovations in IT are virtually impossible to protect from copying.
2. It is difficult to copyright or obtain a patent on application of technology.
3. For eg when fedex established a website to let customers enquire, about the
status if their shipments, united parcel followed with a similar web service within
a month.
4. A strong regime means one can protect an innovation, while weak
appropriability means that others can easily duplicate your innovation.
5. Most IT initiatives seem to have weak appropriability regimes.
6. There are however, some conditions that favor the innovator. For eg if you
have certain complementary assets(resources).
7. When IBM brought out its first personal computer in 1981, it had a strong
complementary organization with contacts in major corporations around the
world.
8. A good example of a cospecialized asset is the relationship between
microsoft’s Internet explorer and windows 98.
9. The explorer depends on windows since it must run on a computer controlled
by this operating system, as the explorer interface becomes a part of a windows,
the operating system develops a dependence on this browser.
10. There may be ways to use the technology, itself to strengthen your regime of
appropriability.
11. Merrill Lynch has many imitators infact the “Sweep account” is very common
in the investment business.
12. However, no one has been able to overtake Merrill Lynch’s lead, it has by far
the largest number of cash management accounts of any other brokerage firm.
13. United and American airlines have more than 70 percent of the domestic
market for reservation systems in travel agencies.
14. These firms, had the resources to make large investments in technology and
for developing skilled staff members who could implement reservation systems.
15. Apollo and Sabre today are travel supermarkets that would be extremely
difficult and expensive to imitate.
16. By continuously investing in technology and managing it well, these two
airlines and vendors of potential reservation systems.
17. A Successful strategic applications such as the classic American hospital
supply/ Baxter health care order entry system demonstrate continuous
innovation.
18. A final approach to sustaining an advantage is to create high switching costs.
19. By making it very expensive or inconvenient to switch a customer’s business
to a competitor, one can assured that customers will continue to do business with
your company.
20. When planning and developing a strategy think about the kinds of resources
you to provide an advantage and the difficulties of protecting an IT innovation.
9.3.3 Eg Technology for competitive advantage
1. Clemons and Row (1991) describe how a small travel agency expanded to a
nationwide business through the use of IT.
2. Rosenbluth travel, headquartered in philadelphia grew from $40 million in
sales in 1980 to $1.3 billion in 1990.
3. It is now one of the five largest travel management companies in the united
states and has more than 400 offices.
4. The firm has used technology to help manage the complexity of modern travel
and to obtain economies of scale.
5. Rosenbluth created a technology base that is extremely difficult for a new
entrant or even a competitor to match.
6. The travel agent, however could be expected to help the client without a bias
toward a particular airline. By 1985 travel agencies were distributing more than
80 percent of airtickets.
7. One of Rosenbluth’s major business focuses has been the corporate travel
market.
8. The following list of critical technology moves by Rosenbluth illustrates how
the firm has used IT for expanding its business.
8.1 1981- The firm experimental with processing data from airline computerized
reservation system (CRS) to provide information for corporate accounts.
8.2 1983- Rosenbluth introduced a product called readout that listed flights by fare
instead of by time of departure.
8.3 1986- Rosenbluth created vision system which is flexible as it keeps client’s
records of transactions done at the time of ticketing regardless of the location of the
agency or the CRS in use.
A. The vision system was more flexible and produced reports about two months
earlier than agencies using only the airline CRS.
B. Rosenbluth used VISION to negotiate special fares with the airlines on heavily
traveled routes the system identified.
C. Rosenbluth tried to create a cooperative relationship with clients.
D. They promised with clients to reduce overall travel costs through lower fares and
used VISION reports to document the savings.
E. 1988-Rosenbluth used a new feature in united’s Appollo reservation system to
support intelligent workstations.
F. Precision, the new rosenbluth system, made client and individual the database of
flights listed by increasing fares were made available to the booking agent.
G. During 1990-91 rosenbluth begin installing user vision in its offices. This system
lets the user make flexible queries about corporate travel.
H. These initiatives were part of a tremendous growth period as Rosenbluth’s sales
increased from $400 million in 1987 to $1.3 billion in 1990.
I. The firm has been extremely successful as firm uses technology and strategy to
compete with competitors.
Questions
Q1. Locate an article in the popular business press about the strategy of a corporation.
De-scribe the interrelationship between technology and the strategy of the firm.
Comparetwo firms and note the differences.
Q2. Why did most firms first develop systems to improve operational efficiency?
Q3. How can a firm sustain a competitive advantage?
Q4. What is the first mover advantage? Give an example of a firm that has achieved
such an advantage.
Q5. How can users evaluate the quality of service from an information services
department?
Q6. What are the characteristics of a resource that helps a firm obtain a competitive
advantage?
Q7. What structural features of the organization influence the structure of the
information services department in the firm?
Q8. What are regimes of appropriability? How do they apply to IT innovations?
Q9. Why do you think firms might have trouble simultaneously following more than one
or two of the generic strategies described in this chapter?
Q10. How does strategic planning differ between a firm that offers services and one that
manufactures a product? Is there a difference in the impact of technology on strategy in
the two types of firms?
Q11. How can management assess the probable information-processing technology
available over the next five years?
Q12. What criteria are the most important for an organization in choosing among
competing
alternatives for a particular application?
Q13. Why should the decision of what applications to undertake not be left to the
manager of
the information services department?
Q14. What do you think the role of top management should be in the design of a
specific information system?
Unit 4 (Chapter 10)
INTEGRATING TECHNOLOGY WITH THE BUSINESS ENVIRONMENT
10.0 Objectives
10.1 Introduction
10.2 Integrating Technology with Business Environment
10.3Managing Information Technology
10.3.1A vision of the organization and Technology
10.3.2Technology for structuring the organization
10.3.3Integrating Technology and Decision Making
10.3.4A corporate plan for strategy Alliances and Partnerships
10.3.5 New IT initiatives
10.3.6 IT Infrastructure
10.3.8 Ongoing Management of IT
10.0 OBJECTIVES
After reading this unit, the student will able to,
List the different ways of Managing Information Technology.
Compare and contrast between the different ways of managing infomation
technology.
Illustrate the concept of Integrating Technology with Business Environment
Infer the new It initiatives.
10.1 INTRODUCTION
1. One of the most significant management challenges during the coming decade
will be to integrate business and technology.
2. Instead managers must consider how technology affects their decisions and
how their decisions affect the technology.
3. Figure given below describes how a manager can integrate technology with
decision making.
4. First, the manager has to search for new technology to help create new
business opportunities.
5. These opportunities combined with the technology itself, lead to new
development projects.
6. The development projects are influenced by technological constraints.
7. The firm cannot undertake a new marketing program in which customers
inquire about their orders from the internet if the firm lacks the skills to set up a
home page on the world wide web and integrate the page with its existing order
entry system.
8. The box at the bottom of the figure represents decision making, planning and
execution of decisions.
9. Technological constraints and opportunities influence these decision making,
planning and execution of decisions.
10. Management’s decision influence how it manages the existing business and
technology.
11. A decision to undertake a major factory automation project will result in a
different type of production process to manage.
12. Successful managers must be able to integrate their knowledge of
information technology and their business knowledge in making decisions.
13. The manager should be aware of the opportunities provided by the
technology and the constraints that already exist for the firm in developing new
technologies.
14. The manager should also recognize that as decisions are made, the
alternative chosen will have an impact on technology and its development within
the firm.
15. Eg Autozip sells acessories for cars through a chain of stores on the west
coast.Customers like the convenience of calling a toll-free number and having
the parts they order delivered via UPS or an overnight carrier such as federal
express.
16. The president of Autozip realizes that the firm needs to have a presence on
the Internet.
17. He is trying to decide whether to accept a orders on the web and if so how.
18. The president has to make a decision
18.1 Autozip accept orders on the web
18.2 If so,how ? should it go to a firm that hosts web market places, buy
software and set up its own site or develop its own software.
Questions
Q1 Some senior executives feel that they do not receive a return on their investments
in technology. What factors might account for this feeling? Do you think they are right?
Q2. It has been said that problems with information technology start at the top of the
organization. What does this mean? Do you agree or disagree? Why?
Why do priorities have to be set for new uses of IT?
Q3. What are specialized and cospecialized assets? How do they apply to sustaining an
advantage with technology?
Q4. What strategies did American and United airlines follow to enhance and sustain the
advantage provided by their reservations systems?
Q5.. What actions can management take if information technology activities seem to be
out of control?
Q6.What is the role of external expertise in the development of a strategy for
information technology?
22. What should a vision for a firm include?
Unit – 5
Chapter 11
___________________________________________________________________
Objective
___________________________________________________________________
Information technology is an important tool in making business transformation and in
designing the international organization. Even a one-person company can have
worldwide sales through the Internet. Globalization has been one of the major trends in
business in the last decade. The European Economic Community (EEC) has eliminated
almost all barriers to trade and has adopted a common currency, the Euro.
Globalization can greatly complicate the task of managing IT in a firm.
___________________________________________________________________
THE IMPACT OF GLOBALIZATION ON BUSINESS
___________________________________________________________________
• Rationalized manufacturing :
Firms manufacture in locations with a comparative advantage for the type of
manufacturing involved.
• Worldwide purchasing:
Firms can purchase worldwide for their operations, giving them a great deal of leverage
over suppliers.
• Subsidizing markets:
The profits from one country can be used to subsidize operations in another.
One conclusion from the above list is that global business creates greater uncertainty
and complexity. To handle these challenges, the firm will need faster communications
and information processing. It will have to rely more on IT to manage the organization.
___________________________________________________________________
INTERNATIONAL BUSINESS AND IT TECHNOLOGIES
___________________________________________________________________
Important ways in which technology is facilitating International Business are as follows:
Technology is beneficial to international business. It may be stated that lowering of
trade barriers has made globalization of markets and production a theoretical
possibility, technology has made it a practical reality.
Technology is facilitating international business in at least six ways, which are as
follows:
1) Telecommunications:
2) Transportation:
3) Globalization of Production:
4) Globalization of Markets:
Along with the globalization of production, technological innovations have facilitated the
inter-nationalization of markets. As stated earlier, containerization has made it more
economical to transport goods over long distances, thereby creating global markets.
Low-cost global communications networks such as the World Wide Web are helping to
create electronic global marketplaces. In addition, low-cost jet travel has resulted in the
mass movement of people around the world. This has reduced the cultural distance
between the countries and is bringing about convergence of consumer tastes and
preferences. At the same time, global communications networks and global media are
creating a worldwide culture. Worldwide culture is creating a world market for consumer
goods. As a signs of a global market we can see it is now easy to find a McDonald’s
restaurant in Tokyo as it is in New York, and in Mumbai.
5) E-Commerce:
The Internet and the access gained to the World Wide Web have revolutionized
international marketing practices. Firms ranging from a few employees to large
multinationals have realized the potential of marketing globally online and so have
developed the facility to buy and sell their products and services online to the world.
Because of the low entry costs of the Internet it has permitted firms with low capital
resources to become global marketers, in some cases overnight. For all companies, the
implications of being able to market goods and services online have been far reaching.
The Internet has led to an explosion of information to consumers, giving them the
potential to source products from the cheapest supplier in the world. This has led to the
increasing standardization of prices across borders or, atleast, to the narrowing of price
differentials as consumers become more aware of prices in different countries and buy
a whole range of products via the net.
In B2C marketing this has been most dramatically seen in the purchase of such things
as flights, holidays, CDs and books. The Internet, by connecting end- users and
producers directly, has reduced the importance of traditional intermediaries in
international marketing (i.e., agents and distributors) as more companies have built the
online capability to deal directly with their customers, particularly in B2B marketing.
6) Technology Transfer:
Technology transfer is a process that permits the flow of technology from a source to a
receiver. The source in this case is the owner or holder of the knowledge, while the
recipient is the beneficiary of such knowledge. The source could be an individual, a
company, or a country.
___________________________________________________________________
INTERNATIONAL BUSINESS STRATEGIES
___________________________________________________________________
There are four major types of international business strategies as shown in below
Figure (Bartlett and Ghoshal, 1989).
1. Multinational
2. Global
3. International
4. Transnational
Global
➔ A global strategy stresses efficiency because there is strong central control from
headquarters.
➔ Economies come from standard product designs and global manufacturing.
➔ An extensive communications and control system is necessary to centrally
manage the global firm.
International
➔ The international strategy is much like the multinational as there are autonomous
local subsidiaries.
➔ However, these subsidiaries are very dependent on headquarters for new
processes and products.
➔ Example is a pharmaceutical company.
The research labs in the headquarters company develop products for
introduction around the world. Local subsidiaries stress product approval by local
governments and local marketing.
Transnational
Chapter 12
___________________________________________________________________
OBJECTIVE
___________________________________________________________________
We will discuss different key issues in the international environment like the need of
information, sharing of information globally , and implementation of IT internationally.
We will also discuss on What the manager can do to solve the problems raised above.
Some of these impediments to IT require political action or deregulation, for example,
the policies of foreign PTT utilities. In other instances, management has to take action
to solve problems, and managers have to be involved in efforts to develop systems that
will be used in multiple countries. It is management that has to sell its vision for the
firm's global technological infrastructure and resolve conflicts over IT requirements.
___________________________________________________________________
KEY ISSUES IN AN INTERNATIONAL ENVIRONMENT
___________________________________________________________________
Information Needs
Implementing International IT
The ultimate objective for the global firm is to process data anyplace in the world and
share information on any type of platform used for processing.
The following section outlines some of the typical problems faced by a manager of a
global organization.
1) The first problem is managing local development when the foreign unit does not
coordinate with headquarters. The foreign subsidiary may be duplicating
development efforts under way in other parts of the world. It also may not have a
talented staff and may end up with poorly conceived and designed systems. The
question of headquarters-subsidiary coordination and management is a central
one in pursuing an international corporate strategy.
2) The local company knows the needs in its location. A distant headquarters unit
cannot set specifications for foreign countries. This contention leads to the
second development issue: Different countries have different laws and
regulations, so it may be impossible to share programs among foreign locations
without making special modifications for unique requirements in each country.
3) The third development problem is that when designing applications, there are
real and perceived unique features in each country. Designers, especially those
representing headquarters, must recognize what features are required for a
system to work in a country and what features are there as an exercise in local
independence. The cultural differences predisposed managers in each country to
a choice of communications vehicles.
4) Managers must also be aware that more and more firms want to build a
worldwide communications network to take advantage of communications and
coordination tools to move data freely around the world.
Certain countries regulate the kind of telecommunications equipment that can be
used on their network. In a number of foreign countries, PTT (postal,
telegraph,and telephone) monopolies regulate communications and may restrict
the ability to transmit data.
Some underdeveloped countries may not have adequate communications
capabilities to support private networks. Countries also may prohibit importing
certain kinds of computer equipment in order to protect domestic competitors.
Different kinds of communications networks and standards can greatly increase
the difficulty and cost of building worldwide communications capabilities. One of
the most attractive features of the Internet is that it has open standards and a
presence in almost all countries.
5) It is pervasive in Asia and the West and has much less penetration of Africa and
the Middle East (except Israel).
As with any international venture, language and cultural differences can also present a
challenge to developing IT on a global scale. Time differences can make
communication difficult for different parts of the world, though fax and e-mail have
eased this problem considerably. Some firms stress joint development teams with
representatives from different countries to avoid problems stemming from developing a
system in any one country or language. Foreign subsidiaries may be more willing to
adopt an international system developed by a cross-cultural team.
___________________________________________________________________
MANAGING INFORMATION TECHNOLOGY INTERNATIONALLY
___________________________________________________________________
Roche (1992) presents a number of strategies for managing information technology in a
global environment.
➔ The strategy of creating linkages with suppliers and customers can be extremely
effective internationally.
➔ It can also be very difficult to set up these linkages because of differing
telecommunications capabilities in different countries.
➔ In some regions phone systems do not work well and transmitting data over them
is probably not viable.
➔ Other countries, like France, have an extremely well-developed infrastructure for
business communication, which is discussed later in this section.
➔ The Internet is one solution for quickly establishing these linkages.
➔ There are problems managing IT development projects when all participants are
from the same country and work in the same location.
➔ Coordinating multinational project teams presents an even greater challenge.
➔ Language and distance make them difficult to coordinate.
➔ A New York bank has a development team with members in New York,
Lexington, Massachusetts, and Ireland coordinated through groupware.
➔ In some foreign countries, hiring staff with the appropriate skills to work on
technology can be difficult.
➔ Interviews with IT managers for multinationals in seven countries found dramatic
differences in their accomplishments and their capabilities.
➔ Lack of personal skills can be a major impediment to developing international
systems; not all countries have educational programs to prepare individuals for
systems analysis or programming jobs.
Build an Infrastructure
➔ The trend toward deregulation in the U.S. is also sweeping foreign countries.
➔ France has split France Telecom from the PTT and established it as a quasi-
public organization.
➔ In the past two decades, France Telecom has replaced an outmoded phone
system and added a mass market communications network called the Minitel
system.
➔ It is also a leader in providing packet-switched data communications through
Transpac.
➔ Changes such as these facilitate the development of the international
communications networks, which is essential to managing in a global
environment.
➔ We can add another important strategy to Roche's list: You need to develop
guidelines for when a system should be shared and when a local, autonomous
system is more appropriate. The obvious advantages of shared systems are
economies of scale and the ability to share data.
➔ The problem with shared systems is that they tend to become very large and
complex. Also, individual locations and users have special needs that must be
incorporated into the system.
➔ As the number of exceptions increases, the system becomes more cumbersome
and
difficult to program.
➔ The advantage of a local system is that it can often be developed quickly in
response to a local condition.
➔ If it later becomes necessary to coordinate this system with other applications,
special interfaces will have to be created.
➔ If each location ends up needing a similar system and cannot share this one, the
firm has paid from many systems when possibly one would have sufficed.
➔ There are no firm guidelines for making this kind of decision.
➔ Firms have had success and failure with both approaches.
➔ Systems development in an international environment (or even a domestic one
where there are many locations) leads to this problem.
➔ Management has to recognize that the problem exists and compare the
alternative of local versus global, shared systems.
___________________________________________________________________
Answer the following:
___________________________________________________________________
1. What are the risks of a global IT strategy? What are its benefits?
2. What impediments do you see to worldwide networks for coordinating the
activities of global firms? What is the role of the Internet in this process?
3. How can an international firm see that local staff members have enough
expertise to develop and apply IT?
4. What are the problems of establishing common data elements in a global
organization?
5. Why does a firm need common data elements and structures?
6. How can IT help coordinate a global firm? Where can it help save money while
making the firm more responsive?
7. Roche (1992) advocated a number of interorganizational linkages in conducting
international business. What problems do you see in connecting a global firm to
its many customers in different countries?
8. What kind of business activities do you think are most amenable to common
systems in different countries?
9. What are the advantages of making product design information available around
the world? How might you use this capability to organize product development?
10. If company management or custom dictates a fairly independent and
autonomous IT effort in subsidiaries, what approaches can management take to
coordinate these activities?
11. What Internet access policies would you recommend to the government of a
developing country?
UNIT – 5
Chapter 13
___________________________________________________________________
OBJECTIVE
___________________________________________________________________
At its base level, IT governance is one or multiple processes that enable the IT staff to
better manage risk and operate at its most efficient to the benefit of the organization on
the whole. IT governance is a process that works coordly with corporate governance.
Corporate governance is its own collection of processes that are designed to keep the
entire corporation effective and efficient.
IT governance is all about managing performance for efficiency. IT governance is a
compound of a lot of things. Having evolved from many other methods, IT governance
has taken pieces of its methodology from:
The main three desired outcomes from implementing IT governance in any given
organization is typically to:
1. Ensure business value is generated by information and technology
2. Oversee the performance of IT managers
3. Assess risks associated with the IT department and mitigate as needed
● IT Management:
➔ It is not similar to IT governance.
➔ IT management is about how IT resources are leveraged from a planning,
organizing and directing perspective.
➔ This is different from IT governance in that IT governance is all about
uncovering what an organization can really achieve when it uses its IT
resources effectively.
● IT Compliance:
➔ Compliance in the IT world can mean creating an adequate defense
process which manages both the management of the compliance process
as well as the integrity of the compliance system.
➔ Therefore, IT compliance revolves around taking control of protecting
personal or private information, including how it’s kept, stored or shared.
● IT Controls:
These are specific tasks performed by IT staff to ensure that business objectives
are kept top-of-mind.
IT Governance Framework:
● COBIT:
This is by far the most popular framework out there.
It gives staff a reference of 37 IT processes, with each process defined with
process inputs and outputs, objectives, methods to measure performance and
more.
● AS8015-2005:
A technical standard developed in Australia and published in 2005, this
framework is a 12-page framework that includes six principles for effective IT
governance.
● ISO/IEC 38500:2015:
This framework aims to assist those at the top of the organization to better grasp
their legal and ethical obligations when it comes to their company’s use of IT.
● ITIL:
Stands for Information Technology Infrastructure Library, this framework includes
five management best practices from strategy to design that aims to ensure that
IT supports core business operations.
● COSO:
From the Committee of Sponsoring Organizations of the Treadway Commission,
this framework focuses on more general and less IT-focused processes, with an
emphasis on enterprise risk management and fraud deterrence.
● CMMI:
Also known as the Capability Maturity Model Integration framework, this process
uses a scale of 1 to 5 to better understand how the organization is performing
and maturing over time.
● FAIR:
Also known as the Factor Analysis of Information Risk, this framework has an
emphasis on cyber security and risk assessment, with an ultimate goal of making
better informed decisions.
There are many more IT governance frameworks that offer both a full and partial view of
IT governance processes that can be useful when it comes to the application of a solid
and effective IT governance process.
Benefits of IT Governance:
IT managers and system administrators know technology like the back of their hand.
They work with it day in, and day out and keep up with the latest trends at all times. So,
to the administrator, it might seem like adding in an IT governance process is an extra
step added to their busy days.
However, there are many benefits to IT governance, including:
● Showing that you have taken the extra step to implement an IT governance plan
gives stakeholders,partners and customers added assurance that you mean
business.
● Controlling your risks doesn’t come automatically. It has to be studied in a
working environment where a standard, replicable process has been
implemented. IT governance helps track risks in a controlled experiment
environment.
● Ensure your company is meeting rules and regulations around compliance, so
you can reduce risk and eliminate liability.
● Better align your IT department with the company’s overall business objectives,
so they can prioritize their projects better.
● Better measure performance for your IT department and optimize their
processes, so they don’t have to waste time on clunky processes that had
previously been in place.
___________________________________________________________________
Internet Governance
___________________________________________________________________
● Internet governance refers to the rules, policies, standards and practices that
coordinate and shape global cyberspace.
● The Internet is a vast network of independently-managed networks, woven
together by globally standardized data communication protocols primarily like
Internet Protocol, TCP, UDP, DNS and BGP.
● The common adoption and use of these protocols unified the world of information
and communications like never before.
● Millions of digital devices and massive amounts of data, software applications,
and electronic services became compatible and interoperable.
● The Internet created a new environment, a complex and dynamic “cyberspace.”
● While Internet connectivity generated innovative new services, capabilities and
unprecedented forms of sharing and cooperation, it also created new forms of
crime, abuse, surveillance and social conflict.
● Internet governance is the process whereby cyberspace participants resolve
conflicts over these problems and develop a workable order.
● It is the development and application of shared principles, norms, rules, decision-
making procedures, and programs that shape the evolution and use of the
Internet.
● Internet governance should not be confused with e-governance, which refers to
governments' use of technology to carry out their governing duties.
● If Internet Governance is done properly, the internet can remain a great motor for
the future of humankind and its social and economic development. We need to
give people access to their own personal data that's held by the companies, as
well as the data produced by the government, paid by us, in the form of taxes.
● The importance of IT governance is that it achieves desired outcomes and
behavior. The relationship between IT governance and effective value creation
of IT investments has long been recognized and is cited as the reason for
achieving excellence in the management of IT.
● The Internet Governance Forum (IGF) is a multi-stakeholder community that
discusses a broad range of Internet issues, and seeks to identify possible
shared solutions to current challenges.
● The governing body of the Internet is actually the Internet Corporation for
Assigned Names and Numbers (ICANN), a Los Angeles based independent
body. On March 14, the National Telecommunications and Information
Administration (NTIA), an arm of the Commerce Department, announced that it
would sever its contract with ICANN.
___________________________________________________________________
E-governance
___________________________________________________________________
1. Government-to-Citizen(G2C)
The Government-to-citizen refers to the government services that are accessed by the
familiar people. And Most of the government services fall under G2C. The primary goal
of Government-to-citizen is to provide facilities to the citizens. It helps the ordinary
people to reduce the time and cost to conduct a transaction. A citizen can have access
to the services anytime from anywhere.
Example:
1. Many services like license renewals, and paying tax are essential in G2C.
2. Likewise, spending the administrative fee online is also possible due to G2C.
3. The facility of Government-to-Citizen enables the ordinary citizen to overcome
time limitations.
4. It also focuses on geographic land barriers.
2. Government-to-business (G2B)
3. Government-to-Government (G2G)
The Government-to-Government refers to the interaction between different government
department, organizations, and agencies. This increases the efficiency of government
processes. In G2G, government agencies can share the same database using online
communication. The government departments can work together. This service can
increase international diplomacy and relations.
In conclusion, G2G services can be at the local level or the international level. It can
communicate with the global government and local government as well. Likewise, it
provides safe and secure inter-relationship between domestic or foreign governments.
G2G constructs a universal database for all member states to enhance service.
4. Government-to-Employee (G2E)
e-Government is a means to accomplish these broader social goals, goals that move
beyond mere efficiency of government processes to that of overall reform and
development.
The goal of e-government is to enhance the interaction between three main actors in
society—government, citizens and business—in order to stimulate political, social and
economic progress in the country.
In India, the National e-Governance Plan (NeGP) is an initiative to make all government
services available to the citizens of India via electronic media.This is an enabler of
Digital India initiative, and UMANG (Unified Mobile Application for New-age
Governance) in turn is an enabler of NeGP.
___________________________________________________________________
Internal IT processes
___________________________________________________________________
IT processes are the number one source of issues more so than technology. To
manage your IT organization, you need to ensure that procedures, tools, roles, and
reporting are well planned, deployed, and managed for the following elements of the IT
Process domain: IT process architecture and IT value management.
___________________________________________________________________
Answer the following :
___________________________________________________________________
1. What is E-Governance? Explain 4 types depending on the specific types of
services.
2. Explain IT governance in detail.
3. Which are the key terms of IT governance?
4. Which are the goals of E-governance?
Unit – 6
Chapter 14
Information Technology Issues For Management
___________________________________________________________________
OBJECTIVE
___________________________________________________________________
According to surveys, CEOs want their IS departments to produce fast and flexible
systems that serve the customers effectively and increase markets.
To do cost cutting, the majority of CEOs outsource 50% of their IT services.
Although they are not satisfied by the outcomes of this practice of outsourcing, which is
a serious problem given the huge amounts of capital invested in technology.
● In a monarchy, the CIO becomes the CIC, the chief information czar.
● Instead of playing the consultant role, the CIO establishes and enforces
standards that will be followed throughout the corporation.
● The monarchy often emerges when the finn finds that it has suffered too long
from the feudal model.
● A possible halfway point between feudalism and a monarchy is a constitutional
monarchy, in which a document sets out the powers reserved to senior
management and those that fall to the divisions.
● The increased importance of IT to the firm has led to the creation of a chief
information officer (CIO) position.
● However, the chief information officer is also an influential member of senior
management and is usually a vice president or senior vice president in the firm.
● CIO is responsible for traditional information processing, voice and data
communications and office technology.
● The job demands someone who can assume a role in planning, influencing other
senior managers, and organizing information activities in the organization.
● CIO must provide leadership and control over processing.
● It is important that planning, systems development, and operations are all
undertaken successfully.
● Earl and Feeny (1994) describe ways in which CIOs should try to add value to
their organizations. They found two types of CEOs, those who see IT as a
strategic resource and those who see it as a cost.
● Following Table presents various issues in managing IT as seen by CEOs in
these different positions.
PERCEPTIONS OF IT
What is the CEO's The CEO sees a limited The CEO sees IT as
vision for the role role for IT within the having a role in the
of IT? business. transformation of the
business.
What do we expect The CIO is positioned The CIO is valued as a
of the CIO? as a specialist contributor to
functional manager. business thinking and
business
operations.
● Earl and Feeny argue that the CIa must find a way to add value to the
corporation from its use of IT so the CEO will view IT as an asset.
● It appears the most successful approach to obtaining benefits from IT is not to
identify separate IT and business strategies; rather, business strategy subsumes
IT strategy.
● The job of the cra is to build relationships with other functional managers so IT
requirements become a part of business strategy.
● This approach means the CIa has to be involved in planning and strategy
meetings across the company.
● To provide confidence in technology, the CIa must build a track record of
delivering IT as promised, on time and within budget.
● Rather than scattering the development effort, a well-run company focuses its IT
efforts on opportunities and areas where the firm is weak.
● The task of the CIa here is to determine not how to use IT, but rather where it
should be used to most benefit the organization.
● The CIa has to be a promoter, marketing the potential of IT to transform the
organization.
Following summarizes the characteristics Earl and Feeny found among CIas for firms
that considered IT to be an asset rather than a liability :
CIa can add value by finding new business opportunities for the company and using
technology to conduct business in new ways.
The company manages IT in a federal structure so he takes responsibility for
infrastructure like a worldwide network.
IT managers in each division develop systems for their divisions and worry about the
day-to-day operation of their systems.
Most organizations are content to have a central group provide and maintain
infrastructure, the underlying network of computers and communications networks, for
the firm.
The role of a central group in developing applications of technology varies among
organizations as discussed earlier in the chapter.
A firm can decentralize and leave applications development to users, it may centralize
this activity, or it may adopt a combination approach in which the central group consults
with users who undertake their own development projects.
● One task of a CIO is to be sure there is a vision in the firm for what IT can
accomplish and a plan to provide a guideline for management decisions about
technology.
● A vision is a general statement of what the organization is trying to become, it
also describes, possibly in scenario form, the environment seen by a user.
● A vision might include a statement about the kind of technology architecture the
firm hopes to provide, say, a client-server environment and a global network for
communications.
● The vision needs to be sufficiently compelling that it creates enthusiasm for the
plan to achieve it.
● Corporate and IT strategic planning should be part of one planning effort. The IT
plan expands the IT component of the strategic business plan and describes how
to execute the agreed-upon strategy.
● This plan must combine the vision of IT with strategy to produce a document that
guides IT decision making.
● The vision and strategy provide the goals for an IT plan that will describe how to
achieve them.
● A key role of the plan is to identify the most important new applications of
technology and prioritize them.
● It is important to focus efforts on applications that contribute to achieving the
vision and strategy of the company.
● The plan would describe each of these projects in some detail including cost,
time, and staff requirements for completion.
● If management decides it wants to undertake more applications than there is staff
available, some of the development will have to be outsourced.
● Having a plan makes managing IT requests easier for the CIa and for
management in general.
● A well-prepared plan can create enthusiasm for IT, focus the technology effort on
business imperatives as suggested above, and help manage and evaluate
technology.
● The plan is a fundamental management tool for seeing that IT makes the
maximum contribution to the organization.
● A plan developed by a CIa alone will probably not be acceptable to other
managers.
● The CIa should act as a resource, consultant, and tutor for the planning
committee. The idea is for technology not to be a separate plan, but to be
integrated, and to some extent subsumed, in a corporate plan.
• Executive summary
• Goals-general and specific
• Assumptions
• Scenario-information processing environment
• Applications areas-status, cost, schedule, priorities
• Operations
• Maintenance and enhancements
• Organizational structure-pattern of computing
• Effect of plan on the organization-financial impact
• Implementation-risks, obstacles
Outsourcing as a Strategy
Outsourcing involves turning over responsibility for some part of a firm's technology
effort to an external company. In addition to obtaining services like systems integration
for developing a specific application,a firm can outsource all or part of its IT effort.
Loh and Venkatraman (1992) have identified some of the factors that lead a firm
to outsource:
• A firm that feels it is spending more on technology than it should may adopt
outsourcing if it feels this option provides a lower cost alternative than internal
management.
Outsourcing may be seen as a way to reduce IT related costs in general.
• A firm with a high-debt structure may not wish to invest in technology. It may view
outsourcing as a way to lease technology instead of buying it.
• An organization may feel its IT function is not performing adequately. Outsourcing can
be a way to arrange for a more professional and better performing IT operation in the
company.
• The organization is interested in technology transfer from the expert outsourcing firm.
It will learn from the outsourcer.
• A firm may outsource "commodity" processing to free its staff to develop new
applications of technology.
The outsourcing firm must have a high level of expertise in technology. This firm should
also be able to create economies of scale.
For example, the telecommunications outsourcer can probably provide network services
for a number of clients with a smaller staff than the sum of the networking staffs of its
clients.
The outsourcing firm may have a high-cost structure because of its need to employ
highly skilled personnel. The need to have a contract with the outsourcing firm can lead
to conflict and misunderstandings.
The biggest deterrent to outsourcing is the question of control.
Lacity and Hirschheim (1993) studied a number of firms that outsourced. Their criticism
of outsourcing provides a cautionary note.
Their study identified two myths of outsourcing.
The outsourcing vendor cannot be a partner because the outsorcerer's profit motive is
not shared by the customer. The outsourcer makes more money if it is able to charge
the customer higher fees. If the outsourcer can reduce service levels and collect the
same fees, that also contributes to its profit margins.
The outsorcerer's argument here is that economies of scale help it to be more efficient.
It is possible that the outsourcer can do some tasks more efficiently because it has done
them before or because it can afford to share highly paid specialists among a number of
clients.
An outsourcing agreement will probably extend for a number of years in order to justify
the transition effort involved. Since an agreement may be for five or ten years, the
contract must be highly flexible. Business conditions and technology are expected to
change during the life of the agreement.
Most firms have a product or service to offer, and the technology helps them accomplish
the mission of the organization. Overall in the United States, the Department of
Commerce estimates that 45 percent of capital investment is for information technology.
The question looks at IT as a cost and as an investment.
Each investment has a different probability of producing the benefits anticipated from
the IT innovation.
Estimating Value
There are two capital budgeting techniques that have been used or proposed for
making IT investment decisions.
1. The first is the well known net present value approach or NPV, which figures out
the net present value of income and expenses using the firm's cost of capital,
and compares the two to see if the result is positive or negative. A project with a
positive NPV returns a value in excess of the firm's cost of capital.
• You can use information technology to transform the organization. IT design variables
let you develop entirely new structures like the T-Form organization.
• Senior management needs a vision of how technology can be used in the firm.
• There are a number of different structures for managing IT. Today the federal structure
is probably the most popular in a large organization.
• Managers determine what level of support to provide users working with technology,
and how much time users should spend developing applications themselves.
• Managers are in the business of change. Nowhere is change more evident than in
implementing new technology and using IT to redesign organizations.
___________________________________________________________________
THE CHANGING WORLD OF INFORMATION
___________________________________________________________________
___________________________________________________________________
ACTION PLAN
___________________________________________________________________
One of the most exciting attributes of modern technology is your ability to use it in
designing innovative and highly effective organizations. You can use this technology to
design components of an organization or to structure an entirely new type of
organization.
• The most likely outcome from using these variables will be a flat organizational
structure with decentralized decision making. The firm will use electronic
communications and linking, as well as electronic customer-supplier relationships to
form alliances with other firms.
Develop a plan for how to use information technology. The plan should include:
➔ Plan for hardware-software architecture for your unit given the constraints of the
corporation, that is, what technology already exists.
➔ Plan for the evolution of a network that forms the backbone of your technology.
➔ Invest in infrastructure.
➔ Investigate the use of standards to facilitate connection and interorganizational
systems.
➔ Support users in your unit and encourage them to work with the technology.
➔ Develop mechanisms for allocating resources to IT.
➔ Encourage innovation and reward it.
Manage systems development.
➔ See that design teams are formed for new projects.
➔ Participate in the design process.
➔ Be sure you understand what IT applications will do.
➔ Review and monitor development projects.
Be a user of technology.
___________________________________________________________________
Answer the following:
___________________________________________________________________
___________________________________________________________________
Objectives
___________________________________________________________________
We will discuss Social Responsibilities and societal implication with respect to
technology which affects various aspects of society.
To know more about a professional code of conduct for computer professionals
developed by the Association for Computing Machinery, a society of individuals
who teach and work in the field.
Discuss Kallman and Grillo (1993) suggest several informal guidelines for ethical
behavior
Learn the future with IT
___________________________________________________________________
Introduction
___________________________________________________________________
The result of any action or event on society or part of society is known as social
implications.It can also be described as a law or a protocol or a set of rules or policy
which need to follow for taking certain actions.
Development in technology and its impact on society go hand in hand. Poor
implementation will give adverse results on society like pollution which caused a serious
threat to the whole environment. The objective of technology is to make the current
working environment easier to manage and achieve to complete the task effortlessly
and effectively.
The government in developing countries focused on the change and started adopting
the Internet to their business in a restricted way to avoid openness associated with
democratic, postindustrial societies.Information technology has an impact beyond any
one organization. A user of systems may be affected directly as a member of an
organization or indirectly as a citizen.
In this chapter, we discuss some of the social responsibilities associated with
information systems. We also look at the future of the technology to understand better
how to prepare for it today.
___________________________________________________________________
Social Responsibilities
___________________________________________________________________
● Social responsibility is an ethical framework for any organization or citizen.
● It implements for the benefit of society.
● A vital role is played by the government for implementation of social responsibility
to endorse ethical, social and environment friendly actions or events by an entity,
be it an organization or individuals.
Piracy
On October 19 and 20, 1987, the stock market “meltdown". As per investigations
of this market collapse, the blame is put on investment and trading strategies
that are possible only because of computers. One strategy, called portfolio
insurance, involves the sale of futures to offset a falling stock market. In addition,
the insurer sells stock while the market is falling,thus contributing to a decline in
the price of stock.
➔ These strategies require computers to perform calculations and alert the trader or
to actually send trades to brokers.
➔ Computerized trading systems at the New York Stock Exchange help the
arbitrageur, who must simultaneously trade stocks and futures before a price
change eliminates an arbitrage opportunity.
➔ The end result of investigations into the crash was a series of "circuit breakers":
➔ When different averages move by a certain amount, trading is halted for some
period of time to allow the market to adjust.
➔ There are concerns that technology contributed to a lack of stability in the
market, and this may discourage individual investors from investing.
➔ However, even with these concerns, stock exchanges are moving to develop
electronic markets and sometimes closing the comparable physical exchange.
➔ There are thousands of individuals exchanging financial instruments in on-line
markets through the Internet.
➔ Electronic brokers have experienced tremendous growth, accounting for 35
percent of retail stock trades.
➔ The speed and low cost of these trades have encouraged "day trading"-where
investors buy and sell the same stock in a short period of time.
➔ Electronic Computer Networks(ECN), offer a place to exchange shares of stock
off the traditional stock exchanges.
Monitoring
Harassment
➔ Systems are designed to automatically send second, third, and even further
overdue notices when a customer has a legitimate complaint about a bill.
➔ Computers connected to automatic dialing machines harass consumers via the
phone.
➔ Systems appear unresponsive to an individual's problems because of the need to
process large volumes of information quickly.
➔ Some systems may be flexible but require manual procedures to update records
and keep them accurate.
➔ If a clerk makes an error or omission, the computer will continue sending letters
to the customer.
➔ In other situations, employees learn to rely on systems and do not provide
customer service when a system is unavailable.
Defense
___________________________________________________________________
The Impact of IT
• Knowledge workers.
Employees need to be able to use computers as a part of their work. The knowledge
worker needs to understand something about computers, networks, and different kinds
of software. He or she should be familiar with using the Internet for commerce and to
search for information. The user needs to understand how to use this technology to
improve his or her performance.
• IS professionals.
These individuals will work with the technology.It includes programmers, systems
analysts, managers, and other staff members.Systems professionals must have an in-
depth understanding of the technology and its applications. Some of these employees
will develop hardware and software packages, and others will apply combinations of
hardware, packages, and custom programs to the problems faced by organizations.
• Interface personnel.
Between the IS professional and the user is an interface staff. These individuals have
functional knowledge of how computers and software work but do not have a command
of all the technical details. They need to be knowledgeable with the kinds of problems
faced by organizations and understand business and management.
Employment
➔ Labor leaders are extremely concerned about the possibility of wide-scale
unemployment because of information technology.
➔ It does appear that the continued introduction of automation will reduce
employment in manufacturing. However, increased technology will certainly
require a more highly skilled, better-educated workforce.
➔ The implementation of information systems also has implications for the pace of
technological evolution, employment security, and the importance of retraining
workers when jobs change.
➔ There is no longer a need for a layer of middle management as a conduit for
information between the next-lower and next higher level in the organization.
➔ The T-Form organization uses IT design variables to create a flat structure with
minimum overhead; requiring fewer employees than a traditional organization.
➔ The remaining employees will use IT as an integral part of their jobs.
Privacy
➔ The important issue of concern relating technology to society is the issue of an
individual's right to privacy.
➔ The European Union has a law that prohibits the purchase and sale of personal
data,which means that a firm cannot sell data to another company for marketing
purposes. But there is a fear of having adverse effects on electronic commerce.
Security
➔ Closely related to problems of privacy is the issue of system security.
➔ There are many possible threats to the security and integrity of computer
systems.
➔ Researchers in the field are working on methods of encrypting data so they
cannot be intercepted and decoded by an unauthorized user.
➔ This is an important concern for highly sensitive data such as online databases
and the need for a secure payments system for electronic commerce.
➔ There are a number of approaches to safeguarding credit card numbers sent to
merchants over the Internet, generally involving some type of encryption.
➔ Alternatives to a credit card like "digital cash" and electronic script are available.
Education
➔ Technology will change the nature of education. Few are suggesting that
multimedia will revolutionize education.
➔ For this, education infrastructure will need to redesign and develop new curricula
in which the capabilities of technology are exploited to provide new ways of
learning.
➔ Some companies are using computers to help illiterate workers function on the
job.
➔ In one warehouse, forklift drivers who cannot read get instructions from the
"talking computers" they wear on their belts.
Technical Safeguards
➔ Some problems involving misuse of information systems are technical in nature.
➔ We should attempt to make systems as secure as possible to avoid penetration
by hackers.
➔ Thorough testing is needed to prevent programs from inadvertently disclosing
sensitive data.
➔ There should be technical checks on procedures to prevent accidental entry by
unauthorized individuals.
➔ Protecting a system from malicious programs such as viruses is also not easy.
➔ Protection may take the form of monitoring to keep track of users or introducing
special encoding algorithms to maintain security.
Controls
➔ Several individuals are required to authorize changes in programming and
databases, and checking input carefully helps maintain data integrity.
➔ Controls requiring all data to be processed help solve such problems as data not
updated to reflect payments.
➔ Controls are important to the extent they ensure accurate processing and screen
out requests in which access is aimed at fraud or mischief.
➔ Legislation is another solution to some of these social issues, particularly
privacy and abuse of power, is legislation.
➔ In 1973, Sweden enacted a law regulating how and where personal data are
maintained about individuals.
➔ The act established a data inspection board that grants permission to keep a
data bank of personal information.
➔ Sensitive data, such as records of criminal convictions, can be maintained only
by an agency charged by statute with the job of keeping these records.
➔ Responsibility for maintaining the correct data lies with the organization
maintaining the data bank, not with the individual whose records are in the bank.
● Data in the organization should be used for its intended purpose and the
intended purpose should be legitimate.
● Monitoring of workers should be undertaken with their consent, and the data
should be used to help rather than punish the workers involved.
● Systems and services made available to individuals external to the firm should
behave as specified and cause no harm to others.
● Systems within the firm should not be guilty of harassment.
● Appropriate privacy should be maintained; for example, e-mail files should not be
read by individuals not involved in the exchange of messages.
● Appropriate software copyrights should be observed and there should be respect
for intellectual property.
● Systems should be secure and well controlled.
Ethical decisions arise frequently when dealing with information technology.
Kallman and Grillo (1993) suggest several informal guidelines for ethical
behavior:
• The family test: Would you be comfortable telling your closest family members about
your decision or action?
• The investigative reporter test: How would your actions look if reported in a
newspaper or on a television news program?
• The feeling test: How does the decision feel to you? If you are uneasy about a
decision or action but cannot understand why, your intuition is telling you it is not the
right thing to do.
• The empathy test: How does this decision look if you put yourself in someone else's
position? How would it look to another party affected by your actions?
______________________________________________________________________
___
THE FUTURE WITH INFORMATION TECHNOLOGY
______________________________________________________________________
___
Over the period of decades ,information technology has made huge changes in
organizations and society. As the internet comes into the picture we observed dramatic
change.The most recent and fastest growing innovation is the Internet and the World
Wide Web. New models for business generally involve the Web and include ideas like
electronic commerce, streamlined supply chains, electronic markets and even web-
enabled appliances. The Internet provides, for the first time, a worldwide network
infrastructure. Over 100 million people around the world can access applications and
information placed on the Web.
This same technology allows knowledge workers to access vast amounts of corporate
information online using an Intranet. Using web browsers all kinds of information
access is possible through a single program. The combination of computers, databases,
and telecommunications, especially the Internet, provide the manager with an incredible
number of options for improving the way an organization functions. Your challenge will
be to choose appropriate technology, implement it successfully and continually manage
change.
__________________________________________________________________
Answer the following:
__________________________________________________________________
1. Why is the use of a system the responsibility of the systems design team and the
organization?
3. What would be your response to a proposal for a national data bank of information on
citizens for purposes of social science research?
6. What steps are necessary to bring the benefits of information technology to the
nation's
schools?
7. Why does an innovation like the Internet offer both an opportunity and a threat to de-
veloping countries?
8. What can be done to reduce the possibility of a computer-based fraud that would
cause
the failure of a business?
9. How could IT be used to solve some of the pressing problems of society, such as
reduc-
ing the amount of energy consumed?
10. How is a highly technological society like the U.S. vulnerable to "electronic
aggression"?