Beruflich Dokumente
Kultur Dokumente
Chapter 2
Information systems are more than just computer programs. Though information and communications technologies are playing an increasing role in meeting organization's information needs, an information system is a much more general concept.
It refers to the wider systems of people, data and activities, both computer-based and manual, that effectively gather, process, store and circulate organization's information.
An understanding of the effective and responsible use and management of information systems is important for managers and other business knowledge workers in todays global information society. Information systems and technologies have become a vital component of successful businesses and organizations.
Information systems constitute an essential field of study in business administration and management, as they are considered a major functional area in business operations.
Managerial end users need to know how information systems can be employed successfully in a business environment. The important question for any business end user or manager is: What do you need to know in order to help manage the hardware, software, data, and network resources of your business, so they are used for the strategic success of your company?
Hardware Resources
Prof. Hemant Thakar
An Information System is an organized combination of people, hardware, software, communication networks and the data resources that collects, transforms and disseminates information in a organization.
Definitions
Data
$35,000 12 Units $12,000 J. Jones Western Region $100,000 100 Units 35 Units
Information
Salesperson: J. Jones Sales Territory: Western Region Current Sales: 147 Units = $147,000
Data Processing
Definitions
Information Systems An information system(IS) is typically considered to be a set of interrelated elements or components that collect(input), manipulate(processes), and disseminate (output) data and information and provide a feedback mechanism to meet an objective.
Feedback
Input
Processing
Output
IS Vs IT
Payroll System INFORMATION TECHNOLOGY Hardware Software Databases Networks Other related components
Inventory System
Are Used to Build
Classification of IS
Information Systems
GROUPS SERVED
SENIOR MANAGERS
MANAGEMENT LEVEL
MIDDLE MANAGERS
KNOWLEDGE LEVEL
OPERATIONAL LEVEL
OPERATIONAL MANAGERS
MANUFACTURING
FINANCE
ACCOUNTING
HUMAN RESOURCES
Chapter 3
Information Technology Information system-Need, Purpose and objective Attributes of Information and its relevance to Decision making Types of Information
Operational support forms the base of an information system and contains various transaction processing systems for designing, marketing, producing, and delivering products and services. Support of knowledge work forms the middle layer; it contains subsystems for sharing information within an organization. Management support, forming the top layer, contains subsystems for managing and evaluating an organizations resources and goals.
Data warehouses Enterprise resource planning Enterprise systems Expert systems Geographic information system Global information system Office Automation
Office Automation
Refers to varied computer machinery and software used to digitally create, collect, store, manipulate and relay the office information needed for accomplishing basic tasks. The back bone of office automation is a LAN which allows users to transmit data, mail and even voice across network. Office functions like dictations, typing, filing, copying, fax, Telex and record management fall in the category of Office automation.
Bring new options to the way companies interact, the way organizations are structured, and the way workplaces are designed Can significantly lower the costs of communication among workers and firms and enhance coordination on collaborative projects The capability to communicate information efficiently within a firm has also led to the deployment of flatter organizational structures with fewer hierarchical layers. An effective IS provides information on just about anything the company needs to track and analyze about employees, former employees, and Clients.
Nevertheless, information systems do not uniformly lead to higher profits Success depends on both the skill with which information systems are deployed and the availability of other assets
The development phase of the life cycle for an information system consists of a
feasibility study, system analysis, system design, programming and testing, installation.
Following a period of operation and maintenance, typically 5 to10 years, an evaluation is made of whether to terminate or upgrade the system.
Potential problems are known, The second step, establishing controls, can be taken. Finally, the third step consists of audits to discover any breach of security.
Operational Excellence
It is a philosophy of leadership, teamwork and problem solving resulting in continuous improvement throughout the organization by focusing on the needs of the customer, empowering employees, and optimizing existing activities in the process
10
Continuous Improvement
Is not only about improving HR quality, but also it is about the processes and standards improvement You can not improve if you do not measure
Example: Wal-Mart
The largest retailer will be a typical example of a powerful Information systems coupled with brilliant business practices and supportive management to achieve the world class operational efficiency.
11
Aisle 9 Aisle 10 Aisle 11 Aisle 12 Aisle 13 Aisle 14 OutsideAisle Prof. Hemant Thakar
Canned Fruit, Juice, Juice Boxes, Drink Mixes Baking Supplies, Nuts, Spices, Pie Filling, Shortening, Vegetable Oil Cereal (hot and cold), Syrup, Pancake Mix, Pop Tarts, Fruit Snacks Popcorn, Peanuts, Crackers, Cookies, Snack Mixes Chips, Candy Butter, Sour Cream, Juice, Eggs, Cookie Dough, Tube Biscuits, Milk, Yogurt Butter, Cheese, Lunch Meats, Breakfast Meats
The Right Customers And Suppliers To become the supplier of choice to our chosen customers and customer of choice for our chosen suppliers
To create common world class operating systems and procedures, facilitating sustainable, profitable growth
The Best People To create a development programme that provides opportunity for our employees and attracts the people that we need for the future
Performance Based Culture To create a performance based culture managed by a measurement structure that will enable continuous improvement
Information systems and technologies are a major enabling tool for firms to create a new products and services, as well as entirely new business models. A business models describes how a company produces, delivers and sells a product or service to create wealth. Example for Apple iPods.
12
When a business really knows the customers, and serves them well, the customers generally respond by returning and purchasing more. This raises revenues and profits Likewise with suppliers, the more a business engages its suppliers , the better the suppliers can provide vital inputs. This lowers costs. How to really know your customers and suppliers is a central problem for business with millions of business firms.
High end hotels - use of information systems and technologies to achieve customer intimacy
13
Case - 01
14
Case - 01
Liz Claiborne designs and markets an extensive range of women's fashion apparel and accessories, with versatile collections ranging from casual to dressy. The company also designs and markets men's apparel and furnishings, as well as fragrances for women and men. Net sales for a recent year were a record $2.4 billion. It should come as no surprise to anyone who has ever tried to keep up with fashion trends, that change is driving the apparel industry today. But change is occurring more than in the design of clothes. The structure and nature of retailing and manufacturing are also shifting. Geographical boundaries are disappearing. Limitations are dissolving. Above all, consumers today look for versatility and value, and they, not the retailers or manufacturers, define what constitutes those qualities. For example, the move toward casual dress is an attempt to simplify increasingly complex lives. These shifting priorities mean consumers are less loyal to brands or to stores, but more discerning and very time-constrained.
Prof. Hemant Thakar
Case - 01
To keep pace with the rate of change, Liz Claiborne has put all business processes under the microscope. As a result it is concentrating on streamlining the things it does best and teaming with others through licensing and outsourcing arrangements to perform activities in which it has less expertise, from marketing watches to producing footwear and home furnishings. Specific corporate goals include doubling revenue to more than $4 billion by the year 2000, cutting operations costs by $35 million per year, reducing time from product design to availability, and improving communications with customers. To achieve these goals, Liz Claiborne is making a major technology overhaul that will result in replacing over 80% of its business processes, business information systems, hardware, software, databases, and network capabilities.
Prof. Hemant Thakar
Case - 01
To keep pace with the rate of change, Liz Claiborne has put all business processes under the microscope. As a result it is concentrating on streamlining the things it does best and teaming with others through licensing and outsourcing arrangements to perform activities in which it has less expertise, from marketing watches to producing footwear and home furnishings. Specific corporate goals include doubling revenue to more than $4 billion by the year 2000, cutting operations costs by $35 million per year, reducing time from product design to availability, and improving communications with customers. To achieve these goals, Liz Claiborne is making a major technology overhaul that will result in replacing over 80% of its business processes, business information systems, hardware, software, databases, and network capabilities.
Prof. Hemant Thakar
15
Case - 01
Even ITS people are affected as they get training in the new technology and new roles are identified for current IS staff. A key challenge to this transformation process is surprisingly not installing or maintaining the new technology itself but aligning technology, business needs, and teaching people how to cope with the change. What many organizations dont realize is that if you dont manage the business part of a technology change, you can fail even if the technology part succeeds states Naomi Karten, an adviser to the company. Liz Claiborne has developed Web-based tools to improve communications with suppliers and retailers. A Web-based application allows retailers to track purchase orders and to check the status of transactions instantly a process that used to be done over the phone. s
Case - 01
Over 60% of customer orders are now placed electronically. The company also invested heavily in software to track materials around the world and to help communicate better with service providers, manufacturing partners, and freight consolidators. The technology changes have even affected the design process. In the past, Claiborne relied on pen-based sketches from external organizations for designs. Now the company uses sophisticated software tools to help in the design process. While the company used to fly in retailers to view its new designs, it now sends them electronically via the Web at a major cost and time savings. This networking technology permits the global transfer of textile and design information and is dubbed LizCADalyst.
What do you think Ms. Karten means when she says: What many organizations dont realize is that if you dont manage the business part of a technology change, you can fail even if the technology part succeeds? How does this apply to Liz Claiborne? Liz Claiborne has made a substantial investment in upgrading its information systems. If you had to justify this investment to the board of directors, what would you say? Sources: adapted from Jaikumar Vijayan, IT Overhaul May Boost Fashion
Profit, Computerworld, April 13, 1998, p. 55-56; Tom Stein, Going Global InformationWeek, February 2, 1998, p. 84-85; and Liz Claiborne Web page at: *http://www.lizclaiborne.com accessed on April 15, 1998.
16
Chapter 4
Major roles of Information systems Information Technology Information system-Need, Purpose and objective Attributes of Information and its relevance to Decision making Types of Information
17
Transaction Processing Systems (TPS) Management Information Systems (MIS) Decision Support Systems (DSS) Executive Support Systems (ESS)
Business Processes
Manner in which work is organized, coordinated, and focused to produce a valuable product or service Concrete work flows of material, information, and knowledge - sets of activities Unique ways to coordinate work, information, and knowledge Ways in which management chooses to coordinate work
18
Basic business systems that serve the operational level A computerized system that performs and records the daily routine transactions necessary to the conduct of the business
19
The major business functions or specialized task performed by business organization, consist of
Sales and marketing Manufacturing production Finance and accounting Human resource
General ledger, accounts receivable, accounts payable, budgeting, funds management systems
20
Materials resource planning systems, purchase order control systems, engineering systems, quality control systems
Payroll, employee records, benefit systems, career path systems, personnel training systems
21
Payroll TPS
22
An MIS provides managers with information and support for effective decision making, and provides feedback on daily operations. MIS provides information to the users in the form of reports Output, or reports, are usually generated through accumulation of transaction processing data. MIS is an integrated collection of subsystems, which are typically organized along functional lines within an organization.
Management level
Inputs: High volume data Processing: Simple models Outputs: Summary reports Users: Middle managers
23
Structured and semi-structured decisions Report control oriented Past and present data Internal orientation Lengthy design process
24
Scheduled reports Key-indicator reports Exception reports Ad hoc (demand) reports Drill-down reports
Key-Indicator Report: Summarizes the previous days critical activities and typically available at the beginning of each day.
25
Demand Report: Gives certain information at a managers request. Exception Report: Automatically produced when a situation is unusual or requires management action.
Prof. Hemant Thakar
Management level
Inputs: Low volume data Processing: Interactive Outputs: Decision analysis Users: Professionals, staff
26
27
Top level management Designed to the individual Ties CEO to all levels Very expensive to keep up Extensive support staff
Strategic level
Inputs: Aggregate data Processing: Interactive Outputs: Projections Users: Senior managers
28
Transcend boundary between sales, marketing, manufacturing, and research and development Group employees from different functional specialties to a complete piece of work Processing: Interactive
29
Information Flow
30
Decision Making
Decisions! Decisions!
Transcend boundary between sales, marketing, manufacturing, and research and development Many decision making models that exist nowadays means that you even have to make a decision as to which one to use!
There are rational models, intuitive models, rational-iterative models as well as 5, 6, 7 and even 9 Step Decision Models
Some of these decision making models presuppose that decision making is the same as problem solving.I don't believe that every decision is solving a problem. For example, deciding whether you want dark chocolate or milk chocolate is not, in and of itself, a problem frame.
Decision Making
So What Is It?
Decision making is about choosing from several options or ideas and taking action to generate a particular result. It is usually considered to be a rational and logical thinking process
31
This is probably the most significant step. It is vital to have a good understanding and be very clear about
a) the situation and
Unless you are choosing from alternatives there is no decision to make! The number of alternatives you choose will depend on such factors as experience, knowledge, skills, number of people involved in generating alternatives and what's considered important
32
Of the stages in decision making, this one often takes the most time. An aspect of the rational decision making models is the weighing up of the pros and cons of the various alternatives so as to arrive at the best.
Stage 4 : Selection
Selection is the choosing of one of the alternatives. The method of selection will very much depend on the decision making process. Rational decision models choose the option that has more pros than cons. Intuitive decision makers 'go with their gut', or their heart.
Stage 5 : Action
A decision is not complete until you take action and then determine if the action got you your outcome. If not, you need to cycle back to an earlier stage in the process.
33
Order of Stages
The order of the stages in decision making is important if you want to make quality decisions effortlessly and consistently
Involve a cognitive process where each step follows in a logical order from the one before The comparison is often performed by filling out forms or charts that have many names. Decision matrix, Pugh matrix, decision grid, selection matrix, criteria rating form, amongst others. A relative importance is given to each criterion and the options are scored against each of the criteria and the highest 'wins'.
A rational decision making model presupposes that there is one best outcome. Because of this it is sometimes called an optimizing decision making model. The search for perfection is frequently a factor in actually delaying making a decision. It is also limited by the cognitive abilities of the person making the decision; The criteria will be subjective and may be difficult to compare. Require a great deal of time and a great deal of information. A rational decision making model attempts to negate the role of emotions in decision making.
34
It's not simply the opposite of rational decision making. Carl Jung pointed out that it is outside the realm of reason. "A good plan, executed now, is better than a perfect plan next week." - General George S. Patton, Jr. The military are educating the soldiers of every rank in how to make intuitive decisions.
Information overload, lack of time and chaotic conditions are poor conditions for rational models.
Instead of improving their rational decision making, the army has turned to intuitive decision models. Why? Because they work!
How it works
In a given situation, the decision maker will pick up cues and indicators that let them recognize patterns. Based on these patterns and the decision they have to make, the person chooses a single course of action, an ' action script', that they consider will achieve the outcome
How people could assess this single option if they were not comparing it to something else.
The decision maker would run the action script through a mental simulation The mental simulation was based on mental models that the decision maker had developed through experience
How it works
There is no actual comparison of choices, but rather a cycling through choices until an appropriate one is found. Obviously people become better with this over time as they have more experiences and learn more patterns
35
Case - 02
Case - 02
Large companies process millions of transactions every year and store huge amounts of data on these transactions. Often, the data is spread across a variety of different computer systems in different areas of the country or the world. This raw data, although needed for record keeping, has little value to managers and decision makers unless it can be filtered and processed into meaningful information. The results can be a staggering increase in revenues and profits. But doing this is the real challenge. Finding strategic information from a mountain of data can be like finding a needle in a haystack, but the effort is usually worth it. With todays fast computers and a knowledgeable IS staff, the possibility of turning raw data into useful and profitable information can become a reality. This was the case with Farmers Insurance Group. Like other companies, Farmers Insurance Group was sitting on a huge amount of raw data. The data, however, was spread across different computer systems in different locations.
Prof. Hemant Thakar
Case - 02
As in all insurance companies, underwriting determines what insurance policies a company can offer and at what premiums. Farmers underwriting business was responsible for assessing insurance risk, which can make the difference between profits and losses. The people who are responsible for determining insurance risk are called actuaries. According to Tom Boardman, an assistant actuary at Farmers, As competition has gotten more intense in the insurance industry, the traditional ways of segmenting risk arent good enough at providing you competitive advantage. Boardman was referring to how most insurance companies categorize risk. For example, high-powered sports cars are more likely to be involved in expensive accidents than ordinary sedans. Thus, insurance companies can put sports cars in a different risk category than sedans and charge customers who own them a higher premium.
36
Case - 02
In assessing risk, an insurance actuary would traditionally have a hunch, such as sports cars are more prone to accidents than sedans. Then the actuary would test his or her hunch using the computer. According to Boardman, this was like using the computer to dig up data to prove or UN-prove those hunches. One disadvantage of this old approach is that small, but profitable, market niches may be ignored or not priced correctly. As a result, Farmers decided to look into a computer system to help it find profitable market niches. The company found the help it needed through IBM, which developed a customized software product for Farmers called Decision Edge. The computer system was an advanced decision support system that combined raw data from seven different databases on a staggering 35 million records.
Prof. Hemant Thakar
Case - 02
Consolidating the raw data into useful information took about twice as long as expected, but the additional wait was worth it. Farmers was able to locate market niches that it didnt see before the decision support system. For example, Decision Edge helped Farmers determine that not all sports car owners are alike - those who were older and had at least one other car were less likely to be in an expensive accident. Once this market niche was identified, Farmers could offer that segment of the sports car market lower premiums. Using Decision Edge to find the market niche resulted in millions of dollars of increased revenues for Farmers. The approach used by Farmers is sometimes called data scrubbing. It allows a company to consolidate important information and squeeze additional revenues and profits from it. After helping Farmers and seeing a market opportunity, IBM also decided to offer its Decision Edge software to other insurance companies.
Prof. Hemant Thakar
How was Farmers able to transform its raw data into meaningful information and additional revenues? Describe how this approach could be used in other industries.
Sources: adapted from Hoffman, Thomas, Finding a Rich Niche, Computerworld, February 8, 1999, p. 44 and Farmers Trim Paper Trail, Future Banker, September 6, 1999, p. 24.
37
CHAPTER 5
Chapter 5
The value of information is directly linked to how it helps decision makers to achieve the organizations goals
For effective implementation of any information system we need to distinguish data from information and describe the characteristics used to evaluate the quality of data
Knowing the potential impact of information systems and having the ability to put this knowledge to work can result in a successful personal career, organizations that reach their goals, and a society with a higher quality of life
Identify the basic types of business information systems and discuss who uses them, how they are used, and what kinds of benefits they deliver
38
System users, business managers and information systems professionals must work together to build a successful information system For effective functioning of IS we need to identify the major steps of the system development process and state the goal for each of the steps. The use of information systems to add value to the organization can also give an organization a competitive advantage Identify the value-added processes in the organization and describe the role of information systems within them Identify some of the strategies employed to lower costs or improve service
Management Issues
Annual investment in BIS is significant for many companies. But what return do organizations receive for this investment? To achieve well planned BIS, strategy is required that supports the Corporate Goals. Despite the large scale investments in IS within an Organizations, it is still not clear the extent to which investment in information systems benefits organizations. This highlights the importance of effective development and implementation of an IS strategy which supports business goals. Research results indication a poor correlation between organization investment in IS and organizational performance measured by return on equity
In its original sense, strategy referred to the development of plans for deceiving or outwitting an enemy. Today, corporate strategy is developed not to conquer a single competitor, but rather to compete within a chosen market.
Effective use of BIS can also result in increased efficiency of internal processes and outward facing processes which are part of supply chain management. This can help reduce costs and lead to increased profitably.
39
Organization Strategy
Vision an image of a future direction that everyone can remember and follow. Mission a statement of what a business intends to achieve and what differentiates it from other businesses Strategies a conditional sequence of consistent resource allocations that defines an organizations relationships with its environment over time. Policies guidelines and procedures used in carrying out a strategy.
Porter and Millars five forces model Porters competitive strategies Value chain analysis Critical success factor (CSF)
The five forces are environmental forces that impact on a companys ability to compete in a given market. The purpose of five-forces analysis is to diagnose the principal competitive pressures in a market and assess how strong and important each one is.
40
Capital Requirements
Switching Costs Access to Distribution Channels Cost Disadvantages Independent of Scale Government Policy
Barriers to Entry
41
Supplier industry is dominated by a few firms Suppliers products have few substitutes Buyer is not an important customer to supplier Suppliers product is an important input to buyers product Suppliers products are differentiated Suppliers products have high switching costs Supplier poses credible threat of forward integration
Suppliers exert power in the industry by: * Threatening to raise prices or to reduce quality Powerful suppliers can squeeze industry profitability if firms are unable to recover cost increases
42
Electronic security systems in place of security guards Fax machines in place of overnight mail delivery
43
Jockeying for strategic position Using price competition Staging advertising battles Increasing consumer warranties or service Making new product introductions
Price competition often leaves the entire industry worse off Advertising battles may increase total industry demand, but may be costly to smaller competitors
Numerous or equally balanced competitors Slow growth industry High fixed costs High storage costs Lack of differentiation or switching costs Capacity added in large increments Diverse competitors High strategic stakes High exit barriers
Firm aims to become the lowest cost producer in the industry. The strategy here is that is by reducing cost, one is more likely to retain customers and reduce the threat post by substitute products.
An example of how this might be achieved is to invest in systems that supports accurate sales forecasting and therefore projected requirement so that good long term deals can be struck with suppliers thus reducing material cost
44
Creates a product perceived industry wise as being unique, by being able to tailor products by specific customers requirement or by offering exceptional quality / services, the risk of customers switching is reduced.
This involves indentifying and serving a target segment very well. Eg. Buyer group, product range, geographic market etc.
The firms seeks to achieve either or both of Cost Leadership and Differentiation.
Value chain: a series (chain) of activities that includes inbound logistics, warehouse and storage, production, finished product storage, outbound logistics, marketing and sales, and customer service It contains all the activities, other than the production or manufacturing of the goods or services, which are supportive to improve the quality of the product for the end user
45
Upstream management: management of raw materials, inbound logistics, and warehouse and storage facilities Downstream management: management of finished product storage, outbound logistics, marketing and sales, and customer service
Organizational Culture Acceptance level of employees Cultural and political influences Behavioral factors Organizational Change How organizations plan for, implement, and handle change Employees resistance to the change
46
Technology Diffusion: measure of widespread use of technology Technology Infusion: extent to which technology filtered through a department Technology Acceptance Model (TAM): specifies factors that can lead to higher acceptance and usage of technology
As companies rely on virtual structures and outsourcing to a greater extent, businesses can operate around the world Some of the challenges to operating in a global society Every country has a set of customs, cultures, standards, politics, and laws Language barriers Difficulty in managing and controlling operations in different countries
Competitive Advantage
47
Rivalry among existing competition Threat of new entrants Threat of substitute products and services Bargaining power of customers and suppliers
Change the structure of the industry Create new products or services Improve existing products or services
48
Consider both strategic advantage and costs Use productivity, return on investment (ROI), net present value, and other measures of performance
49
Productivity
Output achieved divided by input required Higher level of output for a given level of input means greater productivity
Earnings growth Market share Customer awareness and satisfaction Total cost of ownership
Summary
Data: raw facts Information: organized collection of facts System components: input, processing, output, and feedback Computer-based information system (CBIS)
databases,
telecommunication,
people,
and
50
Summary
a collection of people, procedures, software, databases, and devices used to record completed business transactions
a collection of people, procedures, software, databases, and devices used to provide routine information to managers and decision makers
Summary
a collection of people, procedures, software, databases, and devices used to support problem-specific decision making
Summary
Competitive advantage: significant, long-term benefit to a company over its competition Primary responsibilities in information systems: operations, systems development, and support
51
Case - 03
Case - 03
Federal Express (FedEx) with headquarters in Memphis, has a fleet of 40,000 ground vehicles and 600 airplanes. It generates annual revenues in excess of $11 billion. The firm also has an impressive information system architecture that is driving FedExs transformation from a package delivery company to a strategic provider of E-commerce, logistics, and other supply-chain services. FedEx knows that building and leveraging its information systems and networks is key to its success in the 21st century. As a result, it spends about $1 billion a year on information technology. FedEx is not only reorganizing its internal operations around a more flexible technology infrastructure, but its also attracting new customers and in many cases locking in existing customers with an unprecedented level of technology integration.
Prof. Hemant Thakar
Case - 03
Although FedEx pioneered Web package-tracking capabilities, these have now become an industry norm rather than a competitive advantage. All major transportation and delivery companies, from United Parcel Service to Ryder System, are making major investments in information technology. Where FedEx is different is that it is using information technology to transform itself from a delivery service to a vital link in todays networked and increasingly electronic economy. FedEx seeks to become a fully integrated corporate partner that picks up, transports, warehouses, and delivers all of a companys finished goods from the factory floor to the customers receiving dock with status data available every step of the way. Large companies such as National Semiconductor Corp. have hired FedEx to handle most of their warehousing and distribution operations.
Prof. Hemant Thakar
52
Case - 03
Today, virtually all of National Semiconductors products, manufactured in Asia by three National Semiconductor factories and three subcontractors, are shipped directly to a FedEx distribution warehouse in Singapore. National Semiconductors order-processing application, running on an IBM mainframe in Santa Clara, California sends a daily batch of orders directly to FedExs inventory-management system running on a Tandem computer in Memphis. At this point, FedEx takes over the orders are forwarded to the FedEx warehouse management application in Singapore, where they are fulfilled in a FedEx warehouse and shipped directly to customers via FedEx. Except for receiving a confirmation that the order was filled, National Semiconductor is done with the order transactions. National Semiconductor has gained significant benefits: the average customer delivery time has been reduced from four weeks to seven days, distribution costs have been cut from 2.9% to 1.2% of sales.
Prof. Hemant Thakar
Case - 03
In addition, seven regional warehouses in the United States, Asia, and Europe were closed saving National Semiconductor costs for warehouse space and employees. The tight information technology links between FedEx and National Semiconductor exemplify FedExs strategy of technology integration with its corporate customers. FedEx stores the product, operates the warehouse, and processes the order and then hands it off to the carrier which, of course, is FedEx. FedEx is not alone in using information technology to move beyond package delivery. UPS, which has spent $9 billion on IT since 1986, has already formed five alliances to help disseminate its logistics software among E-commerce users with UPS providing order-entry, catalog, and inventory management. Ryder System has formed an alliance with IBM and Andersen Consulting to deliver logistics services to customers. IBM will lend technology expertise and Andersen its consulting personnel to Ryder projects worldwide.
Prof. Hemant Thakar
What is meant by strategic competitive advantage? How can information technology help a company to gain and maintain a strategic competitive advantage?
Sources: adapted from Monua Janah and Clinton Wilder, Special Delivery, Informationweek, October 27, 1997, p. 42-60; and FedEx Web site at:*http://www.fedex.com, accessed April 8, 1998.
53
CHAPTER 6
Chapter 6
Introduction
The trends of increasing technical complexity of the systems, coupled with the need for repeatable and predictable process methodologies, have driven System Developers to establish system development models or software development life cycle models. Nearly three decades ago the operations in an organization used to be limited and so it was possible to maintain those using manual procedures. But with the growing operations of organizations, the need to automate the various activities increased, since for manual procedures it was becoming very difficult, slow and complicated. Like maintaining records for a thousand plus employees company on papers is definitely a bulky job. So, at that time more and more companies started going for automation.
54
Introduction
Since there were a lot of organizations, which were opting for automation, it was felt that some standard and structural procedure or methodology be introduced in the industry so that the transition from manual to automated system became easy. The concept of system life cycle came into existence then. Life cycle model emphasized on the need to follow some structured approach towards building new or improved system. There were many models suggested. A waterfall model was among the very first models that came into existence. Later on many other models like prototype, rapid application development model, etc were also introduced.
Introduction
System development begins with the recognition of user needs. Then there is a preliminary investigation stage. It includes evaluation of present system, information gathering, feasibility study, and request approval. Feasibility study includes technical, economic, legal and operational feasibility. In economic feasibility costbenefit analysis is done. After that, there are detailed design, implementation, testing and maintenance stages.
There is a great temptation to just resign to the fact of creating software based on the problem. For example, the business needs simple computing software embedded in their website. That is a simple problem that could be done by programmer, anytime. It is just a matter of using code to efficiently implement the software in a website. But if you take a look at it strongly, there are steps that should be done before you can actually create the software. First you have to know what type of computing software and the components that should be added. Then they have to plan the actual codes that will be used and test it extensively before implementation. With SDLC, software development companies or inhouse developers will ensure the software released SHOULD have the following behaviors:
55
Software Behavior
Software Created Is Of High Standard Building software is different from building well built software. Anyone could create software as there are available tools that do not even require knowledge in extensive programming. But with SDLC, programmers have to look further than tapping in shortcuts to create a specific tool that the customer wants.
Software Behavior
Project Implementation and Control will be easier The role of developers does not end when the program is implemented. Even though specific software is highly efficient when implemented, anything found wrong or a bug in the system should be worked on especially when the software did not go through beta testing. In this account, SDLC will ensure that controls of the software are stable. This is usually done be creating better documentation to guide the developers in controlling the specific function of a software.
Software Behavior
Answer the need of the users or even exceeding their expectations Every software that is created should answer the specific needs of their customers. Having highly stable software will be nothing if the intended users cannot use the software. SDLC will make sure the needs are answered and could even provide more than they need. The steps they will be using are geared towards creating software that is highly efficient as well as problem solving for better time management.
56
Problem solving in software consists of these activities: For small problems these activities may not be done clearly. The start end boundaries of these activities may not be clearly defined and not written record of the activities may be kept. However, for large systems where the problem solving activity may last over a few years. And where many people are involved in development, performing these activities implicitly without proper documentation and representation will clearly not work.
In addition to the activities performed during software development, some activities are performed after the main development is complete. There is often an installation (also called implementation) phase, which is concerned with actually installing the system on the clients computer systems and then testing it. Then, there is software maintenance. Maintenance is an activity that commences after the software is developed. Software needs to be maintained not because some of its components wear out and need to be replaced, but because there are often some residual errors remaining in the system which must be removed later as they are discovered. Furthermore, the software often must be upgraded and enhanced to include more features and provide more services. This also requires modification of the software, Therefore, maintenance is unavoidable for software systems.
57
I R D D T M E A
Design of System
Development (coding) of Software System Testing Maintenance and Error Distribution with Phases
Preliminary Investigation
First stage is the preliminary analysis. The main aim of preliminary analysis is to identify the problem. First, need for the new or the enhanced system is established. Only after the recognition of need, for the proposed system is done then further analysis is possible. Suppose in an office all leaveapplications are processed manually. Now this company is recruiting many new people every year. So the number of employee in the company has increased. So manual processing of leave application is becoming very difficult. So the management is considering the option of automating the leave processing system. If this is the case, then the system analyst would need to investigate the existing system, find the limitations present, and finally evaluate whether automating the system would help the organization.
58
Preliminary Investigation
Once the initial investigation is done and the need for new or improved system is established, all possible alternate solutions are chalked out. All these systems are known as candidate systems. All the candidate systems are then weighed and the best alternative of all these is selected as the solution system, which is termed as the proposed system. The proposed system is evaluated for its feasibility. Feasibility for a system means whether it is practical and beneficial to build that system. Feasibility is evaluated from developer and customers point of view. Developer sees whether they have the required technology or manpower to build the new system. Is building the new system really going to benefit the customer? Does the customer have the required money to build that type of a system?
Prof. Hemant Thakar
Preliminary Investigation
All these issues are covered in the feasibility study of the system. The feasibility of the system is evaluated on the three main issues: technical, economical, and operational. Another issue in this regard is the legal feasibility of the project.
Technical feasibility: Can the development of the proposed system be done with current equipment, existing software technology, and available personnel? Does it require new technology? Economic feasibility: Are there sufficient benefits in creating the system to make the costs acceptable? An important outcome of the economic feasibility study is the cost benefit analysis. Legal feasibility: It checks if there are any legal hassle in developing the system.
Preliminary Investigation
Operational feasibility: Will the system be used if it is developed and implemented? Will there be resistance from users that will undermine the possible application benefits?
The result of the feasibility study is a formal document, a report detailing the nature and scope of the proposed solution. It consists of the following: Statement of the problem Details of findings Findings and recommendations in concise form Once the feasibility study is done then the project is approved or Disapproved according to the results of the study. If the project seems feasible and desirable then the project is finally approved otherwise no further work is done on it.
Prof. Hemant Thakar
59
Preliminary Analysis
Request Clarification First the management of the library approached this ABC Software Ltd. for their request for the new automated system. What they stated in their request was that they needed a system for their library that could automate its various functions. And provide faster response. From this request statement, it is very difficult for the analyst to know what exactly the customer wants. So in order to get information about the system, the analyst visits the library site and meets the staff of the library.
Function for issue of books Function for return of books that can also calculate the fine if the book is returned after the due date Function for performing different queries Report generation functions Function for maintaining account s Maintaining the details for members, books, and suppliers in some structured way.
60
61
62
A condition of capability needed by a user to solve a problem or achieve an objective; A condition or capability that must be met or possessed by a system to satisfy a contract, standard, specification, or other formally imposed document.
63
64
65
System Testing
Testing is the major quality control measure employed during software development. Its basic function is to detect errors in the software. During requirement analysis and design, the output is a document that is usually textual and nonexecutable. After the coding phase, computer programs are available that can be executed for testing phases. This implies that testing not only has to uncover errors introduced during coding, but also errors introduced during the previous phases. Thus, the goal of testing is to uncover requirement, design or coding errors in the programs. Consequently, different levels of testing are employed. The starting point of testing is unit testing. In this a module is tested separately and is often performed by the coder himself simultaneously with the coding of the module.
Prof. Hemant Thakar
System Testing
The purpose is to execute the different parts of the module code to detect coding errors. After this the modules are gradually integrated into subsystem, which are then integrated themselves eventually form the entire system. During integration of modules, integration testing is performed. The goal of this testing is to detect design errors, while focusing on testing the interconnection between modules. After the system is put together, system testing is performed. Here the system is tested against tech system requirements to see if all the requirements are met and the system performs as specified by the requirements. Finally, acceptance testing is performed to demonstrate to the client, on the real life data of the client, the separation of the system.
System Testing
For testing to be successful, proper selection of test cases is essential. There are two different approaches to selecting test casesfunctional testing and structural testing. In functional testing the software for the module to be tested is treated as black box, and then test cases are decided based on the specifications of the system or module. For this reason, this form of testing is also called black box testing. The focus is on testing the external behavior of the system. In structural testing the test cases are decided based on the logic of the module to be tested. Structural testing is sometimes called glass box testing. Structural testing is used for lower levels of testing and functional testing is used for higher levels.
66
System Testing
Testing is an extremely critical and timeconsuming activity. It requires proper planning of the overall testing process. Frequently the testing process starts with the test plan. This plan identifies all the testing related activities that must be performed and specifies the schedule, allocates the resources, and specify guidelines for testing. The test plan specifies manner in which the modules will integrate together. Then for different test units, a test case specification document is produced, which lists all the different test cases, together with the expected outputs, that will be used for testing. During the testing of the unit, the specified test cases are executed and actual result is compared with the expected output. The final output of the testing phases is to the text report and the error report, or set of such reports (one of each unit is tested). Each test report contains the set of such test cases and the result of executing the code with these test cases the error report describes the errors encountered and action taken to remove those errors.
Prof. Hemant Thakar
67
68
69
What is Process?
70
Real projects are rarely so straightforward and sequential It is generally not possible to completely define (and freeze) all the requirements at the start of the project Problem is discovered in testing? Freight-Train Effect, or Late, or Over-Budget
Problems we cant really understand until weve developed a solution. That is not what I want ... but now I know what I do want!
In software projects, what will take one person ten months can not be solved by ten people in one month. Throwing people onto a late project will just make it later Because of Wicked Problems, Plan to the throw one away
71
Rapid Prototyping
Put together a team of Smart Guys from multiple disciplines Develop the GUI on Paper Code the GUI in a fast language (Make it look like its working)
<=Requirements=>
Typical Steps
Project Manager, Developer, Community Members write user requirements Coder writes sample HTML Shows the web page; heads bob, some changes to navigation DBA, Coder, Project Manager determine the architecture (Design) Coding & Review Shifting Requirements priced project out-of-budget
No Current Documents Functional Spec is Prototype + Feedback Prototype is not baseline functionality Same problems with Functional Spec as waterfall!
72
Build/Revise Mockup
Customer: This looks great, and it looks like youre about done. When can we have it? Developer: Uh, its only a prototype we plan to throw it away and start over. Customer: No this is exactly what we need, and we need it now! Well take 50 prototypes!
The Sales Guy begins to see $$ signs. Under Rigged Demo scenarios, there is either a lot of wasted effort, or prototypes that were never intended to ship end up shoved into production.
Iterative Design: Code as much as you can questions surface, then start over. Every model well talk about below is a variation on the Iterative Model.
73
Spiral Model
Determine Objectives, Alternatives, Constraints Evaluate Alternatives, Identify And Resolve Risks
Risk Assessment
Spiral Model risk driven rather than document driven The "risk" inherent in an activity is a measure of the uncertainty of the outcome of that activity High-risk activities cause schedule and cost overruns Risk is related to the amount and quality of available information. The less information, the higher the risk
Strengths
Introduces risk management Prototyping controls costs Evolutionary development Release builds for beta testing Marketing advantage
Weaknesses
74
Win-Win Spiral Process Model is a model of a process based on Theory W, which is a management theory and approach "based on making winners of all of the system's key stakeholders as a necessary and sufficient condition for project success." Win-Win Spiral Model (eliciting software requirements defined through negotiation between customer and developer, where each party attempts to balance technical and business constraints)
Identifying the system's stakeholders and their win conditions and reconciling win conditions through negotiation to arrive at a mutually satisfactory set of objectives, constraints, and alternatives for the next level. Evaluate Product and Process Alternatives. Resolve Risks
75
Agile
Agile software development, is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams.
Agile
Twelve principles underlie the Agile Manifesto, including: Customer satisfaction by rapid delivery of useful software Welcome changing requirements, even late in development Working software is delivered frequently (weeks rather than months) Working software is the principal measure of progress Sustainable development, able to maintain a constant pace Close, daily co-operation between business people and developers Face-to-face conversation is the best form of communication (co-location) Projects are built around motivated individuals, who should be trusted Continuous attention to technical excellence and good design Simplicity Self-organizing teams Regular adaptation to changing circumstances
Agile characteristics
Agile methods break tasks into small increments with minimal planning, and do not directly involve long-term planning. Iterations are short time frames that typically last from one to four weeks. Each iteration involves a team working through a full software development cycle including planning, requirements analysis, design, coding, unit testing, and acceptance testing when a working product is demonstrated to stakeholders. This minimizes overall risk and allows the project to adapt to changes quickly. Stakeholders produce documentation as required. An iteration may not add enough functionality to warrant a market release, but the goal is to have an available release (with minimal bugs) at the end of each iteration. Multiple iterations may be required to release a product or new features. Team composition in an agile project is usually cross-functional and self-organizing without consideration for any existing corporate hierarchy or the corporate roles of team members. Team members normally take responsibility for tasks that deliver the functionality an iteration requires. They decide individually how to meet an iteration's requirements. Agile methods emphasize face-to-face communication over written documents when the team is all in the same location. No matter what development disciplines are required, each agile team will contain a customer representative.
76
CHAPTER 7
Chapter 7
Concept of database, data warehouse Content management and data mining (Strategic Informaation FB)
What is a Warehouse?
Collection of diverse data subject oriented aimed at executive, decision maker often a copy of operational data with value-added data (e.g., summaries, history) Integrated data time-varying non-volatile
77
What is a Warehouse?
Collection of tools gathering data cleansing, integrating, ... querying, reporting, analysis data mining monitoring, administering warehouse
External Data
Info Directory
Warehouse Architecture
Client Query & Analysis Client
Metadata
Warehouse
Integration
Source
Prof. Hemant Thakar
Source
Source
78
Data Marts
A Data Mart is a subset of Data Warehouse. Highly focused portion of organizations data is placed in separate database for specific population of users.
OLTP: On Line Transaction Processing Describes processing at operational sites OLAP: On Line Analytical Processing Describes processing at warehouse
OLAP
79
Data Models stars & snowflakes Cubes Operators slice & dice roll-up, drill down pivoting other
Data Mining
Decision Trees
Example: Conducted survey to see what customers were interested in new model car Want to select customers for advertising campaign
sale
custId c1 c2 c3 c4 c5 c6
age 27 35 40 22 50 25
city sf la sf sf la la
Training Set
80
One Possibility
sale custId c1 c2 c3 c4 c5 c6 car taurus van van taurus merc taurus age 27 35 40 22 50 25 city sf la sf sf la la newCar yes yes yes yes no no
age<30
Y
city=sf
N
car=van
Y
likely
N
unlikely
Y
likely
N
unlikely
Another Possibility
sale custId c1 c2 c3 c4 c5 c6 car taurus van van taurus merc taurus age 27 35 40 22 50 25 city newCar sf yes la yes sf yes sf yes la no la no
car=taurus
Y
city=sf
N
age<45
Y
likely
N
unlikely
Y
likely
N
unlikely
Notes11
Prof. Hemant Thakar
CS 245
Issues
Decision tree cannot be too deep would not have statistically significant amounts of data for lower decisions Need to select tree that most reliably predicts outcomes
81
Case - 04
Case - 04
The Gerber story started in the kitchen of Daniel Gerber in the summer of 1927. Following the advice of a pediatrician, his wife had been handstraining solid food for their seven-month-old daughter. After many evenings of repeating this chore, Dorothy Gerber suggested that her husband try it. After watching him make several attempts, she pointed out that the work could be easily done at the Fremont Canning Company, where the Gerber family produced a line of canned fruits and vegetables.
Experiments with strained baby foods began shortly. Soon workers in the plant requested samples for their babies. By late 1928, strained peas, prunes, carrots and spinach, not to mention beef vegetable soup, were ready for the national market. Gerber has continued to grow throughout the years. Today nearly 190 food products are labeled in 16 languages and distributed to 80 countries.
Prof. Hemant Thakar
Case - 04
Tightening inventory management is a top priority for cost-conscious retailers and their suppliers. Retailers want their products to be available for customers to buy, but they dont want too much. Gerber has convinced 40 major grocery chains to allow the company to manage their inventory of Gerber products. During systems analysis, project participants defined the system objectives reduce both Gerbers and the customers inventory costs and provides a strong incentive for store managers to buy from Gerber. The company also decided not to charge for the inventory management service, treating it instead as a way to build customer loyalty and get sales data that can be used to fine-tune baby food production plans. Gerber believes it can gain a competitive advantage with superior forecasting and planning.
Prof. Hemant Thakar
82
Case - 04
An electronic data interchange (EDI) setup was designed and implemented to feed information on sales of Gerber products from the grocery stores to the Freemont, Michigan, company. The data is input to Manugistics software to schedule new deliveries. Manugistics, Inc. is a manufacturer of software for supply chain management. The company's solutions improve the flow of product within and among companies from raw materials or parts through manufacturing to delivery of product to the end customer. With Manugistics software, Gerber makes informed operational decisions, resulting in increased revenues, reduced inventories, improved customer service, better relationships among trading partners, greater speed to market and lower overall costs throughout the supply chain.
Case - 04
An electronic data interchange (EDI) setup was designed and implemented to feed information on sales of Gerber products from the grocery stores to the Freemont, Michigan, company. The data is input to Manugistics software to schedule new deliveries. Manugistics, Inc. is a manufacturer of software for supply chain management. The company's solutions improve the flow of product within and among companies from raw materials or parts through manufacturing to delivery of product to the end customer. With Manugistics software, Gerber makes informed operational decisions, resulting in increased revenues, reduced inventories, improved customer service, better relationships among trading partners, greater speed to market and lower overall costs throughout the supply chain.
Case - 04
Manugistics formed a partnership with Frontec AMT, a company that specializes in integrating applications. The alliance created the Intelligent Messenger for Vendor Managed Inventory, a software product to format and prepare customer product activity data for input into Manugistics. The software was designed to present data to Manugistics that is consistent and complete in terms of product identification, unit of measure conversion, data validation and sequence checking. Additional features were identified based on user requirements - intelligent routing of messages, event-driven notifications, and predefined trading partner business processes. Gerber plans to be the first company to implement the new data transformation and messaging software. It has established objectives for this system to dramatically increase the amount of inventory it manages for grocery stores. Gerber sells around $700 million worth of baby food in the U.S. each year; however, it only manages about 27% of base sales. Its goal is to manage inventory for 80% of sales within two years.
Prof. Hemant Thakar
83
What are the stages of an information systems project and what are the objectives of each stage?
Who are the various players that need to be involved in an information system development project and what are their roles?
Sources: adapted from Craig Stedman, Gerber Tightens Inventory Control, Computerworld, June 8, 1998, p. 57-58; Gerber Story and Products sections of the Gerber Web site at *http://www.gerber.com accessed on June 19, 1998; and Press release Frontec Announces Intelligent Messenger For Vendor Managed Inventory, June1, 1998 found at Manugistics Web site at *http://www.manugistics.com accessed on June 19, 1998.
CHAPTER 8
Chapter 8
Network standards and open systems Virtual Private network Network management system
84
The value of information is directly linked to how it helps decision makers to achieve the organizations goals
For effective implementation of any information system we need to distinguish data from information and describe the characteristics used to evaluate the quality of data
Knowing the potential impact of information systems and having the ability to put this knowledge to work can result in a successful personal career, organizations that reach their goals, and a society with a higher quality of life
Identify the basic types of business information systems and discuss who uses them, how they are used, and what kinds of benefits they deliver
System users, business managers and information systems professionals must work together to build a successful information system For effective functioning of IS we need to identify the major steps of the system development process and state the goal for each of the steps. The use of information systems to add value to the organization can also give an organization a competitive advantage Identify the value-added processes in the organization and describe the role of information systems within them Identify some of the strategies employed to lower costs or improve service
Trends In Telecommunications
85
Trends In Telecommunications
Technology (continued)
Fiber-optic lines & cellular, PCS, satellite & other wireless technologies
Trends In Telecommunications
Business applications
feasible telecommunication
Cut costs, reduce lead times, shorten response times, support e-commerce, improve collaboration, share resources, lock in customers & suppliers, & develop new products & services
The Internet
A network of networks Popular uses E-mail Instant messaging Browsing the World Wide Web Newsgroups and chat rooms
86
The Internet
The business value of the Internet
Intranets
Used for information sharing, communication, collaboration, & support of business processes. Web publishing
Comparatively easy, attractive, & lower cost alternative for publishing & accessing multimedia business information
Intranets (Portals)
87
Extranets
Network links that use Internet technologies to interconnect the firms intranet with the intranets of customers, suppliers, or other business partners
Consultants, subcontractors, business prospects, & others Improve communication with customers and business partners
Business value
88
Terminals
Any input/output device that uses telecommunication networks to transmit or receive data
Telecommunication processors
Telecommunications channels
The medium over which data are transmitted and received Interconnected by telecommunications networks Control telecommunications activities & manage the functions of telecommunications networks
Computers
Wide Area Networks (WAN) Metropolitan Area Networks (MAN) Local Area Networks (LAN) Campus Area Networks (CAN) Virtual Private Networks (VPN)
89
Cover a large geographic area. Used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations Many WANs are built for one particular organization and are private
Several options which are available for WAN connectivity are mentioned in the next slide
Circuit switching
Less Expensive
Call Setup
PPP, ISDN
Packet switching
X.25 FrameRelay
Similar to packet switching, but uses fixed length cells instead of variable length packets. Data is Cell relay divided into fixed-length cells and then transported across virtual circuits Prof. Hemant Thakar
A large computer network that usually spans a city or a large campus. A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks (or WAN) and the Internet.
90
Connect computers & other information processing devices within a limited physical area. Connected via ordinary telephone wiring, coaxial cable, or wireless radio & infrared systems
CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area Connected via ordinary telephone wiring, coaxial cable, or wireless radio & infrared systems In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls.
A secure network that uses the Internet as its main backbone network, but relies on fire walls and other security features
91
Client/Server Networks
Clients end user PCs or NCs Server helps with application processing and also manages the network
92
Network computing
Network computing refers to computers working together over a network as opposed to stand alone computers like laptops and home computers
Telecommunications Media
Minimizes interference and distortion Allows high-speed data transmission Glass fiber that conducts pulses of light generated by lasers
Fiber optics
93
Wireless Technologies
Terrestrial Microwave
Communications Satellites
Geosynchronous orbits Serve as relay stations for communications signals transmitted from earth stations
Wireless Technologies
Each cell is typically from one to several square miles in area. Each cell has its own low-power transmitter or radio relay antenna. Computers & other communications processors coordinate & control the transmissions to/from mobile users as they move from one cell to another
Cellular Networks
Overlapping towers Signal picked up by closest tower and transferred on AMPS standard (TACS in EUROPE) PCS and various alternative standards
94
WAP - An open international standard. A WAP browser is a commonly used web browser for small mobile devices such as cell phones Provides support to Internet and Web applications such as:
Email by mobile phone Tracking of stock-market prices Sports results News headlines new Music downloads
I-mode
The Japanese i-mode system offers another major competing wireless data protocol. 60% of Japanese market Why so popular?
Lack of easy and based Internet access in Japan Lower PC penetration in Japan Extensive wireless coverage Returns money to website providers
Connection of computer to peripherals or other computers Connect PDA and desktop computer Several connection methods:
95
3G network
The bandwidth and location information available to 3G devices gives rise to applications not previously available to mobile phone users. Some of the applications are given in the next slide
Mobile TV a provider redirects a TV channel directly to the subscriber's phone where it can be watched. Video on demand a provider sends a movie to the subscriber's phone. Video conferencing subscribers can see as well as talk to each other. Location-based services a provider sends localized weather or traffic conditions to the phone, or the phone allows the subscriber to find nearby businesses or friends.
Telecommunications Processors
Modems (modulation/demodulation) Changes signals from analog to digital and back to analog The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals Modems are generally classified by the amount of data they can send in a given time unit, normally measured in bits per second (bit/s, or bps)
96
Telecommunications Processors
Multiplexers Allows a single communication channel to carry simultaneous data transmissions from many terminals A demultiplexer (or demux) is a device taking a single input signal and selecting one of many data-output-lines, which is connected to the single input. One use for multiplexers is cost savings by connecting a multiplexer and a demultiplexer (or demux) together over a single channel (by connecting the multiplexer's single output to the demultiplexer's single input).
Telecommunications Processors
Multiplexers The image below demonstrates this. In this case, the cost of implementing separate channels for each data source is more expensive than the cost and inconvenience of providing the multiplexing/demultiplexing functions.
Telecommunications Processors
Internetwork Processors
Switches
Makes connections between telecomm circuits so a message can reach its intended destination
Router
97
Telecommunications Processors
Hub
Port switching communications processor A device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment.
Telecommunications Processors
Gateway
A processor that interconnects networks that use different communications architecture acts as an entrance to another network A gateway is an essential feature of most routers, although other devices (such as any PC or server) can function as a gateway.
Telecommunications Software
Provides a variety of communications support services including connecting & disconnecting communications links & establishing communications parameters such as transmission speed, mode, and direction.
98
Telecommunications Software
Network Management
Network Topologies
Star
Ties end user computers to a central computer Considered the least reliable
Network Topologies
Bus
Local processors share the same bus, or communications channel Tree is a variation which ties several bus networks together
99
Network Topologies
Protocols
A standard set of rules & procedures for the control of communications in a network Standards for the physical characteristics of cables and connectors
Network Architecture
100
Bandwidth Alternatives
Bandwidth is the frequency range of a telecommunications network Determines the channels maximum transmission rate Measured in bits per second (bps) or baud Narrow-band
Low-speed transmission
Broadband
High-speed transmission
Switched Networks
Packet switched and circuit switched Integrated Services Digital Network (ISDN) Frame Relay Committed information rate Data bursts Asynchronous Transfer Mode (ATM) Various speeds and scalability The Internet
101
Chapter 9
E-commerce Trends, Models of e-commerce Overview of E-Business & E-Commerce
Types of E-Commerce & Models Business-to-Consumer (B2C) E- Commerce Business-to-Business (B2B) E-Commerce Electronic Payments Ethical and Legal Issues in E-Business
Learning Objectives
Describe electronic commerce, including its scope, benefits, limitations, and types. Distinguish between pure and partial electronic commerce. Understand the basics of how online auctions work. Differentiate among business-to-consumer, business-to-business, consumerto-consumer, business-to-employee and government-to-citizen electronic commerce. Describe the major e-commerce support services, specifically payments and logistics. Discuss some ethical and legal issues relating to e-commerce.
J&R .
Storefront in NYC
102
Overview
Electronic Commerce (E-Commerce, EC) Describes the buying, selling, transferring or exchanging of products, services or information via computer networks, including the Internet.
E-Business Is a broader definition of EC, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization.
Pure versus Partial Electronic Commerce depends on the degree of digitization involved. Brick-and-mortar organizations Virtual organizations Click-and-mortar organizations
FreshDirect
The following slides give you a look at FreshDirect, which is a partial EC, or clicks-and-mortar company.
103
104
105
Types of E-Commerce
Business-to-Consumer (B2C) Business-to-Business (B2B) Consumer-to-Consumer (C2C) Business-to-Employee (B2E) E-Government Mobile Commerce (m-commerce)
Name-your-own-price
Find-the-best-price
106
www.howstuffworks.com
Prof. Hemant Thakar
Group purchasing
Online auctions
Deep discounters
Membership
107
Bartering Online
Slides of electronic storefronts, electronic malls, and electronic market places are in subsequent sections
Prof. Hemant Thakar
Bid price
Bid price
108
Benefits of E-Commerce
Benefits to organizations Makes national and international markets more accessible Lowering costs of processing, distributing, and retrieving information Benefits to customers Access a vast number of products and services around the clock (24/7/365) Benefits to Society Ability to easily and conveniently deliver information, services and products to people in cities, rural areas and developing countries. Quick information flow
Limitations of E-Commerce
Technological Limitations Lack of universally accepted security standards Insufficient telecommunications bandwidth Expensive accessibility Non-technological Limitations Perception that EC is unsecure Unresolved legal issues Lacks a critical mass of sellers and buyers
Electronic malls
109
Disintermediation Example
110
Use Blue Niles decision support system to specify your own diamond
Travel services
111
Issues in e-Tailing
Online Advertising
Advertising is an attempt to broadcast information in order to influence a buyer-seller transaction. Online Advertising methods Banners Pop-up ad Pop-under ad Permission marketing Viral marketing
We must accept the fact that there is no mass in mass media anymore.
Jim Stengel, Global Marketing, Proctor & Gamble.
TV networks face disturbance because of ever-increasing attacks from digital media like Internet sites.
Jeff Zucker, chief executive of the NBC Universal Television Group.
We never know where the consumer is going to be at any point in time, so we have to find a way to be everywhere. Ubiquity is the new exclusivity.
Linda Kaplan Thuler, Chief Executive at the Kaplan Thaler Group, a New York ad agency.
112
The emergence of communitainment. The increasing popularity of Usites. Mainstreaming of the Internet. Declining usage of traditional media. Fragmentation of content consumption Consumers are multitasking and they do not like ads.
Source: PiperJaffrey
Communitainment
PiperJaffray, an investment bank, defines communitainment as the blending of community, communication, and entertainment into a new form of online activity driven by consumers. The bank predicts that consumers will shift more than 50% of their content consumption over the next decade to communitainment formats (e.g., social networking, video, and photo sharing sites), displacing traditional forms of media content like TV, magazines, and large Internet sites. This trend presents a major challenge for advertisers.
Usites
PiperJaffray defines Usites as Web sites with user generated content comprising all or most of their content.
113
Source: PiperJaffray
Prof. Hemant Thakar
114
Source: PiperJaffray
Prof. Hemant Thakar
Source: PiperJaffray
Prof. Hemant Thakar
Source: PiperJaffray
Prof. Hemant Thakar
115
Mall of Hawaii
for
116
117
(Sell-side marketplace)
118
(Sell-side marketplace)
119
Electronic Exchanges
Boeing PART
120
Horizontal Exchange
Functional Exchange
121
Electronic Payments
Electronic payment systems enable you to pay for goods and services electronically. Electronic checks (e-checks) Electronic credit cards Purchasing cards Electronic cash
122
Fraud on the Internet Domain Names Domain Tasting Cybersquatting Taxes and other Fees Copyright
CHAPTER 10
123
Chapter 10
E-business Infrastructure
E-business Infrastructure
Technical Infrastructure
This refers mainly to the hardware and networking infrastructure This includes the provision of servers, clients, networks and also systems software such as operating systems and browsers
124
E-business Infrastructure
Application Infrastructure
This refers mainly to the software provision of the infrastructure This is used to deliver services to employees, customers and other partners
E-business Infrastructure
Managing of E-business infrastructure requires decisions of Layers II, III, IV as mentioned in Figure above
Key management issue is standardization throughout the organization. This leads to reduced numbers of contacts for support and maintenance and can reduce purchase prices through multi-user licenses Decisions on the network will be based on the internal company network, which for the e-business will be an intranet, and the external network, either an extranet or linked to public Internet The main management decision is whether internal or external network management will be performed by the company or outsourced to third party
125
E-business Infrastructure
Layer IV Storage
The decision on Storage is similar to that for the transport layer Storage can be managed internally or externally E.g. Internet / Extranet are commonly managed internally while Internet storage such as corporate web site is commonly managed externally
ISP are telecommunication companies that provide access to the Internet for home and business users ISPs have two main functions Provide a link to a company or individual to access the World Wide Web Host web sites or provide a link from a companys web servers to enable other companies and consumers access to a corporate web site
126
Typical Problems
Web site communications too slow. Web site not available. Bugs on site through pages being unavailable or information typed in forms not being executed. Ordered products not delivered on time. E-mails not replied too. Customers privacy or trust is broken through security problems such as credit cards being stolen or addresses sold to other companies.
Applications Infrastructure
Traditionally businesses have developed fragmented or separate applications for different functions. These may develop at three different levels
127
Applications Infrastructure
Applications Infrastructure
To Avoid the problem of fragmented applications infrastructure, many companies turned to ERP (Enterprise Resource Planning) such as SAP, PeopleSoft, Oracle etc
ERP software provides integrated functions for major business functions such as production, distribution, sales, finance, HR etc
Applications Infrastructure
128
Mobile access devices Wi-Fi mobile access Bluetooth Next-generation mobile services Interactive digital television
129
Chapter 10
EDI An Overview
What is EDI? Why use it? How does it work? What does it take to implement? How much ongoing support is required? Who in Oregon is using it?
130
EDI An Overview
EDI Is the electronic transfer of information between two trading partners systems using a set of transactions that have been adopted as a national or international standard for the particular business function.
Print Transcript
Request Transcript
Prof. Hemant Thakar
EDI
Request Transcript
Prof. Hemant Thakar
131
Install translation & mapping software on stand-alone machine or on an existing server. Old, spare pc works great for EDI.Smart Trusted Link software requires Windows 95 or better
Internet Access
132
Software
Quick n Easy
Registration
Internet EDI server Free 1 e-mail Receive reply with username & password
Security
Freeware
133
Staffing
IT
Daily Operation Office Specialist/Transcript Staff Maintenance Same as Installation & Mapping
EDI or XML
XML Is a dynamic trading language that enables applications to flexibly, intelligently & cost efficiently exchange information. XML-based EDI is well suited to use over the Internet.
134
Characteristics of EDI
Provides standardized rigid format Stability and uniformity High level of security Point-to-point integration Exchanges large amounts of data with no intervention Requires dedicated EDI server Minimizes file size in the exchange Machine decipherable (difficult for a person to read) Focus on data and structure Not web based Many trading partners available
Characteristics of XML
Transacts over existing internet Focus on syntax and graphics Developed for graphic representations A way to format & manipulate text Very large file size Less efficient transmission
Characteristics of XML
Approved Version 1.0.0 by the Postsecondary Electronic Standards Committee in April 2004 UT Austin Server supports PESC XML standard XML users cannot trade with EDI users (crosswalk is being developed) Man and machine decipherable (easy to read by humans; not as secure)
135
NO
There are benefits of both EDI and XML. One significant factor in favor of EDI is that our current trading partners are using EDI.
Benefits of EDI
More Secure than paper Cost savings Acknowledgements from receiving institution Speed Easy partner exchange each term Automated transfer articulation Small file size
Perspectives
Server issues All technological systems need upgrades Staff training Interface with your student software system Move from SSN to generated ID Web transcript requests
136
Chapter 10
Website design tools Site design templates Custom design services Website hosting Web page advertising E-mail promotions Web advertising exchanges with affiliated sites Search engine registrations
Market
Personalized web pages Dynamic multimedia catalog Catalog search engine Integrated shopping cart Flexible order process Credit card processing Shipping and tax calculations E-mail order notifications
Transact
137
Website online help Customer service e-mail Discussion group and chat rooms Links to related sites
24/7 website hosting Online tech support Scalable network capacity Redundant servers and power User password protection Encrypted order processing Encrypted website administration Network fire walls and security monitors
Protect
Case - 05
NIT Scale Up
138
Case - 05
Nippon Telegraph and Telephone was established over a hundred years ago. Today it is the principal telecommunications company in Japan, with 58 million subscribers and over 500 branches throughout the country. Globally, over 3,200 multinational companies look to NTT for solutions to their telecommunications requirements. NTT America was founded in 1987 as a wholly-owned subsidiary of Nippon Telegraph and Telephone. Today, NTT America is a leading provider of state-of-the-art products and services, as well as a major player in communications research. The current pace of technological innovation requires new information services that go far beyond conventional telephony. NTT has been transforming itself into a multimedia company to meet todays and tomorrows needs. NTT America plays a significant role in that transformation.
Prof. Hemant Thakar
Case - 05
NTT Mobile is by far the largest supplier of cellular services in the world. The Tokyo-based company had 10 million subscribers as of March 1997. That number is expected to grow to 17 million by March 1998, even with the economic slowdown in Japan. However, competition is increasing. For example, regional competitor TuKa Cellular is increasing the number of cellular subscribers by nearly 10 percent per month. Such competition is putting pressure on the one-time monopoly NTT Mobile to lower rates and improve customer service. NTT Mobiles core mainframe systems were preventing the company from coping with rapid growth. Developed in the late 1980s, these systems were terminal-to-host applications that supported customer service representatives in 2,000 retail locations. A number of disparate, nonintegrated systems were bundled together to support the reps in initiating new customer accounts, handling customer support calls, and performing administrative functions.
Prof. Hemant Thakar
Case - 05
The lack of integration across systems was a serious problem. One system handled new accounts processing, another tracked equipment inventory levels, and a third stored customer information. Not only were the systems not integrated, they relied on batch processing to update corporate data. Things were so bad that a new customer would buy an NTT service, begin to use it, then return to the store for repair before NTT could get the customers information from the accounts processing system into the customer information system. Then, when the customer showed up for service, the NTT systems had no data about him or her. Obviously, this made it difficult to provide good customer service. To improve customer service, NTT formed the ALADIN project team to provide an integrated, up-to-the-minute view of the companys distributed mobile telecommunications business.
Prof. Hemant Thakar
139
Case - 05
The company had to replace the stand-alone, mainframe based applications with new, fully integrated client/server applications running on a 40-processor, two-node cluster Configuration of Sun Microsystemss large Enterprise 6000 SPARC-based symmetric multiprocessing server. NTT Mobile completed a successful pilot of the ALADIN system using the new system in two branch offices serving 200,000 customers. However, performance slowed to a crawl when the company attempted to roll out the system to handle 1 million customers. The root cause of the performance problem was that the ALADIN applications on the two-node Enterprise 6000 cluster were bogging down as they contended for common blocks of data on disk (called data contention). This problem is not uncommon in large clustered environments, because nodes in systems such as an Enterprise 6000 cluster share disk storage and a database. The database system manages users access to the data, keeping one user away from data while it is being used and updated by another.
Prof. Hemant Thakar
Case - 05
The applications, operating systems, and the database had to be tuned to minimize contention. After struggling awhile, the team decided to move the ALADIN application logic to separate application serversrunning on Sun SC 2000E hardwarethereby creating a three-tier client/server architecture. Additional tuning was done to the database management software and operating system to reduce data contention and boost the performance of the operating system. The tuning efforts took several months but eventually system performance improved dramatically and NTT Mobile completed the ALADIN rollout. Today the new system supports 13,000 users, generating almost 25,000 database updates every minute and managing some 40 terabytes of historical data. When NTT began the conversion, the number of users, updates, and data placed a greater workload on the Sun hardware than any other Sun customer.
Case - 05
Already the company has seen increased customer satisfaction and operational efficiency. Company agents are now able to process customer requests for service or support faster. The company has been able to substantially reduce the number of administrative workers needed to handle customer transactions, shifting them to other jobs. The system has been so successful, in fact, that NTT Mobile plans to extend ALADIN to its pager business, thus adding 5 million customers.
140
Would you describe NTTs new system as a two-tier or three-tier client/server system? What type of computer is at each tier?
NTT experienced a performance problem when the pilot system expanded. Would you expect to see a similar performance problem when the system is expanded to serve the 5million pager customers? How might this be avoided? Sources: Adapted from NTT America Web site at http:www.nttamerica.com,
accessed May 26, 1998 and Jeff Moad, Sun Rises to the Occasion, PC Week, March 2, 1998, pp. 77, 83.
Chapter 11
Introduction to e-Business Systems - I: Batch Processing
141
E-Business System
Cross-functional e-business systems that enhance communication, coordination, & collaboration Communicate share information with each other Coordinate coordinate individual work efforts & use of resources with each other. Collaborate work together cooperatively on joint projects and assignments
E-Business System
Tools for Enterprise Collaboration Electronic communication E-mail Voice mail Fax Web publishing Bulletin boards Paging Internet phone systems
E-Business System
Electronic conferencing Data & voice conferencing Videoconferencing Chat systems Discussion forums Electronic meeting systems
Synchronous. Team members can meet at the same time and place in a decision room setting
Calendaring & scheduling Task & project management Workflow systems Knowledge management
142
Batch Processing
Computers store data by organizing smaller units of data into large, more meaningful ones. Two basic types of files are used to store data. The master file, which is conceptually similar to a ledger in a manual system. The transaction file, which is conceptually similar to a journal in a manual system. Records are typically updated, stored, and retrieved using an identifier called a primary key. The primary key must be unique for each entity. A secondary key is another field used to identify a record. Secondary keys do not uniquely identify individual records, but identify a group of records.
Batch Processing
Batch processing is updating master files periodically to reflect all transactions that occurred during a given time period. The master file is updated at set times or whenever a manageable number of transactions are gathered. Transaction data can either be entered as a batch or as each transaction occurs.
Batch Processing
Master File
143
In on-line, real-time processing, the computer electronically,... edits it for accuracy and completeness, and... immediately processes it.
captures
data
Master File
Advantages
The main advantage of batch processing was efficiency in processing. On-line data entry is more accurate than periodic batch input because the system can refuse incomplete of erroneous entries. Real-time processing ensures that the information in master files is always current.
144
Integrated combinations of information subsystems that share information resources and support business processes across the functional units A strategic way to use IT to share information resources & improve efficiency & effectiveness Focused on accomplishing fundamental business processes in concert with the companys customer, supplier, partner, & employee stakeholders
Software enables users to model the business processes involved in the interactions that should occur between business applications. Also provides middleware that Performs data conversion & coordination Provides application communication & messaging services Provides access to the application interfaces Business value Integrates front-office and back-office applications to allow for quicker, more effective response to business events and customer demands Improves customer and suppler experience with the business because of its responsiveness.
145
CHAPTER 12
Chapter 12
Introduction to e-Business Systems - II:
Collaboration systems Overview-Computer aided design (CAD) Overview-Computer aided manufacturing (CAM)
CAD (Computer Aided Design) is used all over the world by many different types of engineering manufacturers. You are probably familiar with some forms of CAD software which you may have used in school, e.g. 2D design, Corel Draw, Solid Edge, Prodesktop.
146
In industry, CAD refers to any computer software that is used to produce high quality drawings and models which meet exact specifications. CAD software is often then linked to machinery to perform a task to manufacture part of or a whole product; this is known as CAM (Computer Aided Manufacture).
What is Computer Aided Manufacturing? It is control of the manufacturing process by computers involving the integration of CAD engineering data and the computerized equipment which manufactures the product.
- (Russell, Taylor 213)
Other definitions: Computer aided manufacturing concerns the use of algorithms for planning and controlling fabrication processes.
- (utwente.nl)
Computer aided manufacturing is the use of computers for managing manufacturing processes.
-(techtarget.com)
Using technology to produce Leveraging capital investments Increasing productivity through automation Decreasing lead time through programmatically controlled machinery
147
CAM (Computer Aided Manufacture), like CAD, is used all over the world by many different types of engineering manufacturers. CAM allows products to be manufactured with very little effort compared to more hands on techniques where humans are controlling the machines. CAM involves using CNC (Computer Numerical Control), whereby a machines movement is described in exact detail by the computer program.
Mobile phones Trains Mountain bikes Games consoles Many, many more
Case - 06
148
Case - 06
E-commerce sites need to shift their focus from North American consumers as the use of the Internet grows rapidly in markets throughout Europe, Asia, and Latin America. The majority of Internet users will live outside the United States by 2003, and the U.S. share of all E-commerce revenues are projected to shrink from 69 percent in 2000 to 59 percent by 2003. Online retail sales in Europe will grow at a rate of 98% annually over the next five years, soaring from 2.9 billion euros in 1999 to 175 billion euros in 2005. Companies that want to succeed on the Web cannot ignore the global shift. Developing a sound strategy is critical for ensuring that a global E-commerce effort leads to Web sites that are relevant to the consumers and businesses the company wants to reach, whether those customers are in Cleveland, Singapore, or Frankfurt.
Case - 06
The first step in developing a global E-commerce strategy is to determine which global markets make the most sense for selling products or services online. One approach is to target regions and countries in which a company already has online customers. Companies can track the country domains from which current users of a U.S.-centric site are visiting, and established global companies can look to their overseas offices to help determine the languages and countries to target for their Web sites.
Once the company decides which global markets it wants to reach with its Web site, it must adapt the existing U.S.-centric site to another language and culturea process called localization. Localization requires companies to have a deep understanding of the country, its people, and the market, which means either building a physical presence in the country or forming partnerships so that detailed knowledge can be gathered.
Prof. Hemant Thakar
Case - 06
Companies must be prepared to take painstaking steps to ensure that Ecommerce customers have a local experience even though theyre shopping at the Web site of an American company. Some of the steps involved in localization require recognizing and conforming to the nuances, subtleties, and tastes of local cultures, as well as supporting basic trade laws and technological capabilities such as each countrys currency, local connection speeds, payment preferences, laws, taxes, and tariffs. For example, when Dell Computer launched an ecommerce site to sell PCs to consumers in Japan, it made the mistake of surrounding most of the sites content with black borders, a negative sign in Japanese culture. Japanese Web shoppers took one look at the site and fled. Support for Asian languages is difficult because Asian alphabets are more complex and not all Web development tools are capable of handling them.
Prof. Hemant Thakar
149
Case - 06
As a result, many companies choose to tackle Asian markets last. In addition, great care must be taken to choose icons that are relevant to a country. For example, the use of mailboxes and shopping carts may not be familiar to global consumers. Users in European countries dont take their mail from large, tubular receptacles, nor do many of them shop in stores large enough for wheeled carts. One of the most important and most difficult decisions in a companys global Web strategy is whether Web content should be generated and updated centrally or locally. Companies that expand through international partnerships may be tempted to hand control to the new international entities to take the greatest advantage of the expertise of employees in the new markets. But turning over too much control can lead to a muddle of country-specific sites with no consistency and a scattered corporate message. A mixed model of control may be best.
Prof. Hemant Thakar
Case - 06
Decisions about corporate identity, brand representation, and the technology used for the Web sites are made centrally to minimize Web development and support effort as well as to present a consistent corporate and brand message. But a local authority decides on content and services best tailored for given markets. Companies must also be aware that consumers outside the United States will access sites with different devices and modify their site design accordingly. In Europe, for example, closed-system iDTVs (interactive digital televisions) are becoming a popular way to access online content, with iDTVs projected to reach 80 million European households by 2005. Such devices have better resolution and more screen space than PC monitors U.S. consumers use to access the Internet. So users of iDTVs expect more ambitious graphics.
Prof. Hemant Thakar
Case - 06
A new group of software and service vendors has emerged to address Web globalization issues. The group includes companies such as Idiom, GlobalSight, and Uniscape.com. Their software can integrate with popular E-commerce and Web content management software from vendors such as Vignette, BroadVision, and Interwoven. The multilingual Web site management software can work especially well for global sites with central management.
On the Web, ultimately the only way to fight global companies is to be a global company. Successful firms operate with a portfolio of storefronts designed for each target market, with shared sourcing and infrastructure to support the network of stores, and with local marketing and business development teams to take advantage of local opportunities. Service providers continue to emerge to solve the cross-border logistics, payments, and customer service needs of these pan-European retailers.
Prof. Hemant Thakar
150
Outline the major steps in taking a U.S. Web site global. What is meant by central control versus local control of the Web site content? Which approach is better? Why? Critical Thinking Questions Which approach is better to gain a deep understanding of a country, its people, and the marketform a partnership with a company in the country or hire a software vendor familiar with Web globalization issues. Why? Your company has just completed globalization of its Web site to address the needs of customers in seven countries in Latin America. How would you go about evaluating the success of this effort?
Case - 07
151
Case - 07
General Electric (GE) is a diversified services, technology, and manufacturing company that operates in more than 100 countries and employs nearly 340,000 people worldwide, including 197,000 in the United States. GE Aircraft Engines (GEAE) is a division of GE, with annual sales in excess of $10 billion and 33,000 employees worldwide. It is the world's largest producer of large and small jet engines for commercial and military aircraft. GEAE also supplies engines for boats and provides aviation services. Throughout the 1990s, more than 50% of the world's large commercial jet engine orders were awarded to GE or CFM International, a joint company of GE and Snecma of France. W. James McNerney is the president and chief executive officer (CEO) of GEAE, which is headquartered in Cincinnati.
Case - 07
Under the leadership of its highly respected chairman and CEO, John F. Welch, GE has earned a number of awards as the Worlds Most Admired Company (by Fortune magazine in 1998 and 1999) and the Worlds Most Respected Company (by the Financial Times in 1998 and 1999). However, in May 1999, it became clear that a key E-commerce project was floundering. To fix the situation, GEAE CEO Jim McNerney recruited a former Green Beret, John Rosenfeld, to take on part of the failed project, a customer Web center for the complex spare-parts business, and build it at lightning speed. The mandate was to be operational within seven months.
Case - 07
This challenging goal was met, and today GEAEs Customer Web Center has the following functions: Spare-parts order management, Checks parts availability, finds alternative parts, places orders, builds automated parts lists (for parts usually ordered together), checks status of orders, and tracks orders via UPS and FedEx. Component repair and engine overhaul. Checks status of repair and overhaul work in shops around the world and accesses initial findings reports and cost estimates, including corresponding high-resolution digital photos of damaged parts. Spare-parts warranty. Submits warranty claims, reviews status of claims, and generates reports.
152
Case - 07
Technical publications. Finds information from illustrated parts catalogs, engine service manuals, standard practice manuals, fleet highlights, and service bulletins. Online wizards. Will determine return on investment for engine upgrades (e.g., part X will save Y dollars in maintenance over time frame Z). Online video training. Will help users brush up on how to remove, install, or service a part. Assume you are the manager of a critical E-commerce project in the Consumer Appliances division of GE that must be completed as soon as possible. You have made a visit to Cincinnati to meet with Jim McNerney and John Rosenfeld to see if you can reapply the GEAE Web site for Consumer Appliances.
What questions will you ask about the technical infrastructure and capabilities of the Web site to assess whether it will meet the needs of the Consumer Appliances division? To what degree will you involve the customers of the Consumer Appliances division in the assessment of the ability of the GEAE Web site to meet their needs? Critical Thinking Questions
What similarities are there between the spare-parts business for aircraft engines and consumer appliances? What are some of the differences?
How might you assess whether the GEAE Web site has the functionality needed to support the Consumer Appliances division? Sources: adapted from Marcia Stepanek, How to Jump-Start Your E-Strategy,
Business Week, June 5, 2000, pp. 96100; The $11 Billion Web Start-up, Computer World, May 1, 2000, pp. 5660; GE Fact Sheet, General Electric Web site, *http://www.ge.com/factsheet.html, accessed May 26, 2000.
153
Chapter 13
Enterprise e-Business and E-commerce Systems- I:
Challenges of SCM
A cross-functional inter-enterprise system that uses IT to help, support & manage the links between some of a companys key business processes and its suppliers, customers, & business partners. Goal is to create a fast, efficient, & low-cost network of business relationships. Electronic data interchange Exchanging business transaction documents over the Internet & other networks between supply chain trading partners
154
Benefits and Challenges Provide faster, more accurate order processing, Reductions in inventory levels, Quicker time to reach market place, Lower transaction and materials costs, & Strategic relationships with suppliers
155
Problem causes Lack of proper demand planning knowledge, tools, and guidelines Inaccurate or overoptimistic demand forecasts Inaccurate production, inventory, and other business data Lack of adequate collaboration
Trends
156
Chapter 14
Enterprise e-Business and E-commerce Systems- II:
Serves as a cross-functional enterprise backbone that integrates & automates many internal business processes and information systems Helps companies gain the efficiency, agility, & responsiveness needed to succeed today
Gives a company an integrated real-time view of its core business processes ERP software suites typically consist of integrated modules of Manufacturing Supply chain & Distribution Customer relationship management Finance / Accounting Human Resource Management
157
Helps improve the quality and efficiency of customer service, production, & distribution by creating a framework for integrating and improving internal business processes
Decreased Costs
Reductions in transaction processing costs and hardware, software, and IT support staff
Decision support Provides cross-functional information on business performance to assist managers in making better decisions Enterprise agility Results in more flexible organizational responsibilities, and work roles
structures,
managerial
158
Causes of ERP failures Under-estimating the complexity of the planning, development, and training required
Failure to involve affected employees in the planning & development phases and change management programs
The costs and risks of failure in implementing a new ERP system are substantial. Customization is problematic. Overcoming resistance to sharing sensitive departments can divert management attention. information between
Trying to do too much, too fast Insufficient training Believing everything the software vendors and/or consultants say
159
Chapter 15
Enterprise e-Business and E-commerce Systems- III:
Provides customer-facing employees with a single, complete view of every customer at every touch point and across all channels Provides the customer with a single, complete view of the company and its extended channels Integrates and automates many of the customer serving processes Creates an IT framework of Web-enabled software & databases that integrates these processes with the rest of the companys business operations Includes software modules that provide tools that enable a business & its employees to provide fast, convenient, dependable, consistent service.
160
Helps capture and track relevant data about past and planned contacts with prospects & customers.
Sales Provides sales reps with software tools & company data needed to support & manage their sales activities. Helps optimize cross-selling & up-selling
Helps accomplish direct marketing campaigns by automating tasks Helps capture & manage prospect & customer response data Helps in fulfillment by quickly scheduling sales contacts & providing appropriate information on products & services to them
Provides software tools & real-time access to the common customer database Helps create, assign, & manage requests for service from customers Call center software Help desk software
Retention and Loyalty Programs Helps the company identify, reward, and market to their most loyal and profitable customers
Helps accomplish direct marketing campaigns by automating tasks Helps capture & manage prospect & customer response data Helps in fulfillment by quickly scheduling sales contacts & providing appropriate information on products & services to them
Provides software tools & real-time access to the common customer database Helps create, assign, & manage requests for service from customers Call center software Help desk software
161
By doing a superior job of contact management, sales prospecting, selling, direct marketing, & fulfillment.
By supporting superior service from a responsive networked team of sales and service specialists.
Benefits and Challenges Quality and efficiency Decreased costs Decision support Enterprise agility Allows a business to identify its best customers Makes possible real-time customization & personalization of products & services based on customer wants, needs, buying habits, & life cycles Enables a company to provide a consistent customer service experience
162
Failures Tools and workflows can be complex, especially for large businesses due to lack of understanding & preparation. Implementations are fragmentedisolated initiatives by individual departments to address their own needs Human response at all levels of the organization can affect the customer experience for good or ill. Even one unhappy customer can deliver a body blow to a business
CHAPTER 16
OUTSOURCING
Chapter 16
Outsourcing: Total cost of Ownership
163
Contents
What Is Outsourcing?
Outsourcing can be defined as the strategic use of outside resources to perform activities traditionally handled by internal staff and resources. Sometimes known also as facilities management, outsourcing is a strategy by which an organization contracts out major functions to specialized and efficient service providers, who become valued business partners.
164
Types of Outsourcing
Tactical Outsourcing: Usually tied to a specific problem being experienced by an organisation and is often seen as a way of addressing this problem. Often these relationships are forged to: Generate immediate cost savings Eliminate the need for future investment Relieve the burden to staff Normally after tactically outsourcing there is a corporate restructuring
Strategic Outsourcing: Usually follow on from tactical whereby you are trying to get more out of the relationship from outsourcing through intangible benefits. Contract values are higher and the relationship is closer than in tactical. The thought process is one of long term.
Cost Saving Focus on Core Business Reduce and control operating costs Make capital funds available Operational Expertise Tax Benefits Shared risks Access to world class capabilities
Resources not available internally Improve company focus Function difficult to manage or out of control
165
Client focused approach Clear value proposition/competitive advantage Defined products Internal marketing/product managers Internal account managers Service-minded people
Loss of control
Is it perception or reality? Both! It is in part fear of not understanding what will happen Wanting to know exactly how it will be done Wanting to ensure that the process does not change Not understanding the outsourcing proposition
Why does it happen? Business requirements ill defined Objective of outsourcing not documented or understood Haste in the decision making process Cultural clash Not handing over the process
What constitutes your finance function? Accounts Payroll VAT Preparation of management, P&L accounts and reports Financial direction Invoice processing Debt management Treasury Preparation of end of year accounts End of year audit Budgeting
166
The costs of your finance function are driven by: Preparation of management, P&L accounts and reports, Salaries Training IT support Stationery Communications (postage, phones) External services (audit, consultants) Fees (annual filing)
What Is Required?
Need to define the primary objective of the exercise. For example is it:
Need to articulate the problem with the current service whether internal or external? What is the current cost?
Investment Appraisal
Why is this important?
Baseline Cost
Current costs
Return on Investment Net Present Value Internal Rate of Return Payback Period Without considering these you are not going to make an informed decision to do this you need to know your baseline cost
Theoretical reduction
167
Current Costs
Cost Of Outsourcing
Direct Costs
Staff costs and benefits Direct costs associated with the process Ongoing investment costs
One off costs Outsourcers fees for transition Redundancy costs, both staff and infrastructure Contract termination costs Time Investment in researching options Management of transition Ongoing relationship management Annual costs Inflationary costs Increase in volume Outside of contract items
Indirect Costs
Staff costs and benefits System costs and maintenance Overheads The question on indirect cost is how much can it be reduced by outsourcing or will it just be reallocated?
How To Outsource
Holistic approach - ensure that you have a multi disciplinary approach to the feasibility review Base line costing - define the base line costs accurately so you are able to measure the success of your implementation Management commitment - obtain senior line management commitment before we even think about starting implementation
Implementation - standardise with pragmatic reengineering and consolidate first - it is then easier to radically reengineer
Best practices - adopt best internal practice for consolidation, and then global best practices for reengineering Customer focus - implement a customer focused culture - using teams, performance measurement and service level agreements Leadership - appoint leaders with entrepreneurial flair who will run sections like a business, not a staff function
Managing risk
The Process During Outsourcing
Phase I - feasibility
define the areas develop the business case high level implementation plan
Phase II - design
revise organisation define processes define performance measurements systems/information requirements operating procedures location analysis pilots and migration schedule
Phase IV optimise
performance evaluation continuous improvement update processes and systems
168
Location of Vendor
Managing Relationships
So you just outsourced your... what now? There needs to be a channel for communication Needs to be regular meetings to discuss: issues, performance, changes to processes and additional items to be included Monitoring and reporting on Service Level Agreements Need to approach the relationship as allies, define the mechanism for escalating a problem and for conflict resolution
169
Change of management that have no experience or understanding of outsourcing Management not being honest to the outsourcer about internal issues Responsibilities of management in relation to the outsourcing not understood Selection of wrong offshore outsourcing vendor Expectations that all other issues related to the department, process or function that has been outsourced will disappear Working with the outsourcer as a supplier Not taking the time to understand each others culture Relationship is not managed Political or other instability in outsourced country
Summary
Understand why you want to outsource Be prepared for some loss of control Make sure that you know your baseline cost Understand how to the outsourcing transition process works and manage the risk of transition! Outline your primary objective and articulate current problems Pick your vendor carefully! Once up and running: communicate and manage conflict Build an in-house management team to monitor the project to completion Be alert things can go wrong Be ready for the point of no-return Make sure your enjoy the benefits!
Case - 08
170
Case - 08
As discussed in the E-Commerce box, companies are starting partnerships to form Internet exchanges. Although some exchanges are general purpose, most are oriented towards the procurement function of transaction processing. In supporting these exchanges, businesses hope to save significant amounts of time and money in purchasing the parts, supplies, and services needed for these companies to manufacture their products ranging from cars to agricultural products. In addition to companies forming these strategic alliances, others are developing procurement businesses and Internet exchanges for the general market. One example of this move is the alliance of Chase Manhattan Bank and Deloitte Consulting.
Case - 08
In early 2000, Chase Manhattan Bank and Deloitte Consulting decided to form a new company. The overall objective of the new firm is to offer Internet-based procurement services to larger, Fortune 1,000 companies. Chase and Deloitte hope to make a profit from the new company and also save the companies that participate money. On average, Chase and Deloitte forecast that each company participating in the new Internet procurement system should save from $200 million to $350 million annually. The cost savings are expected to come from combining the purchasing needs of all participating companies to obtain better volume discounts. The new Internet procurement firm, however, is still in the planning stage. The name of the new firm, the technology to be used, and who will head the new company has not been determined.
Prof. Hemant Thakar
Will this new Internet procurement firm be attractive to the average Fortune 1,000 company? Do you think that other companies will also try to start Internet procurement companies? Critical Thinking Questions
Assume that you are the manager of a Fortune 1,000 manufacturing company. Discuss the advantages and disadvantages of this approach to procurement. Would you be willing to sign a long-term contract to be a part of this firm? Assume that several Fortune 1,000 manufacturing companies are considering forming a strategic partnership to form an Internet exchange. Compare and contrast this approach with the type of Internet procurement firm discussed in this case.
171
Case - 09
Case - 09
Federal Express and SAP are working together to provide software that integrates FedExs shipment tracking capability and logistics with SAPs R/3 ERP software. A module of the software runs on R/3 and automatically generates FedEx shipping documents and tracking numbers for products ordered using SAPs R/3 software. When the products are delivered by FedEx, transactions are sent from FedEx to update data in R/3. The goal is to make R/3 work like a standard business process and automatically trigger other processes, such as proof of delivery and payment. The applications are designed to give the 13,000 enterprises deployed on SAP R/3 real-time package life-cycle information. The SAP/FedEx applications, dubbed The Product, dovetail with SAPs development of a suite of supply-chain products. We think this is a turning point in the industry, said Paul Wahl, chief executive officer of SAP AG.
Prof. Hemant Thakar
172
Case - 09
Wahl says that applications for spotting bottlenecks, reacting to customer orders, and linking transportation with production schedules are among the five top priorities for SAP. Others include electronic commerce buying tools and systems for meshing Internet transactions with financial systems. Most of our customers are in the process of integrating an enterprise system, says Laurie Tucker, senior vice president of logistics, electronic commerce, and catalog, a $500 million FedEx unit. They are looking for ways to improve return on investment and are interested in any business process that can be integrated, as opposed to being separately invoked. Our most innovative customers are pushing us and their other suppliers for that integration. The functionality provided by the FedEx/SAP alliance is no small matter. The two companies are talking about systems that enable businesses to track components used in manufacturing processes from raw material to market. However, it is also in line with the rest of the industry.
Prof. Hemant Thakar
Case - 09
United Parcel Service of America says it is in pilot tests with a half-dozen corporate customers for similar functionality, and IBM Software recently rolled out a suite of Java applications for freight carrier J.B. Hunt. Fundamentally, SAP plans to extend its architecture to support multiplecarrier systems, Wahl said. He added that supply-chain planning is the largest single development effort at the billion-dollar software powerhouse, commanding the time of more than 250 engineers.
This type of software is an important addition to enterprise resource planning software. There is a real need to automate the logistics of delivering goods. Despite the advances in Internet connections, those companies dealing in tangible products still must rely on the same old business processes to physically deliver the products.
What sort of companies would be most interested in this integrated solution? Why? Can you identify other important additions to enterprise resource planning software that would require similar partnering?
173
Case - 10
Case - 10
When powerful IBM and software giant Microsoft both use another companys software to run their basic transaction processing system, the software must be good. In both cases, the companies are using a new type of software called Enterprise Resource Planning (ERP) software. ERP software runs all the major transaction processing activities for a business. The integrated nature of ERP allows a company to coordinate all core business activities using one powerful software package. From an order taken through the final delivery of the product or service, ERP software supports all critical activities among them: order processing, inventory control, production scheduling, supplier coordination, material flow during manufacturing, product delivery, and managerial decision making. Orders are recorded and processed using ERP. Inventory control is performed using ERP. Scheduling production is another function of ERP software.
Prof. Hemant Thakar
Case - 10
Coordinating suppliers can also be achieved. ERP excels at following the flow of items as they are manufactured and sent to customers. As a result, companies can give customers firm commitments for product delivery and service, while reducing costs. ERP also provides managers with a wealth of information about how transactions are being processed and basic business operations. The growth in ERP systems has been phenomenal. In addition to IBM and Microsoft, many other large companies are installing ERP systems. Monsanto spent more than two years implementing an ERP system. Kodak is relying on ERP to help it compete in the tough photo and camera market. Procter & Gamble is also installing ERP worldwide. Chevron estimates that ERP could save it 25 percent annually.
174
Case - 10
SAP was one of the first companies to produce and market ERP software. Founded in 1972, by five former employees of IBM, SAP America is the market leader with its R/3 software. When R/3 was first released in 1993, 1,000 R/3 packages were sold. In a few short years, sales jumped to about 9,000 packages. Sales growth has averaged over 35 percent annually. SAP, however, is not alone in the ERP market. Other companies are starting to market and sell their own versions of this popular software. Oracle, for example, has started selling ERP software to work with its large and popular database applications. PeopleSoft is another ERP software vendor. Starting with a human resource planning package, PeopleSoft now sells ERP packages to large companies. Baan is yet another ERP provider.
How does using an ERP system differ from using a conglomeration of transaction processing systems from a variety of vendors? Pick a company and discuss how an ERP could process its transactions. What are the benefits and disadvantages of ERP? Sources: Adapted from Michael Martin, An Electronics Firm Will Save Big
Money Using Enterprise Resource Planning, Fortune, February 2, 1998, p. 149; Randy Weston, ERP Vendors Going with the Flow, Computerworld, January 26, 1998, p. 53; Michael Mecham, SAP Targets Aerospace for R/3 Applications, Aviation Week and Space Technology, January 10, 1998, p. 61.
175
Chapter 17
Decision Support System - I:
Group Decision Support System Decision Structure Decision Support system versus management reporting
What is a data warehouse? How did data warehousing came in to existence? What purpose does it solve?
DW
DW
DW
DW
Prof. Hemant Thakar
176
Conceptually A Data warehouse is a home for second hand data that originates in either other corporate application or some data source external to your company.
Formally A data warehouse is a stand alone repository of information, integrated from several, possibly heterogeneous operational databases
Before1970s
1970s
1980s
1990s
177
A process, not a product The process of creating a well designed information management solution which enables information and analytical processing without the barrier of geography and organization
Systems Maturity
Enterprise Resource Planning Customer Support, Call center Inventory Operations Order Processing
Cross Office
Front Office
Back Office
What Is A DSS?
Decision Support System (DSS) are interactive computer based systems intended to help decision makers utilize data and models to identify and solve problems and make decisions. Data warehouse is the foundation of DSS process. It is a strategy and a process for staging corporate data.
178
Management is a process by which organizational goals are achieved through the use of resources (people, money, energy, materials, space, time). Decision refers to a choice that individuals and group make among two or more alternatives.
Decision making is a systematic process composed of three major phases: intelligence, design and choice (Simon 1977) Implementation phase was added later.
Descriptive in that it describes how decisions are actually made. means that people have limits, or boundaries, on how rational they can be. Assumes that decision makers operate with limited (or "bounded") rationality - : a manager must settle for limited or bounded rationality. In other words, limitations of information, time and certainty limit rationality, even if a manager tries earnestly to be completely rational. Since managers can not be completely rational in practice. They sometimes allow their dislike of risk to interfere with the desire to reach the best solution under circumstances. Assumes that decision makers identify a limited number of decision making criteria, that they examine a limited range of alternatives and that they do not possess all the information needed to make a decision. Herbert Simon called this satisfying that is, picking a course of action that is satisfactory or good enough under circumstances.
Decision making proceeds sequentially: alternatives are examined one at a time and the first satisfactory alternative that is found is selected. Decision maker uses satisfying, selecting the first alternative that meet the minimal criteria. Satisfying: means that decision makers choose the first solution alternative that satisfies minimal decision criteria. Rather that pursuing all alternative to identify the single solution that will maximize economic returns, managers will opt for the first solution that appears to solve the problem, even if better solutions are presumed to exist.
179
Design Phase
Identify and evaluate as many as possible potential solutions Discard unsatisfactory solutions to reduce the no. of alternatives
Choice Phase
The actual work of finding the best algorithm, from the given set of algorithm and decreasing it over time along a given schedule. After deciding the algorithm that is the most suitable for the programming we move to the next step which is the implementation phase
The real implementation of the solution is done Implement the solution to the given problem by using the algorithm according to the given problem.
The number of alternatives to be considered constantly increases. Decisions must be made under time pressure. Decisions are more complex Decision makers can be in different locations and so is the information.
180
Problem Structure
The first dimension deals with the problem structure, where does the decision making processes fall along the continuum ranging from highly structured to highly unstructured decisions. Structured Unstructured Semistructured
181
Business Intelligence (BI) Two types of BI Systems: Those that provide data analysis tools
Multidimensional data analysis (or online analytical processing) Data mining Decision support systems Dashboards
Provides users with a look at what is happening or what has happened. Allows users to analyze data in such a way that they can quickly answer business questions.
182
Data Mining
Searching for valuable business information in a large database or data warehouse. Data mining performs two basic operations: Predicting trends and behaviors Identifying previously unknown patterns and relationships
Decision support systems DSS capabilities Sensitivity analysis What-if analysis Goal-seeking analysis
Group decision support system (GDSS) is an interactive computer-based system that supports the process of finding solutions by a group of decision makers. Decision Room is a face-to-face setting for a group DSS, in which terminals are available to the participants.
183
Organizational Decision Support System (ODSS) is a DSS that focuses on an organizational task or activity involving a sequence of operations and decision makers.
CHAPTER 18
Chapter 18
Decision Support System II Executive information Systems
184
Expert Systems
The transfer of expertise from an expert to a computer and then to a user involves four activities: Knowledge acquisition Knowledge representation Knowledge inferencing Knowledge transfer
185
Executive information systems (EIS) Executive support systems (ESS) Enterprise information systems (EIS)
A computer-based system that serves the information needs of top executives Provides rapid access to timely information and direct access to management reports Very user-friendly, supported by graphics Provides exceptions reporting and "drill-down" capabilities Easily connected to the Internet Drill down
186
Part of enterprise resource planning (ERP) systems For business intelligence Leading up to enterprise information portals management systems
and
knowledge
Characteristics of EIS
Drill down Critical success Factors (CSF) Status access Analysis Exception reporting Colors and audio
A knowledge based expert system that uses its knowledge about a specific, complex application area to act as an expert consultant. Provides answers to question in a very specific problem area. Must be able to explain reasoning process and conclusion to the user
187
Facts about a specific subject area Heuristics that express the reasoning procedures of an expert on the subject.
Software Resources Contains an inference engine and other programs for refining knowledge and communicating
Inference engine processes the knowledge, and makes associations and inferences User interface programs, including an explanation program, allows communication with user
KBES Model
Knowledge Base
Inference Mechanism
188
CHAPTER 19
Chapter 19
Decision Support System III
Artificial Intelligence Business Intelligence system-Introduction, Stages, Applications and Dash Boards
Digital Dashboards
Dashboards: Provide rapid access to timely information. Provide direct access to management reports. Are very user friendly and supported by graphics.
189
A Bloomberg Terminal
190
Management Cockpit
Management Cockpit
A strategic management room that enables top-level decision makers to pilot their businesses better. The environment encourages more efficient management meetings and boosts team performance via effective communication. Key performance indicators and information relating to critical success factors are displayed graphically on the walls of the meeting room. External information can be easily imported to the room to allow competitive analysis.
Virtual Reality
191
Driving Simulator
192
Flight Simulator
External View
Prof. Hemant Thakar
Internal View
Intelligent Systems
193
Case - 11
Case - 11
Miller SQA, a subsidiary of Herman Miller, Inc., is implementing a decision support system (DSS) at plants in Holland, Mich. and Rocklin, Calif. With DSS as part of its Quick Response Methods (QRM) program, Miller SQA looks to achieve quicker and more reliable customer response and to reduce the lead time from receipt of a customer order to production of the finished product to just two-days for a minimum of 25 percent of customer orders compared to five percent today. The company also expects to maintain its 100 percent on-time delivery performance, while achieving an expected 30 percent sales growth rate each year. Additionally, Miller SQA is looking to cut costs by significantly reducing its inventory levels and also making more effective use of floor space. Our customers want convenient buying, fast delivery, durability, just the right amount of options and no hassles selecting office furniture, said Doug Bonzelaar, Application Development Manager at Miller SQA.
Prof. Hemant Thakar
Case - 11
The Quick Response Method initiative is designed to support these customer goals. Miller SQA is implementing a DSS to provide decision making support for production planners who work in a fast-paced environment and must react quickly to customer changes, schedule changes, and process variation. The system also will improve allocation of raw materials by providing an accurate schedule and ensuring that the delivery of parts is coordinated with production schedules.
The DSS will help us improve cycle times and reduce finished goods inventory through its detailed scheduling of sales order line items. We expect to eliminate our daily fire drills of resolving issues where we find a high-priority component is on schedule, only to learn a companion piece at another work center has a completely different schedule, said Bonzelaar.
194
Case - 11
With Microsoft Windows clients, the DSS software graphically displays the status of each job to Miller SQA personnel, supporting workers on the shop floor, as well as management, purchasing and other departments. Shop floor workers also will use the DSS to determine what jobs to assemble, to input quantities produced, to view special instructions, to report status exceptions, and to post completed jobs. The software displays problem areas as they occur and notifies the responsible department. At the heart of the DSS is Graphical Process Modeling. This component fuels Miller SQAs Bill of Process (BOP), a database that defines all the resources and activities necessary to produce goods and services. The BOP defines manufacturing operations, such as routings and resource needs, material requirements, and other support items such as specifications, approvals, tools and programs. It also communicates to support centers regarding raw material procurement, engineering, and transportation activities..
Prof. Hemant Thakar
Case - 11
The software translates plans or schedules into the details necessary for execution, including on-line dispatch lists with up-to-the-minute requirements for parts, people, machines, product specifications, and support activities. Because the system constantly runs and reevaluates actual status versus projected status, the software identifies variances and their impact as they occur. The software answers the questions, Can I fulfill the customer's demand when he wants it? and later, as the order is in process, Do I need to make any schedule adjustments to meet the customer's need date? Importantly, the system tells the end user what to do next, not what has already happened. It allows schedulers to perform their real jobs plan for future activities and not have to expedite.
How do managers use a decision support system? How is it different from an MIS? How must the knowledge, experience, and insights of a manager be coupled with the outputs from a DSS to yield good decision making?
Sources: adapted from About Synquest found at the SynQuest Web site at:
*http://www.synquest.com accessed May 27, 1998 and Craig Stedman, Planning Systems Hit Shop Flo
195
CHAPTER 20 & 21
Chapter 20 & 21
Security and Ethical Challenges - I:
Disaster Recovery
Ethical Responsibility
The use of IT presents major security challenges, creates serious ethical questions, and affects society in significant ways. IT raises ethical issues in the areas of.. Crime Privacy Individuality Employment Health Working conditions But, IT has had beneficial results as well. So as managers, it is our responsibility to minimize the detrimental effects and optimize the beneficial effects.
196
Managers are agents of the stockholders. Their only ethical responsibility is to increase profit without violating the law or engaging in fraud
Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract First condition companies must enhance economic satisfaction of consumers and employees Second condition avoid fraudulent practices, show respect for employees as human beings, and avoid practices that systematically worsen the position of any group in society
Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders. Stockholders Employees Customers Suppliers Local community Sometimes stakeholders are considered to include Competitors Government agencies and special interest groups Future generations
197
Proportionality Good must outweigh any harm or risk Must be no alternative that achieves the same or comparable benefits with less harm or risk Informed consent Those affected should understand and accept the risks Justice Benefits and burdens should be distributed fairly Minimized Risk Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk
Act with integrity Increase their professional competence Set high standards of personal performance Accept responsibility for their work Advance the health, privacy, and general welfare of the public
198
Computer Crime
Association of Information Technology Professionals (AITP) definition includes The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources Unauthorized release of information Unauthorized copying of software Denying an end user his/her own hardware, software, data, or network resources Using or conspiring to use computer or network resources to illegally obtain info or tangible property
Hacking The obsessive use of computers, or the unauthorized access and use of networked computer systems Cyber Theft Involves unauthorized network entry and the fraudulent alteration of computer databases Unauthorized use at work Also called time and resource theft May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks
Software is intellectual property protected by copyright law and user licensing agreements
199
Piracy of intellectual property Other forms of intellectual property covered by copyright laws
A program that cannot work without being inserted into another program A distinct program that can run unaided
Worm
Privacy Issues
IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily. Benefit increases efficiency and effectiveness But, may also have a negative effect on individuals right to privacy Examples of important privacy issues Accessing private e-mail and computer records & sharing information about individuals gained from their visits to websites and newsgroups Always knowing where a person is via mobile and paging services Using customer information obtained from many sources to market additional business services Collecting personal information to build individual customer profiles
Privacy on the Internet Users of the Internet are highly visible and open to violations of privacy Unsecured with no real rules Cookies capture information about you every time you visit a site That information may be sold to third parties Protect your privacy by
Encrypting your messages Post to newsgroups through anonymous remailers Ask your ISP not to sell your information to mailing list providers and other marketers Decline to reveal personal data and interests online
200
Computer matching Computer profiling and matching personal data to that profile
Privacy laws Attempt to enforce the privacy of computer-based files and communications Electronic Communications Privacy Act Computer Fraud and Abuse Act
Computer Libel and Censorship The opposite side of the privacy debate
Right to know (freedom of information) Right to express opinions (freedom of speech) Right to publish those opinions (freedom of the press) Spamming Flaming
Other Challenges
Employment New jobs have been created and productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT. Computer Monitoring Concerns workplace privacy
201
Working Conditions IT has eliminated many monotonous, obnoxious tasks, but has created others Individuality Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities Regimentation
Health Issues
202
Societal Solutions
Medical diagnosis Computer-assisted instruction Governmental program planning Environmental quality control Law enforcement Crime control Job placement
Goal Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders
Encryption Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users Involves using special mathematical algorithms to transform digital data in scrambled code Most widely used method uses a pair of public and private keys unique to each individual
203
Firewalls Serves as a gatekeeper system that protects a companys intranets and other computer networks from intrusion
Provides a filter and safe transfer point Screens all network traffic for proper passwords or other security codes
Denial of Service Defenses These assaults depend on three layers of networked computer systems
Defensive measures and security precautions must be taken at all three levels
E-mail Monitoring Spot checks just arent good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.
204
Centralized distribution and updating of antivirus software Outsourcing the virus protection responsibility to telecommunications or security management companies
ISPs
or
to
Log onto the computer system Gain access into the system Access individual files
Backup Files Duplicate files of data or programs File retention measures Sometimes several generations of files are kept for control purposes
Security Monitors Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction Biometric Security Measure physical traits that make each individual unique
Voice Fingerprints Hand geometry Signature dynamics Keystroke analysis Retina scanning Face recognition and Genetic pattern analysis
205
Computer Failure Controls Preventive maintenance of hardware and management of software updates Backup computer system Carefully scheduled hardware or software changes Highly trained data center personnel
Fault Tolerant Systems Computer systems that have redundant processors, peripherals, and software
Which employees will participate and their duties What hardware, software, and facilities will be used Priority of applications that will be processed
Information System Controls Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities Designed to monitor and maintain the quality and security of input, processing, and storage activities Auditing Business Systems Review and evaluate whether proper and adequate security measures and management policies have been developed and implemented Testing the integrity of an applications audit trail
206
Case - 12
Case - 12
The human resources function for most firms involves the complete employment life cycle from hiring employees to their retirement or dismissal. Interviewing potential employees, making employment decisions, scheduling jobs, managing employee benefits, overseeing compensation plans, and installing employee certification programs are just a few functions that the human resources MIS must perform. Information systems are often used to increase efficiencies and realize new opportunities. Like other firms, the Bank of Montreal had the option to develop the human resource information system internally or hire an outside company to develop the necessary software and systems. Internal development offers the option of more control and getting exactly what is needed, although this approach can be more expensive. In addition, there are a number of excellent software packages that can be purchased or leased. UltilPro, for example, is a human resources MIS that can run in a Windows environment. This type of software can cost from $50,000 to $1 million.
Prof. Hemant Thakar
Case - 12
Another alternative for companies such as the Bank of Montreal is to outsource all or part of the human resources MIS. In addition to having human resources software developed by an outside company, it is possible to have the complete human resources function performed externally by an outsourcing company. With new technology and increasingly complex regulations, many companies are now starting to outsource most or all of their human resources activities.
In addition to the increasing complexity and the many options of acquiring an effective human resources MIS, the Bank of Montreal was also considering a major merger with the Royal Bank of Canada. The merger, if successful, would result in a company with more than $300 billion in managed assets. The merger would not only have a dramatic impact on the economy of Canada but would also result in changes in all functional areas, including human resources.
Prof. Hemant Thakar
207
Case - 12
One of the biggest needs of the human resources MIS was to develop a compensation and certification system for information systems personnel. The special needs of the information systems department and a tight job market can often lead to conflicts between the human resources department and the information systems department that is often given the responsibility of developing the human resources MIS. The typical IS department is changing rapidly. It has been estimated that 45% of all IS departments will restructure the human resources function and 40% will redefine salary and compensation plans in the near future. As a result, the Bank of Montreal decided to scrap its old human resources MIS and to develop a new one. Mary Lou Hukezalie, director of Human Resources at the Bank of Montreal, realized the need for a system that could change with the changing needs of the IS department.
Case - 12
The results are promising for the new compensation and certification system. In addition to improving efficiency and flexibility, the approach used by Hukezalie also improved the relationship between the human resources and information systems department.
What are the options in acquiring a human resources MIS. Describe the problems and complexities faced by the Bank of Montreal. If you were the director of human resources at the Bank of Montreal, what would be your highest priorities in developing a new system?
208
Chapter 22
Software Testing and Quality Assurance:
Standards of SQA
Objectives
Learn what is software quality assurance (SQA). Learn the major quality factors. Understand how reviews are conducted.
209
Topics Covered
Quality concepts Software quality factors Software reviews The ISO 9001
SQA encompasses a quality management approach, effective software engineering technology (methods and tools), formal technical reviews that are applied throughout the software process, a multi-tiered testing strategy, control of software documentation and the changes made to it, a procedure to ensure compliance with software development standards (when applicable), and measurement and reporting mechanisms.
Software Quality
Software quality: Conformance to explicitly stated requirements and standards Quality assurance: is the activity that leads to fitness of purpose. Quality product: is the one that does what the customer expects it to do. User satisfaction = compliant product + good quality +delivery within budget and schedule
210
Quality Concepts
Quality control: a series of inspections, reviews, and tests to ensure a product meets the requirements placed upon it. Includes a feedback loop to the process that created the work product. Quality control activities may be fully automated, entirely manual, or a combination of automated tools and human interaction. Quality assurance: analysis, auditing and reporting activities. provide management with the data necessary to be informed about product quality,
Functionality: feature set, capabilities, generality of functions, and security Usability: human factors like consistency, and documentation Reliability: frequency and severity of failures, accuracy of outputs, mean time between failures, ability to recover, predictability Performance: processing speed, response time, resource consumption, throughput, and efficiency Supportability: extensibility, adaptability, maintainability, testability, compatibility, configurability
60.00-100.00
10.00
0.75
1.00
Req. Design
Test Code
System Test
Field Use
211
Total Quality Management (TQM) is a popular approach for management practice. TQM stresses continuous process improvement and can be applied to software development. Not much can be done to improve quality until a visible, repeatable, and measurable process is created.
TQM
Refers to a system of continuous process improvement. - develop a process that is visible, repeatable, and measurable. This step examines intangibles that affect the process and works to optimize their impact on the process. This step concentrates on the user of the product. Examining the way the user applies the product. This step leads to improvement in the product itself and, potentially, to the process that created it. This is a business oriented step that looks for opportunity in related areas identified by observing the use of the product in the marketplace.
The SQA group must look at software from the customer's perspective, as well as assessing its technical merits. The activities performed by the SQA group involve quality planning, oversight, record keeping, analysis and reporting.
212
Beginning of the project Project manager will consider quality factors and decide which ones are important for the system Decide on what validation and verification activities will be carried out to check that the required quality factors are present in the product During the project Validation and verification of quality standards and procedures End of the project Expected quality achieved to what extent
Software Reviews
Any work product (including documents) should be reviewed. Conducting timely reviews of all work products can often eliminate 80% of the defects before any testing is conducted. This message often needs to be carried to managers in the field, whose impatience to generate code sometimes makes them reluctant to spend time on reviews.
213
Reviews are: A meeting conducted by technical people for technical people A technical assessment of a work product created during the software engineering process A software quality assurance mechanism Reviews are not: A project budget summary A scheduling assessment An overall progress report
The objectives of FTR are: To uncover errors in functions, logic, or implementation for any representation of the software. To verify that the software under review meets its requirements. To ensure that the software has been represented according to predefined standards. To achieve software that is developed in a uniform manner. To make projects more manageable.
Review the product, not the producer Set an agenda and maintain it Take written notes Limit the number of participants and insist upon advance preparation The duration of the review meeting should be less than two hours. Develop a checklist for each product that is likely to be reviewed
214
The Players
Review Leader Standards Bearer (SQA)
Producer
Producer informs the project leader that the product is complete and that a review is required The project leader forms a review team and appoints a review leader The review leader evaluate the product for readiness, generates copies of the product material, distributes to the reviewers, and schedules a review meeting Each reviewer reviews the product. He becomes familiar with the product and makes notes of concerns
Review leader, all reviewers, and producer attend the meeting One of the reviewers take the role of recorder During the meeting, the producer walks through the product, explaining the material, while the reviewers raise issue based on their preparation. If an error is discovered, then it is recorded by the recorder.
215
Be prepared evaluate product before the review Review the product, not the producer Keep your tone mild, ask questions instead of making accusations Stick to the review agenda Raise issues, dont resolve them Avoid discussions of style stick to technical correctness Schedule reviews as project tasks Record and report all review results
Outcome of An FTR
The attendees of the meeting decide whether to: Accept the product without further modification Accept the product provisionally. Minor errors have been encountered. These must be fixed but no additional review will be needed Reject the product due to sever errors. Once the errors are fixed, another review should be conducted At the end of an FTR, a review summary report should be produced. It should answer the following What was reviewed? Who was involved in the review? What were the findings and conclusions?
216
Review Checklists
FTR can be conducted during each step in the software engineering process. Checklists can be used to assess products that are derived as part of software development. The checklists are not intended to be comprehensive, but rather to provide a point of departure for each review.
Software project planning develops estimates for resources, cost and schedule based on the software allocation established as part of the system engineering activity. Like any estimation process, software project planning is inherently risky. The review of the Software Project Plan establishes the degree of risk.
The following checklist is applicable: Is software scope unambiguously defined and bounded? Is terminology clear? Are resources adequate for scope? Are resources readily available? Have risks in all important categories been defined. Is a risk management plan in place? Are tasks properly defined and sequenced?
217
Is parallelism reasonable given available resources? Is the basis for cost estimation reasonable? Has the cost estimate been developed using two independent methods? Have historical productivity and quality data been used? Have differences in estimates been reconciled? Are pre-established budgets and deadlines realistic? Is the schedule consistent?
Reviews for software requirements analysis focus on traceability to system requirements and consistency and correctness of the analysis model. A number of FTRs are conducted for the requirements of a large system and may be also followed by reviews and evaluation of prototypes as well as customer meetings.
The following topics are considered during FTRs for analysis: Is information domain analysis complete, consistent and accurate? Is problem partitioning complete? Are external and internal interfaces properly defined? Does the data model properly reflect data objects, their attributes and relationships. Are all requirements traceable to system level?
218
Has prototyping been conducted for the user/customer? Is performance achievable within the constraints imposed by other system elements? Are requirements consistent with schedule, resources and budget? Are validation criteria complete?
Software Design
Reviews for software design focus on data design, architectural design and procedural design. In general, two types of design reviews are conducted: The preliminary design review assesses the translation of requirements to the design of data and architecture. The second review, often called a design walkthrough, concentrates on the procedural correctness of algorithms as they are implemented within program modules.
Are software requirements reflected in the software architecture? Is effective modularity achieved? Are modules functionally independent? Are interfaces defined for modules and external system elements? Is the data structure consistent with information domain? Is data structure consistent with software requirements? Has maintainability been considered? Have quality factors been explicitly assessed?
219
Does the algorithm accomplishes desired function? Is the algorithm logically correct? Is the interface consistent with architectural design? Is the logical complexity reasonable? Has error handling been specified? Are local data structures properly defined? Are structured programming constructs used throughout? Is design detail amenable to implementation language? Which are used: operating system or language dependent features? Has maintainability been considered?
Coding
Errors can be introduced as the design is translated into a programming language. A code walkthrough can be an effective means for uncovering these translation errors.
Coding (Cont.)
The following checklist assumes that a design walkthrough has been conducted and that algorithm correctness has been established as part of the design FTR. Has the design properly been translated into code? [The results of the procedural design should be available during this review.] Are there misspellings and typos? Has proper use of language conventions been made? Is there compliance with coding standards for language style, comments, module prologue?
220
Coding (Cont.)
Are there incorrect or ambiguous comments? Are data types and data declaration proper? Are physical constants correct? Have all items on the design walkthrough checklist been re-applied (as required)?
Software Testing
Software testing is a quality assurance activity in its own right. The completeness and effectiveness of testing can be dramatically improved by critically assessing any test plans and procedures that have been created.
Test Plan
Have major test phases properly been identified and sequenced? Has traceability to validation criteria/requirements been established as part of software requirements analysis? Are major functions demonstrated early?
221
Test Procedure
The following checklists are useful for test procedure walkthrough: Have both white and black box tests been specified? Have all independent logic paths been tested? Have test cases been identified and listed with expected results? Is error-handling to be tested? Have all boundary values been tested? Are timing and performance to be tested? Has acceptable variation from expected results been specified?
Maintenance
The review checklists for software development are equally valid for the software maintenance phase. In addition to all of the questions posed in the checklists, the following special considerations should be kept in mind: Have side effects associated with change been considered? Has the request for change been documented, evaluated and approved? Has the change, once made, been documented and reported to interested parties? Have appropriate FTRs been conducted? Has a final acceptance review been conducted to ensure that all software has been properly updated, tested and replaced?
Each defect needs to be traced to its cause. Defect causes having the greatest impact on the success of the project must be addressed first.
222
Statistical SQA
Collect information on all defects Find the causes of the defects
measurement
... an understanding of how to improve quality ...
Prof. Hemant Thakar
Inspection time per page of documentation Inspection time per KLOC or FP Inspection effort per KLOC or FP Errors uncovered per reviewer hour Errors uncovered per preparation hour
Software Reliability
223
One of the most important worldwide standards for quality assurance Adopted for use by over 130 countries Not industry specific but expressed in general terms ISO 9001 is the quality assurance standard that contains 20 requirements that must be present in any software quality assurance system.
A software developer implements a quality system according to ISO 9001 specifications The quality system is used for some time to detect any problems in the system Third party audit Accreditation request to the responsible body Accreditation body inspect the quality system documentation and visits the organization
224
Key Points
Quality assurance: is the activity that leads to fitness of purpose Major software quality factors: functionality, usability, reliability, performance, and supportability. Any work product (including documents) should be reviewed. FTR are to find errors during the process so that they dont become defects after the release of the software. Checklists can be used to assess products that are derived as part of software development. ISO 9001 is the quality assurance standard that contains 20 requirements that must be present in any software quality assurance system.
225