BCom ITM 2 Business Information Systems Jan 2014
BCom ITM 2 Business Information Systems Jan 2014
BCom ITM 2 Business Information Systems Jan 2014
TECHNOLOGY MANAGEMENT
(YEAR 2)
Copyright 2014
MANAGEMENT COLLEGE OF SOUTHERN AFRICA
All rights reserved; no part of this book may be reproduced in any form or by any means, including
photocopying machines, without the written permission of the publisher
REF: BIS2014
Introduction
This course in Business Information Systems is intended to provide a comprehensive guide to choosing
the appropriate information system for an organization.
It covers, in detail, the software and hardware technologies which form Information Systems, the
activities involved in acquiring and building new Information Systems and the elements of strategy
required to manage Information Systems effectively.
The prescribed textbook is:
Bocij P., Greasley A. and Hickie S. (2008). Business Information Systems. 4 th Edition. Essex. England:
Prentice Hall.
How to Use This Module
This module should be studied using the study guide and the prescribed text book. You should read
about the topic that you intend to study in the appropriate section of this Study Guide before you start
reading in detail in the prescribed textbook. Ensure that you make your own notes/summaries as you
work through both the textbook and this Study Guide.
At the commencement of each section of this Study Guide you will find a list of learning outcomes.
These learning outcomes outline the key areas of competence which you should develop as a result of
working through the section with its supporting chapters in the prescribed textbook.
Avoid reading all the material at once. Take a study session at a time.
Important information
Further/additional Reading
As you work through the study guide, you will come also come across:
Learning outcomes: list describing what readers should learn through reading the chapters
Think point: a think point asks you to stop and think about an issue. Sometimes you are asked
to apply a concept to your own experience or to think of an example
Discussions questions: require longer essay-style answers discussing themes from the
chapters
Self assessment questions: short questions which will test your understanding of the chapters
Examination questions: typical short answer questions which would be encountered in an exam
and can also be used for revision.
have a thorough understanding of the value, use and management of information, information
systems and information technology in order to revitalise business processes, improve
managerial decision-making and gain a competitive advantage; and
be able to apply the various principles and techniques in an integrative way to deal with the
core dynamics of information management.
The module outcomes imply that any student that has completed this module should:
comprehend how information systems solutions to business problems are developed by the
use of fundamental problem-solving and development technologies;
reflect on the major concepts, developments, and managerial issues in computer technology:
hardware, software, telecommunications and database management ;
be familiar with the major applications of information systems in operations, management, and
for a competitive advantage of an enterprise; and
grasp the major management, global and ethical challenges regarding information systems and
technology.
TABLE OF CONTENTS
CHAPTER
PART
1
PAGE
4
BUSINESS
2
24
42
64
81
94
106
MANAGEMENT
8
119
131
10
143
CHALLENGES
REFERENCES
157
GLOSSARY
159
PART 1
INTRODUCING
INFORMATION SYSTEMS
INTO BUSINESS
understand the basic concepts related information systems, including the characteristics of a
system and components;
explain the vital role information systems play in business operations and managerial decisionmaking;
INTRODUCTION
When beginning the study of the use of information systems (IS) in business, it is important to
understand a number of concepts drawn from a variety of different fields. In order to create, improve
and manage business information systems (BIS) one must combine an understanding of information,
systems concepts, business organisations and information technology (IT).
The purpose of this study unit is to introduce the field of information management. The user will gain a
basic understanding of the importance of information systems by analysing how information systems
relate to the student as a managerial end user. This study unit will also familiarise the user with the
important role of information technology in your organisation. This study unit presents an overview of
the basic areas of information systems knowledge needed by business professionals, including the
conceptual system components and major types of information systems.
Study Chapters 1 and 2 in Bocij et al. (2008) that deal with an introduction to the
foundation of information systems in business.
1.2
Information systems form an integral part of modern organisations and businesses. Computer-based IS
are now used to support all aspects of an organisations normal functions and activities. New
technology creates new opportunities for forward-thinking companies. Higher levels of automation, high
speed communications and improved access to information can all provide significant benefits to a
modern business organisation. However, the benefits of new and emerging technologies can only be
realised once they have harnessed and directed towards an organisation s goals.
Information systems play a fundamental and ever-expanding role in all organisations. Therefore, an
understanding of the effective and responsible use and management of information systems is
important for all managers and other business knowledge workers in todays global information society.
A knowledge worker is a person whose primary work activities include creating, using and distributing
information. A high portion of workers employed by organisations can be classified as knowledge
workers.
Information systems have become a vital component of successful organisations. It constitutes an
essential field of study in business administration and management. Information systems are
considered a major functional area in business operations and it can play an important role in the
success of an organisation. It integrates accounting, finance, marketing, production and human
resource management in the organisation. It can provide the information an organisation needs for
efficient operations, effective managerial decision-making and a competitive advantage.
First, a clear understanding of the difference between efficiency and effectiveness is important. This
difference is a basic principle in management and it is also applicable to the field of information
systems. Efficiency can be defined as doing things right. It is a measure of the consumption of input
resources in producing given system outputs. It focuses on productivity. An efficient data processing
system can update thousands of employee records per minute. Historically, data processing systems
have supported efficiency by automating routine paperwork processing tasks.
Effectiveness can be defined as doing the right things. This means doing things that need to be done
in order to achieve important business results. An effective information system is therefore a system
that achieves its objectives. A database housed on a notebook may enable a sales manager to identify
high potential sales prospects and to direct his staffs attention to take advantage of those prospects.
1.4.
BASIC CONCEPTS
1.4.1
Much of a managers work involves using information to make decisions and ensuring that information
flows through the organisation as efficiently as possible.
Data Process
A process used to convert data into information. Examples include summarising, classifying and
sorting.
1.4.3
Value of Information
It is often possible to measure the value of information directly. The tangible value of information is
often measured in terms of financial value, an example can be the use of inventory information to
improve stock control procedures.
The intangible value of information is difficult or impossible to quantify, an example can be attempting to
measure the extent to which information can improve decision behaviour.
1.4.4. Sources of Information
Information can be gathered through both formal and informal communication. Formal communications
can include reports and accounting statements. Informal communications can include conversations
and notes.
1.4.4.1 Formal communication
Formal communication involves presenting information in a structured consistent manner.
CONTENT
FORM
ADDITIONAL
CHARACTERISTICS
Timeliness
Accuracy
Clarity
Confidence in source
Currency
Relevance
Detail
Reliability
Frequency
completeness
Order
Appropriateness
Time period
Conciseness
Presentation
Scope
Media
Knowledge
Knowledge can be thought of as the combined result of a persons experiences and the information
they possess.
Knowledge management (KM) describes a range of activities intended to make sure an organisation
uses its information resources as effectively as possible. Applications of KM include data mining,
document image processing and business intelligence. Competitive intelligence is an area of
knowledge management concerned with helping organisations to respond effectively to competition by
gathering and analysing information about competitors.
10
In order for an organisation to function effectively all activities must be planned and monitored by
managers according to well-informed decisions. The functions of management include forecasting,
planning, organising and coordination and control. One of the key management functions that
information systems seek to support is managerial decision making. The way in which managers make
decisions and the factors that influence those decisions are often described as decision behaviour.
Decisions can be classified as structured or unstructured or semi-structured.
Structured decisions: situations where the rules and constraints governing are known, e.g., How
would we process a sales order?
Unstructured decisions: complex situations where the rules governing the decision are complicated
or unknown, e.g., what should our distribution channels be?
Semi-structured: Many decisions fall somewhere in between the two extremes, e.g., which foreign
market should we target?
1.5.1
Strategic Level: managers are largely concerned with long term organisational planning.
Tactical Level: Managers are largely concerned with medium term planning.
Operational Level: Managers are largely concerned with short term planning and the day- to day control of an organisations activities.
11
Unstructured
Timescale
Impact
of Frequency
organisation
decisions
Long
Large
Infrequent
medium
Medium
short
small
of
LEVEL
TACTICAL LEVEL
OPERATIONAL
structured
Frequent
LEVEL
(Bocij et al, 2008: 20)
1.6
ACTIVITY
Case 1.1: Letters to the dead and other tales of data dereliction that of (Bocij et al., p14).
This case dramatizes just one of the countless examples of the information that are duplicated or out of
date.
Read attentively through the Case 1.1: Letters to the dead and other tales of data dereliction that
of (Bocij et al., p14). Answer the case study questions on p. 15 and read through the paragraph
Competitive intelligence on page 29. Also answer Discussion Question 4 on p. 30. Do you think that
your organisation could also benefit from such a strategy? After you have analysed the case
study and answered the questions, consider the suggested answers given at the end of the
study unit.
Additional Reading
Turn to pp. 29-30 of Bocij et al. The summary provides an outline of the major areas of information
systems knowledge needed by a managerial end user. This includes foundation concepts of information
systems, information system technology, and the application, development and management of
information systems.
12
Systems theory provides a means of analysing and improving business processes within and between
systems.
1.7.1. What is a system?
A system can be defined as a collection of interrelated components that work together towards a
collective goal. The function of a system is to receive inputs and transform these into outputs.
1.7.2
What is Input?
Input is the raw materials for a process that will produce a particular output
1.7.3
What is process?
What is output?
What is feedback?
Feedback provides information on the performance of a system which can be used to adjust its
behaviour.
13
If alterations are needed to the system, adjustments are made by a control mechanism.
In business there are familiar phrases such as I am not part of the system, The system is down,
He has a good system, or Do not interfere with the system. Phrases like these suggest that
almost everything can be a system. However, the term system is often misunderstood because the
value and applicability of the systems theory to daily life is underestimated. More specifically, in the field
of information systems, the value of the systems theory to solve information management problems is
underestimated.
Additional reading
Turn to p 37 of Bocij et al., read the paragraph Systems Components and make sure you can explain
all the different system components. Included are the definition of a system, input, processing, output,
feedback, control, environment, boundary, subsystems and the interrelations between the components.
Take note of Figure 2.1 (p.36) and Figure 2.2 (p.37) for graphical displays of the various system
concepts.
Other system concepts that are important to your body of knowledge include the following:
Closed System: A system that does not interact with other systems or its environment, is a
closed system. An example of a closed system is a battery that runs down after a while. This
phenomenon of decay is called entropy.
Open System: A system that interacts with other systems in its environment is called an open
system (connected to its environment by exchanges of inputs and outputs).
Adaptive System: A system that has the ability to change itself or its environment in order to
survive is called an adaptive system.
Cybernetic System: A system that includes feedback and control components. These systems
are self-monitoring and self-regulating.
Consider an example that will explain most of the system concepts. A medium sized furniture
manufacturing business is used as an example.
14
15
A business information system is a group of interrelated components that work collectively to carry out
input, processing, output, storage and control actions in order to convert data into information products
that can be used to support forecasting, planning, control, coordination, decision making and
operational activities in an organisation (Bocij et al, 2008).
1.9
People resources: People resources include the users of an information system and those who
develop, maintain and operate the system.
Hardware resources: The term hardware resources refers to all types of machines, not just computer
hardware.
Software resources: In the same way, the term software resources do not only refer to computer
programs and the media on which they are stored. The term can also be used to describe the
procedures used by people.
Communications resources: Resources are also required to enable different systems to transfer data.
Data resources: Data resources describe all of the data that an organisation has access to, regardless
of its form.
Further reading
Read paragraph on Business Information System Resources (Bocij et al., p.43) which provides
information on information systems resources and products, which include people, hardware, software,
data and network resources.
1.10
16
Further reading
For further reading on Components of an information system: Turn to pp.66-68 of Bocij et al.
ACTIVITY
Is there a difference between data and information? If so, what is the difference? Give examples in your
organisation to motivate your answer.
Suggested answer
Take note of the paragraph Data Resources on p. 43.
17
Do the team members know what happens to the data he or she gathered?
Does anyone use the data in the decision making or problem solving process?
Is there any feedback regarding the value and possible use of the data?
Do the team members think that the gathering of data is worth the input?
Does the organisation get the right information at the right time?
18
The information or data processing activities that occur in an information system include the input of
data resources, processing of data into information, output of information products, storage of data
resources and the control of system performance.
1.12
CONCLUSION
This study unit has given an overview of the basic concepts of information system. It has also shown
that much of a managers work involves making decision about the best way to achieve the
organisations objectives. Further, the quality of a managers decisions depends upon the quality of the
information he or she has access to. Since information influences almost every activity within an
organisation, it is an important asset and must be treated accordingly.
Information systems have proved to be important subsystems in any organisation because it contributes to the common goal of the organisation. An information system uses the resources of people,
hardware, and software to perform input, processing, output, storage, and control activities that convert
data resources into information products.
19
Suggested answers
Case Study 1.1: Letters to the dead and other tales of data dereliction
1. The case study identifies a number of problems with the way companies store and
manages information. Using your own words, identify and describe these problems.
In general, the problems described in the case study point to deficiencies in the data/information
management processes and systems used by companies. This is not necessarily a technology
issue; it is more to do with the management of information resources and the use of appropriate
policies and procedures. Some examples that support this argument are as follows:
Lazy sales staff entering data incorrectly. Staff should be monitored correctly and procedures
should be in place to check the accuracy of data as it is entered.
Advances in technology mean greater quantities of information are available but managers do
not organise it properly information overload?
There is a tendency to collect large quantities of data without regard for whether or not it is
needed/useful. Mention of information management professionals suggests that these experts
should be involved in (a) deciding what information to collect, (b) making sure it is accurate and
(c) storing it in an organised manner.
Duplication of information caused by allowing individual departments to keep their own copies
of records, rather than keeping records centrally.
Companies do not know what information they have and how it is being used! Information
resources cannot be managed correctly if no one knows what they are.
Inaccurate assumptions are being made about the meaning of information (e.g. sales spike),
suggesting that it is not being processed/analysed correctly.
Company systems are unsuitable for handling companies data processing needs (e.g. unable
to hold separate addresses for joint account holders). Effective management should/would
have identified and corrected such a problem before it became an issue.
Data/information management processes and systems are unable to deal with new
requirements (e.g. delivering information more quickly and handling unstructured data).
20
Information is presented in a way that is difficult to understand, so it takes longer to search for
and identify the required information.
3. What are some of the consequences of relying on inaccurate information? Refer to the case
study in your answer.
Answer:
Some examples drawn from the case study:
Negative publicity, loss of customer satisfaction: The families of deceased people would have been
distressed by receiving Dear Mr. Deceased letters. Distress also caused by pension leaver letters.
Lost business, cost of cleaning data: Listing customers as astronauts would cause insurance company
to lose potential sales. Database records need to be corrected.
Impaired productivity, loss of customer satisfaction. The case study points out that relying on inaccurate
information damages efficiency; at worst it can destroy relationships and hamper efforts in crucial
areas such as fighting fraud.
Public safety, damage to company image, damages: The safety of some people might be jeopardized
(letter containing the new address of a wife sent to her violent husband); the company would have
suffered negative publicity and was forced to pay cost of rehousing the wife.
21
Summary of what is new about KM, i.e. focus on making use of information (applying
intelligence that is part of managers experience and skill set). Use examples of applications
(e.g. Hansen et al., 1999 article in chapter references). It is a structured rather than ad hoc
approach to capturing and disseminating knowledge.
Assess whether or not it is repackaging using examples of applications and practice. For
example, information on best practice has always been shared, with or without the KM label.
22
better transfer of information within the organisation since all the modules of the system are
compatible;
The main disadvantage of the use of ERP systems seems to be the high costs charged by suppliers
due to the demand for this type of system. This high demand has also given rise to skills shortages.
The other disadvantage of ERP systems is shared with all off-the-shelf systems, namely, that the
business often has to change its processes or way of working in order to fit the way the software works.
This may not present a problem if a company is looking to reengineer its processes since, then, the
ERP software can provide a framework.
Owing to the high cost of ERP solutions, only large companies can afford the cost of the software and
the consultants, which will often be measured in millions of pounds. Smaller companies can take
advantage of the features of integrated accounting packages that now provide modules beyond those
of the basic accounting package.
23
24
PART 2
COMPUTER HARDWARE AND SOFTWARE
25
understand the basic computer hardware concepts, as well as the major types of technologies used
in peripheral services for computer input, output, and storage;
26
INTRODUCTION
The study unit deals with a managerial overview of computer hardware by reviewing the basic types of
computer systems and the major types of computer peripheral devices used for input, output, and
storage. An overview will also be given on computer software by analysing the functions, benefits and
the limitations of major types of systems and application software packages.
Study Chapter 3 and 4 in Bocij et al. (2008) that deal with the managerial overview of
computer hardware and software.
2.2
Peripherals is the generic name for all input/output equipment and secondary storage devices that
depend on direct connections or Telecommunications links to the central processing unit (CPU) of a
computer system. Thus, all peripherals are on-line devices, that is, separate from, but can be
electronically connected to and controlled by a CPU. This is the opposite of off-line devices, which are
separate from and not under the control of the CPU.
2.3
2.3.1
Input devices: Hardware used to enter data, information or instructions into a computer-based
information system.
Output devices: translate the results of processing output into a human readable form.
These devices include:
2.3.2
pointing devices such as electronic mice, trackballs, pointing sticks and touch-sensitive screens;
printed output by means of printers and plotters to produce permanent (hard copy) output;
27
A Storage device is a permanent means of storing data and programmes until they are required.
Storage devices of computers can be divided into:
1. Primary storage devices: The primary storage of most modern computers consists of the
following:
Volatile memory: Anything held in memory is lost once the power to the computer system is
switched off.
Non-volatile memory: Non-volatile memory retains its contents until altered or erased.
Random access memory (RAM): RAM is used as volatile, working storage by a computer,
holding instructions and data that are waiting to be processed.
Read-only memory (ROM): The contents of ROM are fixed and cannot be altered. ROM is nonvolatile.
EPROM (erasable programmable read-only memory): This is a form of ROM memory that
retains its contents until changed using a special device known as a burner.
Cache memory: Used to improve performance by anticipating the data and instructions needed
by the processor. The required data is retrieved and held in the cache, ready to be transferred
directly to the processor when required.
Floppy disk: Consists of a plastic disk, coated with a magnetic covering and enclosed within a
rigid plastic case.
Hard disk: A magnetic medium that stores data upon a number of rigid platters that are rotated
at very high speeds.
Personal video recorder (PVR): A PVR is a sophisticated video recorder that uses a hard disk
drive to store programs. The use of a hard disk drive allows a PVR to offer a range of
sophisticated features, such as the ability to pause live broadcasts.
Flash drive: A flash drive is a portable storage device that connects to a computer via a
standard USB port. Flash drives have no moving parts, so are reliable and robust.
28
Additional Reading:
For further reading on Primary and Secondary storage devices, turn to pp. 95-100 of Bocij et al.
ACTIVITY
Analyse the Case 3.2 Did IT work? How Wall Street is eradicating down time (Bocij et al., p. 106).
Analyse the case and answer the questions.
After answering the questions, refer to the suggested answers at the end of the study unit.
2.5
2.5.1
A computer system is a number of interrelated components including hardware and software that work
together with the aim of converting data into information. The components of a computer system
include hardware and software.
2.5.2
Computer Hardware
Input devices. Hardware used to enter data, information or instructions into a computer-based
information system.
Central Processing Unit (CPU): The processor found in a computer system that controls all the
computers main functions and enables users to execute programs or process data.
Memory: a temporary means of storing data awaiting processing, instructions used to process
data or control the computer systems and data or information that has been processed.
Output devices: translate the results of processing output into a human readable form.
Storage devices: a permanent means of storing data and programs until they are required.
29
Figure 2.1
Further reading
Read on Components of a computer system: Turn to pp.66-68 of Bocij et al.
2.6
There are several major categories of computer systems with a variety of characteristics and
capabilities. Thus, computer systems are typically classified as:
Minicomputers computers: computers that offer an intermediate stage between the power and
mainframe systems and the relatively low cost of microcomputer systems.
Microcomputers: computers that are considered less powerful than minicomputers and mainframes,
but are more flexible and relatively inexpensive to purchase.
These categories are attempts to describe the relative computing power provided by different
computing platforms or types of computer. Therefore, they are not precise classifications.
30
Further reading
Turn to the paragraph Major categories of computers (Bocij et al., p. 68), which gives a short
overview of the various types of computers, (Figure 3.3 on p. 68).
Figure 2.2: Different forms of computer system.
31
Networked computer systems allow end users to communicate electronically and share the use
of hardware, software, and data resources.
Networks of small computers have become a major alternative to the use of larger computer
systems, as many organisations downsize their computing platforms. For example, a local area
network (LAN) of microcomputers can replace the use of groups of end user terminals
connected to a minicomputer or mainframe.
Are easy to install, use, and maintain; and provide a more efficient, flexible, lower-cost
alternative to large computer systems for many applications; and
Can share computer power, software, and databases required in time-sharing and resourcesharing applications.
Networked computers also support work group computing (communicate electronically and
share data on joint projects); and
Additional Reading
Network computer systems form a vital part of todays information systems. Increasingly, computers are
being networked or interconnected by Telecommunications links with other computer systems. Further
reading: Turn to p. 74 of Bocij et al. and read through the paragraph Network Computers.
32
MANAGEMENT RESPONSIBILITY
Managers may argue that it is unnecessary to be an expert on information system technology.
Computer hardware and software are vital resources to support business operations, managerial
decision making and strategic advantage. Therefore, you need to understand the basic terminology and
concepts which are part of the basic literacy of business people and managers in an information era.
The responsibility as a manager would be to manage the end users and the effective utilisation of
computer technology in the work environment.
33
Additional reading
It is recommended that you refer on a regular basis to the Glossary page for short descriptions of most
of the relevant terms as follows. You can also discuss the terms with a computer expert at work or with
fellow students.
Refer to the glossary page for the following terms:
Application generator
Artificial intelligence
Batch processing
Business ethics
Chip theft
Client/Server model
Competitive Advantage
Computer criminals
Cost of ownership
Database
Data warehouse
Electronic Commerce
Expert Systems
Extranet
Groupware
Information
Intelligent Agent
MANCOSA BCom ITM Year 2
34
2.8
Neural Networks
Prototyping
Systems analysis
APPLICATION SOFTWARE: END USER APPLICATIONS
Software can be defined as a series of detailed instructions that control the operation of a
computer system. software exists as programmes that are developed by computer
programmers.
Systems software: this form of software manages and controls the operation of the computer
system as it performs tasks on behalf of the user.
Application software directs the processing required for a particular use, or application, that
you as an end user want to accomplish. Application software can be divided into two
categories, general purpose programs and application-specific programmes. The various types
of application software for end users are discussed in this study unit. General purpose programmes are those that perform common information processing jobs for end users. Examples
are word processing programmes, spreadsheets programmes, database management
programmes, integrated packages, and graphics programmes. Application-specific programmes
are programmes that support specific applications of end users. Major categories of
application-specific programmes include business application programmes, scientific
application programmes, and other application programmes.
there is a trend away from custom-designed one-of-a-kind programs developed by the professional
programmers or end users of an organisation, and
there is, however, a trend towards the use of off-the-shelf software packages acquired by end
users from software vendors.
35
There is also a trend towards the use of user-friendly fourth-generation programming languages.
That makes it easier for end users to develop their own applications
You have to take note of these trends in order to use the available technology to the benefit of the
organisation.
Additional Reading
For further reading on software: Turn to p. 122-123 of Bocij et al. (Chapter 4).
2.9
GENERAL-PURPOSE SOFTWARE
General-purpose applications are programmes that can be used to carry a wide range of common
tasks, for e.g a word processor. It is often referred as productivity software as it helps to improve the
efficiency of an individual.
General-purpose software commonly used by end users include:
2.10
Web-Browsers;
Electronic Mail;
Electronic Spreadsheets;
Groupware and
36
Further reading
Turn to Bocij et al. p. 125 and read through the paragraph Application Software. The concepts
General-Purpose Application Programmes and Application-Specific Software Packages are
introduced.
ACTIVITY
Which application software (also known as software packages) are you familiar with? Do you use it to
support your work tasks? Explain.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Do you think that these software packages are helpful tools?
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Suggested answers
Case Study 3.1: When systems converge but people dont
1. In brief, what is VoIP? If necessary, use the Internet to carry out any research you need.
VoIP stands for Voice over Internet Protocol. It is a service that is used for transmitting
telephone calls over a network, such as the Internet. In order to use VoIP, both users must be
connected to the network and both must have an appropriate handset (or a microphone and
speakers) and a computer running a suitable software. The very latest systems do not need a
computer; they can be connected directly to a router and use wireless handsets.
MANCOSA BCom ITM Year 2
37
Replacing two networks with one reduces the amount of hardware needed to be bought
and maintained. In turn, this reduces other costs such as training.
IP-based phone networks are easier to manage, resulting in time and cost savings.
The system can be the basis for new applications e.g. unified messaging.
The company becomes reliant on its network system; any failure also means the loss of
telephone communications.
Adopting this approach can result in conflict between departments (IT and telecoms).
Case Study 3.2 Did IT work? How Wall Street is eradicating downtime
1. Suggest at least three ways virtual computing can help an organisation to reduce costs.
Some ways in which virtualisation can reduce costs:
Virtual machines can be created to emulate legacy systems, removing the need to maintain
outdated equipment. Since a virtual machine often runs more quickly than the legacy
system being emulated, it can remove the need to migrate to a new, faster system.
Developers can programme and test applications on several operating systems using only
a single PC.
Snapshots make it quick and easy to deploy new machines and install updates.
Virtual machines can make use of spare capacity, reducing the need to buy additional
hardware.
38
New software can be tested on a virtual machine before being installed on the companys
network. This reduces the possibility of crashing the network and makes it easier to
determine the source/cause of any problems.
2. The case study suggests that when you focus on recovery: the hardware and software you
buy becomes less important. How true is this?
This is only true to the extent that virtual machines can be created using almost any kind of
hardware/software platform. However, the following points should be considered:
Even if emphasis is placed on recovery, hardware and software must still be reliable. Poor quality
hardware or buggy software, for example, may cause repeated crashes.
The text makes it clear that virtual machines run more efficiently when multi-core processors are
used. Hardware that is slow or inefficient may make virtual machines unusable. After all, the case
study states, If a system is on, but running slowly, it is, in effect, down.
The views of Steve Randich are based on a faulty assumption: robustness no longer needs to be
engineered, at great expense, into the application or its operating system. Robustness describes
the ability of a system to carry on working in spite of errors, partial failures or abnormal conditions.
In terms of software, this usually means that an application should be able to cope with erroneous
data and other, unexpected problems.
An unstable operating system that crashes frequently will not become more reliable because it runs
on a virtual machine it will remain unreliable and will continue to crash frequently. In this way, it is
clear that the software you buy is important.
3. In your own words, explain how virtual machines can be moved around, backed up, or
diverted to adjacent or remote systems.
Two features of virtualisation technology allow these actions:
Virtual machines allow the use of snapshots disk files containing an exact image of the virtual
machines memory and the contents of its hard disk at a specific point in time. These files can be
used as backups and are easily copied to other machines.
Software such as VMWares Distribution Resource Scheduler (DRS) constantly monitors available
computing resources and can automatically set up new VMs using spare resources if it detects a
need, such as a sudden increase in web traffic.
39
Network computers are the point at which computer technology and television converge. As
interactive television becomes more popular, consumers will begin to see network computers in the
same way as video recorders and satellite receivers.
Since there is sometimes only a small difference in cost, consumers are likely to opt for a more
flexible and more powerful personal computer. This argument also applies to thin clients.
To date, network computers have failed to make an impression on the consumer electronics
market. They are still considered expensive luxuries and have yet to deliver a killer app.
Network computers are able to deliver some services more effectively and at lower costs than other
methods. Video telephony, for example, is awkward and expensive to provide via a personal
computer. Such applications will ensure the success of network computers. This argument also
applies to thin clients.
As technology progresses, it becomes possible to build dedicated devices that offer levels of power
and sophistication similar to that of a personal computer. Since these devices are often multifunctional and are relatively cheap to buy, they are likely to replace the need for a personal
computer for many people. A good example is the mobile telephone; recent models provide the
ability to transmit pictures, access the Internet, manage appointments and so on. Although the
primary purpose of the telephone is communication, it can also serve other purposes, such as
allowing users to play games or access information services.
40
All organisations undertake a cycle of improvement and replacement for their computer systems. In
a college or university, for example, all of the institutions hardware and software might be replaced
or renewed during a five-year cycle. In view of this, it could be said that already organisations
continually upgrade or replace systems in order to keep abreast of changes in technology.
Changing an existing system or adopting a new one carries a number of risks; for example, a large
financial outlay may be required to purchase the new system. Such risks are unacceptable when
the potential gains to be made are unclear or uncertain.
Although the hardware and software used by an organisation may be obsolete, it would be difficult
to prove that obsolescence automatically renders a given system worthless. A fully functional
system, no matter how old, will have an intrinsic value to an organisation. Consider the following:
what expense would be involved in carrying out a given set of tasks without the system? If the
system performs such tasks more quickly, more accurately or less expensively, then it has a clear,
quantifiable value.
Although a new system may carry out tasks more quickly or more accurately than an existing
system, it may still not be viable in financial terms. The costs associated with implementation may
be so high that they outweigh any benefits gained by adopting the system.
New hardware and software often allow an organisation to maximise the use of its data resources.
The ability to use data-mining software, for example, might allow the organisation to realise cost
savings or identify new products and new markets.
41
42
PART 3
TELECOMMUNICATIONS AND NETWORKS
43
44
A computer network can be defined as: a communications system that links two or more computers
and peripheral devices and enables transfer of data between the components (Bocij et al, 2008: 184).
Computer networks are themselves constructed on different scales. Small-scale networks within a
workgroup or single office are known as local-area networks (LANs). Larger-scale networks which are
national or international are known as wide-area networks (WANs). The internet is the best known
example of wide-area network.
Further Reading
Turn to p. 184 of Bocij et al and read through the paragraph on Introduction to computer Networks.
3.2.1
Networks are vital to a business. They are important for the cost savings and improved communications
that arise from an internal network. Beyond this, they are truly vital, because they help a business reach
out and connect with its customers, suppliers and collaborators. Through doing this a company can
order new raw materials more rapidly and cheaply from its suppliers and can keep in touch with the
needs of its customers.
45
Benefits of networks
Enable sharing of hardware resources such as printers, back up, processing power.
(Bocij et al 2008:186)
46
3.2.3
To balance against the many benefits, there are, of course, disadvantages with introducing networks.
The main disadvantages are:
Reduced security due to more external access points to the networks on wide-area networks
and the internet.
Additional Reading
For further reading on disadvantages of network technology: Turn to p. 188 of Bocij et al.
3.3
The method by which data and information are transmitted between different locations (Bocij et al,
2008:185)
47
Telecommunications networks and the use of these networks for communication (networking) is
important in todays organisation for the following reasons:
Networking permits the sharing of scarce, critical resources such as software, printers, fax
machines and other peripherals.
Networking allows users to share data. Users from different areas within the organisation,
as well as those in different organisations, can all access common databases and this
permits the more efficient use of data.
Networking is the key in making distributed data processing and client/server systems
feasible. It interconnects the computer systems of an organisation so their computing
power can be shared by end users throughout the whole organisation.
Networks exchange the communication within the organisation and between organisations.
Networking, therefore, can be used for applications such as information distribution and to
build strategic information systems.
There is a trend towards electronic trade. Computer networks form the basis for electronic
trade.
It enhances collaboration and communication among individuals both inside and outside an
organisation.
Manager as end user and organisations need to electronically exchange data and information with
other end users, customers, suppliers, financial institutions and other organisations. Only through the
use of Telecommunications can managers work their activities, manage organisational resources, and
compete successfully in todays fast changing global economy.
Many organisations today could not survive without interconnected networks of computers to serve the
information processing and communications needs of their end users.
3.3.2
The conceptual model below shows a telecommunications network. It illustrates that a communications
network is any arrangement where a sender transmits a message to a receiver over a channel
consisting of some type of medium. A telecommunications network consists of five basic categories of
components, those are terminals, telecommunications processors, telecommunications channels,
computers, and telecommunications control software. Turn to the Glossary page for descriptions of
unfamiliar terms.
MANCOSA BCom ITM Year 2
48
There are many different types of telecommunications networks. From an end user point of view, there
are two basic types: wide area networks (WAN) and local area networks (LAN). It is important to note
that there is a growing trend toward the increased use of LANs and WANs as an alternative to the use
of terminals connected to minicomputers or smaller mainframes for end user computing in many
organisations.
3.4.1
Wide area networks (WANs) are telecommunications networks that span a large geographical
distance.
These networks cover areas such as:
a whole country; or
49
LANs use a variety of telecommunications media, such as ordinary telephone wiring, coaxial
cable, or wireless radio systems to interconnect microcomputer workstations and computer
peripherals.
LOCAL AREA NETWORK (LAN)
LANs use a powerful microcomputer with a large disk capacity as a file server or network
server that contains a network operating system program (e.g. Novell) that controls
telecommunications and the use of network resources.
LANs allow end users in a work group to communicate electronically; share hardware,
software, and data resources; and pool their efforts when working on group projects.
50
Client Server computing is a grown trend in most organisations. Computing power has rapidly become
distributed and interconnected throughout many organisations through networks of all types of
computers.
3.5.1
Clients are interconnected by local area networks and share application processing with LAN
servers, which also manage the networks; and
LANs may be interconnected to other LANs and wide area networks of client workstations and
servers.
3.5.2
clients (end users) can perform some or most of the processing of their business applications;
LAN servers can share application processing, manage work group collaboration, and control
common hardware, software, and databases;
data can be completely processed locally, where most inputs and outputs must be handled;
51
increases information processing efficiency and effectiveness as users are more responsible
for their own application systems;
allows large central-site computers to handle the jobs they do best, such as high-volume
transaction processing, communications network security and control, and maintenance and
control of large corporate databases; and
clients at local sites can access the corporate superservers to receive corporate wide
management information or transmit summary transaction data reflecting local site activities.
ACTIVITY
To understand better the concept of client/server computing, attempt discussion question on p. 226 of
Bocij et al
3.6
NETWORK COMPUTING
The growing reliance on the computer hardware, software, and data resources of the Internet, Intranets,
extranets, and other networks has emphasized that for many users the network is the computer. This
network computing, or network-centric, concept views networks as the central computing resource of
any computing environment. It appears to be the architecture that will take computing into the next
century.
Network computers provide a browser-based user interface for processing small application
programs called applets.
Network computers are microcomputers without floppy or hard disk drives that are designed as lowcost networked computing devices.
Servers provide the operating system, applets, databases, and database management software
needed by the end users in the network.
52
Link a companys wide area and local area networks to the networks of customers and suppliers
both domestically and internationally.
Build new strategic business relationships and alliances with their stakeholders in an attempt to
increase and lock in their business, while locking out competitors.
Connect to information service providers, and other external organisations to provide better
information for management decision-making.
Suggested answer
Businesses are using telecommunications to:
cut costs;
share resources;
53
link a companys wide area and local area networks to the networks of customers and suppliers
both domestically and internationally;
build new strategic business relationships and alliances with their stakeholders in an attempt to
increase and lock in their business, while locking out competitors;
the connection to information service providers, and other external organisations provides better
information for management decision-making.
ACTIVITY
Case study 5.1(Finders Keepers) on p. 199 has to do with RFID technology. To understand better the
concept of telecommunication attempt the case. Also turn to p. 198 of Bocij et al. and do Discussion
Questions 2 and 3.
The suggested answers are given at the end of the study unit.
3.7
TRENDS IN TELECOMMUNICATIONS
There is definitely a change in the business use of telecommunications. The trend toward more
vendors, services, advanced technologies, and open systems dramatically increase the number of
feasible applications. Telecommunications, therefore, is playing a more important role in support of the
operations, management, and strategic objectives of both large and small companies. The difference
between analogue and digital network technologies, the various communication media, the trend
towards open systems and the application trends should be noted.
The trend is towards the pervasive use of telecommunications networks in support of business
operations, managerial decision-making, and strategic advantage in domestic and global markets.
54
Bocij et al., pp. 194-199 gives an idea about the various trends occurring in the field of
telecommunications.
MANAGEMENT RESPONSIBILITY
Telecommunications is so important in organisations that any manager has to be aware of the
telecommunications trends in the industry, otherwise, the organisation could fall in the trap of poor
decisions or investments in this minefield. This could lead to a situation where the organisation is
unable to compete with rival organisations. A basic knowledge of the technology trends is also
important to enable the managers to make the right decisions in obtaining and managing
telecommunications technology in your organisation.
3.8
THE INTERNET
The simplest way in which the internet can be described is as a global network system made up of
smaller systems.
The history and origin of the internet as a business tool is surprising since it has taken a relatively long
time to become an essential part of business. The internet was conceived by the Defense Advanced
Research Projects Agency (DARPA), an American intelligence organisation in 1969.
The internet began to achieve its current form in 1987, growing from systems developed by DARPA
and the National Science Foundation (NSF). The internet is only the latest of a series of developments
through which the human race has used technology to disseminate information.
3.8.1
The Internet does not have a central computer system or telecommunications centre. Instead
each message sent on the Internet has an address code so any computer in the network can
forward it to its destination.
55
The usage of the Internet is growing rapidly. This high level of traffic on the net makes it very
slow. That is a major problem.
The most popular Internet application is e-mail. Other applications include assessing files and
databases from libraries and organisations, and holding real-time conversations with other
Internet users.
3.9
links workstations together to form virtual work groups to work on joint projects such as product
development, marketing campaigns, and scientific research;
allows for collaboration through Internets global e-mail and bulletin board systems (BBS);
the Internet represents the wave of the future in business telecommunications and
special software programs are required to access the Internet. Examples include Gopher,
Mosaic, Netscape and Explorer.
56
Additional reading
For further reading on The Internet, refer to pp. 200-216 of Bocij et al.
Do you think that the Internet can be to the benefit of managers? Explain.
Do you agree with the following statement: The only way to compete in the global society, is to
do business electronically. Therefore, organisations should use the Internet as a vehicle for
international trade. Explain.
3.10 E-COMMERCE
Electronic commerce (e-commerce) is defined as sharing business information, maintaining business
relationships, and conducting business transactions through the use of telecommunication networks.
What is referred to as traditional e-commerce has been conducted using EDI, enterprise-wide
messaging systems, fax communication, bar coding, and other private local area network and wide
area network systems. E-commerce is also about reorganizing internal business processes and
external business alliances and creating new consumer-oriented products and services globally. The
term e-business is sometimes used interchangeably with the term e-commerce to refer to this broader
concept.(Bocij et al 2008:48)
3.10.1 E-Commerce Models
There are several forms of e-commerce, or e-commerce models, based on who is involved in
the transaction:
Business-to-business (B2B). The business-to-business (B2B) model represents interorganizational information systems in which a company handles transactions within its own
value chain or with other businesses and organizations.
57
merchants are able to collect about them, is opening up new opportunities for both businesses and
consumers. Consumers can access more information than was previously available and businesses
collect more information than they were previously able to. Now, instead of trying to gather information
about businesses or consumers from multiple sources, both parties can use the Internet to cobble
together more information than ever. And do it much easier and faster than ever before.
Interactivity: E-commerce originally presented simple, static Web sites to customers with limited
possibilities of interactivity between the two. Now, most major retailers and even small shops, use a
variety of ways to communicate with customers and create new relationships around the globe.
MANCOSA BCom ITM Year 2
58
transparency allowing them to comparison shop quickly and easily. Cost transparency is another
benefit consumers enjoy that theyve never had available as readily as what they can find on the
Internet. On the other hand merchants gather much more information about customers and use it for
price discrimination.
Personalization/Customization: The neighbourhood merchant probably knows most customers by
name and remembers their personal preferences. That same comfortable relationship can now be
extended to the Internet through a variety of personalization and customization technologies.
Interactivity, richness, information density, and universal standards help make it possible.
Social Technology: User Content Generation and Social Networking: Social networks are no
longer limited to those people living in your immediate, physical neighbourhood or even the same town
or city. Your social network can now extend to all four corners of the world. More and more content is
being generated by users like video, audio, graphics, and pictures.
59
Suggested answers
1. Do you think that the introduction of client/server system has been worthwhile to
businesses?
This question is a straight analysis of the business benefits compared to the disadvantages of
client/server system. It is a specific instance of a general issue facing businesses with the introduction
of any new technology. Client/server system can be compared to a previous situation in a business
where the PCs are not networked or more likely, a mainframe is used with character-based dumb
terminals.
The key benefits of client/server system are as follows:
Improved flexibility for the end users to deploy specialised applications and to write their own
applications using tools such as MS Excel or Access
Improved ease of use on the client side since traditional applications tend to be character based
rather than using a WIMP interface (Chapter 4)
The cost-reduction argument is not clear. The experience of implementing client/server system is
that although the purchase price of hardware and software may be lower, the lifetime or total cost
of ownership (TCO) may be higher. Much analysis of TCO has been conducted by the Gartner
Group (www.gartner.com) and is briefly referred to in Chapter 16. The high TCO of client/server
systems arises from the cost of supporting them; since it is easy to modify the configuration, it is
also possible to stop applications working.
60
The stability or reliability of client/server system is questionable. There are many examples of
client/server
system
failures
mentioned
in
the
UK
trade
papers
such
as
www.computerweekly.co.uk and www.computingnet.co.uk. A recent example is that of the rollout of a UK-wide system for the National Westminster bank that is based on Windows NT. This
rollout has experienced technical difficulties resulting from software incompatibilities.
The control and administration of traditional mainframe systems tend to be easier since they are
more centralised, with less opportunity for the end user to configure the software. This is similar to
the TCO argument.
The security of client/server systems may be less robust than mainframe systems.
System designers are still learning about the best way to construct client/server systems. Early
implementations tended to be error prone and difficult to maintain since two-tier architecture had
been adopted in which the application logic and data access routines are mixed with the program
code for interacting with the user.
Many of the disadvantages of client/server systems result from the relatively new introduction of
client/server techniques in the late 1980s and 1990s. Mainframe technology has been in existence for
30 years and many of the mistakes currently being made with client/server systems have already been
learned by companies and rectified for mainframes. This is true for many new technologies. For
example, both UNIX and Windows NT operating systems can be used as a basis for developing
client/server, but UNIX has a reputation for being more secure and reliable since it has existed longer.
So it can be argued that some of the disadvantages of client/server systems are greater if the Windows
NT environment is used for the implementation.
Since there is no clear cost-reduction argument either way, the overall balance in this discussion is
governed by how important a business considers the improved usability and flexibility of client/server
systems are in comparison to the likelihood of poorer reliability and control.
MANCOSA BCom ITM Year 2
61
New software systems will often be introduced as part of the installation of a network. This might
include tools such as e-mail or groupware, or enterprise resource planning (ERP) software
(Chapters 6 and 14). Such software will often require new working practices. For example, e-mail
will only work effectively for a business if there are guidelines stating it is used in preference to
paper or ensuring replies within a set period. This is particularly true for e-mails received from
customers a company could introduce a rule stating that each e-mail should be replied to within
two days. ERP software may require new business structures to be adopted as part of a business
process redesign exercise (Chapter 14).
A network can be used to help a company move towards a paperless office. This will only occur if
there is management commitment to this. If commitment does not occur, the advantages of the
network may be wasted.
62
A network can also help promote teamwork in an organisation using groupware (Chapter 6) and
intranets (Chapter 16). These help the staff to collaborate, communicate and work in new ways. For
example, the need for travel to meetings can be reduced through the use of videoconferencing and
discussion forums.
A change in purchasing policy is needed in buying shared devices such as printers, rather than
purchasing them by individual departments.
Arguments against changing working practices are weak, but could include the following:
3. Discuss the merits and disadvantages of locating company e-business services inside a
company, in comparison with outsourcing to an ISP or ASP.
Select particular type(s) of e-business services to refer to in answering this question, e.g. site
hosting, e-mail management for questions and accounting packages.
Review the benefits of external location: maintenance costs, expertise, responsiveness to short
term problems, e.g. a new virus and longer-term technological trends.
Decreasing cost
63
Provides real-time information on movement of stock in supply chain permitting quick response.
Disadvantages:
64
PART 4
OPERATIONAL EXCELLENCE AND CUSTOMER
INTIMACY: ENTERPRISE SYSTEMS
65
Explain enterprise resource planning, its advantages, disadvantages, business value, the
challenges and trends.
Discuss the role of supply chain management, its benefits and also the challenges.
Discuss the role of customer relationship management (CRM), the phases in CRM its benefits and
also the challenges.
Discuss the role of Supplier Relationship Management (SRM) with regards to procurement
66
INTRODUCTION
The value of Business information systems (BIS) to an organisation is dependent on how the hardware,
software and network technologies described in the previous chapters are applied to support the
organisations objectives. This is achieved through deployment of specific business applications that
support different organisational processes and functions.
This chapter considers enterprise systems and their major components of enterprise resource
planning (ERP), supply chain management (SCM) customer relationship management (CRM) and
supplier relationship management (SRM).
4.2
Enterprise systems aim to support the business processes of an organisation across any
functional boundaries that exist within that organisation.
4.3
Done correctly, enterprise systems can offer big rewards. Conversely, done incorrectly can cause firm
huge headaches, loss of business, employee turmoil, and wasted dollars.
The changes in the enterprise will be tremendous:
Management:
More efficient operations and customer-driven business processes: all functional areas
can focus more on the customer and respond to product demand more efficiently.
A more uniform organization: a more disciplined approach to business throughout the entire
firm, regardless of physical location and/or organizational structure.
Bottom Line: Enterprise systems force a company to fully integrate all business processes. These
systems usually require massive changes in the structure and organization of a business and are
difficult to implement. However, the changes can make a tremendous improvement in a firm by using
the best practices of the industry and requiring all functional areas to focus more on the customer.
67
Enterprise resource planning (ERP) systems serve as a cross-functional enterprise backbone that
integrates and automates many internal business processes and information systems within the
manufacturing, logistics, distribution, accounting, finance, and human resource functions of a company.
Additional Reading
Remember ERP is a business operating system. Make sure that you understand this concept as it
forms a crucial part of E-business. Please note the definition on p.232 of Bocij et al.
4.4.1
ERP software is a family of software modules that supports the business activities involved in vital
back-office processes.
ERP is viewed as a necessary ingredient for the efficiency, agility, and responsiveness to
customers and suppliers that an E-business enterprise needs to succeed in the dynamic world of Ecommerce.
4.4.2
4.4.3
Advantages of ERP
Integration of all internal and external processes resulting in increased efficiency and quality of
customer service
Better sharing of information within the organisation due to integration of modules leading to
better decision making and a more agile organisation
68
Additional Reading
Read the mini case study Did it work? Huge benefits from tidying up on page 234 of Bocij et al.
Simplified support and maintenance through a single supplier rather than dealing with many
legacy systems
Additional Raeding
Read the mini case study Workforce complain of too little training on page 235 Bocij et al.
4.4.4
Hardware and software costs are a small part of the total costs. The cost of developing new
business processes (reengineering) and preparing employees for the new system (training and
change management) make up the bulk of implementing a new ERP system.
Converting data from previous legacy systems to the new cross-functional ERP system is another
major category of ERP implementation costs.
4.4.5
69
Failure to involve affected employees in the planning and development phases and change
management programs
Insufficient training in the new work tasks required by the ERP sys4em.
4.4.6
Trends in ERP
Four major developments and trends that are evolving in ERP applications include:
ERP software packages are gradually being modified into more flexible products.
In relation to the growth of the Internet and corporate intranets and extranets prompted software
companies to use internet technologies to build Web interfaces and network capabilities into ERP
systems.
Development of inter-enterprise ERP system that provide Web-enabled links between key business
systems of a company and its customers, suppliers, distributors, and others.
ERP software companies have developed modular, Web-enabled software suites that integrate
ERO, customer relationship management, supply chain management, procurement, decision
support, enterprise portals, and other business applications and functions.
Additional Reading
For further reading on ERP: Turn to pp. 232-236 of Bocij et al.
ACTIVITY
Attempt Self-assessment Question 1 on p. 271 of Bocij et al.
4.5
As mentioned earlier, another major component of enterprise systems is supply chain management
(SCM).
70
The supply chain consists of the series of activities that moves materials from suppliers, through the
organisation to customers. A representation of the structure of a supply chain is shown in the figure
below .
Figure 4.1: The structure of a supply chain
Supply chain management and logistics are terms used to refer do the management of the flow of
materials through the entire supply chain. The following figure gives an overview of the terms used to
describe the management of the supply chain.
MANCOSA BCom ITM Year 2
71
Upstream suppliers: Suppliers that supply the organisation with goods or services.
SCM supports the objectives of the top three management levels of an organisation (strategic, tactical,
and operational). The role of information technology in SCM is to support these objectives with interenterprise information systems that produce many of the outcomes a business needs to effectively
manage its supply chain.
72
Major business benefits that are possible with effective supply chain management systems include:
Faster, more accurate order processing, reductions in inventory levels, quicker time to market,
lower transaction and materials costs, and strategic relationships with suppliers.
Companies can achieve agility and responsiveness in meeting the demands of their customers and
the needs of their business partners.
Lack of proper demand planning knowledge, tools, and guidelines is a major source of SCM failure.
Inaccurate or overoptimistic demand forecasts will cause major production, inventory, and other
business problems, no matter how efficient the rest of the supply chain management process is
constructed.
Inaccurate production, inventory, and other business data provided by a companys other
information systems are frequent causes of SCM problems.
SCM software tools are considered to be immature, incomplete, and hard to implement by many
companies who are installing SCM systems.
4.5.5
TRENDS IN SCM
First stage a company concentrates on making improvements to its internal supply chain
process and its external processes and relationships with suppliers and customers.
73
Third stage company begins to develop and implement cutting-edge collaborative supply chain
management applications using advance SCM software, full-service extranets links, and private
and public e-commerce exchanges.
ACTIVITY
Attempt Self-assessment Question 3 on p. 271 of Bocij et al.
4.6
CRM is described as a cross-functional E-business application that integrates and automates many
customer-serving processes in sales, direct marketing, accounting and order management, and
customer service and support.
CRM systems create an IT framework that integrates all the functional processes with the rest of a
companys business operations.
CRM systems consist of a family of software modules that perform the business activities involved
in such front office processes.
CRM software provides the tools that enable a business and its employees to provide fast,
convenient, dependable, and consistent service to its customers.
It costs six times more to sell to a new customer than to sell to an existing one.
A typical dissatisfied customer will tell eight to ten people about his or her experience.
A company can boost its profits 85 percent by increasing its annual customer retention by only 5
percent.
The odds of selling a product to a new customer are 15 percent, whereas the odds of selling a
product to an existing customer are 50 percent
74
Seventy percent of complaining customers will do business with the company again if it quickly
takes care of a service snafu.
More than 90 percent of existing companies do not have the necessary sales and service integration to
support E-commerce.
4.6.2
Further reading
Study Paragraph on CRM Systems on page 241 Bocij et al.
CRM systems are built around a database and when this database is accessed by employees and
customers using a website the technology is often referred to as e-CRM. Common applications which
would be integrated in a CRM system include:
Customer data collection: This includes personal details such as age, sex and contact address and
also a record of purchase transactions undertaken
Customer data analysis: The captured data allow the categorisation and targeting of customers
according to criteria set by the firm. This information can be useful for marketing campaigns.
Salesforce automation: The entire sales cycle from lead generation to close of sale and after-sales
service can be facilitated using CRM.
CRM programmes typically include:
Sales. CRM software tracks customer contacts and other business and life cycle events of
customers for cross-selling and up-selling.
Direct Marketing and Fulfilment. CRM software can automate tasks such as qualifying leads,
managing responses, scheduling sales contacts, and providing information to prospects and
customers.
Customer Service and Support. CRM helps customer service managers quickly create, assign,
and manage service requests. Help desk software assists customer service reps in helping
customers whom are having problems with a product or service, by providing relevant service data
and suggestions for resolving problems.
75
CRM allows a business to identify and target their best customers; those who are the most
profitable to the business, so they can be retained as lifelong customers for greater and more
profitable services.
CRM enables real-time customisation and personalisation of products and services based on
customer wants, needs, buying habits, and life cycles.
CRM can keep track of when a customer contacts the company, regardless of the contact point.
CRM enables a company to provide a consistent customer experience and superior service and
support across all the contact points a customer chooses.
Acquire a business relies on CRM software tools and databases to help it acquire new
customers by doing a superior job of contract management, sales prospecting, selling, direct
marketing and fulfilment. The goal of these CRM functions is to help customers perceive the value
of a superior product offered by an outstanding company.
Enhance Web-enabled CRM account management and customer service and support tools help
keep customers happy by supporting superior service from a responsive networked team of sales
and service specialists and business partners. CRM sales force automation and direct marketing
and fulfilment tools help companys cross-sell and up-sell to their customers, thus increasing their
profitability to the business. The value perceived by customers is the convenience of one-stop
shopping at attractive prices.
Retain CRM analytical software and databases help a company proactively identify and reward
its most loyal and profitable customers to retain and expend their business via targeted
marketing and relationship marketing programs.
o The value perceived by customers is of a rewarding personalized business relationship
with their company.
76
CRM allows a business to identify and target their best customers; those who are the most
profitable to the business, so they can be retained as lifelong customers for greater and more
profitable services.
CRM enables real-time customization and personalization of products and services based on
customer wants, needs, buying habits, and life cycles.
CRM can keep track of when a customer contacts the company, regardless of the contact point.
CRM enables a company to provide a consistent customer experience and superior service and
support across all the contact points a customer chooses.
CRM Failures:
Major reason for the failure of CRM systems is the lack of understanding and preparation.
4.6.5
TRENDS IN CRM
Four types or categories of CRM that are being implemented by many companies today include:
Operational CRM most businesses start out with operational CRM systems such as sales force
automation and customer service centres.
Analytical CRM analytical CRM applications are implemented using several analytical marketing
tools, such as data mining, to extract vital data about customers and prospects for targeted
marketing campaigns.
Portal-based CRM Internet, intranet, and extranet Web-based CRM portals as a common
gateway for various levels of access to all customer information, as well as operational, analytical,
and collaborative CRM tools for customers, employees, and business partners.
ACTIVITY
Attempt Discussion Question 1 on p. 271 of Bocij et al.
77
DIAGRAM
78
Additional Reading
Study Paragraph on SRM on page 243 and Figure 6.7 on page 243 of Bocij et al., relating to the steps
in the procurement process.
Refer to Mini case study Lloyds TSB Banks on SAP SRM on page 244 of Bocij et al., for a better
understanding of e-procurement
4.7.2
Advantages of SRM
SRM can achieve significant savings and other benefits which directly impact the customer
including faster purchase cycle times leading to a need for less material in inventory and less
staff time spent in searching and ordering products and reconciling deliveries with invoices.
SRM enables greater flexibility in ordering goods from different suppliers according to best
value.
SRM allows the integration of the many information systems that are used to cover different
parts of the SRM process.
4.7.3
Disadvantages of SRM
The major barrier to the use of SRM is in the difficulty of linking systems with suppliers whose
systems may be incompatible or non-existent.
Additional Reading
For further reading on SRM, study Paragraph on SRM on page 243 of Bocij et al.
79
Production planning and materials management* Information is provided in the progress of work
through the manufacturing system in relation to the due date for a customer order. Enables plans to
be developed for resources (e.g. labour, materials and equipment) needed for production and to
schedule order and quantity of components on a day-to-day basis. Materials management
approaches include Materials requirements planning (MRP), Just-in-time (JIT) and optimised
production technology (OPT).
Product/service design. A database of information required for aspects such as customer needs
and material costing for the design process, Computer-aided design (CAD) provides graphic design
assistance.
Facility design. Software allows the use of the statistical process control (SPC) technique for quality
control.
Computer integrated manufacture (CIM). Provides a range of facilities coordinated over a network
system using the manufacturing automation protocol (MAP).
80
81
PART 5
INFORMATION SYSTEMS IN PERSPECTIVE
82
discuss how Management Information System (MIS), Decision Support System (DSS), Group
Decision Support System (GDSS), Executive Information System(EIS) Geographic Information
System(GIS) and Expert System (ES), can support different parts of an organisation;
explain the decision types and their relation to different types of system.
83
INTRODUCTION
Information systems fall into the categories of Management Information Systems (MIS), Decision
Support System (DSS), Executive Information System, or Expert System. Any specific system can
have a mix of their features. The design features to incorporate into an information system should be
chosen based on the communication and decision-making requirements of the managerial users.
This unit deals with the features and benefits that the different systems entail. Further the section gives
an overview of how different systems support the activities of a business organisation and also the
classifications of decisions by decision types and their relation to different types of system.
5.2
5.3
The identification of problems according to their degree of structure dates back to Garry and ScottMorton (1971) but it still provides a useful framework for defining decision types. Figure 5.1 indicates
that at the operational level, structured decisions predominate. Decision Support systems are mainly
used to support the tactical, semi-structured decisions that need to be made as part of the evaluation
and planning of the business. Executive information systems are targeted at strategic decision making,
which often involves unstructured decisions.
MANCOSA BCom ITM Year 2
84
Additional Reading
Read through the paragraph Management Information Systems (MIS) and Decision Types on page
258 of Bocij et al.
5.4
DSS provide information and models in a form to facilitate tactical and strategic decision making.
5.4.1
DSS provide support for decisions on the semi-structured and unstructured levels whose
solutions cannot be specified in advance; and
85
Models are an important component of decision support systems. A model can be defined as a
simplified abstraction of reality that illustrates the fundamental components and relationships of a
system or other phenomena. Models can be physical, verbal, graphical or mathematical.
Further reading
For further reading on Decision Support Systems (DSS): turn to pp. 259-262 of Bocij et al.
The software resources needed by decision support systems should integrate the management and
use of the model bases, databases, and dialogue generation capabilities of a DSS. DSS software
resources should support the following capabilities:
Dialogue management: DSS software provides an attractive user interface that supports the
dialogue between an user and the DSS which are vital for the interactive analytical modelling
needed (commands, menus, icons etc.).
Model base management: DSS software supports the development, storage, retrieval,
revision, and control of the models in a DSS model base. It also help linking models together to
construct integrated models, and supports the analytical modelling needed to assist the
decision making process.
Database management: The creation, use, and maintenance of a DSS database are
accomplished by database management software. It helps define and modify the structure of
the data records and relationships in the database, the storage and retrieval of data, the
updating of the database, and the control of the integrity of the database.
Further reading
Turn to p.260 of Bocij et al. and refer to where DSS software is discussed in the paragraph of DSS
Components.
Refer to the suggested answers at the end of the study unit.
MANCOSA BCom ITM Year 2
86
Group decision support systems (GDSS) are designed to improve the productivity of decisionmaking meets by enhancing the dynamics of collaborative work. The GDSS also includes specific
communication-oriented software tools that support the development and sharing of ideas.
5.6
A geographic information system (GIS) is a special type of decision support system designed to
work with maps and other spatial information. A GIS is used to support a wide variety of managerial
decisions that involve geographic information.
5.7
EIS packages work with telecommunications and database management software to provide
easy access to internal, external, and special databases with almost instantaneous response
times;
EIS provide information about the current status and projected trends regarding a companys
critical success factors, as determined by its top management;
an analytical modelling capability to evaluate alternatives for DSS is also available; and
information is presented in forms tailored to the preferences of the executive using the system.
Further reading
For further reading on Executive Information Systems (EIS): turn to Bocij et al., pp. 263-264.
87
If you do not use support systems at this stage, contact the information systems department
and ask them what support tools are available that could help you in your decision making role.
5.8
Major changes and expansion are taking place in traditional MIS, DSS, and EIS tools for providing the
information and modelling that managers need to support their decision making. Some of these
changes include:
Decision support in business is changing, driven by rapid developments in end user computing and
networking; Internet, web browser, and related technologies, and the explosion of E-commerce
activity.
Growth of corporate intranets, extranets, as well as the Web, has accelerated the development and
use of executive class information delivery and decision support software tools by lower levels of
management and by individuals and teams of business professionals.
Dramatic expansion of E-commerce has opened the door to the use of such E-business DSS tools
by the suppliers, customers, and other business stakeholders of a company for customer
relationship management, supply chain management, and other E-business applications.
Enterprise information portals are being developed by companies as a way to provide webenabled information, knowledge, and decision support to executives, managers, employees,
suppliers, customers, and other business partners.
Enterprise information portals are described as a customized and personalized web-based
interface for corporate intranets, that give users easy access to a variety of internal and external
business applications, databases, and services.
88
EXPERT SYSTEMS
An expert system (ES) supports decision making by providing managers with access to
computerized expert knowledge. An ES is designed to replicate the decision-making process of a
human expert. Todays expert systems are based on years of artificial intelligence (AI) research
devoted to replicating elusive human cognitive abilities in machines.
A knowledge base is similar to the database component in an MIS or a DSS. In addition to facts, a
knowledge base contains a system of rules for determining and changing the relationship between
those facts.
Along with the knowledge base, an ES includes a user interface and an inference engine. The
inference engine combines the user input with the knowledge base, applies logical principles, and
produces the requested expert advice.
Expert systems are difficult to build. To simplify the process, many software companies sell expert
system shellsgeneric expert systems containing human interfaces and inference engines. These
shells do not include the difficult-to-create knowledge base. A knowledge engineera specialist who
interviews and observes experts and converts their words and actions into the knowledge base
usually constructs the knowledge base.
89
ACTIVITY
Answer essay questions 2 on 271 of Bocij et al.
5.10
EDI is one of the most important developments in the world. Electronic trade is the revolution of the
future and a lot of overseas trade is done by means of telecommunications and the use of electronic
data interchange and electronic funds transfer. The main concern is that South Africa is lagging behind
the rest of the world in using this technology. It is, therefore, one of the major challenges of the modern
South African manager to use this technology to gain a competitive advantage. If not, your organisation
could suffer significantly.
Electronic data interchange (EDI) involves the electronic exchange of business transaction
documents over the Internet and other networks between supply chain trading partners (organisations
and their customers and suppliers). Data representing a variety of business transaction documents are
electronically exchanged between computers using standard document message formats.
5.10.1 Characteristics of EDI software include:
EDI software is used to convert a companys own document formats into standardized EDI formats
as specified by various industry and international protocols.
Formatted transaction data are transmitted over network links directly between computers, without
paper documents or human intervention.
90
Besides direct network links between the computers of trading partners, third-party services are
widely used.
EDI eliminates the printing, mailing, checking, and handling by employees of numerous multiplecopy forms of business documents.
It allows the transmission of data without paper documents or human intervention. EDI can help
the organisation to:
reduce errors;
increase productivity;
Further reading
For further reading on EDI: Turn to pages 218-219 of Bocij et al.
91
What are the benefits and limitations that your organisation experiences?
Suggested answers
Answers to Essay Questions
2. Review the changing tools available for decision making at a strategic level within the
organisation. What does this mean for senior managers?
There is a move away from executive information systems (EIS) to the use of online analytical
processing (OLAP) to interrogate data warehouses. Question 2 in the Discussion questions section
discusses whether or not this represents a genuine change in facilities available to users. For senior
managers there is now a greater choice of tools available. The data warehouse provides the facility in a
single system to analyse data from across an organisation and drill down to identify the source of
problems. Such facilities were not always available in earlier generations of EIS.
3. Was the promise of expert systems in the 1980s delivered in the 1990s? Justify your answer.
Expert systems have not widely replaced human experts in many fields as had been envisaged. It has
been found difficult to match the flexibility of humans. Expert systems are most relevant to complex
problems in a well-defined subject area, such as assessing the credit risk of a loan applicant. The
justification is that ES are not used in the majority of businesses.
Which information systems tools can be used to support the marketing function?
Marketing information systems include:
Sales information systems. Employees involved in the sales area are required to identify potential
customers, negotiate the sale of goods and services with those customers and provide a follow-up
service. Systems are available to support each of these tasks. Prospect information systems provide
lists of potential customers by categories such as product range or geographic area.
92
93
94
PART 6
BUSINESS INFORMATION SYSTEM
DEVELOPMENT
95
explain the functions of each step in the System Development Life Cycle (SDLC)
Understand the role of prototyping process, rapid application development( RAD) and end user
system development
96
INTRODUCTION
There are many examples which demonstrate the use of information systems in a variety of disciplines.
A manager at a hotel chain can use an information system to look up client preferences. An accountant
at a manufacturing company can use an information system to analyse the costs of a new plant. A
sales representative can use an information system to determine which goods to order. Information
systems have been designed and implemented for almost every career and industry.
This study unit gives the user an overview how the project can be planned, aligned with corporate
goals, rapidly developed. This chapter gives the user an overview of the system development process.
6.2
Systems development includes every resource and every step that goes into producing an information
system that solves a problem or helps the organization take advantage of new opportunities.
The systems development process is also called a systems Development life Cycle (SDLC) because
the activities associated with it are ongoing. Several common systems development life cycles exist:
traditional, prototyping, rapid application development (RAD), end-user development and others. In
addition, companies can outsource the systems development process.
Systems development is a problem-solving process of investigating a situation; designing a system
solution to improve the situation; acquiring the human, financial, and technological resources to
implement the solution; and finally evaluating the success of the solution.
After a steering committee determines that a proposed project is desirable, a project team of end users
and systems analysts is formed to develop the system. An end user is a person who will use the
information system or the information it provides. A systems analyst is the IT professional who
develops the system.
Usually the systems analyst is part of the organization. However, the organization sometimes may
choose to contract, or outsource, the systems analyst from an outside consulting firm.
97
Investigation
System investigation involves defining the problemidentifying the information needs of the
organization, examining the current system, determining how well it meets the needs of the
organization, and studying the feasibility of changing or replacing the current system.
After completing the initial investigation of the problem, a systems analyst produces a feasibility study
to help management decide whether to continue with the system analysis. Types of feasibility are:
Technical.
Economic.
Operational.
Organizational.
6.2.1.2
Analysis
During the analysis phase, the systems analyst gathers documents, interviews users of the current
system (if one exists), observes the system in action, and generally gathers and analyses data to help
understand the current system and identify new requirements. The systems analyst identifies the
requirements related to each subsystem of the proposed system:
Input/output requirements.
Processing requirements.
Storage requirements.
Control requirements.
98
Design
The investigation phase focuses on why, the analysis phase focuses on what, and the design
phase focuses on how. The systems analyst considers important how-to questions in three
categories:
Database design.
Process design.
In many cases, the design phase produces a prototype systema limited working system or
subsystem to give the users and management an idea of how the completed system will work. With
prototyping, the systems analyst can modify the prototype until it meets the needs and expectations of
the organization.
6.2.1.4
Development
After the design is completed, the actual system development can begin. A large part of the
development schedule is devoted to testing the system. Members of the system development team
perform early testing to locate and eliminate bugs. This initial testing is known as alpha testing. Later,
potential users who are willing to work with almost-finished software perform public beta testing and
report bugs to the developers.
6.2.1.4
Implementation
When the testing is completed and known bugs have been eradicated, the new system is ready to
replace the old one. In some cases, the new system is run in parallel with the old system until the
analyst is confident that the new system is stable and reliable.
The systems analyst can choose one of four approaches for converting to the new system:
Direct cutover.
Phase-in approach.
Pilot approach.
99
Maintenance
The maintenance phase involves evaluating, repairing, and enhancing the system. For large custom
systems, maintenance involves a continual process of evaluating and adjusting the system to meet
organizational needs. In either case, maintenance usually lasts throughout the lifetime of the system.
6.2.1.6
Retirement
At some point in the life of a system, ongoing maintenance is not enough. Because of changes
in organizational needs, user expectations, available technology, and other factors, the system
no longer meets the needs of the users or the organization. At that point, its time to phase it
out in favour of a newer system and begin another round of the system life cycle.
6.3 SYSTEMS DEVELOPMENT TOOLS AND TECHNIQUES
6.3.1
Document review.
Interview.
Questionnaire.
Observation.
Sampling.
6.3.2
Modelling Tools
Modelling tools are graphic representations of a system. Some of the tools are:
A data flow diagram (DFD) is a simple graphical depiction of the movement of data
through a system.
A data dictionary, also called a repository, is a catalog or directory that describes all the
data flowing through a system.
A decision table shows, in a row-column format, the decision rules that apply and what
actions to take when certain conditions occur.
100
Today, many of the systems development tools and techniques are included in commercially
available software packages referred to as computer-aided systems engineering (CASE).
Most CASE tools software packages include the following:
A user-interface generator.
Further Reading
For further reading on SDLC, turn to p. 286 of Bocij et al.
6.4
PROTOTYPING
Prototyping is a preliminary version of part of a framework of all of an information system which can be
reviewed by end users. Prototyping is an iterative process where users suggest modifications before
further prototypes and the final information system is built (Bocij et al, 306).
Prototyping is the rapid development and testing of working models, or prototypes, of new
applications in an interactive, iterative process involving both IS specialists and business professionals.
Prototyping makes the development process faster and easier for IS specialists and business
professionals.
101
Prototyping makes the development process faster and easier, especially for projects where
end user requirements are hard to define.
Prototyping has also opened up the application development process to end-users because it
simplifies and accelerates systems design. These developments are changing the roles of end
users and information systems specialists in systems development.
6.4.1
Typically, large e-business systems still require using the traditional systems development
approach, but parts of such systems can frequently be prototyped.
A prototype of a business application needed by an end user is developed quickly using a variety
of application development software tools. The prototype system is then repeatedly refined until it
is acceptable.
Prototyping is an iterative, interactive process that combines steps of the traditional systems
development cycle, and allows the rapid development and testing of a working model.
Further Reading
Four further reading on Prototyping turn to p.309 of Bocij et al.
102
6.5
A method of developing information systems which uses prototyping to achieve user involvement and
faster development compared to traditional methodologies.
6.6
End user development represents a major trend in the use of information technology in organisations.
McGill et al. (2003) explain that user-developed applications (UDAs) are computer-based applications
for which non-information systems assume primary development responsibility. They support decision
making and organisational processes in the majority of organisations.
End user development has become much more popular in the last few years and involves the
development of applications by the business end user.
MANCOSA BCom ITM Year 2
103
Additional Reading
For further reading on End User Development: Turn to pp. 620-630 of Bocij et al.
Pay special attention to the paragraph on Managing EUC as part of IS Strategy on p. 625 and Table
16.2 on p. 625 that emphasises that end users should focus on the fundamental activities and basic
components of an information system.
ACTIVITY
Attempt essay question 1 on p. 629 of Bocij et al.
Suggested answers
ANSWER TO DISCUSSION QUESTION
1. The rise of rapid applications development is mainly a response to the failure of traditional
systems development methodologies to deliver the right system at the right price and at the
right time. Discuss.
This question asks students to reflect on whether or not a traditional approach to systems development
(such as SSADM) is inevitably going to result in systems that take longer to develop (and are therefore
more expensive) than alternative methods. The question also points to the assertion that since
business requirements change much more rapidly today, development methods which are more longwinded may result in systems developers solving what has become yesterdays problem rather than
todays or tomorrows. Students need to analyse whether or not methodologies such as SSADM
inevitably result in longer development times or if they can be modified to compete with alternatives
such as Dynamic Systems Development Methodology (DSDM).
104
105
feasibility study assessment of whether or not existing software is available may often be omitted;
analysis users may have their own opinions of the features that the software should fulfil, so they
do not consult with other potential users;
design users often progress straight on to programming since they do not have the design skills
or are more interested in programming a solution;
training;
suitability review;
106
PART 7
BUSINESS INFORMATION SYSTEMS PROJECT
MANAGEMENT
107
108
INTRODUCTION
Projects are unique, one time operations designed to accomplish a specific set of objectives in a
limited timeframe. Examples of projects include a building construction or preparing for the FIFA 2010
World Cup in South Africa. Management issues that involve typical questions facing managers related
to this topic are:
Which project management activities and techniques should be performed by the project
manager for a successful outcome?
In this unit the focus is on providing the technical knowledge that is necessary to manage information
systems projects. Large information systems projects like construction projects may consist of many
activities and must therefore be carefully planned and coordinated if a project is to meet its objectives.
The three key objectives of project management are shown in the following figure.
109
In general terms Lyytinen and Hirscheim (1987) researched the reasons for information systems
projects failing. They identified five broad areas which still hold true today:
Technical failure
Data failure
User failure
Organisational failure
Additional Reading
For more information on the success and failure of IT project management, read case study 9.1 Putting
an all-inclusive price tag on successful IT on page 344 of Bocij et al.
7.3
Project deliverables are any measurable, tangible, verifiable outcome, result, or item that is produced to
complete a project or part of a project. Examples of project deliverables include design documents,
testing scripts, and requirements documents. Project milestones represent key dates when a certain
group of activities must be performed. For example, completing the planning phase might be a project
milestone. If a project milestone is missed, then chances are the project is experiencing problems. A
project manager is an individual who is an expert in project planning and management, defines and
develops the project plan, and tracks the plan to ensure all key project milestones are completed on
time. The art and science of project management must coordinate numerous activities as displayed in
the figure below. Project managers perform numerous activities, and three of these primary activities
are:
1. Choosing strategic projects.
2. Setting the project scope.
3. Managing resources and maintaining the project plan.
110
Further Reading
Read the paragraph titled Steps in project management on page 350 of Bocij et al. and take special
note of the work breakdown structure.
7.4
This is a breakdown of the project or a piece of work into its component parts (tasks).it shows the
hierarchical relationship between the project tasks. It is an important part of estimation. Figure 7.2
illustrates a WBS structure for an accounting firm.
Figure 7.2: Work Breakdown structure (WBS) for an accounting
firm
111
112
Additional Reading
For further reading on Steps in project management: Turn to page 350 of Bocij et al. and take special
note of the work breakdown structure.
7.6
Calpine Corp., a large energy producer, uses project management software to look at its IT investments
from a business perspective. The company classifies projects in one of three ways: (1) run the
business, (2) grow the business, and (3) transform the business. Calpine splits its $100 million in assets
accordingly: 60 percent for running the business, 20 percent for growing the business, and 20 percent
for transforming the business. Calpine evaluates each of its 30 to 35 active projects for perceived
business value against project costs. For the company to pursue a project it must pass a return on
investment (ROI) hurdle. A business project must minimally provide two times ROI, and a
transformation project must provide five times ROl.
One of the most difficult decisions organizations make is determining the projects in which to invest
time, energy, and resources. An organization must identify what it wants to do and how it is going to do
it. The what plan of this question focuses on issues such as justification for the project, definition of
the project, and expected results of the project. The how part of the question deals with issues such
as project approach, project schedule, and analysis of project risks. Determining which projects to focus
corporate efforts on is as necessary to projects as each project is to an organization. The three
common techniques an organization can use to select projects include:
1. Focus on organizational goals.
2. Categorize projects.
3. Perform a financial analysis
113
IMPORTANT NOTE!
1.
Focus on organizational goalsManagers are finding tremendous value in choosing projects that
align with the organizations goals. Projects that address organizational goals tend to have a higher
success rate since they are important to the entire organization.
2. Categorize projectsThere are various categories that an organization can group projects into to
determine a projects priority. One type of categorization includes problem, opportunity, and directives.
Problems are undesirable situations that prevent an organization from achieving its goals. Opportunities
are chances to improve the organization. Directives are new requirements imposed by management
government or some other external influence. It is often easier to obtain approval for projects that
address problems or directives because the organization must respond to these categories to avoid
financial losses.
3. Perform a financial analysis-A number of different financial analysis techniques can be performed
to help determine a projects priority. A few of those include net present value, return on investment and
payback analysis. These financial analysis techniques help determine the organizations financial
expectations for the project.
7.7
Once an organization defines the projects it wants to pursue, it must set the project scope. Project
scope defines the work that must be completed to deliver a product with the specified features and
functions. The project scope statement is important because it specifies clear project boundaries. The
project scope typically includes the following:
Project producta description of the characteristics the product or service has undertaken.
Project objectivesquantifiable criteria that must be met for the project to be considered a
success.
114
Project exclusionsproducts, services, or processes that are not specifically a part of the
project.
The project objectives are one of the most important areas to define because they are essentially the
major elements of the project. When an organization achieves the project objectives, it has
accomplished the major goals of the project and the project scope is satisfied. Project objectives must
include metrics so that the projects success can be measured. The metrics can include cost, schedule,
and quality metrics along with a number of other metrics. SMART criteriauseful reminders on how to
ensure that the project has created understandable and measurable objectives.
7.8
Managing people is one of the hardest and most critical efforts a project manager undertakes. How to
resolve conflicts within the team and how to balance the needs of the project with the
personal/professional needs of the team are a few of the challenges facing project managers. More and
more project managers are the main (and sometimes sole) interface with the client during the project.
As such, communication, negotiation, marketing, and salesmanship are just as important to the project
manager as financial and analytical acumen. There are many times when the people management side
of project management made the difference in pulling off a successful project.
A project plan is a formal, approved document that manages and controls project execution. A welldefined project plan is characterized by the following:
Easy to understand.
Easy to read.
Communicated to all key participants (key stakeholders).
Appropriate to the projects size, complexity, and criticality.
Prepared by the team, rather than by the individual project manager.
115
116
117
Further reading
For further reading on project evaluation: Turn to p 367 of Bocij et al.
ACTIVITY
Attempt essay question 3 on page 370 of Bocij et al. on Project evaluation and review technique
118
Suggested answers
ANSWER TO CASE STUDY
Case Study 9.1: Putting an all-inclusive price tag on successful IT
1. Discuss the difficulties in estimating the costs and benefits of an IT project.
There is a need to consider the context of the IT project and thus the change required for a successful
implementation and delivery. IT departments tend to focus on the technical costs of hardware, software
and training but underestimate the costs of change. In the case study these costs are stated as
ensuring compliance with the business strategy; aligning the people with the processes the business is
changing to and ensuring that behaviours are commensurate with the required new ways of working.
There is also the traditional problem in that hardware and software costs estimates are relatively easy
to calculate but more benefits tend to be more qualitative and difficult to express as a number.
ANSWER TO ESSAY QUESTION
3. What is the most effective method of estimating the duration of an information systems
development project?
The answer can be approached in two main different ways; a good answer will explore both.
1 Top-down vs. bottom-up. Is the estimate built by producing broad estimates for each module
and then refining them, or by considering the detailed tasks and then building up an overall
estimate from the sum of these? It should be apparent that the second option is more time
consuming, but more accurate.
Review of techniques such as constructive cost model (COCOMO) which give estimates based on the
number of lines of source code or function point analysis that considers the functions and numbers of
inputs and outputs provided by the software. Both of these techniques can produce good answers, but
only when a good data set of similar past projects is available. They are probably both inferior to, but
quicker than, a bottom-up estimate. Function point analysis tends to be more detailed and accurate
than COCOMO.
MANCOSA BCom ITM Year 2
119
PART 8
INFORMATION SYSTEMS STRATEGY
120
explain the strategic applications of information systems that can gain competitive advantages for
an organisation; and
identify several basic competitive strategies and explain how they can be used to confront the
competitive forces faced by an organisation.
121
INTRODUCTION
Organisations that make the most effective use of business information systems (BIS) are those that
make BIS strategy an integral part of their overall business strategy. This study unit will give you an
understanding of the roles of information systems and technologies in helping an organisation achieve
a strategic advantage over its competitors. It emphasises competitive strategy concepts and the
strategic roles information systems can play in gaining competitive advantages for an organisation.
Furthermore, this study unit provides examples of the strategic business use of information technology
and discusses the major managerial challenges posed by strategic information systems.
8.2
Business Information Strategy: this defines how information, knowledge and the applications
portfolio will be used to support business objectives.
IS functionality strategy: this defines the most appropriate processes and resources to
ensure that information provision supports business strategy
IT strategy: this defines the software and hardware standards and suppliers which make up
the e-business infrastructure.
Further reading
For further reading on BIS Strategy: Turn to pp.509-511 in Bocij et al.
ACTIVITY
Attempt Case study 13.1 - Agile development can make business quick and light on page 531 and
answer the questions.
Compare your answers with the suggested answers given at the end of the study unit.
122
An organisation can survive and succeed in the long run if it successfully develops strategies to
confront the five competitive forces that shape the structure of competition in its industry. From an
information systems perspective, the tool provides further pointers towards how IS can be used to
benefit the business. The following diagram illustrates Porters five forces model
Figure 8.1: Porters five forces Model
123
Further reading
For further reading on Porters five forces model: Turn to pp 514-516 of Bocij et al.
8.3.1
Competitive Strategies
These competitive strategies include a cost leadership, differentiation, focus on market niche,
strengthen customer and supplier intimacy.
8.3.1.1 Low-cost leadership
produce products and services at a lower price than competitors while enhancing quality and level of
service
Examples: Wal-Mart, Dell
8.3.1.2 Product differentiation
Enable new products or services, greatly change customer convenience and experience
Examples: Google, Lands End, Apple iPhone
8.3.1.3 Focus on market niche
Use information systems to enable a focused strategy on a single market niche; specialize
Example: Hilton Hotels
8.3.1.4 Strengthen customer and supplier intimacy
Use information systems to develop strong ties and loyalty with customers and suppliers; increase
switching costs
Example: Chrysler, Amazon
Further reading
For further reading on competitive strategies: Turn pp. 516-517 of Bocij et al.
124
Be better than the competition. Thats the mantra of most companies that are serious about winning
the game. Areas of the organization most affected by leveraging technology are in producing the
product, getting it to the stores, and making the customer happy. For instance, think of all the activities
that go into getting the Cybernuts candy bar made, from procuring raw materials to actual production.
Then consider how the candy bar gets from the factory to the store shelves. And what about all those
commercials you see? These are primary activities. Just as important are support activities:
human resources, accounting, and finance.
production, shipping, and sales and marketing. The value chain model shown below will help an
organization focus on these activities and determine where to focus their efforts the most.
Figure 8.2: Michael Porters internal value chain model, showing the relationship between
primary and support activities to the value chain within a company
125
All those activities concerned with receiving and storing externally sourced materials
logistics
Operations
The manufacture of products and services - the way in which resource inputs (e.g.
materials) are converted to outputs (e.g. products)
Outbound
All those activities associated with getting finished goods and services to buyers
logistics
Marketing and
sales
Service
All those activities associated with maintaining product performance after the
product has been sold
Support Activities
Support activities include:
Secondary
Description
Activity
Procurement
This concerns how resources are acquired for a business (e.g. sourcing and
negotiating with materials suppliers)
Human Resource Those activities concerned with recruiting, developing, motivating and rewarding the
Management
workforce of a business
Technology
Development
Infrastructure
Concerned with a wide range of support systems and functions such as finance,
planning, quality control and general senior management
By effectively using an information system in a strategic role at any, or preferably all, levels of the
organization, a digital firm can provide more value in their products than the competition. If they cannot
provide more value, then the strategic information system should help them provide the same value but
at a lower price.
126
Additional Reading
Read the paragraph on the Value Chain of Bocij et al., p. 521
ACTIVITY
Do Examination questions 1, 2 & 3 of Bocij et al. on p. 533.
MANAGEMENT RESPONSIBILITY
The IS function can help managers develop competitive weapons (that use information technology) to
implement a variety of competitive strategies to meet the competitive challenges that confront any
organisation.
Successful strategic information systems are not easy to develop and implement. They may require
major changes in the way a business operates and in their relationships with customers, suppliers,
competitors, internal and external stakeholders, and others. Managers must determine how the
organisation can build information systems of strategic importance. Information systems, therefore, are
too important to be left entirely to a small technical group in the organisation. Managers, probably at
senior management level, must initiate the search for opportunities to develop strategic information
systems.
8.5
SUMMARY
The strategic role that information systems play in organisation to attain a competitive advantage is
crucial to survive in the challenging business environment. Information systems can be used to break
business barriers, reengineer business processes, improve business quality, to become an agile
competitor, and to create a virtual company. Organisations can also use the Internet to develop
strategic collaboration, operations, marketing and alliances to succeed in the fast-changing global
market.
127
Suggested answers
ANSWERS TO CASE STUDY
Case Study 13.1: Agile development can make business quick and light
What do the differences between the traditional waterfall model and agile development methods
suggest about their respective applicability to the strategic alignment of business and IS/IT
strategies?
Students are expected to focus on the following:
Agile software development can prevent organisations becoming locked into yesterdays ideas and
business strategies. It might be suggested that since projects based around the waterfall model
can take longer (sometimes much longer) before any software is actually implemented, the
business needs then may have moved on. However, agile methods that focus on the frequent
delivery of software products allow the system to evolve and meet changing business needs.
Since it is claimed that rigid specifications and inflexible development techniques can lock
organisations into yesterdays ideas and also inhibit commercial evolution, then the link between
software development methodologies and strategic alignment is clear: monolithic and rigid methods
can lead to a mismatch between what the business needs and the information systems that are
developed.
The link is summarised on the article thus: with agile development, the final product can be quite
different from that originally planned. But it tends to be more aligned with the business needs at the
time of completion rather than its needs at the start, which may now be outdated.
128
Some legacy systems in current use can date back to their original development at least two
decades ago; the writers of these systems never envisaged that the software would still be running
20 or more years later. This suggests that the software falls at least into the support or even the
key operational categories.
The legacy systems referred to above were built at a time when memory and disk space constraints
were severe and developers took every possible step to reduce storage space for data and
programs. It has been argued that running applications with full eight-digit dates would have been
prohibitively expensive, thus putting off systems development and fixing these systems is less than
the benefits that have accrued over the life of the system.
There is evidence that systems developed as recently as 6 or 7 years ago were not millennium
compliant. It is much harder to argue the storage and memory costs issue here. Recently
developed systems that use six-figure dates, therefore, do suggest that shorttermism exists.
The failure of many companies to get up to speed with their millennium compliance activities also
suggests that a degree of complacency exists (especially for those businesses with a turnover of
between 1 and 50 million). Also, it is suggested that some public sector organisations are leaving
things to the last minute. Both of these points suggests that, again, too many people are not taking
the problem sufficiently seriously and are concentrating on short-term objectives.
129
130
131
PART 9
INFORMATION SYSTEMS MANAGEMENT
132
133
INTRODUCTION
In part 8, a number of tools and issues relating to the development of IS/IT strategies and their
integration with an overall business strategy were explored. This section explores a range of issues
relating to the management of information systems within an organisation including investment
appraisal, outsourcing and the organisation and implementation of the IS/IT management function
within an organisation. By combining effective IS/IT strategies with effective implementation and
management, it will then become more likely that an organisation will have IS/IT solutions that provide
significant business benefits rather than ones which act as a drain on the organisation.
9.2
DOES IT MATTER?
As the amount of money spent by organizations on information technology has increased, there has
been a great deal of argument about the value delivered by this IT. Despite the large-scale investments
in IT within organizations, it is still not clear the extent to which investment in information systems
benefits organizations.
In 1987, the MIT professor and Nobel economist Robert Solow (Wed better watch out, New York
Times, 12 July 1987), made the remark: We see the computer age everywhere except in the
productivity statistics.
This expressed in words what many in business and economists had suspected.
Although there was a lot of expenditure on IT, there was relatively little to show for it. Subsequent
studies in the late 1980s and 1990s summarized by Brynjolfsson (1993) and Strassman (1997) did
indeed suggest that, across companies, there is little or no correlation between a companys investment
in information technology and its business performance measured in terms of profitability or
shareholder value.
This concept is known as the IT productivity paradox. Strassmans early work, looking at the paradox
at the firm level, was based on a study of 468 major North American and European firms which showed
a random relationship between IS spending per employee and return on equity. More recently
Brynjolfsson and Hitt (1998) and studies summarized in Financial Times (2003) have suggested that
the productivity paradox is no longer valid.
134
Additional Reading:
For further reading on IT Productivity Paradox, turn to pp. 538-539 of Bocij et al.
ACTIVITY
Do you agree that many organisations are reengineering their business processes at this stage? Make
sure you are familiar with this important concept.
9.3
Lubbe and Remenyi (1999) in their analysis of the management of IS/IT evaluation identified seven
benefit objectives that provide a stimulus to organisational IS/IT investment. In descending order of
significance these are:
Productivity
New opportunities
Change
Competitive advantage
Increased turnover
Reduced risk
135
Organisational strategy
Management decisions
Interfacing of systems
Quality of service
Budgets
Additional Reading
For further reading on IS Investment appraisal, turn to pp. 539-540 of Bocij et al.
9.4
How much an organisation will spend on IS will depend both on the size of the organisation and on the
nature of its business operations. Spending as a proportion of turnover will also vary over time
depending on the maturity of an organisations systems and on the organisation itself.
Further Reading
For additional reading on Determining investment levels, turn to pp. 540-543 of Bocij et al.
ACTIVITY
Do self assessment questions 1 and 2 on page 566 of Bocij et al.
136
There are two basic approaches to locating the information system function in an organisation that
operates at more than one location. These are the centralisation of all IS services at one office (usually
the head office) and decentralisation. It is unusual for a company to choose one extreme or the other;
typically, the approach will vary for the different types of services. The approach chosen is significant,
since it will have a direct correspondence to the quality of service available to the end- user
departments and the cost of providing this service.
9.5.1
It is useful to make a distinction between information systems and information technology. As has been
stated before, we can view IT as the infrastructure and an enabler, while information systems give a
business the applications that produce the information for decision-making purposes. IS cannot exist
without the IT to support them, but IT on its own does not of itself confer any business benefits.
For information technology the following must be managed:
Hardware platforms.
Network architectures.
PCs
Development tools.
Legacy systems.
Operations management.
Database administration.
Shared services.
IS/IT staffing.
137
Further Reading
For further reading on what needs to be managed, turn to pp.543 of Bocij et al
9.6
OUTSOURCING
Outsourcing is the process of hiring another organization to perform a service. Just about any business
activity in the value chain can be outsourced, from marketing and sales, to logistics, manicuring, or
customer service. Support functions, such as accounting and HR, can be outsourced as well. In this
section, we will focus on the outsourcing of IS and IT services but please realize that companies also
outsource most other business activities.
The outsourced vendor can be domestic or international. Some companies choose to outsource
overseas because labour is cheaper and to take advantage of time differences.
9.6.1
According to the Outsourcing Institute, the top 10 reasons companies outsource are:
1. Accelerate re-engineering benefits
2. Access to world class capabilities
3. Cash infusion
4. Free resources for other purposes
5. Function difficult to manage out of control
6. Improve company focus
7. Make capital funds available
8. Reduce operating costs
9. Reduce risk
10. Resources not available internally
(Source: Bocij et al. 2008:550)
ACTIVITY
Attempt essay question 3 on p. 567 of Bocij et al.
MANCOSA BCom ITM Year 2
138
Financial savings
Market agility
9.6.2
Business process outsourcing (BPO) is the contracting of a specific business task, such as payroll, to a
third-party service provider. Business process outsourcing is increasingly becoming the strategic choice
of companies looking to achieve cost reductions while improving their service quality, increasing
shareholder value, and focusing on their core business capabilities. Many organizations are looking
beyond traditional IT outsourcing to business process outsourcing as the next logical step.
Implementing BPO can save costs for tasks that an organization requires but does not depend upon to
maintain its position in the marketplace. BPO is divided into two categories: (1) back-office outsourcing
that includes internal business functions such as billing or purchasing, and (2) front-office outsourcing,
which includes customer-related services such as marketing or technical support.
Business process outsourcing is not a new field. Paychex, based in Rochester, New York, for example,
has been outsourcing payroll processing for small businesses since 1971. However, the market is
heating up these days, as companies need for strategic cost cutting, desire to improve business
methods, and comfort with outsourcing arrangements grow.
The Gartner Group estimated that the worldwide market for business process outsourcing would grow
to $178 billion in 2005. Management consulting and technology services company Accenture is a BPO
player. Accentures first BPO deal came in the early 1990s, when it outsourced finance and accounting
functions for British Petroleum. Accenture now handles a variety of outsourcing tasks, such as airline
ticket processing and call centre staffing for AT&T.
139
Offshore outsourcing
Offshore outsourcing is using organizations from developing countries to write code and develop
systems. Numerous countries have substantially well-trained IT professionals and clerical staff who
have lower salary expectations compared to their U.S. counterparts. Offshore outsourcing has become
a small but rapidly growing sector in the overall outsourcing market. Nearly half of all businesses use
offshore providers, and two-thirds plan to send work overseas in the near future, according to Forrester
Research. India receives most of the outsourcing functions from all over the world. However, as more
American companies seek to source globally, more countries are emerging to benefit from that
demandfrom Canada to Malaysiaeach with its own particular strengths and weaknesses.
Organizations have much to gain from offshore outsourcing.
Additional Reading
Study the paragraph making outsourcing work on p. 553 of Bocij et al.
ACTIVITY
Attempt Examination questions 1 & 2 on page 567 of Bocij et al
140
Suggested answers
ANSWERS TO SELF-ASSESSMENT QUESTIONS
1. What factors might account for the productivity paradox relating to IS/IT investments?
The main factors identified include:
Mis-measurement;
The lag occurring between initial investment and payback;
Mis-management of IS projects.
To these, can be added the notion that business benefits are often intangible in nature (e.g. improving
customer satisfaction) and that it is hard to put a money value on some factors. This would tend to
reinforce both the mis-measurement and lag arguments.
2. When information systems costs are being considered, what kinds of costs would be
considered development costs and what would be considered operations/maintenance costs?
Development costs would include the following:
package software and bespoke development costs;
relational database management system (RDBMS) acquisition;
initial hardware and infrastructure acquisition;
development tools.
Operations and maintenance costs include the following:
ongoing software licence costs;
legacy system maintenance;
telecommunications running costs;
help-desk support;
security management;
hardware technical support;
systems programming support.
141
142
143
PART 10
MANAGING INFORMATION SECURITY AND
ETHICAL CHALLENGES
144
identify several ethical principles that affect the use and management of information technology;
explain the privacy, social and legal issues related to information systems;
comment on the principles of the UK Data Protection Act 1984
145
INTRODUCTION
This chapter discusses the threats to computer systems with regard to business and the defences and
control needed for, the performance and security of e-business systems. The moral, legal and ethical
responsibilities of those involved in designing, developing and managing computer-based information
systems are also explained.
10.2
The need to ensure the accuracy of the data held by the organisation
10.3
Accidents
Attempts to carry out tasks beyond the ability of the employee. In smaller computer-based
information systems, a common cause of accidental damage involves users attempting to
install new hardware items or software applications. In the case of software applications,
existing data may be lost when the program is installed or the program may fail to operate as
expected.
Failure to comply with procedures for the use of organisational information systems. Where
organisational procedures are unclear or fail to anticipate potential problems, users may often
ignore established methods, act on their own initiative or perform tasks incorrectly.
Failure to carry out backup procedures or verify data backups. In addition to carrying out
regular backups of important business data, it is also necessary to verify that any backup
copies made are accurate and free from errors.
Update query: Used to change records, tables and reports held in a database management
system.
146
All information systems are susceptible to damage caused by natural phenomena, such as
storms, lightning strikes, floods and earthquakes.
In Japan and the United States, for example, great care is taken to protect critical information
systems from the effects of earthquakes.
Although such hazards are of less concern for instance, in Europe, properly designed systems
will make allowances for unexpected natural disasters.
Sabotage
Logic bomb: Sometimes also known as a time bomb, a logic bomb is a destructive
computer program that activates at a certain time or in reaction to a specific event.
Back door: A section of program code that allows a user to circumvent security
procedures in order to gain full access to an information system.
Data theft: This can involve stealing sensitive information or making unauthorised
changes to computer records.
Accidental deletion
Unauthorised use
Hacker: Hackers are often described as individuals who seek to break into systems as a test of
their abilities. Few hackers attempt to cause damage to systems that they access and few are
interested in gaining any sort of financial profit.
Cracker: A person who gains access to an information system for malicious reasons is often
termed a cracker rather than a hacker. This is because some people draw a distinction
between ethical hackers and malicious hackers.
Computer viruses
Computer virus: This is a computer programme that is capable of self-replication, allowing it to spread
from one infected machine to another. Whilst some methods such as logic bombs are beginning to
decline, others like the release of the virus construction kits are becoming more common. For example
parasitic viruses insert copies of themselves into legitimate programs. Macro viruses are created using
high level programming languages.
147
Additional Reading
Read table 15.3 on p. 589 of Bocij et al which gives an overview of estimated losses due to computer
viruses from 1999 to 2004.
Two other kinds of programmes are related to computer viruses: worms and Trojans.
A worm is a small program that moves through a computer system randomly changing or overwriting
pieces of data as it moves.
A Trojan appears as a legitimate program in order to gain access to a computer system.
Spyware represents a new type of threat for business and home users. In general, spyware describes
a category of software designed to capture and record confidential information without a users consent.
Additional reading
For further reading on threats to systems: turn to pp. 572-580 of Bocij et al.
10.4
E-BUSINESS SECURITY
There are many significant threats to the security of E-business and E-commerce. Business managers
and professionals alike are responsible for the security, quality, and performance of the business
systems in their business units.
10.4.1 Internetworked Security Defence
Security of todays internetworked E-business enterprises is a major management challenge. Vital
network links and business flows need to be protected from external attack by cyber criminals or
subversion by the criminal or irresponsible acts of insiders. This requires a variety of security tools and
defensive measures and a coordinated security management program.
148
Encryption
Encryption of data has become an important way to protect data and other computer network
resources especially on the Internet, intranets, and extranets. Encryption characteristics include:
Passwords, messages, files, and other data can be transmitted in scrambled form and unscrambled
by computer systems for authorized users only.
Encryption involves using special mathematical algorithms, or keys, to transform digital data into a
scrambled code before they are transmitted, and to decode the data when they are received.
The most widely used encryption method uses a pair of public and private keys unique to each
individual. For example: E-mail could be scrambled and encoded using a unique public key for the
recipient that is known to the sender. After the E-mail is transmitted, only the recipients secret
private key could unscramble the message.
Encryption programs are sold as separate products or built into other software used for the
encryption process.
There are several competing software encryption standards, but the top two are RSA and PGP.
10.4.3
Firewalls
Fire Wall computers and software is another important method for control and security on the Internet
and other networks. A network firewall can be a communications processor, typically a router, or a
dedicated server, along with firewall software. Firewall computers and software characteristics include:
A firewall serves as a gatekeeper computer system that protects a companys intranets and other
computer networks from intrusion by serving as a filter and safe transfer point for access to and
from the Internet and other networks.
A firewall computer screens all network traffic for proper passwords and other security codes, and
only allows authorized transmissions in and out of the network.
Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer
networks. In some cases, a firewall may allow access only from trusted locations on the Internet to
particular computers inside the firewall. Or it may allow only safe information to pass.
In some cases, it is impossible to distinguish safe use of a particular network service from unsafe
use and so all requests must be blocked. The firewall may then provide substitutes for some
network services that perform most of the same functions but are not as vulnerable to penetration.
149
The sites of zombie or slave computers that were commandeered by the cyber criminals.
First, an end user logs on to the computer system by entering his or her unique identification code,
or user ID. The end user is then asked to enter a password in order to gain access into the system.
150
Security monitor programmes provide the security measures needed to allow only authorized users
to access the networks.
Security monitors also control the use of the hardware, software, and data resources of a computer
system.
Security monitors can be used to monitor the use of computer networks and collect statistics on any
attempts at improper use.
Voice verification
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
Face recognition
Power failure
151
Electronic vandalism
The information services department typically takes steps to prevent equipment failure and to minimize
its detrimental effects. For example:
Establishing standards for electrical supply, air conditioning, humidity control, and fire prevention
standards
Arrange for a backup computer system capability with disaster recovery organisations.
Fail-Safe - Fail-Safe refers to computer systems that continue to operate at the same level of
performance after a major failure.
Fail-Soft - Fail-soft refers to computer systems that continue to operate at a reduced but
acceptable level after a system failure.
152
The development of information system controls and the accomplishment of E-business systems audits
are two other types of security management.
10.5.1 Information Systems Controls
Information systems controls are methods and devices that attempt to ensure the accuracy, validity,
and propriety of information system activities. Information System (IS) controls must be developed to
ensure proper data entry, processing techniques, storage methods, and information output. IS controls
are designed to monitor and maintain the quality and security of the input, processing, output, and
storage activities of any information system.
10.5.2 Auditing E-Business Systems
An important objective of E-business system audits is testing the integrity of an application audit trail.
An audit trail can be defined as the presence of documentation that allows a transaction to be traced
through all stages of its information processing. The audit trail of manual information systems was quite
visible and easy to trace, however, computer-based information systems have changed the form of the
audit trail.
ACTIVITY
What is your view on the importance of information system security and control?
Is it needed?
Why? Explain.
153
Developers, managers and users of computer-based information systems are expected to behave in a
professional manner at all times. They are expected to balance the needs of their employer and the
requirements of their profession with other demands such as responsibility to society. The term ethics,
morality and professionals are often used to describe the expectations of managers and employees.
10.6.1 What is Professionalism?
Professionalism can be described as acting to meet the standards set by a profession in terms of
individual conduct, competence and integrity.
10.6.2 What is Ethics?
Ethics describes beliefs concerning right or wrong that can be used by individuals to guide their
behaviour.
What is Morality?
Morality is concerned with an individuals personal beliefs of what is right and wrong.
10.6.3 Computer crime in E- Business
Computer crime is a growing threat to the security of computer-based information systems and thus
presents a major challenge to the ethical use of information technology.
Examples of computer crime are:
Hacking
Cyber Theft
Software Piracy
Computer Viruses
154
Additional Reading
For further reading on computer crimes: turn to p.645-646 of Bocij et al.
10.7
PRIVACY ISSUES
The power of information technology to store and retrieve information can have a negative effect on the
right to privacy of every individual.
Two examples can be used to illustrate common concerns related to privacy:
Additional Reading
For further reading on the Privacy Issues, turn to p. 641 of Bocij et al.
10.8
SOCIAL ISSUES
It is vital to note that computers can have many benefits to society. Applications such as the following
can be used to solve human and societal problems:
medical diagnosis;
computer-assisted instruction;
law enforcement.
MANCOSA BCom ITM Year 2
155
Additional Reading
For further reading on the Social Issues: Turn to pp. 639-642 as discussed of Bocij et al.
10.9
LEGAL ISSUES
156
Information shall be held only for one or more specific and lawful purposes.
Companies should not hold information that is excessive or not relevant to the Act.
Individuals have the right to see the data and make corrections where necessary.
Additional Reading
For further reading on the legal Issues: Turn to pp. 646-650 of Bocij et al.
157
NJ.
Applegate, LM, Austin, RD, and McFarlan, FW. (2003). Corporate Information Strategy and
Management. Text and Cases. 6th Ed. McGraw-Hill. NY.
Applegate, LM, McFarlan, FW, and McKenney, JL. (1999). Corporate Information Systems
Management. Text and Cases. 5th Ed. McGraw-Hill. NY.
Carr, DK and Johansson. (1995). Best Practices in Reengineering: What Works and What Doesnt
in
158
to
create Powerful Business Teams. Ian Thomas, P.O. Box 651521, Benmore, 2010. RSA.
Trialogue. (2004). The e-Business Handbook: The 2004 review of innovation at work in
South
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
S
sales and marketing information systems: Systems that help the firm identify customers for the
firms products or services, develop products and services to meet customers needs, promote these
products and services, sell the products and services, and provide ongoing customer support.
satellite: The transmission of data using orbiting satellites that serve as relay stations for transmitting
microwave signals over very long distances.
scalability: The ability of a computer, product, or system to expand to serve a larger number of users
without breaking down.
scoring model: A quick method for deciding among alternative systems based on a system of ratings
for selected objectives.
search costs: The time and money spent locating a suitable product and determining the best price for
that product.
search engine: A tool for locating specific sites or information on the Internet.
secondary storage: Relatively long term, non-volatile storage of data outside the CPU and primary
storage.
security: Policies, procedures, and technical measures used to prevent unauthorized access,
alteration, theft, or physical damage to information systems.
selection construct: The logic pattern in programming where a stated condition determines which of
two alternative actions can be taken.
senior managers: People occupying the topmost hierarchy in an organization who are responsible for
making long-range decisions.
sensitivity analysis: Models that ask what-if questions repeatedly to determine the impact of
changes in one or more factors on the outcomes.
sequence construct: The sequential single steps or actions in the logic of a program that do not
depend on the existence of any condition.
server: Computer specifically optimised to provide software and other resources to other computers
over a network.
server farm: Large group of servers maintained by a commercial vendor and made available to
subscribers for electronic commerce and other activities requiring heavy use of servers.
shopping bot: Software with varying levels of built-in intelligence to help electronic commerce
shoppers locate and evaluate products or service they might wish to purchase.
six sigma: A specific measure of quality, representing 3.4 defects per million opportunities; used to
designate a set of methodologies and techniques for improving quality and reducing costs.
smart card: A credit-card-size plastic card that stores digital information and that can be used for
electronic payments in place of cash.
smart phone: Wireless phone with voice, text, and Internet capabilities.
SOAP (Simple Object Access Protocol): Set of rules that allows Web services applications to pass
data and instructions to one another.
Socio-technical design: Design to produce information systems that blend technical efficiency with
sensitivity to organizational and human needs.
software metrics: The objective assessments of the software used in a system in the form of
quantified measurements.
MANCOSA BCom ITM Year 2
183
184
185
T
T1 line: A dedicated telephone connection comprising 24 channels that can support a data
transmission rate of 1.544 Mbps. Each channel can be configured to carry voice or data traffic.
tacit knowledge: Expertise and experience of organizational members that has not been formally
documented.
tangible benefits: Benefits that can be quantified and assigned a monetary value; they include lower
operational costs and increased cash flows.
team ware: Group collaboration software that is customized for teamwork.
techno stress: Stress induced by computer use; symptoms include aggravation, hostility toward
humans, impatience, and enervation.
telecommunications: The communication of information by electronic means, usually over some
distance.
telecommunications system: A collection of compatible hardware and software arranged to
communicate information from one location to another.
teleconferencing: The ability to confer with a group of people simultaneously using the telephone or
electronic-mail group communication software.
Telnet: Network tool that allows someone to log on to one computer system while doing work on
another.
test plan: Prepared by the development team in conjunction with the users; it includes all of the
preparations for the series of tests to be performed on the system.
testing: The exhaustive and thorough process that determines whether the system produces the
desired results under known conditions.
topology: The way in which the components of a network are connected.
total cost of ownership (TCO): Designates the total cost of owning technology resources, including
initial purchase costs, the cost of hardware and software upgrades, maintenance, technical support,
and training.
total quality management (TQM): A concept that makes quality control a responsibility to be shared
by all people in an organization.
trade secret: Any intellectual work or product used for a business purpose that can be classified as
belonging to that business, provided it is not based on information in the public domain.
traditional file environment: A way of collecting and maintaining data in an organization that leads to
each functional area or division creating and maintaining its own data files and programs.
transaction cost theory: Economic theory stating that firms grow larger because they can conduct
marketplace transactions internally more cheaply than they can with external firms in the marketplace.
transaction processing systems (TPS): Computerized systems that perform and record the daily
routine transactions necessary to conduct the business; they serve the organization's operational level.
trans-border data flow: The movement of information across international boundaries in any form.
Transmission Control Protocol/Internet Protocol (TCP/IP): U.S. Department of Defence reference
model for linking different types of computers and networks; used in the Internet.
Trans-national: Truly globally managed firms that have no national head months; value-added
activities are managed from a global perspective without reference to national borders, optimising
sources of supply and demand and taking advantage of any local competitive advantage.
MANCOSA BCom ITM Year 2
186
187
188
189