Académique Documents
Professionnel Documents
Culture Documents
Basics
What
Why
Relationship to Globalisation
Freeconomics
E-Commerce
Advantages of EC
Brick-and-mortar
o
Compete solely in the traditional, physical market space
Click-only (virtual)
o
Compete solely online, focusing purely on EC
Click-and-mortar
o
Straddle between physical and online
Extranet
o
Enables 2 or more firms to use the internet to engage in B2B
(business-to-business) EC.
o
Provides timely and accurate information, technology
integration and high value at low cost
Intranet
o
Using the internet to support internal business processes and
activities
o
Also known as B2E (business-to-employee)
Applications to consumers
C2C (customer-to-customer) EC
Mobile marketing
Trends in EC
M-commerce
o
Location based services
Issues
o
Securing payments
o
Protecting IP
o
Taxation of EC transaction
E-Government
Web 2.0
Web 2.0 refers to dynamic web applications that allow people to
collaborate and share information online. Main concept behind Web
2 is shift from user's role from passive consumer of content to creator
Advantages
Enhancing communications
Blogs
Commenting on virtually any topic that interests the author
Social presence (microblogging)
o
Send short status updates to followers (e.g. Twitter)
o
IM
Synchronous communications
Virtual worlds
o
Mainly for online gaming, but starting to be used for
showcasing products and hold rich interactive communication in
the business world
o
Enhancing cooperation
Enhancing connections
Issues include:
o
Culture
o
Organisational context
o
Hierarchies in organisations
o
Lack of critical mass
o
Generation gap
o
Technological inertia
Security
Organisation's opponents can use the same tools used to spread
information quickly to also spread damaging content to people all
over the world in a very short time
Organisations should therefore:
o
Set up crisis teams when needed
o
Identifying crisis scenarios
o
Monitoring the social media environment
o
Acting fast when a crisis surfaces.
Support activities:
Administrative activities
Infrastructure
HR
Tech development
Tech procurement
These activities form the value chain (the process or activities by which a
company adds value to an article, including production, marketing, and
the provision of after-sales service)
Firms connect their value chains with suppliers and consumers, creating
value systems such that information flows from one entity's value chain to
another.
Enterprise Systems
These are IS' that span the entire organisation and can be used to
integrate:
Business processes
Activities
Information
Suppliers
Producers
Distributors
Customers
Product flow
Information flow
Financial flow
Tech to improve SCM include RFID and XML
Data utilisation
CRM consists of 3 primary components:
o
Operational CRM
Types of decisions
Management
Operational
Structured decisions are clustered at the operational level
Unstructured decisions are clustered at the strategic level
Decision making can be performed by individual or groups of:
o
Employees
o
Managers:
Operational
Middle
Senior
There are four stages in decision making:
o
Intelligence
o
Design
o
Choice
o
Implementation
DSS' do not always produce better manager and employee decisions
that improve performance because of these problems:
o
Information quality
o
Management filters
o
Organisational culture
o
o
Business Intelligence
Databases
Building IS
Formulating and presenting cases for tech investments
Systems analysis
Systems design
Programming
Testing
Conversion
Production
Maintenance
Structured methodology
o
Modelling processes and data separately
o
Data flow diagram is the principal tool for structured analysis
o
Structure chart is the principal tool for representing structured
software design
Object Oriented development
o
Managing IS projects
Objectives of project management
Ensure systems are:
Delivered on time
On budget
Providing genuine business benefits
Management activities:
Scope
Time
Cost
Quality
Risk
Benefits:
o
Tangible (quantifiable) and intangible benefits are to be
considered
Benefits that exceed costs should be analysed using capital
budgeting methods to ensure the projects represents a good return
on the firm's invested capital
Real options pricing models (the same techniques used for valuing
financial options to systems investments) can be useful when
considering highly uncertain IT investments.
Securing IS
Digital data are vulnerable to:
Destruction
Misuse
Error
Fraud
Hardware or software failure
Why?
Lack of sufficient security and control can cause firms that rely
heavily on computer systems to lose sales and productivity.
Information assets (e.g. trade secrets, plans, confidential records)
lose much of their value when exposed to outsiders. In addition, it
exposes firms to legal liability, causing loss of public reputation and
other assets
There are laws in place that enforce firms to adhere to strict
security, privacy and control standards, as well as maintaining
electronic records.
Information assets
Control points
Control weaknesses
Firewalls
o
Prevents unauthorised access to a private network
o
Advanced firewalls further have intrusion detection systems,
monitoring
Golden Rule
o
"Do unto others as you would have them do unto you"
E.g. nuclear power plant has extremely low rate but very high
failure costs. Is this acceptable?
Speeding and car accidents have high failure costs and have
moderate probability. This should definitely be minimised and
avoided
Privacy:
o
Data storage and analysis technologies enables companies to
easily gather personal data about individuals from many different
sources.
o
This further allows profiling of individuals and their behaviour
o
Cookies and other web monitoring tools track the activities of
website visitors
o
Not all websites have strong privacy protection policies and do
not always allow for informed consent regarding the use of
personal information
Piracy
o
Traditional copyright laws are insufficient to protect against
software piracy, as digital material is very easily copied and
transmitted to many different locations simultaneously
Positive
o
Computer systems have significantly increased efficiency
o
Allowed for unprecedented generation of wealth
Negative
o
Can cause serious harm to individuals and organisations
o
Poor data quality has been responsible for disruptions and
losses for businesses
o
Jobs can be lost when computers replace workers or tasks
become unnecessary in reengineered business processes
o
The ability to own and use a computer may be exacerbating
socioeconomic disparities among racial groups and social classes
o
Widespread use of computers has increased opportunities for
computer crime and abuse.
o
Use of computers has also created health problems such as
RSI, computer vision syndrome and technostress
Hardware
o
Input