Description
Critical Thinking Assignment
Module 04: Networks, Collaborative Technology, and the Internet of
Things
In this module, we examine the importance of networks to communication and sharing information.
We will explore network basics that managers should understand in order to make effective decisions
on network-related investments. We will also cover some network technologies businesses can use to
improve processes and decision making.
Question Requirements:
IT Concepts to Business Decisions
Case 4.2 Business Case: Carnival Seeks to Keep Passengers Happier at Sea with IoT, NFC
and Edge Computing
A case study is a puzzle to be solved, so before reading and discussing the specific case questions
below, develop your proposed solution by following these five steps:
Read the case study to identify the key issues and underlying issues. These issues are the principles
and concepts of the course module which apply to the situation described in the case study.
Record the facts from the case study which are relevant to the principles and concepts of the module.
The case may have extraneous information not relevant to the current course module. Your ability to
differentiate between relevant and irrelevant information is an important aspect of case analysis, as it
will inform the focus of your answers.
Describe in some detail the actions that would address or correct the situation.
Complete this initial analysis and then read the case study questions that follow here. Typically, you
will already have the answers to the questions but with a broader consideration. At this point, you can
add the details and/or analytical tools required to solve the case.
Case Study Questions:
•
•
•
•
•
Why did Carnival Cruise Line think the OceanMedallion would help increase their cruise
sales?
What is the services component of the OceanMedallion called and what technologies does it
use?
On how many Carnival cruise ships is the OceanMedallion used?
What services does the OceanMedallion Class offer to passengers?
What benefits do passengers enjoy from using an OceanMedallion?
Directions:
To make it easier to read and therefore grade, make sure you clearly delineate each section
of your answer so it can be matched with the relevant question
Your well-written paper should meet the following requirements:
• Be 5 pages in length, which does not include the title and reference pages, which are never
a part of the content minimum requirements.
• Use Saudi Electronic University academic writing standards and APA style guidelines.
• Support your submission with course material concepts, principles, and theories from the
textbook and at least two current, scholarly, peer-reviewed journal articles. Current articles
are those published in the last five years.
• Ensure zero plagiarism. (very, very important)
In advance of submission, review the grading rubric to see how you will be graded for this
assignment.
Learning Outcomes
1. Differentiate between various network types and functions.
2. Examine protocols and network capabilities, and why a business manager should understand
these.
3. Articulate the importance and impact of mobile networks on business.
4. Analyze the business uses of collaborative technologies and the Internet of Things.
Readings
Required:
• Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information
Technology for Management: On-Demand Strategies for Performance, Growth, and
Sustainability
• Elksasy, M. S. M. (2023). Understanding the Internet of Things ( IoT ) Concepts, Applications
and Standards: An Overview. Delta University Scientific Journal, 6(1), 205–
210.
• View the following videos:
• Chapter 4 Whiteboard Animation Videos, part 1
• Chapter 4 Whiteboard Animation Videos, part 2
Recommended:
• Chapter 4 PowerPoint Presentation
IT for Management: On-Demand Strategies for
Performance, Growth, and Sustainability
Twelfth Edition
Turban, Pollard, Wood
Chapter 4
Networks, the Internet of Things
(IoT), and Edge Computing
Learning Objectives (1 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
2
Network Fundamentals
A computer network is a set of computers connected together for the purpose of sharing recourses.
Copyright ©2021 John Wiley & Sons, Inc.
3
Benefits of Computer Networks
Examples of the benefits that companies derive from
a well-developed network architecture include:
• Instantaneous Data and File Sharing
• Simultaneous Resource Sharing
• Secure Data Protection and Redundancy
• Streamlined Administration
• Rapid Internal Communications
• Distributing Computer Power
Copyright ©2021 John Wiley & Sons, Inc.
4
Types of Networks
Copyright ©2021 John Wiley & Sons, Inc.
5
Local Area Network (LAN) (1 of 2)
A group of computers and other devices that share a
communication line or wireless link to server within a limited
geographic area
Copyright ©2021 John Wiley & Sons, Inc.
6
Local Area Network (LAN) (2 of 2)
• Star network configuration is one in which each
computer is directly linked to a central computer and
indirectly to each other.
• Ring network configuration is one in which each
computer is connected to two adjoining computers to
form a closed circuit.
• Bus network configuration has a main channel to
which nodes or secondary channels are connected in a
branchlike structure.
Copyright ©2021 John Wiley & Sons, Inc.
7
Wide Area Network (WAN) (1 of 2)
A communication network that spans a large geographic area
Copyright ©2021 John Wiley & Sons, Inc.
8
Wide Area Network (WAN) (2 of 2)
Internet Service Provider (ISP) is an organization that
provides services for accessing, using or participating with the
Internet.
Virtual private network (VPN) is a service that allows safe
and private network access by routing connections through a
server and hiding the online actions.
Software-defined WAN (SD-WAN) is managed by one central
app that efficiently distributes network traffic across a WAN
over the Internet or cloud-based private networks.
Copyright ©2021 John Wiley & Sons, Inc.
9
Intranets, Extranets, and Virtual Private
Networks
• Intranets are LANs or WANS used within a company for
data access, sharing, and collaboration.
• Extranets are WANs that can be logged into remotely
via the Internet to facilitate communication with clients
and vendors.
• Virtual Private Networks (VPNs) are used where
security of transmissions is a concern, because they
encrypt the packets before they are transferred over
the network.
Copyright ©2021 John Wiley & Sons, Inc.
10
Virtual Private Networks
Copyright ©2021 John Wiley & Sons, Inc.
11
Transmission Media and Speed
• Frequency is the capacity of a transmission media.
• Bits per second (bps) is the speed at which data are
transferred over a network.
• Bandwidth of a media is the maximum amount of bps
that can be transmitted over the media and it varies by
media type.
Copyright ©2021 John Wiley & Sons, Inc.
12
Circuit Switching vs. Packet Switching
• Circuit switching occurs when there is a dedicated
connection between a source and destination.
• Packet switching occurs when data or voice is
transferred in packets.
• Packets are individual pieces of a message that are
collected and re-assembled with the other pieces of
the same message at their destination. To improve
communication performance and reliability, each larger
message sent between two network devices is often
subdivided into packets.
Copyright ©2021 John Wiley & Sons, Inc.
13
Network Components (1 of 2)
• Client is the name used for a computer on a network.
• Server is a central repository of data and various
programs that are shared by users in a network.
• Router links computers to the Internet to enable users
to share a network connection.
• Wireless Router is a device that works as a router to
forward data between network devices and serves as
both a wireless access point and a router.
• Hub is a hardware device where data from many
directions converge and are then sent out in many
directions to multiple devices in a network.
Copyright ©2021 John Wiley & Sons, Inc.
14
Network Components (2 of 2)
• Switch is a controller that enables networked devices
to talk to each other efficiently by transmitting data
packets based on IP addresses. It connects the
computers, printers and servers within a building or a
company to create the network.
• Network Interface Card (NIC) is a circuit board or chip
installed in a computer to enable it to connect to a
wired or wireless network.
Copyright ©2021 John Wiley & Sons, Inc.
15
Copyright ©2021 John Wiley & Sons, Inc.
16
Network Applications
• Pure network applications are developed expressly for
use by two more devices that help transfer data and
communicate across a network.
• Standalone network applications were originally
developed for use on a single device and their
functionality retooled to allow them to run on
networks.
Copyright ©2021 John Wiley & Sons, Inc.
17
Copyright ©2021 John Wiley & Sons, Inc.
18
Network Fundamentals: Questions
1.
2.
3.
4.
5.
6.
Describe the basic functions of business networks.
Name three different types of network configurations.
Why would a company choose to use a WAN rather than a LAN?
What is the difference between an intranet and an extranet?
How does a virtual private network (VPN) provide security?
How do investments in network infrastructure impact an
organization?
7. How is an SD-WAN different from a WAN?
8. What are three different transmission media used in wired
networks?
Copyright ©2021 John Wiley & Sons, Inc.
19
Learning Objectives (2 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
20
Differences Between 4G and 5G Networks
4G networks were
introduced in 2010 and
deliver up to 10 Mbps.
The latest version of 4G is
4G LTE-A that can
theoretically deliver
speeds from 300 Mbps to
1 Gbps, with an average
speed of 15–50 Mbps.
5G networks offer huge
gains in both speed and
capacity over existing 4G
networks. 5G are
currently being offered in
limited geographical areas
that will steadily expand
and are up to ten times
faster than 4G LTE-A—
topping out at 10 Gbps.
Copyright ©2021 John Wiley & Sons, Inc.
21
Advantages and Disadvantages of 5G
Advantages
•
•
•
Disadvantages
Speed and capacity: larger
channels, higher speeds,
larger packets of data,
exponentially faster
response time and connect
many devices from a single
location
Short term: Create new
jobs
Longer term: Create
entirely new markets and
economic opportunities
•
•
•
Expensive infrastructure
Unresolved privacy and
security issues surrounding
5G
Health risks caused by its
use of extremely high
frequency (1 Billion cycles
per second) microwaves
Copyright ©2021 John Wiley & Sons, Inc.
22
Growing Need for 5G
• Internet of Things (IoT) is creating billions of new
devices for remote sensing, telemetry, and control
applications
• To be efficient, these machine-to-machine connections
will need the significantly faster speeds of 5G
• Work is already underway on the development of 6G
mobile telephone networks.
Copyright ©2021 John Wiley & Sons, Inc.
23
Wireless Network Standards
• IEEE 802.11ax also known as “high-efficiency wireless,” 802.11ax
was released in September 2019.
• IEEE 802.11ac utilizes dual-band wireless technology and
support simultaneous connections on both the 2.4 and 5 GHz
Wi-Fi bands.
• IEEE 802.11a runs on 12 channels in the 5-GHz spectrum in
North America, which reduces interference issues
• IEEE 802.11n improves upon prior 802.11 standards by adding
multiple-input multiple-output (MIMO) and newer features.
• IEEE 802.11g runs on three channels in the 2.4-GHz spectrum,
but at the speed of 802.11a.
• IEEE 802.11b shares spectrum with 2.4-GHz cordless phones,
microwave ovens, and many Bluetooth products.
Copyright ©2021 John Wiley & Sons, Inc.
24
Wireless Connectivity (1 of 2)
• Wi-Fi connects computers and smart devices to a
network via a single access point like a router.
• Wi-Fi hotspot is a wireless access point that provides
Internet access to mobile devices like laptops and
smartphones.
• WiMAX stands for worldwide interoperability for
microwave access and was developed to overcome the
short-range limitations of Wi-Fi.
Copyright ©2021 John Wiley & Sons, Inc.
25
Wireless Connectivity (2 of 2)
• LTE is the fastest and most consistent cellular
technology.
• LTE-A is a version of LTE cellular technology that more
closely follows the IEEE 802.11ac wireless network
standard.
• Wireless local area network (WLAN): typically extends
an existing wired LAN by attaching a wireless AP to a
wired network.
• Wireless wide area network (WWAN): has a wider
range than a local area network and can cover a group
of buildings.
Copyright ©2021 John Wiley & Sons, Inc.
26
Copyright ©2021 John Wiley & Sons, Inc.
27
Copyright ©2021 John Wiley & Sons, Inc.
28
Wireless Networks Use Different
Transmission Media
• Wireless transmission media can be used when
installing wiring is impossible or impractical.
• Example of wireless transmission media:
• Radio waves
• Microwaves
• Infrared
• Bluetooth
• Communication satellites
• Mashup is a general term referring to the integration of
two or more technologies
Copyright ©2021 John Wiley & Sons, Inc.
29
Wireless
Network
Technologies
• Internet Protocol is a rule or procedure for
transmitting data between computers and
other electronic devices.
• IP address is a unique identifier for each
device that communicates with a network
that identifies and locates each device. An
IP address is comparable to a telephone
number or home address.
Copyright ©2021 John Wiley & Sons, Inc.
30
TCP/IP
• TCP/IP is a four-layer suite that consists of:
• Application Layer
• Transport Layer
• Network (Internet) Layer
• Data Link (Network Interface) Layer
Copyright ©2021 John Wiley & Sons, Inc.
31
Application Program Interfaces and
Operating Systems
• Application Program Interface (API) consists of a set of
functions, commands, and protocols used by
programmers for OS–interactivity without having to
write a program from scratch.
• Can be automated for simplified usability
Twitter
o Facebook
o Amazon
o
Copyright ©2021 John Wiley & Sons, Inc.
32
Automated API
• REST API the Representational State API is used to
build Web services that are lightweight, maintainable
and scalable. It provides a way to access resources in a
particular environment.
• List Skills API has a bidirectional interface that updates
lists each time users make Shopping list or To Do
requests.
Copyright ©2021 John Wiley & Sons, Inc.
33
Copyright ©2021 John Wiley & Sons, Inc.
34
Wireless Networks and Standards:
Questions
1. Why has IPv6 become increasingly important?
2.
3.
4.
5.
6.
7.
8.
What is the difference between IPv4 and Ipv6?
What is the purpose of an IP address?
What is an API and what are the benefits of using an API?
What is the difference between 4G and 5G?
Why is 5G not widely available?
What benefits does a 5G network offer businesses?
What is the difference between circuit switching and packet
switching?
Copyright ©2021 John Wiley & Sons, Inc.
35
Learning Objectives (3 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
36
Mobile Network Drivers
Copyright ©2021 John Wiley & Sons, Inc.
37
Benefits of Mobile Computing
• Connectivity—employees can stay connected to all
sources, at all times.
• Social Engagement—employees can interact with
customers, vendors, suppliers, partners, and each
other via the Internet to create beneficial relationships.
• Personalization—mobile computing can be tailored to
individual needs of all users to enhance the online
experience.
Copyright ©2021 John Wiley & Sons, Inc.
38
Mobile Technologies: QR Code
• Quick Response (QR) Code is a two-dimensional
barcode usually in a square structure with information
stored in a black and white geometric symbol
• Advantages: negligible cost
and heightened security
features.
• Disadvantage: it must be
read individually
Copyright ©2021 John Wiley & Sons, Inc.
39
Mobile Technologies: RFID
• Radio frequency identification (RFID) allows users to
track inventory and assets by using wireless contactless
radio waves
• Two types of RFID tags:
• Passive tags have a range of approximately 3–5 meters
and can read at a rate of 10 or more times a second.
• Active tags have a range of approximately 100 meters.
They have an internal power source that gives them
their longer range but limits their life span.
Copyright ©2021 John Wiley & Sons, Inc.
40
Mobile Technologies: NFC
• Near-field communication (NFC) enables two devices
within close proximity to establish a communication
channel and transfer data through radio waves
• Some effective applications include:
• Mobile payments using
the Apple iWatch
• The self-healthcare industry
• Pay for goods by waving an
NFC-enabled credit card
Copyright ©2021 John Wiley & Sons, Inc.
41
The
Internet of
Things
Internet of Things (IoT) is the network of
physical objects or “things” embedded
with electronics, software, sensors, and
network connectivity, that enables these
objects to collect and exchange data.
Copyright ©2021 John Wiley & Sons, Inc.
42
Factors Driving IoT
• Development of IPv6
• Introduction of 5G networks
• More widely available broadband Internet
• Lower cost of connecting
• Overwhelming popularity of the smartphone
• Development of more smart devices with Wi-Fi
capabilities
• Development of embedded sensors
Copyright ©2021 John Wiley & Sons, Inc.
43
Copyright ©2021 John Wiley & Sons, Inc.
44
The Growth of IoT
The popularity and use
of IoT is growing. In
1990, there were
300,000 connected IoT
devices, in 2019 there
were 14.2 billion, and
it is predicted that the
number of IoT
connections will grow
to 25 billion in 2021.
Copyright ©2021 John Wiley & Sons, Inc.
45
Advantages of IoT
• Monitoring performance, quality, and reliability of
products and services
• Gaining insight into potential new products and service
• Support sales
• Better understand product use
• Remote troubleshooting of products
• Deliver revenue-generating post-sales service
• More efficiently deliver post-sales services
Copyright ©2021 John Wiley & Sons, Inc.
46
Disadvantages of IoT
• Network security
• Data privacy
• Data analysis capabilities
• Data collection capabilities
• Realistic efficiency opportunities
• Realistic new revenue opportunities
• Cost
Copyright ©2021 John Wiley & Sons, Inc.
47
Edge
Computing
Edge computing is
a new networking
technology that
brings the data
closer to where it
is being used and
is being enabled
by the new, faster
5G networks.
Copyright ©2021 John Wiley & Sons, Inc.
48
Choosing Mobile Computing Solutions
Copyright ©2021 John Wiley & Sons, Inc.
49
Networks Support Communication,
Search, Collaboration and Relationships
• The other four basic business functions that networks
support are communication, search, collaboration, and
relationships.
• Communicating over wired, wireless or mobile
networks helps businesses search for information that
helps them collaborate to get work done and develop
business relationships.
Copyright ©2021 John Wiley & Sons, Inc.
50
Mobile Computing and the Internet of
Things (IoT): Questions
1.
What are the factors driving mobile computing?
2.
Why is mobile global traffic increasing?
3.
How is NFC different from RFID?
4.
What are the two components of a wireless network infrastructure?
5.
What are three types of wireless network transmission media?
6.
What factors should be considered when evaluating mobile networks?
7.
What types of industry sectors are using IoT?
8.
How does a network help communication, collaboration and relationships
between companies and their vendors?
9.
What is edge computing and what networking problems does it address?
10. How can a Mindmap be used to structure a problem?
Copyright ©2021 John Wiley & Sons, Inc.
51
Learning Objectives (4 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
52
Network Quality of Service
• Quality of Service (QoS) is a network’s ability to achieve
maximum bandwidth, optimize network performance elements
like latency, error rate, uptime and downtime and control and
manage network resources by setting priorities for specific types
of data on the network
• The principles of QoS can be applied in two ways:
• Prioritize traffic
• Throttle traffic
• Traffic shaping delays the flow of less important network traffic,
such as bulk data transfers and Peer-to-Peer (P2P) file-sharing
programs, including BitTorrent traffic
Copyright ©2021 John Wiley & Sons, Inc.
53
The Net Neutrality
• Net neutrality essentially ensures equal opportunity
for Internet speeds and access to website with no
unfair fast or slow lanes and no blocking of anything
that’s legal on your phone, computer, or tablet.
• Unless Congress passes legislation for or against Net
Neutrality, things could drag on for a long time with
either side appealing to the U.S. Supreme Court or
asking the DC Circuit Court of Appeals for an “en banc”
hearing that allows the full panel of justices to hear the
case.
Copyright ©2021 John Wiley & Sons, Inc.
54
Quality of Service Models
• The Integration Services Model (IntServ) is based on
measuring how data flows through a network from
source to destination and the resource needs of all
routers in the network.
• The integrated services model offers two classes of
service—guaranteed and controlled load.
• The Differentiated Services Model (DiffServ) was
designed by the Internet Engineering Task Force (IETF).
• By marking the class of each packet directly on the
packet, DiffServ eliminates the need for a signaling
protocol that tells the routers which flows require special
QoS treatment.
Copyright ©2021 John Wiley & Sons, Inc.
55
Network Quality of Service: Questions
• Why has group work becoming more challenging?
• What might limit the use of face-to-face brainstorming?
• How can online brainstorming tools overcome those limits?
• List ways in which virtual collaboration can be used in business.
• What devices do you have that take advantage of the IoT? Describe how they
impact the way that you live and work.
• What is driving the rise of the IoT?
• What is the main concern that organizations have about the IoT?
• Do you think the advantages outweigh the disadvantages of the IoT? Explain.
• Where do you stand on the issue of Net Neutrality?
• How do you think the state level Net Neutrality regulations are going to
impact ISPs?
Copyright ©2021 John Wiley & Sons, Inc.
56
Copyright
Copyright © 2021 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Act without the express written permission of the
copyright owner is unlawful. Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up
copies for his/her own use only and not for distribution or resale. The Publisher assumes
no responsibility for errors, omissions, or damages, caused by the use of these programs
or from the use of the information contained herein.
Copyright ©2021 John Wiley & Sons, Inc.
57
Information Technology
for Management
On-Demand Strategies for Performance,
Growth and Sustainability
Eleventh Edition
Information Technology
for Management
On-Demand Strategies for Performance,
Growth and Sustainability
Eleventh Edition
EFRA IM T U RB AN
C A ROL P OLLAR D
Appalachian State University
GREGORY W OOD
Canisius College
VP AND EDITORIAL DIRECTOR
EXECUTIVE EDITOR
EDITORIAL ASSISTANT
EDITORIAL MANAGER
CONTENT MANAGEMENT DIRECTOR
CONTENT MANAGER
SENIOR CONTENT SPECIALIST
PRODUCTION EDITOR
PHOTO RESEARCHER
COVER PHOTO CREDIT
Mike McDonald
Lise Johnson
Ethan Lipson
Judy Howarth
Lisa Wojcik
Nichole Urban
Nicole Repasky
Loganathan Kandan
Billy Ray
© Ditty_about_summer/Shutterstock
This book was set in 9.5/12.5 pt Source Sans Pro by SPi Global and printed and bound by Strategic
Content Imaging.
Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding
for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a
global effort to address the environmental, social, economic, and ethical challenges we face in our
business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable
support. For more information, please visit our website: www.wiley.com/go/citizenship.
Copyright © 2018, 2015, 2013, 2011, 2010 John Wiley & Sons, Inc. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy
fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923 (Web site: www.
copyright.com). Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax
(201) 748-6008, or online at: www.wiley.com/go/permissions.
Evaluation copies are provided to qualified academics and professionals for review purposes only,
for use in their courses during the next academic year. These copies are licensed and may not be sold
or transferred to a third party. Upon completion of the review period, please return the evaluation
copy to Wiley. Return instructions and a free of charge return shipping label are available at: www.
wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please
accept this book as your complimentary desk copy. Outside of the United States, please contact your
local sales representative.
ISBN: 978-1-118-89079-0 (PBK)
ISBN: 978-1-119-39783-0 (EVALC)
Library of Congress Cataloging in Publication Data:
Names: Turban, Efraim, author. | Pollard, Carol (Carol E.), author. | Wood,
Gregory R., author.
Title: Information technology for management : on-demand strategies for
performance, growth and sustainability / Efraim Turban, Carol Pollard,
Gregory R. Wood.
Description: 11th edition. | Hoboken, NJ : John Wiley & Sons, 2018. |
Includes bibliographical references and index. |
Identifiers: LCCN 2017037711 (print) | LCCN 2017046158 (ebook) | ISBN
9781118890868 (epub) | ISBN 9781119172390 (pdf) | ISBN 9781118890790 (pbk.)
Subjects: LCSH: Management information systems.
Classification: LCC T58.6 (ebook) | LCC T58.6 .T765 2017 (print) | DDC
658.4/038011—dc23
LC record available at
The inside back cover will contain printing identification and country of origin if omitted from this
page. In addition, if the ISBN on the back cover differs from the ISBN on this page, the one on the
back cover is correct.
Brief Contents
PREFACE
8 Retail, E-commerce, and Mobile Commerce
Technology 240
xiii
ACKNOWLEDGMENTS
xviii
PART 1 Reshaping Enterprises and Consumers
in the On-Demand Economy
1
Disruptive IT Impacts Companies,
Competition, and Careers 1
2
Information Systems, IT Architecture, Data
Governance, and Cloud Computing 25
3
Data Management, Data Analytics,
and Business Intelligence 65
4
5
Networks, Collaborative Technology,
and the Internet of Things 101
Cybersecurity and Risk Management
Technology 127
PART 2 Winning, Engaging, and Retaining
Consumers for Growth
6
7
Search, Semantic, and Recommendation
Technology 165
Web 2.0 and Social Technology
199
PART 3 Optimizing Performance, Processes,
and Productivity
9 Functional Business Systems 269
10
Enterprise Systems 300
11
Data Visualization and Geographic
Information Systems 331
PART 4 Managing Business Relationships,
Projects, and Ethical Responsibilities
12
IT Strategy, Sourcing, and Strategic
Technology Trends 354
13
Systems Development and Project
Management 385
14
IT Ethics, Privacy, and Sustainability 417
GLOSSARY 443
ORGANIZATION INDEX
NAME INDEX 450
SUBJECT INDEX 451
448
v
Contents
PREFACE
xiii
ACKNOWLEDGMENTS
xviii
PART 1 Reshaping Enterprises
and Consumers in the On-Demand
Economy
1 Disruptive IT Impacts Companies,
Competition, and Careers
1
Case 1.1 Opening Case: Uber and Airbnb Revolutionize
Business Models in the On-Demand Economy 3
1.1
Doing Business in the On-Demand Economy 4
Growth of the On-Demand Economy 5
Digital Business Models 6
IT’s Role in the On-Demand Economy 7
IT Business Objectives 8
1.2 Business Process Improvement and Competitive
Advantage 8
What Is a Business Process? 9
Improving Business Processes 9
Don’t Automate, Obliterate! 10
Gaining a Competitive Advantage 11
Software Support for BPM 13
1.3 IT Innovation and Disruption 13
Social–Mobile–Analytics–Cloud (SMAC) Model 13
Technology Mega Trends 14
Lessons Learned from Companies Using Disruptive
Technologies 16
1.4 IT and You 17
On-Demand Workers 17
IT Adds Value to Your Performance and Career 19
Becoming an Informed IT User 21
Case 1.2 Business Case: The Internet of Things Comes
to the NFL 23
Case 1.3 Video Case: Knowing More and Doing More
2 Information Systems,
24
IT Architecture, Data Governance,
and Cloud Computing 25
Case 2.1 Opening Case: Detoxing Location-Based
Advertising Data at MEDIATA 27
2.1
vi
IS Concepts and Classification
28
Components of an IS 29
Data, Information, Knowledge, and Wisdom 30
Types of ISs 31
Transaction Processing System (TPS) 32
Management Information System (MIS) 33
Decision Support System (DSS) 34
Executive Information System (EIS) 35
ISS Exist within Corporate Culture 36
2.2 IT Infrastructure, IT Architecture, and Enterprise
Architecture 37
EA Helps to Maintain Sustainability 38
Developing an Enterprise Architecture (EA) 41
2.3 Information Management and Data
Governance 42
Information Management Harnesses
Scattered Data 43
Reasons for Information Deficiencies 43
Factors Driving the Shift from Silos to Sharing
and Collaboration 45
Business Benefits of Information Management 45
Data Governance: Maintaining Data Quality
and Cost Control 46
2.4 Data Centers and Cloud Computing 48
Data Centers 48
Integrating Data to Combat Data Chaos 50
Cloud Computing 52
Selecting a Cloud Vendor 52
Cloud Infrastructure 54
Issues in Moving Workloads from the Enterprise
to the Cloud 54
2.5 Cloud Services and Virtualization 55
Anything as a Service (XAAS) Models 55
Going Cloud 58
Virtualization and Virtual Machines 58
Case 2.2 Business Case: Data Chaos Creates Risk 62
Case 2.3 Video Case: Cloud Computing at Coca-Cola Is
Changing Everything 63
3 Data Management, Data Analytics,
and Business Intelligence
65
Case 3.1 Opening Case: Coca-Cola Strategically Manages
Data to Retain Customers and Reduce Costs 66
3.1
Data Management and Database Technologies
Database Management Systems and SQL 69
DBMS and Data Warehousing Vendors
Respond to Latest Data Demands 72
69
CONT E N TS
3.2
Centralized and Distributed Database
Architectures 73
Garbage In, Garbage Out 75
Data Ownership and Organizational Politics 76
Data Life Cycle and Data Principles 77
Master Data and Master Data Management 78
3.3 Data Warehouses 79
Procedures to Prepare EDW Data for Analytics 80
Building a Data Warehouse 80
Real-Time Support from an Active Data
Warehouse 81
3.4 Big Data Analytics and Data Discovery 83
Human Expertise and Judgment are Needed 85
Data and Text Mining 88
Creating Business Value 88
Text Analytics Procedure 90
Analytics Vendor Rankings 90
3.5 Business Intelligence and
Electronic Records Management 91
Business Benefits of BI 92
Common Challenges: Data Selection
and Quality 92
Aligning BI Strategy with Business Strategy 92
BI Architecture and Analytics 93
Electronic Records Management 94
Legal Duty to Retain Business Records 94
ERM Best Practices 94
ERM Benefits 95
ERM for Disaster Recovery,
Business Continuity, and Compliance 95
Case 3.2 Business Case: Big Data Analytics is the “Secret
Sauce” for Revitalizing McDonald’s 98
Comparing 3G, 4G, 4G LTE, and 5G Network
Standards 110
Circuit versus Packet Switching 111
Application Program Interfaces and Operating
Systems 111
4.3 Mobile Networks and Near-Field
Communication 113
Increase in Mobile Network Traffic and Users 114
Higher Demand for High-Capacity Mobile
Networks 115
Mobile Infrastructure 115
Two Components of Wireless Infrastructure 116
Business Use of Near-Field Communication 117
Choosing Mobile Network Solutions 118
4.4 Collaborative Technologies and the Internet
of Things 119
Virtual Collaboration 120
Group Work and Decision Processes 120
The Internet of Things (IoT) 121
IoT Sensors, Smart Meters, and the Smart Grid 121
Case 4.2 Business Case: Google Maps API for
Business 125
Case 4.3 Video Case: Small Island Telecom Company
Goes Global 126
5 Cybersecurity and Risk
Management Technology
5.1
4 Networks, Collaborative
Technology, and the Internet
of Things 101
4.1
4.2
Network Fundamentals 104
Network Types 104
Intranets, Extranets, and Virtual Private
Networks 105
Network Terminology 105
Functions Supported by Business Networks
Quality of Service 107
Internet Protocols (IP), APIs, and Network
Capabilities 109
106
127
Case 5.1 Opening Case: Yahoo Wins the Gold and Silver
Medal for the Worst Hacks in History! 129
Case 3.3 Video Case: Verizon Improves Its
Customer Experience with Data Driven
Decision-Making 99
Case 4.1 Opening Case: Sony Builds an IPv6 Network
to Fortify Competitive Edge 102
vi i
5.2
5.3
The Face and Future of Cyberthreats 130
Intentional Threats 132
Unintentional Threats 132
Hacking 133
Cyber Social Engineering and Other Related
Web-Based Threats 134
Denial-of-Service 137
Insider and Privilege Misuse 137
Physical Theft or Loss 138
Miscellaneous Errors 138
New Attack Vectors 138
Cyberattack Targets and Consequences 139
“High-Profile” and “Under-the-Radar” Attacks 139
Critical Infrastructure Attacks 140
Theft of Intellectual Property 141
Identity Theft 142
Bring Your Own Device 142
Social Media Attacks 144
Cyber Risk Management 146
IT Defenses 146
Business Continuity Planning 149
Government Regulations 149
viii
CO NT EN TS
7 Web 2.0 and Social
5.4
Defending Against Fraud 150
Occupational Fraud Prevention
and Detection 151
General Controls 152
Internal Controls 153
Cyber Defense Strategies 153
Auditing Information Systems 155
5.5 Frameworks, Standards, and Models 155
Risk Management and IT Governance
Frameworks 155
Industry Standards 157
IT Security Defense-In-Depth Model 157
Case 5.2 Business Case: Lax Security at LinkedIn
Exposed 161
Technology
199
Case 7.1 Opening Case: Social Customer Service Takes
Off at KLM 200
7.1
Using Search Technology for Business
Success 168
How Search Engines Work 168
Web Directories 168
How Crawler Search Engines Work 169
Why Search Is Important for Business 172
6.2 Organic Search and Search Engine
Optimization 178
Strategies for Search Engine Optimization 178
Content and Inbound Marketing 180
Black Hat versus White Hat SEO: Ethical Issues
in Search Engine Optimization 181
6.3 Pay-Per-Click and Paid Search Strategies 182
Creating a PPC Advertising Campaign 182
Metrics for Paid Search Advertising 184
6.4 A Search for Meaning—Semantic Technology 184
What Is the Semantic Web? 185
The Language(s) of Web 3.0 185
Semantic Web and Semantic Search 186
Semantic Web for Business 187
6.5 Recommendation Engines 188
Recommendation Filters 189
Case 6.2 Business Case: Deciding What to Watch—Video
Recommendations at Netflix 195
Web 2.0—The Social Web 201
The Constantly Changing Web 201
Invention of the World Wide Web 202
A Platform for Services and Social Interaction 202
Emergence of Social Applications, Networks,
and Services 203
Why Managers Should Understand Web
Technology 205
Communicating on the Web 206
Social Media Applications and Services 207
Social Media Is More than Facebook, YouTube, and
Twitter 207
With Web 2.0, Markets are Conversations 209
7.2 Social Networking Services and Communities 210
The Power of the Crowd 212
Crowdfunding 212
Social Networking Services 213
Facebook Dominates Social Networking 214
Google Takes on Facebook with G+ 216
Be in the Now with Snapchat 217
And Now for Something Different: Second Life 218
Private Social Networks 219
Future of Social Networking Systems 220
7.3 Engaging Consumers with Blogs and
Microblogs 220
What Is the Purpose of a Blog? 220
Blogging and Public Relations 222
Reading and Subscribing to Blogs 222
Blogging Platforms 222
Microblogs 223
Twitter 223
Tumblr Blogs 225
7.4 Mashups, Social Metrics, and
Monitoring Tools 226
What Makes a Mashup Social 226
RSS Technology 227
Social Monitoring Services 227
7.5 Enterprise 2.0: Workplace Collaboration and
Knowledge Sharing 229
Tools for Meetings and Discussions 230
Social Tools for Information Retrieval and
Knowledge Sharing 230
Social Bookmarking Tools 231
Content Creation and Sharing 232
Case 7.2 Business Case: Facebook Helps Songkick Rock
the Ticket Sales Industry 236
Case 6.3 Video Case: Power Searching with
Google 196
Case 7.3 Business Case: AT&T’s “It Can Wait” Campaign
against Distracted Driving 237
Case 5.3 Video Case: Botnets, Malware Security, and
Capturing Cybercriminals 163
PART 2 Winning, Engaging, and
Retaining Consumers for Growth
6 Search, Semantic, and
Recommendation Technology
165
Case 6.1 Opening Case: Mint.com Uses Search
Technology to Rank Above Established
Competitors 166
6.1
CONT E N TS
8 Retail, E-commerce, and Mobile
Commerce Technology
240
Case 8.1 Opening Case: Macy’s Races Ahead with Mobile
Retail Strategies 241
8.1
Retailing Technology 243
Keeping Up with Consumer Demands and
Behavior 243
The Omni-Channel Retailing Concept 244
8.2 Business-to-Consumer (B2C) E-commerce 246
Online Banking 246
International and Multiple-Currency
Banking 246
Online Recruiting 246
Issues in Online Retailing 250
Online Business and Marketing Planning 250
8.3 Business-to-Business (B2B) E-commerce and
E-procurement 251
Sell-Side Marketplaces 251
E-Sourcing 252
E-Procurement 252
Electronic Data Interchange (EDI) Systems 253
Public and Private Exchanges 253
8.4 Mobile Commerce 253
Information: Competitive Advantage in Mobile
Commerce 255
Mobile Entertainment 258
Hotel Services and Travel Go Wireless 259
Mobile Social Networking 259
8.5 Mobile Transactions and Financial Services 260
Mobile Payment Systems 260
Mobile Banking and Financial Services 262
Short Codes 263
Security Issues 263
Case 8.2 Business Case: Chegg’s Mobile Strategy 266
Case 8.3 Video Case: Searching with Pictures
Using MVS 267
PART 3 Optimizing Performance,
Processes, and Productivity
9 Functional Business Systems
269
Case 9.1 Opening Case: Ducati Redesigns Its
Operations 271
9.1
Business Management Systems and Functional
Business Systems 272
Business Management Systems (BMSs) 273
Management Levels 273
Business Functions vs. Cross-Functional Business
Processes 274
Transaction Processing Systems 275
ix
9.2
Production and Operations Management
Systems 277
Transportation Management Systems 278
Logistics Management 278
Inventory Control Systems 279
Computer-Integrated Manufacturing and
Manufacturing Execution Systems 281
9.3 Sales and Marketing Systems 282
Data-Driven Marketing 284
Sales and Distribution Channels 284
Social Media Customer Service 284
Marketing Management 285
9.4 Accounting, Finance, and Regulatory Systems 286
Financial Disclosure: Reporting and
Compliance 286
Fraud Prevention and Detection 289
Auditing Information Systems 291
Financial Planning and Budgeting 291
9.5 Human Resource Systems, Compliance, and
Ethics 293
HR Information Systems 293
Management and Employee Development 295
HR Planning, Control, and Management 295
Case 9.2 Business Case: HSBC Combats Fraud in Splitsecond Decisions 297
Case 9.3 Video Case: United Rentals Optimizes Its
Workforce with Human Capital Management
10 Enterprise Systems
298
300
Case 10.1 Opening Case: 3D Printing Drives the “AlwaysOn” Supply Chain 301
10.1 Enterprise Systems 303
Implementation Challenges of Enterprise
Systems 305
Investing in Enterprise Systems 305
Implementation of Best Practices 306
Enterprise Systems Insights 307
10.2 Enterprise Resource Planning (ERP) 307
Brief History of ERP 308
Technology Perspective 308
Achieving ERP Success 311
10.3 Supply Chain Management Systems 313
Managing the Flow of Materials, Data,
and Money 315
Order Fulfillment and Logistics 315
Steps in the Order Fulfillment Process 315
Innovations Driving Supply Chain Strategic
Priorities 316
10.4 Customer Relationship Management Systems 319
How are CRM Apps Different from ERP? Why are they
Different? 319
CRM Technology Perspective 320
x
CONT ENTS
Customer Acquisition and Retention 320
CRM for a Competitive Edge 320
Common CRM Mistakes: How to Avoid
Them 321
Justifying CRM 322
10.5 Enterprise Social Platforms 323
Growth of Enterprise Social Investments
and Markets 323
Sharepoint 324
Oracle’s Social Network 326
Jive 326
Chatter 326
Case 10.2 Business Case: Lowe’s Fresh Approach to
Supply Chain Management 328
Case 10.3 Video Case: Procter & Gamble: Creating
Conversations in the Cloud with 4.8 Billion
Consumers 329
11 Data Visualization and Geographic
Information Systems
331
Case 11.1 Opening Case: Safeway and PepsiCo
Collaborate to Reduce Stock Outages using Data
Visualization 332
11.1 Data Visualization and Learning 334
Learning, Exploration, and Discovery with
Visualization 336
Data Discovery Market Separates from the
BI Market 336
How Is Data Visualization Used in Business? 340
Data Visualization Tools 341
11.2 Enterprise Data Mashups 342
Mashup Architecture 343
Why Do Business Users Need Data Mashup
Technology? 344
Enterprise Mashup Technology 344
11.3 Digital Dashboards 345
Dashboards are Real Time 347
How Operational and Strategic
Dashboards Work 348
Benefits of Digital Dashboards 348
11.4 Geographic Information Systems and
Geospatial Data 349
Geocoding 350
GIS Is Not Your Grandfather’s Map 350
Infrastructure and Location-Aware Collection
of Geospatial Data 350
Applying GIS in Business 351
Case 11.2 Visualization Case: Are You Ready for
Football? 353
Case 11.3 Video Case: The Beauty of Data
Visualization—Data Detective 353
PART 4 Managing Business
Relationships, Projects, and Ethical
Responsibilities
12 IT Strategy, Sourcing, and Strategic
Technology Trends
354
Case 12.1 Opening Case: Intel Reaps Rewards from
Sustainable IT Strategy 355
12.1 IT Strategic Planning 357
Value Drivers 358
IT Strategic Plan Objectives 358
IT and Business Disconnects 359
Corporate and IT Governance 359
Reactive Approach to IT Investments Will Fail 359
IT Strategic Planning Process 359
12.2 Aligning IT with Business Objectives 362
Achieving and Sustaining a Competitive
Advantage 364
12.3 IT Sourcing Strategies 367
Sourcing and Cloud Services 368
Factors Driving Outsourcing 369
Outsourcing Risks and Hidden Costs 370
Offshoring 370
Outsourcing Life Cycle 371
Managing IT Vendor Relationships 373
Contracts: Get Everything in Writing 373
12.4 Balanced Scorecard 374
The Balanced Scorecard 374
Using the Balance Scorecard 375
Applying the BSC 377
12.5 Strategic Technology Trends 378
Strategic Technology Scanning 380
Finding Strategic Technologies 380
Case 12.2 Business Case: Cisco IT Improves Strategic
Vendor Management 382
Case 12.3 Data Analysis: Third-Party versus CompanyOwned Offshoring 383
13 Systems Development and Project
Management
385
Case 13.1 Opening Case: Denver International Airport
Learns from Mistakes Made in Failed BaggageHandling System Project 386
13.1 System Development Life Cycle 388
Stages of the SDLC 388
13.2 Systems Development Methodologies 391
Waterfall Model 391
Object-Oriented Analysis and Design 392
Agile Methodology 392
CONT E N TS
The DevOps Approach to Systems
Development 394
13.3 Project Management Fundamentals 395
What Is a Project? 396
Choosing Projects 396
The Triple Constraint 397
The Project Management Framework 397
13.4 Initiating, Planning, and Executing Projects 399
Project Initiation 400
Project Planning 400
Project Execution 403
13.5 Monitoring/Controlling and Closing
Projects 404
Project Monitoring and Controlling 404
Project Closing or Post Mortem 407
Why Projects Fail 408
IT Project Management Mistakes 410
Case 13.2 Business Case: Steve Jobs’ Shared Vision
Project Management Style 412
Case 13.3 Demo Case: Mavenlink Project Management
and Planning Software 413
14 IT Ethics, Privacy, and
Sustainability
417
Case 14.1 Opening Case: Lessons Learned: How Google
Glass Raised Risk and Privacy Challenges 418
14.1 IT Ethics 420
Ethical versus Unethical Behavior 420
Competing Responsibilities 423
14.2 Privacy and Civil Rights 424
Privacy and the New Privacy
Paradox 424
Social Media Recruiting 425
Legal Note: Civil Rights 426
Competing Legal Concerns 427
Financial Organizations Must Comply with Social
Media Guidelines 428
14.3 Technology Addictions and Focus
Management 430
Digital Distractions and Loss of Focus 430
Focus Management 430
14.4 ICT and Sustainable Development 432
Global Temperature Rising Too Much
Too Fast 432
IT and Global Warming 433
Technology to Transform Business and
Society 436
Next Wave of Disruption Will Be More
Disruptive 438
Case 14.2 Business Case: Android Auto and
CarPlay Keep Drivers Safe, Legal, and
Productive 439
Case 14.3 Video Case: IT Ethics in the
Workplace 440
GLOSSARY 443
ORGANIZATION INDEX
NAME INDEX 450
SUBJECT INDEX 451
448
xi
Preface
Information Technology for Management discusses a variety of
business strategies and explains how they rely on data, digital
technology, and mobile devices to support them in the ondemand economy. Our goal is to provide students from any
business discipline with a strong foundation for understanding the critical role that digital technology plays in enhancing
business sustainability, profitability, and growth and excel in
their careers. Enabling technologies discussed in this textbook
include the following:
has applied her innovative teaching and learning techniques to
create a stronger pedagogical focus and more engaging format
for the text.
• Performance Combining the latest capabilities in big data
analytics, reporting, collaboration, search, and digital communication helps enterprises be more agile and cuts costs to
optimize business performance and profitability.
Strong Pedagogical Approach To encourage improved learning outcomes, we employed a blended learning approach, in
which different types of delivery and learning methods, enabled
and supported by technology, are blended with traditional
learning methods. For example, case study and theoretical
content are presented visually, textually, and/or interactively
to enable different groups of students to use different learning
strategies in different combinations to fit their individual learning style and enhance their learning. Throughout the book,
content has been reorganized to improve development of the
topics and improve understanding and readability. A large
number of images that did not enhance understanding have
been removed and replaced with informative and interactive
figures and tables that better convey critical concepts.
• Growth Strategic technologies enable business to create
new core competencies, expand their markets, and move
into new markets to experience exponential growth in the
on-demand economy.
• Sustainability Cloud services are fundamental to sustaining business profitability and growth in today’s ondemand economy. They play a critical role in managing
projects and sourcing agreements, respecting personal privacy, encouraging social responsibility, and attracting and
engaging customers across multimedia channels to promote
sustainable business performance and growth.
In this 11th edition, students learn, explore, and understand
the importance of IT’s role in supporting the three essential
components of business performance improvement: technology,
business processes, and people.
What’s New in the
11th Edition?
In the 11th edition of IT for Management, we present and discuss concepts in a comprehensive yet easy-to-understand format by actively engaging students through a wide selection of
case studies, interactive figures, video animations, tech notes,
concept check questions, online and interactive exercises, and
critical thinking questions. We have enhanced the 11th edition
in the following ways:
New Author Dr. Carol Pollard, Professor of Computer Information Systems at the Walker College of Business and former
Executive Director of the Center for Applied Research in Emerging Technologies (CARET) at Appalachian State University in
North Carolina, has taken the helm for the 11th edition. Carol
Diverse Audience IT for Management is directed toward
undergraduate, introductory MBA courses, and Executive Education courses in Management Information Systems and General
Business programs. Concepts are explained in a straightforward
way, and interactive elements, tools, and techniques provide
tangible resources that appeal to all levels of students.
Leading-Edge Content Prior to and during the writing process, we consulted with a number of vendors, IT professionals,
and managers who are hands-on users of leading technologies,
to learn about their IT/business successes, challenges, experiences, and recommendations. To integrate the feedback of
these business and IT professionals, new or updated chapter
opening and closing cases have been added to many of the
chapters along with the addition of relevant, leading-edge
content in the body of the chapters.
New Technologies and Expanded Topics New to this edition
are the IT framework, business process reengineering, geocoding, systems developments methodologies, including Waterfall, object-oriented analysis, Agile and DevOps, advances
in Search Technology, the growth of Mobile Commerce and
Mobile Payment Systems, the Always-On Supply Chain, and
the Project Management framework. In addition, with more
purchases and transactions starting online and attention being
a scarce resource, students learn how search, semantic, and
recommendation technologies function to improve revenue.
Table P-1 provides a detailed list of new and expanded topics.
Useful Tools and Techniques New to this edition is a feature
we call the “IT Toolbox.” This involves the provision of a set of
useful tools or techniques relevant to chapter content. Collectively, these tools and techniques equip readers with a suite of
IT tools that will be useful in their university classes, workplace,
and personal life.
xiii
xiv
PR EFAC E
Engaging Students
to Assure Learning
• IT at Work boxes spotlight real-world cases and innovative uses of IT.
The 11th edition of Information Technology for Management
engages students with up-to-date coverage of the most important IT trends today. Over the years, this IT textbook has distinguished itself with an emphasis on illustrating the use of
cutting-edge business technologies for supporting and achieving managerial goals and objectives. The 11th edition continues this tradition with more interactive activities and analyses.
• Tech Note boxes explore topics such as “Key
Performance Indicators” and “Six Basic Systems
Development Guidelines.”
Real-World Case Studies Each chapter contains numerous
real-world examples illustrating how businesses use IT to increase
productivity, improve efficiency, enhance communication and
collaboration, and gain a competitive edge. Faculty will appreciate
a variety of options for reinforcing student learning that include
three different types of Case Studies (opening case, video case,
and business case), along with interactive figures and whiteboard
animations that provide a multimedia overview of each chapter.
Interactive Figures and Whiteboard Animations The unique
presentation of interactive figures and whiteboard animations facilitates reflection on the textual content of the book
and provides a clear path to understanding key concepts. The
whiteboard animations fit particularly well with the “flipping
the classroom” model and complement additional functionality and assets offered throughout the 11th edition. The interactive figures actively engage the students in their own learning
to effectively reinforce concepts.
• Definitions of Key Terms appear in the margins
throughout the book.
• Career Insight boxes highlight different jobs in the IT
for management field.
End-of-Chapter Activities At the end of each chapter,
features designed to assure student learning include the
following:
• Critical Thinking Questions are designed to facilitate
student discussion.
• Online and Interactive Exercises encourage students
to explore additional topics.
• Analyze and Decide questions help students apply IT
concepts to business decisions.
• Concept Questions test students’ comprehension of
each learning objective at the end of each chapter to
ensure that the students are clear on the concepts.
Students are provided with immediate feedback on
their performance.
Learning Aids Each chapter contains various learning aids,
which include the following:
Details of New and Enhanced
Features of the 11th Edition
• Learning Objectives are listed at the beginning of each
chapter to help students focus their efforts and alert
them to the important concepts that will be discussed.
The textbook consists of 14 chapters organized into four modules. All chapters have new or updated sections, as shown in
Table P-1.
TA BL E P- 1
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
1. Disruptive IT Impacts
Companies, Competition,
and Careers
• IT’s role in the on-demand economy
• Business process improvement
• Business process re-engineering
• SMAC model
• Nature of on-demand work
• Becoming an informed IT user
• Technology mega trends
• Uber
• Airbnb
• FitBit
• NFL
• Teradata
2. Information Systems, IT Architecture, Data Governance, and
Cloud Computing
• IS concepts and framework
• Information, knowledge, wisdom model
• Software-defined data center
• Mediata
• National Climatic Data center
• U.S. National Security Agency
• Apple
• Uber
• WhatsApp
• Slack
• Vanderbilt University Medical Center
• Coca-Cola
PRE FAC E
TA BLE P- 1
xv
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters (continued)
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
3. Data Management, Data
Analytics, and Business
Intelligence
• Dirty data costs and consequences
• Coca-Cola
• Data life cycle
• Capitol One
• Genomics and big data
• Travelocity
• Aligning business intelligence with business strategy
• First Wind
• Argo Corporation
• Walmart
• Infinity Insurance
• DoD and Homeland Security
• CarMax
• McDonald’s
• Verizon
4. Networks, Collaborative
Technology, and the
Internet of Things
• IPv6 protocol
• Sony
• Types of networks
• AT & T
• Network terminology
• Time-Warner
• Quality of service
• Amazon
• Net neutrality
• Warner Music
• Mobile networks and near-field communication
• Proctor & Gamble
• Internet of Things
• Walmart
• Ford
• Asda
• Unilever
• Caterpillar
• Santander
• Google
• Isle of Man
5. Cybersecurity and Risk
Management Technology
6. Search, Semantic, and Recommendation Technology
• Data breaches
• Yahoo
• Major sources of cyberthreats
• Global Payments, Inc.
• Classes of hackers
• Government of China
• Spear phishing
• Google
• Crimeware categories
• U.S. Chamber of Commerce
• Denial of service
• Brookings Institution
• KPMG data loss barometer
• LinkedIn
• Enterprise risk management framework
• Damballa
• Social search technologies
• Mint.com
• Personal assistant and voice search
• Google
• Mobile search and mobile SEO
• Microsoft
• On-page and off-page SEO factors
• Yahoo
• Updates to Google’s ranking algorithm
• Netflix
• Semantic search technologies
• Apple
• Amazon
• Diigo
• World Wide Web Consortium (W3C)
(continued)
xvi
PR EFAC E
TA BL E P- 1
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters (continued)
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
7. Web 2.0 and Social Technology
• Snapchat, the #2 social platform
• KLM Royal Dutch Airlines
• Social bookmarking
• Facebook, Inc.
• Social customer service moves from optional
to essential
• Myntra
• Role of APIs in development of new Web applications
and functionality
• Kickstarter.com
• The dominance of Facebook and the demise
of Google+
• Emerging virtual-world technology
• Snap, Inc.
• GoFundMe.com
• Oculus VR
• High Fidelity
• Twitter
• Social Mention
• Diigo
• Clipix
• Dropbox
8. Retail, E-commerce, and
Mobile Commerce Technology
• Direct and marketplace B2B ecommerce
• Macys Department Stores
• In-store retail technology
• Amazon.com
• Omni-channel retailing
• Ally Bank
• Growth of mobile commerce
• LinkedIn.com
• Growth of the mobile gaming market
• Alibaba.com
• Mobile payment methods
• Dell, Inc.
• Mobile visual search
• The Walt Disney Company
• PayPal, Inc.
• Chegg.com
9. Functional Business Systems
• Business management systems
• Ducati Motor Holding S.p.A.
• Cross-functional coordination and integration
of systems
• Office Depot
• Systems that support supply-chain management
• BAE Systems
• Social customer service
• eXtensible Business Reporting Language (XBRL)
• Schurman Fine Papers
• Adweek
• Salesforce.com
• LinkedIn
• HSBC Bank
• United Rentals
10. Enterprise Systems
• 3D printing impact on supply chain
• Organovo
• Selecting an ERP vendor
• Ferrari
• Factors for ERP success
• GE
• Order fulfillment
• Siemens
• Always-on supply chain
• Organic Valley Family of Farms
• Enterprise social platforms
• Boers & Co.
• Peters Ice Cream
• ScanSource
• Avanade
• Dillards
• FoxMeyer Drugs
• Joint Munitions Command
• Flower.com
• Red Robin
• Lowe’s
• Procter & Gamble
PR E FACE
TA BLE P- 1
xvii
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters (continued)
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
11. Data Visualization and
Geographic Information
Systems
• Increasing reliance on data discovery
• Safeway
• Data visualization tools
• PepsiCo
• Enterprise data mashups
• IBM
• Geocoding
• ADP Corp.
• Department of Veterans Affairs
• General Motors
12. IT Strategy, Sourcing, and
Strategic Technology Trends
• Business–IT alignment
• Intel
• IT strategic planning
• Nestle Nespresso
• Porter’s competitive forces model
• LinkedIn
• Porter’s value chain model
• ESSA Academy
• Five-phase outsourcing life cycle
• Cisco
• IT sourcing strategies
• Citigroup
• Strategic technology trends
• Technology scanning
13. Systems Development and
Project Management
• SDLC stages
• Denver International Airport
• Systems development methodologies
• U.S. Census Bureau
• DevOps
• Apple
• Project management framework
• Mavenlink
• PM core and support knowledge areas
• Responsibility matrix
14. IT Ethics, Privacy, and
Sustainability
• Ethical vs. unethical behavior
• Google
• Privacy paradox
• Target
• Climate change
• Facebook
• Technology addiction
• SnapChat
• “People-first” approach to technology
• NASA
• Disruptive technologies
• Apple
Supplemental Materials
An extensive package of instructional materials is available
to support this 11th edition. These materials are accessible
from the book companion website at www.wiley.com/college/
turban.
• Instructor’s Manual The Instructor’s Manual presents
objectives from the text with additional information to make
them more appropriate and useful for the instructor. The
manual also includes practical applications of concepts,
case-study elaboration, answers to end-of-chapter questions, questions for review, questions for discussion, and
Internet exercises.
• Test Bank The test bank contains over 1,000 questions and problems (about 75 per chapter) consisting of
multiple-choice, short answer, fill-ins, and critical thinking/
essay questions.
• PowerPoint Presentation A series of slides designed
around the content of the text incorporates key points from
the text and illustrations where appropriate.
• Chapter Summary Whiteboard Animations A series of
video animations that summarize the content of each chapter
in an entertaining way to engage the students in grasping the
subject matter.
xviii
PR EFAC E
Acknowledgments
No book is produced through the sole efforts of its authors, and
this book is no exception. Many people contributed to its creation, both directly and indirectly, and we wish to acknowledge
their contributions.
Special thanks go to the team at John Wiley, particularly
Darren Lalonde, Emma Townsend-Merino, Ethan Lipson, and
Loganathan Kandan for their ongoing and encouraging editorial expertise and leadership. Their guidance, patience, humor,
and support during the development and production of this
most recent version of the textbook made the process much
easier. We couldn’t have done it without you!
Our sincere thanks also go to the following reviewers of the
11th edition. Their feedback, insights, and suggestions were
invaluable in ensuring the accuracy and readability of the book:
Joni Adkins, Northwest Missouri State University
Ahmad Al-Omari, Dakota State University
Rigoberto Chinchilla, Eastern Illinois University
Michael Donahue, Towson University
Samuel Elko, Seton Hill University
Robert Goble, Dallas Baptist University
Eileen Griffin, Canisius College
Binshan Lin, Louisiana State University in Shreveport
Thomas MacMullen, Eastern Illinois University
James Moore, Canisius College
Beverly S. Motich, Messiah College
Barin Nag, Towson University
Luis A. Otero, Inter-American University of Puerto Rico,
Metropolitan Campus
John Pearson, Southern Illinois University
Daniel Riding, Florida Institute of Technology
Josie Schneider, Columbia Southern University
Derek Sedlack, South University
Eric Weinstein, The University of La Verne
Patricia White, Columbia Southern University
Gene A. Wright, University of Wisconsin–Milwaukee
Many thanks also go to our dedicated graphic designers,
Kevin Hawley and Nathan Sherrill, without whose help we
would not have been able to create the innovative Whiteboard
Animations, and to Senior Photo Editor, Billy Ray, whose extensive and expert research into the images used in the textbook
greatly enhanced the overall “look” of this 11th edition.
Extra special thanks go to our families, friends, and colleagues for the enormous encouragement, support, and understanding they provided as we dedicated time and effort to
creating this new edition.
Finally, we dedicate the 11th edition of Information
Technology for Management to the Memory of Dr. Linda
Volonino, the driving force behind editions 7 through 10 of IT
for Management. Thank you Linda, for all your hard work in
providing the foundation for this latest edition of the textbook.
CAROL POLLARD
GREGORY WOOD
CHAPTER 1
Disruptive IT Impacts Companies,
Competition, and Careers
CHAPTE R O UT L INE
L E A R N I NG O BJE CTI VE S
Case 1.1 Opening Case: Uber, Airbnb, and the
On-Demand Economy
1.1 Doing Business in the On-Demand Economy
1.1 Describe how the on-demand economy is changing the way
that business is conducted.
1.2 Business Process Improvement and
Competitive Advantage
1.2 Explain the role of IT in business process improvement.
Understand the concepts of business process reengineering
and competitive advantage.
1.3 IT Innovation and Disruption
1.3 Describe innovating technologies and explain how they are
disrupting enterprises.
1.4 IT and You
1.4 Understand the value of being an “informed user” of IT and
the ways in which IT can add value to your career path and
performance in the on-demand economy.
Case 1.2 Business Case: The Internet of Things
Comes to the NFL
Case 1.3 Video Case: What Is the Value of Knowing
More and Doing More?
Introduction
The more digital technology advances, the more it is almost instantly integrated into our daily
lives. Many managers and entrepreneurs recognize the need to integrate digital technology
into their products and services. For example, it has been estimated that 78% of business
1
2
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
leaders expect their organizations to be a digital business by 2020. Outdated and complex
application architectures with a mix of interfaces can delay or prevent the release of new
products and services, and maintaining these obsolete systems absorbs large portions of the
information technology (IT) budget.
Companies such as Uber, Airbnb, Shyp, TaskRabbit, and other participants in the ondemand economy are leveraging IT to create exciting new business models and revolutionize the way workers, businesses, and customers interact and compete. Peter Hinssen, a
well-known business author, university lecturer, and digital consultant, described the change
in digital technology as follows:
Technology used to be nice. It used to be about making things a little bit better, a little
bit more efficient. But, technology stopped being nice: it’s disruptive. It’s changing our
business models, our consumer markets, our organizations. (MacIver, 2015)
As businesses continue to join the on-demand economy, IT professionals must constantly
scan for innovative new technologies to provide business value and help shape the future of
the business. For example, smart devices, mobile apps, sensors, and technology platforms—
along with increased customer demand for digital interactions and on-demand services—have
moved commerce in fresh new directions. We’ve all heard the phrase “there’s an app for that”
and that kind of consumer thinking is what drives the on-demand economy.
Business leaders today need to know what steps to take to get the most out of mobile,
social, cloud, big data, analytics, visualization technologies, and the Internet of Things (IoT) to
move their business forward and enable new on-demand business models. Faced with opportunities and challenges, managers need to know how to leverage IT earlier and more efficiently
than their competitors.
A goal of this book is to empower you to improve your use and management of IT at
work by raising your understanding of IT terminology, practices, and tools and developing
your IT skills to transform you into an informed IT user. Throughout this book, you will learn
how digital technology is transforming business and society in the on-demand economy as
the IT function takes on key strategic and operational roles that determine an enterprise’s
success or failure. You will also be provided with an in-depth look at IT trends that have
immediate and future capacity to influence products, services competition, and business
relationships. Along the way, we’ll describe many different ways in which IT is being used
and can be used in business and provide you with the some of the terminology, techniques
and tools that enable organizations to leverage IT to improve growth, performance, and
sustainability.
In this opening chapter, you will learn about the powerful impacts of digital technology
on people, business, government, entertainment, and society that are occurring in today’s ondemand economy. You will also discover how leading companies are deploying digital technology and changing their business models, business processes, customer experiences, and
ways of working. We will present examples of innovative products, services, and distribution
channels to help you understand the digital revolution that is currently shaping the future of
business, the economy and society and changing management careers. And, we’ll explain why
IT is important to you and how becoming an “informed user” of IT will add significant value to
your career and overall quality of life.
Introduction 3
Case 1.1 Opening Case
NICOLAS MAETERLINCK / Stringer /
Getty Images
THE ON-DEMAND BUSINESS FRAMEWORK
CORE ON-DEMAND
SERVICES
CONSUMER
TECHNOLOGY
Logistics Management
Offline Services Move Online
Vendor Management
Interface Layer
Ubiquitous Connectivity
Mobile Adoption
App Marketplace
COMPLIMENTARY
RESOURCES
CONSUMER
BEHAVIOR
Payment Systems
Cloud Services
CRM Platforms
1099 Community
Convenience
Efficiency
Simplicity
Instant Gratification
THE
ON-DEMAND
ECONOMY
Uber and Airbnb Revolutionize Business Models
in the On-Demand Economy
categories in the on-demand world. Forward-thinking companies are
reshaping these industries.
If you’ve used Uber or Airbnb, then you have participated in the
on-demand economy where speed, convenience, and simplicity
are key factors in consumer behavior and purchasing decisions.
Michael Boland, author of What’s Driving the Local On-Demand Economy, explains that as consumers, “We’re being conditioned to expect
everything on-demand as the mobile device increasingly becomes the
remote control for the physical world” (Boland, 2015). For example,
the majority of consumers who tap an Uber app to get a ride would
not consider dialing an 800 number for a taxi. With all transactions
performed by apps and automated processes, the entire process from
hailing to paying for a ride is slick, quick, and easy, without cash or
credit cards.
Uber Business Model
Tech Platforms Enabled On-Demand Services to Take Off
Decades of technological innovation have given us smartphone apps,
mobile payment platforms, GPS and map technology, and social
authentication. These technologies are being used to build the infrastructure needed for on-demand services. This infrastructure—also
referred to as a technology platform or technology stack—supports
the exchange and coordination of staggering amounts of data. The
term technology stack reflects the fact that the platform is made up of
multiple layers (stacks) of hardware, software, network connectivity,
and data analytics capabilities.
In many consumer markets today, companies that do not have
iPhone or Android apps or technology platforms that support the
exchange of goods and services—no matter how useful their website—
may find themselves losing their competitive edge.
On-Demand Economy Requires a New Business Model
Uber and Airbnb are popular examples of companies that developed
on-demand business models to transform slow-to-innovate industries. A simple definition of business model is the way a company
generates revenue and makes a profit. On-demand business models provide real-time fulfillment of goods and services, which have
attracted millions of users worldwide. This model fits best when
speed and convenience matter the most. The ground transportation, grocery, and restaurant industries are examples of hyper-growth
Uber disrupted the taxi industry with a workforce that is essentially
any person with a smartphone and a car. Location-aware smartphone
apps bring drivers and passengers together, while in-app accounts
make the cashless payment process effortless. By simply opening the
Uber app and pressing the middle button for several seconds (a long
press), customers can order a ride to their current location, selecting
the kind of car they want. Payment is automatically charged to the
credit card on file with receipts via email.
The Uber concept developed in response to taxi scarcities. It
started on a snowy Paris night in 2008 when the two founders could
not get a cab. They wanted a dead-simple app that could get them
a car with a tap. On June 1, 2015, the entrepreneurs celebrated
Uber fifth anniversary and announced that the company had grown
into a transportation network covering 311 cities in 58 countries in
North and South Americas, Europe, Africa, Asia Pacific, and the
Middle East.
Uber has invested in new and developing technologies and partnerships. The company partnered with Carnegie Mellon University to
build robotic cars and new mapping software. In March 2015, Uber purchased deCarta, a 40-person mapping start-up to reduce its dependence on Google maps.
Airbnb Business Model
Another disruption to a traditional industry occurred when Airbnb
blindsided the hotel industry. Airbnb allows anyone with a spare
apartment or room—even if only for a day—to run their own bed and
breakfast by giving them a technology platform to market themselves
to a global market. By 2016, the Airbnb site had over 1.5 million listings in 190 countries and 34,000 cities. Over 40 million guests have
used Airbnb worldwide. For comparison, Hilton, InterContinental, and
Marriott, the largest hotel chains in the world, have less than 1 million
rooms each.
Uber and Airbnb do not own inventory. Instead, they scale up
(expand) by improving their ability to acquire and match customers
and service providers.
4
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
Business Success in Terms of Company Growth
and Valuation
The ride-hailing app Uber and the housing rental app Airbnb are two
of the most valuable start-ups, as displayed in Figure 1.1. Valuation
of a company at its early stages is based heavily on its growth potential
and future value. In contrast, the valuation of an established company
is based on its present value, which is calculated using traditional
financial ratios and techniques related to revenues or other assets.
Uber’s massive market value—estimated at $60 billion—is
greater than 80% of all Standard & Poor (S&P) 500 companies, many
of which have been around for 25, 50, or 100 years. Investors valued
Airbnb at $24 billion—higher than the value of the hotel giant Marriott
Airbnb
Started in 2008
Airbnb—short for Air Bed and
Breakfast
The leading disrupter in the hotel
and vacation rental market
By 2016, Airbnb was valued at
about $25 billion. Exceeded the
value of Marriott International
FIGURE 1.1
International. These companies would never have been able to grow
in the old way as a traditional organization, with their own inventory of
products, services, and workforce and traditional forms of technology.
Questions
1. In what ways are the Uber and Airbnb business similar or
different?
2. How did Uber achieve its new business model?
3. To what extent do you think changing their business models contributed to the success of Uber and Airbnb?
Sources: Compiled from Primack (2015), Storbaek (2015), Winkler and MacMillan
(2015,) Jaconi (2014), Uber.com (2017), Airbnb.com (2017).
Uber
Started in 2009. Founder Garrett
Camp wanted to tackle the taxi
shortage problem in San Francisco
Uber epitomizes disruption
Changed the way customers think
about grabbing a ride
By 2016, Uber had higher valuation
than companies that make the cars
its drivers use–GM, Honda, and Ford
On-demand business models of Airbnb and Uber have been extremely
successful.
Doing Business in the
On-Demand Economy
1.1
On-demand economy is the
economic activity created by
technology companies that fulfill
consumer demand through
the immediate provisioning of
products and services.
The on-demand economy is revolutionizing commercial activities in businesses around the
world. The businesses in this new economy are fueled by years of technology innovation and a
radical change in consumer behavior. As companies become more highly digitized, it becomes
more and more apparent that what companies can do depends on what their IT and data management systems can do. For over a decade, powerful new digital approaches to doing business
have emerged. And there is sufficient proof to expect even more rapid and dramatic changes
due to IT breakthroughs and advances.
In market segment after market segment, mobile communications and technology stacks
make it financially feasible for companies to bring together consumers and providers of products and services. These capabilities have created the on-demand economy. As Ev Williams,
cofounder of Twitter says,
The internet makes human desires more easily attainable. In other words, it offers
convenience. Convenience on the internet is basically achieved by two things: speed,
and cognitive ease. If you study what the really big things on the internet are, you
realize they are masters at making things fast and not making people think.
Doing Business in the On-Demand Economy
The proliferation of smartphone-connected consumers, simple and secure purchase flows, and
location-based services are a few of the market conditions and technological innovations that
are propelling the explosion of on-demand services.
Just as the rapid growth of online-only Amazon and eBay transformed retail, the even faster
growth of app-driven companies, like Uber, Airbnb, and Grubhub, has disrupted the taxi, hotel,
and restaurant markets. As you read in the opening case, in six short years, Uber changed the
taxi industry as it rose from start-up to the world’s most valuable private technology company,
and Airbnb tackled the fiercely competitive hotel market and attracted more than 60 million
customers to become the third most valuable venture-capital-backed company in the world.
Another example is Grubhub who became No. 1 in online food ordering, controlling over 20%
of that $9 billion market. What today’s successful technology businesses have in common are
platform-based business models. Platforms consist of hardware, software, and networks that
provide the connectivity for diverse transactions, such as ordering, tracking, user authentication, and payments. These business models are designed to serve today’s on-demand
economy, which is all about time (on-demand), convenience (tap an app), and personalized
service (my way). For example, millennials want the ease of online payment over cash and
insist on efficiency for all aspects of their lives, including shopping, delivery, and travel.
Key strategic and tactical questions that determine an organization’s profitability and
management performance are shown in Figure 1.2. Answers to each question require an
understanding of the capabilities of mundane to complex IT, which ones to implement and
how to manage them.
Strategic direction:
industry, markets,
and customers
• What do we do?
• What is our direction?
• What markets & customers should
we be targeting and how do we
prepare for them?
Business model
• How do we do it?
• How do we generate revenues &
profits to sustain ourselves and
build our brand?
Business
processes,
producers,
and technology
FIGURE 1.2
• How well do we do it?
• How can we be more
efficient?
Key strategic and tactical questions.
Growth of the On-Demand Economy
Whether it is ease of scheduled deliveries or the corresponding time savings, the growth of
the on-demand economy is a product of its alignment with consumers’ growing appetite
for greater convenience, speed, and simplicity. A recent survey reported that 86.5 million
Americans have used the services of at least one on-demand start-up company (Chriss, 2016).
The growth of the on-demand economy demonstrates the high level of interest consumers
have in on-demand services from dog walking to laundry services, short-term home rentals,
massages, and truck hauling. Although just applying a mobile app to an existing service will not
ensure a company’s success, IT is a vital and integral part of the all businesses that are part of
the on-demand economy.
5
6
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
Low Cost of Entry One of the reasons that the on-demand economy has taken off is
that it is easier than ever to become an on-demand business. Companies like Dispatch, a software as-a-service company, allow entrepreneurs to move into the on-demand world quickly
and inexpensively. For example, Aatlantic Fitness, a fitness equipment repair service company,
moved into the on-demand economy using Dispatch, and Handyman Connection, a 20-yearold home repair service company, is using Dispatch’s platform to compete with Handy, an ondemand service for house cleaning that has raised $60 million in venture capital.
Digital Business Models
The on-demand economy is driving the transformation of traditional business models to digital
business models to serve customers what they want and where they want it.
Business models are the ways enterprises generate revenue or sustain themselves. Digital
business models define how businesses make money via digital technology. Companies that
adopt digital business models are better positioned to take advantage of business opportunities and survive, according to the Accenture Technology Vision 2013 report (Accenture, 2013).
Figure 1.3 contains examples of new technologies that destroyed old business models and
created new ones.
Twitter dominates the
reporting of news and events
as they are still happening
Facebook became the most
powerful sharing network
in the world
Location-aware technologies
track items through
production and delivery to
reduce wasted time and
inefficiency in supply chains
and other business-tobusiness (B2B) transactions
Smartphones, tablets, other
touch devices, and their apps
reshaped how organizations
interact with customers—and
how customers want
businesses to interact with
them
FIGURE 1.3 Digital business models refer to how companies engage
their customers digitally to create value via websites, social channels, and
mobile devices.
The ways in which market leaders are transitioning to digital business models include the
following:
• NBA talent scouts rely on sports analytics and advanced scouting systems NBA talent
scouts used to crunch players’ stats, watch live player performances, and review hours of
tapes to create player profiles. Now software that tracks players’ performance has changed
how basketball and soccer players are evaluated. For example, STATS’ SportVU technology
is revolutionizing the way sports contests are viewed, understood, played, and enjoyed.
SportVU uses six palm-sized digital cameras that track the movement of every player
on the court, record ball movement 25 times per second, and convert movements into
statistics. SportVU produces real-time and highly complex statistics to complement the traditional play-by-play. Predictive sport analytics can provide a 360-degree view of a player’s
performance and help teams make trading decisions. Sports analytics bring about small
competitive advantages that can shift games and even playoff series.
• Dashboards keep casino floor staff informed of player demand Competition in the
gaming industry is fierce, particularly during bad economic conditions. The use of manual
spreadsheets and gut-feeling decisions did not lead to optimal results. Casino operators facing pressure to increase their bottom line have invested in analytic tools, such as
Doing Business in the On-Demand Economy
Tangam’s Yield Management solution (TYM). TYM is used to increase the yield (profitability)
of blackjack, craps, and other table games. The analysis and insights from real-time apps
are used to improve the gaming experience and comfort of players.
Today, a top concern of well-established corporations, global financial institutions, born-on-theWeb retailers, and government agencies is how to design their digital business models in order to
• Deliver an incredible customer experience
• Turn a profit
• Increase market share
• Engage their employees
In the digital (online) space, the customer experience must measure up to the very best the
Web has to offer. Stakes are high for those who get it right—or get it wrong. Forrester research
repeatedly confirms there is a strong relationship between the quality of a firm’s customer
experience and loyalty, which, in turn, increases revenue (Schmidt-Subramanian et al., 2013).
IT’s Role in the On-Demand Economy
According to the 2016 survey conducted by the Society of Information Management (SIM), 1,213
IT leaders (including 490 chief information officers (CIOs)) from 801 companies reported companies that are more highly digitized and tightly connected are putting a greater emphasis on
the strategic use of IT to enhance growth and improve performance. As a result, IT priorities and
spending are changing (Kappelman et al., 2017).
A review of the top 10 IT management priorities reported in the survey results is shown
in Table 1.1. Along with business-IT alignment and security, Table 1.1 clearly demonstrates a
need for companies to focus on strategic and organizational priorities such as innovation, IT
and business agility, speed of IT delivery, and business productivity and efficiency.
TA B L E 1 . 1
10 Top IT Management Priorities
IT Management Issues
1
Technology Alignment with the Business
2
Security, Cybersecurity & Privacy
3
Innovation
4
IT Agility & Flexibility
5
Business Agility & Flexibility
6
Business Cost Reduction & Controls
7
IT Cost Reduction & Controls
8
Speed of IT Delivery & IT Time to Market
9
Business Strategic Planning
10
Business Productivity & Efficiency
Adapted from Kappelman et al. (2017).
To address these issues, IT leaders said they need to focus on relationships, meet more
frequently with top management, and spend significant amounts of time with functional
leaders, customers, and suppliers. Companies also need to emphasize finding, keeping,
and developing IT talent and on improving IT to improve business performance. These
findings point to one clear message—IT in the on-demand economy is about meeting customer needs.
7
8
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
IT Business Objectives
Now, more than ever, IT must be responsive to the needs of consumers who are demanding a
radical overhaul of business processes in companies across diverse industry sectors. Intuitive
interfaces, around-the-clock availability, real-time fulfillment, personalized treatment, global
consistency, and zero errors—this is the world to which customers have become increasingly
accustomed. And, it’s not just about providing a superior user or customer experience—when
companies get it right, they can also offer more competitive prices because of lower costs, better operational controls, and open themselves up to less risk.
According to Chirantan Basu of Chron (Basu, 2017), to stay abreast of the ever-changing
business landscape and customer needs, IT today must concentrate on the following six
business objectives:
1. Product development From innovations in microprocessors to efficient drug-delivery
systems, IT helps businesses respond quickly to changing customer demands.
2. Stakeholder integration Companies use their investor relations websites to
communicate with shareholders, research analysts, and others in the market.
3. Process improvement An ERP system replaces dozens of legacy systems for finance,
human resources, and other functional areas, to increase efficiency and cost-effectiveness
of internal business processes.
4. Cost efficiencies IT allows companies to reduce transaction and implementation costs,
such as costs of duplication and postage of email versus snail mail.
5. Competitive advantage Companies can use agile development, prototyping, and other
systems methodologies to being a product to market cost-effectively and quickly.
6. Globalization Companies can outsource most of their noncore functions, such as HR
and finance, to offshore companies and use ICT to stay in contact with its global employees, customers, and suppliers 24/7.
Every technology innovation triggers opportunities and threats to business models and strategies. With rare exceptions, every business model depends on a mix of IT, knowledge of its
potential, the requirements for success, and, equally important, its limitations.
Questions
1. What precipitated the on-demand economy?
2. How is IT contributing to the success of the on-demand economy?
3. List the six IT business objectives.
4. What are the key strategic and tactical questions that determine an organization’s profitability and
management performance?
5. What is a business model?
6. What is a digital business model?
7. Give two examples of how companies are transitioning to digital business models.
8. What factors are driving the move to digital business models?
Business Process Improvement
and Competitive Advantage
1.2
Given that a company’s success depends on the efficiency of its business processes, even small
improvements in key processes can have significant payoff. All functions and departments in
the enterprise have tasks they need to complete to produce outputs, or deliverables, in order
to meet their objectives.
Business Process Improvement and Competitive Advantage
9
Before you can begin to improve something, you have to understand what it is you are
improving. We’ll start by defining a business process, looking at its characteristics, and then
exploring ways in which a business process can be improved either incrementally or radically
through Business Process Reengineering.
What Is a Business Process?
Business processes are series of steps by which organizations coordinate and organize tasks
to get work done. In the simplest terms, a process consists of activities that convert inputs into
outputs by doing work.
Examples of common business processes are as follows:
• Accounting Invoicing; reconciling accounts; auditing
• Finance
Credit card or loan approval; estimating credit risk and financing terms
• Human resources (HR) Recruiting and hiring; assessing compliance with regulations;
evaluating job performance
• IT or information systems Generating and distributing reports and data visualizations;
data analytics; data archiving
• Marketing Sales; product promotion; design and implementation of sales campaigns;
qualifying a lead
• Production and operations Shipping; receiving; quality control; inventory management
• Cross-functional business processes Involving two or more functions, for example,
order fulfillment and product development
Three Components of a Business Process Business processes have the three
basic components shown in Figure 1.4. They involve inputs, activities, and deliverables.
Deliverables
products,
services,
plans,
or actions
Inputs
raw materials,
data,
knowledge,
expertise
Activities
work that
transforms
inputs and acts
on data and
knowledge
FIGURE 1.4
Three components of a business process.
Business Process
Processes can be formal or informal. Formal processes are documented and have wellestablished steps. Order taking and credit approval processes are examples. Routine formal
processes are referred to as standard operating procedures (SOPs). An SOP is a well-defined
and documented way of doing something. An effective SOP documents who will perform the
tasks; what materials to use; and where, how, and when the tasks are to be performed. SOPs
are needed for the handling of food, hazardous materials, or situations involving safety, security, or compliance. In contrast, informal processes are typically undocumented, have inputs
that may not yet been identified, and are knowledge-intensive. Although enterprises would
prefer to formalize their informal processes in order to better understand, share, and optimize
them, in many situations process knowledge remains in people’s heads.
Processes range from slow, rigid to fast-moving, adaptive. Rigid processes can be structured to be resistant to change, such as those that enforce security or compliance regulations.
Adaptive processes are designed to respond to change or emerging conditions, particularly in
marketing and IT.
Improving Business Processes
Designing an effective process can be complex because you need a deep understanding of the
inputs and outputs (also known as deliverables), how things can go wrong, and how to prevent
Deliverables are the outputs
or tangible things that are
produced by a business process.
Common deliverables are
products, services, actions, plans,
or decisions, such as to approve
or deny a credit application.
Deliverables are produced in order
to achieve specific objectives.
10
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
things from going wrong. For example, Dell had implemented a new process to reduce the time
that tech support spent handling customer service calls. In an effort to minimize the length of
the call, tech support’s quality dropped so much that customers had to call multiple times to
solve their problems. The new process had backfired—increasing the time to resolve computer
problems and aggravating Dell customers.
The importance of efficient business processes and continuous process improvement
cannot be overemphasized. Why? Because 100% of an enterprise’s performance is the result
of its processes. Maximizing the use of inputs in order to carry out similar activities better than
one’s competitors is a critical success factor (CSF). Poorly designed, flawed, or outdated
business processes waste resources, increase costs, cause delays, and aggravate customers.
For example, when customers’ orders are not filled on time or correctly, customer loyalty
suffers, returns increase, and reshipping increases costs. The blame may not be employee
incompetence, but a flawed order fulfillment process.
Don’t Automate, Obliterate!
In today’s on-demand economy, incrementally improving a business process isn’t always
sufficient to create the type of change required. Instead, radical changes need to occur to meet
higher customer expectations. To do this, companies have to go beyond simply automating
an existing process. They must reinvent the entire business process, including reducing the
number of steps required, eliminating documents, developing automated decision-making,
and dealing with regulatory and fraud issues. Operating models, skills, organizational structures, and roles need to be redesigned to match the reinvented processes. Data models should
be adjusted and rebuilt to enable better decision-making, performance tracking, and customer insights.
Leading organizations have come to recognize that it can take a long time to see the benefits
of traditional large-scale projects that migrate all current processes to digital and sometimes
they don’t work. Instead, successful companies are reinventing processes, challenging everything related to an existing process and rebuilding it using cutting-edge digital technology. For
example, rather than creating technology tools to help back-office employees type customer
complaints into their systems, leading organizations create self-serve options for customers to
type in their own complaints.
Business Process Reengineering (BPR) The process by which these types of radical process change can be achieved is referred to as business process reengineering (BPR),
its slogan is “Don’t automate, obliterate!” (Hammer and Champy, 2006). Consisting of eight
stages, shown in Figure 1.5, BPR proposes that simply applying IT to a manual or outdated process does not always optimize it. Instead, processes need to be examined to determine whether
they are still necessary. After unnecessary processes are identified and eliminated, the remaining ones are redesigned (or reengineered) in order to automate or streamline them. Next, the
new process is implemented and put into operation and its performance is evaluated. Finally,
the process is reassessed over time to continually improve it.
The goal of BPR is to eliminate unnecessary, non-value-added processes, and simplify
and automate the remaining processes to significantly reduce cycle time, labor, and costs. For
example, reengineering the credit approval process cuts time from several days or hours to
minutes or less. Simplifying processes naturally reduces the time needed to complete the process, which also cuts down on errors.
After eliminating waste, technology can enhance processes by (1) automating existing
manual processes; (2) expanding the data flows to reach more functions in order to make it possible for sequential activities to occur in parallel; and (3) creating innovative business processes
that, in turn, create new business models. For instance, consumers can scan an image of a
product and land on an e-commerce site, such as Amazon.com, selling that product. This process flips the traditional selling process by making it customer-centric.
You will read more about optimizing business processes and role of business process
management (BPM) role in the alignment of IT and business strategy in Chapter 13.
Business Process Improvement and Competitive Advantage
11
1. Develop
Vision and
Objectives
2. Understand
Existing
Processes
8. Perform
Continuous
Improvement
7. Evaluate New
Process
Business Process
Reengineering
6. Make New
Process
Operational
3. Identify
Process for
Redesign
4. Identify
Change Levers
5. Implement
New Process
FIGURE 1.5
Eight phases of business process reengineering.
Gaining a Competitive Advantage
Understanding trends that affect the new ways business is being done and getting in front of
those trends by changing adding, deleting, and changing existing business processes gives
organizations an important competitive advantage over their competitors. Helping a
company gain, maintain, and sustain a competitive advantage in the market is a very important function of IT. In business, as in sports or politics, companies want to win—customers,
market share, and position in the industry. Basically, this requires gaining an edge over competitors by being first to take advantage of market opportunities, providing better customer
experiences, offering unique products or services, or convincing customers why your business
is a more attractive alternative than your competitors.
Influential industry leaders cite “new competition” as their largest business challenge.
Once an enterprise has developed a competitive edge, it can only be sustained by continually
pursuing new and better ways to compete. Maintaining a competitive advantage requires
forecasting trends and industry changes and figuring out what the company needs to do to stay
ahead of the game. It demands continuously tracking…
Purchase answer to see full
attachment
Module 04: Networks, Collaborative Technology, and the Internet of
Things
In this module, we examine the importance of networks to communication and sharing information.
We will explore network basics that managers should understand in order to make effective decisions
on network-related investments. We will also cover some network technologies businesses can use to
improve processes and decision making.
Question Requirements:
IT Concepts to Business Decisions
Case 4.2 Business Case: Carnival Seeks to Keep Passengers Happier at Sea with IoT, NFC
and Edge Computing
A case study is a puzzle to be solved, so before reading and discussing the specific case questions
below, develop your proposed solution by following these five steps:
Read the case study to identify the key issues and underlying issues. These issues are the principles
and concepts of the course module which apply to the situation described in the case study.
Record the facts from the case study which are relevant to the principles and concepts of the module.
The case may have extraneous information not relevant to the current course module. Your ability to
differentiate between relevant and irrelevant information is an important aspect of case analysis, as it
will inform the focus of your answers.
Describe in some detail the actions that would address or correct the situation.
Complete this initial analysis and then read the case study questions that follow here. Typically, you
will already have the answers to the questions but with a broader consideration. At this point, you can
add the details and/or analytical tools required to solve the case.
Case Study Questions:
•
•
•
•
•
Why did Carnival Cruise Line think the OceanMedallion would help increase their cruise
sales?
What is the services component of the OceanMedallion called and what technologies does it
use?
On how many Carnival cruise ships is the OceanMedallion used?
What services does the OceanMedallion Class offer to passengers?
What benefits do passengers enjoy from using an OceanMedallion?
Directions:
To make it easier to read and therefore grade, make sure you clearly delineate each section
of your answer so it can be matched with the relevant question
Your well-written paper should meet the following requirements:
• Be 5 pages in length, which does not include the title and reference pages, which are never
a part of the content minimum requirements.
• Use Saudi Electronic University academic writing standards and APA style guidelines.
• Support your submission with course material concepts, principles, and theories from the
textbook and at least two current, scholarly, peer-reviewed journal articles. Current articles
are those published in the last five years.
• Ensure zero plagiarism. (very, very important)
In advance of submission, review the grading rubric to see how you will be graded for this
assignment.
Learning Outcomes
1. Differentiate between various network types and functions.
2. Examine protocols and network capabilities, and why a business manager should understand
these.
3. Articulate the importance and impact of mobile networks on business.
4. Analyze the business uses of collaborative technologies and the Internet of Things.
Readings
Required:
• Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information
Technology for Management: On-Demand Strategies for Performance, Growth, and
Sustainability
• Elksasy, M. S. M. (2023). Understanding the Internet of Things ( IoT ) Concepts, Applications
and Standards: An Overview. Delta University Scientific Journal, 6(1), 205–
210.
• View the following videos:
• Chapter 4 Whiteboard Animation Videos, part 1
• Chapter 4 Whiteboard Animation Videos, part 2
Recommended:
• Chapter 4 PowerPoint Presentation
IT for Management: On-Demand Strategies for
Performance, Growth, and Sustainability
Twelfth Edition
Turban, Pollard, Wood
Chapter 4
Networks, the Internet of Things
(IoT), and Edge Computing
Learning Objectives (1 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
2
Network Fundamentals
A computer network is a set of computers connected together for the purpose of sharing recourses.
Copyright ©2021 John Wiley & Sons, Inc.
3
Benefits of Computer Networks
Examples of the benefits that companies derive from
a well-developed network architecture include:
• Instantaneous Data and File Sharing
• Simultaneous Resource Sharing
• Secure Data Protection and Redundancy
• Streamlined Administration
• Rapid Internal Communications
• Distributing Computer Power
Copyright ©2021 John Wiley & Sons, Inc.
4
Types of Networks
Copyright ©2021 John Wiley & Sons, Inc.
5
Local Area Network (LAN) (1 of 2)
A group of computers and other devices that share a
communication line or wireless link to server within a limited
geographic area
Copyright ©2021 John Wiley & Sons, Inc.
6
Local Area Network (LAN) (2 of 2)
• Star network configuration is one in which each
computer is directly linked to a central computer and
indirectly to each other.
• Ring network configuration is one in which each
computer is connected to two adjoining computers to
form a closed circuit.
• Bus network configuration has a main channel to
which nodes or secondary channels are connected in a
branchlike structure.
Copyright ©2021 John Wiley & Sons, Inc.
7
Wide Area Network (WAN) (1 of 2)
A communication network that spans a large geographic area
Copyright ©2021 John Wiley & Sons, Inc.
8
Wide Area Network (WAN) (2 of 2)
Internet Service Provider (ISP) is an organization that
provides services for accessing, using or participating with the
Internet.
Virtual private network (VPN) is a service that allows safe
and private network access by routing connections through a
server and hiding the online actions.
Software-defined WAN (SD-WAN) is managed by one central
app that efficiently distributes network traffic across a WAN
over the Internet or cloud-based private networks.
Copyright ©2021 John Wiley & Sons, Inc.
9
Intranets, Extranets, and Virtual Private
Networks
• Intranets are LANs or WANS used within a company for
data access, sharing, and collaboration.
• Extranets are WANs that can be logged into remotely
via the Internet to facilitate communication with clients
and vendors.
• Virtual Private Networks (VPNs) are used where
security of transmissions is a concern, because they
encrypt the packets before they are transferred over
the network.
Copyright ©2021 John Wiley & Sons, Inc.
10
Virtual Private Networks
Copyright ©2021 John Wiley & Sons, Inc.
11
Transmission Media and Speed
• Frequency is the capacity of a transmission media.
• Bits per second (bps) is the speed at which data are
transferred over a network.
• Bandwidth of a media is the maximum amount of bps
that can be transmitted over the media and it varies by
media type.
Copyright ©2021 John Wiley & Sons, Inc.
12
Circuit Switching vs. Packet Switching
• Circuit switching occurs when there is a dedicated
connection between a source and destination.
• Packet switching occurs when data or voice is
transferred in packets.
• Packets are individual pieces of a message that are
collected and re-assembled with the other pieces of
the same message at their destination. To improve
communication performance and reliability, each larger
message sent between two network devices is often
subdivided into packets.
Copyright ©2021 John Wiley & Sons, Inc.
13
Network Components (1 of 2)
• Client is the name used for a computer on a network.
• Server is a central repository of data and various
programs that are shared by users in a network.
• Router links computers to the Internet to enable users
to share a network connection.
• Wireless Router is a device that works as a router to
forward data between network devices and serves as
both a wireless access point and a router.
• Hub is a hardware device where data from many
directions converge and are then sent out in many
directions to multiple devices in a network.
Copyright ©2021 John Wiley & Sons, Inc.
14
Network Components (2 of 2)
• Switch is a controller that enables networked devices
to talk to each other efficiently by transmitting data
packets based on IP addresses. It connects the
computers, printers and servers within a building or a
company to create the network.
• Network Interface Card (NIC) is a circuit board or chip
installed in a computer to enable it to connect to a
wired or wireless network.
Copyright ©2021 John Wiley & Sons, Inc.
15
Copyright ©2021 John Wiley & Sons, Inc.
16
Network Applications
• Pure network applications are developed expressly for
use by two more devices that help transfer data and
communicate across a network.
• Standalone network applications were originally
developed for use on a single device and their
functionality retooled to allow them to run on
networks.
Copyright ©2021 John Wiley & Sons, Inc.
17
Copyright ©2021 John Wiley & Sons, Inc.
18
Network Fundamentals: Questions
1.
2.
3.
4.
5.
6.
Describe the basic functions of business networks.
Name three different types of network configurations.
Why would a company choose to use a WAN rather than a LAN?
What is the difference between an intranet and an extranet?
How does a virtual private network (VPN) provide security?
How do investments in network infrastructure impact an
organization?
7. How is an SD-WAN different from a WAN?
8. What are three different transmission media used in wired
networks?
Copyright ©2021 John Wiley & Sons, Inc.
19
Learning Objectives (2 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
20
Differences Between 4G and 5G Networks
4G networks were
introduced in 2010 and
deliver up to 10 Mbps.
The latest version of 4G is
4G LTE-A that can
theoretically deliver
speeds from 300 Mbps to
1 Gbps, with an average
speed of 15–50 Mbps.
5G networks offer huge
gains in both speed and
capacity over existing 4G
networks. 5G are
currently being offered in
limited geographical areas
that will steadily expand
and are up to ten times
faster than 4G LTE-A—
topping out at 10 Gbps.
Copyright ©2021 John Wiley & Sons, Inc.
21
Advantages and Disadvantages of 5G
Advantages
•
•
•
Disadvantages
Speed and capacity: larger
channels, higher speeds,
larger packets of data,
exponentially faster
response time and connect
many devices from a single
location
Short term: Create new
jobs
Longer term: Create
entirely new markets and
economic opportunities
•
•
•
Expensive infrastructure
Unresolved privacy and
security issues surrounding
5G
Health risks caused by its
use of extremely high
frequency (1 Billion cycles
per second) microwaves
Copyright ©2021 John Wiley & Sons, Inc.
22
Growing Need for 5G
• Internet of Things (IoT) is creating billions of new
devices for remote sensing, telemetry, and control
applications
• To be efficient, these machine-to-machine connections
will need the significantly faster speeds of 5G
• Work is already underway on the development of 6G
mobile telephone networks.
Copyright ©2021 John Wiley & Sons, Inc.
23
Wireless Network Standards
• IEEE 802.11ax also known as “high-efficiency wireless,” 802.11ax
was released in September 2019.
• IEEE 802.11ac utilizes dual-band wireless technology and
support simultaneous connections on both the 2.4 and 5 GHz
Wi-Fi bands.
• IEEE 802.11a runs on 12 channels in the 5-GHz spectrum in
North America, which reduces interference issues
• IEEE 802.11n improves upon prior 802.11 standards by adding
multiple-input multiple-output (MIMO) and newer features.
• IEEE 802.11g runs on three channels in the 2.4-GHz spectrum,
but at the speed of 802.11a.
• IEEE 802.11b shares spectrum with 2.4-GHz cordless phones,
microwave ovens, and many Bluetooth products.
Copyright ©2021 John Wiley & Sons, Inc.
24
Wireless Connectivity (1 of 2)
• Wi-Fi connects computers and smart devices to a
network via a single access point like a router.
• Wi-Fi hotspot is a wireless access point that provides
Internet access to mobile devices like laptops and
smartphones.
• WiMAX stands for worldwide interoperability for
microwave access and was developed to overcome the
short-range limitations of Wi-Fi.
Copyright ©2021 John Wiley & Sons, Inc.
25
Wireless Connectivity (2 of 2)
• LTE is the fastest and most consistent cellular
technology.
• LTE-A is a version of LTE cellular technology that more
closely follows the IEEE 802.11ac wireless network
standard.
• Wireless local area network (WLAN): typically extends
an existing wired LAN by attaching a wireless AP to a
wired network.
• Wireless wide area network (WWAN): has a wider
range than a local area network and can cover a group
of buildings.
Copyright ©2021 John Wiley & Sons, Inc.
26
Copyright ©2021 John Wiley & Sons, Inc.
27
Copyright ©2021 John Wiley & Sons, Inc.
28
Wireless Networks Use Different
Transmission Media
• Wireless transmission media can be used when
installing wiring is impossible or impractical.
• Example of wireless transmission media:
• Radio waves
• Microwaves
• Infrared
• Bluetooth
• Communication satellites
• Mashup is a general term referring to the integration of
two or more technologies
Copyright ©2021 John Wiley & Sons, Inc.
29
Wireless
Network
Technologies
• Internet Protocol is a rule or procedure for
transmitting data between computers and
other electronic devices.
• IP address is a unique identifier for each
device that communicates with a network
that identifies and locates each device. An
IP address is comparable to a telephone
number or home address.
Copyright ©2021 John Wiley & Sons, Inc.
30
TCP/IP
• TCP/IP is a four-layer suite that consists of:
• Application Layer
• Transport Layer
• Network (Internet) Layer
• Data Link (Network Interface) Layer
Copyright ©2021 John Wiley & Sons, Inc.
31
Application Program Interfaces and
Operating Systems
• Application Program Interface (API) consists of a set of
functions, commands, and protocols used by
programmers for OS–interactivity without having to
write a program from scratch.
• Can be automated for simplified usability
o Facebook
o Amazon
o
Copyright ©2021 John Wiley & Sons, Inc.
32
Automated API
• REST API the Representational State API is used to
build Web services that are lightweight, maintainable
and scalable. It provides a way to access resources in a
particular environment.
• List Skills API has a bidirectional interface that updates
lists each time users make Shopping list or To Do
requests.
Copyright ©2021 John Wiley & Sons, Inc.
33
Copyright ©2021 John Wiley & Sons, Inc.
34
Wireless Networks and Standards:
Questions
1. Why has IPv6 become increasingly important?
2.
3.
4.
5.
6.
7.
8.
What is the difference between IPv4 and Ipv6?
What is the purpose of an IP address?
What is an API and what are the benefits of using an API?
What is the difference between 4G and 5G?
Why is 5G not widely available?
What benefits does a 5G network offer businesses?
What is the difference between circuit switching and packet
switching?
Copyright ©2021 John Wiley & Sons, Inc.
35
Learning Objectives (3 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
36
Mobile Network Drivers
Copyright ©2021 John Wiley & Sons, Inc.
37
Benefits of Mobile Computing
• Connectivity—employees can stay connected to all
sources, at all times.
• Social Engagement—employees can interact with
customers, vendors, suppliers, partners, and each
other via the Internet to create beneficial relationships.
• Personalization—mobile computing can be tailored to
individual needs of all users to enhance the online
experience.
Copyright ©2021 John Wiley & Sons, Inc.
38
Mobile Technologies: QR Code
• Quick Response (QR) Code is a two-dimensional
barcode usually in a square structure with information
stored in a black and white geometric symbol
• Advantages: negligible cost
and heightened security
features.
• Disadvantage: it must be
read individually
Copyright ©2021 John Wiley & Sons, Inc.
39
Mobile Technologies: RFID
• Radio frequency identification (RFID) allows users to
track inventory and assets by using wireless contactless
radio waves
• Two types of RFID tags:
• Passive tags have a range of approximately 3–5 meters
and can read at a rate of 10 or more times a second.
• Active tags have a range of approximately 100 meters.
They have an internal power source that gives them
their longer range but limits their life span.
Copyright ©2021 John Wiley & Sons, Inc.
40
Mobile Technologies: NFC
• Near-field communication (NFC) enables two devices
within close proximity to establish a communication
channel and transfer data through radio waves
• Some effective applications include:
• Mobile payments using
the Apple iWatch
• The self-healthcare industry
• Pay for goods by waving an
NFC-enabled credit card
Copyright ©2021 John Wiley & Sons, Inc.
41
The
Internet of
Things
Internet of Things (IoT) is the network of
physical objects or “things” embedded
with electronics, software, sensors, and
network connectivity, that enables these
objects to collect and exchange data.
Copyright ©2021 John Wiley & Sons, Inc.
42
Factors Driving IoT
• Development of IPv6
• Introduction of 5G networks
• More widely available broadband Internet
• Lower cost of connecting
• Overwhelming popularity of the smartphone
• Development of more smart devices with Wi-Fi
capabilities
• Development of embedded sensors
Copyright ©2021 John Wiley & Sons, Inc.
43
Copyright ©2021 John Wiley & Sons, Inc.
44
The Growth of IoT
The popularity and use
of IoT is growing. In
1990, there were
300,000 connected IoT
devices, in 2019 there
were 14.2 billion, and
it is predicted that the
number of IoT
connections will grow
to 25 billion in 2021.
Copyright ©2021 John Wiley & Sons, Inc.
45
Advantages of IoT
• Monitoring performance, quality, and reliability of
products and services
• Gaining insight into potential new products and service
• Support sales
• Better understand product use
• Remote troubleshooting of products
• Deliver revenue-generating post-sales service
• More efficiently deliver post-sales services
Copyright ©2021 John Wiley & Sons, Inc.
46
Disadvantages of IoT
• Network security
• Data privacy
• Data analysis capabilities
• Data collection capabilities
• Realistic efficiency opportunities
• Realistic new revenue opportunities
• Cost
Copyright ©2021 John Wiley & Sons, Inc.
47
Edge
Computing
Edge computing is
a new networking
technology that
brings the data
closer to where it
is being used and
is being enabled
by the new, faster
5G networks.
Copyright ©2021 John Wiley & Sons, Inc.
48
Choosing Mobile Computing Solutions
Copyright ©2021 John Wiley & Sons, Inc.
49
Networks Support Communication,
Search, Collaboration and Relationships
• The other four basic business functions that networks
support are communication, search, collaboration, and
relationships.
• Communicating over wired, wireless or mobile
networks helps businesses search for information that
helps them collaborate to get work done and develop
business relationships.
Copyright ©2021 John Wiley & Sons, Inc.
50
Mobile Computing and the Internet of
Things (IoT): Questions
1.
What are the factors driving mobile computing?
2.
Why is mobile global traffic increasing?
3.
How is NFC different from RFID?
4.
What are the two components of a wireless network infrastructure?
5.
What are three types of wireless network transmission media?
6.
What factors should be considered when evaluating mobile networks?
7.
What types of industry sectors are using IoT?
8.
How does a network help communication, collaboration and relationships
between companies and their vendors?
9.
What is edge computing and what networking problems does it address?
10. How can a Mindmap be used to structure a problem?
Copyright ©2021 John Wiley & Sons, Inc.
51
Learning Objectives (4 of 4)
Network
Fundamentals
Network
Quality of
Service
Wireless
Networks and
Standards
Mobile
Computing and
the Internet of
Things (IoT)
Copyright ©2021 John Wiley & Sons, Inc.
52
Network Quality of Service
• Quality of Service (QoS) is a network’s ability to achieve
maximum bandwidth, optimize network performance elements
like latency, error rate, uptime and downtime and control and
manage network resources by setting priorities for specific types
of data on the network
• The principles of QoS can be applied in two ways:
• Prioritize traffic
• Throttle traffic
• Traffic shaping delays the flow of less important network traffic,
such as bulk data transfers and Peer-to-Peer (P2P) file-sharing
programs, including BitTorrent traffic
Copyright ©2021 John Wiley & Sons, Inc.
53
The Net Neutrality
• Net neutrality essentially ensures equal opportunity
for Internet speeds and access to website with no
unfair fast or slow lanes and no blocking of anything
that’s legal on your phone, computer, or tablet.
• Unless Congress passes legislation for or against Net
Neutrality, things could drag on for a long time with
either side appealing to the U.S. Supreme Court or
asking the DC Circuit Court of Appeals for an “en banc”
hearing that allows the full panel of justices to hear the
case.
Copyright ©2021 John Wiley & Sons, Inc.
54
Quality of Service Models
• The Integration Services Model (IntServ) is based on
measuring how data flows through a network from
source to destination and the resource needs of all
routers in the network.
• The integrated services model offers two classes of
service—guaranteed and controlled load.
• The Differentiated Services Model (DiffServ) was
designed by the Internet Engineering Task Force (IETF).
• By marking the class of each packet directly on the
packet, DiffServ eliminates the need for a signaling
protocol that tells the routers which flows require special
QoS treatment.
Copyright ©2021 John Wiley & Sons, Inc.
55
Network Quality of Service: Questions
• Why has group work becoming more challenging?
• What might limit the use of face-to-face brainstorming?
• How can online brainstorming tools overcome those limits?
• List ways in which virtual collaboration can be used in business.
• What devices do you have that take advantage of the IoT? Describe how they
impact the way that you live and work.
• What is driving the rise of the IoT?
• What is the main concern that organizations have about the IoT?
• Do you think the advantages outweigh the disadvantages of the IoT? Explain.
• Where do you stand on the issue of Net Neutrality?
• How do you think the state level Net Neutrality regulations are going to
impact ISPs?
Copyright ©2021 John Wiley & Sons, Inc.
56
Copyright
Copyright © 2021 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Act without the express written permission of the
copyright owner is unlawful. Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up
copies for his/her own use only and not for distribution or resale. The Publisher assumes
no responsibility for errors, omissions, or damages, caused by the use of these programs
or from the use of the information contained herein.
Copyright ©2021 John Wiley & Sons, Inc.
57
Information Technology
for Management
On-Demand Strategies for Performance,
Growth and Sustainability
Eleventh Edition
Information Technology
for Management
On-Demand Strategies for Performance,
Growth and Sustainability
Eleventh Edition
EFRA IM T U RB AN
C A ROL P OLLAR D
Appalachian State University
GREGORY W OOD
Canisius College
VP AND EDITORIAL DIRECTOR
EXECUTIVE EDITOR
EDITORIAL ASSISTANT
EDITORIAL MANAGER
CONTENT MANAGEMENT DIRECTOR
CONTENT MANAGER
SENIOR CONTENT SPECIALIST
PRODUCTION EDITOR
PHOTO RESEARCHER
COVER PHOTO CREDIT
Mike McDonald
Lise Johnson
Ethan Lipson
Judy Howarth
Lisa Wojcik
Nichole Urban
Nicole Repasky
Loganathan Kandan
Billy Ray
© Ditty_about_summer/Shutterstock
This book was set in 9.5/12.5 pt Source Sans Pro by SPi Global and printed and bound by Strategic
Content Imaging.
Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding
for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a
global effort to address the environmental, social, economic, and ethical challenges we face in our
business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable
support. For more information, please visit our website: www.wiley.com/go/citizenship.
Copyright © 2018, 2015, 2013, 2011, 2010 John Wiley & Sons, Inc. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy
fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923 (Web site: www.
copyright.com). Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax
(201) 748-6008, or online at: www.wiley.com/go/permissions.
Evaluation copies are provided to qualified academics and professionals for review purposes only,
for use in their courses during the next academic year. These copies are licensed and may not be sold
or transferred to a third party. Upon completion of the review period, please return the evaluation
copy to Wiley. Return instructions and a free of charge return shipping label are available at: www.
wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please
accept this book as your complimentary desk copy. Outside of the United States, please contact your
local sales representative.
ISBN: 978-1-118-89079-0 (PBK)
ISBN: 978-1-119-39783-0 (EVALC)
Library of Congress Cataloging in Publication Data:
Names: Turban, Efraim, author. | Pollard, Carol (Carol E.), author. | Wood,
Gregory R., author.
Title: Information technology for management : on-demand strategies for
performance, growth and sustainability / Efraim Turban, Carol Pollard,
Gregory R. Wood.
Description: 11th edition. | Hoboken, NJ : John Wiley & Sons, 2018. |
Includes bibliographical references and index. |
Identifiers: LCCN 2017037711 (print) | LCCN 2017046158 (ebook) | ISBN
9781118890868 (epub) | ISBN 9781119172390 (pdf) | ISBN 9781118890790 (pbk.)
Subjects: LCSH: Management information systems.
Classification: LCC T58.6 (ebook) | LCC T58.6 .T765 2017 (print) | DDC
658.4/038011—dc23
LC record available at
The inside back cover will contain printing identification and country of origin if omitted from this
page. In addition, if the ISBN on the back cover differs from the ISBN on this page, the one on the
back cover is correct.
Brief Contents
PREFACE
8 Retail, E-commerce, and Mobile Commerce
Technology 240
xiii
ACKNOWLEDGMENTS
xviii
PART 1 Reshaping Enterprises and Consumers
in the On-Demand Economy
1
Disruptive IT Impacts Companies,
Competition, and Careers 1
2
Information Systems, IT Architecture, Data
Governance, and Cloud Computing 25
3
Data Management, Data Analytics,
and Business Intelligence 65
4
5
Networks, Collaborative Technology,
and the Internet of Things 101
Cybersecurity and Risk Management
Technology 127
PART 2 Winning, Engaging, and Retaining
Consumers for Growth
6
7
Search, Semantic, and Recommendation
Technology 165
Web 2.0 and Social Technology
199
PART 3 Optimizing Performance, Processes,
and Productivity
9 Functional Business Systems 269
10
Enterprise Systems 300
11
Data Visualization and Geographic
Information Systems 331
PART 4 Managing Business Relationships,
Projects, and Ethical Responsibilities
12
IT Strategy, Sourcing, and Strategic
Technology Trends 354
13
Systems Development and Project
Management 385
14
IT Ethics, Privacy, and Sustainability 417
GLOSSARY 443
ORGANIZATION INDEX
NAME INDEX 450
SUBJECT INDEX 451
448
v
Contents
PREFACE
xiii
ACKNOWLEDGMENTS
xviii
PART 1 Reshaping Enterprises
and Consumers in the On-Demand
Economy
1 Disruptive IT Impacts Companies,
Competition, and Careers
1
Case 1.1 Opening Case: Uber and Airbnb Revolutionize
Business Models in the On-Demand Economy 3
1.1
Doing Business in the On-Demand Economy 4
Growth of the On-Demand Economy 5
Digital Business Models 6
IT’s Role in the On-Demand Economy 7
IT Business Objectives 8
1.2 Business Process Improvement and Competitive
Advantage 8
What Is a Business Process? 9
Improving Business Processes 9
Don’t Automate, Obliterate! 10
Gaining a Competitive Advantage 11
Software Support for BPM 13
1.3 IT Innovation and Disruption 13
Social–Mobile–Analytics–Cloud (SMAC) Model 13
Technology Mega Trends 14
Lessons Learned from Companies Using Disruptive
Technologies 16
1.4 IT and You 17
On-Demand Workers 17
IT Adds Value to Your Performance and Career 19
Becoming an Informed IT User 21
Case 1.2 Business Case: The Internet of Things Comes
to the NFL 23
Case 1.3 Video Case: Knowing More and Doing More
2 Information Systems,
24
IT Architecture, Data Governance,
and Cloud Computing 25
Case 2.1 Opening Case: Detoxing Location-Based
Advertising Data at MEDIATA 27
2.1
vi
IS Concepts and Classification
28
Components of an IS 29
Data, Information, Knowledge, and Wisdom 30
Types of ISs 31
Transaction Processing System (TPS) 32
Management Information System (MIS) 33
Decision Support System (DSS) 34
Executive Information System (EIS) 35
ISS Exist within Corporate Culture 36
2.2 IT Infrastructure, IT Architecture, and Enterprise
Architecture 37
EA Helps to Maintain Sustainability 38
Developing an Enterprise Architecture (EA) 41
2.3 Information Management and Data
Governance 42
Information Management Harnesses
Scattered Data 43
Reasons for Information Deficiencies 43
Factors Driving the Shift from Silos to Sharing
and Collaboration 45
Business Benefits of Information Management 45
Data Governance: Maintaining Data Quality
and Cost Control 46
2.4 Data Centers and Cloud Computing 48
Data Centers 48
Integrating Data to Combat Data Chaos 50
Cloud Computing 52
Selecting a Cloud Vendor 52
Cloud Infrastructure 54
Issues in Moving Workloads from the Enterprise
to the Cloud 54
2.5 Cloud Services and Virtualization 55
Anything as a Service (XAAS) Models 55
Going Cloud 58
Virtualization and Virtual Machines 58
Case 2.2 Business Case: Data Chaos Creates Risk 62
Case 2.3 Video Case: Cloud Computing at Coca-Cola Is
Changing Everything 63
3 Data Management, Data Analytics,
and Business Intelligence
65
Case 3.1 Opening Case: Coca-Cola Strategically Manages
Data to Retain Customers and Reduce Costs 66
3.1
Data Management and Database Technologies
Database Management Systems and SQL 69
DBMS and Data Warehousing Vendors
Respond to Latest Data Demands 72
69
CONT E N TS
3.2
Centralized and Distributed Database
Architectures 73
Garbage In, Garbage Out 75
Data Ownership and Organizational Politics 76
Data Life Cycle and Data Principles 77
Master Data and Master Data Management 78
3.3 Data Warehouses 79
Procedures to Prepare EDW Data for Analytics 80
Building a Data Warehouse 80
Real-Time Support from an Active Data
Warehouse 81
3.4 Big Data Analytics and Data Discovery 83
Human Expertise and Judgment are Needed 85
Data and Text Mining 88
Creating Business Value 88
Text Analytics Procedure 90
Analytics Vendor Rankings 90
3.5 Business Intelligence and
Electronic Records Management 91
Business Benefits of BI 92
Common Challenges: Data Selection
and Quality 92
Aligning BI Strategy with Business Strategy 92
BI Architecture and Analytics 93
Electronic Records Management 94
Legal Duty to Retain Business Records 94
ERM Best Practices 94
ERM Benefits 95
ERM for Disaster Recovery,
Business Continuity, and Compliance 95
Case 3.2 Business Case: Big Data Analytics is the “Secret
Sauce” for Revitalizing McDonald’s 98
Comparing 3G, 4G, 4G LTE, and 5G Network
Standards 110
Circuit versus Packet Switching 111
Application Program Interfaces and Operating
Systems 111
4.3 Mobile Networks and Near-Field
Communication 113
Increase in Mobile Network Traffic and Users 114
Higher Demand for High-Capacity Mobile
Networks 115
Mobile Infrastructure 115
Two Components of Wireless Infrastructure 116
Business Use of Near-Field Communication 117
Choosing Mobile Network Solutions 118
4.4 Collaborative Technologies and the Internet
of Things 119
Virtual Collaboration 120
Group Work and Decision Processes 120
The Internet of Things (IoT) 121
IoT Sensors, Smart Meters, and the Smart Grid 121
Case 4.2 Business Case: Google Maps API for
Business 125
Case 4.3 Video Case: Small Island Telecom Company
Goes Global 126
5 Cybersecurity and Risk
Management Technology
5.1
4 Networks, Collaborative
Technology, and the Internet
of Things 101
4.1
4.2
Network Fundamentals 104
Network Types 104
Intranets, Extranets, and Virtual Private
Networks 105
Network Terminology 105
Functions Supported by Business Networks
Quality of Service 107
Internet Protocols (IP), APIs, and Network
Capabilities 109
106
127
Case 5.1 Opening Case: Yahoo Wins the Gold and Silver
Medal for the Worst Hacks in History! 129
Case 3.3 Video Case: Verizon Improves Its
Customer Experience with Data Driven
Decision-Making 99
Case 4.1 Opening Case: Sony Builds an IPv6 Network
to Fortify Competitive Edge 102
vi i
5.2
5.3
The Face and Future of Cyberthreats 130
Intentional Threats 132
Unintentional Threats 132
Hacking 133
Cyber Social Engineering and Other Related
Web-Based Threats 134
Denial-of-Service 137
Insider and Privilege Misuse 137
Physical Theft or Loss 138
Miscellaneous Errors 138
New Attack Vectors 138
Cyberattack Targets and Consequences 139
“High-Profile” and “Under-the-Radar” Attacks 139
Critical Infrastructure Attacks 140
Theft of Intellectual Property 141
Identity Theft 142
Bring Your Own Device 142
Social Media Attacks 144
Cyber Risk Management 146
IT Defenses 146
Business Continuity Planning 149
Government Regulations 149
viii
CO NT EN TS
7 Web 2.0 and Social
5.4
Defending Against Fraud 150
Occupational Fraud Prevention
and Detection 151
General Controls 152
Internal Controls 153
Cyber Defense Strategies 153
Auditing Information Systems 155
5.5 Frameworks, Standards, and Models 155
Risk Management and IT Governance
Frameworks 155
Industry Standards 157
IT Security Defense-In-Depth Model 157
Case 5.2 Business Case: Lax Security at LinkedIn
Exposed 161
Technology
199
Case 7.1 Opening Case: Social Customer Service Takes
Off at KLM 200
7.1
Using Search Technology for Business
Success 168
How Search Engines Work 168
Web Directories 168
How Crawler Search Engines Work 169
Why Search Is Important for Business 172
6.2 Organic Search and Search Engine
Optimization 178
Strategies for Search Engine Optimization 178
Content and Inbound Marketing 180
Black Hat versus White Hat SEO: Ethical Issues
in Search Engine Optimization 181
6.3 Pay-Per-Click and Paid Search Strategies 182
Creating a PPC Advertising Campaign 182
Metrics for Paid Search Advertising 184
6.4 A Search for Meaning—Semantic Technology 184
What Is the Semantic Web? 185
The Language(s) of Web 3.0 185
Semantic Web and Semantic Search 186
Semantic Web for Business 187
6.5 Recommendation Engines 188
Recommendation Filters 189
Case 6.2 Business Case: Deciding What to Watch—Video
Recommendations at Netflix 195
Web 2.0—The Social Web 201
The Constantly Changing Web 201
Invention of the World Wide Web 202
A Platform for Services and Social Interaction 202
Emergence of Social Applications, Networks,
and Services 203
Why Managers Should Understand Web
Technology 205
Communicating on the Web 206
Social Media Applications and Services 207
Social Media Is More than Facebook, YouTube, and
Twitter 207
With Web 2.0, Markets are Conversations 209
7.2 Social Networking Services and Communities 210
The Power of the Crowd 212
Crowdfunding 212
Social Networking Services 213
Facebook Dominates Social Networking 214
Google Takes on Facebook with G+ 216
Be in the Now with Snapchat 217
And Now for Something Different: Second Life 218
Private Social Networks 219
Future of Social Networking Systems 220
7.3 Engaging Consumers with Blogs and
Microblogs 220
What Is the Purpose of a Blog? 220
Blogging and Public Relations 222
Reading and Subscribing to Blogs 222
Blogging Platforms 222
Microblogs 223
Twitter 223
Tumblr Blogs 225
7.4 Mashups, Social Metrics, and
Monitoring Tools 226
What Makes a Mashup Social 226
RSS Technology 227
Social Monitoring Services 227
7.5 Enterprise 2.0: Workplace Collaboration and
Knowledge Sharing 229
Tools for Meetings and Discussions 230
Social Tools for Information Retrieval and
Knowledge Sharing 230
Social Bookmarking Tools 231
Content Creation and Sharing 232
Case 7.2 Business Case: Facebook Helps Songkick Rock
the Ticket Sales Industry 236
Case 6.3 Video Case: Power Searching with
Google 196
Case 7.3 Business Case: AT&T’s “It Can Wait” Campaign
against Distracted Driving 237
Case 5.3 Video Case: Botnets, Malware Security, and
Capturing Cybercriminals 163
PART 2 Winning, Engaging, and
Retaining Consumers for Growth
6 Search, Semantic, and
Recommendation Technology
165
Case 6.1 Opening Case: Mint.com Uses Search
Technology to Rank Above Established
Competitors 166
6.1
CONT E N TS
8 Retail, E-commerce, and Mobile
Commerce Technology
240
Case 8.1 Opening Case: Macy’s Races Ahead with Mobile
Retail Strategies 241
8.1
Retailing Technology 243
Keeping Up with Consumer Demands and
Behavior 243
The Omni-Channel Retailing Concept 244
8.2 Business-to-Consumer (B2C) E-commerce 246
Online Banking 246
International and Multiple-Currency
Banking 246
Online Recruiting 246
Issues in Online Retailing 250
Online Business and Marketing Planning 250
8.3 Business-to-Business (B2B) E-commerce and
E-procurement 251
Sell-Side Marketplaces 251
E-Sourcing 252
E-Procurement 252
Electronic Data Interchange (EDI) Systems 253
Public and Private Exchanges 253
8.4 Mobile Commerce 253
Information: Competitive Advantage in Mobile
Commerce 255
Mobile Entertainment 258
Hotel Services and Travel Go Wireless 259
Mobile Social Networking 259
8.5 Mobile Transactions and Financial Services 260
Mobile Payment Systems 260
Mobile Banking and Financial Services 262
Short Codes 263
Security Issues 263
Case 8.2 Business Case: Chegg’s Mobile Strategy 266
Case 8.3 Video Case: Searching with Pictures
Using MVS 267
PART 3 Optimizing Performance,
Processes, and Productivity
9 Functional Business Systems
269
Case 9.1 Opening Case: Ducati Redesigns Its
Operations 271
9.1
Business Management Systems and Functional
Business Systems 272
Business Management Systems (BMSs) 273
Management Levels 273
Business Functions vs. Cross-Functional Business
Processes 274
Transaction Processing Systems 275
ix
9.2
Production and Operations Management
Systems 277
Transportation Management Systems 278
Logistics Management 278
Inventory Control Systems 279
Computer-Integrated Manufacturing and
Manufacturing Execution Systems 281
9.3 Sales and Marketing Systems 282
Data-Driven Marketing 284
Sales and Distribution Channels 284
Social Media Customer Service 284
Marketing Management 285
9.4 Accounting, Finance, and Regulatory Systems 286
Financial Disclosure: Reporting and
Compliance 286
Fraud Prevention and Detection 289
Auditing Information Systems 291
Financial Planning and Budgeting 291
9.5 Human Resource Systems, Compliance, and
Ethics 293
HR Information Systems 293
Management and Employee Development 295
HR Planning, Control, and Management 295
Case 9.2 Business Case: HSBC Combats Fraud in Splitsecond Decisions 297
Case 9.3 Video Case: United Rentals Optimizes Its
Workforce with Human Capital Management
10 Enterprise Systems
298
300
Case 10.1 Opening Case: 3D Printing Drives the “AlwaysOn” Supply Chain 301
10.1 Enterprise Systems 303
Implementation Challenges of Enterprise
Systems 305
Investing in Enterprise Systems 305
Implementation of Best Practices 306
Enterprise Systems Insights 307
10.2 Enterprise Resource Planning (ERP) 307
Brief History of ERP 308
Technology Perspective 308
Achieving ERP Success 311
10.3 Supply Chain Management Systems 313
Managing the Flow of Materials, Data,
and Money 315
Order Fulfillment and Logistics 315
Steps in the Order Fulfillment Process 315
Innovations Driving Supply Chain Strategic
Priorities 316
10.4 Customer Relationship Management Systems 319
How are CRM Apps Different from ERP? Why are they
Different? 319
CRM Technology Perspective 320
x
CONT ENTS
Customer Acquisition and Retention 320
CRM for a Competitive Edge 320
Common CRM Mistakes: How to Avoid
Them 321
Justifying CRM 322
10.5 Enterprise Social Platforms 323
Growth of Enterprise Social Investments
and Markets 323
Sharepoint 324
Oracle’s Social Network 326
Jive 326
Chatter 326
Case 10.2 Business Case: Lowe’s Fresh Approach to
Supply Chain Management 328
Case 10.3 Video Case: Procter & Gamble: Creating
Conversations in the Cloud with 4.8 Billion
Consumers 329
11 Data Visualization and Geographic
Information Systems
331
Case 11.1 Opening Case: Safeway and PepsiCo
Collaborate to Reduce Stock Outages using Data
Visualization 332
11.1 Data Visualization and Learning 334
Learning, Exploration, and Discovery with
Visualization 336
Data Discovery Market Separates from the
BI Market 336
How Is Data Visualization Used in Business? 340
Data Visualization Tools 341
11.2 Enterprise Data Mashups 342
Mashup Architecture 343
Why Do Business Users Need Data Mashup
Technology? 344
Enterprise Mashup Technology 344
11.3 Digital Dashboards 345
Dashboards are Real Time 347
How Operational and Strategic
Dashboards Work 348
Benefits of Digital Dashboards 348
11.4 Geographic Information Systems and
Geospatial Data 349
Geocoding 350
GIS Is Not Your Grandfather’s Map 350
Infrastructure and Location-Aware Collection
of Geospatial Data 350
Applying GIS in Business 351
Case 11.2 Visualization Case: Are You Ready for
Football? 353
Case 11.3 Video Case: The Beauty of Data
Visualization—Data Detective 353
PART 4 Managing Business
Relationships, Projects, and Ethical
Responsibilities
12 IT Strategy, Sourcing, and Strategic
Technology Trends
354
Case 12.1 Opening Case: Intel Reaps Rewards from
Sustainable IT Strategy 355
12.1 IT Strategic Planning 357
Value Drivers 358
IT Strategic Plan Objectives 358
IT and Business Disconnects 359
Corporate and IT Governance 359
Reactive Approach to IT Investments Will Fail 359
IT Strategic Planning Process 359
12.2 Aligning IT with Business Objectives 362
Achieving and Sustaining a Competitive
Advantage 364
12.3 IT Sourcing Strategies 367
Sourcing and Cloud Services 368
Factors Driving Outsourcing 369
Outsourcing Risks and Hidden Costs 370
Offshoring 370
Outsourcing Life Cycle 371
Managing IT Vendor Relationships 373
Contracts: Get Everything in Writing 373
12.4 Balanced Scorecard 374
The Balanced Scorecard 374
Using the Balance Scorecard 375
Applying the BSC 377
12.5 Strategic Technology Trends 378
Strategic Technology Scanning 380
Finding Strategic Technologies 380
Case 12.2 Business Case: Cisco IT Improves Strategic
Vendor Management 382
Case 12.3 Data Analysis: Third-Party versus CompanyOwned Offshoring 383
13 Systems Development and Project
Management
385
Case 13.1 Opening Case: Denver International Airport
Learns from Mistakes Made in Failed BaggageHandling System Project 386
13.1 System Development Life Cycle 388
Stages of the SDLC 388
13.2 Systems Development Methodologies 391
Waterfall Model 391
Object-Oriented Analysis and Design 392
Agile Methodology 392
CONT E N TS
The DevOps Approach to Systems
Development 394
13.3 Project Management Fundamentals 395
What Is a Project? 396
Choosing Projects 396
The Triple Constraint 397
The Project Management Framework 397
13.4 Initiating, Planning, and Executing Projects 399
Project Initiation 400
Project Planning 400
Project Execution 403
13.5 Monitoring/Controlling and Closing
Projects 404
Project Monitoring and Controlling 404
Project Closing or Post Mortem 407
Why Projects Fail 408
IT Project Management Mistakes 410
Case 13.2 Business Case: Steve Jobs’ Shared Vision
Project Management Style 412
Case 13.3 Demo Case: Mavenlink Project Management
and Planning Software 413
14 IT Ethics, Privacy, and
Sustainability
417
Case 14.1 Opening Case: Lessons Learned: How Google
Glass Raised Risk and Privacy Challenges 418
14.1 IT Ethics 420
Ethical versus Unethical Behavior 420
Competing Responsibilities 423
14.2 Privacy and Civil Rights 424
Privacy and the New Privacy
Paradox 424
Social Media Recruiting 425
Legal Note: Civil Rights 426
Competing Legal Concerns 427
Financial Organizations Must Comply with Social
Media Guidelines 428
14.3 Technology Addictions and Focus
Management 430
Digital Distractions and Loss of Focus 430
Focus Management 430
14.4 ICT and Sustainable Development 432
Global Temperature Rising Too Much
Too Fast 432
IT and Global Warming 433
Technology to Transform Business and
Society 436
Next Wave of Disruption Will Be More
Disruptive 438
Case 14.2 Business Case: Android Auto and
CarPlay Keep Drivers Safe, Legal, and
Productive 439
Case 14.3 Video Case: IT Ethics in the
Workplace 440
GLOSSARY 443
ORGANIZATION INDEX
NAME INDEX 450
SUBJECT INDEX 451
448
xi
Preface
Information Technology for Management discusses a variety of
business strategies and explains how they rely on data, digital
technology, and mobile devices to support them in the ondemand economy. Our goal is to provide students from any
business discipline with a strong foundation for understanding the critical role that digital technology plays in enhancing
business sustainability, profitability, and growth and excel in
their careers. Enabling technologies discussed in this textbook
include the following:
has applied her innovative teaching and learning techniques to
create a stronger pedagogical focus and more engaging format
for the text.
• Performance Combining the latest capabilities in big data
analytics, reporting, collaboration, search, and digital communication helps enterprises be more agile and cuts costs to
optimize business performance and profitability.
Strong Pedagogical Approach To encourage improved learning outcomes, we employed a blended learning approach, in
which different types of delivery and learning methods, enabled
and supported by technology, are blended with traditional
learning methods. For example, case study and theoretical
content are presented visually, textually, and/or interactively
to enable different groups of students to use different learning
strategies in different combinations to fit their individual learning style and enhance their learning. Throughout the book,
content has been reorganized to improve development of the
topics and improve understanding and readability. A large
number of images that did not enhance understanding have
been removed and replaced with informative and interactive
figures and tables that better convey critical concepts.
• Growth Strategic technologies enable business to create
new core competencies, expand their markets, and move
into new markets to experience exponential growth in the
on-demand economy.
• Sustainability Cloud services are fundamental to sustaining business profitability and growth in today’s ondemand economy. They play a critical role in managing
projects and sourcing agreements, respecting personal privacy, encouraging social responsibility, and attracting and
engaging customers across multimedia channels to promote
sustainable business performance and growth.
In this 11th edition, students learn, explore, and understand
the importance of IT’s role in supporting the three essential
components of business performance improvement: technology,
business processes, and people.
What’s New in the
11th Edition?
In the 11th edition of IT for Management, we present and discuss concepts in a comprehensive yet easy-to-understand format by actively engaging students through a wide selection of
case studies, interactive figures, video animations, tech notes,
concept check questions, online and interactive exercises, and
critical thinking questions. We have enhanced the 11th edition
in the following ways:
New Author Dr. Carol Pollard, Professor of Computer Information Systems at the Walker College of Business and former
Executive Director of the Center for Applied Research in Emerging Technologies (CARET) at Appalachian State University in
North Carolina, has taken the helm for the 11th edition. Carol
Diverse Audience IT for Management is directed toward
undergraduate, introductory MBA courses, and Executive Education courses in Management Information Systems and General
Business programs. Concepts are explained in a straightforward
way, and interactive elements, tools, and techniques provide
tangible resources that appeal to all levels of students.
Leading-Edge Content Prior to and during the writing process, we consulted with a number of vendors, IT professionals,
and managers who are hands-on users of leading technologies,
to learn about their IT/business successes, challenges, experiences, and recommendations. To integrate the feedback of
these business and IT professionals, new or updated chapter
opening and closing cases have been added to many of the
chapters along with the addition of relevant, leading-edge
content in the body of the chapters.
New Technologies and Expanded Topics New to this edition
are the IT framework, business process reengineering, geocoding, systems developments methodologies, including Waterfall, object-oriented analysis, Agile and DevOps, advances
in Search Technology, the growth of Mobile Commerce and
Mobile Payment Systems, the Always-On Supply Chain, and
the Project Management framework. In addition, with more
purchases and transactions starting online and attention being
a scarce resource, students learn how search, semantic, and
recommendation technologies function to improve revenue.
Table P-1 provides a detailed list of new and expanded topics.
Useful Tools and Techniques New to this edition is a feature
we call the “IT Toolbox.” This involves the provision of a set of
useful tools or techniques relevant to chapter content. Collectively, these tools and techniques equip readers with a suite of
IT tools that will be useful in their university classes, workplace,
and personal life.
xiii
xiv
PR EFAC E
Engaging Students
to Assure Learning
• IT at Work boxes spotlight real-world cases and innovative uses of IT.
The 11th edition of Information Technology for Management
engages students with up-to-date coverage of the most important IT trends today. Over the years, this IT textbook has distinguished itself with an emphasis on illustrating the use of
cutting-edge business technologies for supporting and achieving managerial goals and objectives. The 11th edition continues this tradition with more interactive activities and analyses.
• Tech Note boxes explore topics such as “Key
Performance Indicators” and “Six Basic Systems
Development Guidelines.”
Real-World Case Studies Each chapter contains numerous
real-world examples illustrating how businesses use IT to increase
productivity, improve efficiency, enhance communication and
collaboration, and gain a competitive edge. Faculty will appreciate
a variety of options for reinforcing student learning that include
three different types of Case Studies (opening case, video case,
and business case), along with interactive figures and whiteboard
animations that provide a multimedia overview of each chapter.
Interactive Figures and Whiteboard Animations The unique
presentation of interactive figures and whiteboard animations facilitates reflection on the textual content of the book
and provides a clear path to understanding key concepts. The
whiteboard animations fit particularly well with the “flipping
the classroom” model and complement additional functionality and assets offered throughout the 11th edition. The interactive figures actively engage the students in their own learning
to effectively reinforce concepts.
• Definitions of Key Terms appear in the margins
throughout the book.
• Career Insight boxes highlight different jobs in the IT
for management field.
End-of-Chapter Activities At the end of each chapter,
features designed to assure student learning include the
following:
• Critical Thinking Questions are designed to facilitate
student discussion.
• Online and Interactive Exercises encourage students
to explore additional topics.
• Analyze and Decide questions help students apply IT
concepts to business decisions.
• Concept Questions test students’ comprehension of
each learning objective at the end of each chapter to
ensure that the students are clear on the concepts.
Students are provided with immediate feedback on
their performance.
Learning Aids Each chapter contains various learning aids,
which include the following:
Details of New and Enhanced
Features of the 11th Edition
• Learning Objectives are listed at the beginning of each
chapter to help students focus their efforts and alert
them to the important concepts that will be discussed.
The textbook consists of 14 chapters organized into four modules. All chapters have new or updated sections, as shown in
Table P-1.
TA BL E P- 1
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
1. Disruptive IT Impacts
Companies, Competition,
and Careers
• IT’s role in the on-demand economy
• Business process improvement
• Business process re-engineering
• SMAC model
• Nature of on-demand work
• Becoming an informed IT user
• Technology mega trends
• Uber
• Airbnb
• FitBit
• NFL
• Teradata
2. Information Systems, IT Architecture, Data Governance, and
Cloud Computing
• IS concepts and framework
• Information, knowledge, wisdom model
• Software-defined data center
• Mediata
• National Climatic Data center
• U.S. National Security Agency
• Apple
• Uber
• Slack
• Vanderbilt University Medical Center
• Coca-Cola
PRE FAC E
TA BLE P- 1
xv
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters (continued)
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
3. Data Management, Data
Analytics, and Business
Intelligence
• Dirty data costs and consequences
• Coca-Cola
• Data life cycle
• Capitol One
• Genomics and big data
• Travelocity
• Aligning business intelligence with business strategy
• First Wind
• Argo Corporation
• Walmart
• Infinity Insurance
• DoD and Homeland Security
• CarMax
• McDonald’s
• Verizon
4. Networks, Collaborative
Technology, and the
Internet of Things
• IPv6 protocol
• Sony
• Types of networks
• AT & T
• Network terminology
• Time-Warner
• Quality of service
• Amazon
• Net neutrality
• Warner Music
• Mobile networks and near-field communication
• Proctor & Gamble
• Internet of Things
• Walmart
• Ford
• Asda
• Unilever
• Caterpillar
• Santander
• Isle of Man
5. Cybersecurity and Risk
Management Technology
6. Search, Semantic, and Recommendation Technology
• Data breaches
• Yahoo
• Major sources of cyberthreats
• Global Payments, Inc.
• Classes of hackers
• Government of China
• Spear phishing
• Crimeware categories
• U.S. Chamber of Commerce
• Denial of service
• Brookings Institution
• KPMG data loss barometer
• Enterprise risk management framework
• Damballa
• Social search technologies
• Mint.com
• Personal assistant and voice search
• Mobile search and mobile SEO
• Microsoft
• On-page and off-page SEO factors
• Yahoo
• Updates to Google’s ranking algorithm
• Netflix
• Semantic search technologies
• Apple
• Amazon
• Diigo
• World Wide Web Consortium (W3C)
(continued)
xvi
PR EFAC E
TA BL E P- 1
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters (continued)
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
7. Web 2.0 and Social Technology
• Snapchat, the #2 social platform
• KLM Royal Dutch Airlines
• Social bookmarking
• Facebook, Inc.
• Social customer service moves from optional
to essential
• Myntra
• Role of APIs in development of new Web applications
and functionality
• Kickstarter.com
• The dominance of Facebook and the demise
of Google+
• Emerging virtual-world technology
• Snap, Inc.
• GoFundMe.com
• Oculus VR
• High Fidelity
• Social Mention
• Diigo
• Clipix
• Dropbox
8. Retail, E-commerce, and
Mobile Commerce Technology
• Direct and marketplace B2B ecommerce
• Macys Department Stores
• In-store retail technology
• Amazon.com
• Omni-channel retailing
• Ally Bank
• Growth of mobile commerce
• LinkedIn.com
• Growth of the mobile gaming market
• Alibaba.com
• Mobile payment methods
• Dell, Inc.
• Mobile visual search
• The Walt Disney Company
• PayPal, Inc.
• Chegg.com
9. Functional Business Systems
• Business management systems
• Ducati Motor Holding S.p.A.
• Cross-functional coordination and integration
of systems
• Office Depot
• Systems that support supply-chain management
• BAE Systems
• Social customer service
• eXtensible Business Reporting Language (XBRL)
• Schurman Fine Papers
• Adweek
• Salesforce.com
• HSBC Bank
• United Rentals
10. Enterprise Systems
• 3D printing impact on supply chain
• Organovo
• Selecting an ERP vendor
• Ferrari
• Factors for ERP success
• GE
• Order fulfillment
• Siemens
• Always-on supply chain
• Organic Valley Family of Farms
• Enterprise social platforms
• Boers & Co.
• Peters Ice Cream
• ScanSource
• Avanade
• Dillards
• FoxMeyer Drugs
• Joint Munitions Command
• Flower.com
• Red Robin
• Lowe’s
• Procter & Gamble
PR E FACE
TA BLE P- 1
xvii
Overview of New and Expanded Topics and Innovative Enterprises Discussed in the Chapters (continued)
Chapter
New and Expanded IT and Business Topics
Innovative Enterprises
11. Data Visualization and
Geographic Information
Systems
• Increasing reliance on data discovery
• Safeway
• Data visualization tools
• PepsiCo
• Enterprise data mashups
• IBM
• Geocoding
• ADP Corp.
• Department of Veterans Affairs
• General Motors
12. IT Strategy, Sourcing, and
Strategic Technology Trends
• Business–IT alignment
• Intel
• IT strategic planning
• Nestle Nespresso
• Porter’s competitive forces model
• Porter’s value chain model
• ESSA Academy
• Five-phase outsourcing life cycle
• Cisco
• IT sourcing strategies
• Citigroup
• Strategic technology trends
• Technology scanning
13. Systems Development and
Project Management
• SDLC stages
• Denver International Airport
• Systems development methodologies
• U.S. Census Bureau
• DevOps
• Apple
• Project management framework
• Mavenlink
• PM core and support knowledge areas
• Responsibility matrix
14. IT Ethics, Privacy, and
Sustainability
• Ethical vs. unethical behavior
• Privacy paradox
• Target
• Climate change
• Technology addiction
• SnapChat
• “People-first” approach to technology
• NASA
• Disruptive technologies
• Apple
Supplemental Materials
An extensive package of instructional materials is available
to support this 11th edition. These materials are accessible
from the book companion website at www.wiley.com/college/
turban.
• Instructor’s Manual The Instructor’s Manual presents
objectives from the text with additional information to make
them more appropriate and useful for the instructor. The
manual also includes practical applications of concepts,
case-study elaboration, answers to end-of-chapter questions, questions for review, questions for discussion, and
Internet exercises.
• Test Bank The test bank contains over 1,000 questions and problems (about 75 per chapter) consisting of
multiple-choice, short answer, fill-ins, and critical thinking/
essay questions.
• PowerPoint Presentation A series of slides designed
around the content of the text incorporates key points from
the text and illustrations where appropriate.
• Chapter Summary Whiteboard Animations A series of
video animations that summarize the content of each chapter
in an entertaining way to engage the students in grasping the
subject matter.
xviii
PR EFAC E
Acknowledgments
No book is produced through the sole efforts of its authors, and
this book is no exception. Many people contributed to its creation, both directly and indirectly, and we wish to acknowledge
their contributions.
Special thanks go to the team at John Wiley, particularly
Darren Lalonde, Emma Townsend-Merino, Ethan Lipson, and
Loganathan Kandan for their ongoing and encouraging editorial expertise and leadership. Their guidance, patience, humor,
and support during the development and production of this
most recent version of the textbook made the process much
easier. We couldn’t have done it without you!
Our sincere thanks also go to the following reviewers of the
11th edition. Their feedback, insights, and suggestions were
invaluable in ensuring the accuracy and readability of the book:
Joni Adkins, Northwest Missouri State University
Ahmad Al-Omari, Dakota State University
Rigoberto Chinchilla, Eastern Illinois University
Michael Donahue, Towson University
Samuel Elko, Seton Hill University
Robert Goble, Dallas Baptist University
Eileen Griffin, Canisius College
Binshan Lin, Louisiana State University in Shreveport
Thomas MacMullen, Eastern Illinois University
James Moore, Canisius College
Beverly S. Motich, Messiah College
Barin Nag, Towson University
Luis A. Otero, Inter-American University of Puerto Rico,
Metropolitan Campus
John Pearson, Southern Illinois University
Daniel Riding, Florida Institute of Technology
Josie Schneider, Columbia Southern University
Derek Sedlack, South University
Eric Weinstein, The University of La Verne
Patricia White, Columbia Southern University
Gene A. Wright, University of Wisconsin–Milwaukee
Many thanks also go to our dedicated graphic designers,
Kevin Hawley and Nathan Sherrill, without whose help we
would not have been able to create the innovative Whiteboard
Animations, and to Senior Photo Editor, Billy Ray, whose extensive and expert research into the images used in the textbook
greatly enhanced the overall “look” of this 11th edition.
Extra special thanks go to our families, friends, and colleagues for the enormous encouragement, support, and understanding they provided as we dedicated time and effort to
creating this new edition.
Finally, we dedicate the 11th edition of Information
Technology for Management to the Memory of Dr. Linda
Volonino, the driving force behind editions 7 through 10 of IT
for Management. Thank you Linda, for all your hard work in
providing the foundation for this latest edition of the textbook.
CAROL POLLARD
GREGORY WOOD
CHAPTER 1
Disruptive IT Impacts Companies,
Competition, and Careers
CHAPTE R O UT L INE
L E A R N I NG O BJE CTI VE S
Case 1.1 Opening Case: Uber, Airbnb, and the
On-Demand Economy
1.1 Doing Business in the On-Demand Economy
1.1 Describe how the on-demand economy is changing the way
that business is conducted.
1.2 Business Process Improvement and
Competitive Advantage
1.2 Explain the role of IT in business process improvement.
Understand the concepts of business process reengineering
and competitive advantage.
1.3 IT Innovation and Disruption
1.3 Describe innovating technologies and explain how they are
disrupting enterprises.
1.4 IT and You
1.4 Understand the value of being an “informed user” of IT and
the ways in which IT can add value to your career path and
performance in the on-demand economy.
Case 1.2 Business Case: The Internet of Things
Comes to the NFL
Case 1.3 Video Case: What Is the Value of Knowing
More and Doing More?
Introduction
The more digital technology advances, the more it is almost instantly integrated into our daily
lives. Many managers and entrepreneurs recognize the need to integrate digital technology
into their products and services. For example, it has been estimated that 78% of business
1
2
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
leaders expect their organizations to be a digital business by 2020. Outdated and complex
application architectures with a mix of interfaces can delay or prevent the release of new
products and services, and maintaining these obsolete systems absorbs large portions of the
information technology (IT) budget.
Companies such as Uber, Airbnb, Shyp, TaskRabbit, and other participants in the ondemand economy are leveraging IT to create exciting new business models and revolutionize the way workers, businesses, and customers interact and compete. Peter Hinssen, a
well-known business author, university lecturer, and digital consultant, described the change
in digital technology as follows:
Technology used to be nice. It used to be about making things a little bit better, a little
bit more efficient. But, technology stopped being nice: it’s disruptive. It’s changing our
business models, our consumer markets, our organizations. (MacIver, 2015)
As businesses continue to join the on-demand economy, IT professionals must constantly
scan for innovative new technologies to provide business value and help shape the future of
the business. For example, smart devices, mobile apps, sensors, and technology platforms—
along with increased customer demand for digital interactions and on-demand services—have
moved commerce in fresh new directions. We’ve all heard the phrase “there’s an app for that”
and that kind of consumer thinking is what drives the on-demand economy.
Business leaders today need to know what steps to take to get the most out of mobile,
social, cloud, big data, analytics, visualization technologies, and the Internet of Things (IoT) to
move their business forward and enable new on-demand business models. Faced with opportunities and challenges, managers need to know how to leverage IT earlier and more efficiently
than their competitors.
A goal of this book is to empower you to improve your use and management of IT at
work by raising your understanding of IT terminology, practices, and tools and developing
your IT skills to transform you into an informed IT user. Throughout this book, you will learn
how digital technology is transforming business and society in the on-demand economy as
the IT function takes on key strategic and operational roles that determine an enterprise’s
success or failure. You will also be provided with an in-depth look at IT trends that have
immediate and future capacity to influence products, services competition, and business
relationships. Along the way, we’ll describe many different ways in which IT is being used
and can be used in business and provide you with the some of the terminology, techniques
and tools that enable organizations to leverage IT to improve growth, performance, and
sustainability.
In this opening chapter, you will learn about the powerful impacts of digital technology
on people, business, government, entertainment, and society that are occurring in today’s ondemand economy. You will also discover how leading companies are deploying digital technology and changing their business models, business processes, customer experiences, and
ways of working. We will present examples of innovative products, services, and distribution
channels to help you understand the digital revolution that is currently shaping the future of
business, the economy and society and changing management careers. And, we’ll explain why
IT is important to you and how becoming an “informed user” of IT will add significant value to
your career and overall quality of life.
Introduction 3
Case 1.1 Opening Case
NICOLAS MAETERLINCK / Stringer /
Getty Images
THE ON-DEMAND BUSINESS FRAMEWORK
CORE ON-DEMAND
SERVICES
CONSUMER
TECHNOLOGY
Logistics Management
Offline Services Move Online
Vendor Management
Interface Layer
Ubiquitous Connectivity
Mobile Adoption
App Marketplace
COMPLIMENTARY
RESOURCES
CONSUMER
BEHAVIOR
Payment Systems
Cloud Services
CRM Platforms
1099 Community
Convenience
Efficiency
Simplicity
Instant Gratification
THE
ON-DEMAND
ECONOMY
Uber and Airbnb Revolutionize Business Models
in the On-Demand Economy
categories in the on-demand world. Forward-thinking companies are
reshaping these industries.
If you’ve used Uber or Airbnb, then you have participated in the
on-demand economy where speed, convenience, and simplicity
are key factors in consumer behavior and purchasing decisions.
Michael Boland, author of What’s Driving the Local On-Demand Economy, explains that as consumers, “We’re being conditioned to expect
everything on-demand as the mobile device increasingly becomes the
remote control for the physical world” (Boland, 2015). For example,
the majority of consumers who tap an Uber app to get a ride would
not consider dialing an 800 number for a taxi. With all transactions
performed by apps and automated processes, the entire process from
hailing to paying for a ride is slick, quick, and easy, without cash or
credit cards.
Uber Business Model
Tech Platforms Enabled On-Demand Services to Take Off
Decades of technological innovation have given us smartphone apps,
mobile payment platforms, GPS and map technology, and social
authentication. These technologies are being used to build the infrastructure needed for on-demand services. This infrastructure—also
referred to as a technology platform or technology stack—supports
the exchange and coordination of staggering amounts of data. The
term technology stack reflects the fact that the platform is made up of
multiple layers (stacks) of hardware, software, network connectivity,
and data analytics capabilities.
In many consumer markets today, companies that do not have
iPhone or Android apps or technology platforms that support the
exchange of goods and services—no matter how useful their website—
may find themselves losing their competitive edge.
On-Demand Economy Requires a New Business Model
Uber and Airbnb are popular examples of companies that developed
on-demand business models to transform slow-to-innovate industries. A simple definition of business model is the way a company
generates revenue and makes a profit. On-demand business models provide real-time fulfillment of goods and services, which have
attracted millions of users worldwide. This model fits best when
speed and convenience matter the most. The ground transportation, grocery, and restaurant industries are examples of hyper-growth
Uber disrupted the taxi industry with a workforce that is essentially
any person with a smartphone and a car. Location-aware smartphone
apps bring drivers and passengers together, while in-app accounts
make the cashless payment process effortless. By simply opening the
Uber app and pressing the middle button for several seconds (a long
press), customers can order a ride to their current location, selecting
the kind of car they want. Payment is automatically charged to the
credit card on file with receipts via email.
The Uber concept developed in response to taxi scarcities. It
started on a snowy Paris night in 2008 when the two founders could
not get a cab. They wanted a dead-simple app that could get them
a car with a tap. On June 1, 2015, the entrepreneurs celebrated
Uber fifth anniversary and announced that the company had grown
into a transportation network covering 311 cities in 58 countries in
North and South Americas, Europe, Africa, Asia Pacific, and the
Middle East.
Uber has invested in new and developing technologies and partnerships. The company partnered with Carnegie Mellon University to
build robotic cars and new mapping software. In March 2015, Uber purchased deCarta, a 40-person mapping start-up to reduce its dependence on Google maps.
Airbnb Business Model
Another disruption to a traditional industry occurred when Airbnb
blindsided the hotel industry. Airbnb allows anyone with a spare
apartment or room—even if only for a day—to run their own bed and
breakfast by giving them a technology platform to market themselves
to a global market. By 2016, the Airbnb site had over 1.5 million listings in 190 countries and 34,000 cities. Over 40 million guests have
used Airbnb worldwide. For comparison, Hilton, InterContinental, and
Marriott, the largest hotel chains in the world, have less than 1 million
rooms each.
Uber and Airbnb do not own inventory. Instead, they scale up
(expand) by improving their ability to acquire and match customers
and service providers.
4
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
Business Success in Terms of Company Growth
and Valuation
The ride-hailing app Uber and the housing rental app Airbnb are two
of the most valuable start-ups, as displayed in Figure 1.1. Valuation
of a company at its early stages is based heavily on its growth potential
and future value. In contrast, the valuation of an established company
is based on its present value, which is calculated using traditional
financial ratios and techniques related to revenues or other assets.
Uber’s massive market value—estimated at $60 billion—is
greater than 80% of all Standard & Poor (S&P) 500 companies, many
of which have been around for 25, 50, or 100 years. Investors valued
Airbnb at $24 billion—higher than the value of the hotel giant Marriott
Airbnb
Started in 2008
Airbnb—short for Air Bed and
Breakfast
The leading disrupter in the hotel
and vacation rental market
By 2016, Airbnb was valued at
about $25 billion. Exceeded the
value of Marriott International
FIGURE 1.1
International. These companies would never have been able to grow
in the old way as a traditional organization, with their own inventory of
products, services, and workforce and traditional forms of technology.
Questions
1. In what ways are the Uber and Airbnb business similar or
different?
2. How did Uber achieve its new business model?
3. To what extent do you think changing their business models contributed to the success of Uber and Airbnb?
Sources: Compiled from Primack (2015), Storbaek (2015), Winkler and MacMillan
(2015,) Jaconi (2014), Uber.com (2017), Airbnb.com (2017).
Uber
Started in 2009. Founder Garrett
Camp wanted to tackle the taxi
shortage problem in San Francisco
Uber epitomizes disruption
Changed the way customers think
about grabbing a ride
By 2016, Uber had higher valuation
than companies that make the cars
its drivers use–GM, Honda, and Ford
On-demand business models of Airbnb and Uber have been extremely
successful.
Doing Business in the
On-Demand Economy
1.1
On-demand economy is the
economic activity created by
technology companies that fulfill
consumer demand through
the immediate provisioning of
products and services.
The on-demand economy is revolutionizing commercial activities in businesses around the
world. The businesses in this new economy are fueled by years of technology innovation and a
radical change in consumer behavior. As companies become more highly digitized, it becomes
more and more apparent that what companies can do depends on what their IT and data management systems can do. For over a decade, powerful new digital approaches to doing business
have emerged. And there is sufficient proof to expect even more rapid and dramatic changes
due to IT breakthroughs and advances.
In market segment after market segment, mobile communications and technology stacks
make it financially feasible for companies to bring together consumers and providers of products and services. These capabilities have created the on-demand economy. As Ev Williams,
cofounder of Twitter says,
The internet makes human desires more easily attainable. In other words, it offers
convenience. Convenience on the internet is basically achieved by two things: speed,
and cognitive ease. If you study what the really big things on the internet are, you
realize they are masters at making things fast and not making people think.
Doing Business in the On-Demand Economy
The proliferation of smartphone-connected consumers, simple and secure purchase flows, and
location-based services are a few of the market conditions and technological innovations that
are propelling the explosion of on-demand services.
Just as the rapid growth of online-only Amazon and eBay transformed retail, the even faster
growth of app-driven companies, like Uber, Airbnb, and Grubhub, has disrupted the taxi, hotel,
and restaurant markets. As you read in the opening case, in six short years, Uber changed the
taxi industry as it rose from start-up to the world’s most valuable private technology company,
and Airbnb tackled the fiercely competitive hotel market and attracted more than 60 million
customers to become the third most valuable venture-capital-backed company in the world.
Another example is Grubhub who became No. 1 in online food ordering, controlling over 20%
of that $9 billion market. What today’s successful technology businesses have in common are
platform-based business models. Platforms consist of hardware, software, and networks that
provide the connectivity for diverse transactions, such as ordering, tracking, user authentication, and payments. These business models are designed to serve today’s on-demand
economy, which is all about time (on-demand), convenience (tap an app), and personalized
service (my way). For example, millennials want the ease of online payment over cash and
insist on efficiency for all aspects of their lives, including shopping, delivery, and travel.
Key strategic and tactical questions that determine an organization’s profitability and
management performance are shown in Figure 1.2. Answers to each question require an
understanding of the capabilities of mundane to complex IT, which ones to implement and
how to manage them.
Strategic direction:
industry, markets,
and customers
• What do we do?
• What is our direction?
• What markets & customers should
we be targeting and how do we
prepare for them?
Business model
• How do we do it?
• How do we generate revenues &
profits to sustain ourselves and
build our brand?
Business
processes,
producers,
and technology
FIGURE 1.2
• How well do we do it?
• How can we be more
efficient?
Key strategic and tactical questions.
Growth of the On-Demand Economy
Whether it is ease of scheduled deliveries or the corresponding time savings, the growth of
the on-demand economy is a product of its alignment with consumers’ growing appetite
for greater convenience, speed, and simplicity. A recent survey reported that 86.5 million
Americans have used the services of at least one on-demand start-up company (Chriss, 2016).
The growth of the on-demand economy demonstrates the high level of interest consumers
have in on-demand services from dog walking to laundry services, short-term home rentals,
massages, and truck hauling. Although just applying a mobile app to an existing service will not
ensure a company’s success, IT is a vital and integral part of the all businesses that are part of
the on-demand economy.
5
6
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
Low Cost of Entry One of the reasons that the on-demand economy has taken off is
that it is easier than ever to become an on-demand business. Companies like Dispatch, a software as-a-service company, allow entrepreneurs to move into the on-demand world quickly
and inexpensively. For example, Aatlantic Fitness, a fitness equipment repair service company,
moved into the on-demand economy using Dispatch, and Handyman Connection, a 20-yearold home repair service company, is using Dispatch’s platform to compete with Handy, an ondemand service for house cleaning that has raised $60 million in venture capital.
Digital Business Models
The on-demand economy is driving the transformation of traditional business models to digital
business models to serve customers what they want and where they want it.
Business models are the ways enterprises generate revenue or sustain themselves. Digital
business models define how businesses make money via digital technology. Companies that
adopt digital business models are better positioned to take advantage of business opportunities and survive, according to the Accenture Technology Vision 2013 report (Accenture, 2013).
Figure 1.3 contains examples of new technologies that destroyed old business models and
created new ones.
Twitter dominates the
reporting of news and events
as they are still happening
Facebook became the most
powerful sharing network
in the world
Location-aware technologies
track items through
production and delivery to
reduce wasted time and
inefficiency in supply chains
and other business-tobusiness (B2B) transactions
Smartphones, tablets, other
touch devices, and their apps
reshaped how organizations
interact with customers—and
how customers want
businesses to interact with
them
FIGURE 1.3 Digital business models refer to how companies engage
their customers digitally to create value via websites, social channels, and
mobile devices.
The ways in which market leaders are transitioning to digital business models include the
following:
• NBA talent scouts rely on sports analytics and advanced scouting systems NBA talent
scouts used to crunch players’ stats, watch live player performances, and review hours of
tapes to create player profiles. Now software that tracks players’ performance has changed
how basketball and soccer players are evaluated. For example, STATS’ SportVU technology
is revolutionizing the way sports contests are viewed, understood, played, and enjoyed.
SportVU uses six palm-sized digital cameras that track the movement of every player
on the court, record ball movement 25 times per second, and convert movements into
statistics. SportVU produces real-time and highly complex statistics to complement the traditional play-by-play. Predictive sport analytics can provide a 360-degree view of a player’s
performance and help teams make trading decisions. Sports analytics bring about small
competitive advantages that can shift games and even playoff series.
• Dashboards keep casino floor staff informed of player demand Competition in the
gaming industry is fierce, particularly during bad economic conditions. The use of manual
spreadsheets and gut-feeling decisions did not lead to optimal results. Casino operators facing pressure to increase their bottom line have invested in analytic tools, such as
Doing Business in the On-Demand Economy
Tangam’s Yield Management solution (TYM). TYM is used to increase the yield (profitability)
of blackjack, craps, and other table games. The analysis and insights from real-time apps
are used to improve the gaming experience and comfort of players.
Today, a top concern of well-established corporations, global financial institutions, born-on-theWeb retailers, and government agencies is how to design their digital business models in order to
• Deliver an incredible customer experience
• Turn a profit
• Increase market share
• Engage their employees
In the digital (online) space, the customer experience must measure up to the very best the
Web has to offer. Stakes are high for those who get it right—or get it wrong. Forrester research
repeatedly confirms there is a strong relationship between the quality of a firm’s customer
experience and loyalty, which, in turn, increases revenue (Schmidt-Subramanian et al., 2013).
IT’s Role in the On-Demand Economy
According to the 2016 survey conducted by the Society of Information Management (SIM), 1,213
IT leaders (including 490 chief information officers (CIOs)) from 801 companies reported companies that are more highly digitized and tightly connected are putting a greater emphasis on
the strategic use of IT to enhance growth and improve performance. As a result, IT priorities and
spending are changing (Kappelman et al., 2017).
A review of the top 10 IT management priorities reported in the survey results is shown
in Table 1.1. Along with business-IT alignment and security, Table 1.1 clearly demonstrates a
need for companies to focus on strategic and organizational priorities such as innovation, IT
and business agility, speed of IT delivery, and business productivity and efficiency.
TA B L E 1 . 1
10 Top IT Management Priorities
IT Management Issues
1
Technology Alignment with the Business
2
Security, Cybersecurity & Privacy
3
Innovation
4
IT Agility & Flexibility
5
Business Agility & Flexibility
6
Business Cost Reduction & Controls
7
IT Cost Reduction & Controls
8
Speed of IT Delivery & IT Time to Market
9
Business Strategic Planning
10
Business Productivity & Efficiency
Adapted from Kappelman et al. (2017).
To address these issues, IT leaders said they need to focus on relationships, meet more
frequently with top management, and spend significant amounts of time with functional
leaders, customers, and suppliers. Companies also need to emphasize finding, keeping,
and developing IT talent and on improving IT to improve business performance. These
findings point to one clear message—IT in the on-demand economy is about meeting customer needs.
7
8
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
IT Business Objectives
Now, more than ever, IT must be responsive to the needs of consumers who are demanding a
radical overhaul of business processes in companies across diverse industry sectors. Intuitive
interfaces, around-the-clock availability, real-time fulfillment, personalized treatment, global
consistency, and zero errors—this is the world to which customers have become increasingly
accustomed. And, it’s not just about providing a superior user or customer experience—when
companies get it right, they can also offer more competitive prices because of lower costs, better operational controls, and open themselves up to less risk.
According to Chirantan Basu of Chron (Basu, 2017), to stay abreast of the ever-changing
business landscape and customer needs, IT today must concentrate on the following six
business objectives:
1. Product development From innovations in microprocessors to efficient drug-delivery
systems, IT helps businesses respond quickly to changing customer demands.
2. Stakeholder integration Companies use their investor relations websites to
communicate with shareholders, research analysts, and others in the market.
3. Process improvement An ERP system replaces dozens of legacy systems for finance,
human resources, and other functional areas, to increase efficiency and cost-effectiveness
of internal business processes.
4. Cost efficiencies IT allows companies to reduce transaction and implementation costs,
such as costs of duplication and postage of email versus snail mail.
5. Competitive advantage Companies can use agile development, prototyping, and other
systems methodologies to being a product to market cost-effectively and quickly.
6. Globalization Companies can outsource most of their noncore functions, such as HR
and finance, to offshore companies and use ICT to stay in contact with its global employees, customers, and suppliers 24/7.
Every technology innovation triggers opportunities and threats to business models and strategies. With rare exceptions, every business model depends on a mix of IT, knowledge of its
potential, the requirements for success, and, equally important, its limitations.
Questions
1. What precipitated the on-demand economy?
2. How is IT contributing to the success of the on-demand economy?
3. List the six IT business objectives.
4. What are the key strategic and tactical questions that determine an organization’s profitability and
management performance?
5. What is a business model?
6. What is a digital business model?
7. Give two examples of how companies are transitioning to digital business models.
8. What factors are driving the move to digital business models?
Business Process Improvement
and Competitive Advantage
1.2
Given that a company’s success depends on the efficiency of its business processes, even small
improvements in key processes can have significant payoff. All functions and departments in
the enterprise have tasks they need to complete to produce outputs, or deliverables, in order
to meet their objectives.
Business Process Improvement and Competitive Advantage
9
Before you can begin to improve something, you have to understand what it is you are
improving. We’ll start by defining a business process, looking at its characteristics, and then
exploring ways in which a business process can be improved either incrementally or radically
through Business Process Reengineering.
What Is a Business Process?
Business processes are series of steps by which organizations coordinate and organize tasks
to get work done. In the simplest terms, a process consists of activities that convert inputs into
outputs by doing work.
Examples of common business processes are as follows:
• Accounting Invoicing; reconciling accounts; auditing
• Finance
Credit card or loan approval; estimating credit risk and financing terms
• Human resources (HR) Recruiting and hiring; assessing compliance with regulations;
evaluating job performance
• IT or information systems Generating and distributing reports and data visualizations;
data analytics; data archiving
• Marketing Sales; product promotion; design and implementation of sales campaigns;
qualifying a lead
• Production and operations Shipping; receiving; quality control; inventory management
• Cross-functional business processes Involving two or more functions, for example,
order fulfillment and product development
Three Components of a Business Process Business processes have the three
basic components shown in Figure 1.4. They involve inputs, activities, and deliverables.
Deliverables
products,
services,
plans,
or actions
Inputs
raw materials,
data,
knowledge,
expertise
Activities
work that
transforms
inputs and acts
on data and
knowledge
FIGURE 1.4
Three components of a business process.
Business Process
Processes can be formal or informal. Formal processes are documented and have wellestablished steps. Order taking and credit approval processes are examples. Routine formal
processes are referred to as standard operating procedures (SOPs). An SOP is a well-defined
and documented way of doing something. An effective SOP documents who will perform the
tasks; what materials to use; and where, how, and when the tasks are to be performed. SOPs
are needed for the handling of food, hazardous materials, or situations involving safety, security, or compliance. In contrast, informal processes are typically undocumented, have inputs
that may not yet been identified, and are knowledge-intensive. Although enterprises would
prefer to formalize their informal processes in order to better understand, share, and optimize
them, in many situations process knowledge remains in people’s heads.
Processes range from slow, rigid to fast-moving, adaptive. Rigid processes can be structured to be resistant to change, such as those that enforce security or compliance regulations.
Adaptive processes are designed to respond to change or emerging conditions, particularly in
marketing and IT.
Improving Business Processes
Designing an effective process can be complex because you need a deep understanding of the
inputs and outputs (also known as deliverables), how things can go wrong, and how to prevent
Deliverables are the outputs
or tangible things that are
produced by a business process.
Common deliverables are
products, services, actions, plans,
or decisions, such as to approve
or deny a credit application.
Deliverables are produced in order
to achieve specific objectives.
10
CH A PT ER 1
Disruptive IT Impacts Companies, Competition, and Careers
things from going wrong. For example, Dell had implemented a new process to reduce the time
that tech support spent handling customer service calls. In an effort to minimize the length of
the call, tech support’s quality dropped so much that customers had to call multiple times to
solve their problems. The new process had backfired—increasing the time to resolve computer
problems and aggravating Dell customers.
The importance of efficient business processes and continuous process improvement
cannot be overemphasized. Why? Because 100% of an enterprise’s performance is the result
of its processes. Maximizing the use of inputs in order to carry out similar activities better than
one’s competitors is a critical success factor (CSF). Poorly designed, flawed, or outdated
business processes waste resources, increase costs, cause delays, and aggravate customers.
For example, when customers’ orders are not filled on time or correctly, customer loyalty
suffers, returns increase, and reshipping increases costs. The blame may not be employee
incompetence, but a flawed order fulfillment process.
Don’t Automate, Obliterate!
In today’s on-demand economy, incrementally improving a business process isn’t always
sufficient to create the type of change required. Instead, radical changes need to occur to meet
higher customer expectations. To do this, companies have to go beyond simply automating
an existing process. They must reinvent the entire business process, including reducing the
number of steps required, eliminating documents, developing automated decision-making,
and dealing with regulatory and fraud issues. Operating models, skills, organizational structures, and roles need to be redesigned to match the reinvented processes. Data models should
be adjusted and rebuilt to enable better decision-making, performance tracking, and customer insights.
Leading organizations have come to recognize that it can take a long time to see the benefits
of traditional large-scale projects that migrate all current processes to digital and sometimes
they don’t work. Instead, successful companies are reinventing processes, challenging everything related to an existing process and rebuilding it using cutting-edge digital technology. For
example, rather than creating technology tools to help back-office employees type customer
complaints into their systems, leading organizations create self-serve options for customers to
type in their own complaints.
Business Process Reengineering (BPR) The process by which these types of radical process change can be achieved is referred to as business process reengineering (BPR),
its slogan is “Don’t automate, obliterate!” (Hammer and Champy, 2006). Consisting of eight
stages, shown in Figure 1.5, BPR proposes that simply applying IT to a manual or outdated process does not always optimize it. Instead, processes need to be examined to determine whether
they are still necessary. After unnecessary processes are identified and eliminated, the remaining ones are redesigned (or reengineered) in order to automate or streamline them. Next, the
new process is implemented and put into operation and its performance is evaluated. Finally,
the process is reassessed over time to continually improve it.
The goal of BPR is to eliminate unnecessary, non-value-added processes, and simplify
and automate the remaining processes to significantly reduce cycle time, labor, and costs. For
example, reengineering the credit approval process cuts time from several days or hours to
minutes or less. Simplifying processes naturally reduces the time needed to complete the process, which also cuts down on errors.
After eliminating waste, technology can enhance processes by (1) automating existing
manual processes; (2) expanding the data flows to reach more functions in order to make it possible for sequential activities to occur in parallel; and (3) creating innovative business processes
that, in turn, create new business models. For instance, consumers can scan an image of a
product and land on an e-commerce site, such as Amazon.com, selling that product. This process flips the traditional selling process by making it customer-centric.
You will read more about optimizing business processes and role of business process
management (BPM) role in the alignment of IT and business strategy in Chapter 13.
Business Process Improvement and Competitive Advantage
11
1. Develop
Vision and
Objectives
2. Understand
Existing
Processes
8. Perform
Continuous
Improvement
7. Evaluate New
Process
Business Process
Reengineering
6. Make New
Process
Operational
3. Identify
Process for
Redesign
4. Identify
Change Levers
5. Implement
New Process
FIGURE 1.5
Eight phases of business process reengineering.
Gaining a Competitive Advantage
Understanding trends that affect the new ways business is being done and getting in front of
those trends by changing adding, deleting, and changing existing business processes gives
organizations an important competitive advantage over their competitors. Helping a
company gain, maintain, and sustain a competitive advantage in the market is a very important function of IT. In business, as in sports or politics, companies want to win—customers,
market share, and position in the industry. Basically, this requires gaining an edge over competitors by being first to take advantage of market opportunities, providing better customer
experiences, offering unique products or services, or convincing customers why your business
is a more attractive alternative than your competitors.
Influential industry leaders cite “new competition” as their largest business challenge.
Once an enterprise has developed a competitive edge, it can only be sustained by continually
pursuing new and better ways to compete. Maintaining a competitive advantage requires
forecasting trends and industry changes and figuring out what the company needs to do to stay
ahead of the game. It demands continuously tracking…
Purchase answer to see full
attachment