CMIS Notes
CMIS Notes
Chapter 1
1.1
Information technology: refers to any computer-based tool that is used to work with information and to
support an organization information-processing need.
Information system: collects, processes, stores, analyzes and disseminates information for a specific
purpose.
a. ISs have an enormous strategic value to organizations (some firms can’t function
without an IS system)
Initiating and designing specific strategic Your information needs will mandate the
information systems development of new strategic information
systems
Managing system integration of the Describe business needs and the type of
Internet, intranets, and extranets integration that is required to MIS
department
Educating non-MIS managers about IT Advise the MIS department about your
employees’ training needs on IT
Educating the MIS staff about the business Communicate business needs,
requirements and goals to MIS
Partnering with business unit executives Responsible for defining and clarifying your
roles in alignment with the MIS department
roles and organizational strategy
Proactively using business and technical Partner with the MIS department to target
knowledge to see innovative ideas about high-priority business needs and use
using IT innovative solutions
Create business alliances with business Identify supply chain or other inter-
partners organizational business requirements
Data items: a description of things, events, activities and transactions that are recorded, classified, and
stored but are not organized to convey any specific meaning. Data can be numbers, letters, figures,
sounds and images (eg. 3.11, 2.96) and characters (eg, B, A, C)
Information: refers to data that have been organized so they have meaning and value to the recipient
Knowledge: consists of data and or information that have been organized and processed to convey
understanding, experience, accumulated learning, and expertise to apply to a current business problem
• Four information technology (IT) components: hardware, software, database, network – from
the information technology platform
• Components are used to develop information systems, oversee security, and risk, and
manage data (activities known as information technology services)
1. Hardware: consists of devices such as processor, monitor, keyboard, and printer. These devices
collectively accept, process and display data and information.
2. Software: a program or collection of programs that enables the hardware to process data
3. Database: a collection of related files or tables containing data
4. Network: a connecting system (wireline or wireless) that enables multiple computers to share
resources
5. Procedures: the instructions for combining these components to process information and
generate the desired output
• Provide fast, accurate communication and collaboration within and among organizations.
• Store huge amounts of information in an easy-to-access yet small space
• Functional Area Information Systems (FAIS), also known as a departmental information system:
o Accounting
o Finance
o Marketing
o Production/operations
• Support the monitoring, collection, storage, and processing of data from the
organization’s day-to-day operations for basic business transactions
Interorganizational information system: information systems that connect two or more organizations
Supply chain: the flow of materials, information, money, and services from suppliers of raw materials
through factories/warehouses to the end customers
Electronic commerce systems: another type of interorganizational information systems which enable
organizations to conduct transactions, business-to-business electronic commerce, and customers to
conduct transactions with businesses (business to consumer (B2C)
• Clerical workers – support managers at all levels of the organization (bookkeepers, secretaries,
electronic file clerks, insurance claim processors)
• Low level managers: handle day-to-day operations,and making routine decisions such as
assigning tasks and placing purchase orders
• Middle managers: deal with tactical decisions like short-term planning, organizing, and control.
• Functional area information systems (FAIS) – summarize data and prepare reports
• Business analytics (BA) and business intelligence (BI): provide computer-based support for
complex , non-routine decisions
• Expert systems (ES): An attempt to duplicate the work of human experts by applying reasoning
capabilities, knowledge, and expertise within a specific domain.
• Dashboards (aka digital dashboards): a form of is that provides rapid access to timely
information and direct access to information in the form of reports
Two scenarios:
o Industries where software disrupted the previous market-leading companies
o Industries where a new company (or companies) used software to achieve a
competitive advantage
• Book industry
• Online books
• Music industry
• Video industry
• Software industry
• Photography industry
• Mobile phones
• Marketing
• Recruiting
• Resumes online
• Financial services
• DreamWorks Animation
• Automobile industry
• Agriculture
• Fashion
• Education
• Legal profession
• The competitive advantage of replacing people with IT and machines is increasing rapidly
• Long-term use of the keyboard and mouse can result in repetitive strain injuries (RSI)
• RSIs are addressed by ergonomics: the science of designing machines and work settings that
minimize injury and illness
o The lines between time at work and leisure time at home have become blurred
Baxter
• Helps with repetitive tasks in factories (e.g. packing & unpacking items)
LoweBots
Drones
• An unmanned aerial vehicle that is controlled by pilots from the ground or follows a
preprogrammed missions – used for a various purposes
Autonomous vehicles
Consider:
• How are drones and robots helping with our food supply?
• Detect areas under stress from disease, rot, insect damage, or lack of water
• Assess when the next load of produce should be ready to send to a company.
• How could drones help reduce crime in your area, town, or city?
• Search and Rescue
• General Surveillance
o Allow surgeons to use virtual reality to plan complex surgeries, and use robots to
remotely perform surgery
• IBM’s Watson is an example of artificial intelligence (AI) called cognitive computing. Watson:
• Watson is being used in other areas including: customer service, financial services, tax
preparation services, and strategic analysis
Chapter 3
• Ethics:
o The principles of right and wrong that individuals use to make choices that guide their
behavior.
• Ethical Frameworks
• The rights to make one’s own choices about what life to lead, to be told truth, to
not be injured and to enjoy a degree of privacy
o Fairness: treat all humans equally, or if unequally, then fairly, based on some defensible
standard
• Conditions that are important to the welfare of people: system of laws, effective
police and fire departments, health care, a public educational system and public
recreational areas
o Common Good: respect and compassion for all others is the basis for ethical actions.
Traditional Approach for Resolving Ethical Issues (left column TABLE 3.1)
Which option will produce the most good and do the least harm? (the utilitarian approach)
Considering all the approaches, which option best addresses the situation?, Act and reflect on
the outcome of your decision
What are the different issues that give rise to this ethical issue?
3. Stakeholder analysis
4. Powerful response
What types of things could I say to provide a response to the ethical issue?
What words (script) could I use when talking about the ethical issue? (consider both positive and
negative responses)
Code of ethics: a collection of principles intended to guide decision making by members of the
organization.
o Responsibility: means that you accept the consequences of your decisions and actions
o Accountability: refers to determining who is responsible for actions that were taken
o Liability: is a legal concept that gives individuals the right to recover the damages done
to them by other individuals, organizations, or systems
2. Accuracy issue: involve the authenticity, fidelity, and correctness of information that is
collected and processed
3.2 Privacy
Privacy: the right to be left alone and to be free of unreasonable personal intrustions
• Introduction privacy: the right to determine when, and to what extent information about you
can be gathered or communicated to others.
1. The right of privacy is not absolute, privacy must be balanced against the needs of society
2. The publics right to know supersedes the individuals right of privacy
Rapid advances in technology made it easier to collect, store and integrate vast amounts of data
on individuals in large databases (eg. surveillance cameras on roads, at work, in public places,
telephone calls)
• Digital dossier: An electronic description of an individual and their habits (eg. comes from data
from surveillance listed above)
• Profiling: process of forming a digital dossier
• Data aggregators: collect public data and non-public information (eg. financial data, motor
vehicle records, social security numbers) then integrate the data to form digital dossiers to
which they sell to law enforcement agencies.
Electronic Surveillance
• Electronic Surveillance: rapidly increasing, with the emergence of new technologies, conducted
by employers, the government and other institutions.
• Examples: Surveillance cameras in airports, subways, banks, and other public venues
• Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone
cameras, utility meters, passports, and identification cards to which increase monitoring of
human activity.
• Smartphones create geotags (embedding images with longitude and latitude of the location
shown in the image)
• Google and Microsoft Street view images
• Facial recognition technologies
• (SCS) Social Credit Score used in China where citizens are given scores based on monitorization
of individuals spending habits, behaviors, and how they pay bills affects their eligibility for
services.
• Drones – can be used for aerial surveillance.
• Employer surveillance of employee’s internet use, employee’s emails, URL filtering (software to
block connections to inappropriate websites)
Consider:
• How else could licence plate and driver’s licence data be used?
• Is this a possible invasion of privacy when combined with geographic positioning data?
o Utility companies
o Employers
o Hospitals
o Schools
Consider:
• How would you feel if your province implemented a fingerprint identification system?
• Do you use biometric (fingerprint) identification with your smartphone or computer? Why or
why not?
• Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
• Blog: an informal, personal journal that is frequently updated and is intended for
general public reading
• An organization’s guidelines for protecting the privacy of its customers, clients, and
employees.
• Opt-out model: permits the company to collect personal information until the customer
requests that the data not be collected.
• Opt-in model: prohibits an organization from collecting any personal information unless
the customer authorizes it.
• A protocol that automatically communicates privacy policies between a website and its
visitors
1. data collection
• Data should be adequate, relevant, and not excessive in relation to the business
objective.
• Individuals must give their consent before data pertaining to them can be
gathered. Such consent may be implied from the individual’s actions (e.g.,
applications for credit, insurance, or employment).
2. data accuracy
3. data confidentiality
• Third parties should not be given access to data without the individual’s
knowledge or permission, except as required by law.
• Disclosures of data, other than the most routine, should be noted and
maintained for as long as the data are maintained.
• Data should not be disclosed for reasons incompatible with the business
objective for which they are collected.
Consider:
• Whether you would be concerned if all of your Facebook data was made available to Facebook
app developer
o Transborder data flow – the absence of consistent or uniform standards of privacy and
security obstructs the flow of information among countries
o GDPR – data protection law in EU
• Covers personal data (information used to identify a person) & sensitive data
(encompasses genetic data, racial information, sexual orientation, trade union
membership, etc.)
• GDPR defines a natural person as a living human being and a data subject as a
human being whose data an organization has or processes.
• GDPR states that data controllers and data processers need to keep minimal
data that is accurate, secured and retain the data for as long as needed
• The right to know what organizations are doing with their data.
• The right to ask, at any time, for copies of all the data that organizations
have about them.
• The right to have their data deleted. This provision is called the “right to
be forgotten.”
Chapter 2
Introduction
Competitive advantage: refers to any assets that provide an edge against its competitors (such as cost,
quality or speed)
• An organizational strategy is a planned approach that the organization takes to achieve its goals
and mission statement
Business process: an ongoing collection of related activities or tasks that in a specific sequence create a
product or service of value to the organization, its business partners, and its customers.
1. Inputs: materials, services, and information that flow through and are transformed as a result of
process activities
2. Resources: people and equipment that perform activities
3. Outputs: the product or a service created by the process
Organizations measure how well these process activities are executed by:
Managing master parts list and files Receiving, inspecting, and stocking parts and
materials
Managing packing, storage, and distribution Handling shipping and freight claims
Managing purchasing
Cross-Functional Processes
• Example: procurement and fulfillment process uses three functional areas to acquire
merchandise
Procurement process: includes all of the tasks involved in acquiring needed materials externally from
vendor
Process (three different functional areas of the firm: warehouse, purchasing and accounting)
Warehouse recognizes need to procure materials, documents this need with a purchase
requisition which it sends to purchasing department
Purchasing department identifies a suitable vendor, creates a purchase order based on the
purchase requisition and sends the order to vendor.
When vendor receives purchase order, it ships materials which are then received in the
warehouse
The vendor then sends an invoice which is received by the accounting department
Accounting sends payment to vendor, thereby completing the procurement process.
Process:
How can an Organization determine if their business processes are well designed?
Document the process by describing its steps, inputs and outputs and its resources
Analyze the process and modify to improve the performance
FIGURE 2.1 Business process for ordering an e-ticket from an airline website
IS facilitate communication and coordination among different functional areas and allow easy exchange
of, and access to, data across processes.
o For example: dates, times, product numbers, quantities, prices, addresses, names, and
employee actions
• ISs capture and store the process data (aka transaction data)
2.2 Business Process Reengineering, Business Process Improvement, and Business Process Management
• Customer satisfaction: The result of optimizing and aligning business processes to fulfill
customers needs, wants, and desires
• Quality: the result of optimizing the design, development and production processes
• BPR:
o Examines business processes with a “clean slate” approach and determine how they
can reconstruct processes to improve business functions
• BPI:
o Goal to ensure that a process has no more than 3-4 defects per million outputs by using
statistical methods to analyze the process.
1. Define
• BPI team documents existing process activities, process resources, and process
inputs and outputs, and documents the customer requirements for the
process output, and description of the problem.
2. Measure
• BPI team identifies relevant process metrics, such as time and cost to generate
one output (product or service) and collects data to understand how the
metric evolve over time.
3. Analyze
• BPI team examines the “as is” process map and the collected data to identify
problems with the process (eg. Decreasing efficiency and effectiveness) and
their root causes.
• Two benefits:
4. Improve
• BPI team identifies possible solutions for addressing root causes, maps the
resulting “to be” process alternatives, and implements the appropriate
solution.
• Eliminating process activities that do not add value to the output and
rearrange activities in a way that reduces delays or improves resource
use.
5. Control
• BPI team establishes process metrics and monitors the improved process after
solution has been implemented to ensure the process performance remains
stable.
o An integrated set of applications used for BPM that includes a repository of process
information such as process maps and business rules, tools for process modelling,
simulation, execution and coordination across functions
• Business Pressures
• Business environment: the combination of social, legal, economic, physical, and political
factors in which businesses conduct their operations
• Organizational Responses
Business Pressures
• Market pressures
• Pressures consist of the global economy, intense competition, the changing nature of
the workforce, and powerful customers
Globalization
• The integration and interdependence of economic, social, cultural, and ecological facets of life,
made possible by rapid advances in IT
• You and organizations you join will be competing with people and organizations from around
the world
o Women
o Single parents
o Visible minorities
Powerful Customers
o Price comparisons
o Electronic auctions
Customer intimacy: learning as much as possible about customers to anticipate and address their needs
– a component of: Customer relationship management: effort toward maximizing customer experience
Technology Pressures
o Rapid development of both new and substitute products and services (eg. New versions
of smartphones being released quickly)
• Information overload
o Vast stores of data, information, and knowledge (internet doubles in information every
year)
o To make effective decision, managers must be able to access, navigate and use these
vast stores of data, information, and knowledge.
Societal/political/legal pressures
Business pressures that include social responsibility, government regulation/deregulation,
spending for social programs, spending to protect terrorism, and ethics.
• Social issues range from the state of the physical environment, to company and individual
philanthropy to education
• Carbon management
• It executives must deal with federal and provincial laws and international
regulations that impact IT products they buy, how they dispose of them, to their
company’s carbon footprint.
• Digital Divide
• Refers to the gap between individuals who have access to information and
communications technologies and those who do not.
• PIPEDA (Personal Information Protection and Electronic Documents Act): law affecting the
collection of information and management of information
• Information technology used to identify and protect against terrorists and cyberattacks
• Include collection of fingerprints, photos and iris and retina scanners that are into
government databases
Ethical Issues
• Issues include:
Organizational Responses
• Strategic systems
• Systems that provide organizations with advantages that enable them to increase their
market share and profits to better negotiate with suppliers and prevent competitors
from entering their markets.
• Customer focus
• Configured mass customization: companies offer features that allow each shopper to
customize their product or service with a range of components.
Competitive strategy: a business approach to compete, its goals, and the plans and policies that will be
used to carry out those goals
- Competitors will try to prevent you from reaching your goals to which you have to counter
their moves.
- Threat is high when entry is easy and low when there are barriers to entry
- Supplier power is high when fewer buyer choices and low when many buyer choices
More suppliers = more negotiation to price, delivery and quality terms for
organizations
- Buyer power is high when many choices to buyer and low when buyer has fewer choices
- Switching costs: a strategy used to prevent substitution by imposing costs in money and
time if chosen to buy elsewhere
- Threat of rivalry is high when competition is amongst many firms and low when competition
is amongst a few firms and it isn’t as intense.
o A sequence of activities through which the organization’s inputs are transformed into
valuable outputs
• Primary activities
• Support activities
examples of primary and support activities in the value chain of a manufacturing company
5. Services
1. The incoming materials are processed (in receiving, storage, and so on) in activities
called inbound logistics.
2. The materials are used in operations, in which value is added by turning raw materials
into products.
3. These products are prepared for delivery (packaging, storing, and shipping) in the
outbound logistics activities.
4. Marketing and sales sell the products to customers, increasing product value by creating
demand for the company’s products.
5. Finally, the company performs after-sales service for the customer, such as warranty
service or upgrade notification, adding further value.
Support Activities
4. Procurement
Value system: A stream of activities that includes the producers, suppliers, distributors, and buyers, all
of whom have their own value chains.
-firms choice of strategy involves trades-offs from other investments in the organization
Cost leadership: produce products and services at the lowest cost in the industry
• Differentiation: offer different products, services, and product features than your competitors
• Innovation strategy: introduce new products and services, add new features to existing products
and services and develop new ways to produce them
• Operational effectiveness: improve internal business process to perform more effectively in
these activities than your rivals (improvements include productivity, increase quality, and
employee and customer satisfaction)
• Customer orientation: concentrate on making customers happy
• Web based systems can improve customer satisfaction by creating a personalized, one-
to-one relationship with the customer.
Business information technology alignment: the integration of the it functions with the
organizations strategy, mission and goals
o Best way to maximize strategic value of it
1. Organizations view IT as an engine of innovation that continually transforms the business, often
creating new revenue streams
2. Organizations view their internal and external customers and their customer service function as
supremely important
3. Organizations rotate business and IT professionals across departments and job functions
4. Organizations provide overarching goals that are completely clear to each IT and business
employee
5. Organizations ensure that IT employees understand how the company makes (or loses) money
• Helps organizations effectively manage their IT operations to align with business strategies
Chapter 4 Introduction
Security: defined as the degree of protection against criminal activity, danger, damage, or loss
Information security: refers to all the processes and policies designed to protect an organization
information and information systems from unauthorized access, use, disclosure, disruption,
modification, destruction.
Exposure: the harm, loss, or damage that can result if a threat compromises that resource
• Human Errors
• Social Engineering
1. Unintentional threats
2. Deliberate threats
o Human resources
o Information systems
Other Mistakes:
o Dirt, dust, humidity and static electricity that is harmful to the operation of computing
equipment
Social Engineering
• Social engineering:
o An attack in which the perpetrator uses social skills to trick or manipulate legitimate
employees into providing confidential company information such as passwords
• Example: Kevin Mitnick, famous hacker and former FBI’s most wanted
Tailgating: a technique designed to allow the preptrator to enter a restricted area that is
controlled with locks or card entry by following behind a legitimate employee who gains entry.
Shoulder surfing: occurs when a perpetrator watches an employees screen over their shoulder.
• Espionage or trespass
• Industrial espionage: crosses the legal boundary (ex: theft or confidential data)
• Information extortion
• Occurs when an attacker either threatens to steal, actually steals, information from a
company
• Perpetrator demands payment for not stealing the information, for returning
stolen information, or for agreeing not to disclose the information
• Sabotage or vandalism
• Smaller computing devices and storage devices have increased risk of being stolen
• Dumpster diving: a form of theft that involves going through residential or commercial
trashcans to find discarded information
• Identity theft
• Software attacks
• Methods of Attack:
• The longer your network is unavailable due to malware the more it will cost your organization
• Additional costs from investing into additional cybersecurity software and to pay for additional
staff training
• Risk of customers losing trust
• Education and training to make users aware of phishing attacks and do not click suspicious
emails or links in emails
o Situational tests for employees to make decisions on a series of events and finding out
the consequences of those decisions at the end of the exercise.
• Install latest versions of software
• Employ a real time monitoring system that can stop ransomware immediately.
• Evidently, pay the ransom
• Become aware of the no more ransom initiative which offers information and advice on
avoidance of ransomware as well as decryption tools for types of ransomware to help victims
retrieve encrypted data.
• Virus
• Worm
• Phishing attack
• Uses deception to acquire sensitive personal information by
masquerading as official looking emails or instant messages.
• Spear phishing
• Denial-of-service attack
• Trojan horse
• Back door
• Logic bomb
• Alien software
• Tracking cookies: can be used to track your path through a website, the
time you spend on there, what links you click on and other details are
recorded.
• Two types:
• SCADA systems are used to monitor or to control chemical, physical, and transport
processes such as those used in oil refineries, water and sewage treatment plants,
electrical generators and nuclear power plants
• If attackers gained access disruption can be caused to the power grid over a large area
or upsetting operations of a nuclear plant
• Risk management – is to identify, control and minimize the impact of threats (consists of three
processes)
• Risk analysis: involves three steps, 1 – assessing the value of each asset being protected,
2- estimating the probability that each asset will be compromised, 3 – comparing the
probable costs of the assets being compromised with the costs of protecting that asset
• Two functions:
Risk-mitigation strategies
• Risk acceptance: accept the potential risk, continue operating with no controls, and absorb any
damages that occurs
• Risk limitation: limit the risk by implementing controls that minimize the impact of the threat
• Risk transference: transfer the risk by using other means to compensate for the loss such as
purchasing insurance.
Controls: defense mechanism used to safeguard assets, optimize the use of the organization
resources, and prevent or detect errors or fraud
• Categories of Controls
• Security is only one aspect of operational control (which is part of general controls)
• General controls: apply to more than one functional area (eg. Passwords)
• Ethical issues
• Quality of supervision
Three Categories Of General Control:
• Physical Controls:
Examples:
• Access Controls
• Methods to authenticate
1. Control environment: Policies that enforce the proper management of user codes and
passwords
2. General control: A security system that requires a user ID and password to “log on”
3. Functional application control: Separate passwords for sensitive functions, e.g., employee raises
or write-off of customer accounts
• Two categories
• Authorization: determines which actions, rights, or privileges the person has, based
on their verified identity
• Least privilege: A principle that users be granted the privilege for some
activity only if there is a justifiable need to grant this authorization.
• Communication Controls
• Communication controls: secure the movement of data across networks.
Anti-Malware
Anti-malware systems: also called antivirus software are software packages that attempt to identify
and eliminate viruses and worms, and other malicious software.
o Systems filter traffic according to a database of specific problems, these systems create
definitions, or signatures, of various types of malwares, then update these signatures in their
products. The anti-malware software then examines suspicious computer code to determine
whether it matches a known signature. If the software identifies a match, then it removes the
code.
• Whitelisting: a process in which a company identifies the software that it will allow run on its
computer
• Blacklisting: A process in which a company identifies certain types of software that are not
allowed to run in the company environment
Encryption
Encryption: the process of converting an original message into a form that cannot be read by anyone
except the intended receiver
o All encryption systems use a key, which is the code that scrambles and then decodes the
messages
o Public-key encryption: known as asymmetric encryption – uses two different keys (private &
public)
o Public and private key with data encrypted in one key that can decrypt the other.
Ex: if Hannah wants to send a message to Harrison, first she obtain Harrison’s
public key (locking key), which she uses to encrypt her message (message in
two-lock box, when Harrison receives message he uses his private key to
decrypt it.
• Is a private network that uses a public (usually the internet) to connect users
• Several advantages include: First, they allow remote users to access the company
network, second they provide flexibility, third organization can impose their security
policies through VPNs
• Tunnelling: encrypts each data packet to be sent and places each encrypted packet
inside another packet – proves secure transmissions
• Transport layer security (TLS)
• Formerly called secure socket layer or SSL its an encryption standard used for secure
transactions such as credit card purchases and online banking
• Identifies which employees spend too much time surfing, who visits
questionable websites, who download music illegally
Application Controls
• Input controls: programmed routines that edit input data for errors before they
processed
• Processing controls: programmed routines that perform actions that are part of the
record keeping of the organization, reconcile, and check transactions, or monitor the
operations of applications.
• Output controls: programmed routines that edit output data for errors or help to ensure
that output is provided only to authorized individuals.
• It is more common to consider the purpose of application controls for input, processing, and
output using: accuracy, completeness, authorization, and an audit trail (documentation)
o BCP’s purpose:
o Be able to recover in the event of a hardware or software failure or attack (e.g., due to
ransomware)
Audit: involves the accumulation and evaluation of evidence that is used to prepare a report about the
information or controls that are being examined, using established criteria and standards.
Information system audits: examination of information systems, their inputs, their outputs, and
processing. < assessment of efficiency and effectiveness
• Use Table 4.4 to help enable changes to your methods of protecting your personal information
assets
Chapter 5
• Generated from multiple sources - internal sources (e.g. corporate databases and
company documents), personal sources (e.g. personal thoughts, opinions, and
experiences), external sources (e.g. commercial databases, government reports,
corporate websites)
• Clickstream data: data that visitors and customers produce when they visit a website or
click on hyperlinks.
• Blogs, podcasts, texts, RFID tags are constantly being developed and data these
technologies generate must be managed.
• Data becomes less current over time (eg, customers move to new addresses or change
their names)
• Data rot: refers to problems with the media on which the data stored (eg. Temperature,
humidity, and exposure to light)
• Data security, quality, and integrity may be compromised
• High volumes of big data and the variety of data being collected increase complexity
1. Federal government regulations (eg. The Bill 198) (eg. Canadian equivalent to the U.S Sarbanes-
Oxley Act – require companies to account for how information is being managed within their
organizations)
a. Law in Canada requires.
i. Public companies evaluate and disclose the effectiveness of their internal
financial controls
ii. Independent auditors for these companies agree to this disclosure
2. Companies are drowning in unstructured data
3. Big Data (additional problem)
Data Governance
• Objectives: to enable available, transparent, and useful data, “a single version of the truth”
• Data governance: Provides a planned approach to data management for all types of data.
• Includes a formal set of business processes and policies for data handling.
• Requires well-defined, unambiguous rules (both manual and IT) to avoid functional
inconsistency.
• Master data: a set of core data, such as customer, product, employee, vendor,
geographic locations and so on.
• Transactional data: which are generated and captured by operational systems, describes
the business activities or transactions.
• Intentions include providing consistency, accuracy, timeliness, and up-to-date master data
• Transactional data represents activities or events, such as a payroll cheque or customer invoice;
stored in transaction files or as tables as part of a database
• Master data are a set of core data, such as employee name, address, customer name, or
customer credit limit that are applied to multiple transactions; stored in a master file or as
tables as part of a database
• Byte: a group of eight bits, represents a single character, a byte can be a letter, a number or a
symbol
• Field: a logical grouping of characters into a word, a small group of words or an identifications
number
• Record: a logical grouping of related fields such as a students name, the courses taken, the date,
and the grade.
• Data file or table: a logical grouping of related records (eg. For example, a grouping of the
records from a particular course, consisting of course number, professor, and students’ grades,
would constitute a data file for that course)
• Database: a logical grouped of related files (eg. Student course file grouped with files on
students personal histories and financial backgrounds to create a student database)
Database Management Systems (DBMs) Minimize Three Main Problems of Previous Data Storage:
• DBMs are a set of programs with tools to create and manage databases
• DBMs minimize:
o Data isolation: Applications cannot access data associated with other applications
• Data security: increases in high security measures to minimize mistakes and deter attacks due to
data being put in one place in databases
• Data integrity: Data meet certain constrains (eg. No alphabetical letters in aSIN)
Database management system: a set of programs that provides users with tools to create and manage a
database
- Refers to the process of adding, deleting, accessing, modifying and analyzing data stored in a
database
• Key terms:
• Usually called a flat tile – contains all of the records and attributes
o Data model
o Entity
o Instance
o Attribute
• A characteristic or quality of a particular entity (eg. Customer name, employee
number, product color of an entity of a customer)
o Primary key
• A field that uniquely identifies that record so that it can be retrieved, updated
and sorted (eg. A student id)
o Foreign key
• A field or group of fields in one table that uniquely identifies a row of another
table
o Secondary key
• Another field that has some identifying information that typically doesn’t
identify the record
Organizations must manage huge quantities of data consisting of unstructured data and
structured data
o Structured data: is highly organized in fixed fields in a data repository such as a
relational database (data must be defined in terms of field name and type eg.
alphanumeric, numeric, and currency)
o Unstructured data: refers to data that do not reside in a traditional relational database
(eg. email messages, word processing documents, videos, images, audio files,
powerpoints presentations, Facebook posts, tweets, snaps.
• Diverse, high-volume, high-velocity information assets that require new forms of processing to
enable enhanced decision making, insight discovery, and process optimization
(www.gartner.com)
Second the Big Data Institute Defines Big Data as a dataset that:
Exhibit variety
Include structured, unstructured, and semi-structured data
Are generated at high velocity with an uncertain pattern
Do not fit neatly into traditional structured, relational databases
Can be captured, processed, transformed, and analyzed in a reasonable amount of time only by
sophisticated information systems
• Machine-generated/sensor data
• Social data
o Customer feedback, microblogging such as Twitter and other social media sites
Big Data: a collection of data that is large and complex and is difficult to manage using traditional
database management system
• Volume: high volumes of traditional (e.g., invoices) and non-traditional data (e.g., clicks on
websites)
• Velocity: the rate at which data is flowing is increasing as new types of data, such as those
related to locations or products, are added to the data stream
• Variety: more and more types of data are being added, such as images, meter readings, and
product locations, and it changes rapidly
Consider:
• What features would you like to have in a car that would be facilitated by its data?
• Data comes externally and internally (eg. data from unstructured data might question
on how trustworthy it is)
• Data quality in an analysis can change and data themselves can change because the
conditions under which the data are captured can change.
• When properly analyzed, big data can reveal valuable patterns and information
• Integrates an information silo – an information system that does not communicate with
other, related information systems in an organization
• NoSQL databases can manipulate structured and unstructured data, inconsistent data,
and missing data
• Open source solutions and new methods such as data lakes are also used
Consider:
• What does an organization have to do to back up its systems when its data and programs are
scattered all over the world?
• E.g. open data in the public sector that is used to create new businesses and solve
complex problems for individuals and businesses
• E.g. a group of visitors to an etsy page saw a top of the page that displayed additional
product images. Another group saw only the two original product images. On the page
with additional images, customers viewed more products and, significantly, bought
more products. The results of this experiment revealed valuable information to Etsy.
• E.g. a restaurant gathers guest data from a variety of sources beyond loyalty and
gift programs, including social media. Analyzing this Big Data helps restaurants
client's microsegment their guests. Restaurant managers are now able to
precisely customize their loyalty and gift programs. Since they have taken these
steps, they are noting improved profitability and customer satisfaction in their
restaurants.
• Human resources
• Product development
• Eg. Ford decided that conducting a full-scale market research test on their three
blink turn indicator would be too costly and time consuming. Instead, it
examined auto-enthusiast websites and owner forums to discover what drivers
were saying about turn indicators. Using text-mining algorithms, researchers
culled more than 10,000 mentions and then summarized the most relevant
comments.
• Operations
• E.g Consider United Parcel Service (UPS). The company has long relied on data
to improve its operations. Specifically, it uses sensors in its delivery vehicles that
can, among other things, capture the truck’s speed and location, the number of
times it is placed in reverse, and whether the driver’s seat belt is buckle
• Marketing
• Eg. IHG initiating marketing messages to members of its priority club rewards
program to 12 customer groups defined by 4,000 attributes, One group, for
example, tends to stay on weekends, redeem reward points for gift cards, and
register through IHG marketing partners. Using this information, IHG sent these
customers a marketing message that alerted them to local weekend events.
• Government operations
o Traffic monitoring
• Eg. The growing availability of Big Data sources within London—for example,
traffic cameras and sensors on cars and roadways—can help create a new era of
smart transport. Analyzing this Big Data offers new ways for traffic analysts in
London to “sense the city” and enhance transport via real-time estimation of
traffic patterns and rapid deployment of traffic management strategies.
Query by example: A method to obtain information from a relational database by filling out a grid or
template—also known as a form—to construct a sample or a description of the data desired.
• QBE is a method of creating database queries that allows the user to search for documents
based on an example in the form of a selected string of text or in the form of a document name
or a list of documents
• Data warehouses & data marts support business analytics – a broad category of
applications, technologies, processes for gathering, storing, accessing and analyzing data
to help businesses users to make better decisions
• Data warehouse
• Data mart
• data is organized by subject for example customer, vendor, product, price level,
and region.
• Integrated
• Data is collected from multiple systems and is then integrated around subjects
• Eg. For example, customer data may be extracted from internal (and external)
systems and then integrated around a customer identifier, thereby creating a
comprehensive view of the customer.
• Time variant
• Data warehouses and data marts maintain historical data over years that are
used to detect deviations, trends, and long-term relationships
• Nonvolatile
• Multidimensional
Data in data warehouses and marts are organized by business dimensions which are subjects
such as product, geographic area, and time period that represent the edges of the data cube.
• Source systems that provide data to the warehouse or mart (e.g., point of sale or ERP systems)
• Data integration technology that processes and prepare the data for use (using SQL, custom
software or software packages)
• Storing the data handled by a variety of architectures, such as a data warehouse or functional
data mart (e.g., finance or human resources)
• Metadata: data about the data in a repository, data quality and governance processes that
ensure that the warehouse or mart meets its purposes.
• Data quality issues: data cleansing needs to be used to ensure data meets users’ needs
• Users: business value for users rises when data can be accessed quickly and easily for analysis or
consolidation
Source Systems
Source systems are used when there is a business need for information requirements, bi
applications (business intelligence), and requirements for source system data.
Source systems range from operation/transactional systems, enterprise resource planning
systems, website data, third-party data (eg. customer demographic data,) and more.
Data Integration
Organizations need to extract the data, transform then and then load them into a data mart or
warehouse, a process called ETL
1. Handwritten code
2. Commercial data integration software
Software makes it easy to:
1. Specify the tables and attributes in the source systems that are to be
used
2. Map and schedule the movement of the data to the target such as a
data mart or warehouse
3. Make the required transformation
4. Load the data
Data is extracted then transformed to be made useful, (eg. Data from different systems may be
integrated around a common key such as a customer identification number)
Common architecture to store decision-support data is one central enterprise data warehouse
o The data in a one central enterprise data warehouse is accessed by all users & represent
the single version of the truth
Another architecture is independent data marts.
o Store data for a single application or a few applications such as marketing and finance
Another architecture is the hub and spoke.
o Contains a central warehouse that stores the data plus dependent data marts that
source their data from the central repository.
Data of these marts comprise the single version of the truth for decision-
support purposes.
Metadata
Data Quality
Governance
Users
Once data is loaded into a data mart or warehouse it is available, the organizations then obtain
value from BI that use this data.
BI users consist of: it develops, frontline workers, analysts, information workers, managers,
executives, suppliers, customers, and regulators.
User such as information producers whose role is to create information for other users
Other users including managers and executives - are information consumers they use
information created by others.
Benefits of data warehousing to users:
o End users can access needed data quickly and easily through web browsers because the
data is located in one place.
o End users can conduct extensive analysis with data in ways that were not possible.
o End users can obtain a strong view of organizational data
Consider:
• What are some examples of the types of data that could be in a data lake
• What might organizations need to do before using data from the data lake that came from
multiple sources (e.g., comparing different types of data)?
Knowledge management: a process that helps organizations manipulate important knowledge that
makes up the organizations memory.
Consists of the policies, procedural guides, reports, products, strategies, goals, core
competencies, and it infrastructure of the enterprise.
Knowledge that has been codified in a form that can be transformed and distributed into a
process or a strategy
Goal of KMS is to help organizations make use of the knowledge they accumulated.
• Make best practices (the most effective and efficient ways of accomplishing business
process- readily available to a wide range of employees) in managing knowledge
accessible to employee’s.
• Eg. Account managers tacit knowledge about how to best to manage large
accounts which this knowledge is then used to train new employees
1. Create knowledge: knowledge is created as people determine new ways of doing things and
external knowledge is brought in
2. capture knowledge: new knowledge must be identified as valuable and be presented in a
reasonable way
3. refined knowledge new knowledge must be placed in context so that it is actionable (eg. tacit
qualities must be captured along with explicit facts)
4. Store knowledge: useful knowledge must be stored in a reasonable format in a knowledge
repository so others in an organization can access it
5. manage knowledge: knowledge must be kept current must be reviewed regularly to verify that
is relevant and accurate.
6. disseminate knowledge: knowledge must be available in a useful format to anyone organization
who needs it anywhere at anytime
This identifier field or group of fields is called the primary key, secondary key is another field that has
some identifying information but does not identify the record. a foreign key is a field or group of fields in
one table that matches the primary key value in a row of another table. a foreign key is used to establish
and enforce a link between two tables.
• Query Languages
• Structured query language: most popular query language used for interacting with a
database
• EG. . Typical key words are SELECT (to choose a desired attribute),
FROM (to specify the table or tables to be used), and WHERE (to specify
conditions to apply in the query).
• Query by example: a user fills out a grid or template – known as a form to construct a
sample or a description of the data desired.
Designers plan and create databases through a process of entity-relationship modelling ( The process of
designing a database by organizing data entities to be used and identifying the relationships among
them) using an entity relationship diagram (Document that shows data entities and attributes and
relationships among them)
• Data dictionary
• Relationships
• Cardinality
Ex. Let’s look at an example from a university. An entity is a person, place, or thing that can be identified
in the users’ work environment. For example, consider student registration at a university. Students
register for courses, and they also register their cars for parking permits. In this example, STUDENT,
PARKING PERMIT, CLASS, and PROFESSOR are entities. Recall that an instance of an entity represents a
particular student, parking permit, class, or professor. Therefore, a particular STUDENT (James Smythe,
8023445) is an instance of the STUDENT entity; a particular parking permit (91778) is an instance of the
PARKING PERMIT entity; a particular class (76890) is an instance of the CLASS entity; and a particular
professor (Margaret Wilson, 390567) is an instance of the PROFESSOR entity.
Entity instances have identifiers or primary keys which are attributes that are unique to the entity
instance.
For example: STUDENT instances can be identified with Student Identification Number
For example: examples of attributes for STUDENT are Student Name and Student Address.
Three binary relationships:
1. One-to-one relationship: a single entity instance of one type is related to a single-entity instance
of another type
a. Ex: a student-parking permit relationship is 1:1 as students may only register one car or
no car at the university, that is a student can only have one parking permit or no permit.
2. One-to-many relationship
a. Ex: a student-class relationship, each class is taught by one professor but the professors
teach many classes
3. Many-to-many relationship
a. Ex: a student-class relationship, a student can register for more than one class and each
class can have more than one student
Chapter 7
Think about:
• Are you a “lowest-price” shopper? How would you use features offered by Walmart and its
online store?
• Features of the online store is designed to make it easier to reorder items, check the
status of orders, discover products that are locally trending, and explore services at
nearby Walmart stores.
• How do software capabilities enable the shopping options being provided by Walmart?
• Lord & Taylor is on Walmart website to which they provide over 125 brands.
• Types of E-Commerce
• Takes on several forms based on degree of digitization ( the extent to which the
commerce has been transformed from physical to digital )
• Example: buying digitally and the product being physically delivered to you througha
service like amazon.
1. Increases organizations reach (number of potential customers that the company can market to)
2. Removes barriers that impeded entrepreneurs seeking to start a business.
3. Transforms the nature of competition through the development of new online companies, new
business models, and diversity of EC related products and services.
• Electronic Business (e-business)
Types of E-Commerce
• Business-to-consumer (B2C): sellers are organizations and the buyers are individuals
• Business-to-business (B2B): both the sellers and the buyers are business organizations
(comprises vast majority of EC)
• Ex: discounted insurances, travel packages, tickets to events for employees. Electronic
stores that sell products at a discount to employees.
• E-government (G2C or G2B): use of e-commerce and technology to deliver information and
public services to citizens (aka government-to-citizen or G2C)
• Social commerce: refers to the delivery of electronic activities and transactions through social
computing
• Conversational (or chat) commerce: refers to electronic commerce using messaging and chat
apps to offer a daily personalized choice on a meal, product, or service
Each EC is executed in one or more business models (a method by which a company generates revenue)
Electronic catalogues: consist of a product database, a directory and search capabilities, and a
presentation function.
Electronic auctions: a competitive buying and selling process in which prices are determined by
competitive bidding
o Reverse auction
o Forward auction
• Sellers place items for auction, and the highest bid from buyer wins.
• Name your own price: customers decide how much they are willing to pay and an intermediary
tries to match a provider
• Find the best price: customers specify a need; an intermediary compares provider and shows
the lowest prices, the customer must accept in a short period of time or they lose the deal.
• Affiliate marketing: vendors ask partners to place logos on partners site, if customers make a
purchase on the logo link, then the vendor pays commissions to the partner.
• Viral marketing: recipients of your marketing notices send information about your products to
their friends.
• Group purchasing (e-coops): small buyers aggregate demand to create a large volume then
conducts tending or negotiates a low price
• Product customization: customers use the internet to self-configure products or services, sellers
then price and fulfill them quickly.
Electronic payment mechanisms: enables buyers to pay for goods and services electronically through
writing a cheque or using cash.
• Electronic cards
o Electronic credit (or debit) cards: allow customers to charge online payments to their
credit or debit card account.
o Stored-value money cards: allows you to store a fixed amount of prepaid money and
then spend it as necessary
o EMV Smart cards (Europay, MasterCard, and Visa): contains a chip that can store a large
amount of information as well as on a magnetic stripe for backward compatibility.
Payment gateway: an application that authorizes payments for e-businesses, online retailers,
bricks-and-clicks businesses, or traditional brick-and-mortar businesses.
o Interact with the card issuers bank to authorize the card in real time when purchase is
made.
How e-credit cards work. (The numbers 1–9 indicate the sequence of activities.)
1. When you purchase a book from Amazon, for example, your credit card information and purchase amount are encrypted in your
browser. This procedure ensures the information is safe while it is “travelling” on the Internet to Amazon.
2. When your information arrives at Amazon, it is not opened. Rather, it is transferred automatically (in encrypted form) to a
clearinghouse, where it is decrypted for verification and authorization.
3. The clearinghouse asks the bank that issued you your credit card (the card issuer bank) to verify your credit card information.
4. Your card issuer bank verifies your credit card information and reports this to the clearinghouse.
5. The clearinghouse reports the result of the verification of your credit card to Amazon.
6. Amazon reports a successful purchase and amount to you.
7. Your card issuer bank sends funds in the amount of the purchase to Amazon’s bank.
8. Your card issuer bank notifies you (either electronically or in your monthly statement) of the debit on your credit card.
9. Amazon’s bank notifies Amazon of the funds credited to its account.
Benefits and Limitations of E-Commerce
Benefits
• Deliver information, services, and products to people in cities, rural areas, and developing
countries
Limitations
-B2C is complex, involves a large number of buyers, and diverse transactions from a
• Electronic retailing: the direct sale of products and services through electronic
storefronts or electronic malls.
Benefits of E-Commerce
Electronic storefront: a website that represents a single store (each with its own URL or internet
address)
Electronic mall: a collection of individual shops under a single internet address (aka a cybermall)
• Online Service Industries
• Disintermediation
Consider:
• How could you improve the way that you process your financial transactions?
• How many different methods do you use to pay for products or services?
• Consumers link a bank account to a smartphone app to send money to recipients email
address or phone number (ex: Canadas interac e-transfer)
• Sites used for job seekers to help find available positions (ex: www.indeed.ca)
• Travel services
• Online travel services used to purchase airline tickets, reserve hotel rooms, and
rent cars
• A costly problem: e-commerce may cause “mistake fare” in the airline
industry (ex: a ticket selling for 300$ when its 1200$)
• Online advertising
>content creators employ a business model to increase the number of impressions they deliver:
o Banners
o Pop-up ad
o Pop-under ad
• Use reports and non-advertising revenue sources (ex-selling reports to companies willing to pay
for useful information)
Concerns with full screen ad takeovers, and cookies that track users web visits, and clicks
enables them to put on ad blockers-ad-blocking software
Types of Ad Blockers:
Ad blockers that stop every ad and tracker
Ad blockers that are for profit businesses
Ad blockers that collect data (ex. Data gathered on about ads and trackers before blocking)
Ads that use a freemium model (ex. A free app with additional ad blocking features you pay for)
Ad blockers that are functioning of operating systems (ex. Google chrome blocking annoying ads
from sites)
Issues in E-Tailing
e-tailing: refers to electronic retailing and the specific activities related to selling retail products and
services via the internet
• Channel conflict: the alienation of existing distributors when a company decides to sell
customers directly online.
• Multichanneling: a process in which a company integrates its online and offline channels
• Showrooming: occurs when shoppers visit a brick and mortar store to examine a
product in person to then conduct online research from competitors to compare
products.
• Order fulfillment
• Order fulfillment for B2C is difficult due to the abundance of orders, and the efficiency
to complete them.
• Personalized pricing
Today consumers can use standardized pricing: a product that is sold through multiple channels, the
cost should only vary on the difference in shipping, taxation, and distribution costs
• Merchants will try to maximize the price the consumer is willing to pay by:
• Analyzing big data that consumers generate such as the swiping of there
rewards cards, and placing items in shopping carts that can gives insight into the
profit maximizing price
• Reservation price: the maximum amount they would be willing to pay for a
specific product before they reconsider
Tips for Personalized Pricing – To Acquire Data on Pricing To Have A Competitive Advantage
• Use of mystery shoppers to acquire prices from brick-and-mortar retailers.
• Scraping: bots used to scan rival websites and collect data on competitor prices
B2B Electronic Commerce: enterprise forming electronic relationships with resellers, suppliers,
customers and other partners
• Procurement: the function that describes the activites and processes to acquire goods
and services
• Purchasing: refers to the process of ordering and receiving goods and services
• Group purchasing: multiple buyers combine their orders so that they constitute
a large volume and attract seller attention
• Electronic Exchanges: e-markets owned by a third party and they connect many sellers with
many buyers
• direct: inputs to the manufacturing process (ex. Safety glass used for
automobile windshields and windows)
• Functional exchanges: needed services such as temporary help or extra office space
are traded on an as needed basis
Consider:
• Would you pay more to a local distributor with whom you had a high-quality relationship
instead of using Amazon? Why or why not?
• Could Amazon put small distributors out of business? Why or why not?
• Yes, amazon offers over 50,000 products online, selling goods in both B2C and B2B
marketplaces
• Amazon offers specialty products a click away, two-day deliver, huge specialty product
list, and easy-to-use website
• Ethical Issues
• Privacy
Tracking
• EC eliminates positions
Internet Fraud
• Fraud Auctions
• Bogus Investments
• Domain name considered legal if company operated a legitimate business under it for
some time
• Cybersquatting
• Practice of registering or using domain names for the purpose of profiting from the
good will or the trademark that belongs to someone else
• Domain tasting: lets registrars profit from the complex money trail of
pay-per-click advertising
• responsibility of the e-commerce retailer to collect the federal and provincial tax
• Copyright
• Violation to copy rights is copying material from website with permission, distributing
material.
Consider:
• How does the quality of the vendor’s website affect your buying decisions?
• Shopify launched an chat option, shopify chat that allows merchants to have real-time
conversations with customers
• Shopify launched shopify studios allowing small media production companies to market
their media products
Chapter 11
Think about:
• What are the features and characteristics of a good checkout experience at a shopping website?
• How does software like Splunk help organizations deal with unreported customer problems
(such as abandoned shopping carts)?
• Tesco used Splunk enterprise a software for searching, monitoring and analyzing
large machine-generated datasets to troubleshoot customer service date needs
to which they encountered an issue with connectivity in their checkout flow.
• Customer relationship has become more impersonal with the Internet – why?
CRM Process
Low end crm systems: designed for enterprises with many small customers (ex. Amazon)
High-end crm systems: designed for enterprises with few large customers (ex. Bentley Motors)
• Customer touch points that need to be managed by CRM systems such as emails,
websites and smartphone communication
• Used to help channel conflicts when businesses have need put their touch
points in sync
• Would you consider purchasing custom clothing for a better fit? How would you use the Internet
to find a suitable store?
• Website offers a style guide who takes customers measurements to ensure a proper
fitting suit.
• What types of contact would you prefer from a clothing store? Why? Compare these to Figure
11.2.
• Indochino sends out automatic emails about loyalty programs, promotions and style
advice.
• Data Consolidation
o Collaborative CRM
• Support front-office processes – those that directly interact with customers that is sales,
marketing and service
• Two Major Components of Operational Crm Systems
o Customer-facing applications
o Customer-touching applications
o The ability of sales and service employees to access a complete history of customer
interaction with the organization, regardless of the touch point
Customer-Facing Applications
Customer facing crm applications: an organizations sales, field service, and customer interaction centre
representatives interact directly with customers
• call centre: is centralized office set up to receive and transmit a large volume of requests
by telephone
SFA Systems:
• Contact management system: tracks all communications between the company and the
customer, the purpose of each communication, and follow up
• Sales lead tracking system: list potential customers or customers who have purchased related
products that are similar to what the salesperson is trying to sell to the customer
• Configurators: systems that provide online product building features to target consumers
specific needs
• Marketing
• CRM systems enable marketers to identify, target best customers, manage marketing
campaigns and generate quality leads for sales teams
• CRM marketing applications sift through large volumes of data in a process called data
mining to develop a purchasing profile – a snapshot of a consumers buying habits that
may lead to additional sales through upselling, cross-selling, and bundling.
• Campaign management: applications that help organisations plan campaigns that send the right
messages to the right people through the right channels.
Customer-Touching Application
(a.k.a. e-CRM)
Customer touching applications: Applications and technologies with which customers interact and
typically help themselves
• Organizations offer mass customization to which customers can configure their own
products
• Personalized webpages
• Organisations permit personalized web pages that customers record purchases and
preferences as well as problems and requests.
• FAQs
• FAQ Tool used by consumers that helps find information they need
• Email and automated response
• Loyalty programs
• loyalty program: Recognizes customers who purely use a vendors products or services
Analytical Crm Systems: A CRM system that analyzes customer behaviour and perceptions in order to
provide actionable business intelligence.
For example, analytical CRM systems typically provide information concerning customer requests and
transactions, as well as customer responses to the organization’s marketing, sales, and service
initiatives.
• Analytical CRM systems analyze customer data for a variety of purposes, including:
o Providing input into decisions relating to products and services (e.g., pricing and product
development)
Consider:
• How would data integration with the functional areas of HR be beneficial to Sun Life Financial?
• Sun Life Financials Two Departments, The Distribution and Marketing Team and The Sun
Life Career Sales Force team work in collorabation to sell the companys insurance and
investments products but they work in independently causing lost productivity on data
entry and handling as there were large amounts of data
• What information systems architecture would be required to implement systems like those at
Sun Life Financial?
FIGURE 11.3 The relationship between operational CRM and analytical CRM
• On demand crm systems: A CRM system that is hosted by an external vendor in the
vendor’s data centre. Also known as utility computing or software-as-a-service,
• Open-source crm systems: CRM software whose source code is available to developers
and users
• Social crm: the use of social media technology and services to enable organizations to
enable organizations to engage their customers in collaborative conversation in order to
provide mutually beneficial value in a trusted and transparent manner
• Real-time CRM
• Real time crm systems: help organizations to respond to customers product searches,
requests, complaints, comments, ratings, reviews and recommendations in real time
Consider:
• Do you pay attention to the “recommender” systems at the websites where you shop?
• How are recommender systems related to customer profiles and potential increased sales to
customers?
• Recommendation systems is a tool that uses algorithms to predict what users will or will
not like.
• Organizations recognize suppliers can supply goods and service they need more efficiently then
they can, this trend of relying on an increasing number of suppliers has led to the concept of
supply chains
o Supply chain: the flow of material, information, money and services from raw material
suppliers, through warehouses to end customers
Includes the processes that create and deliver products, information, and
services to end users
o Supply chain visibility: refers to the ability of the organizations within a supply chain to
access relevant data on purchased materials as these materials move through their
suppliers production processes and transportation networks to their receiving docks
Inventory velocity: The quicker a company can deliver products and services
after receiving the material to make them – the more satisfied customers will be
o Supply chain information is obtain through sensors, RFID Tags, meters, GPS and other
devices and systems
• Supply chain managers select suppliers to deliver the goods and services
the company needs to product its product or service
• Tiers of suppliers
• Tier 2: Sub-assemblies (ex: supplier uses basic inputs to make windshield, tires and
plastic mouldings)
• Materials flows: the physical products, raw material, supplies and so forth that
flow along the chain
• Financial flows: involve money transfers, payments, credit card information and
authorization, payment schedules, e-payments and credit related data
11.5 Supply Chain Management
Supply chain management: An activity in which the leadership of an organization provides extensive
oversight for the partnerships and processes that compose the supply chain and leverages these
relationships to provide an operational advantage.
- In other words: to improve the processes a company uses to acquire the raw materials it
needs to produce a product or service and then deliver that product or service to its
customers
• Plan: In SCM, organizations must have a strategy for managing all their resources
involved in meeting customer demand for their product or services.
• Source: IN SCM, organizations chose the suppliers to deliver the goods and services they
need to create their product or services
• Make: In SCM, this is the manufacturing component, supply chain managers schedule
the activities for production, testing, packaging and preparation for delivery.
• Deliver: In SCM, this is logistics, organizations coordinate the receipt fo customer orders,
develop a network of warehouses, select carriers to transport products to consumers,
and create an invoicing system to receive payments
• Return: In SCM, supply chain managers, must create a network for receiving defective,
returned, or excess products from their customers
SCM are a type of interorganizational information system: information flows from two or more
organizations
• Push model: a scrm system, known as a make-to-stock to which the production process
begins with a forecast on customer demand
• Pull model: a scrm system, known as a make-to-order, the production process begins
with a customer order
• Company makes order on what customers want, typically by mass customization
• The need to coordinate multiple activities, internal units, and business partners
• Bullwhip effect: refers to erratic shifts in orders up and down the supply chain
Consider:
• How many different organizations do you buy from to have products shipped to your home?
• Flexe uses a vacant warehouse space close to customers to provide rapid delivery
• How does the Flexe infrastructure facilitate cultural responsiveness to emergency situations
such as the COVID-19 pandemic?
• Flex helps brick-and-mortar retailers struggling to compete with the online retailer
Amazon without having to make huge investments in new facilities
• Using inventories to solve supply chain problems – holding too much or too little inventory can
be costly
• Building inventories
• Just-in-time (JIT) inventory system: An inventory system in which a supplier delivers the
precise number of parts to be assembled into a finished product at precisely the right
time.
• Ex: For example, Walmart provides Procter & Gamble (P&G) with access to daily sales
information from every store for every item that P&G makes for Walmart. This access
enables P&G to manage the inventory replenishment for Walmart’s stor
• Vendor-managed inventory (VMI): occurs when the supplier, rather than the retailer,
manages the entire inventory process for a particular product or group of products
• Zara uses the push method by employing seasonal fashion, manufacturing the inventory before
the beginning of the season
• Zara uses the push method by manufacturing fast fashion based on short term 2-6 week
demand forecasts
• Zara uses the push method by making early forecasts of the number of clothing items they will
need to manufacture and buys large quantities of fabrics based on these forecasts
• Edi formats these documents based on agreed upon standards then it transmits
messages over the internet using a convertor called a translator
FIGURE 11.6 Comparing purchase order (PO) fulfillment without EDI
• Extranets
To implement IOS and SCM systems, a company must connect the intranets of their business
partners to create extranets
Extranets: link business partners over the internet by providing them access to certain areas of
each other’s corporate intranets
• Benefits are faster process and information flow, improved order entry and
customer service, and lower costs in communication
o An industry’s extranet
• Major industry players create an extranet that will benefit them all
• Partners ina joint venture use an extranet as a vechicle for communication and
collaboration
o A single point of access through a web browser where b2b supply chain management
that enable companies and suppliers to collaborate
• Emerging Technologies:
• Robots
• Robots can work under all conditions, they don’t take breaks
• Drone
• Customer delivery
• Running shoes: Nike, adidas, and New Balance are experimenting with
3D printing soles designed specifically for the user.
Chapter 12
Think about:
• How many different types of data are Stitch Fix and the fashion industry using?
• Stitch fix matches clients with boutique brand clothes, shoes, and accessories based on
recommendations from analytics algorithms
• Stitch Fix, algorithms identify attributes of clothing that have a high probability of client
acceptance
• Stitch fix uses algorithms to predict how many customers are buying pants, and then
instruct manufacturers to produce in place of an order
• How much of the data being disclosed by customers could be considered private or
confidential? Why
• Stitch fix collects data on each customer such as her weight, bra size, and links to social media
profiles
• Stitch fix uses customer data to predict how likely one is to keep an item in their 5 item styling
fee box such as age, zip code, height, and size
Introduction
Business analytics (BA) is the process of developing actionable decisions or recommendations for actions
based on insights generated from historical data.
Business analytics involves using different tools to analyze data, create models that can predict
outcomes which are descriptive, perspective, and predictive , and then presenting these results
to decision-makers in an organization.
Business intelligence: defined as a broad category of applications, technology and processes for
gathering, storing, accessing, and analyzing data to help business users make better decisions
User drive analysis: User-driven analysis is a method where user needs and preferences are
important in analyzing data. It involves collecting and analyzing user feedback and
interactions with a product or service to improve it. The goal is to create products that satisfy
the user and increase their engagement.
Management: a process by which an organization achieves it goals through the use of resources (people,
money, materials and information)
1. Intelligence
2. Design
3. Choice
Intelligence phase: in which managers examine a situation and then identify and define the problem or
opportunity
Design phase: Decision makers create a model to address a situation, simplifying reality by
making assumptions and representing the relationships among relevant variables. The model is
validated with test data to ensure accuracy.
Choice phase: involves selecting a solution or course of action that seems best suited to resolve
the problem
• Often necessary to rapidly access remote information, consult with experts, or conduct
a group decision-making session
`
• A Framework for Computerized Decision Analysis
Two Major Dimensions To Understand Business Analytics: problem structure and the nature of the
decision
Problem Structure
In which decision makers processes fall along a continuum ranging from highly structed to highly
unstructured
• Problem structure
o Structured:` deal with routine and repetitive problems for which standard solutions exist
such as inventory control
• first three phases of the decision process include intelligence, decision, and
choice laid in a particular sequence and the procedures for obtaining the best
solutions are known.
o Unstructured: decisions that are intended to deal with complex problem with there no
cut solutions
• Nature of decisions
• Strategic planning: the long range goals and policies for growth
and resource allocation
decision support matrix: a combination of the three primary classes of problem structure in the
three broad categories of the nature of decisions into nine cells.
lower level managers perform the tasks in cells 1-2 and four
middle managers perform the tasks and sells 3-5 and seven
seniors executives perform the tasks and cells 6-8-9
o The development of one or a few related analytics applications: target is often a point
solution for a departmental need, such as a campaign management in marketing
• Within this target, a company uses business analytics to transform the ways it
competes in the marketplace
Underlying Technologies
Ex. Advances in digital storage capacity, access speed are driving costs down meaning
organizations are able to store and analyze huge amounts of data
Data Management
To begin ba process an organization must have data which originates from internal sources, such as
structed data in relation databases and external sources such as unstructured data from social media.
Then organizations integrate and clean these data these into data marts warehouses through a process
called extract, transform and load
once results are attained and presented in the analytics process decision makers must be ready
to ask the next question
• Excel
• Data mining
• Decision-support systems
• Statistical procedures: descriptive statistics; affinity analysis; liner, multiple and logistic
regression; and others
• Descriptive analytics: summarizes what has happened in the past and enables decision makers to learn
from past behaviours
• Online analytical processing: both slicing and dicing the data that is stored in a
dimensional format, drilling down in the data to greater detail coma and rolling up data
to greater summarization
• Ex: the data cube. To find out how many nuts a company sold in the West
region in 2019, you can use a data cube with the product on the x-axis,
geography on the y-axis, and time on the z-axis. By selecting nuts as the
product, West as the geography, and 2019 as the time, you can slice and
dice the cube to get the desired information. The value(s) remaining in
the cell(s) after this process will give you the answer.
o Data mining: refers to the process of searching for valuable business information in a
large database, data warehouse, or data Mart
• Ex: how much will the monthly mortgage payment changes the
mortgage rate is increased by 0.2, or 0.5 percentage points
• What-if analysis: predict the impact of changes in the assumptions that is input
data on the proposed solution
• Ex: what will happen to the total inventory cost of the original assume
costs of caring inventories is 12% rather than 10% and the demand is
10% less than the prediction
• Ex: for example let's say an initial BI analysis predicted a profit of 2mil
the management wanted to know what sales volume would be
necessary to generate a profit of 3mil
• How are different stakeholders (the doctor, the patient, the pharmacy company, and the
insurance company) affected by the use of Insight4Care?
• Insight4Care provides real time access to EMR data at the level of population
• How does the infrastructure of electronic medical records (EMR data) facilitate the use of
Insight4Care
• I4c Dashboards provide physicians with real0time access to EMR data at the level of
population
• Insight4Care was used as a tool to provide clinicians with insight into the data they input
into the system
• Predictive analytics: examines recent and historical data to detect patterns and predict future
outcomes and trends
o Predictive analysis is (2) of data mining they can predict trends and behaviours
o Example of PA: detecting fraudulent credit card transactions. Over time, a pattern
emerges of the typical ways you use your credit card and your typical shopping
behaviours—the places in which you use your card, the amounts you spend, and so on.
• Examples of fields where data mining (predictive analytics) applications are used:
o Retailing and sales, banking: Forecasting levels of bad loans and fraudulent credit card
use, predicting credit card spending by new customers, and determining which kinds of
customers will best respond to (and qualify for) new loan offers.
o Manufacturing and production: Predicting machinery failures and finding key factors
that help optimize manufacturing capacity.
o Insurance, police work: Forecasting claim amounts and medical coverage costs,
classifying the most important elements that affect medical coverage, and predicting
which customers will buy new insurance policies.
o Police work: Tracking crime patterns, locations, and criminal behaviour in order to
predict where and when future crimes might occur
o Health care: Correlating demographics of patients with critical illnesses and developing
better insights on how to identify and treat symptoms and their causes.
o Marketing, politics (not in here): Classifying customer demographics that can be used to
predict which customers will respond to a mailing or buy a particular produc
o Weather, social good (not in here): The U.S. National Weather Service is predicting the
weather with increasing accuracy and precision by analyzing myriad variables, including
past and present atmospheric conditions, location, temperature, air pressure, wind
speed, and many others.
Consider:
• How was Aldo’s use of business analytics a win-win situation for the company, for customers,
and for employees?
• Aldo used business analytics for its order fulfillment process as through its recall process
of the leftover inventory there was too much wasted stock.
• How could business analytics help different functional areas at Aldo (sales, warehousing,
accounting)?
• Celect, a cloud-based analytics platform owned by Nike, helps retailers optimize their inventory
portfolios. It optimizes fulfillment for digital orders, which include e-commerce, mobile app, or in-
store orders for out-of-stock items to be shipped from another store or warehouse.
• Celect uses Aldo's data to figure out what customers tend to buy and predict what they will buy in
the future at different stores. This helps Aldo figure out what each store needs in stock.
• Aldo has benefited from using Celect to optimize their fulfillment. They've seen a 6 to 1 return on
investment and were able to process over 350,000 units during the Black Friday weekend and
Cyber Monday. By following the recommendations of the analytics tool, Aldo has made the right
inventory decisions and had up to 12% more in-store sales. This is because they kept inventory in
stores to satisfy local demand instead of using it to fulfill online orders.
Consider:
• If you are (or were) single, would you use an online dating service? Why or why not?
• College aged adults are more likely to be online daters
• How much information would you be willing to share with such a service? What concerns (if
any) would you have for the privacy of your data?
• EHarmony collects four types of data: demographic age, psychographic data such as interests,
and habits, behavioural data such as actions taken by users on the site, and data on couples
who met through the service
Consider:
• What are some other places where systematic biases could be an issue in our culture or society?
• The LAPD started using Palantir in 2009 to find people who are likely to
commit crimes. They gather data from various sources to create a list of
"chronic offenders" who are at high risk of reoffending. The police give
this list to patrol officers who are told to watch these people closely and
stop them whenever possible for minor offenses like jaywalking or a
broken tail-light. Officers fill out a card with the person's information
and observations, and this data goes into the Palantir system. This
system creates a large database of people under surveillance that police
can access without a warrant.
• Reports propagate disproportionate high arrests of black
Angelinos
• How could predictive analytics algorithms be modified to reduce or eliminate systematic biases?
Algorithms can be biased because they rely on the data they are given. For example, if data
comes from a city where certain neighborhoods with people of color are over-policed, then the
algorithms will also show this bias. This can lead to innocent people being targeted for police
surveillance just because they live in those neighborhoods or know people who have been
involved in crime even if they were never done anything wrong in their lives.
• optimization
• simulation
• decision trees
Consider:
• How did the use of IT (the BA systems) help to integrate the UPS operations?
• UPS began equipping its delivery trucks with Bluetooth receivers to reduce
incorrectly loaded packages. The receivers emit a loud beep if a worker puts a
package into a vehicle that is not going to the package’s destination. When
workers enter the correct truck, a different beep confirms that they are in the
right place.
• How did wireless technologies such as GPS and hand-held devices enable UPS to
implement its operational improvements?
UPS started using ORION in 2012, which optimizes drivers' routes based on packages, customer
needs, and UPS rules. ORION can adjust routes based on weather and accidents and continually
optimize the remaining deliveries.
• Dashboards provide easy access to timely information and direct access to management
reports – known as data visualization
• Characteristics include:
o User-friendly, supported by graphics
o Enables management to examine exception reports and drill down into detailed data
Example of dashboards
Geographic information systems: is a computer based system for capturing, integrating, manipulating
and displaying data using digitized maps
Chapter 13
Think about:
• What are the types of feedback that users, such as Paychex employees, can provide for new
systems?
Organizations have to weigh the costs & benefits of investing in specific it applications.
Application portfolio: generates a list of both existing and potential it applications.
IT Planning
Planning Process:
IT Strategic Plan
It Strategic Plan: a set of long range goals that describe the it frastructure
o It must provide for an IT architecture that seamlessly networks users, applications, and
database
• IS environment: a summary of the information needs of the individual functional areas and of
the organization as a whole
• Constraints on the IS function: technological, financial, personnel and other resource limitations
on the IS function
• The application portfolio: a prioritized inventory of present applications and a detailed plan of
projects to be developed or continued during the current year
Challenges
Costs associated with maintain, debugging and improving the system over many years.
o A company has to assess the costs and benefits & compare them.
• the net present value (NPV) method is a way to figure out if the benefits
of a project or investment are worth more than the costs. It does this by
calculating the present-day value of future benefits, which considers the
time value of money and the organization's cost of funds. If the present
value of benefits is greater than the cost required to achieve them, then
the investment or project is considered financially viable.
• Breakeven analysis: determines the point at which the cumulative dollar value
of the benefits from a project equals the investment made in the project.
o A good option if the software vendor allows the company to modify the application to
meet needs
• Lease the application
o Attractive to small companies, large companies, companies that don’t have sufficient it
personnel to develop custom It applications, companies that can’t afford to wait for
strategic applications to be developed in-house.
• Lease the application from a software developer, install it, and run it on the
companies platform, the vendor assists with installation and maintenance of
the system
o application service provider (ASP) is an agent or a vendor that assembles the software
needed by enterprises and then packages it with services such as development,
operations, and maintenance
• Outsourcing
• How It is developled:
o 1. Starts with an it steering committee who choses the suggestions for a new system
coming from users
Consider:
• How the global economy and the Internet result in an innovation rapidly becoming a
requirement (e.g., Starchup in 2016 was an innovation, but is not considered one now). What
other IT services are new but commonplace?
• How many cleaning apps are there in your neighbourhood? Do they seem to be easy to use?
Gigster operates a business model similar to Uber or Lyft, but instead of sharing vehicles,
it allows the sharing of expensive software developers. The company provides on-
demand software development and design services, primarily to entrepreneurs and
small- to medium-sized businesses. Gigster has a rigorous selection process for its
designers and developers, hiring only about 7% of applicants. This ensures that their
customers can expect high-quality programming work for their app, with a quote and
development timeline provided within minutes of the initial chat.
o Systems investigation
o Systems analysis
o Systems design
o Implementation
Users: employees from all functional areas of the organizations who interact with the system
either directly or indirectly
Systems analysts: is professionals who specialize in analyzing and designing information systems
Programmer: is professionals who either modify existing computer programs or write new
programs to satisfy user requirements
Technical specialists: experts on a certain type of technology
Systems stakeholders: everyone who is affected by changed in a company’s information
systems
Feasibility study: analyzes which of these three solutions best fits the particular business problem
o Hidden backlog: which are projects that the it department is not aware of.
Advantages
Disadvantages
May produce excessive documentation.
Users may be unwilling or unable to study the approved specifications.
Takes too long to progress from the original ideas to a working system.
Users have trouble describing requirements for a proposed system.
Prototyping
Advantages
Advantages
Disadvantages
Advantages
Disadvantages
Advantages
Disadvantages
Produces functional components of final systems, but not the final systems themselves.
End-User Development
Advantages
Disadvantages
Object-Oriented Development
Advantages
Disadvantages
Works best with systems of more limited scope (i.e., with systems that do not have huge numbers of objects).
SDLC: Implementation
• Implementation (i.e., deployment): the process of converting
from an old computer system to a new one
• Conversion strategies:
o Direct conversion: the old system is cut off, and the new
system is turned on at a certain point in time.
o Pilot conversion: introduces the new system in one part of
the organization, such as in one plant or one functional
area., then accessed and implemented if worked
o Phased conversion: introduces components of the new
system, such as individual modules, in stages. Each module
is assessed. If it works properly, then other modules are
introduced until the entire new system is operational.
o Parallel conversion (or historic parallel): in which the old
and new systems operate simultaneously for a time
• Prototyping
• Prototyping: approach defines an initial list of user
requirements, builds a model of the system, and then
refines the system in several iterations based on users’
feedback.
• Prototype: a smaller version of a larger system
• Two types: contains only the components of the
new system that most interests users, or small
scale working model of the entire system
• Integrated computer-assisted software engineering tools (iCASE
and CASE, upper CASE, lower CASE)
• refers to a group of tools that automate many of the tasks
in the SDLC.
• The tools that are used to automate the early stages
of the SDLC (systems investigation, analysis, and
design) are called upper CASE tools.
• The tools used to automate later stages in the SDLC
are called lower case tools
• Integrated case tools: links between upper case
and lower case tools
• Component-based development
• Component based development uses standard components
to build applications
• Object-oriented development
• Object oriented development: based on a different view of
computer systems than the perception that characterizes
traditional development approaches.
• Traditional approaches can produce a system that
performs the original task but may not be suited for
handling other tasks.
• Object oriented system: begins with the task to be
performed with aspects of real world that must be
modelled to perform tasks.
• Containers
• Containers: the method of developing applications that run
independently of the base operating system of the server
• Allows application providers to develop, text and
deploy technology that will run in practice like it does
in testing,
Low-code development platforms (LCDP)
Low-code Development Platforms (LCDPs) make use of visual
interfaces to develop applications rather than traditional
procedural hand-coding.
o Rapid development (reduces amount of code written)
Vocabulary
Business analytics (BA) refers to the skills, technologies, and practices for continuous iterative
exploration and investigation of past business performance to gain insight and drive business planning