Learning Objectives Learning Objectives
Learning Objectives Learning Objectives
2. Define the term supply chain management and explain the role that 6. Explain how the CRM and BI trends relate to one another.
supply chain management applications play in modern organizations.
7. Understand the principal security threats to modern organizations, both
3. Describe the term knowledge management, categorize the different types internal and external, and the principal safeguards available to mitigate
of knowledge commonly found in organizations, and explain why these risks.
organizations feel the need to employ knowledge management
applications. 8. Understand the basic IT risk management processes, including risk
assessment, risk analysis, and risk mitigation.
4. Define the terms business intelligence (BI) and BI infrastructure. Be able
to identify and describe the role of the technologies that comprise a 9. Define ethics, apply the concept of ethical behavior to information
modern BI infrastructure. systems decisions, and be able to articulate how general and functional
managers can help ensure that their organization behaves ethically.
1 2
11. Understand the basic principles of network economics, including the sources of value in
networks and the definitions of physical and virtual networks. Apply these concepts to strategy
and managerial decision making.
12. Differentiate disruptive and sustaining technologies and draw implications for decision making
What managers need to know about
in organizations faced with the emergence of disruptive technologies.
the emerging and enduring trends in
13. Be able to define and differentiate the terms electronic commerce and electronic business and
provide examples of each. Information Systems management
14. Identify the enablers of electronic commerce trends.
16. Define the terms business model, and revenue model. Identify the principal revenue models
employed in electronic commerce.
17. Describe the implications of electronic commerce for both established firms and new entrants.
18. Discuss some of the more relevant future electronic commerce and electronic business trends.
3 4
5 6
1
2/8/2024
7 8
• Configurable • Efficiency
– Enterprise Systems are parameterized – ESs are able to rein in complex, generally
– Firms choose among a predefined set of hard-to-mange and support legacy IT
configuration options during the infrastructures
implementation of the application
– Potential to reduce direct costs
– The firm can extend the capabilities of the
• Example: No redundant data entry
standard application by creating “bolt-on
modules” – Potential to reduce indirect costs by
– This customization process further tailors the streamlining business processes and
ES to the specific needs of the organization operations
9 10
• Responsiveness • Adaptability
– ESs can deliver improvements in the firm’s – Offer a degree of customizability rarely
ability to respond to customers and market offered by off-the-shelf applications
demands – Achieved through the use of configuration
• Knowledge Infusion tables and bolt-on functionality
– The application embeds the state of the art in
industry practice
– ES can be used to update obsolete business
processes within the firm
11 12
2
2/8/2024
13 14
15 16
17 18
3
2/8/2024
19 20
ERP Legacy
Application
Middleware
Legacy SCM
Application
Database Database
2 1
21 22
Knowledge Knowledge
23 24
4
2/8/2024
25 26
27 28
29 30
5
2/8/2024
Components of BI Components of BI
31 32
Customer Relationship
Components of BI
Management
• Data Mining: • CRM is a strategic initiative, not a technology
– The process of automatically discovering non-obvious • CRM relies on transactional data and is
relationships in large databases. designed to help the firm learn about customers
– Used to analyze historical information
• Designed to use data to make inferences about
– Machine-driven
customer:
• Possible Patterns: – Behaviors
– Associations – Needs
– Sequences
• The objective is to create value for the firm by
– Classifications
optimizing the relationship with each customer
– Forecasting
33 34
35 36
6
2/8/2024
• In CMIs customer data is stored and • CMI is not only about the lowest prices
managed by the customer – CMI completion may depend on lower price
• CMI solves the limitations of CRM – More likely will stem from the quality of the
initiatives: recommendation
– The customer’s personal data warehouse
holds complete historical information
• CMI technology
– Future events are more likely known – The Internet provides the infrastructure for
data transfer
– Inferences are more precise
– Falling costs of storage make personal data
• Infomediaries may maintain customers’
warehouses a feasible alternative
data warehouses
37 38
39 40
41 42
7
2/8/2024
43 44
45 46
47 48
8
2/8/2024
49 50
51 52
53 54
9
2/8/2024
55 56
Managing Security:
Privacy
Overall Guidelines
• Have a plan and specify responsibilities
• The ability of individuals to control the
– Who should be contacted in an emergency?
– What should the first reaction measures be?
terms and conditions under which their
personal information is collected,
• Revisit often
– New technologies should be proactively addressed
managed, and utilized.
• Develop a mitigation plan • Private information can be traced back to
– Determine how the attack took place the individual
– Assess the damage • Privacy subsumes security
• Waiting for a crisis to take these decisions and
develop policy is too late!
57 58
59 60
10
2/8/2024
61 62
63 64
65 66
11
2/8/2024
67 68
69 70
71 72
12
2/8/2024
73 74
75 76
77 78
13
2/8/2024
79 80
81 82
83 84
14
2/8/2024
85 86
87 88
89 90
15
2/8/2024
91 92
93 94
95 96
16
2/8/2024
97 98
99 100
101 102
17
2/8/2024
103 104
105 106
the attributes of the disruptive technology 3. Describe the term knowledge management, categorize the different types
of knowledge commonly found in organizations, and explain why
• Spin off a new division exclusively organizations feel the need to employ knowledge management
applications.
focusing on the commercialization of 4. Define the terms business intelligence (BI) and BI infrastructure. Be able
products based on the disruptive to identify and describe the role of the technologies that comprise a
modern BI infrastructure.
technology
107 108
18
2/8/2024
7. Understand the principal security threats to modern organizations, both 12. Differentiate disruptive and sustaining technologies and draw implications for decision making
internal and external, and the principal safeguards available to mitigate in organizations faced with the emergence of disruptive technologies.
these risks. 13. Be able to define and differentiate the terms electronic commerce and electronic business and
provide examples of each.
8. Understand the basic IT risk management processes, including risk
14. Identify the enablers of electronic commerce trends.
assessment, risk analysis, and risk mitigation.
15. Categorize electronic commerce phenomena on several important dimensions.
9. Define ethics, apply the concept of ethical behavior to information
16. Define the terms business model, and revenue model. Identify the principal revenue models
systems decisions, and be able to articulate how general and functional employed in electronic commerce.
managers can help ensure that their organization behaves ethically.
17. Describe the implications of electronic commerce for both established firms and new entrants.
18. Discuss some of the more relevant future electronic commerce and electronic business trends.
109 110
19