Information Management
Information Management
Information Management
Chapter
Doing Business
1 in Digital Times
Learning Outcomes
1. Describe the use of digital technology in every facet of 4. Describe enterprise technology trends and explain how
business and how digital channels are being leveraged. they influence strategy and operations.
2. Explain the types, sources, characteristics, and control 5. Assess how IT adds value to your career path and per-
of enterprise data, and what can be accomplished with formance, and the positive outlook for IT management
near real time data. careers.
3. Identify the five forces of competitive advantage and
evaluate how they are reinforced by IT.
Chapter Snapshot
Make no mistake. Businesses are experiencing a digital Think how much of your day you have your phone
transformation as digital technology enables changes nearby—and how many times you check it. Nearly
unimaginable a decade ago. High-performance organi- 80 percent of people carry their phone for all but two
zations are taking advantage of what is newly possible hours of their day; and 25 per cent of 18- to 44-year-olds
from innovations in mobile, social, cloud, big data, data cannot remember not having their phone with them
analytics, and visualization technologies. These digital (Cooper, 2013).
forces enable unprecedented levels of connectivity, or As a business leader, you will want to know what
connectedness, as listed in Figure 1.1. steps to take to get a jump on the mobile, social, cloud,
1
Big data are datasets whose
size and speed are beyond An estimated 15 billion
the ability of typical database devices are connected to
Over 1 million websites
the Internet—forecasted
software tools to capture, engage in Facebook
to hit 50 billion by 2020
e-commerce.
store, manage, and analyze. as more devices connect
Examples are machine- via mobile networks.
generated data and social
media texts.
More data are collected in
Data analytics refers to the Over 200 million social a day now than existed in
use of software and statistics Figure 1.1 We are in media users are mobile the world 10 years ago.
the era of mobile-social- only, never accessing it Half of all data are in the
to find meaningful insight
cloud-big data that from a desktop or laptop. cloud and generated
in the data, or better under- Mobile use generates 30%
shape business strate- by mobile and social
stand the data. gies and day-to-day of Facebook’s ad revenue. activities—known as big
data.
Data visualization (viz) tools operations.
make it easier to understand
data at a glance by display-
ing data in summarized big data, analytics, and visualization technologies that will move your businesses
formats, such as dashboards forward. Faced with opportunities and challenges, you need to know how to lever-
and maps, and by enabling age them before or better than your competitors.
drill-down to the detailed In this opening chapter, you read about the powerful impacts of digital technol-
data. ogy on management, business, government, entertainment, society, and those it will
have on the future. You learn of the latest digital trends taking place across indus-
tries and organizations—small and medium businesses, multinational corporations,
government agencies, the health-care industry, and nonprofits.
COMPANY OVERVIEW You most likely have eaten McCain Foods products (Figure 1.2, Table 1.1). McCain
is a market leader in the frozen food industry—producing one-third of the world’s
supply of french fries. The company manufactures, distributes, and sells more than
2
CASE 1.1 Opening Case 3
Business challenges The frozen food industry faced tough challenges from health
and nutrition trends that are emphasizing fresh foods. Industry
is highly competitive because it is expected to experience slow
growth through 2018.
Voisin/Phanie/SuperStock
FROZEN FOOD McCain Foods had to deal with three major challenges and threats:
INDUSTRY CHALLENGES
1. Drop in demand for frozen foods. McCain operated in an industry that was
facing tougher competition. Health-conscious trends were shifting customer
demand toward fresh food, which was slowing growth in the frozen foods
market.
2. Perishable inventory. Of all the types of manufacturing, food manufacturers face
© DustyPixel/iStockphoto
MCCAIN FOODS’ The McCain brothers, who founded the company, follow this simple philosophy:
BUSINESS AND IT “Good ethics is good business.” McCain prides itself on the quality and conve-
STRATEGIES nience of its products, which is reflected in the It’s All Good brand image. The It’s
All Good branding effort was launched in 2010 after surveys found that customers
were concerned about the quality and nutrition of frozen foods. Since then, many of
products have been improved and manufactured in healthier versions.
Managing with Digital Technology McCain had integrated its diverse
sources of data into a single environment for analysis. Insights gained from its data
analytics helped improve manufacturing processes, innovation, and competitive
advantage.
McCain Foods invested in data analytics and visualization technologies to
maximize its capability to innovate and gain insights from its huge volumes of data.
The company tracks, aggregates, and analyzes data from operations and business
customers in order to identify opportunities for innovation in every area of the busi-
ness. The results of data analytics are made available across the organization—from
www.Ebook777.com
CASE 1.1 Opening Case 5
executive boardrooms to the factory floors—on dashboards. Dashboards are data
visualizations (data viz) that display the current status of key performance indica-
tors (KPIs) in easy-to-understand formats (Figure 1.5). KPIs are business metrics
used to evaluate performance in terms of critical success factors, or strategic and
operational goals.
Better Predictions, Better Results The CEO, other executives, and managers
view their dashboards from mobile devices or computers. They are able to monitor
operations in factories and farms around the globe. Dashboards keep management
informed because they can discover answers to their own questions by drilling
down. Data are used to forecast and predict crop yields—and ultimately combine
weather and geopolitical data to predict and avoid food shortages. By integrating
all of its data into one environment and making the results available in near real
time to those who need it, the organization is increasing its bottom line and driving
innovation.
© Delices/Shutterstock
Sources: Compiled from Smith (2013), Transparency Market Research (2013), and McCain Foods
Teradata video (2013).
DIGITAL TECHNOLOGIES Consumers expect to interact with businesses anytime anywhere via mobile
OF THE 2010S—IN THE apps or social channels using technology they carry in their pockets. Mobile apps
CLOUD, HANDHELD, have changed how, when, and where work is done. Employees can be more produc-
AND WEARABLE tive when they work and collaborate effortlessly from their handheld or wearable
devices.
Cloud computing is a style
of computing in which IT Cloud Computing
services are delivered on- Enterprises can acquire the latest apps and digital services as they are needed and
demand and accessible via without large upfront investments by switching from owning IT resources to cloud
the Internet. Common exam- computing (Figure 1.6). Cloud computing ranges from storing your files in Dropbox
ples are Dropbox, Gmail, to advanced cloud services. In short, with the cloud, resources no longer depend
and Google Drive. on buying that resource. For example, Amazon Elastic Compute Cloud, known as
1.1 Every Business Is a Digital Business 7
© DrAfter123/iStockphoto
© hanibaram/iStockphoto
Figure 1.6 Cloud computing is an important evolution in data storage, software, apps, and
delivery of IT services. An example is Apple iCloud—a cloud service used for online storage and
synchronization of mail, media files, contacts, calendar, and more.
EC2, eliminates the need to invest in hardware up front, so companies can develop
and deploy applications faster. EC2 enables companies to quickly add storage
capacity as their computing requirements change. EC2 reduces the time it takes to
acquire server space from weeks to minutes.
Machine-to-Machine Technology
Sensors can be embedded in most products. Objects that connect themselves to
the Internet include cars, heart monitors, stoplights, and appliances. Sensors are
designed to detect and react, such as Ford’s rain-sensing front wipers that use
an advanced optical sensor to detect the intensity of rain or snowfall and adjust
wiper speed accordingly. Machine-to-machine (M2M) technology enables sensor-
Internet of things (IoT) embedded products to share reliable real time data via radio signals. M2M and
refers to a set of capabilities the Internet of Things (IoT) are widely used to automate business processes in
enabled when physical things industries ranging from transportation to health care. By adding sensors to trucks,
are connected to the Internet turbines, roadways, utility meters, heart monitors, vending machines, and other
via sensors. equipment they sell, companies can track and manage their products remotely.
The phrase Internet of Things was coined by Kevin Ashton in 1999 while he was em-
ployed at Procter & Gamble. It refers to objects (e.g., cars, refrigerators, roadways)
that can sense aspects of the physical world, such as movement, temperature, light-
ing, or the presence or absence of people or objects, and then either act on it or re-
port it. Instead of most data (text, audio, video) on the Internet being produced and
used by people, more data are generated and used by machines communicating with
other machines—or M2M, as you read at the start of this chapter. Smart devices use
IP addresses and Internet technologies like Wi-Fi to communicate with each other
or directly with the cloud. Recent advances in storage and computing power avail-
able via cloud computing are facilitating adoption of the IoT.
The IoT opens new frontiers for improving processes in retail, health care,
manufacturing, energy, and oil and gas exploration. For instance, manufacturing
processes with embedded sensors can be controlled more precisely or monitored
8 Chapter 1 Doing Business in Digital Times
for hazards and then take corrective action, which reduces injuries, damage, and
costs. IoT combined with big data analytics can help manufacturers improve the
efficiency of their machinery and minimize energy consumption, which often is the
manufacturing industry’s second-biggest expense.
The health sector is another area where IoT can help significantly. For example,
a person with a wearable device that carries all records of his health could be monitored
constantly. This connectivity enables health services to take necessary measures for
maintaining the wellbeing of the person.
Big Data
There is no question that the increasing volume of data can be valuable, but only if
they are processed and available when and where they are needed. The problem is
that the amount, variety, structure, and speed of data being generated or collected
by enterprises differ significantly from traditional data. Big data are what high-
volume, mostly text data are called. Big data stream in from multiple channels and
sources, including:
• mobile devices and M2M sensors embedded in everything from airport
runways to casino chips. Later in this chapter, you will read more about the
Internet of Things.
• social content from texts, tweets, posts, blogs.
• clickstream data from the Web and Internet searches.
• video data and photos from retail and user-generated content.
• financial, medical, research, customer, and B2B transactions.
Big data are 80 to 90 per cent unstructured. Unstructured data do not have a pre-
dictable format like a credit card application form. Huge volumes of unstructured data
flooding into an enterprise are too much for traditional technology to process and ana-
lyze quickly. Big data tend to be more time-sensitive than traditional (or small) data.
The exploding field of big data and analytics is called data science. Data sci-
ence involves managing and analyzing massive sets of data for purposes such as
target marketing, trend analysis, and the creation of individually tailored products
and services. Enterprises that want to take advantage of big data use real time data
from tweets, sensors, and their big data sources to gain insights into their custom-
ers’ interests and preference, to create new products and services, and to respond
to changes in usage patterns as they occur. Big data analytics has increased the
demand for data scientists, as described in Career Insight 1.1.
Big data, analytics tools, powerful networks, and greater technology, medical testing, and so on. Demand for data
processing power have contributed to growth of the scientists is outpacing the supply of talent. It is projected
field of data science. Enterprises need people who are that the data scientist career option will grow 19 per
capable of analyzing and finding insights in data cap- cent by 2020—surpassed only by video game design-
tured from sensors, M2M apps, social media, wearable ers. Talent scarcity has driven up salaries. According to
1.1 Every Business Is a Digital Business 9
Glassdoor data (glassdoor.com, 2014), the median salary after joining the company in 2006. At that time, LinkedIn
for data scientists in the United States is $117,500. By had less than 8 million members. Goldman noticed that
contrast, a business analyst earns an average of $61,000. existing members were inviting their friends and col-
leagues to join, but they were not making connections
Profiles of Data Scientists at Facebook, LinkedIn, with other members at the rate executives had expected.
and Bitly A LinkedIn manager said, “It was like arriving at a con-
• Facebook’s Jeff Hammerbacher. Jeff helped ference reception and realizing you don’t know anyone.
Facebook make sense out of huge volumes of user So you just stand in the corner sipping your drink—and
data when he joined the company in 2006. Facebook’s you probably leave early.” Goldman began analyzing
data science team analyzes the self-reported data on the data from user profiles and looked for patterns that
each user’s Facebook page in order to target ads to predict whose networks a given profile would land
based on things the user actually likes. in. While most LinkedIn managers saw no value in
Goldman’s work, Reid Hoffman, LinkedIn’s cofounder
• LinkedIn’s DJ Patil. DJ worked at LinkedIn as
and CEO at the time, understood the power of analytics
chief data scientist. Many of the cool products on
because of his experiences at PayPal. With Hoffman’s
LinkedIn were built using data from self-reporting
approval, Goldman applied data analytics to test what
and machine learning.
would happen if member were presented with names
• Bitly’s Hilary Mason. Hilary was chief scientist at of other members they had not yet connected with, but
Bitly, which offers URL shortening and redirec- seemed likely to know. He displayed the three best new
tion services with real time link tracking. Bitly sees matches for each member based on his or her LinkedIn
behavior from billions of people a month by analyz- profile. Within days, the click-through rate on those
ing tens of millions of links shared per day, which are matches skyrocketed and things really took off. Thanks
clicked hundreds of millions times. The clickstreams to this one feature, LinkedIn’s growth increased dra-
generate an enormous amount of real time data. matically.
Using data analytics, Hillary and her team detected The LinkedIn example shows that good data sci-
and solved business problems that were not evident. entists do much more than simply try to solve obvious
business problems. Creative and critical thinking are
Data Science Is Both an Art and a Science part of their job—that is, part analyst and part artist.
In their 2012 Harvard Business Review article titled They dig through incoming data with the goal of dis-
“Data Scientist: The Sexiest Job of the 21st Century,” covering previously hidden insights that could lead to
authors Thomas Davenport and D. J. Patil define a data a competitive advantage or detect a business crisis in
scientist as a “high-ranking professional with the train- enough time to prevent it. Data scientists often need
ing and curiosity to make discoveries in the world of big to evaluate and select those opportunities and threats
data” (Davenport & Patil, 2012). They described how that would be of greatest value to the enterprise or
data scientist Jonathan Goldman transformed LinkedIn brand.
Sources: Kelly (2013), Lockhard & Wolf (2012), Davenport & Patil (2012), U.S. Department of Labor, Bureau of Labor Statistics (2014).
SOCIAL-MOBILE-CLOUD The relationship among social, mobile, and cloud technologies is shown in
MODEL Figure 1.7. The cloud consists of huge data centers accessible via the Internet and
forms the core by providing 24/7 access to storage, apps, and services. Handhelds
and wearables, such as Google Glass, Pebble, and Sony Smartwatch (Figure 1.8),
and their users form the edge. Social channels connect the core and edge. The
SoMoClo integration creates the technical and services infrastructure needed for
digital business. This infrastructure makes it possible to meet the expectations of
employees, customers, and business partners given that almost everyone is con-
nected (social), everywhere they go (mobile), and has 24/7 access to data, apps, and
other services (cloud).
10 Chapter 1 Doing Business in Digital Times
© scanrail/iStockphoto
integration of cloud, mobile,
and social technologies. The
cloud forms the core. Mobile
devices are the endpoints.
Social networks create the
connections.
FILIP SINGER/EPA/Newscom
connected at all times using
a collection of multiple
devices. A smartwatch used
at work, such as in a retail
store, can provide shop floor
staff with a screen to check
stock availability.
DIGITAL BUSINESS Business models are the ways enterprises generate revenue or sustain themselves.
MODELS Digital business models define how businesses make money via digital technology.
Companies that adopt digital business models are better positioned to take advan-
tage of business opportunities and survive, according to the Accenture Technology
Vision 2013 report (Accenture, 2013). Figure 1.9 contains examples of new tech-
nologies that destroyed old business models and created new ones.
AP Photo/Ted S. Warren
Figure 1.10 MayDay video
chat tech support.
The ways in which market leaders are transitioning to digital business models
include the following:
© lisegagne/iStockphoto
Figure 1.12 Casinos are
improving the profitability of
table games by monitoring
and analyzing betting in real
time.
Sports analytics bring about small competitive advantages that can shift
games and even playoff series.
• Dashboards keep casino floor staff informed of player demand. Competition
in the gaming industry is fierce, particularly during bad economic condi-
tions. The use of manual spreadsheets and gut-feeling decisions did not lead
to optimal results. Casino operators facing pressure to increase their bottom
line have invested in analytic tools, such as Tangam’s Yield Management
solution (TYM). TYM is used to increase the yield (profitability) of black-
jack, craps, and other table games played in the pit (Figure 1.12). The
analysis and insights from real time apps are used to improve the gaming
experience and comfort of players.
THE RECENT PAST AND We have seen great advances in digital technology since the start of this decade.
NEAR FUTURE—2010S Figure 1.13 shows releases by tech leaders that are shaping business and everyday
DECADE life. Compare the role of your mobiles, apps, social media, and so on in your per-
sonal life and work in 2010 to how you use them today. You can expect greater
changes going forward to the end of this decade with the expansion of no-touch
interfaces, mobility, wearable technology, and the IoT.
Companies are looking for ways to take advantage of new opportunities in
mobile, big data, social, and cloud services to optimize their business processes.
The role of the IT function within the enterprise has changed significantly—and
will evolve rapidly over the next five years. As you will read throughout this book,
the IT function has taken on key strategic and operational roles that determine the
enterprise’s success or failure.
IT at Work 1 .1
Zipcar and Other Connected Products
More objects are being embedded with sensors and gaining The payoff is lower development costs and improved oil
the ability to communicate with the Internet. This communi- flows.
cation improves business processes while reducing costs and • In the health-care industry, sensors and data links can
risks. For example, sensors and network connections can be monitor patients’ behavior and symptoms in real time
embedded in rental cars. Zipcar has pioneered the car rental and at low cost. This allows physicians to more precisely
by the hour business model. See Figure 1.14. Cars are leased diagnose disease and prescribe treatment regimens.
for short time spans to registered members, making retail For example, sensors embedded in patients with heart
rental centers unnecessary. Traditional car rental agencies disease or chronic illnesses can be monitored continu-
are starting to experiment with sensors so that each car’s use ously as they go about their daily activities. Sensors
can be optimized to increase revenue. placed on congestive heart patients monitor many of
When devices or products are embedded with sensors, these signs remotely and continuously, giving doctors
companies can track their movements or monitor interac- early warning of risky conditions. Better management
tions with them. Business models can be adjusted to take of congestive heart failure alone could reduce hospi-
advantage of what is learned from this behavioral data. For talization and treatment costs by $1 billion per year in
example, an insurance company offers to install location the U.S.
sensors in customers’ cars. By doing so, the company
• In the retail industry, sensors can capture shoppers’ pro-
develops the ability to price the drivers’ policies on how a
file data stored in their membership cards to help close
car is driven and where it travels. Pricing is customized to
purchases by providing additional information or offering
match the actual risks of operating a vehicle rather than
discounts at the point of sale.
based on general proxies—driver’s age, gender, or location
of residence. • Farm equipment with ground sensors can take into
account crop and field conditions, and adjust the
amount of fertilizer that is spread on areas that need more
Opportunities for Improvement
nutrients.
Other applications of embedded physical things are:
• Billboards in Japan scan people passing by, assessing
• In the oil and gas industry, exploration and development how they fit consumer profiles, and instantly change the
rely on extensive sensor networks placed in the earth’s displayed messages based on those assessments.
crust. The sensors produce accurate readings of the • The automobile industry is developing systems that
location, structure, and dimensions of potential fields. can detect imminent collisions and take evasive action.
Certain basic applications, such as automatic braking
systems, are available in high-end autos. The potential
accident reduction savings resulting from wider deploy-
ment of these sensor systems could exceed $100 billion
annually.
Questions
1. Research Zipcar. How does this company’s business
© Wiskerke/Alamy
IT at Work 1 .2
Wearable Technology
By 2016 wearable electronics in shoes, tattoos, and accessories just fitness by also monitoring time spent on social networks
will become a $10 billion industry, according to Gartner (2012). and photos taken.
Wearable technology builds computing, connectivity, The major sources of revenue from wearable smart
and sensor capabilities into materials. The latest wearables electronics are items worn by athletes and sports enthusiasts
are lightweight and may be found in athletic shoes, golf and devices used to monitor health conditions, such as auto-
accessories, and fitness trackers. The wearables can include matic insulin delivery for diabetics.
data analysis apps or services that send feedback or insights Applications and services are creating new value for
to the wearer. For example, Zepp Labs manufactures sensor- consumers, especially when they are combined with personal
embedded gloves for golf, tennis, and baseball that analyze preferences, location, biosensing, and social data. Wearable
1,000 data points per second to create 3D representations electronics can provide more detailed data to retailers for
of a player’s swing. The sensors track every inch of a golfer’s targeting advertisements and promotions.
swing, analyzes the movements, and then sends the wearers
advice on how to improve their game. Sensors that weigh
Questions
only half an ounce clip onto the glove. Another example is 1. Discuss how wearable electronics and the instant feedback
Sony’s SmartBand, a wristband that synchs with your phone they send to your mobile device could be valuable to you.
to track how many steps you take, the number of calories you 2. How can data from wearable technology be used to
burn each day, and how well you sleep. The Lifelog app is improve worker productivity or safety?
the key to the Smartband. The app gives a visual display of a 3. What are two other potentially valuable uses of instant
timeline and your activity, with boxes monitoring your steps, feedback or data from wearable technology?
calories, kilometers walked, and more. Lifelog goes beyond 4. How can wearable devices impact personal privacy?
IT at Work 1 . 3
AutoTrader Redesigns Its Order-to-Cash Process
© NetPhotos/Alamy
cess management) solution—selecting webMethods from
Software AG (softwareag.com, 2011). The BPM software
was used to document how tasks were performed using
the legacy system. After simplifying the process as much as
possible, remaining tasks were automated or optimized. The
Figure 1.15 AutoTrader.com car search site. new system cuts down the order fulfillment process to 1 day,
as shown in Figure 1.17. Changes and benefits resulting from
the redesigned process are:
AutoTrader.com is the leading automotive marketplace, list-
• There are only six human tasks even though the pro-
ing several million new and pre-owned vehicles, as shown
cess interacts with over 20 different data sources and
in Figure 1.15. AutoTrader.com is one of the largest local
systems, including the inventory, billing, and contract
online advertising entities, with profits of $300 million on
fulfillment.
$1.2 billion in revenues in 2013. The site attracts over 15 mil-
• Tasks are assigned immediately to the right people, who
lion unique visitors each month.
are alerted when work is added to their queues.
Outdated Order-to-Cash Process • Fewer than five percent of orders need to go back to
AutoTrader processes thousands of orders and contracts sales for clarification—a 400 percent improvement.
each month. Its cross-functional order fulfillment process, • Managers can check order fulfillment status anytime
or order-to-cash process, was outdated and could not using webMethods Optimize for Process, which provides
handle the sales volume. The legacy process was run on My real time visibility into performance. They can measure
AutoTrader (MAT), a system based on Lotus Notes/Domino. key performance indicators (KPIs) in real time to see
MAT took an average of 6.3 to 8.3 days to fulfill orders and where to make improvements.
process contracts, as Figure 1.16 shows. MAT created a bot-
• Dealers can make changes directly to their contracts,
tleneck that slowed the time from order to cash, or revenue
which cut costs for personnel. Software and hardware
generation. With over 100 coordinated steps, the process
costs are decreasing as the company retires old systems.
was bound to be flawed, resulting in long and error-prone
cycle times. Cycle time is the time required to complete a Sources: Compiled from Walsh (2012), softwareag.com (2011), Alesci &
given process. At AutoTrader, cycle time is the time between Saitto (2012).
Contract Contract
Signed Delivered
Quality
Fax Data Entry Fulfillment Assurance Total Avg
Questions 2. How does the reduced cycle time of the order fulfillment pro-
cess improve revenue generation and customer satisfaction?
1. Discuss how the redesigned order process supports the
3. Does reducing the cycle time of a business process also
company’s three new business objectives.
reduce errors? Why or why not?
THREE COMPONENTS Business processes have three basic components, as shown in Figure 1.18. They
OF BUSINESS involve people, technology, and information.
PROCESSES Examples of common business processes are:
• Accounting: Invoicing; reconciling accounts; auditing
• Finance: Credit card or loan approval; estimating credit risk and financing
terms
• Human resources (HR): Recruiting and hiring; assessing compliance with
regulations; evaluating job performance
• IT or information systems: Generating and distributing reports and data
visualizations; data analytics; data archiving
• Marketing: Sales; product promotion; design and implementation of sales
campaigns; qualifying a lead
• Production and operations: Shipping; receiving; quality control; inventory
management
Deliverables are the outputs • Cross-functional business processes: Involving two or more functions, for
or tangible things that are example, order fulfillment and product development
produced by a business pro-
Designing an effective process can be complex because you need a deep under-
cess. Common deliverables
standing of the inputs and outputs (deliverables), how things can go wrong, and how
are products, services, actions, to prevent things from going wrong. For example, Dell had implemented a new
plans, or decisions, such as process to reduce the time that tech support spent handling customer service calls. In
to approve or deny a credit an effort to minimize the length of the call, tech support’s quality dropped so much
application. Deliverables are that customers had to call multiple times to solve their problems. The new process
produced in order to achieve had backfired—increasing the time to resolve computer problems and aggravating
specific objectives. Dell customers.
Process Improvement
Given that a company’s success depends on the efficiency of its business processes,
even small improvements in key processes have significant payoff. Poorly designed,
flawed, or outdated business processes waste resources, increasing costs, causing
delays, and aggravating customers. For example, when customers’ orders are not
filled on time or correctly, customer loyalty suffers, returns increase, and reship-
ping increases costs. The blame may be flawed order fulfilment processes and not
employee incompetence, as described in IT at Work 1.2.
Simply applying IT to a manual or outdated process will not optimize it.
Processes need to be examined to determine whether they are still necessary.
After unnecessary processes are identified and eliminated, the remaining ones are
redesigned (or reengineered) in order to automate or streamline them. Methods
and efforts to eliminate wasted steps within a process are referred to as business
process reengineering (BPR). The goal of BPR is to eliminate the unnecessary,
non-value-added processes, then to simplify and automate the remaining processes
to significantly reduce cycle time, labor, and costs. For example, reengineering the
credit approval process cuts time from several days or hours to minutes or less.
Simplifying processes naturally reduces the time needed to complete the process,
which also cuts down on errors.
After eliminating waste, digital technology can enhance processes by (1) auto-
mating existing manual processes; (2) expanding the data flows to reach more func-
tions in order to make it possible for sequential activities to occur in parallel; and
(3) creating innovative business processes that, in turn, create new business models.
For instance, consumers can scan an image of a product and land on an e-commerce
site, such as Amazon.com, selling that product. This process flips the traditional
selling process by making it customer-centric.
Questions
1. What is a business process? Give three examples.
2. What is the difference between business deliverables and objectives?
3. List and give examples of the three components of a business process.
4. Explain the differences between formal and informal processes.
5. What is a standard operating procedure (SOP)?
6. What is the purpose of business process management (BPM)?
BUILDING BLOCKS Having a competitive edge means possessing an advantage over your competition.
OF COMPETITIVE Once an enterprise has developed a competitive edge, maintaining it is an ongoing
ADVANTAGE challenge. It requires forecasting trends and industry changes and what the company
needs to do to stay ahead of the game. It demands that you continuously track your
competitors and their future plans and promptly take corrective action. In summary,
competitiveness depends on IT agility and responsiveness. The benefit of IT agility
Agility means being able
is being able to take advantage of opportunities faster or better than competitors.
to respond quickly.
Closely related to IT agility is flexibility. For example, mobile networks are
Responsiveness means that flexible—able to be set up, moved, or removed easily, without dealing with cables
IT capacity can be easily and other physical requirements of wired networks. Mass migration to mobile
scaled up or down as needed, devices from PCs has expanded the scope of IT beyond traditional organizational
which essentially requires boundaries—making location practically irrelevant.
cloud computing. IT agility, flexibility, and mobility are tightly interrelated and fully dependent
on an organization’s IT infrastructure and architecture, which are covered in greater
Flexibility means having the
detail in Chapter 2.
ability to quickly integrate With mobile devices, apps, platforms, and social media becoming inseparable parts
new business functions or to of work life and corporate collaboration and with more employees working from home,
easily reconfigure software the result is the rapid consumerization of IT. IT consumerization is the migration of
or apps. consumer technology into enterprise IT environments. This shift has occurred because
personally owned IT is as capable and cost-effective as its enterprise equivalents.
www.Ebook777.com
20 Chapter 1 Doing Business in Digital Times
IT plays a key role in competitive advantage, but that advantage is short-lived
if competitors quickly duplicate it. Research firm Gartner defines competitive
advantage as a difference between a company and its competitors that matters to
customers.
It is important to recognize that some types of IT are commodities, which do
not provide a special advantage. Commodities are basic things that companies need
to function, such as electricity and buildings. Computers, databases, and network
services are examples of commodities. In contrast, how a business applies IT to sup-
port business processes transforms those IT commodities into competitive assets.
Critical business processes are those that improve employee performance and profit
margins.
STRATEGIC PLANNING Strategy planning is critical for all organizations, including government agencies,
AND COMPETITIVE health care providers, educational institutions, the military, and other nonprofits.
MODELS We start by discussing strategic analysis and then explain the activities or compo-
nent parts of strategic planning.
What Is Strategy?
Strategy defines the plan for how a business will achieve its mission, goals, and
objectives. The plan specifies the necessary financial requirements, budgets, and
resources. Strategy addresses fundamental issues such as the company’s position
in its industry, its available resources and options, and future directions. A strategy
addresses questions such as:
• What is the long-term direction of our business?
• What is the overall plan for deploying our resources?
• What trade-offs are necessary? What resources will need to be shared?
• What is our position compared to that of our competitors?
• How do we achieve competitive advantage over rivals in order to achieve or
maximize profitability?
Two of the most well-known methodologies were developed by Michael Porter.
Threat of
New Entrants
Rivalry
Supplier Power Buyer Power
(Bargaining Power of Our Competing (Bargaining Power of
Suppliers and Brands) Company Companies Buyers and Distribution
Channels)
Threat of Substitute
Figure 1.19 Porter’s Products or Services
competitive forces model.
industry draws new entrants. Conversely, profit margins for delivery services may
be large, but the cost of the IT needed to support the service is a huge barrier to
entry into the market.
The five industry (or market) forces are:
1. Threat of entry of new competitors. Industries that have large profit margins
attract entrants into the market to a greater degree than industries with small
margins. The same principle applies to jobs—people are attracted to higher-paying
jobs, provided that they can meet the criteria or acquire the skills for that job.
In order to gain market share, entrants usually need to sell at lower prices as an
incentive. Their tactics can force companies already in the industry to defend
their market share by lowering prices—reducing profit margin. Thus, this threat
puts downward pressure on profit margins by driving down prices.
This force also refers to the strength of the barriers to entry into an industry,
which is how easy it is to enter an industry. The threat of entry is lower (less pow-
erful) when existing companies have ITs that are difficult to duplicate or very
expensive. Those ITs create barriers to entry that reduce the threat of entry.
2. Bargaining power of suppliers. Bargaining power is high where the supplier or
brand is powerful, such as Apple, Microsoft, and auto manufacturers. Power is
determined by how much a company purchases from a supplier. The more pow-
erful company has the leverage to demand better prices or terms, which increase
its profit margin. Conversely, suppliers with very little bargaining power tend to
have small profit margins.
3. Bargaining power of customers or buyers. This force is the reverse of the bar-
gaining power of suppliers. Examples are Walmart and government agencies.
This force is high when there are few large customers or buyers in a market.
4. Threat of substituting products or services. Where there is product-for-product
substitution, such as Kindle for Nook, there is downward pressure on prices. As
the threat of substitutes increases, the profit margin decreases because sellers
need to keep prices competitively low.
5. Competitive rivalry among existing firms in the industry. Fierce competition in-
volves expensive advertising and promotions, intense investments in research
and development (R&D), or other efforts that cut into profit margins. This force
is most likely to be high when entry barriers are low, the threat of substitute
products is high, and suppliers and buyers in the market attempt to control it.
That is why this force is placed in the center of the model.
1.3 The Power of Competitive Advantage 23
The strength of each force is determined by the industry’s structure. Existing
companies in an industry need to protect themselves against these forces.
Alternatively, they can take advantage of the forces to improve their position or to
challenge industry leaders. The relationships are shown in Figure 1.19.
Companies can identify the forces that influence competitive advantage in their
marketplace and then develop their strategy. Porter (1985) proposed three types of
strategies—cost leadership, differentiation, and niche strategies. In Table 1.2, Porter’s
three classical strategies are listed first, followed by a list of nine other general
strategies for dealing with competitive advantage. Each of these strategies can be
enhanced by IT.
Strategy Description
www.Ebook777.com
1.4 Enterprise Technology Trends 25
IT at Work 1 .4
Finding Qualified Talent
Managers at a global energy services company could not • InnoCentive is an “open innovation” company that
find or access their best talent to solve clients’ technical takes R&D problems in a broad range of areas such as
problems because of geographic boundaries and business engineering, computer science, and business and frames
unit barriers. The company’s help desks supported engineers them as “challenge problems” for anyone to solve. It
well enough for common problems, but not for difficult gives cash awards for the best solutions to solvers who
issues that needed creative solutions. Using Web technolo- meet the challenge criteria.
gies to expand access to experts worldwide, the company
set up new innovation communities across its business units, Sources: Compiled from McKinsey Global Institute (mckinsey.com/
which have improved the quality of its services. insights/mgi.aspx), Amazon Mechanical Turk (aws.amazon.com/
Dow Chemical set up its own social network to help mturk), and InnoCentive (Innocentive.com).
managers identify the talent they need to carry out projects
across its diverse business units and functions. To expand Questions
its talent pool, Dow extended the network to include former 1. Visit and review the Amazon Mechanical Turk website.
employees and retirees. Explain HITs. How do they provide an on-demand work-
Other companies are using networks to tap external tal- force?
ent pools. These networks include online labor markets such 2. Visit and review the InnoCentive website. Describe what
as Amazon Mechanical Turk and contest services such as the company does and how.
InnoCentive that help solve business problems.
Questions
1. What are the characteristics of an agile organization?
2. Explain IT consumerization.
3. What are two key components of corporate profitability?
4. Define competitive advantage.
5. Describe strategic planning.
6. Describe SWOT analysis.
7. Explain Porter’s five-forces model, and give an example of each force.
digital music industry. iTunes was a significant breakthrough that forever changed
the music industry and the first representation of Apple’s future outside its traditional
computing product line. You are familiar with the success of that future-driven busi-
ness model.
Three IT directions for the late 2010s are outlined next. Throughout all the
chapters in this book, you will learn how these and other digital technology are
transforming business and society.
MORE MOBILE The direction is away from the traditional desktop and documents era and toward
BUSINESS APPS, FEWER business apps in the cloud. Why? Google Apps offers apps that provide work-
DOCS ON DESKTOPS ers with information and answers with low effort—instead of having to complete
tedious actions, such as logging in or doing extensive searches. This ongoing move
to mobile raises data security issues. Data stored on mobiles are at higher risk, in
part because the devices can be stolen or lost.
MORE SOCIALLY Engaging customers via mobiles and social media sites—and those customers who
ENGAGED—BUT do not tolerate delays—is the norm. However, customers probably do not know of
SUBJECT TO restrictions on financial institutions and health–care providers that make it illegal
REGULATION to respond to individuals publicly via social media. That is, for regulatory purposes,
financial institutions cannot post or respond to comments or e-mails through social
media sites because of privacy and security.
© Chris Pearsall/Alamy
© RioPatuca/Alamy
Figure 1.22 NFC technology relies on sensors or RFID chips. NFC is used
for tracking wine and liquor to manage the supply chain efficiently. NFC
smartphones are being integrated into payment systems in supermarkets so
customers can pay for purchases without cash or credit cards.
(NFC World, 2014). Innovative ways in which businesses are applying NFC include
the following:
• Amsterdam’s Schiphol Airport has installed an NFC boarding gate allowing pas-
sengers to validate their boarding pass with a touch of their NFC smartphone.
• French leather goods brand Delage has partnered with NFC object identi-
fication specialist Selinko to integrate NFC tags into its range of premium
leather bags. Each bag will have a unique chip and a unique digital serial
number. Consumers with an NFC smartphone equipped with Selinko’s free
mobile app will be able to use the tag to access information about their
product and confirm its authenticity as well as access marketing offers.
• iPhone owners in the United States can make Isis payments following
AT&T’s introduction of a range of phone cases that add NFC functionality
to the devices. To use the Isis Mobile Wallet on an iPhone, the owner selects
the Isis-ready NFC case, slides the iPhone in, downloads the Isis Mobile
Wallet app from the App Store, and taps the iPhone at hundreds of thou-
sands of merchants nationwide for a quick way to pay.
These trends are forces that are changing competition, business models, how
workers and operations are managed, and the skills valuable to a career in business.
Questions
1. What was the significance of Apple’s introduction of the iPhones music
store?
2. What are three IT trends?
3. What are three business applications of NFC?
• What do we do?
Strategic direction; • What is our direction?
industry, markets, • What markets & customers should
and customers we be targeting and how do we
prepare for them?
• How do we do it?
Business model • How do we generate revenues &
profits to sustain ourselves and
build our brand?
Business
• How well do we do it?
processes,
producers, • How can we be more
and technology efficient?
Figure 1.23 Key strategic
and tactical questions.
WHAT COMPANIES What companies can do depends on what their information technology and data
CAN DO DEPENDS management systems can do. For over a decade, powerful new digital approaches
ON THEIR IT to doing business—and getting through your day—have emerged. And there is
sufficient proof to expect even more rapid and dramatic changes due to IT break-
throughs and advances. Understanding trends that affect the ways business is done
and getting in front of those trends give you a career edge.
Key strategic and tactical questions that determine an organization’s profitabil-
ity and management performance are shown in Figure 1.23. Answers to each ques-
tion will entail understanding the capabilities of mundane to complex ITs, which
ones to implement, and how to manage them.
IT CAREERS OUTLOOK Having a feel for the job market helps you improve your career options. According
to the U.S. Department of Labor, and the University of California Los Angeles
(UCLA), the best national jobs in terms of growth, advancement, and salary
increases in 2013 are in the fields of IT, engineering, health care, finance, construc-
tion, and management. It is projected that these job categories will see above-
average national growth over the next several years. The U.S. Department of Labor
projections are generally 6–10 years in reference.
With big data, data science, and M2M, companies are increasing their IT staff.
In addition, many new businesses are seeking more programmers and designers.
Data security threats continue to get worse. The field of IT covers a wide range that
includes processing of streaming data, data management, big data analytics, app
development, system analysis, information security, and more.
Job growth is estimated at 53 percent by 2018, according to the U.S. Department
of Labor; and salaries in many IT jobs will increase by 4 to 6 percent. The lack of
skilled IT workers in the U.S. is a primary reason for the outsourcing of IT jobs.
Key Terms 29
news media, has created a new market whose impacts are yet to be realized. Visit
iReport.com where a pop-up reads, “iReport is the way people like you report the
news. The stories in this section are not edited, fact-checked or screened before
they post.”
IT Job Prospects
Workers with specialized technical knowledge and strong communications and
business skills, as well as those with an MBA with a concentration in an IT area, will
have the best prospects. Job openings will be the result of employment growth and
the need to replace workers who transfer to other occupations or leave the labor
force (Bureau of Labor Statistics, 2012–2013).
Questions
1. Why is IT a major enabler of business performance and success?
2. Explain why it is beneficial to study IT today.
3. Why are IT job prospects strong?
Key Terms
agility competitive advantage inbound logistics productivity
barriers to entry competitive forces model industry structure radio frequency
big data (five-forces model) informal process identification (RFID)
business model critical success factor (CSF) Internet of Things (IoT) real time system
business process cross-functional business IT consumerization responsiveness
business process process IT project manager services
management (BPM) customer experience (CX) key performance social, mobile, and cloud
business process cycle time indicators (KPIs) (SoMoClo)
reengineering (BPR) dashboards machine-to-machine standard operating
business-to-business data analytics (M2M) technology procedures (SOPs)
(B2B) data science near-field communication supply chain
chief technology officer dashboard (NFC) technology support activities
(CTO) deliverables objectives SWOT analysis
cloud computing digital business model operations unstructured data
commodity formal process process wearable technology
www.Ebook777.com
30 Chapter 1 Doing Business in Digital Times
CASE 1.2
Business Case: Restaurant Creates Opportunities to Engage Customers
Back when phones were used only to make calls, few infrastructure and architecture are needed to meet the de-
retailers and restaurants could have predicted that mo- mands of high-volume senders.
bile technology was going to transform their industries. Another feature of ExactTarget is the ability to respond in
Smartphones and other portable devices are access points a real time environment. Companies need to be able to react
to customers. Companies can push real time, personally to the real time actions that their customers are taking across
targeted ads to customers’ phones using text messages, or all channels. That is why it is necessary to be able to quickly
interact with them using location-aware mobile apps. And and easily configure messages that are triggered by external
potential customers can access product or brand informa- events like purchases or website interactions. Finally, software
tion using 2D codes, and comparison-shop right in the helps companies immediately respond to customers with
store. burst sending capabilities—sending millions of e-mails in a
Brands are always looking for more effective ways few minutes.
to integrate social media with traditional media, such as
print and TV, when implementing marketing campaigns.
Why the Campaign Was a Success
Managing these campaigns and interactions requires
Within two weeks, about 20,000 people had responded to
specialized software, and possibly support from the
the offer by registering. The BOGO coupon redemption rate
vendor or consulting firm if the company lacks in-house
at Pei Wei’s 173 locations was 20 percent. It was the restau-
expertise.
rant chain’s most successful new e-mail list growth effort to
date.
Pei Wei Asian Diner’s Mobile Effective marketing requires companies or brands to cre-
and Cloud Campaign ate opportunities with which to engage customers. Pei Wei
Pei Wei Asian Diner (www.peiwei.com), a fast-food casual was successful because it used multiple interactive channels
restaurant chain owned by P.F. Chang’s China Bistro, is an to engage—connect with—current and potential custom-
example of a company that invested in technology to ers. Brands have a tremendous opportunity to connect with
manage multichannel (also called cross-channel) marketing consumers on their mobiles in stores and on Twitter and
campaigns. In mid-2011 Pei Wei introduced a new entrée, Facebook.
Caramel Chicken. The company integrated traditional A 2010 ExactTarget study of more than 1,500 U.S.
in-store promotions with mobile and Web-based consumers entitled The Collaborative Future found that:
marketing efforts to motivate people to subscribe to
• 27 percent of consumers said they are more likely to
its e-mail marketing campaign. It also reached out to
purchase from a brand after subscribing to e-mail.
fans via Facebook and Twitter. The success of the new
campaign depended on investing in appropriate software • 17 percent of consumers are more likely to purchase after
and expertise. With thousands of tweets, Facebook posts, liking a brand on Facebook.
and Google searches per second, companies need IT
A study by Forrester Consulting found that 48 percent
support to understand what people are saying about their
of interactive marketing executives ranked understanding
brands.
customers’ cross-channel interactions as one of the top
challenges facing marketing today.
Campaign Management
Software Vendor Questions
Software vendor ExactTarget was selected to run and 1. What software capabilities did Pei Wei need to launch its
manage Pei Wei’s marketing campaigns. Famous brands— marketing campaign?
like Expedia, Best Buy, Nike, and Papa John’s—also used 2. What factors contributed to the success of Pei Wei’s
ExactTarget to power their mission-critical messages. campaign?
With ExactTarget’s software, Pei Wei invited guests to join 3. Why is a high-capacity (massive) infrastructure needed to
(register) its e-mail list via text, the Web, Twitter, or Face- launch e-mail or text campaigns?
book in order to receive a buy-one, get-one free (BOGO) 4. Visit ExactTarget.com. Identify and describe how the
coupon. vendor makes it easy for companies to connect via e-mail
Using ExactTarget’s software and infrastructure, clients and Twitter.
such as Pei Wei can send more than thousands of e-mails per 5. What solutions for small businesses does ExactTarget
second and millions of messages in 15 minutes. A massive offer?
32 Chapter 1 Doing Business in Digital Times
CASE 1.3
Video Case: What Is the Value of Knowing More and Doing More?
References
Accenture Technology Vision 2013. McCain Foods. “McCain Foods: Integrating Data from the
Alesci, C. & S. Saitto. “AutoTrader.Com Said to Be in Talks Plant to the Boardroom to Increase the Bottom Line.”
About Possible IPO of Buyer-Seller Site.” Bloomberg, Teradata.com, 2013.
February 4, 2012. NFC World. “News in Brief.” February 2014.
Bureau of Labor Statistics. Occupational Outlook Handbook. Pogue, D. “Embracing the Mothers of Invention.” The New
U.S. Department of Labor, 2012–2013. York Times, January 25, 2012.
Central Intelligence Agency (CIA). World Factbook. Porter, M. E. The Competitive Advantage: Creating and Sustaining
Cooper, B. B. “10 Surprising Social Media Statistics That Will Superior Performance. NY: Free Press. 1985.
Make You Rethink Your Social Strategy.” Fast Company, Porter, M. E. “Strategy and the Internet.” Harvard Business
November 18, 2013. Review, March 2001.
Davenport, T.H. & D.J. Patil. “Data Scientist: The Sexiest Job Schmidt-Subramanian, M., H. Manning, J. Knott, & M. Murphy.
of the 21st Century.” Harvard Business Review Magazine. “The Business Impact of Customer Experience, 2013.” For-
October 2012. rester Research, June 10, 2013.
“Gartner Reveals Top Predictions for IT Organizations and Smith, Gavin. “Frozen Food Production in the US Industry
Users for 2013 and Beyond.” Gartner Newsroom. October 24, Market Research Report from IBISWorld Has Been Updated.”
2012. PRWeb, March 27, 2013.
glassdoor.com. “Data Analyst Salaries.” May 8, 2014. softwareag.com. “Orders Are in the Fast Lane at AutoTrader.
Gnau, S. “Putting Big Data in Context.” Wired, September 10, com—Thanks to BPM.” 2011.
2013. Transparency Market Research. “Frozen Food Market—Global
Joy, O. “What Does It Mean to Be a Digital Native?” CNN, Industry Analysis, Size, Share, Growth, Trends and Forecast,
December 8, 2012. 2013–2019.” September 2013.
Kelly, M. “Data Scientists Needed: Why This Career Is U.S. Department of Labor, Bureau of Labor Statistics. 2014.
Exploding Right Now.” VentureBeat.com, November 11, 2013. Walsh, M. “Autotrader.com Tops In Local Online Ad Dollars.”
Lockard, C.B. & M. Wolf. “Occupational Employment Projec- MediaPost.com, April 3, 2012.
tions to 2020.” Monthly Labor Review, January 2012.