Chapter-1 CS Same
Chapter-1 CS Same
Chapter-1 CS Same
Information Systems
in Business 1
CHAPTER
CHAPTER OUTLINE
m
■ I n f o r m a t i o n Te c h n o l o g y ’s ■ Identifying Competitive
Role in Business Advantages
■ I n f o r m a t i o n Te c h n o l o g y ■ The Five Forces Model –
Basics Evaluating Business Segments
■ Roles and Responsibilities ■ The Three Generic Strategies –
i n I n f o r m a t i o n Te c h n o l o g y Creating a Business Focus
■ Measuring Information ■ Va l u e C h a i n A n a l y s i s –
Te c h n o l o g y ’s S u c c e s s Ta r g e t i n g B u s i n e s s P r o c e s s
Baltzan−Phillips: Business 1. Information Systems in Text © The McGraw−Hill
Driven Information Business Companies, 2008
Systems
C a p i t a l i z i n g o n N e w Tr e n d s
In 2000, Steve Jobs was fixated on developing video editing software for the Macin-
tosh. But then he realized millions of people were using computers and CD burners
to make audio CDs and to download digital songs called MP3s from illegal online
services like Napster. Jobs was worried that he was looking in the wrong direction
and had missed the MP3 bandwagon.
Jobs moved fast. He began by purchasing SoundStep from Jeff Robbin, a
28-year-old software engineer and former Apple employee. SoundStep was
developing software that simplified the importing and compression of MP3
songs. Robbin and a couple of other programmers began writing code from
scratch and created the first version of iTunes for the Mac in less than four
months. This powerful and ingenious database could quickly sort tens of thou-
sands of songs in a multitude of ways and find particular tracks in nanoseconds.
Jobs next challenged the team to make iTunes portable. He envisioned a Walkman-
like player that could hold thousands of songs and be taken anywhere. The idea
was to modify iTunes and build a tiny new system for what was basically a miniature
computer, along with a user interface that could sort and navigate music files with
the same sophistication as iTunes on the Mac. The iPod was born nine months later.
Jobs noticed that one last key element was missing, an online store for buy-
ing downloadable songs. Such a store would need an e-business infrastructure
that could automatically deliver songs and track billing and payments for con-
ceivably millions of purchases. In the spring of 2003, 18 months after the launch
of the iPod, Apple’s iTunes Music Store opened for business. The company’s
goal was to sell 1 million songs in the first six months. It hit this goal in six days.
■ Videos—Choose from over 2,000 music videos at the iTunes Music Store or pur-
chase ad-free episodes of a favorite ABC or Disney television show and watch
them on the go.
■ Podcasts—The iTunes Podcast Directory features thousands of free podcasts,
or radio-style shows, including favorites from such big names as ABC News,
Adam Curry, ESPN, KCRW, and WGBH.
■ Audiobooks—The digital shelves of the iTunes Music Store are stocked with
more than 11,000 audiobooks, including such exclusives as the entire Harry Pot-
ter series.
■ Photos—With storage for up to 25,000 photos, iPod users can view photo slide
shows—complete with music—on an iPod or on a TV via the optional video
cable.
i P o d ’s I m p a c t o n t h e M u s i c B u s i n e s s
In the digital era, the unbundling of CDs through the purchase of individual tracks
lets consumers pay far less to get a few of their favorite songs rather than buying
an entire album. Many analysts predicted that the iPod’s success coupled with the
consumer’s ability to choose individual song downloads would lead to increased rev-
enues for music businesses. However, the industry is seeing individual downloads
cannibalizing album profits and failing to attract new music sales. “I’ve still never
bought a download,” said Eneka Iriondo-Coysh, a 21-year-old graphic-design stu-
dent in London who has owned a 10,000 song-capacity iPod for more than two years.
“I do it all from my CDs,” mostly hip-hop and soul.
The global music industry has been under siege for years amid declining sales.
Record companies suffer from piracy, including billions of dollars in lost revenue
due to bootlegged CDs. At the same time, music faces new competition for con-
sumer time and money from video games, DVDs, and mobile phones. At traditional
record stores, DVDs and games are taking an increasing amount of shelf space,
squeezing out CDs. The music download numbers suggest that the iPod’s iconic
success is not translating into new music sales the way the evolution from vinyl
albums to cassettes and then CDs did. For many users, the portable devices are just
another way of stocking and listening to music, not an incentive to buy new music.
Global CD sales fell 6.7 percent to $12.4 billion in the first half of 2005, accord-
ing to the London-based International Federation of the Phonographic Industry. The
evidence indicates that digital downloads are not good for the music business.1
INTRODUCTION
nformation is everywhere. Most organizations value information as a strategic
I asset. Consider Apple and its iPod, iPod accessories, and iTunes Music Store.
Apple’s success depends heavily on information about its customers, suppliers,
markets, and operations for each of these product lines. For example, Apple must
be able to predict the number of people who will purchase an iPod to help estimate
iPod accessory and iTunes sales within the next year. Estimating too many buyers
will lead Apple to produce an excess of inventory; estimating too few buyers will po-
tentially mean lost sales due to lack of product (resulting in even more lost revenues
from iTunes downloads).
Understanding the direct impact information has on an organization’s bottom
line is crucial to running a successful business. This text focuses on information,
business, technology, and the integrated set of activities used to run most organiza-
tions. Many of these activities are the hallmarks of business today—supply chain
management, customer relationship management, enterprise resource planning,
outsourcing, integration, e-business, and others.
1.1. Describe the functional areas of a business and why they must work together for the business to
be successful.
1.2. Explain information technology’s role in business and how you measure success.
1.3. Compare management information systems (MIS) and information technology (IT), and define the
relationships among people, information technology, and information.
1.4. Compare the responsibilities of a chief information officer (CIO), chief technology officer (CTO),
chief security officer (CSO), chief privacy officer (CPO), and chief knowledge officer (CKO).
1.5. Explain the gap between IT and the business, along with the primary reason this gap exists.
FIGURE 1.1
Technology in Business Week
and Fortune
FIGURE 1.2
Business Benefits and Infor-
Business Functions Receiving the Greatest Benefits from
mation Technology Project
Information Technology
Goals
Customer Service 70 %
Finance 51 %
Sales and Marketing 42 %
IT Operations 39 %
Operations Management 31 %
HR 17%
Security 17%
system or marketing plan is not likely to generate long-term growth or reduce costs
across an entire organization. Businesses must undertake enterprisewide initia-
tives to achieve broad general business goals such as reducing costs. Information
technology plays a critical role in deploying such initiatives by facilitating commu-
nication and increasing business intelligence. For example, e-mail and cell phones
allow people across an organization to communicate in new and innovative ways.
Understanding information technology begins with gaining an understanding of
how businesses function and IT’s role in creating efficiencies and effectiveness across
the organization. Typical businesses operate by functional areas (often called func-
tional silos). Each area undertakes a specific core business function (see Figure 1.3).
FIGURE 1.3
Departmental Structure of a
COMMON DEPARTMENTS IN AN ORGANIZATION
Typical Organization
OPERATIONS
ACCOUNTING MARKETING
MANAGEMENT
HUMAN
PRODUCTION
RESOURCES
MANAGEMENT
MANAGEMENT
FINANCE SALES INFORMATION
SYSTEMS
■ Accounting provides quantitative information about the finances of the business including
recording, measuring, and describing financial information.
■ Finance deals with the strategic financial issues associated with increasing the value of the
business, while observing applicable laws and social responsibilities.
■ Human resources (HR) includes the policies, plans, and procedures for the effective
management of employees (human resources).
■ Sales is the function of selling a good or service and focuses on increasing customer sales,
which increases company revenues.
■ Marketing is the process associated with promoting the sale of goods or services. The
marketing department supports the sales department by creating promotions that help
sell the company’s products.
■ Operations management (also called production management) includes the methods, tasks,
and techniques organizations use to produce goods and services. Transportation (also called
logistics) is part of operations management.
■ Management information systems (MIS) is the function that plans for, develops, implements,
and maintains IT hardware, software, and the portfolio of applications that people use to
support the goals of an organization.
FIGURE 1.4
Marketing Working with
Other Organizational
Departments
Marketing
Sales Operations
Accounting Logistics
Human
resources
Functional organization—Each functional area has its own systems
and communicates with every other functional area (diagram
displays Marketing communicating with all other functional areas
in the organization).
Information
It is important to distinguish between data and information. Data are raw facts that
describe the characteristics of an event. Characteristics for a sales event could in-
clude the date, item number, item description, quantity ordered, customer name,
and shipping details. Information is data converted into a meaningful and use-
ful context. Information from sales events could include best-selling item, worst-
selling item, best customer, and worst customer.
IT Resources
The plans and goals of the IT department must align with the plans and goals of
the organization. Information technology can enable an organization to increase
efficiency in manufacturing, retain key customers, seek out new sources of supply,
and introduce effective financial management.
It is not always easy for managers to make the right choices when using IT to sup-
port (and often drive) business initiatives. Most managers understand their busi-
ness initiatives well, but are often at a loss when it comes to knowing how to use
and manage IT effectively in support of those initiatives. Managers who understand
what IT is, and what IT can and cannot do, are in the best position for success. In
essence,
■ People use
■ information technology to work with
■ information (see Figure 1.5).
Those three key resources—people, information, and information technology
(in that order of priority)—are inextricably linked. If one fails, they all fail. Most im-
portant, if one fails, then chances are the business will fail.
IT Cultures
An organization’s culture plays a large role in determining how successfully it will
share information. Culture will influence the way people use information (their
information behavior) and will reflect the importance that company leaders at-
tribute to the use of information in achieving success or avoiding failure. Four
common information-sharing cultures exist in organizations today: information-
functional, information-sharing, information-inquiring, and information-discovery
(see Figure 1.6).2
FIGURE 1.5
The Relationship among
People, Information, and
Information Technology
y
log
no
Inf
ch
orm
Te
on
ati
ati
on
Business
rm
Success
o
Inf
People
FIGURE 1.6
Different Information Cultures Organizational Information Cultures
Found in Organizations
Information-Functional Employees use information as a means of exercising influence or
Culture power over others. For example, a manager in sales refuses to share
information with marketing. This causes marketing to need the sales
manager’s input each time a new sales strategy is developed.
Information-Sharing Culture Employees across departments trust each other to use information
(especially about problems and failures) to improve performance.
Information-Discovery Employees across departments are open to new insights about crisis
Culture and radical changes and seek ways to create competitive advantages.
An organization’s IT culture can directly affect its ability to compete in the global
market. If an organization operates with an information-functional culture, it will
have a great degree of difficulty operating. Getting products to market quickly and
creating a view of its end-to-end (or entire) business from sales to billing will be a
challenge. If an organization operates with an information-discovery culture it will
be able to get products to market quickly and easily see a 360-degree view of its en-
tire organization. Employees will be able to use this view to better understand the
market and create new products that offer a competitive advantage.
FIGURE 1.7
Industry Average CIO Compensation Average CIO Compensation
Wholesale/Retail/Distribution $243,304
by Industry
Finance $210,547
Insurance $197,697
Manufacturing $190,250
Government $118,359
Education $93,750
FIGURE 1.8
CIO’s Concerns Percentage What Concerns CIOs the
Most?
Enchancing customer satisfaction 94%
Security 92
Technology evaluation 89
Budgeting 87
Staffing 83
ROI analysis 66
Outsourcing hosting 45
Although CIO is considered a position within IT, CIOs must be concerned with
more than just IT. According to a recent survey (see Figure 1.8), most CIOs ranked
“enhancing customer satisfaction” ahead of their concerns for any specific aspect
of IT. We should applaud CIOs who possess the broad business view that customer
satisfaction is more crucial and critical than specific aspects of IT.
The chief technology officer (CTO) is responsible for ensuring the throughput,
speed, accuracy, availability, and reliability of an organization’s information tech-
nology. CTOs have direct responsibility for ensuring the efficiency of IT systems
throughout the organization. Most CTOs possess well-rounded knowledge of all as-
pects of IT, including hardware, software, and telecommunications. CTO’s typically
report to the CIO. The role of CTO is similar to CIO, except that CIO must take on the
additional responsibility of ensuring that IT aligns with the organization’s strategic
initiatives.
The chief security officer (CSO) is responsible for ensuring the security of IT sys-
tems and developing strategies and IT safeguards against attacks from hackers and
viruses. The role of a CSO has been elevated in recent years because of the number
of attacks from hackers and viruses. Most CSOs possess detailed knowledge of net-
works and telecommunications because hackers and viruses usually find their way
into IT systems through networked computers.
The chief privacy officer (CPO) is responsible for ensuring the ethical and legal
use of information within an organization. CPOs are the newest senior executive
position in IT. Recently, 150 of the Fortune 500 companies added the CPO position
to their list of senior executives. Many CPOs are lawyers by training, enabling them
to understand the often complex legal issues surrounding the use of information.
The chief knowledge officer (CKO) is responsible for collecting, maintaining, and
distributing the organization’s knowledge. The CKO designs programs and systems
that make it easy for people to reuse knowledge. These systems create repositories
of organizational documents, methodologies, tools, and practices, and they estab-
lish methods for filtering the information. The CKO must continuously encourage
employee contributions to keep the systems up-to-date. The CKO can contribute
directly to the organization’s bottom line by reducing the learning curve for new
employees or employees taking on new roles.
In 1998, Danny Shaw became the first CKO at Children’s Hospital in Boston. His
initial task was to unite information from disparate systems to enable analysis of
both the efficiency and effectiveness of the hospital’s care. Shaw started by building
a series of small, integrated information systems that quickly demonstrated value.
He then gradually built on those successes, creating a knowledge-enabled organi-
zation one layer at a time. Shaw’s information systems have enabled administrative
and clinical operational analyses.4
All the above IT positions and responsibilities are critical to an organization’s
success. While many organizations may not have a different individual for each of
these positions, they must have leaders taking responsibility for all these areas of
concern. The individuals responsible for enterprisewide IT and IT-related issues
must provide guidance and support to the organization’s employees. Figure 1.9 dis-
plays the personal skills pivotal for success in an executive IT role.
FIGURE 1.9
Skills Pivotal for Success in
Executive IT Roles Ability to Communicate
Effectively
Strategic Thinking and
Planning
Understanding Business
Processes and Operations
Negotiation/Sales Skills
Thorough Knowledge of
Technology Options
Technical Proficiency
will not add any value. That is a dangerous position to take. IT personnel must un-
derstand the business if the organization is going to determine which technologies
can benefit (or hurt) the business. With a little effort to communicate, IT personnel
might provide information on the functionality available in an information system,
which could add tremendous value to a meeting about how to improve customer
service. Working together, business and IT personnel have the potential to create
competitive advantages, reduce costs, and streamline business processes.
It is the CIO’s responsibility to ensure effective communications between busi-
ness and IT personnel. While the CIO assumes the responsibility on an enterprise-
wide level, it is each employee’s responsibility to communicate effectively on a
personal level.
Benchmarking—Baseline Metrics
Regardless of what is measured, how it is measured, and whether it is for the sake of
efficiency or effectiveness, there must be benchmarks, or baseline values the sys-
tem seeks to attain. Benchmarking is a process of continuously measuring system
results, comparing those results to optimal system performance (benchmark val-
ues), and identifying steps and procedures to improve system performance.
Consider online government services (e-government) as an illustration of bench-
marking efficiency IT metrics and effectiveness IT metrics (see survey results in Fig-
ure 1.10). From an effectiveness point of view, Canada ranks number one in terms of
e-government satisfaction of its citizens. (The United States ranks third.) The survey,
sponsored by Accenture, also included such attributes as customer-service vision,
initiatives for identifying services for individual citizen segments, and approach-
es to offering e-government services through multiple-service delivery channels.
These are all benchmarks at which Canada’s government excels.8
In contrast, the United Nations Division for Public Economics and Public Admin-
istration ranks Canada sixth in terms of efficiency IT metrics. (The United States
ranked first.) This particular ranking, based purely on efficiency IT metrics, includes
benchmarks such as the number of computers per 100 citizens, the number of In-
ternet hosts per 10,000 citizens, and the percentage of the citizen online population.
Therefore, while Canada lags behind in IT efficiency, it is the premier e-government
provider in terms of effectiveness.9
Governments hoping to increase their e-government presence would bench-
mark themselves against these sorts of efficiency and effectiveness metrics. There
is a high degree of correlation between e-government efficiency and effectiveness,
although it is not absolute.
FIGURE 1.10
E-Government Ranking for Efficiency Effectiveness
Efficiency and Effectiveness
1. United States (3.11) 1. Canada
FIGURE 1.11
Efficiency IT Metrics Common Types of Efficiency
IT Metrics
Throughput The amount of information that can travel through a system at
any point in time.
Information accuracy The extent to which a system generates the correct results
when executing the same transaction numerous times.
While these efficiency metrics are important to monitor, they do not always
guarantee effectiveness. Effectiveness IT metrics are determined according to an
organization’s goals, strategies, and objectives. Here, it becomes important to con-
sider the strategy an organization is using, such as a broad cost leadership strategy
(Wal-Mart, for example), as well as specific goals and objectives such as increasing
new customers by 10 percent or reducing new-product development cycle times to
six months. Figure 1.12 displays the broad, general effectiveness IT metrics.
In the private sector, eBay constantly benchmarks its information technology ef-
ficiency and effectiveness. In 2005, eBay posted impressive year-end results with
revenues increasing 72 percent while earnings grew 125 percent. Maintaining con-
stant Web site availability and optimal throughput performance is critical to eBay’s
success.10
Jupiter Media Metrix ranked eBay as the Web site with the highest visitor volume
(efficiency) in 2005 for the fourth year in a row, with an 80 percent growth from the
previous year. The auction Web site averaged 8 million unique visitors during each
week of the holiday season that year with daily peaks exceeding 12 million visitors.
To ensure constant availability and reliability of its systems, eBay implemented Pro-
activeNet, a performance measurement and management-tracking tool. The tool
FIGURE 1.12
Effectiveness IT Metrics Common Types of Effective-
ness IT Metrics
Usability The ease with which people perform transactions and/or find information.
A popular usability metric on the Internet is degrees of freedom, which
measures the number of clicks required to find desired information.
Conversion rates The n umber of customers an organization “touches” for the first time
and persuades to purchase its products or services. This is a popular
metric for evaluating the effectiveness of banner, pop-up, and pop-
under ads on the Internet.
FIGURE 1.13
The Interrelationships
High
Between Efficiency and
Effectiveness
Optimal area
Efficiency
in which to
operate
Low
Low Effectiveness High
allows eBay to monitor its environment against baseline benchmarks, which helps
the eBay team keep tight control of its systems. The new system has resulted in im-
proved system availability with a 150 percent increase in productivity as measured
by system uptime.11
Be sure to consider the issue of security while determining efficiency and effec-
tiveness IT metrics. When an organization offers its customers the ability to pur-
chase products over the Internet, it must implement the appropriate security. It is
actually inefficient for an organization to implement security measures for Inter-
net-based transactions as compared to processing nonsecure transactions. How-
ever, an organization will probably have a difficult time attracting new customers
and increasing Web-based revenue if it does not implement the necessary secu-
rity measures. Purely from an efficiency IT metric point of view, security generates
some inefficiency. From an organization’s business strategy point of view, however,
security should lead to increases in effectiveness metrics.
Figure 1.13 depicts the interrelationships between efficiency and effectiveness.
Ideally, an organization should operate in the upper right-hand corner of the graph,
realizing both significant increases in efficiency and effectiveness. However, operat-
ing in the upper left-hand corner (minimal effectiveness with increased efficiency)
or the lower right-hand corner (significant effectiveness with minimal efficiency)
may be in line with an organization’s particular strategies. In general, operating in
the lower left-hand corner (minimal efficiency and minimal effectiveness) is not
ideal for the operation of any organization.
LEARNING OUTCOMES
Buyer Power
Buyer power in the Five Forces Model is high when buyers have many choices of
whom to buy from and low when their choices are few. To reduce buyer power (and
create a competitive advantage), an organization must make it more attractive
for customers to buy from it instead of its competition. One of the best IT-based
examples is the loyalty programs that many organizations offer.
Loyalty programs reward customers based on the amount of business they do
with a particular organization. The travel industry is famous for its loyalty programs
such as frequent-flyer programs for airlines and frequent-guest programs for hotels.
Keeping track of the activities and accounts of many thousands or millions of cus-
tomers covered by loyalty programs is not practical without large-scale IT systems.
Loyalty programs are a good example of using IT to reduce buyer power; because of
the rewards (e.g., free airline tickets, upgrades, or hotel stays) travelers receive, they
are more likely to be loyal to or give most of their business to a single organization.
Supplier Power
Supplier power in the Five Forces Model is high when buyers have few choices of
whom to buy from and low when their choices are many. Supplier power is the con-
verse of buyer power: A supplier organization in a market will want buyer power to
be low. A supply chain consists of all parties involved, directly or indirectly, in the
procurement of a product or raw material. In a typical supply chain, an organiza-
tion will probably be both a supplier (to customers) and a customer (of other sup-
plier organizations) (see Figure 1.15).
As a buyer, the organization can create a competitive advantage by locating al-
ternative supply sources. IT-enabled business-to-business (B2B) marketplaces can
help. A business-to-business (B2B) marketplace is an Internet-based service that
brings together many buyers and sellers (discussed in detail in Chapter 3). One im-
portant variation of the B2B marketplace is a private exchange. A private exchange
FIGURE 1.14
Porter’s Five Forces Model
Threat of Substitute
Products or Services
Buyer Power
Supplier Power
Rivalry among Bargaining Bargaining
Bargaining power
Existing Competitors power of power of
of suppliers
channels end users
Threat of
New Entrants
FIGURE 1.15
An Organization within the
Supply Chain
Suppliers Organization Customers
is a B2B marketplace in which a single buyer posts its needs and then opens the bid-
ding to any supplier who would care to bid. Bidding is typically carried out through
a reverse auction. A reverse auction is an auction format in which increasingly
lower bids are solicited from organizations willing to supply the desired product
or service at an increasingly lower price. As the bids get lower and lower, more and
more suppliers drop out of the auction. Ultimately, the organization with the lowest
bid wins. Internet-based reverse auctions are an excellent example of the way that
information technology can reduce supplier power for an organization and create
a competitive advantage.
FIGURE 1.16
Porter’s Three Generic Strategies in the Auto Industry
Broad market
Kia Hummer
Focused market
Value Creation
A business process is a standardized set of activities that accomplish a specific task,
such as processing a customer’s order. To evaluate the effectiveness of its business
processes, an organization can use Michael Porter’s value chain approach. An or-
ganization creates value by performing a series of activities that Porter identified
as the value chain. The value chain approach views an organization as a series of
processes, each of which adds value to the product or service for each customer. To
create a competitive advantage, the value chain must enable the organization to
provide unique value to its customers. In addition to the firm’s own value-creating
activities, the firm operates in a value system of vertical activities including those of
upstream suppliers and downstream channel members. To achieve a competitive
advantage, the firm must perform one or more value-creating activities in a way
that creates more overall value than do competitors. Added value is created through
lower costs or superior benefits to the consumer (differentiation).
Organizations can add value by offering lower prices or by competing in a dis-
tinctive way. Examining the organization as a value chain (actually numerous dis-
tinct but inseparable value chains) leads to identifying the important activities that
add value for customers and then finding IT systems that support those activities.
Figure 1.17 depicts a value chain. Primary value activities, shown at the bottom of
the graph, acquire raw materials and manufacture, deliver, market, sell, and provide
after-sales services. Support value activities, along the top of the graph, such as firm
FIGURE 1.17
The Value Chain
FIGURE 1.18
The Value Chain and Porter’s Five Forces
Threat of
New Entrants
Threat of
Substitute Products
or Services
KEY TERMS
Wireless operators, credit card companies, and retailers are working on a technology that al-
lows customers to purchase items by using their cell phones. For example, a customer could
purchase a can of soda by dialing a telephone number on the dispensing machine and have
the charge for the soda show up on the customer’s cell phone bill. Working prototypes are
currently in use in South Korea, Japan, and Europe.
The ability to charge items to a cell phone has significant business potential because credit
cards are not nearly as popular in other countries as they are in the United States. In Japan
and China, for example, people are much more likely to have a cell phone than a credit card.
Japanese consumers use credit cards for only 5.6 percent of their personal spending com-
pared with 33 percent of U.S. consumer spending.
The payoff for credit card companies and cell phone operators from this technology could
be enormous. By associating a credit card with a cell phone, banks and credit card companies
hope to persuade consumers to buy products, such as soda, with their cell phones instead of
pocket change. Of course, they will reap transaction fees for each transaction. Mobile phone
operators see the technology as a way to increase traffic on their networks as well as to posi-
tion cell phones as an even more useful and, thus, essential device for consumers. Retailers
envision easier transactions also leading to more sales.
MasterCard International and Nokia are currently testing a cell phone credit card for the
U.S. market. The phones have a special chip programmed with the user’s credit card informa-
tion and a radio frequency transmitting circuit. Consumers can simply tap their phone on a
special device at a checkout counter equipped with a receiving device that costs the retailer
about $80. Betsy Foran-Owens, vice president for Product Services at MasterCard Interna-
tional, commented that with this technology, “You don’t even have to get off your phone to pay.
You can just tap this thing down at the register.” She also noted, “If you’re not going to carry
cash around, what are you going to carry? Your mobile phone.”
The only players who might not look favorably on the technology are the traditional tele-
phone companies, who must certainly view the technology as just one more threat to their
traditional telephone business.12
Questions
1. Do you view this technology as a potential threat to traditional telephone companies? If so,
what counterstrategies could traditional telephone companies adopt to prepare for this
technology?
2. Using Porter’s Five Forces describe the barriers to entry and switching costs for this new
technology.
3. Which of Porter’s three generic strategies is this new technology following?
4. Describe the value chain of using cell phones as a payment method.
5. What types of regulatory issues might occur due to this type of technology?
FIGURE 1.19
Innovative Business Innovative Managers
Managers
Jeffrey Immelt, General Electric (GE) ■ Repositioned GE’s portfolio with major acquisitions
in health care, entertainment, and commercial
finance
■ Created a more diverse, global, and
customer-driven culture
Robert Nardelli, Home Depot ■ Turned a $46 billion company focused on big stores
into a $70 billion chain with urban, suburban,
and international outlets
■ Drive for efficiency, such as centralizing
purchasing and investing in technology, pushed
margins above 30 percent
John Henry, Boston Red Sox ■ Broke the most fabled curse in sports, when the
Boston Red Sox won the team’s first World
Championship since 1918
■ Sold out all 81 home games for the first time in
team history
Questions
1. Choose one of the companies listed above and explain how it could use a chief informa-
tion officer (CIO), chief technology officer (CTO), and chief privacy officer (CPO) to improve
business.
2. Why is it important for all of DreamWork’s functional business areas to work together?
Provide an example of what might happen if the DreamWorks marketing department failed
to work with its sales department.
3. Why is information technology important to an organization like the Boston Red Sox?
4. Which of Porter’s Five Forces is most important to Home Depot’s business?
5. Which of the three generic strategies is PepsiCo following?
6. Explain the value chain and how a company like GE can use it to improve operations.
In his book, The World is Flat, Thomas Friedman describes the unplanned cascade of techno-
logical and social shifts that effectively leveled the economic world, and “accidentally made
Beijing, Bangalore, and Bethesda next-door neighbors.” Chances are good that Bhavya in
Bangalore will read your next X-ray, or as Friedman learned first-hand, “Grandma Betty in her
bathrobe” will make your JetBlue plane reservation from her Salt Lake City home.
Friedman believes this is Globalization 3.0. “In Globalization 1.0, which began around 1492,
the world went from size large to size medium. In Globalization 2.0, the era that introduced
us to multinational companies, it went from size medium to size small. And then around 2000
came Globalization 3.0, in which the world went from being small to tiny. There is a difference
between being able to make long-distance phone calls cheaper on the Internet and walking
around Riyadh with a PDA where you can have all of Google in your pocket. It is a difference
in degree that’s so enormous it becomes a difference in kind,” Friedman stated. Figure 1.20
displays Friedman’s list of “flatteners.”
Friedman writes these flatteners converged around the year 2000 and “created a flat world:
a global, Web-enabled platform for multiple forms of sharing knowledge and work, irrespective
of time, distance, geography, and increasingly, language.” At the very moment this platform
emerged, three huge economies materialized—those of India, China, and the former Soviet
Union—“and 3 billion people who were out of the game, walked onto the playing field.” A final
FIGURE 1.20
Thomas Friedman’s 10 Forces Friedman’s 10 Forces That Flattened the World
That Flattened the World
1. Fall of the Berlin Wall The events of November 9, 1989, tilted the worldwide balance of
power toward democracies and free markets.
3. Work flow software The rise of applications from PayPal to VPNs enabled faster,
closer coordination among far-flung employees.
convergence may determine the fate of the United States in this chapter of globalization. A
“political perfect storm,” as Friedman describes it—the dot-com bust, the attacks of 9/11, and
the Enron scandal—“distract us completely as a country.” Just when we need to face the fact
of globalization and the need to compete in a new world, “we’re looking totally elsewhere.”
Friedman believes that the next great breakthrough in bioscience could come from a
5-year-old who downloads the human genome in Egypt. Bill Gates’s view is similar: “20 years
ago, would you rather have been a B-student in Poughkeepsie or a genius in Shanghai? Twen-
ty years ago you’d rather be a B-student in Poughkeepsie. Today, it is not even close. You’d
much prefer to be the genius in Shanghai because you can now export your talents anywhere
in the world.”14
Questions
1. Do you agree or disagree with Friedman’s assessment that the world is flat? Be sure to
justify your answer.
2. What are the potential impacts of a flat world for a student performing a job search?
3. What can students do to prepare themselves for competing in a flat world?
4. Identify a current flattener not mentioned on Friedman’s list.
1. Competitive analysis
Cheryl O’Connell is the owner of a small, high-end retailer of women’s clothing called Ex-
celus. Excelus’s business has been successful for many years, largely because of Cheryl’s
ability to anticipate the needs and wants of her loyal customer base and provide them
with personalized service. Cheryl does not see any value in IT and does not want to invest
any capital in something that will not directly affect her bottom line. Develop a proposal
describing the potential IT-enabled competitive opportunities or threats Cheryl might be
missing by not embracing IT. Be sure to include a Porter’s Five Forces analysis and discuss
which one of the three generic strategies Cheryl should pursue.