Date post: | 07-Apr-2018 |
Category: |
Documents |
Upload: | manmeet-purbey |
View: | 220 times |
Download: | 0 times |
of 25
8/6/2019 Final Doc(for Revision)
1/25
DATA MANAGMENT AND IT LIKEY QUESTIONS AND
ANSWERS
Q1: Difference between Porters 5 forces theory and D'aveni's Theory.
Q2: Value Chain Concept: How can we use it?
Telecommuting: Factors, Concerns of Telecommuting?
Q3: Outsourcing: Reasons 4 Outsourcing (Inshore, Off-Shore); what should you do as a Gov. to
outsource more?
Q4: CIO: Duties, 8 Core Activities and Responsibilities
Q5: 3 theories of Ethics; what does PAPA policy mean? If ethics are overlooked, then what will
happen to the company?
Q6: 3 Methods of Funding, Positive and Negative Impact, In what circumstances is funding
important?
Q7: Application of Knowledge management .
8/6/2019 Final Doc(for Revision)
2/25
QUESTION 1: (CHAPTER 2)
MICHAEL PORTERS 5 FORCES:
General Managers can use the five competitive forces model to:
- Identify the key forces currently affect competition
- Recognize uses of IR to influences forces
- Consider likely changes in these forces overtime
This model provides a way to think about how IR can create competitive advantage for a business
unit and for the firm, even can reshape a whole industry.
Threats of New entrants from the possibility of new firm coming into company market: IR can be
used to build barriers that discourage competitors from entering the industry.
E.g.: Zaras IT supports its tightly knit group of designers, market specialist, production managers,
and production planners. New entrants are unlikely to provide IT to support relationships that have
been built over time. Furthermore, it has a rich information repository about customers that would be
hard to replicate.
Bargaining Power of Buyers: Switching costs can be any aspect of a buyer purchasing position that
decreases the likelihood of switching his or her purchase to a competitor. IR can be used to build
switching costs that make it less attractive for customers to purchase from competitors.
E.g.: Amazon.com One click encourages return purchases by making buying easier. Similarly,Apples ITunes simple to use interface and proprietary software on the iPod make it difficult for
customers to use other formats and technologies than the iPod.
Bargaining Power of Suppliers are the ability of buyers to use their market power to decrease a
firms competitive position. The company can use IR to reduce the dependence to the supplier.
8/6/2019 Final Doc(for Revision)
3/25
E.g.: - Steel firms lost some of their power over the automobile industry because car manufactures
developed technologically advanced quality control systems. Manufactures can now reject steel from
suppliers when it does not meet the required quality levels.
- Through the Internet, firms continue to provide information for free as the attempt to increase their
share of visitors to their Web sites. This decision reduces the power of information suppliers and
necessitates finding new ways for content providers to develop and distribution information.
Threats of substitute Products Manager must watch for potential substitutes from many different
sources to fully manage this threat.
E.g.: Consider how digital cameras have made film (and the cameras that use them) obsolete. CDs
and more recently digitally based MP3 files have made vinyl records (and the record players that usethem). IR can create advantages by reducing the threat of substitution.
E.g.: eBay brought out Pro-Stores, a service to help all sellers build their own Website. eBay
managers noticed that many sellers did not have any Web presence other than eBay, and the move
was another way to lock in these customers to the eBay environment. The more those sellers are
locked into an eBay environment, the less likely they will work with rivals. For competitors to be
successful, they needed to offer not just a substitute, but also a better service to these sellers. So far
none has.
INDUSTRY COMPETITORS
One way competitors differentiate themselves with an otherwise undifferentiated product is through
creative use of IS. Information provides advantages in such competition when added to an existing
product. E.g.: FedEx was able to take an early lead in the industry by adding information such as
deliver time, the place for receipts etc. to its delivery service. Information helped its differentiate its
offerings from competitors.
The firms must focus on the competitive actions of a rival to protect market share. Intense rivalry in
an industry ensures that competitors respond quickly to any strategic actions. The banking industry
illustrates this point. Several smaller competitors joined forces and shared information sources to
8/6/2019 Final Doc(for Revision)
4/25
create a competing network as the large Philadelphia based bank developed ATM network. This
made the large bank unable to create a significant advantage from its system and had to carry the full
cost of developing networks itself. As a result, IR was committed quickly to achieve neutralizing
results due to the high level of rivalry that existed between the local bank competitors in
Philadelphia.
As firms within an industry begin to implement standard business processes and technologies often
using enterprise wide system such as those of SAP and Oracle the industry becomes more
attractive to consolidation through acquisition. Standardizing IS lowers the coordination costs of
merging two enterprises and can result in a less competitive environment in the industry.
HYPERCOMPETITION FRAMEWORK (DAVENIS THEORY)
Those models focus on creating and sustaining competitive advantage, whereas hyper competition
model suggest that speed and aggressiveness of the moves and countermoves in any given market
create an environment in which advantages are rapidly created and eroded. It suggests seven
approaches and organization can take in its business strategy: superior stakeholder satisfaction,
strategic soothsaying, positioning for speed, position for surprise, shifting the rules of
competition, signaling strategic intent, simultaneous and sequential strategic thrusts.
THE DIFFERENCES BETWEEN PORTERS THEORY AND D AVENIS 7 S MODEL:
FRAMEWORK KEY IDEAL APPLICATION TO
INFORMATION SYSTEM
Porters Genetic Strategic
framework
Firms achieve competitive
advantage through cost
leadership, differentiation, or
focus
Understanding which strategy is
chosen by a firm is critical to
choosing IS to complement the
strategy
8/6/2019 Final Doc(for Revision)
5/25
DAvenis Hyper competition
Model
Speed and aggressive moves
and countermoves by a firm
create competitive advantage
The 7Ss give the manager
suggestions on what moves and
countermoves to make. IS are
critical to achieving the speed
needed for moves and
countermoves. IS are in a
constant state of flux or
development.
1) Competitive advantages contributed to sustainability (The role of IS in building and
sustaining competitive advantages)
Porter competitive forces framework argues that competitive advantages can be created by
manipulating the industrys forces. The resource-based view maintains that competitive advantages
come from the information and other resources of the firm. Additionally, while value chain model
focuses on a firms activities that can add value the firm in order to create competitive advantages,
this view focuses on the resources including information resources that it can manage and create the
competitive advantages of the firm.
Information resources include data, technology, people, and processes within an organization.
Information resources can be either assets or capabilities. They not only enable a firm to attain
competitive advantage but also enable the firm to sustain the advantage over the long term. The only
way to be sustainable for a firm is to continue to innovate or to protect against resource imitation,
substitution, or transfer.
E.g.: Wal-marts complex logistics management is deeply embedded in both its own and its
suppliers operations that imitation by other firm is unlikely. UPS was able to build a competing
information system to the one FedEx uses, but by the time it was up and running, FedEx has
innovated far beyond and continued to enjoy advantages.
8/6/2019 Final Doc(for Revision)
6/25
From IS perspective, some types of resources such as relationship skills are better than other for
creating attributes that enable a firm to attain and sustain competitive value (i.e., value, rarity, low
substitutability, low mobility, low imitability). Some IT management skills are general enough in
nature to make them easier to transfer and imitate relationship skills. They require not only themanagement of internally oriented resources such as IS infrastructure, systems development, and
running cost effective IS operation; but also the understanding of critical processes, social complex
working relationships as well as changes of business environments. Moreover, some technical
skills, such as knowledge of a firms use of technology to support business processes and
technology integration skills are not easily moved to another firm.
Another information resource is information repository. It requires to be filled with internally
oriented information designed to improve the firms efficiency as well as the external environment
and contain significant knowledge about the industry, competitors and customers
QUESTION 2
VALUE CHAIN : The value chain highlights how information system add value to the
primary and support activities of a firms internal operations, as well as to customers
activities, and other components of its supply chain.
The Value Chain model suggests that competition can come from two sources:
- Lowering the cost to perform an activity => Lowering activity cost only achieve an
advantage if the firm possesses information about its competitors cost structures (even
8/6/2019 Final Doc(for Revision)
7/25
though reducing isolated costs can improve profits temporarily, it does not provide a clear
competitive advantage unless a firm can lower its costs below a competitors).
- Adding value to a product or service so buyers will be willing to pay more. => adding
value is a strategic advantage if a firm possesses accurate information regarding its customer
such as: which products are valued? Where can improvements be made?
Much of the advantage of supply chain management comes from understanding how information is
used within each value chain of the system. Opportunities also exist in the transfer of information
across value chains.
E.g.: Amazon.com created a new paradigm for its competitors about how their value chain works
with the value offered to their customers through their traditional business. It began selling booksdirectly to customers over the Internet and bypassing the traditional industry channels. Customers
who valued time saved by shopping from home rather than driving to physical retail outlets flocked
to Amazon.coms website to buy books.
Linking many value chains into a value system can extend the value chain model. This value system
is a collection of value chains connected through a business relationship and through technology.
TELECOMMUTING (WHICH IS COMBINED FROM
TELECOMMUNICATION AND COMMUTING)
DRIVING FACTORS
Drivers Effects
The shift to knowledge-based
work
Eliminates requirement that
certain work can be performed in
a specific place
- Equipped with the right IT,
Employees can create,
assimilate and distribute
knowledge as effectively at
8/6/2019 Final Doc(for Revision)
8/25
home (or any place) as they
can at office.Changing demographics and life-
style preferences
Provide workers with the
geographic and time-shifting
flexibility.
New technologies with the
bandwidth
Makes remotely performance
work practical and cost effective
Reliance on Web Provides workers with ability to
stay connected to coworkers and
customers, even on a 24/7 basis
Energy concerns Reduces the cost of commuting
for the commuters and reduces
energy cost associated with real
estate for companies.
a. CONCERNS
o Management concerns: managers may feel that they may lose
control of their employees and be challenged in addressing the
performance evaluation and compensation.
o Remote workers need to be self-disciplined to get works done, get
out of high-level of distractions such as personal issues, personal
calls, visitors, familys
o It is difficult for employees to separate works from their familys
issues. Consequences are they will experience more stress or need
more time to fulfill the jobs.
8/6/2019 Final Doc(for Revision)
9/25
o Working remotely can disconnect an employee from his or her
companys culture and make them feel isolated. Consequently,
employee needs to take a special effort to stay connected.
o Offshoring problems: Authorities may find hard to manage work thathave done by workers from outside of country.
b. SUMMARY OF TELECOMMUTINGS ADVANTAGES AND
DISADVANTAGES .
QUESTION 3: (CHAPTER 7)
1) OUTSOURCING
DEFINITION : The purchase of a good or service that was previously provided internally, or
that could be provided internally.
Drivers (reasons) include (see the following table):
8/6/2019 Final Doc(for Revision)
10/25
8/6/2019 Final Doc(for Revision)
11/25
a. Keep core competencies in-house.
b. IS service or product that requires considerable security or confidentiality?
c. Time available in-house to complete IS projects.
d. In-house IT personnel.
Challenges to insourcing :
e. Getting needed IT resources from management.
f. Finding a reliable competent outsource provider.
8/6/2019 Final Doc(for Revision)
12/25
HOW DOES A GOVERNMENT ENCOURAGE FOREIGN
COMPANIES TO DO OUTSOURCING IN ITS COUNTRY?
- Invest in a substantial infrastructure: human capital, telecommunications and technology
parts. Most important, a groundwork must be laid in science and technology education,
especially IT education.
- Give marketing assistance to offshore vendors: assist firms in attaining recognized standards
of quality in the global marketplace.
- Promote collaborate efforts between government, software companies, financial institutions
and university.
- Offer specific incentives to companies that are considering their country as an offshoring
destination. They can, for example reduce/eliminate various taxes or ease bureaucratic
process required for the company.
- Ensure political stability for their country.
8/6/2019 Final Doc(for Revision)
13/25
QUESTION 4
RESPONSIBILITIES OF CIO:
The following responsibilities often define the role of the CIO:
1. Championing the organization: Promoting IT within the enterprise as a strategic tool for
growth and innovation.
2. Architecture management: Setting organizational direction and priorities.
3. Business strategy consultant: Participating in executive-level decision making.
4. Business technology planning: Bridging business and technology groups for purposes of
collaborating in planning and execution.
5. Application development: Overseeing legacy and emerging enterprise initiatives, as well
as broader strategic business unit (SBU) and divisional initiatives.
6. IT infrastructure management (e.g., computers, printers, and networks.): Maintaining
current technologies and investing in future technologies.
7. Sourcing: Developing and implementing a strategy for outsourcing (versus retaining in-
house) IT services and/or people.
8. Partnership developer: Negotiating relationships with key suppliers of IT expertise and
services and making sure everyone is working toward mutual goals.
8/6/2019 Final Doc(for Revision)
14/25
9. Technology transfer agent: Providing technologies that enable the enterprise to work
better with suppliers and customers both internal and external and consequently,
increase shareholder value.
10. Customer satisfaction management: Understanding and communicating with both
internal and external customers to ensure that customer satisfaction goals are met.
11. Training: Providing training to IT users, as well as senior executives who must
understand how IT fits with enterprise strategy.
12) Business discontinuity/disaster recovery planning: Planning and implementing strategies to limit
the impact of natural and human-made disasters on information technology and, consequently, the
conduct of business.
MANAGERS EXPECTATION FROM THE IS ORGANIZATION
Managers can expect 8 core activities from the IS organization so they can plan and implement
business strategy accordingly
1. Anticipating new technologies.
IT must keep an eye on emerging technologies.
Work closely with management on decisions.
Weigh risks and benefits of new technologies.
2. Participating in setting strategic direction.
IS can act as consultants to management.
Educate managers about current technologies/trends.
3. Innovating current processes.
Review business processes to innovate.
8/6/2019 Final Doc(for Revision)
15/25
Survey best practices.
4. Developing and maintaining systems.
Build or buy software.
5. Supplier management.
Carefully manage outsourced IT.
6. Architecture and standards.
Be aware of incompatibilities.
Inconsistent data undermines integrity.
7. Enterprise Security
Important to all general managers.
Much more than a technical problem.
8. Business continuity planning
Disaster recovery.
What if scenarios.
8/6/2019 Final Doc(for Revision)
16/25
QUESTION 5
3 THEORIES OF ETHICS
STOCKHOLDER THEORY
-Stockholders advance capital to corporate managers who act as agents in advancing theirends.
- Managers are bound to the interests of the shareholders (maximize shareholder value).
Managers duties :
- Bound to employ legal, non-fraudulent means.
- Must take long view of shareholder interest.
STAKEHOLDER THEORY
8/6/2019 Final Doc(for Revision)
17/25
Managers are entrusted with a responsibility (fiduciary or other) to all those who hold a stake
in or a claim on the firm.
Stakeholders are
Any group that vitally affects the corp. survival and success.
Any group whose interests the corp. vitally affects.
Management must enact and follow policies that balance the rights of all stakeholders
without impinging upon the rights of any one particular stakeholder.
SOCIAL CONTRACT THEORY
- Consider the needs of a society with no corporations or other complex business
arrangements.
- What conditions would have to be met for the members of a society to agree to allow a
corporation to be formed?
- Corporations are expected to create more value to society that it consumes.
- Social contract:
o 1. Social welfare corporations must produce greater benefits than their
associated costs.
o 2. Justice corporations must pursue profits legally, without fraud or deception,
o and avoid actions that harm society.
8/6/2019 Final Doc(for Revision)
18/25
TO SUMMARIZE
PAPA PRINCIPLES
PRIVACY
- Those who possess the best information and know how to use it, win.
- However, keeping this information safe and secure is a high priority (see Figure 9.2).
- Privacy the right to be left alone.
- Managers must be aware of regulations that are in place regarding the authorizedcollection, disclosure and use of personal information.
ACCURACY
- Managers must establish controls to insure that information is accurate.
8/6/2019 Final Doc(for Revision)
19/25
- Data entry errors must be controlled and managed carefully.
- Data must also be kept up to date.
- Keeping data as long as it is necessary or legally mandated is a challenge.
PROPERTY
- Mass quantities of data are now stored on clients.
- Who owns this data and has rights to it is are questions that a manager must answer.
- Who owns the images that are posted in cyberspace?
- Managers must understand the legal rights and duties accorded to proper ownership.
ACCESSIBILITY
- Access to information systems and the data that they hold is paramount.
- Users must be able to access this data from any location (if it can be properly secured
and does not violate any laws or regulations).
- Major issue facing managers is how to create and maintain access to information for
society at large.
o This access needs to be controlled to those who have a right to see and use it
(identity theft).
o Also, adequate security measures must be in place on their partners end.
8/6/2019 Final Doc(for Revision)
20/25
PAPA AND MANAGERS
- Managers must work hard to implement controls over information highlighted by PAPA.
- Limit access to data avoid identify theft, and respect customers privacy.
- FTC requires more disclosure of how companies use customer data.
o Gramm-Leach-Bliley Act (1999)
- Information privacy guidelines must come from above: CEO, CFO, etc.
a. Supporting you do things in your company without any concern about ethics.
QUESTION 6
Funding IT
a. 3 METHODS OF FUNDING
o Chargeback method
- IT costs are recovered by charging individuals, departments, or business units
- Rates for usage are calculated based on the actual cost to the IT group to run the system
and billed out on a regular basis
8/6/2019 Final Doc(for Revision)
21/25
8/6/2019 Final Doc(for Revision)
22/25
QUESTION 7
Knowledge Management Process:
A.1. Knowledge Generation
Concerns the intentional activities of an organization to acquire/create new knowledge.
8/6/2019 Final Doc(for Revision)
23/25
8/6/2019 Final Doc(for Revision)
24/25
2. Identify existing knowledge necessary to achieve strategic intent.
3. Evaluate existing knowledge for usefulness and the ability to be codified.
4. Determine the appropriate medium for codification and distribution.
A.4. Knowledge Transfer
Involves transmitting knowledge from one person or group to another and the absorption of
that knowledge.
Four different modes of knowledge transfer are:
1. Socialization: from tacit knowledge to tacit knowledge
2. Externalization: from tacit knowledge to explicit knowledge
3. Combination: from explicit knowledge to explicit knowledge
4. Internalization: from explicit knowledge to tacit knowledge
8/6/2019 Final Doc(for Revision)
25/25
Tacit Knowledge Explicit knowledge
Tacit
Knowledge
Socialization
Transferring tacit knowledge
through shared experiences,
apprenticeships, mentoring
relationships, on-the-job training,
and talking at the water cooler.
Externalization
Articulating and thereby
capturing tacit knowledge
through use of metaphors,
analogies, and models.
Explicit
knowledge
Combination
Converting explicit knowledge
into tacit knowledge; learning by
doing; studying previously
captured explicit knowledge
(manuals, documentation) to gain
technical know-how.
Internalization
Combining existing explicit
knowledge through exchange
and synthesis into new explicit
knowledge.
FRO
TO