Sunday, May 23, 2010

Chapter 11 - Project Management

  1. Explain the triple constraint and its importance in project management.
    The triple constraint is the need to balance the scope, time and cost of a project. It is invariable that changes to the cost, time and scope of a project may be made. As a resultit is necessary to modify the other two constraints to finish the project.
    Increased scope = increased time+ increased cost
    tight time = increased costs + reduced scope
    tight budget = increased time + reduced scope

    http://tritonpm.com/images/Triple.jpg
  2. Describe the two primary diagrams most frequently used in project planning.
    The two primary diagrams used in project planning are PERT and Gantt charts.

    Program Evaluation and Review Technique (PERT) Chart
    grphical network model that depicts a project's tasks and the relationships between those tasks, i.e. it outlines when tasks can be completed in relation to other tasks due to restrictions such as personel.

    http://www.staff-planner.com/Projectit/ProjectMgt/pert_chart_full.gif
  3. Gantt Chart
    A bar chart that illustrates a project schedule. The project's tasks and time frame are listed horizontally.
    http://www.total-quality-management-software.com/images/project_gantt_chart.gif

  4. Identify the three primary areas a project manager must focus on managing to ensure success.
    To ensure sucess a project manager must focus on:
    1) Managing people: a project manager must be able balance the professional needs of a project with the professional and person needs of a project manager's team. A project manager must be able to resolve conflicts and ensure that employees understand their role and function.
  5. 2) Managing communicaitons: project managers must ensure that all communications are directed at the appropriate persons, ensuring that all vital information regarding the project is directed at the right people, ensuring that development will be implemented. Poor communication can result in conflict and poor understanding of tasks.
    3) Managing Change: project managers must be able to cope with changes that occur throughout the project. The project manager must be able to react and anticipate, if possible, changes so that they do not damage the profitability of teh project.


  6. Outline 2 reasons why projects fail and two reasons why projects suceed.
    Projects fail because of a lack of communication. If the project manager does communicate adequately with employees then they will be unable to complete their tasks speedily and to the proper specifications. This will decrease the profitability of the project. Projects also fail due to the inability to align the project with the goals of the company. A standalone project may be inconsistent with the companies needs making it difficult to receive funding and support for the project. Even if the project is completed the result would not be beneficial to the company.

    Projects suceed because they have a clear plan. A project with a clear plan enables employees to make good use of their time as they know what they should be doing and additional tasks that must be completed once finished. A clear plan also allows teams to coordinate their work so that there are fewer delays. Projects also suceed if a project manager is flexible. If a project manager is flexible this enables employees to suggest improvements and modifications tot eh project that could result in a higher profit.

Chapter 9 - Customer Relationship Management & Business Intelligence

  1. What is your understanding of CRM?
    Customer relationship management is a business strategy for managing a company's interactions with clients and sales prospects. CRM is beneficial to a business as it can increase customer loyalty and retention, which increases the profitability of an organisation. By appearing as friendlier businesses retain existing customers which is cheaper than finding new customers.

    http://www.marketingteacher.com/IMAGES/crm_model.gif

  2. Compare operational and analytical customer relationship management.
    Operational CRM is short term operational data that assists in processing the day to day operations or systems that interact with customers. An example of an operational CRM system is Microsoft Dynamics CRM. It is designed to integrate with Microsoft programs.
    Analytical CRM uses operational data to establish trends within customers (data mining). Analytical CRM also focuses on long term customer relationship trends. This enables a business to gain an idea of customer needs and whether they are being achieved.
    http://crm.dynamics.com/
  3. Describe and differentiate the CRM technologies used by marketing departments and sales departments.

    Sales Department
  4. The sales department works to increase the volume of sales and meet current sales quotas. The sales department is focused on the short term as they use their skills to sell todays customers.
    Sales force automation (SFA) - a system that automatically tracks the steps in the sales process. Focuses on increasing customer satisfaction, building customer relationships and improving product sales by tracking all sales information.


    Marketing Department
    List generators - compiles customer information from a variety of sources. E.g. questionnaires, website visits, etc. Once information is gathered a company can sort and filter it. A list generator enables a business to make strategic decisions.
    Compaign management systems - guides users through marketing campaigns performing tasks e.g. scheduling. Campaign management systems incorporate the cost associated with campaigns, cost of inventory and the amount of customer sales.Cross selling and up selling - Cross selling offers an additional product or service. E.g. a matching tie for a shirt. Up selling increases the value of a sale. E.g. upsizing a meal at McDonalds.
    http://www.youtube.com/watch?v=kJV_UZfX38o

  5. How could a sales department use operational CRM technologies?
    Operational CRM technologies assist in the day to day operations of a business. Campaign management for example provides information upon scheduling and systems can be established for upselling and cross selling to maximises profits.
  6. Describe business intelligence and its value to businesses.
    Business intelligence is data that can be gained from technology which can be used for strategic decision making by analysing the data to find patterns and trends. Business intelligence is important as it enables sound business decisions necessary for the business' survival.
    http://en.wikipedia.org/wiki/Business_intelligence
    Programs such as excel can provide business intelligence as they can analyse data and present in formats such as tables and graphs.

    http://pubpages.unh.edu/~pit2/excel.jpg


  7. Explain the problem associated with business intelligence. Describe the solution to this business problem.
    The biggest problem with business intelligence is the large amount of data that can be gathered. Data, however, is useless until it is analysed and becomes information. The sheer amount of data makes this a difficult process. Businesses must ensure that they have the adequate resources and tools to record and analyse data that is necessary for their business.

  8. What are two possible outcomes a company could get from using data mining?
    Data mining is the application of statistical techniques to find patterns and relationships among data and to classify and predict. Data mining may increase profits as it reveals trends that can be targeted by future marketing campaigns. Data mining also highlights trends which may indicate where the company can best allocate its resources int he future.

    http://www.nasatech.com/Spinoff/spinoff2002/images/123.jpg

Chapter 8 - Operations Management and Supply Chain

  1. Define the term operations management
    Operations Management is the management of systems or processes that convert or transform resources into goods and services. It aims to reduce the resources needed whilst meeting customer requirements. Operations management is responsible for the core processes used to manufacture goods and produce services.
    http://en.wikipedia.org/wiki/Operations_management

  2. Explain operations management’s role in business
    The role of operations management within a business is to ensure that the business is efficient, using as little resources as possible, and effective, meeting customer requirements. Operations management is chiefly concerned with managing the process of converting inputs into outputs.

    http://www.jiscinfonet.ac.uk/InfoKits/system-selection/three-components
    Operations management functions in interrelated activities such as: forecasting, capacity planning, scheduling, managing inventory, assuring quality, motivating and training employees and locating facilities.


  3. Describe the correlation between operations management and information technology.
    IT can influnce operations management in areas such as: productivity, costs, flexibility, quality and customer satisfaction. IT provides information which is crucial for managers to make well informed decisions. IT can provide a number of different information forms such as the what-if analysis, sensitivity analysis and drill downs. They enable the correct business decision to be made in the circumstances.


  4. Explain supply chain management and its role in a business
    Supply chain management is the management of the information flows between the various stages in a supply chain to maximise the total effectiveness of the supply chain and increase profitability. Supply chain management is vital in business as it enables firms to keep track of their inventory.

  5. http://www.youtube.com/watch?v=6rmV__Yrk7Q


  6. List and describe the five components of a typical supply chain.
    1) Supplier: provides goods/services to a company to be used in the manufacturing process.
    2) Manufacturer: makes products or services for businesses.
    3) Distributor: a person or company that delivers the goods or services to the retailer.
    4) Retailer: the shop where the product or service is sold.
    5) Customer: the person who purchases the good or service from a retailer.
  7. http://www.techexchange.com/thelibrary/resources/B2Bjones-5.jpg


  8. Define the relationship between information technology and the supply chain.
    Information Technology improves the forecast and operations of the supply chain.
    Information technology provides greater visibility over varying levels of the supply chain as goods can easily be located.
    Information enables a faster response to consumer demands within the supply chain. This can create a competitive edge for a company differentiating itself by its fast delivery of goods.

Chapter 7 – Networks & Wireless

1. Explain the business benefits of using wireless technology.Wireless technology increases availability.
Users can remain in contact 24/7. Wireless technology allows increased flexibility and mobility as users can be networked without sitting at dedicated PCs. Wireless networks reduce costs as they are cheaper to install and maintain. By improving the communication systems of a business the efficiency of a business is improved as information is transferred faster between colleagues and customers.
http://www.is4profit.com/business-advice/it-telecoms/wireless-communications/the-benefits-of-wireless-communication.html

2. Describe the business benefits associated with VoIP.
The biggest benefit VoIP provides to business is that VoIP calls over a company’s intranet do not receive charges from a telecommunication company as they run on a private network. Costs are also reduced when calls are made over the internet, especially international calls which cover large distances. Skype is an example VoIP. It enables telephone and video calls over the internet.

http://blog.tmcnet.com/blog/tom-keating/images/skype-hq-video-with-rich-1.jpg



3. Compare LANs and WANs.
A local area network (LAN) connects computers within a small geographical region such as a business’ premises. LANs connect via Ethernet connections, routers and the internet to share data and internet connections. Firewalls are used to prevent unauthorised access.

http://www.garethjmsaunders.co.uk/pc/images/network/router/02_lan_router.gif
A wide area network (WAN) varies from a LAN as it connects computers over a wide geographical region. LANs rely upon cabled connection whilst WAN’s rely upon the internet and wireless forms of communication such as satellites to connect computers together. WANs may be implemented across multinational corporations to enable them to share information across offices

http://insan87.files.wordpress.com/2008/04/wan.gif

4. Describe RFID and how it can be used to help make a supply chain more effective.
Radio Frequency Identification is a method of tracking inventory. Small tags are used which receive and transmit radio signals to identify what the inventory is and where it is. Passive RFID tags have no internal power flow. Active RFID tags operate upon the same basis but have an active power flow.RFID is a low cost method of increasing the efficiency of the supply chain as cargo can easily be identified and located. This technology also enables downstream users, such as customers, to track where a product is located.

5. Identify the advantages and disadvantage of deploying mobile technology.
Mobile technology is any form of technology that can travel with its user. When connected to the internet mobile technology can provide real time information. For example, the iphone.

http://www.mapds.com.au/newsletters/0807/iphone_home.gif

Advantages:
The mobility of the technology means that it is convenient. An employee can access important information in real time at any location.Mobile technology is relatively cheap.The processors of mobile technology are powerful enough to provide real time information.The portability of mobile devices enables a broad reach as users can be reached instantly.

Disadvantages:
Mobile technology is convenient its processing power is limited and a pc may be needed to run complex programs.Mobile devices are insecure. There is a threat of Bluetooth hacking which could cause significant business and personal information to be lost.

Chapter 6 – Databases and Warehouses

1. List, describe, and provide an example of each of the five characteristics of high quality information.
1) Accuracy – information is precise and correct. For example, correctly recording customer details such as name, address, etc.
2) Completeness – all the necessary values are included for a field. For example, including the street, city, state and postcode in an address.
3) Consistency – basic information must correspond with detailed information. For example, all total fields should equal the true total of individual fields.
4) Uniqueness – Representing transactions, entities and events once in information. For example, duplicating a transaction.
5) Timeliness – Information is current and updated as the business requires. For example, is information updated weekly, daily or hourly?

2. Define the relationship between a database and a database management system.
Database: A logical collection of interrelated information, managed and stored as a unit. A database maintains information about various types of objects, events people and places. A database has a schema which provides a structural description of the type of facts held in the database.
http://geoapp2.gov.mb.ca/website/MAFRI/Glossary3.html&ei=dK7wS6jMHMyOkQXa0NznBg&sa=X&oi=define&ct=&cd=1&ved=0CCEQpAMoBw&usg=AFQjCNEwXVcF4VnOICOX0oxTQwehu9DDPw
3. Describe the advantages an organisation can gain by using a database.
Databases reduce data redundancy by recording data in one place. This also creates a more efficient computer system a less space is required. Databases can create limits for fields which also limit errors. Databases allow an increased level of security through authentication processes such as passwords and access controls. This is increasingly necessary due to the growth of the internet which has lead to more malicious virtual activity. http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1075422994&type=RESOURCES

4.Define the fundamental concepts of the relational database model.
A relational database maintains a set of separate, related tables, but combines data elements from these files for queries and reports when required. This is achieved by creating relationships between the fields of separate tables. The primary key function ensures that records within a table are unique. A primary key field will contain no duplicates or blank values.
http://www.pcmag.com/encyclopedia_term/0,2542,t=relational+database&i=50369,00.asp

http://www.novixys.com/Exult/Relationships_1021_01.jpg

5.Describe the benefits of a data-driven website.
Data driven website is an interactive website related to the needs of its customers by using a database. The benefits of data-driven websites are:Development: the website owner can make changes at any time without a developer or knowledge of HTML programming.Content management: Removes confusion as there is no intermediary such as a website developer to update websites.Future expandability: the website can easily be expanded in the future. Functions such as changing the layout, display and functionality such as adding more features and sections can be achieved easily.Minimising human error: errors and mistakes are likely to occur in a website. To compensate it is necessary to have error trapping mechanisms which ensure that the required information is filled out correctly and content is entered and displayed correctly.Cutting production and update costs: the website is cost-efficient because there is less need for a programmer as the website owner can publish content.More efficient: Computers enable large amounts of information to be stored in a small space. Global changes can be made to layout, navigation and site structure need to be programmed only once. A data-driven infrastructure improves the reliability and stability of a website.Improved stability: Data driven websites are not prone to information loss if the programmer is disrupted or does not retain the latest template.
An example of a data driven website is http://en.wikipedia.org/wiki/Main_Page.


6. Describe the roles and purposes of data warehouses and data marts in an organization.
A data warehouse is a logical collection of information from many different databases that help decision making and business analysis. The purpose of a data warehouse is to gather coarse information throughout an organisation into a single storage space to make business decisions and analysis. The purpose of a data warehouse is to gather information throughout an organisation into one store that enables employees to make decisions and conduct business analysis activities.


Chapter 5 – Enterprise Architectures

1. What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?
Information architecture identifies where and how important information is maintained and secured. Information Architecture is responsible for planning the backup and recovery, disaster recovery and information security systems.Information Infrastructure is the equipment that enables goals in backup and recovery, disaster recovery and information security systems to be achieved. Information infrastructure supports and achieves the goals that are outlined in the information architecture through the equipment.

2. Describe how an organisation can implement a solid information architecture. 1.Backup and recovery
Creating an exact copy of system information so that in the event of an emergency a system may recover from failure. Backup and recovery media range from cd and dvds to servers. The most appropriate method suits the business goals and objectives. A small business will not find it necessary, fro example, to have information backed up hourly on an off site server.
2. Disaster Recovery
Implementing a disaster recovery plan to the business operations, a detailed process for recovering information in the case of a catastrophic disaster. This also includes a business continuity plan which details how a business will restore its lost information in a time frame.
3. Information Security
Protecting classified and personal information to avoid information misuse and manipulation. This is achieved by managing user access and ensuring up to date antivirus and software updates are installed.


3. List and describe the five requirement characteristics of infrastructure architecture.
1)Flexibility – systems must be able to meet all business challenges. The infrastructure architecture must be able to adapt to new situations.
2)Scalability – the system must be able to adapt to increased demand. Growth can be driven by a number of unpredictable factors. The infrastructure architecture must be able to cope with anticipated and unanticipated growth. This can be achieved through capacity planning which determines the future IT infrastructure requirement such as new equipment and additional network capacity.
3) Reliability – ensures that all systems are functionally correctly and providing accurate information. Incorrect information places a business at risk of making poor decisions.
4) Availability – when a system can be accessed by users. High availability is the goal of all IT systems. Many websites provide services which are available 24/7. Systems do require maintenance, upgrades and repairs which is a competing demand that must be minimised to maintain a high level of availability.
5) Performance – how quickly a system performs a process or transaction. It is necessary to have high performance IT systems or risk customers moving to a competitor.

4. Describe the business value in deploying a service oriented architecture.
A service orientated architecture is a business approach which uses systems to link resources on demand. Resources are made available to other participants in the network as independent services that are accessed in a standardized way. SOA is based upon loose coupling which joins services on demand to create composite services but can easily disassemble functional components. This enables businesses to remain flexible and adapt quickly to changing business needs.
http://www.sybase.com/detail?id=1054411

http://blogs.cofc.edu/gradschool/files/2009/07/soacorecomponentsdiagram.jpg

5. What is an event?
An event is an electronic message indicating that something has happened. It detects threats and opportunities and alerts those who can act on the information. User-generated events include keystrokes and mouse clicks, among a wide variety of other possibilities.

6. What is a service?
A service is a business task. For example, checking a customer's credit rating.

7. What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?
Companies can use virtualisation and grid computing to utilise their infrastructure more effectively:

Virtualisation: A framework that divides computers into multiple execution environments. This increases physical resources and consequently maximises a business' investment in hardware. For example, you may run multiple operating systems on one computer.

http://pcwin.com/media/images/screen/66219-parallels_workstation_for_windows.jpg

Grid computing:
Grid Computing is an aggregation of geographically scattered computing, storage and network resources, corresponding to distribute superior performance, higher quality of service, better deployment and easier access to data. Grid computing is beneficial as it improves the efficiency and collaboration of virtual organizations and respective computing and data resources, and Allows broadly isolated departments and businesses to generate virtual organizations.

http://www.adarshpatil.com/newsite/images/gridcomputing.gif





Friday, March 26, 2010

Chapter 4 - Ethics and Information Security

1. Explain the ethical issues surrounding information technology.
The violation of intellectual property is an increasing issue due to advances in technology. Advances in technology have enabled people to copy many forms of media. File sharing software such as utorrent make it possible to share intellectual property without the owners permission and without paying. In Australia file sharing is illegal, however, it is very difficult to enforce ethical principles and standards upon the use of technology despite the fact they are enshrined in the law.
Privacy is also an increasing moral dilemma. Advances in technology allow information to easily be gathered by anyone. Under the Privacy Act 1988 in Australia all people have the right to have some information remain outside the public domain. Facebook, for example, violated the privacy of its users through its beacon program which used data about its users to produce advertisements without asking users to participate or allowing them to opt-out of the service.

2. Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.


An email privacy policy outlines how a business' email system may be used. It states what activities are permitted, details what information will be recorded and who may access it, and provides the monitoring and auditing process for this information. Whilst an internet contains general principles to guide the proper use of the internet such as defining the purpose of internet access and its restrictions and the ramifications for violating the policy. An internet use policy is much broader as it regulates the use of the internet rather than just email which is a use of the internet. The internet use policy may
therefore contain the email use policy because it is a function which uses the internet.

3. Summarise the five steps to creating an information security plan
  1. Develop the information security policies - Identify who is responsible and accountable for designing and implementing the organisation's information security policies. Policies include requiring users to log on and off their systems and never sharing passwords. The chief security officer (CSO) is responsible for designing the policy.
  2. Communicate the information security policies - Train all employees on the policies and establish clear expectations for adherence.
  3. Identify Critical Information Assets and Risks - Require the use of user IDs, passwords and anti-virus software. Ensure any systems that contain links to external networks have the appropriate technical protection. e.g. firewalls and intrusion detection software.
  4. Test and re-evaluate risks - Continually perform security reviews, audits, background checks and security assessments.
  5. Obtain stakeholder support - gain the approval and support of the information security policies from the board of directors and stakeholders.

4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

Authentication: A method for confirming users' identities.

Authorisation: the process of giving someone permission to do or have something.

Authentication identifies who the user is. It is the first step of the process as it enables the process of authorisation. Authorisation differs as it is the process of determining (once the user has been identified) the access privileges of that user. In a business the process may determine what files a user can access or their amount of storage space.
There are three groups of authentication and authorisation techniques that are used:

2. something the user has e.g. smart card







3. something that is part of the user e.g. fingerprint

5. What the Five main types of Security Risks, suggest one method to prevent the severity of risk?


Human Error - an employee may not be proficient or by accident may make a mistake that damages the business.
This can be prevented or limited by creating or modifying training procedures to produce adequate employees.



Natural Disasters - destructive events on a large scale such as a bushfire, tsunami or an explosion.
It is impossible to predict natural disasters so companies attempt to limit their damage by creating a disaster recovery plan. This can involve preparation such as creating an offsite data storage.



Technical Failure - Includes failure of the hardware such as a hard drive crashing and software failures created by viruses, trojan horses and spam.
Hardware failure can be prevented by employing IT professionals to service hardware regularly. Software failures can be prevented by installing firewalls and anti-virus which updated regularly.



Deliberate Acts - Deliberate acts by people which damage the information systems of a business. May include actions such as employees and former employees destroying data or cyber criminals who hack systems to steal information and sell to competitors.
Deliberate acts can be prevented by enforcing harsh penalties for damage and strong passwords.



Management Failure - failure of the information technology system caused by poor management such as a lack of procedure, documentation or training.
Management failure can be prevented by developing a security plan, obtaining skilled staff through training, recruitment or outsourcing, and purchasing a corporate security package.

Tuesday, March 16, 2010

CHAPTER 3 - e-Business

1. What is an IP Address? What is it’s main function?
An Internet Protocol address is a unique numeric identifier of a computer in a network. It's performs two main functions as a host or network interface identification and location addressing. Network interface identification is the process whereby the IP address provides unique identification between a device and a network to ensure data is delivered to the correct recipient.
http://en.wikipedia.org/wiki/IP_address

2. What is Web 2.0, how does it differ from 1.0?
Web 2.0 describes a new set of trends in the internet's use. It is characterised by user participation, openness and network effects. It does not describe any updates of technical specifications or technology. Web 1.0 varies from web 2.0 as it did not enable user participation or openness, only the owner of a site could edit information. Internet users could not edit information, but they could view it.

3. What is Web 3.0?
Web 3.0 describes the future trends of the internet. It suggests the internet will transform into a database which will build information and form artificial intelligence, enable devices to connect with each other, search for information through different media, and/or progress to 3D sharing spaces. Artificial intelligence can be achieved through metadata (information about information) such as tagging which will enable a computer to predict new information such as movies an internet user may like.

4. Describe the different methods an organisation can use to access information

Intranet
An intranet is an internalised portion of the internet, protected from outside access. It allows an organisation to share information and programs to members. In business an intranet enables organisations to privately present organisational information in a central location for employees.

Extranet
An extranet is an extension of an intranet which enables strategic allies such as customers, suppliers and partners to access intranet based information and application software such as order processing. The system is beneficial as it can produce greater efficiency and improved customer relation.

Portal
A portal is a website that provides access to information through resources and services such as email and online discussions.

Kiosk
A publicly accessible computer system that allows interactive information browsing. A program runs in full screen mode which provides simple tools for navigation. E.g. Airpot self service kiosks reduce waiting time.

Internet Service Provider (ISP)
An ISP is a company the provides an individual or company with access to the internet. They also provide services such as website hosting and building, and hard-disk storage space.

Online Service Provider (OSP)
An OSP offers the services of an ISP but in addition offer unique service such as their own browser and online content.

Application service provider (ASP)
An ASP offers an organisation access to systems and services over the internet that would otherwise be located in personal or organisational computers. An ASP also assumes the operation, maintenance and upgrade responsibilities for a system. ASPs give small to medium businesses access to applications and systems that they would not be able to access unless they were large companies due to the cost and resources required. Service Level Agreements (SLAs) define the responsibilities of the ASP and customer expectations.

5. What is eBusiness, how does it differ from eCommerce?
eBusiness
conducting business on the internet, including buying and selling, but also serving customers and collaboration with business partners.

eCommerce
The buying and selling of goods and services over the internet.

eBusiness varies from eCommerce as it is not restricted to the buying and selling of goods and services. eBusiness includes all business activities that are conducted over the internet such as collaboration with business partners.

6. List and describe the various eBusiness models?
An eBusiness model is an approach to conducting electronic business on the internet.

Business-to-business (B2B)
Businesses buying from and selling to each other over the internet. Online access to data such as expected shipping and delivery dates provided by the seller or a third party are common. Electronic marketplaces are interactive business communities providing a central market where multiple buyers and sellers can engage in ebusiness activities. They increase market efficiency by tightening and automating the relationship between buyers and sellers.

Business-to-consumers (B2C)
A business sells its products or services directly to the consumer over the internet.
e-shop - an online store where customers can buy products at anytime during the day.
e-mall - consists of a number of e-shops and serves as a gateway through which a visitor can access other e-shops. e-shops in e-malls benefit from increased traffic as consumers will often browse neighbouring stores.

Consumer-to-business (C2B)
A consumer sells a product/service over the internet to a business. An intermediary is often used, e.g. istockphoto.com enables consumers to sell their stock images to companies.

Consumer-to-consumer (C2C)
Sites primarily offering goods and services which assist consumers to conduct business over the internet. They enable consumers, for a small fee, to sell goods without establishing a physical business.
electronic auction - sellers and buyers solicit consecutive bids from each other and prices are determined dynamically.
Forward Auction - the seller offers the item to many buyers and the highest bidder wins.
Reverse Auction - buyers purchase the product or service with the lowest bid.
Communities of interest - people interact on specific topics of interest.
Communities of relations - people share life experiences.
communities of fantasy - people participate in imaginary environments.

7. List 3 metrics you would use if you were hired to assess the effectiveness and the efficiency of an eBusiness web site?
cookie - a small file deposited on a hard drive by a website containing information about customers and their activities. They allow websites to record when customers enter and exit a website.
Click-through - counts the number of people who visit a site and click on an advertisement. Measures exposure to target adds as it cannot provide any information such as whether the user liked the ad or the time spent viewing the ad.
Banner ad - calculating the number of times an ad has been clicked on resulting in accessing the business's website.

8. Outline 2 opportunities and 2 challenges faced by companies doing business online?

Online business provides the opportunity to establish a business because of its relatively low setup cost. It does not, for example, require investment in physical premises. Furthermore, the internet is global which enables a business to gain far more exposure than would be possible through a conventional store and advertisements which would be localised to an area or country.

One major challenge faced by companies doing business online is competition. The internet has drastically increased the amount of competition a company may have through the process of globalisation. Consumers are not restricted by the distance of a supplier of a good or service as the internet allows them to conveniently order and pay with companies throughout the world. Conducting business over the internet can be risky as it records and stores details of both companies and their customers. Companies must therefore employ security to protect themselves and their customers in order to conduct business over the internet or the information from the company and customers can easily be misused to their disadvantage.

Friday, March 12, 2010

CHAPTER 2 - Strategic Decision Making

1. Define TPS & DSS, and explain how an organisation can use these systems to make decisions and gain competitive advantages
Transaction processing system (TPS) is the basic system that serves the operational level (analysts) in an organisation. For example, operational accounting systems such as payroll.

A decision support system (DSS) models information to support managers and business professionals during the decision making process. For example, Wellington taxi company's GPS system.

2. Describe the three quantitative models typically used by decision support systems.

Sensitivity Analysis
Study of the impact that changes in a model have on other parts of the model. Often users change one variable to observe the resulting changes in other variables.


http://www.rockresearch.com/images/Price%20Sensitivity%20Analysis.bmp

What-if analysis
Tests the impact of a change in assumption on the proposed solution and is repeated until all effects of various situations are understood.


Goal-Seeking Analysis
Finds the input necessary to achieve a goal by repeatedly changing variables until the goal is achieved.

3. Describe business processes and their importance to an organisation.
Business processes are a standardised set of activities that accomplish a specific task. Business processes transform a set of inputs into a set of outputs (goods or services) for another person/process by using people and tools.

By optimising and automating business processes a logical business process can be achieved which reduces undesirable occurrences in a business such as bottlenecks, eliminating duplicate activities, and identifies smooth-running business processes. Business processes therefore enable organisations to fulfil business goals such as reduced service time and increased profits by creating an efficient system which utilises all resources.

4. Compare business process improvement and business process re-engineering.
Business process improvement BPI) understand and measures the current process and make performance improvements accordingly, whilst business process re-engineering (BPR) is the analysis, redesign and reorganisation of workflow within and between enterprises.

BPI based on the assumption that the current process is relevant, works to some degree but could be improved to better meet business goals. BPR, however, assumes that the current process is irrelevant, does not work and must be completely overhauled. BPR can be an advantage as it allows the business process designers to disassociate themselves from the previous process and focus on the new process, whilst BPI can disadvantage developers by constraining them within an existing process. However, BPR is also hazardous because it is a time and resource consuming process that may impede a business from keeping up with its competitors in ventures such as new products. BPI carries far less risk because the process does not cause a large amount of disruption to an organisation as it causes fewer changes. As a result BPI can also be used more frequently, while BPR must be used infrequently.
http://en.wikipedia.org/wiki/Business_process_improvement
http://en.wikipedia.org/wiki/Business_process_reengineering

5. Describe the importance of business process modelling (or mapping) and business process models.

Business Process Modelling (mapping)
Activity of creating a detailed map of a work process in the form of a flowchart or process map, showing its inputs, tasks and activities in a structured sequence.

Business Process Models
A graphic description of a process showing the sequence or process tasks, which are developed for a specific purpose and from a selected viewpoint.


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpfZ2Pw1bOsRQN_098e1BbSt7XTghyDjS5HHv0vUlBHMFeBGF5K9Vz6Ohx450UHeZOv07BIry2lyZqdPN9QKFUb99iXZ6XldM9XYua8-hCP4Dm-tMxTtEtYwD8oidR2hTl5lhn7-GtrkYf/s400/bpmsolution.gif
Business Process Modelling is important as it creates a visual representation of the business process which are sometimes invisible due to technology. Business process modelling is an important part of the process of BPI and BPR. As-is process models map an existing business process. Thus they are extremely important in BPI as they allow designers to view the inefficiencies in the existing business processes. Furthermore, in the processes of BPI and BPR they enable designers to convey new business processes in to-be process models which can be easily be distributed throughout the business.
http://www.projectperfect.com.au/info_business_process_modelling_overview.php

Sunday, March 7, 2010

CHAPTER 1 - Information Systems in Business

Explain information technology’s role in business and describe how you measure success?

Information Technology's role in business is to manage and process information. It collects raw data which when processed becomes information which is meaningful to the company. This is an important role in business as it enables success, however it requires people that understand how to use and manage it effectively.

Information Technology plays an important role in fulfilling business goals by facilitating communication and increased business intelligence. Technology can increase communication and business intelligence by utilising systems which enable the functional areas of business such as accounting, marketing, operations, human resources and logistics to share information. This is an extremely important function as each of these functional areas is interdependent as they rely on each others information. For example, sales must rely on information from operations to understand inventory, place orders, etc.

Through the business function of management information systems (MIS) information technology has an important role in the resolution of business problems. MIS is the application of people, technologies and procedures to solve a business problem. It is an integral business function which enables success.

Information Technology is measured in Key Performance Indicators (KPIs) which are measures that are tied to business drivers. Metrics are the detailed measures that inform KPIs.

Efficiency Metric - Measures the performance of an It system. For example throughput, speed and availability. Focuses on the extent an organisation is using its resources in an optimal way.

Effectiveness Metric - Measures the impact IT has on business processes and activities. For example, customer satisfaction and sell effectiveness. Focuses on how well an organisation is achieving its goals and objectives.

Benchmarking - baseline metrics benchmarking is the process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance.

http://www.sharkyextreme.com/img/2007/09/a64x2_5600/pcmark2005_sys.jpg


List and describe each of the forces in Porter’s Five Forces Model?


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEo-LKcj3x2O-fm0b3__yjv-ndA_lu-HgLIqievxI6TvR9yEpTIyUaIjv9YSaS_BMeQZMKXSmWWr_1yYFJMID0JREE1oPvhQnC4IzklyqFB-sIO4uE0mkL6bzlNl7jibX0pua4cK5u6-8b/s400/porter.jpg

Buyer Power
Buyer power is high when there are many sellers, and low when their are few. Buyers impact the price of items as they determine what they are willing to pay. Strong buyer power (similar to a monopsony) allows the buyer to determine the price. Businesses reduce buyer power by expanding and improving services to produce a competitive advantage and loyalty programs which reward customers for the amount and continued use of their business. IT is often employed to manage loyalty programs.

Supplier Power
The supplier provides raw materials to an organisation to produce products which may in turn become raw materials. Supplier power is high when one supplier has concentrated power over an industry. High supply power allows the supplier to charge higher prices, limit quality or service and shift costs to industry participants. High supplier power prevents organisations from passing on costs for fear of jeopardising sales. Standard parts reduce supplier power.

Threat of Substitute Products or Services
Organisations attempt to enter markets where there are few substitutes and therefore less competition.

Threat of new entrant
An entry barrier is a product of service feature which has become an expectation of customers, necessary to be competitive in a market. The threat of new entrants in a market is high when there are small entry barriers and low when there are large entry barriers.

Rivalry among existing competitors
There is a general trend towards high competition in most industries. In order to reduce competition companies introduce switching costs. A switching cost can be a feature such as customer service or an associated monetary cost such as a loyalty program. To reduce competition from rivals companies create products significantly different from their competitors' products.

Describe the relationship between business processes and value chains?
A business process is a standardised set of activities that accomplish a specific task. To evaluate the effectiveness of its business processes an organisation can use the value chain. The value chain views an organisation as a series of processes, each of which adds value to the product/service for each customer. To create a competitive advantage the value chain must allow the organisation to provide unique value to its customers.

Compare Porter’s three generic strategies?


http://www.marketingteacher.com/IMAGES/porter_generic.gif

Broad Cost Leadership
Requires a company to be a low cost producer in an industry. Companies may sell prices at market average to earn higher profits or at below average industry prices to gain a market share. Strategy is advantageous as companies will remain profitable for a long period if their production costs are cheap. Improvements in technology mean that there is a risk another company could leapfrog the production capabilities, eliminating the competitive advantage.

Broad Differentiation
Requires a company to develop a product or service that offers unique attributes valued and perceived by customers as better than the competition. Companies may charge higher prices and increase products due to the value added by the uniqueness of the product. May enable the company to pass along costs to its customers who cannot find a substitute product. However, the strategy also has risks as it can be limited by competitors and customers may change their taste.

Focused Strategy
Requires a company to focus on a narrow segment and attempts to achieve a cost advantage or differentiation. There is a high degree of customer loyalty in niche markets which limits the threat of new entrants. Companies pursuing a focus strategy have less bargaining power with suppliers due to their smaller volume. They may, however, pass on costs to the customer since no close substitute products exist. The strategy risks a broad-market cost leader adapting its product to suit the market segment of the company and is bound to the limitations and changes in the target segments.

http://www.quickmba.com/strategy/generic.shtml