Complete the case study in page 329 and answer all the five questions in a detailed manner with specific references and citations. Use APA format and minimum of 350 words mandatory.
An easy way to
help your students
learn, collaborate,
and grow.
We are dedicated to supporting you from idea to outcome.
Personalized
Experience
Students create their own study
guide while they interact with
course content and work on learning
activities.
Flexible
Course Design
Educators can quickly organize
learning activities, manage student
collaboration, and customize their
course—giving them full control over
content as well as the amount of
interactivity among students.
Clear
Path to Action
With visual reports, it’s easy for
both students and educators to gauge
problem areas and act on what’s
most important.
Assign activities and add your own materials
Guide students through what’s important in the
content
Set up and monitor collaborative learning groups
Assess learner engagement
Gain immediate insights to help inform teaching
Instantly know what you need to work on
Create a personal study plan
Assess progress along the way
Participate in class discussions
Remember what you have learned because you have
made deeper connections to the content
Case 1-1 Opening Case iii
Information
Technology
for Management
Digital Strategies for Insight, Action,
and Sustainable Performance
10th
Edition
EFRAIM TURBAN
LINDA VOLONINO, Canisius College
GREGORY R. WOOD, Canisius College
Contributing authors:
JANICE C. SIPIOR, Villanova University
GUY H. GESSNER, Canisius College
FMTOC.indd Page iii 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
VP & EXECUTIVE PUBLISHER: Don Fowley
EXECUTIVE EDITOR: Beth Lang Golub
SPONSORING EDITOR: Mary O’Sullivan
PROJECT EDITOR: Ellen Keohane
ASSOCIATE EDITOR: Christina Volpe
MARKETING MANAGER: Margaret Barrett
MARKETING ASSISTANT: Elisa Wong
SENIOR CONTENT MANAGER: Ellinor Wagner
SENIOR PRODUCTION EDITOR: Ken Santor
SENIOR PHOTO EDITOR: Lisa Gee
DESIGNER: Kristine Carney
COVER DESIGNER Wendy Lai
COVER IMAGE © Ajgul/Shutterstock
This book was set by Aptara, Inc. Cover and text printed and bound by Courier Kendallville.
This book is printed on acid free paper.
Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people
around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to
the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the
environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper
specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable support. For more
information, please visit our website: www.wiley.com/go/citizenship.
Copyright © 2015, 2013, 2011, 2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or
authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA
01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley &
Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions.
Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next
academic year. These copies are licensed and may not be sold or transferred to a third party. Upon completion of the review period, please
return the evaluation copy to Wiley. Return instructions and a free of charge return mailing label are available at www.wiley.com/go/returnlabel. If you
have chosen to adopt this textbook for use in your course, please accept this book as your complimentary desk copy. Outside of the
United States, please contact your local sales representative.
ISBN 978-1-118-89778-2
BRV ISBN 978-1-118-99429-0
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
FMTOC.indd Page iv 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
http://www.wiley.com/go/citizenship
http://www.wiley.com/go/permission
http://www.wiley.com/go/returnlabel
http://www.copyright.com
BRIEF CONTENTS
1 Doing Business in Digital Times 1
2 Data Governance and IT Architecture Support Long-Term
Performance 33
3 Data Management, Big Data Analytics, and Records Management 70
4 Networks for Efficient Operations and Sustainability 110
5 Cybersecurity and Risk Management 141
6 Attracting Buyers with Search, Semantic, and Recommendation
Technology 181
7 Social Networking, Engagement, and Social Metrics 221
8 Retail, E-commerce, and Mobile Commerce Technology 264
9 Effective and Efficient Business Functions 297
10 Strategic Technology and Enterprise Systems 331
11 Data Visualization and Geographic Information Systems 367
12 IT Strategy and Balanced Scorecard 389
13 Project Management and SDLC 412
14 Ethical Risks and Responsibilities of IT Innovations 438
Glossary G-1
Organizational Index O-1
Name Index N-1
Subject Index S-1
Part 1
Part 2
Part 3
Part 4
Digital Technology
Trends Transforming
How Business Is Done
Winning, Engaging, and
Retaining Consumers
with Technology
Optimizing Performance
with Enterprise Systems
and Analytics
Managing Business
Relationships, Projects,
and Codes of Ethics
v
FMTOC.indd Page v 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
FMTOC.indd Page vi 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
CONTENTS
Part 1
Digital Technology Trends Transforming
How Business Is Done
1 Doing Business in Digital Times 1
Case 1.1, Opening Case: McCain Foods’s Success Factors:
Dashboards, Innovation, and Ethics 2
1.1 Every Business Is a Digital Business 6
1.2 Business Process Management and Improvement 15
1.3 The Power of Competitive Advantage 19
1.4 Enterprise Technology Trends 25
1.5 How Your IT Expertise Adds Value to Your Performance
and Career 27
Case 1.2, Business Case: Restaurant Creates Opportunities to
Engage Customers 31
Case 1.3, Video Case: What Is the Value of Knowing More and
Doing More? 32
2 Data Governance and IT Architecture Support
Long-Term Performance 33
Case 2.1, Opening Case: Detoxing Dirty Data with Data
Governance at Intel Security 34
2.1 Information Management 37
2.2 Enterprise Architecture and Data Governance 42
2.3 Information Systems: The Basics 47
2.4 Data Centers, Cloud Computing, and Virtualization 53
2.5 Cloud Services Add Agility 62
Case 2.2, Business Case: Data Chaos Creates Risk 67
Case 2.3, Video Case: Cloud Computing: Three Case Studies 69
3 Data Management, Big Data Analytics, and
Records Management 70
Case 3.1, Opening Case: Coca-Cola Manages at the Point That
Makes a Difference 71
3.1 Database Management Systems 75
3.2 Data Warehouse and Big Data Analytics 86
3.3 Data and Text Mining 96
3.4 Business Intelligence 99
3.5 Electronic Records Management 102
Case 3.2, Business Case: Financial Intelligence Fights Fraud 108
Case 3.3, Video Case: Hertz Finds Gold in Integrated Data 108
4 Networks for Efficient Operations and
Sustainability 110
Case 4.1, Opening Case: Sony Builds an IPv6 Network to Fortify
Competitive Edge 111
4.1 Data Networks, IP Addresses, and APIs 113
4.2 Wireless Networks and Mobile Infrastructure 123
4.3 Collaboration and Communication Technologies 127
4.4 Sustainability and Ethical Issues 130
Case 4.2, Business Case: Google Maps API for Business 139
Case 4.3, Video Case: Fresh Direct Connects for Success 140
5 Cybersecurity and Risk Management 141
Case 5.1, Opening Case: BlackPOS Malware Steals Target’s
Customer Data 142
5.1 The Face and Future of Cyberthreats 144
5.2 Cyber Risk Management 152
5.3 Mobile, App, and Cloud Security 163
5.4 Defending Against Fraud 166
5.5 Compliance and Internal Control 169
Case 5.2, Business Case: Lax Security at LinkedIn Exposed 177
Case 5.3, Video Case: Botnets, Malware Security, and Capturing
Cybercriminals 179
vii
Part 2
Winning, Engaging, and Retaining Consumers
with Technology
6 Attracting Buyers with Search, Semantic, and
Recommendation Technology 181
Case 6.1, Opening Case: Nike Golf Drives Web Traffic with Search
Engine Optimization 182
6.1 Using Search Technology for Business Success 186
6.2 Organic Search and Search Engine Optimization 198
6.3 Pay-Per-Click and Paid Search Strategies 203
6.4 A Search for Meaning—Semantic Technology 205
6.5 Recommendation Engines 209
Case 6.2, Business Case: Recommending Wine to Online
Customers 217
Case 6.3, Video Case: Power Searching with Google 218
7 Social Networking, Engagement, and Social
Metrics 221
Case 7.1, Opening Case: The Connected Generation Influences
Banking Strategy 222
7.1 Web 2.0—The Social Web 225
7.2 Social Networking Services and Communities 235
7.3 Engaging Consumers with Blogs and
Microblogs 245
7.4 Mashups, Social Metrics, and Monitoring
Tools 250
7.5 Knowledge Sharing in the Social
Workplace 255
Case 7.2, Business Case: Social Customer Service 259
Case 7.3, Video Case: Viral Marketing: Will It Blend? 261
FMTOC.indd Page vii 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
8 Retail, E-commerce, and Mobile Commerce
Technology 264
Case 8.1, Opening Case: Macy’s Races Ahead with Mobile Retail
Strategies 265
8.1 Retailing Technology 268
8.2 Business to Consumer (B2C) E-commerce 271
8.3 Business to Business (B2B) E-commerce and
E-procurement 277
8.4 Mobile Commerce 279
8.5 Mobile Transactions and Financial Services 286
Case 8.2, Business Case: Chegg’s Mobile Strategy 293
Case 8.3, Video Case: Searching with Pictures Using MVS 294
11.4 Geospatial Data and Geographic Information
Systems 384
Case 11.2, Visualization Case: Are You Ready for Football? 387
Case 11.3, Video Case: The Beauty of Data Visualization 387
viii Contents
Part 3
Optimizing Performance with Enterprise
Systems and Analytics
9 Effective and Efficient Business Functions 297
Case 9.1, Opening Case: Ducati Redesigns Its Operations 299
9.1 Solving Business Challenges at All Management
Levels 302
9.2 Manufacturing, Production, and Transportation
Management Systems 306
9.3 Sales and Marketing Systems 312
9.4 Accounting, Finance, and Regulatory Systems 315
9.5 Human Resources Systems, Compliance,
and Ethics 323
Case 9.2, Business Case: HSBC Combats Fraud in Split-second
Decisions 329
Case 9.3, Video Case: United Rentals Optimizes Its Workforce with
Human Capital Management 330
10 Strategic Technology and Enterprise
Systems 331
Case 10.1, Opening Case: Strategic Technology Trend—
3D Printing 332
10.1 Enterprise Systems 337
10.2 Enterprise Social Platforms 341
10.3 Enterprise Resource Planning Systems 346
10.4 Supply Chain Management Systems 352
10.5 Customer Relationship Management Systems 358
Case 10.2, Business Case: Avon’s Failed SAP Implementation:
Enterprise System Gone Wrong 364
Case 10.3, Video Case: Procter & Gamble: Creating Conversations
in the Cloud with 4.8 Billion Consumers 365
11 Data Visualization and Geographic Information
Systems 367
Case 11.1, Opening Case: Safeway and PepsiCo Apply Data
Visualization to Supply Chain 369
11.1 Data Visualization and Learning 371
11.2 Enterprise Data Mashups 377
11.3 Digital Dashboards 380
Part 4
Managing Business Relationships, Projects,
and Codes of Ethics
12 IT Strategy and Balanced Scorecard 389
Case 12.1, Opening Case: Intel’s IT Strategic Planning
Process 390
12.1 IT Strategy and the Strategic Planning
Process 392
12.2 Aligning IT with Business Strategy 397
12.3 Balanced Scorecard 400
12.4 IT Sourcing and Cloud Strategy 403
Case 12.2, Business Case: AstraZeneca Terminates $1.4B
Outsourcing Contract with IBM 409
Case 12.3, Data Analysis: Third-Party versus Company-Owned
Offshoring 410
13 Project Management and SDLC 412
Case 13.1, Opening Case: Keeping Your Project on Track, Knowing
When It Is Doomed, and DIA Baggage System Failure 413
13.1 Project Management Concepts 417
13.2 Project Planning, Execution, and Budget 421
13.3 Project Monitoring, Control, and Closing 428
13.4 System Development Life Cycle 432
Case 13.2, Business Case: Steve Jobs’ Shared Vision Project
Management Style 436
Case 13.3, Demo Case: Mavenlink Project Management and
Planning Software 437
14 Ethical Risks and Responsibilities of IT
Innovations 438
Case 14.1, Opening Case: Google Glass and Risk, Privacy, and
Piracy Challenges 439
14.1 Privacy Paradox, Privacy, and Civil Rights 442
14.2 Responsible Conduct 448
14.3 Technology Addictions and the Emerging Trend of
Focus Management 453
14.4 Six Technology Trends Transforming Business 454
Case 14.2, Business Case: Apple’s CarPlay Gets
Intelligent 458
Case 14.3, Video Case: Vehicle-to-Vehicle Technology to Prevent
Collisions 459
Glossary G-1
Organizational Index O-1
Name Index N-1
Subject Index S-1
FMTOC.indd Page viii 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
Business strategy and operations are driven by data, digi-
tal technologies, and devices. Five years from now, we will
look back upon today as the start of a new era in business
and technology. Just like the way e-business started with
the emergence of the Web, this new era is created by the
convergence of social, mobile, big data, analytics, cloud,
sensor, software-as-a-service, and data visualization tech-
nologies. These technologies enable real-time insights,
business decisions, and actions. Examples of how they
determine tomorrow’s business outcomes are:
• Insight. Combining the latest capabilities in big
data analytics, reporting, collaboration, search, and
machine-to-machine (M2M) communication helps
enterprises build an agility advantage, cut costs, and
achieve their visions.
• Action. Fully leveraging real-time data about opera-
tions, supply chains, and customers enables managers
to make decisions and take action in the moment.
• Sustainable performance. Deploying cloud services,
managing projects and sourcing agreements, respect-
ing privacy and the planet, and engaging customers
across channels are now fundamental to sustaining
business growth.
• Business optimization. Embedding digital capability
into products, services, machines, and business pro-
cesses optimizes business performance—and creates
strategic weapons.
In this tenth edition, students learn, explore, and analyze
the three dimensions of business performance improve-
ment: digital technology, business processes, and people.
What Is New in the Tenth
Edition—and Why It Matters
Most Relevant Content. Prior to and during the writing
process, we attended practitioner conferences and con-
sulted with managers who are hands-on users of leading
technologies, vendors, and IT professionals to learn about
their IT/business successes, challenges, experiences, and
recommendations. For example, during an in-person
interview with a Las Vegas pit boss, we learned how
real-time monitoring and data analytics recommend
the minimum bets in order to maximize revenue per
minute at gaming tables. Experts outlined opportunities
and strategies to leverage cloud services and big data
PREFACE
to capture customer loyalty and wallet share and justify
significant investments in leading IT.
More Project Management with Templates. In response
to reviewers’ requests, we have greatly increased cover-
age of project management and systems development
lifecycle (SDLC). Students are given templates for writing
a project business case, statement of work (SOW), and
work breakdown structure (WBS). Rarely covered, but
critical project management issues included in this edition
are project post-mortem, responsibility matrix, go/no go
decision factors, and the role of the user community.
New Technologies and Expanded Topics. New to this
edition are 3D printing and bioprinting, project portfolio
management, the privacy paradox, IPv6, outsource rela-
tionship management (ORM), and balanced scorecard.
With more purchases and transactions starting online
and attention being a scarce resource, students learn how
search, semantic, and recommendation technologies func-
tion to improve revenue. The value of Internet of Things
(IoT) has grown significantly as a result of the compound
impact of connecting people, processes, data, and things.
Easier to Grasp Concepts. A lot of effort went into mak-
ing learning easier and longer-lasting by outlining content
with models and text graphics for each opening case (our
version of infographics) as shown in Figure P-1—from the
Chapter 12 opening case.
Engaging Students to
Assure Learning
The tenth edition of Information Technology for
Management engages students with up-to-date cover-
age of the most important IT trends today. Over the
years, this IT textbook had distinguished itself with an
emphasis on illustrating the use of cutting edge business
technologies for achieving managerial goals and objec-
tives. The tenth edition continues this tradition with more
hands-on activities and analyses.
Each chapter contains numerous case studies and
real world examples illustrating how businesses increase
productivity, improve efficiency, enhance communica-
tion and collaboration, and gain a competitive edge
through the use of ITs. Faculty will appreciate a variety
of options for reinforcing student learning, that include
three Case Studies per chapter, including an opening
case, a business case and a video case.
ix
FMTOC.indd Page ix 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
x Preface
Throughout each chapter are various learning aids,
which include the following:
• Learning Outcomes are listed at the beginning of each
chapter to help students focus their efforts and alert
them to the important concepts that will be discussed.
• The Chapter Snapshot provides students with an over-
view of the chapter content.
• IT at Work boxes spotlight real-world cases and inno-
vative uses of IT.
• Definitions of Key Terms appear in the margins
throughout the book.
• Tech Note boxes explore topics such as “4G and
5G Networks in 2018” and “Data transfers to main-
frames.”
• Career Insight boxes highlight different jobs in the IT
for management field.
At the end of each chapter are a variety of features
designed to assure student learning:
• Critical Thinking Questions are designed to facilitate
student discussion.
• Online and Interactive Exercises encourage students
to explore additional topics.
• Analyze and Decide questions help students apply IT
concepts to business decisions.
Details of New and Enhanced
Features of the Tenth Edition
The textbook consists of fourteen chapters organized
into four parts. All chapters have new sections as well as
updated sections, as shown in Table P-1.
Strategic
directional
statements
Strategic
plan
gic
egic
2. Technology & Business Outlook. A team of
senior management, IT, and business unit
representatives develop the two-to-five-year
business outlook & technology outlook.
3. Current State Assessment & Gap Analysis.
Analysis of the current state of IT, enterprise
systems, & processes, which are compared with
results of step 2 to identify gaps and necessary
adjustments to IT investment plans.
4. Strategic Imperatives, Strategies, & Budget for
Next Year. Develop next year’s priorities, road
map, budget, & investment plan. Annual budget
approved.
5. Governance Decisions & IT Road Map. The
budget guides the governance process, including
supplier selection and sourcing.
6. Balanced Scorecard Reviews.
Performance is measured monthly.
1. Enterprise Vision. Senior management &
leaders develop & communicate the enterprise’s
two-to-five-year strategic vision & mission and
identify the direction & focus for upcoming year.
Figure P-1 Model of Intel’s
6-step IT strategic planning
process, from Chapter 12.
FMTOC.indd Page x 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
Preface xi
TABLE P-1 Overview of New and Expanded IT Topics and Innovative Enterprises Discussed
in the Chapters
Chapter New and Expanded IT and Business Topics
Enterprises in a Wide
Range of Industries
1: Doing Business in
Digital Times
• Era of Mobile-Social-Cloud-Big Data
• Digital connectivity and convergence
• Internet of Things (IoT), or machine-to-machine
(M2M) technology
• Farm-to-fork traceability
• Business process management
• Near-fi eld communication (NFC)
• McCain Foods Ltd
• Zipcar
• Pei Wei Asian Diner
• Teradata
2: Data Governance and
IT Architecture Support
Long-Term Performance
• Data governance and quality
• Master data management (MDM)
• Cloud services
• Collaboration
• Virtualization and business continuity
• software-, platform-, infrastructure-, and data-
as-a-service
• Intel Security
• Liberty Wines
• Unilever
• Vanderbilt University
Medical Center
3: Data Management,
Big Data Analytics and
Records Management
• Big data analytics and machine-generated data
• Business intelligence (BI)
• Hadoop
• NoSQL systems
• Active data warehouse apps
• Compliance
• Coca-Cola
• Hertz
• First Wind
• Argo Corp.
• Wal-Mart
• McDonalds
• Infi nity Insurance
• Quicken Loans, Inc.
• U.S. military
• CarMax
4: Networks for Effi cient
Operations and Sustain-
ability
• IPv6
• API
• 4G and 5G networks
• Net neutrality
• Location-aware technologies
• Climate change
• Mobile infrastructure
• Sustainable development
• Sony
• Google Maps
• Fresh Direct
• Apple
• Spotify
• Caterpillar, Inc.
5: Cyber Security and
Risk Management
• BYOD and social risks
• Advanced persistent threats (APT), malware,
and botnets
• IT governance
• Cloud security
• Fraud detection and prevention
• Target
• LinkedIn
• Boeing
6: Attracting Buyers with
Search, Semantic and
Recommendation
Technology
• Search technology
• Search engine optimization (SEO)
• Google Analytics
• Paid search strategies
• Nike
• Netfl ix
• Wine.com
(continued)
FMTOC.indd Page xi 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
xii Preface
TABLE P-1 Overview of New and Expanded IT Topics and Innovative Enterprises Discussed
in the Chapters (continued)
Chapter New and Expanded IT and Business Topics
Enterprises in a Wide
Range of Industries
7: Social Networking,
Engagement and Social
Metrics
• Social network services (SNS)
• Web 2.0 tools for business collaboration
• Crowdfunding
• Privacy
• Citibank
• American Express
• Facebook
• Twitter
• Cisco
8: Retail, E-commerce
and Mobile Commerce
Technology
• Innovation in traditional and web-based retail
• Omni-channel retailing
• Visual search
• Mobile payment systems
• Macys
• Chegg
• Amazon
9: Effective and Effi cient
Business Functions
• Customer experience (CX)
• eXtensible Business Reporting Language
(XBRL)
• Order fulfi llment process
• Transportation management systems
• Computer-integrated manufacturing (CIM)
• SaaS
• TQM
• Auditing information systems
• Ducati Motor Holding
• HSBC
• SAS
• United Rentals
• First Choice Ski
10: Strategic Technology
and Enterprise Systems
• 3D printing, additive manufacturing
• Enterprise social platforms
• Yammer, SharePoint, and Microsoft Cloud
• Avon
• Procter & Gamble
• Organic Valley Family
of Farms
• Red Robin Gourmet
Burgers, Inc.
• Salesforce.com
• Food and Drug Administra-
tion (FDA)
• U.S. Army Materiel
Command (AMC)
• 1-800-Flowers
11: Data Visualization
and Geographic Informa-
tion Systems
• Data visualization
• Mobile dashboards
• Geospatial data and geocoding
• Geographic Information Systems (GIS)
• Supply chain visibility
• Reporting tools; analytical tools
• Self-service mashup capabilities
• Safeway
• PepsiCo
• eBay
• Tableau
• Hartford Hospital
• General Motors (GM)
12: IT Strategy and
Balanced Scorecard
• IT strategic planning process
• Value drivers
• Outsource relationship management (ORM)
• Service level agreements (SLAs)
• Outsourcing lifecycle
• Applications portfolio
• Intel
• AstraZeneca
• IBM
• Commonwealth Bank of
Australia (CBA)
(continued)
FMTOC.indd Page xii 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
Preface xiii
TABLE P-1 Overview of New and Expanded IT Topics and Innovative Enterprises Discussed
in the Chapters (continued)
Chapter New and Expanded IT and Business Topics
Enterprises in a Wide
Range of Industries
13: Project Management
and SDLC
• Project management lifecycle
• Project Portfolio Management (PPM)
• Project business case
• Project business case, statement of work (SOW),
work breakdown structure (WBS), milestone
schedule, and Gantt chart
• Triple constraint
• Critical path
• Systems feasibility studies
• Denver International
Airport
• U.S. Census
• Mavenlink Project
Management and Planning
Software
14: Ethical Risks and
Responsibilities of IT
Innovations
• Privacy paradox
• Social recruitment and discrimination
• Responsible conduct
• Vehicle-to-vehicle (V2V) technology
• Ethics of 3D printing and bioprinting
• Tech addictions
• Tech trends
• Google Glass
• Apple’s CarPlay
• SnapChat
• Target
Supplementary Materials
An extensive package of instructional materials is avail-
able to support this tenth edition. These materials are
accessible from the book companion Web site at www.
wiley.com/college/turban.
• Instructor’s Manual. The Instructor’s Manual presents
objectives from the text with additional information
to make them more appropriate and useful for the
instructor. The manual also includes practical applica-
tions of concepts, case study elaboration, answers to
end-of-chapter questions, questions for review, ques-
tions for discussion, and Internet exercises.
• Test Bank. The test bank contains over 1,000 ques-
tions and problems (about 75 per chapter) consisting
of multiple-choice, short answer, fill-ins, and critical
thinking/essay questions.
• Respondus Test Bank. This electronic test bank is
a powerful tool for creating and managing exams
that can be printed on paper or published directly
to Blackboard, ANGEL, Desire2Learn, Moodle, and
other learning systems. Exams can be created offline
using a familiar Windows environment, or moved from
one LMS to another.
• PowerPoint Presentation. A series of slides designed
around the content of the text incorporates key points
from the text and illustrations where appropriate.
E-book
Wiley E-Textbooks offer students the complete content of
the printed textbook on the device of their preference—
computer, iPad, tablet, or smartphone—giving students
the freedom to read or study anytime, anywhere. Students
can search across content, take notes, and highlight key
materials. For more information, go to www.wiley.com/
college/turban.
Acknowledgments
Many individuals participated in focus groups or review-
ers. Our sincere thanks to the following reviewers of the
tenth edition who provided valuable feedback, insights,
and suggestions that improved the quality of this text:
Joni Adkins, Northwest Missouri State University
Ahmad Al-Omari, Dakota State University
Rigoberto Chinchilla, Eastern Illinois University
Michael Donahue, Towson University
Samuel Elko, Seton Hill University
Robert Goble, Dallas Baptist University
Eileen Griffin, Canisius College
Binshan Lin, Louisiana State University in Shreveport
Thomas MacMullen, Eastern Illinois University
James Moore, Canisius College
Beverly S. Motich, Messiah College
FMTOC.indd Page xiii 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
http://www.wiley.com/college/turban
http://www.wiley.com/college/turban
http://www.wiley.com/college/turban
http://www.wiley.com/college/turban
xiv Preface
Barin Nag, Towson University
Luis A. Otero, Inter-American University of Puerto
Rico, Metropolitan Campus
John Pearson, Southern Illinois University
Daniel Riding, Florida Institute of Technology
Josie Schneider, Columbia Southern University
Derek Sedlack, South University
Eric Weinstein, The University of La Verne
Patricia White, Columbia Southern University
Gene A. Wright, University of Wisconsin–Milwaukee
We are very thankful to our assistants, Samantha
Palisano and Olena Azarova. Samantha devoted many
hours of research, provided clerical support, and con-
tributed to the writing of Chapter 6. Olena assisted with
research and development of graphics for Chapter 7.
We are fortunate and thankful for the expert and encour-
aging leadership of Margaret Barrett, Beth Golub, Ellen
Keohane, and Mary O’Sullivan. To them we extend our
sincere thanks for your guidance, patience, humor, and
support during the development of this most recent ver-
sion of the book. Finally, we wish to thank our families
and colleagues for their encouragement, support, and
understanding as we dedicated time and effort to cre-
ating this new edition of Information Technology for
Management.
Linda Volonino
Greg Wood
FMTOC.indd Page xiv 18/11/14 2:20 PM f-391 /208/WB01490/9781118897782/fmmatter/text_s
Chapter Snapshot
Make no mistake. Businesses are experiencing a digital
transformation as digital technology enables changes
unimaginable a decade ago. High-performance organi-
zations are taking advantage of what is newly possible
from innovations in mobile, social, cloud, big data, data
analytics, and visualization technologies. These digital
forces enable unprecedented levels of connectivity, or
connectedness, as listed in Figure 1.1.
Think how much of your day you have your phone
nearby—and how many times you check it. Nearly
80 percent of people carry their phone for all but two
hours of their day; and 25 per cent of 18- to 44-year-olds
cannot remember not having their phone with them
(Cooper, 2013).
As a business leader, you will want to know what
steps to take to get a jump on the mobile, social, cloud,
Doing Business
in Digital Times1
Chapter
1. Describe the use of digital technology in every facet of
business and how digital channels are being leveraged.
2. Explain the types, sources, characteristics, and control
of enterprise data, and what can be accomplished with
near real time data.
3. Identify the five forces of competitive advantage and
evaluate how they are reinforced by IT.
4. Describe enterprise technology trends and explain how
they influence strategy and operations.
5. Assess how IT adds value to your career path and per-
formance, and the positive outlook for IT management
careers.
Learning Outcomes
1
Digital Technology Trends Transforming
How Business Is DonePart 1
Chapter Snapshot
Case 1.1 Opening Case: McCain Foods’ Success
Factors—Dashboards, Innovation, and Ethics
1.1 Every Business Is a Digital Business
1.2 Business Process Management and
Improvement
1.3 The Power of Competitive Advantage
1.4 Enterprise Technology Trends
1.5 How Your IT Expertise Adds Value to Your
Performance and Career
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 1.2 Business Case: Restaurant Creates
Opportunities to Engage Customers
Case 1.3 Video Case: What Is the Value of
Knowing More and Doing More?
References
c01DoingBusinessinDigitalTimes.indd Page 1 11/3/14 7:31 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
big data, analytics, and visualization technologies that will move your businesses
forward. Faced with opportunities and challenges, you need to know how to lever-
age them before or better than your competitors.
In this opening chapter, you read about the powerful impacts of digital technol-
ogy on management, business, government, entertainment, society, and those it will
have on the future. You learn of the latest digital trends taking place across indus-
tries and organizations—small and medium businesses, multinational corporations,
government agencies, the health-care industry, and nonprofits.
Big data are datasets whose
size and speed are beyond
the ability of typical database
software tools to capture,
store, manage, and analyze.
Examples are machine-
generated data and social
media texts.
Data analytics refers to the
use of software and statistics
to find meaningful insight
in the data, or better under-
stand the data.
Data visualization (viz) tools
make it easier to understand
data at a glance by display-
ing data in summarized
formats, such as dashboards
and maps, and by enabling
drill-down to the detailed
data.
Figure 1.1 We are in
the era of mobile-social-
cloud-big data that
shape business strate-
gies and day-to-day
operations.
CASE 1.1 OPENING CASE
McCain Foods’ Success Factors: Dashboards, Innovation, and Ethics
COMPANY OVERVIEW You most likely have eaten McCain Foods products (Figure 1.2, Table 1.1). McCain
is a market leader in the frozen food industry—producing one-third of the world’s
supply of french fries. The company manufactures, distributes, and sells more than
Figure 1.2 McCain Foods,
Ltd. overview.
2
An estimated 15 billion
devices are connected to
the Internet—forecasted
to hit 50 billion by 2020
as more devices connect
via mobile networks.
Over 1 million websites
engage in Facebook
e-commerce.
Over 200 million social
media users are mobile
only, never accessing it
from a desktop or laptop.
Mobile use generates 30%
of Facebook’s ad revenue.
More data are collected in
a day now than existed in
the world 10 years ago.
Half of all data are in the
cloud and generated
by mobile and social
activities—known as big
data.
Sales offices in 110 countries
55 production plants on
6 continents
22,000 employees
Global Reach
Good ethics is good
business.
Good food, better life.
Corporate Culture
Dashboards
Data analytics
Real time reporting systems
Digital Technology
Frozen food manufacturer
Market leader in french
fries
Brand
McCain Foods, Ltd.
c01DoingBusinessinDigitalTimes.indd Page 2 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
CASE 1.1 Opening Case 3
TABLE 1.1 Opening Case Overview
Company McCain Foods, Ltd. www.mccain.com
Industry The global company manufactures, sells, and distributes frozen
food products.
Product lines More than 100 oven-ready frozen food products
Digital technology Dashboards are implemented throughout the organization
from boardrooms to factory fl oors. Dashboards have drill-down
capabilities.
Business challenges The frozen food industry faced tough challenges from health
and nutrition trends that are emphasizing fresh foods. Industry
is highly competitive because it is expected to experience slow
growth through 2018.
Taglines “Good food. Better life.” and “It’s all good.”
Figure 1.3 Frozen food is
one of the most dynamic
and largest sectors of the
food industry.
100 oven-ready frozen foods—pizzas, appetizers, meals, and vegetables. McCain is
a global business-to-business (B2B) manufacturer with 55 production facilities on 6
continents. The company sells frozen foods to other businesses—wholesalers, retail-
ers, and restaurants from sales offices in 110 countries. McCain supplies frozen fries
to Burger King and supermarket chains (Figure 1.3).
Business-to-business (B2B)
commerce. The selling of
products and services to
other businesses.
Vo
is
in
/P
ha
ni
e/
Su
p
er
St
oc
k
c01DoingBusinessinDigitalTimes.indd Page 3 12/11/14 1:50 PM f-392 /208/WB01490/9781118897782/ch01/text_s
4 Chapter 1 Doing Business in Digital Times
Food manufacturers must be able to trace all ingredients along their supply
chain in case of contamination. Achieving end-to-end traceability is complex given
the number of players in food supply chains. Several communication and tracking
technologies make up McCain’s supply chain management (SCM) system to keep
workers informed of actual and potential problems with food quality, inventory,
and shipping as they occur. McCain’s SCM system ensures delivery of the best
products possible at the best value to customers. In addition, the company strives
to prevent food shortages worldwide by analyzing huge volumes of data to predict
crop yields.
Supply chain. All businesses
involved in the production
and distribution of a product
or service.
FROZEN FOOD
INDUSTRY CHALLENGES
McCain Foods had to deal with three major challenges and threats:
1. Drop in demand for frozen foods. McCain operated in an industry that was
facing tougher competition. Health-conscious trends were shifting customer
demand toward fresh food, which was slowing growth in the frozen foods
market.
2. Perishable inventory. Of all the types of manufacturing, food manufacturers face
unique inventory management challenges and regulatory requirements. Their
inventory of raw materials and fi nished goods can spoil, losing all their value, or
food can become contaminated. Regulators require food manufacturers to able
to do recalls quickly and effectively. Food recalls have destroyed brands and
been fi nancially devastating.
3. Technology-dependent. Food manufacturers face the pressures that are
common to all manufacturers. They need information reporting systems and
digital devices to manage and automate operations, track inventory, keep
the right people informed, support decisions, and collaborate with business
partners.
McCain Foods worked with Burger King (BK) to develop lower-calorie fries
called Satisfries (Figure 1.4). These crinkle-cut fries have 30 percent less fat and
20 percent fewer calories than BK’s classic fries. This food innovation has shaken
up the fast-food industry and given BK an advantage with end-consumers who are
demanding healthier options.
Figure 1.4 McCain Foods
and Burger King jointly
developed Satisfries—a
french fry innovation with
30 percent less fat and
20 percent fewer calories
than BK’s current fries and
40 percent less fat and
30 percent fewer calories
than McDonald’s fries.
MCCAIN FOODS’
BUSINESS AND IT
STRATEGIES
The McCain brothers, who founded the company, follow this simple philosophy:
“Good ethics is good business.” McCain prides itself on the quality and conve-
nience of its products, which is reflected in the It’s All Good brand image. The It’s
All Good branding effort was launched in 2010 after surveys found that customers
were concerned about the quality and nutrition of frozen foods. Since then, many of
products have been improved and manufactured in healthier versions.
Managing with Digital Technology McCain had integrated its diverse
sources of data into a single environment for analysis. Insights gained from its data
analytics helped improve manufacturing processes, innovation, and competitive
advantage.
McCain Foods invested in data analytics and visualization technologies to
maximize its capability to innovate and gain insights from its huge volumes of data.
The company tracks, aggregates, and analyzes data from operations and business
customers in order to identify opportunities for innovation in every area of the busi-
ness. The results of data analytics are made available across the organization—from
©
D
us
ty
Pi
xe
l/
iS
to
ck
p
ho
to
c01DoingBusinessinDigitalTimes.indd Page 4 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
CASE 1.1 Opening Case 5
Figure 1.5 Data visualizations
of KPIs make them easy to
understand at a glance.
executive boardrooms to the factory floors—on dashboards. Dashboards are data
visualizations (data viz) that display the current status of key performance indica-
tors (KPIs) in easy-to-understand formats (Figure 1.5). KPIs are business metrics
used to evaluate performance in terms of critical success factors, or strategic and
operational goals.
Dashboards Create Productive Competition Among Factory Workers
McCain implemented 22,000 reports and 3,000 personal reporting systems that
include dashboards. Dashboards display summarized data graphically in a clear and
concise way. By clicking a graph, the user can drill down to the detailed data. The
dashboards reach most of McCain’s 18,000 employees worldwide.
Dashboards have created healthy competition that has led to better perfor-
mance. Ten-foot dashboards hang on factory walls of plants around the world. They
are strategically placed near the cafeteria so employees can see the KPIs and per-
formance metrics of every plant. With this visibility, everyone can know in near real
time exactly how well they are doing compared to other plants. The competition
among factories has totally transformed the work environment—and organizational
culture—in the plants and increased production performance.
Better Predictions, Better Results The CEO, other executives, and managers
view their dashboards from mobile devices or computers. They are able to monitor
operations in factories and farms around the globe. Dashboards keep management
informed because they can discover answers to their own questions by drilling
down. Data are used to forecast and predict crop yields—and ultimately combine
weather and geopolitical data to predict and avoid food shortages. By integrating
all of its data into one environment and making the results available in near real
time to those who need it, the organization is increasing its bottom line and driving
innovation.
©
D
el
ic
es
/S
hu
tt
er
st
oc
k
c01DoingBusinessinDigitalTimes.indd Page 5 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
6 Chapter 1 Doing Business in Digital Times
Questions
1. All it takes is one compromised ingredient to contaminate food and
to put human lives at risk. Delays in communicating contaminated food
increase the health risk and fi nes for violating the Food Safety Mod-
ernization Act. How can the SCM system help McCain Foods reduce
the risks related to low-quality or contaminated frozen foods reaching
consumers?
2. What three challenges or threats facing McCain Foods and what is the
reason for each challenge or threat?
3. How have dashboards on the factory fl oors impacted performance at
McCain Foods?
4. What might be the KPIs of a frozen food manufacturer such as McCain
Foods?
5. Explain how visibility about operations and performance created
healthy competition among McCain’s factory workers.
6. Being able to make reliable predictions can improve business perfor-
mance. Explain why.
Sources: Compiled from Smith (2013), Transparency Market Research (2013), and McCain Foods
Teradata video (2013).
Digital business is a social,
mobile, and Web-focused
business.
Business model is how a
business makes money.
Digital business model
defines how a business
makes money digitally.
Customer experience (CX)
is about building the digital
infrastructure that allows cus-
tomers to do whatever they
want to do, through whatever
channel they choose to do it.
Today, a top concern of well-established corporations, global financial institutions,
born-on-the-Web retailers, and government agencies is how to design their digital
business models in order to:
• deliver an incredible customer experience;
• turn a profit;
• increase market share; and
• engage their employees.
In the digital (online) space, the customer experience (CX) must measure up
to the very best the Web has to offer. Stakes are high for those who get it right—or
get it wrong. Forrester research repeatedly confirms there is a strong relationship
between the quality of a firm’s CX and loyalty, which in turn increases revenue
(Schmidt-Subramanian et al., 2013).
This section introduces the most disruptive and valuable digital technologies,
which you will continue to read about throughout this book.
1.1 Every Business Is a Digital Business
DIGITAL TECHNOLOGIES
OF THE 2010S—IN THE
CLOUD, HANDHELD,
AND WEARABLE
Consumers expect to interact with businesses anytime anywhere via mobile
apps or social channels using technology they carry in their pockets. Mobile apps
have changed how, when, and where work is done. Employees can be more produc-
tive when they work and collaborate effortlessly from their handheld or wearable
devices.
Cloud Computing
Enterprises can acquire the latest apps and digital services as they are needed and
without large upfront investments by switching from owning IT resources to cloud
computing (Figure 1.6). Cloud computing ranges from storing your files in Dropbox
to advanced cloud services. In short, with the cloud, resources no longer depend
on buying that resource. For example, Amazon Elastic Compute Cloud, known as
Cloud computing is a style
of computing in which IT
services are delivered on-
demand and accessible via
the Internet. Common exam-
ples are Dropbox, Gmail,
and Google Drive.
Food Safety Modernization
Act (FSMA), signed into law
in early 2011, requires all
companies in food supply
chains to be able to trace
foods back to the point of
origin (farm) and forward to
the consumer’s plate (fork).
The term for the effort is
farm-to-fork traceability.
Public health is the chief con-
cern, followed by potential
liability and brand protection
issues.
c01DoingBusinessinDigitalTimes.indd Page 6 12/11/14 1:53 PM f-392 /208/WB01490/9781118897782/ch01/text_s
1.1 Every Business Is a Digital Business 7
Figure 1.6 Cloud computing is an important evolution in data storage, software, apps, and
delivery of IT services. An example is Apple iCloud—a cloud service used for online storage and
synchronization of mail, media fi les, contacts, calendar, and more.
EC2, eliminates the need to invest in hardware up front, so companies can develop
and deploy applications faster. EC2 enables companies to quickly add storage
capacity as their computing requirements change. EC2 reduces the time it takes to
acquire server space from weeks to minutes.
Machine-to-Machine Technology
Sensors can be embedded in most products. Objects that connect themselves to
the Internet include cars, heart monitors, stoplights, and appliances. Sensors are
designed to detect and react, such as Ford’s rain-sensing front wipers that use
an advanced optical sensor to detect the intensity of rain or snowfall and adjust
wiper speed accordingly. Machine-to-machine (M2M) technology enables sensor-
embedded products to share reliable real time data via radio signals. M2M and
the Internet of Things (IoT) are widely used to automate business processes in
industries ranging from transportation to health care. By adding sensors to trucks,
turbines, roadways, utility meters, heart monitors, vending machines, and other
equipment they sell, companies can track and manage their products remotely.
©
D
rA
ft
er
12
3/
iS
to
ck
p
ho
to
©
h
an
ib
ar
am
/i
St
oc
kp
ho
to
Internet of things (IoT)
refers to a set of capabilities
enabled when physical things
are connected to the Internet
via sensors.
TECH NOTE 1.1 The Internet of Things
The phrase Internet of Things was coined by Kevin Ashton in 1999 while he was em-
ployed at Procter & Gamble. It refers to objects (e.g., cars, refrigerators, roadways)
that can sense aspects of the physical world, such as movement, temperature, light-
ing, or the presence or absence of people or objects, and then either act on it or re-
port it. Instead of most data (text, audio, video) on the Internet being produced and
used by people, more data are generated and used by machines communicating with
other machines—or M2M, as you read at the start of this chapter. Smart devices use
IP addresses and Internet technologies like Wi-Fi to communicate with each other
or directly with the cloud. Recent advances in storage and computing power avail-
able via cloud computing are facilitating adoption of the IoT.
The IoT opens new frontiers for improving processes in retail, health care,
manufacturing, energy, and oil and gas exploration. For instance, manufacturing
processes with embedded sensors can be controlled more precisely or monitored
c01DoingBusinessinDigitalTimes.indd Page 7 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
8 Chapter 1 Doing Business in Digital Times
Big Data
There is no question that the increasing volume of data can be valuable, but only if
they are processed and available when and where they are needed. The problem is
that the amount, variety, structure, and speed of data being generated or collected
by enterprises differ significantly from traditional data. Big data are what high-
volume, mostly text data are called. Big data stream in from multiple channels and
sources, including:
• mobile devices and M2M sensors embedded in everything from airport
runways to casino chips. Later in this chapter, you will read more about the
Internet of Things.
• social content from texts, tweets, posts, blogs.
• clickstream data from the Web and Internet searches.
• video data and photos from retail and user-generated content.
• financial, medical, research, customer, and B2B transactions.
Big data are 80 to 90 per cent unstructured. Unstructured data do not have a pre-
dictable format like a credit card application form. Huge volumes of unstructured data
flooding into an enterprise are too much for traditional technology to process and ana-
lyze quickly. Big data tend to be more time-sensitive than traditional (or small) data.
The exploding field of big data and analytics is called data science. Data sci-
ence involves managing and analyzing massive sets of data for purposes such as
target marketing, trend analysis, and the creation of individually tailored products
and services. Enterprises that want to take advantage of big data use real time data
from tweets, sensors, and their big data sources to gain insights into their custom-
ers’ interests and preference, to create new products and services, and to respond
to changes in usage patterns as they occur. Big data analytics has increased the
demand for data scientists, as described in Career Insight 1.1.
for hazards and then take corrective action, which reduces injuries, damage, and
costs. IoT combined with big data analytics can help manufacturers improve the
effi ciency of their machinery and minimize energy consumption, which often is the
manufacturing industry’s second-biggest expense.
The health sector is another area where IoT can help signifi cantly. For example,
a person with a wearable device that carries all records of his health could be monitored
constantly. This connectivity enables health services to take necessary measures for
maintaining the wellbeing of the person.
Data Scientist
Big data, analytics tools, powerful networks, and greater
processing power have contributed to growth of the
field of data science. Enterprises need people who are
capable of analyzing and finding insights in data cap-
tured from sensors, M2M apps, social media, wearable
technology, medical testing, and so on. Demand for data
scientists is outpacing the supply of talent. It is projected
that the data scientist career option will grow 19 per
cent by 2020—surpassed only by video game design-
ers. Talent scarcity has driven up salaries. According to
CAREER INSIGHT 1 . 1 HOT CAREER
c01DoingBusinessinDigitalTimes.indd Page 8 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.1 Every Business Is a Digital Business 9
Glassdoor data (glassdoor.com, 2014), the median salary
for data scientists in the United States is $117,500. By
contrast, a business analyst earns an average of $61,000.
Profiles of Data Scientists at Facebook, LinkedIn,
and Bitly
• Facebook’s Jeff Hammerbacher. Jeff helped
Facebook make sense out of huge volumes of user
data when he joined the company in 2006. Facebook’s
data science team analyzes the self-reported data on
each user’s Facebook page in order to target ads
based on things the user actually likes.
• LinkedIn’s DJ Patil. DJ worked at LinkedIn as
chief data scientist. Many of the cool products on
LinkedIn were built using data from self-reporting
and machine learning.
• Bitly’s Hilary Mason. Hilary was chief scientist at
Bitly, which offers URL shortening and redirec-
tion services with real time link tracking. Bitly sees
behavior from billions of people a month by analyz-
ing tens of millions of links shared per day, which are
clicked hundreds of millions times. The clickstreams
generate an enormous amount of real time data.
Using data analytics, Hillary and her team detected
and solved business problems that were not evident.
Data Science Is Both an Art and a Science
In their 2012 Harvard Business Review article titled
“Data Scientist: The Sexiest Job of the 21st Century,”
authors Thomas Davenport and D. J. Patil define a data
scientist as a “high-ranking professional with the train-
ing and curiosity to make discoveries in the world of big
data” (Davenport & Patil, 2012). They described how
data scientist Jonathan Goldman transformed LinkedIn
after joining the company in 2006. At that time, LinkedIn
had less than 8 million members. Goldman noticed that
existing members were inviting their friends and col-
leagues to join, but they were not making connections
with other members at the rate executives had expected.
A LinkedIn manager said, “It was like arriving at a con-
ference reception and realizing you don’t know anyone.
So you just stand in the corner sipping your drink—and
you probably leave early.” Goldman began analyzing
the data from user profiles and looked for patterns that
to predict whose networks a given profile would land
in. While most LinkedIn managers saw no value in
Goldman’s work, Reid Hoffman, LinkedIn’s cofounder
and CEO at the time, understood the power of analytics
because of his experiences at PayPal. With Hoffman’s
approval, Goldman applied data analytics to test what
would happen if member were presented with names
of other members they had not yet connected with, but
seemed likely to know. He displayed the three best new
matches for each member based on his or her LinkedIn
profile. Within days, the click-through rate on those
matches skyrocketed and things really took off. Thanks
to this one feature, LinkedIn’s growth increased dra-
matically.
The LinkedIn example shows that good data sci-
entists do much more than simply try to solve obvious
business problems. Creative and critical thinking are
part of their job—that is, part analyst and part artist.
They dig through incoming data with the goal of dis-
covering previously hidden insights that could lead to
a competitive advantage or detect a business crisis in
enough time to prevent it. Data scientists often need
to evaluate and select those opportunities and threats
that would be of greatest value to the enterprise or
brand.
Sources: Kelly (2013), Lockhard & Wolf (2012), Davenport & Patil (2012), U.S. Department of Labor, Bureau of Labor Statistics (2014).
SOCIAL-MOBILE-CLOUD
MODEL
The relationship among social, mobile, and cloud technologies is shown in
Figure 1.7. The cloud consists of huge data centers accessible via the Internet and
forms the core by providing 24/7 access to storage, apps, and services. Handhelds
and wearables, such as Google Glass, Pebble, and Sony Smartwatch (Figure 1.8),
and their users form the edge. Social channels connect the core and edge. The
SoMoClo integration creates the technical and services infrastructure needed for
digital business. This infrastructure makes it possible to meet the expectations of
employees, customers, and business partners given that almost everyone is con-
nected (social), everywhere they go (mobile), and has 24/7 access to data, apps, and
other services (cloud).
c01DoingBusinessinDigitalTimes.indd Page 9 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
10 Chapter 1 Doing Business in Digital Times
Here are three examples of their influence:
1. Powerful social infl uences impact advertising and marketing: Connections and
feedback via social networks have changed the balance of infl uence. Consum-
ers are more likely to trust tweets from ordinary people than recommendations
made by celebrity endorsements. And, negative sentiments posted or tweeted
can damage brands.
2. Consumer devices go digital and offer new services. The Nike Fuel-
band wristband helps customers track their exercise activities and calories
burned. The device links to a mobile app that lets users post their progress
on Facebook.
3. eBay’s move to cloud technology improves sellers’ and buyers’ experiences.
The world’s largest online marketplace, eBay, moved its IT infrastructure to the
cloud. With cloud computing, eBay is able to introduce new types of landing
pages and customer experiences without the delay associated with having to buy
additional computing resources.
The balance of power has shifted as business is increasingly driven by individu-
als for whom mobiles are an extension of their body and mind. They expect to use
location-aware services, apps, alerts, social networks, and the latest digital capabili-
ties at work and outside work. To a growing extent, customer loyalty and revenue
growth depend on a business’s ability to offer unique customer experiences that
wow customers more than competitors can.
Figure 1.7 Model of the
integration of cloud, mobile,
and social technologies. The
cloud forms the core. Mobile
devices are the endpoints.
Social networks create the
connections. ©
sc
an
ra
il/
iS
to
ck
p
ho
to
c01DoingBusinessinDigitalTimes.indd Page 10 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.1 Every Business Is a Digital Business 11
Figure 1.8 Strong interest in
smart wearable technology
refl ects growing consumer
desire to be more digitally
connected at all times using
a collection of multiple
devices. A smartwatch used
at work, such as in a retail
store, can provide shop fl oor
staff with a screen to check
stock availability.
DIGITAL BUSINESS
MODELS
Business models are the ways enterprises generate revenue or sustain themselves.
Digital business models define how businesses make money via digital technology.
Companies that adopt digital business models are better positioned to take advan-
tage of business opportunities and survive, according to the Accenture Technology
Vision 2013 report (Accenture, 2013). Figure 1.9 contains examples of new tech-
nologies that destroyed old business models and created new ones.
Figure 1.9 Digital business
models refer to how
companies engage their
customers digitally to
create value via websites,
social channels, and mobile
devices.
B
lo
om
b
er
g
/G
et
ty
Im
ag
es
M
at
th
ew
S
ha
w
/G
et
ty
Im
ag
es
FI
LI
P
SI
N
G
ER
/E
PA
/N
ew
sc
om
Location-aware technologies
track items through
production and delivery to
reduce wasted time and
inefficiency in supply chains
and other business-to-
business (B2B) transactions.
Twitter dominates the
reporting of news and events
as they are still happening.
Facebook became the most
powerful sharing network
in the world.
Smartphones, tablets, other
touch devices, and their apps
reshaped how organizations
interact with customers—and
how customers want
businesses to interact with
them.
c01DoingBusinessinDigitalTimes.indd Page 11 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
12 Chapter 1 Doing Business in Digital Times
The ways in which market leaders are transitioning to digital business models
include the following:
• Amazon gains a competitive edge with high-tech tech support. Amazon
is well known for radically changing online shopping and e-book reading
experiences. Amazon’s CEO Jeffrey Bezos set a new standard for tech sup-
port with MayDay (Figure 1.10). Within 15 seconds of touching the MayDay
button on their Kindle Fire HDX tablet, customers get free, 24/7/365 tech
support via video chat. MayDay works by integrating all customer data and
instantly displaying the results to a tech agent when a customer presses the
MayDay button. Plus, tech agents can control and write on a customer’s Fire
screen. By circling and underlining various buttons on the display, it is dead
simple for new Fire owners to become expert with their devices. Amazon’s
objective is to educate the consumer rather than just fix the problem. In the
highly competitive tablet wars, Amazon has successfully differentiated its
tablet from those of big players like Apple, Samsung, and Asus (manufac-
turer of Google’s Nexus 7) with the MayDay button.
• NBA talent scouts rely on sports analytics and advanced scouting systems.
NBA talent scouts used to crunch players’ stats, watch live player perfor-
mances, and review hours of tapes to create player profiles (Figure 1.11).
Now software that tracks player performance has changed how basketball
and soccer players are evaluated. For example, STATS’ SportVU tech-
nology is revolutionizing the way sports contests are viewed, understood,
played, and enjoyed. SportVU uses six palm-sized digital cameras that
track the movement of every player on the court, record ball movement
25 times per second, and convert movements into statistics. SportVU
produces real time and highly complex statistics to complement the tra-
ditional play-by-play. Predictive sport analytics can provide a 360-degree
view of a player’s performance and help teams make trading decisions.
Figure 1.10 MayDay video
chat tech support.
Figure 1.11 Sports analytics
and advanced scouting
systems evaluate talent
and performance for the
NBA—offering teams a
slight but critical competitive
advantage.
A
P
Ph
ot
o/
Te
d
S
. W
ar
re
n
©
T
rib
un
e
C
on
te
nt
/A
g
en
cy
L
LC
/A
la
m
y
c01DoingBusinessinDigitalTimes.indd Page 12 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.1 Every Business Is a Digital Business 13
Sports analytics bring about small competitive advantages that can shift
games and even playoff series.
• Dashboards keep casino floor staff informed of player demand. Competition
in the gaming industry is fierce, particularly during bad economic condi-
tions. The use of manual spreadsheets and gut-feeling decisions did not lead
to optimal results. Casino operators facing pressure to increase their bottom
line have invested in analytic tools, such as Tangam’s Yield Management
solution (TYM). TYM is used to increase the yield (profitability) of black-
jack, craps, and other table games played in the pit (Figure 1.12). The
analysis and insights from real time apps are used to improve the gaming
experience and comfort of players.
Figure 1.12 Casinos are
improving the profi tability of
table games by monitoring
and analyzing betting in real
time.
THE RECENT PAST AND
NEAR FUTURE—2010S
DECADE
We have seen great advances in digital technology since the start of this decade.
Figure 1.13 shows releases by tech leaders that are shaping business and everyday
life. Compare the role of your mobiles, apps, social media, and so on in your per-
sonal life and work in 2010 to how you use them today. You can expect greater
changes going forward to the end of this decade with the expansion of no-touch
interfaces, mobility, wearable technology, and the IoT.
Companies are looking for ways to take advantage of new opportunities in
mobile, big data, social, and cloud services to optimize their business processes.
The role of the IT function within the enterprise has changed significantly—and
will evolve rapidly over the next five years. As you will read throughout this book,
the IT function has taken on key strategic and operational roles that determine the
enterprise’s success or failure.
©
li
se
g
ag
ne
/i
St
oc
kp
ho
to
Figure 1.13 Digital
technology released
since 2010.
• Google launched
Android mobile
OS to compete
with iPhones
By 2014, became
the first billion-user
mobile OS
• App Store opened
on July 10, 2008
via an update to iTunes
By mid-2011, over 15 billion apps
downloaded from App Store
2008
• Apple launched
iPad
100 million
iPads sold
in 2 years
2010 2011–2012
• No tough interfaces
to communicate
by simply gesturing
or talking
Microsoft’s Kinect for
Windows Apple’s Siri
Google’s Glass
• iWatch released
integrates with
iOS devices
2014
c01DoingBusinessinDigitalTimes.indd Page 13 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
14 Chapter 1 Doing Business in Digital Times
More objects are being embedded with sensors and gaining
the ability to communicate with the Internet. This communi-
cation improves business processes while reducing costs and
risks. For example, sensors and network connections can be
embedded in rental cars. Zipcar has pioneered the car rental
by the hour business model. See Figure 1.14. Cars are leased
for short time spans to registered members, making retail
rental centers unnecessary. Traditional car rental agencies
are starting to experiment with sensors so that each car’s use
can be optimized to increase revenue.
When devices or products are embedded with sensors,
companies can track their movements or monitor interac-
tions with them. Business models can be adjusted to take
advantage of what is learned from this behavioral data. For
example, an insurance company offers to install location
sensors in customers’ cars. By doing so, the company
develops the ability to price the drivers’ policies on how a
car is driven and where it travels. Pricing is customized to
match the actual risks of operating a vehicle rather than
based on general proxies—driver’s age, gender, or location
of residence.
Opportunities for Improvement
Other applications of embedded physical things are:
• In the oil and gas industry, exploration and development
rely on extensive sensor networks placed in the earth’s
crust. The sensors produce accurate readings of the
location, structure, and dimensions of potential fields.
The payoff is lower development costs and improved oil
flows.
• In the health-care industry, sensors and data links can
monitor patients’ behavior and symptoms in real time
and at low cost. This allows physicians to more precisely
diagnose disease and prescribe treatment regimens.
For example, sensors embedded in patients with heart
disease or chronic illnesses can be monitored continu-
ously as they go about their daily activities. Sensors
placed on congestive heart patients monitor many of
these signs remotely and continuously, giving doctors
early warning of risky conditions. Better management
of congestive heart failure alone could reduce hospi-
talization and treatment costs by $1 billion per year in
the U.S.
• In the retail industry, sensors can capture shoppers’ pro-
file data stored in their membership cards to help close
purchases by providing additional information or offering
discounts at the point of sale.
• Farm equipment with ground sensors can take into
account crop and field conditions, and adjust the
amount of fertilizer that is spread on areas that need more
nutrients.
• Billboards in Japan scan people passing by, assessing
how they fit consumer profiles, and instantly change the
displayed messages based on those assessments.
• The automobile industry is developing systems that
can detect imminent collisions and take evasive action.
Certain basic applications, such as automatic braking
systems, are available in high-end autos. The potential
accident reduction savings resulting from wider deploy-
ment of these sensor systems could exceed $100 billion
annually.
Questions
1. Research Zipcar. How does this company’s business
model differ from that of traditional car rental companies,
such as Hertz or Avis?
2. Think of two physical things in your home or office that,
if they were embedded with sensors and linked to a net-
work, would improve the quality of your work or personal
life. Describe these two scenarios.
3. What might the privacy concerns be?
IT at Work 1 .1
Zipcar and Other Connected Products
Figure 1.14 A Zipcar-reserved parking sign in
Washington, DC.
©
W
is
ke
rk
e/
A
la
m
y
c01DoingBusinessinDigitalTimes.indd Page 14 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.2 Business Process Management and Improvement 15
By 2016 wearable electronics in shoes, tattoos, and accessories
will become a $10 billion industry, according to Gartner (2012).
Wearable technology builds computing, connectivity,
and sensor capabilities into materials. The latest wearables
are lightweight and may be found in athletic shoes, golf
accessories, and fitness trackers. The wearables can include
data analysis apps or services that send feedback or insights
to the wearer. For example, Zepp Labs manufactures sensor-
embedded gloves for golf, tennis, and baseball that analyze
1,000 data points per second to create 3D representations
of a player’s swing. The sensors track every inch of a golfer’s
swing, analyzes the movements, and then sends the wearers
advice on how to improve their game. Sensors that weigh
only half an ounce clip onto the glove. Another example is
Sony’s SmartBand, a wristband that synchs with your phone
to track how many steps you take, the number of calories you
burn each day, and how well you sleep. The Lifelog app is
the key to the Smartband. The app gives a visual display of a
timeline and your activity, with boxes monitoring your steps,
calories, kilometers walked, and more. Lifelog goes beyond
just fitness by also monitoring time spent on social networks
and photos taken.
The major sources of revenue from wearable smart
electronics are items worn by athletes and sports enthusiasts
and devices used to monitor health conditions, such as auto-
matic insulin delivery for diabetics.
Applications and services are creating new value for
consumers, especially when they are combined with personal
preferences, location, biosensing, and social data. Wearable
electronics can provide more detailed data to retailers for
targeting advertisements and promotions.
Questions
1. Discuss how wearable electronics and the instant feedback
they send to your mobile device could be valuable to you.
2. How can data from wearable technology be used to
improve worker productivity or safety?
3. What are two other potentially valuable uses of instant
feedback or data from wearable technology?
4. How can wearable devices impact personal privacy?
IT at Work 1 . 2
Wearable Technology
All functions and departments in the enterprise have tasks that they need to com-
plete to produce outputs, or deliverables, in order to meet their objectives. Business
processes are series of steps by which organizations coordinate and organize tasks
to get work done. In the simplest terms, a process consists of activities that convert
inputs into outputs by doing work.
The importance of efficient business processes and continuous process improve-
ment cannot be overemphasized. Why? Because 100 per cent of an enterprise’s perfor-
mance is the result of its processes. Maximizing the use of inputs in order to carry out
similar activities better than one’s competitors is a critical success factor. IT at Work 1.3
describes the performance gains at AutoTrader.com, the automobile industry’s largest
online shopping marketplace, after it redesigned its order-to-cash process.
1.2 Business Process Management and Improvement
Objectives define the desired
benefits or expected per-
formance improvements.
They do not and should not
describe what you plan to do,
how you plan to do it, or what
you plan to produce, which is
the function of processes.
Questions
1. What are the benefi ts of cloud computing?
2. What is machine-to-machine (M2M) technology? Give an example of a
business process that could be automated with M2M.
3. Describe the relationships in the SoMoClo model.
4. Explain the cloud.
5. Why have mobile devices given consumers more power in the marketplace?
6. What is a business model?
7. What is a digital business model?
8. Explain the Internet of Things.
c01DoingBusinessinDigitalTimes.indd Page 15 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
16 Chapter 1 Doing Business in Digital Times
AutoTrader.com is the leading automotive marketplace, list-
ing several million new and pre-owned vehicles, as shown
in Figure 1.15. AutoTrader.com is one of the largest local
online advertising entities, with profits of $300 million on
$1.2 billion in revenues in 2013. The site attracts over 15 mil-
lion unique visitors each month.
Outdated Order-to-Cash Process
AutoTrader processes thousands of orders and contracts
each month. Its cross-functional order fulfillment process,
or order-to-cash process, was outdated and could not
handle the sales volume. The legacy process was run on My
AutoTrader (MAT), a system based on Lotus Notes/Domino.
MAT took an average of 6.3 to 8.3 days to fulfill orders and
process contracts, as Figure 1.16 shows. MAT created a bot-
tleneck that slowed the time from order to cash, or revenue
generation. With over 100 coordinated steps, the process
was bound to be flawed, resulting in long and error-prone
cycle times. Cycle time is the time required to complete a
given process. At AutoTrader, cycle time is the time between
the signing and delivery of a contract. Customers were
aggravated by the unnecessary delay in revenue.
Redesigning the Order Fulfillment
Process with BPM
Management had set three new objectives for the company:
to be agile, to generate revenue faster, and to increase
customer satisfaction. They invested in a BPM (business pro-
cess management) solution—selecting webMethods from
Software AG (softwareag.com, 2011). The BPM software
was used to document how tasks were performed using
the legacy system. After simplifying the process as much as
possible, remaining tasks were automated or optimized. The
new system cuts down the order fulfillment process to 1 day,
as shown in Figure 1.17. Changes and benefits resulting from
the redesigned process are:
• There are only six human tasks even though the pro-
cess interacts with over 20 different data sources and
systems, including the inventory, billing, and contract
fulfillment.
• Tasks are assigned immediately to the right people, who
are alerted when work is added to their queues.
• Fewer than five percent of orders need to go back to
sales for clarification—a 400 percent improvement.
• Managers can check order fulfillment status anytime
using webMethods Optimize for Process, which provides
real time visibility into performance. They can measure
key performance indicators (KPIs) in real time to see
where to make improvements.
• Dealers can make changes directly to their contracts,
which cut costs for personnel. Software and hardware
costs are decreasing as the company retires old systems.
Sources: Compiled from Walsh (2012), softwareag.com (2011), Alesci &
Saitto (2012).
IT at Work 1 . 3
AutoTrader Redesigns Its Order-to-Cash Process
Figure 1.15 AutoTrader.com car search site.
Figure 1.16 AutoTrader’s
legacy order fulfi llment
process had an average cycle
time of up to 8.3 days.
©
N
et
Ph
ot
os
/A
la
m
y
Fulfillment Total Avg
Quality
Assurance
Contract
Delivered
Data EntryFax
2.8 days
2.8 days
.5 day 4 days 8.3 days
6.3 days
1 day
1 day2 days.5 day
New
Up-sell
Contract
Signed
c01DoingBusinessinDigitalTimes.indd Page 16 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.2 Business Process Management and Improvement 17
Figure 1.17 AutoTrader’s
objective is to process and
fi ll orders within one day.
Questions
1. Discuss how the redesigned order process supports the
company’s three new business objectives.
2. How does the reduced cycle time of the order fulfillment pro-
cess improve revenue generation and customer satisfaction?
3. Does reducing the cycle time of a business process also
reduce errors? Why or why not?
THREE COMPONENTS
OF BUSINESS
PROCESSES
Business processes have three basic components, as shown in Figure 1.18. They
involve people, technology, and information.
Examples of common business processes are:
• Accounting: Invoicing; reconciling accounts; auditing
• Finance: Credit card or loan approval; estimating credit risk and financing
terms
• Human resources (HR): Recruiting and hiring; assessing compliance with
regulations; evaluating job performance
• IT or information systems: Generating and distributing reports and data
visualizations; data analytics; data archiving
• Marketing: Sales; product promotion; design and implementation of sales
campaigns; qualifying a lead
• Production and operations: Shipping; receiving; quality control; inventory
management
• Cross-functional business processes: Involving two or more functions, for
example, order fulfillment and product development
Designing an effective process can be complex because you need a deep under-
standing of the inputs and outputs (deliverables), how things can go wrong, and how
to prevent things from going wrong. For example, Dell had implemented a new
process to reduce the time that tech support spent handling customer service calls. In
an effort to minimize the length of the call, tech support’s quality dropped so much
that customers had to call multiple times to solve their problems. The new process
had backfired—increasing the time to resolve computer problems and aggravating
Dell customers.
Figure 1.18 Three
components of a
business process.
Deliverables are the outputs
or tangible things that are
produced by a business pro-
cess. Common deliverables
are products, services, actions,
plans, or decisions, such as
to approve or deny a credit
application. Deliverables are
produced in order to achieve
specific objectives.
Submit sales
order
electronically
Day 1:
Live online
processing of orders
Day 2:
Order fulfillment
1 day elapsed
raw materials,
data,
knowledge,
expertise
work that
transforms
inputs & acts on
data and
knowledge
products,
services,
plans,
or actions
Inputs Activities
Business Process
Deliverables
c01DoingBusinessinDigitalTimes.indd Page 17 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
18 Chapter 1 Doing Business in Digital Times
Characteristics of Business Processes
Processes can be formal or informal. Formal processes are documented and have
well-established steps. Order taking and credit approval processes are examples.
Routine formal processes are referred to as standard operating procedures, or
SOPs. A SOP is a well-defined and documented way of doing something. An effec-
tive SOP documents who will perform the tasks; what materials to use; and where,
how, and when the tasks are to be performed. SOPs are needed for the handling of
food, hazardous materials, or situations involving safety, security, or compliance. In
contrast, informal processes are typically undocumented, have inputs that may not
yet been identified, and are knowledge-intensive. Although enterprises would pre-
fer to formalize their informal processes in order to better understand, share, and
optimize them, in many situations process knowledge remains in people’s heads.
Processes range from slow, rigid to fast-moving, adaptive. Rigid processes
can be structured to be resistant to change, such as those that enforce security or
compliance regulations. Adaptive processes are designed to respond to change or
emerging conditions, particularly in marketing and IT.
Process Improvement
Given that a company’s success depends on the efficiency of its business processes,
even small improvements in key processes have significant payoff. Poorly designed,
flawed, or outdated business processes waste resources, increasing costs, causing
delays, and aggravating customers. For example, when customers’ orders are not
filled on time or correctly, customer loyalty suffers, returns increase, and reship-
ping increases costs. The blame may be flawed order fulfilment processes and not
employee incompetence, as described in IT at Work 1.2.
Simply applying IT to a manual or outdated process will not optimize it.
Processes need to be examined to determine whether they are still necessary.
After unnecessary processes are identified and eliminated, the remaining ones are
redesigned (or reengineered) in order to automate or streamline them. Methods
and efforts to eliminate wasted steps within a process are referred to as business
process reengineering (BPR). The goal of BPR is to eliminate the unnecessary,
non-value-added processes, then to simplify and automate the remaining processes
to significantly reduce cycle time, labor, and costs. For example, reengineering the
credit approval process cuts time from several days or hours to minutes or less.
Simplifying processes naturally reduces the time needed to complete the process,
which also cuts down on errors.
After eliminating waste, digital technology can enhance processes by (1) auto-
mating existing manual processes; (2) expanding the data flows to reach more func-
tions in order to make it possible for sequential activities to occur in parallel; and
(3) creating innovative business processes that, in turn, create new business models.
For instance, consumers can scan an image of a product and land on an e-commerce
site, such as Amazon.com, selling that product. This process flips the traditional
selling process by making it customer-centric.
Business Process Management
BPR is part of the larger discipline of business process management (BPM), which
consists of methods, tools, and technology to support and continuously improve
business processes. The purpose of BPM is to help enterprises become more agile
and effective by enabling them to better understand, manage, and adapt their busi-
ness processes. Vendors, consulting and tech firms offer BPM expertise, services,
software suites, and tools.
BPM software is used to map processes performed either by computers or
manually—and to design new ones. The software includes built-in templates show-
ing workflows and rules for various functions, such as rules for credit approval. These
c01DoingBusinessinDigitalTimes.indd Page 18 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.3 The Power of Competitive Advantage 19
templates and rules provide consistency and high-quality outcomes. For example, Oracle’s
WebLogic Server Process Edition includes server software and process integration
tools for automating complex business processes, such as handling an insurance claim.
But, BPM initiatives can be extremely challenging, and in order to be suc-
cessful, BPM requires buy-in from a broad cross section of the business, the right
technology selection, and highly effective change management processes. You will
read more about optimizing business processes and BPM’s role in the alignment of
IT and business strategy in Chapter 13.
Questions
1. What is a business process? Give three examples.
2. What is the difference between business deliverables and objectives?
3. List and give examples of the three components of a business process.
4. Explain the differences between formal and informal processes.
5. What is a standard operating procedure (SOP)?
6. What is the purpose of business process management (BPM)?
In business, as in sports, companies want to win—customers, market share, and so
on. Basically, that requires gaining an edge over competitors by being first to take
advantage of market opportunities, providing great customer experiences, doing
something well that others cannot easily imitate, or convincing customers why it is
a more valuable alternative than the competition.
1.3 The Power of Competitive Advantage
Agility means being able
to respond quickly.
Responsiveness means that
IT capacity can be easily
scaled up or down as needed,
which essentially requires
cloud computing.
Flexibility means having the
ability to quickly integrate
new business functions or to
easily reconfigure software
or apps.
BUILDING BLOCKS
OF COMPETITIVE
ADVANTAGE
Having a competitive edge means possessing an advantage over your competition.
Once an enterprise has developed a competitive edge, maintaining it is an ongoing
challenge. It requires forecasting trends and industry changes and what the company
needs to do to stay ahead of the game. It demands that you continuously track your
competitors and their future plans and promptly take corrective action. In summary,
competitiveness depends on IT agility and responsiveness. The benefit of IT agility
is being able to take advantage of opportunities faster or better than competitors.
Closely related to IT agility is flexibility. For example, mobile networks are
flexible—able to be set up, moved, or removed easily, without dealing with cables
and other physical requirements of wired networks. Mass migration to mobile
devices from PCs has expanded the scope of IT beyond traditional organizational
boundaries—making location practically irrelevant.
IT agility, flexibility, and mobility are tightly interrelated and fully dependent
on an organization’s IT infrastructure and architecture, which are covered in greater
detail in Chapter 2.
With mobile devices, apps, platforms, and social media becoming inseparable parts
of work life and corporate collaboration and with more employees working from home,
the result is the rapid consumerization of IT. IT consumerization is the migration of
consumer technology into enterprise IT environments. This shift has occurred because
personally owned IT is as capable and cost-effective as its enterprise equivalents.
COMPETITIVE
ADVANTAGE
Two key components of corporate profitability are:
1. Industry structure: An industry’s structure determines the range of profi tability
of the average competitor and can be very diffi cult to change.
2. Competitive advantage: This is an edge that enables a company to outperform
its average competitor. Competitive advantage can be sustained only by con-
tinually pursuing new ways to compete.
c01DoingBusinessinDigitalTimes.indd Page 19 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
20 Chapter 1 Doing Business in Digital Times
IT plays a key role in competitive advantage, but that advantage is short-lived
if competitors quickly duplicate it. Research firm Gartner defines competitive
advantage as a difference between a company and its competitors that matters to
customers.
It is important to recognize that some types of IT are commodities, which do
not provide a special advantage. Commodities are basic things that companies need
to function, such as electricity and buildings. Computers, databases, and network
services are examples of commodities. In contrast, how a business applies IT to sup-
port business processes transforms those IT commodities into competitive assets.
Critical business processes are those that improve employee performance and profit
margins.
STRATEGIC PLANNING
AND COMPETITIVE
MODELS
Strategy planning is critical for all organizations, including government agencies,
health care providers, educational institutions, the military, and other nonprofits.
We start by discussing strategic analysis and then explain the activities or compo-
nent parts of strategic planning.
What Is Strategic (SWOT) Analysis?
There are many views on strategic analysis. In general, strategic analysis is the scan-
ning and review of the political, social, economic, and technical environments of an
organization. For example, any company looking to expand its business operations
into a developing country has to investigate that country’s political and economic
stability and critical infrastructure. That strategic analysis would include reviewing
the U.S. Central Intelligence Agency’s (CIA) World Factbook. The World Factbook
provides information on the history, people, government, economy, geography,
communications, transportation, military, and transnational issues for 266 world
entities. Then the company would need to investigate competitors and their poten-
tial reactions to a new entrant into their market. Equally important, the company
would need to assess its ability to compete profitably in the market and impacts of
the expansion on other parts of the company. For example, having excess production
capacity would require less capital than if a new factory needed to be built.
The purpose of this analysis of the environment, competition, and capacity is
to learn about the strengths, weaknesses, opportunities, and threats (SWOT) of the
expansion plan being considered. SWOT analysis, as it is called, involves the evalu-
ation of strengths and weaknesses, which are internal factors, and opportunities and
threats, which are external factors. Examples are:
• Strengths: Reliable processes; agility; motivated workforce
• Weaknesses: Lack of expertise; competitors with better IT infrastructure
• Opportunities: A developing market; ability to create a new market or product
• Threats: Price wars or other fierce reaction by competitors; obsolescence
SWOT is only a guide. The value of SWOT analysis depends on how the analy-
sis is performed. Here are several rules to follow:
• Be realistic about the strengths and weaknesses of your organization.
• Be realistic about the size of the opportunities and threats.
• Be specific and keep the analysis simple, or as simple as possible.
• Evaluate your company’s strengths and weaknesses in relation to those of
competitors (better than or worse than competitors).
• Expect conflicting views because SWOT is subjective, forward-looking, and
based on assumptions.
SWOT analysis is often done at the outset of the strategic planning process.
Now you will read answers to the question, “What is strategic planning?”
c01DoingBusinessinDigitalTimes.indd Page 20 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.3 The Power of Competitive Advantage 21
What Is Strategic Planning?
Strategic planning is a series of processes in which an organization selects and
arranges its businesses or services to keep the organization healthy or able to func-
tion even when unexpected events disrupt one or more of its businesses, markets,
products, or services. Strategic planning involves environmental scanning and pre-
diction, or SWOT analysis, for each business relative to competitors in that business’s
market or product line. The next step in the strategic planning process is strategy.
What Is Strategy?
Strategy defines the plan for how a business will achieve its mission, goals, and
objectives. The plan specifies the necessary financial requirements, budgets, and
resources. Strategy addresses fundamental issues such as the company’s position
in its industry, its available resources and options, and future directions. A strategy
addresses questions such as:
• What is the long-term direction of our business?
• What is the overall plan for deploying our resources?
• What trade-offs are necessary? What resources will need to be shared?
• What is our position compared to that of our competitors?
• How do we achieve competitive advantage over rivals in order to achieve or
maximize profitability?
Two of the most well-known methodologies were developed by Michael Porter.
Porter’s Competitive Forces Model and Strategies
Michael Porter’s competitive forces model, also called the five-forces model, has
been used to identify competitive strategies. The model demonstrates how IT
can enhance competitiveness. Professor Porter discusses this model in detail in a
13-minute YouTube video from Harvard Business School.
The model recognizes five major forces (think of them as pressures or drivers) that
influence a company’s position within a given industry and the strategy that manage-
ment chooses to pursue. Other forces, including new regulations, affect all companies
in the industry, and have a rather uniform impact on each company in an industry.
According to Porter, an industry’s profit potential is largely determined by the
intensity of competitive forces within the industry, shown in Figure 1.19. A good
understanding of the industry’s competitive forces and their underlying causes is a
crucial component of strategy formulation.
Basis of the competitive forces model Before examining the model, it is
helpful to understand that it is based on the fundamental concept of profitability
and profit margin:
PROFIT TOTAL REVENUES minus TOTAL COSTS
Profit is increased by increasing total revenues and/or decreasing total costs. Profit
is decreased when total revenues decrease and/or total costs increase:
PROFIT MARGIN SELLING PRICE minus COST OF THE ITEM
Profit margin measures the amount of profit per unit of sales, and does not take into
account all costs of doing business.
Five industry forces According to Porter’s competitive forces model, the five
major forces in an industry affect the degree of competition, which impact profit
margins and ultimately profitability. These forces interact, so while you read about
them individually, their interaction determines the industry’s profit potential. For
example, while profit margins for pizzerias may be small, the ease of entering that
Video 1-1
Five Competitive Forces
that Shape Strategy, by
Michael Porter: youtube.com/
watch?v mYF2_FBCvXw
c01DoingBusinessinDigitalTimes.indd Page 21 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
22 Chapter 1 Doing Business in Digital Times
Threat of
New Entrants
(Bargaining Power of
Suppliers and Brands)
(Bargaining Power of
Buyers and Distribution
Channels)
Rivalry
Competing
Companies
Our
Company
Threat of Substitute
Products or Services
Supplier Power Buyer Power
Figure 1.19 Porter’s
competitive forces model.
industry draws new entrants. Conversely, profit margins for delivery services may
be large, but the cost of the IT needed to support the service is a huge barrier to
entry into the market.
The five industry (or market) forces are:
1. Threat of entry of new competitors. Industries that have large profi t margins
attract entrants into the market to a greater degree than industries with small
margins. The same principle applies to jobs—people are attracted to higher-paying
jobs, provided that they can meet the criteria or acquire the skills for that job.
In order to gain market share, entrants usually need to sell at lower prices as an
incentive. Their tactics can force companies already in the industry to defend
their market share by lowering prices—reducing profi t margin. Thus, this threat
puts downward pressure on profi t margins by driving down prices.
This force also refers to the strength of the barriers to entry into an industry,
which is how easy it is to enter an industry. The threat of entry is lower (less pow-
erful) when existing companies have ITs that are diffi cult to duplicate or very
expensive. Those ITs create barriers to entry that reduce the threat of entry.
2. Bargaining power of suppliers. Bargaining power is high where the supplier or
brand is powerful, such as Apple, Microsoft, and auto manufacturers. Power is
determined by how much a company purchases from a supplier. The more pow-
erful company has the leverage to demand better prices or terms, which increase
its profi t margin. Conversely, suppliers with very little bargaining power tend to
have small profi t margins.
3. Bargaining power of customers or buyers. This force is the reverse of the bar-
gaining power of suppliers. Examples are Walmart and government agencies.
This force is high when there are few large customers or buyers in a market.
4. Threat of substituting products or services. Where there is product-for-product
substitution, such as Kindle for Nook, there is downward pressure on prices. As
the threat of substitutes increases, the profi t margin decreases because sellers
need to keep prices competitively low.
5. Competitive rivalry among existing fi rms in the industry. Fierce competition in-
volves expensive advertising and promotions, intense investments in research
and development (R&D), or other efforts that cut into profi t margins. This force
is most likely to be high when entry barriers are low, the threat of substitute
products is high, and suppliers and buyers in the market attempt to control it.
That is why this force is placed in the center of the model.
c01DoingBusinessinDigitalTimes.indd Page 22 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.3 The Power of Competitive Advantage 23
The strength of each force is determined by the industry’s structure. Existing
companies in an industry need to protect themselves against these forces.
Alternatively, they can take advantage of the forces to improve their position or to
challenge industry leaders. The relationships are shown in Figure 1.19.
Companies can identify the forces that influence competitive advantage in their
marketplace and then develop their strategy. Porter (1985) proposed three types of
strategies—cost leadership, differentiation, and niche strategies. In Table 1.2, Porter’s
three classical strategies are listed first, followed by a list of nine other general
strategies for dealing with competitive advantage. Each of these strategies can be
enhanced by IT.
TABLE 1.2 Strategies for Competitive Advantage
Strategy Description
Cost leadership Produce product/service at the lowest cost in the
industry.
Differentiation Offer different products, services, or product
features.
Niche Select a narrow-scope segment (market niche) and
be the best in quality, speed, or cost in that segment.
Growth Increase market share, acquire more customers, or
sell more types of products.
Alliance Work with business partners in partnerships, alli-
ances, joint ventures, or virtual companies.
Innovation Introduce new products/services; put new features
in existing products/services; develop new ways to
produce products/services.
Operational effectiveness Improve the manner in which internal business
processes are executed so that the fi rm performs
similar activities better than its rivals.
Customer orientation Concentrate on customer satisfaction.
Time Treat time as a resource, then manage it and use it
to the fi rm’s advantage.
Entry barriers Create barriers to entry. By introducing innovative
products or using IT to provide exceptional service,
companies can create entry barriers to discourage
new entrants.
Customer or supplier Encourage customers or suppliers to stay with
lock-in you rather than going to competitors. Reduce
customers’ bargaining power by locking them in.
Increase switching costs Discourage customers or suppliers from going to
competitors for economic reasons.
c01DoingBusinessinDigitalTimes.indd Page 23 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
24 Chapter 1 Doing Business in Digital Times
Primary activities are those business activities directly involved in the production
of goods. Primary activities involve the purchase of materials, the processing of materi-
als into products, and delivery of products to customers. The five primary activities are:
1. Inbound logistics, or acquiring and receiving of raw materials and other inputs
2. Operations, including manufacturing and testing
3. Outbound logistics, which includes packaging, storage, delivery, and distribution
4. Marketing and sales to customers
5. Services, including customer service
The primary activities usually take place in a sequence from 1 to 5. As work
progresses, value is added to the product in each activity. To be more specific, the
incoming materials (1) are processed (in receiving, storage, etc.) in activities called
inbound logistics. Next, the materials are used in operations (2), where significant
value is added by the process of turning raw materials into products. Products need
to be prepared for delivery (packaging, storing, and shipping) in the outbound logis-
tics activities (3). Then marketing and sales (4) attempt to sell the products to cus-
tomers, increasing product value by creating demand for the company’s products.
The value of a sold item is much larger than that of an unsold one. Finally, after-
sales service (5), such as warranty service or upgrade notification, is performed for
the customer, further adding value.
Primary activities rely on the following support activities:
1. The fi rm’s infrastructure, accounting, fi nance, and management
2. Human resources (HR) management (For an IT-related HR trend, see IT at
Work 1.4.)
3. Technology development, and research and development (R&D)
4. Procurement, or purchasing
Each support activity can be applied to any or all of the primary activities.
Support activities may also support each other, as shown in Figure 1.20.
Innovation and adaptability are critical success factors, or CSFs, related to
Porter’s models. CSFs are those things that must go right for a company to achieve
its mission.
Accounting, legal &
finance
Human resources
management
INBOUND
LOGISTICS
Quality control,
receiving,
raw materials
control
OPERATION
Manufacturing,
packaging,
production
control, quality
control
OUTBOUND
LOGISTICS
Order handling,
delivery,
invoicing
SALES &
MARKETING
Sales
campaigns,
order taking,
social
networking,
sales analysis,
market
research
SERVICING
Warranty,
maintenance
Procurement
Product and
technology
development
Legal, accounting, financial management
Personnel, recruitment, training, staff planning, etc.
Supplier management, funding, subcontracting
Product and process design, production
engineering, market testing, R&D
S
u
p
p
o
rt
A
ct
iv
it
ie
s
P
ri
m
ar
y
A
ct
iv
it
ie
s
Figure 1.20 A fi rm’s value
chain. The arrows represent
the fl ow of goods, services,
and data.
c01DoingBusinessinDigitalTimes.indd Page 24 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.4 Enterprise Technology Trends 25
Questions
1. What are the characteristics of an agile organization?
2. Explain IT consumerization.
3. What are two key components of corporate profi tability?
4. Defi ne competitive advantage.
5. Describe strategic planning.
6. Describe SWOT analysis.
7. Explain Porter’s fi ve-forces model, and give an example of each force.
Managers at a global energy services company could not
find or access their best talent to solve clients’ technical
problems because of geographic boundaries and business
unit barriers. The company’s help desks supported engineers
well enough for common problems, but not for difficult
issues that needed creative solutions. Using Web technolo-
gies to expand access to experts worldwide, the company
set up new innovation communities across its business units,
which have improved the quality of its services.
Dow Chemical set up its own social network to help
managers identify the talent they need to carry out projects
across its diverse business units and functions. To expand
its talent pool, Dow extended the network to include former
employees and retirees.
Other companies are using networks to tap external tal-
ent pools. These networks include online labor markets such
as Amazon Mechanical Turk and contest services such as
InnoCentive that help solve business problems.
• Amazon Mechanical Turk is a marketplace for work that
requires human intelligence. Its web service enables
companies to access a diverse, on-demand workforce.
• InnoCentive is an “open innovation” company that
takes R&D problems in a broad range of areas such as
engineering, computer science, and business and frames
them as “challenge problems” for anyone to solve. It
gives cash awards for the best solutions to solvers who
meet the challenge criteria.
Sources: Compiled from McKinsey Global Institute (mckinsey.com/
insights/mgi.aspx), Amazon Mechanical Turk (aws.amazon.com/
mturk), and InnoCentive (Innocentive.com).
Questions
1. Visit and review the Amazon Mechanical Turk website.
Explain HITs. How do they provide an on-demand work-
force?
2. Visit and review the InnoCentive website. Describe what
the company does and how.
IT at Work 1 . 4
Finding Qualified Talent
At the end of his iPhone presentation at MacWorld 2007, Apple’s visionary leader
Steve Jobs displayed advice once expressed by legendary hockey player Wayne
Gretzky (Figure 1.21): “I skate to where the puck is going to be, not where it has
been.” Steve Jobs added: “And we’ve always tried to do that at Apple. Since the
very very beginning. And we always will.” He was telling us that Apple always
moves toward where it expects the future will be.
Looking at Apple’s history, you see innovative products and services that shaped
the future. For example, launching the iTunes store in April 2003 jumpstarted the
1.4 Enterprise Technology Trends
c01DoingBusinessinDigitalTimes.indd Page 25 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
26 Chapter 1 Doing Business in Digital Times
digital music industry. iTunes was a significant breakthrough that forever changed
the music industry and the first representation of Apple’s future outside its traditional
computing product line. You are familiar with the success of that future-driven busi-
ness model.
Three IT directions for the late 2010s are outlined next. Throughout all the
chapters in this book, you will learn how these and other digital technology are
transforming business and society.
Figure 1.21 Wayne Gretzky’s strategy for success in hockey was to skate to
where the puck was going to be. Steve Jobs followed a similar forward-looking
strategy. In October, 2003, Jobs announced a Windows version of the iTunes
store, saying “Hell froze over,” which brought a big laugh from the audience in
San Francisco.
MORE MOBILE
BUSINESS APPS, FEWER
DOCS ON DESKTOPS
The direction is away from the traditional desktop and documents era and toward
business apps in the cloud. Why? Google Apps offers apps that provide work-
ers with information and answers with low effort—instead of having to complete
tedious actions, such as logging in or doing extensive searches. This ongoing move
to mobile raises data security issues. Data stored on mobiles are at higher risk, in
part because the devices can be stolen or lost.
MORE SOCIALLY
ENGAGED—BUT
SUBJECT TO
REGULATION
Engaging customers via mobiles and social media sites—and those customers who
do not tolerate delays—is the norm. However, customers probably do not know of
restrictions on financial institutions and health–care providers that make it illegal
to respond to individuals publicly via social media. That is, for regulatory purposes,
financial institutions cannot post or respond to comments or e-mails through social
media sites because of privacy and security.
MORE NEAR-FIELD
COMMUNICATION
(NFC) TECHNOLOGY
Near-field communication (NFC) technology is an umbrella description covering
several technologies that communicate within a limited distance. Using radio fre-
quency identification (RFID) chip-based tags, as shown in Figure 1.22, devices relay
identifying data, such as product ID, price, and location, to a nearby reader that
captures the data. It is projected that the global market for NFC handsets will reach
1.6 billion units by 2018, according to a recent Global Industry Analysts research
report. According to the report, strong demand is “driven by growing penetration
of mobile phones, continued rise in demand and production of smartphones, rising
penetration of NFC in consumer devices, and chip level technology developments”
©
Z
U
M
A
W
ire
S
er
vi
ce
/A
la
m
y
Je
ff
V
in
ni
ck
/G
et
ty
Im
ag
es
c01DoingBusinessinDigitalTimes.indd Page 26 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
1.5 How Your IT Expertise Adds Value to Your Performance and Career 27
(NFC World, 2014). Innovative ways in which businesses are applying NFC include
the following:
• Amsterdam’s Schiphol Airport has installed an NFC boarding gate allowing pas-
sengers to validate their boarding pass with a touch of their NFC smartphone.
• French leather goods brand Delage has partnered with NFC object identi-
fication specialist Selinko to integrate NFC tags into its range of premium
leather bags. Each bag will have a unique chip and a unique digital serial
number. Consumers with an NFC smartphone equipped with Selinko’s free
mobile app will be able to use the tag to access information about their
product and confirm its authenticity as well as access marketing offers.
• iPhone owners in the United States can make Isis payments following
AT&T’s introduction of a range of phone cases that add NFC functionality
to the devices. To use the Isis Mobile Wallet on an iPhone, the owner selects
the Isis-ready NFC case, slides the iPhone in, downloads the Isis Mobile
Wallet app from the App Store, and taps the iPhone at hundreds of thou-
sands of merchants nationwide for a quick way to pay.
These trends are forces that are changing competition, business models, how
workers and operations are managed, and the skills valuable to a career in business.
Figure 1.22 NFC technology relies on sensors or RFID chips. NFC is used
for tracking wine and liquor to manage the supply chain effi ciently. NFC
smartphones are being integrated into payment systems in supermarkets so
customers can pay for purchases without cash or credit cards.
Questions
1. What was the signifi cance of Apple’s introduction of the iPhones music
store?
2. What are three IT trends?
3. What are three business applications of NFC?
Every tech innovation triggers opportunities and threats to business models and
strategies. With rare exceptions, every business initiative depends on the mix of IT,
knowledge of its potential, the requirements for success, and, equally important, its
limitations. Staying current in emerging technologies affecting markets is essential to
the careers of knowledge workers, entrepreneurs, managers, and business leaders—
not just IT and chief information officers (CIOs).
1.5 How Your IT Expertise Adds Value to Your Performance
and Career
©
C
hr
is
P
ea
rs
al
l/
A
la
m
y
©
R
io
Pa
tu
ca
/A
la
m
y
c01DoingBusinessinDigitalTimes.indd Page 27 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
28 Chapter 1 Doing Business in Digital Times
WHAT COMPANIES
CAN DO DEPENDS
ON THEIR IT
What companies can do depends on what their information technology and data
management systems can do. For over a decade, powerful new digital approaches
to doing business—and getting through your day—have emerged. And there is
sufficient proof to expect even more rapid and dramatic changes due to IT break-
throughs and advances. Understanding trends that affect the ways business is done
and getting in front of those trends give you a career edge.
Key strategic and tactical questions that determine an organization’s profitabil-
ity and management performance are shown in Figure 1.23. Answers to each ques-
tion will entail understanding the capabilities of mundane to complex ITs, which
ones to implement, and how to manage them.
IT CAREERS OUTLOOK Having a feel for the job market helps you improve your career options. According
to the U.S. Department of Labor, and the University of California Los Angeles
(UCLA), the best national jobs in terms of growth, advancement, and salary
increases in 2013 are in the fields of IT, engineering, health care, finance, construc-
tion, and management. It is projected that these job categories will see above-
average national growth over the next several years. The U.S. Department of Labor
projections are generally 6–10 years in reference.
With big data, data science, and M2M, companies are increasing their IT staff.
In addition, many new businesses are seeking more programmers and designers.
Data security threats continue to get worse. The field of IT covers a wide range that
includes processing of streaming data, data management, big data analytics, app
development, system analysis, information security, and more.
Job growth is estimated at 53 percent by 2018, according to the U.S. Department
of Labor; and salaries in many IT jobs will increase by 4 to 6 percent. The lack of
skilled IT workers in the U.S. is a primary reason for the outsourcing of IT jobs.
Digital Technology Defines and Creates
Businesses and Markets
Digital technology creates markets, businesses, products, and careers. As you con-
tinue to read this book, you will see that exciting IT developments are changing how
organizations and individuals do things. New technologies and IT-supported func-
tions, such as 4G or 5G networks, embedded sensors, on-demand workforces, and
e-readers, point to ground-breaking changes. CNN.com, one of the most respected
Figure 1.23 Key strategic
and tactical questions.
Business
processes,
producers,
and technology
Strategic direction;
industry, markets,
and customers
Business model
• What do we do?
• What is our direction?
• What markets & customers should
we be targeting and how do we
prepare for them?
• How do we do it?
• How do we generate revenues &
profits to sustain ourselves and
build our brand?
• How well do we do it?
• How can we be more
efficient?
c01DoingBusinessinDigitalTimes.indd Page 28 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
Key Terms 29
news media, has created a new market whose impacts are yet to be realized. Visit
iReport.com where a pop-up reads, “iReport is the way people like you report the
news. The stories in this section are not edited, fact-checked or screened before
they post.”
IT as a Career: The Nature of IS and IT Work
IT managers play a vital role in the implementation and administration of digital
technology. They plan, coordinate, and direct research on the computer-related
activities of firms. In consultation with other managers, they help determine the
goals of an organization and then implement technology to meet those goals.
Chief technology officers (CTOs) evaluate the newest and most innovative
technologies and determine how they can be applied for competitive advantage.
CTOs develop technical standards, deploy technology, and supervise workers
who deal with the daily IT issues of the firm. When innovative and useful new
ITs are launched, the CTO determines implementation strategies, performs
cost-benefit or SWOT analysis, and reports those strategies to top management,
including the CIO.
IT project managers develop requirements, budgets, and schedules for their
firm’s information technology projects. They coordinate such projects from devel-
opment through implementation, working with their organization’s IT workers, as
well as clients, vendors, and consultants. These managers are increasingly involved
in projects that upgrade the information security of an organization.
IT Job Prospects
Workers with specialized technical knowledge and strong communications and
business skills, as well as those with an MBA with a concentration in an IT area, will
have the best prospects. Job openings will be the result of employment growth and
the need to replace workers who transfer to other occupations or leave the labor
force (Bureau of Labor Statistics, 2012–2013).
Questions
1. Why is IT a major enabler of business performance and success?
2. Explain why it is benefi cial to study IT today.
3. Why are IT job prospects strong?
Key Terms
agility
barriers to entry
big data
business model
business process
business process
management (BPM)
business process
reengineering (BPR)
business-to-business
(B2B)
chief technology offi cer
(CTO)
cloud computing
commodity
competitive advantage
competitive forces model
(fi ve-forces model)
critical success factor (CSF)
cross-functional business
process
customer experience (CX)
cycle time
dashboards
data analytics
data science
dashboard
deliverables
digital business model
formal process
inbound logistics
industry structure
informal process
Internet of Things (IoT)
IT consumerization
IT project manager
key performance
indicators (KPIs)
machine-to-machine
(M2M) technology
near-fi eld communication
(NFC) technology
objectives
operations
process
productivity
radio frequency
identifi cation (RFID)
real time system
responsiveness
services
social, mobile, and cloud
(SoMoClo)
standard operating
procedures (SOPs)
supply chain
support activities
SWOT analysis
unstructured data
wearable technology
c01DoingBusinessinDigitalTimes.indd Page 29 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
30 Chapter 1 Doing Business in Digital Times
Assuring Your Learning
1. Why are businesses experiencing a digital transfor-
mation?
2. More data are collected in a day now than existed in
the world 10 years ago. What factors have contrib-
uted to this volume of data?
3. Assume you had no smartphone, other mobile de-
vice, or mobile apps to use for 24 hours. How would
that mobile blackout disrupt your ability to function?
4. What were three highly disruptive digital technolo-
gies? Give an example of one disruption for each
technology.
5. Why are enterprises adopting cloud computing?
6. What is the value of M2M technology? Give two
examples.
7. Starbucks monitors tweets and other sources of big
data. How might the company increase revenue
from big data analytics?
8. Select three companies in different industries, such
as banking, retail store, supermarket, airlines, or
package delivery, that you do business with. What
digital technologies does each company use to
engage you, keep you informed, or create a unique
customer experience? How effective is each use of
digital technology to keeping you a loyal customer?
9. Describe two examples of the infl uence of SoMoClo
on the fi nancial industry.
10. What is a potential impact of the Internet of things
on the health-care industry?
11. How could wearable technology be used to create
a competitive edge in the athletic and sportswear
industry?
12. Why does reducing the cycle time of a business
process also help to reduce errors?
13. Research fi rm Gartner defi nes competitive advantage
as a difference between a company and its competi-
tors that matters to customers. Describe one use of
M2M technology that could provide a manufacturer
with a competitive advantage.
14. What IT careers are forecasted to be in high de-
mand? Explain why.
15. Why or how would understanding the latest IT
trends infl uence your career?
DISCUSS: Critical Thinking Questions
16. Research the growing importance of big data ana-
lytics. Find two forecasts of big data growth. What
do they forecast?
17. Go to the U.S. Department of Commerce website
and search for U.S. Economy at a Glance: Perspec-
tive from the BEA Accounts.
a. Review the BEA homepage to learn the types of
information, news, reports, and interactive data
available. Search for the page that identifi es who
uses BEA measures. Identify two users of indus-
try data and two users of international trade and
investment data.
b. Click on the Glossary. Use the Glossary to
explain GDP in your own words.
c. Under the NEWS menu, select U.S. Economy at
a Glance. Review the GDP current numbers for
the last two reported quarters. How did GDP
change in each of these two quarters?
EXPLORE: Online and Interactive Exercises
18. A transportation company is considering investing
in a truck tire with embedded sensors—the Internet
of Things. Outline the benefi ts of this investment.
Would this investment create a long-term competi-
tive advantage for the transportation company?
19. Visit the website of UPS (ups.com), Federal Express
(fedex.com), and one other logistics and delivery
company.
a. At each site, what information is available to
customers before and after they send a package?
b. Compare the three customer experiences.
20. Visit YouTube.com and search for two videos on
Michael Porter’s strategic or competitive forces
models. For each video, report what you learned.
Specify the complete URL, video title, who uploaded
the video and the date, video length, and number of
views.
21. Visit Dell.com and Apple.com to simulate buying a
laptop computer. Compare and contrast the selection
process, degree of customization, and other buying
features. What are the barriers to entry into this mar-
ket, based on what you learned from this exercise?
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
c01DoingBusinessinDigitalTimes.indd Page 30 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
CASE 1.2 Business Case 31
CASE 1.2
Business Case: Restaurant Creates Opportunities to Engage Customers
Back when phones were used only to make calls, few
retailers and restaurants could have predicted that mo-
bile technology was going to transform their industries.
Smartphones and other portable devices are access points
to customers. Companies can push real time, personally
targeted ads to customers’ phones using text messages, or
interact with them using location-aware mobile apps. And
potential customers can access product or brand informa-
tion using 2D codes, and comparison-shop right in the
store.
Brands are always looking for more effective ways
to integrate social media with traditional media, such as
print and TV, when implementing marketing campaigns.
Managing these campaigns and interactions requires
specialized software, and possibly support from the
vendor or consulting firm if the company lacks in-house
expertise.
Pei Wei Asian Diner’s Mobile
and Cloud Campaign
Pei Wei Asian Diner (www.peiwei.com), a fast-food casual
restaurant chain owned by P.F. Chang’s China Bistro, is an
example of a company that invested in technology to
manage multichannel (also called cross-channel) marketing
campaigns. In mid-2011 Pei Wei introduced a new entrée,
Caramel Chicken. The company integrated traditional
in-store promotions with mobile and Web-based
marketing efforts to motivate people to subscribe to
its e-mail marketing campaign. It also reached out to
fans via Facebook and Twitter. The success of the new
campaign depended on investing in appropriate software
and expertise. With thousands of tweets, Facebook posts,
and Google searches per second, companies need IT
support to understand what people are saying about their
brands.
Campaign Management
Software Vendor
Software vendor ExactTarget was selected to run and
manage Pei Wei’s marketing campaigns. Famous brands—
like Expedia, Best Buy, Nike, and Papa John’s—also used
ExactTarget to power their mission-critical messages.
With ExactTarget’s software, Pei Wei invited guests to join
(register) its e-mail list via text, the Web, Twitter, or Face-
book in order to receive a buy-one, get-one free (BOGO)
coupon.
Using ExactTarget’s software and infrastructure, clients
such as Pei Wei can send more than thousands of e-mails per
second and millions of messages in 15 minutes. A massive
infrastructure and architecture are needed to meet the de-
mands of high-volume senders.
Another feature of ExactTarget is the ability to respond in
a real time environment. Companies need to be able to react
to the real time actions that their customers are taking across
all channels. That is why it is necessary to be able to quickly
and easily confi gure messages that are triggered by external
events like purchases or website interactions. Finally, software
helps companies immediately respond to customers with
burst sending capabilities—sending millions of e-mails in a
few minutes.
Why the Campaign Was a Success
Within two weeks, about 20,000 people had responded to
the offer by registering. The BOGO coupon redemption rate
at Pei Wei’s 173 locations was 20 percent. It was the restau-
rant chain’s most successful new e-mail list growth effort to
date.
Effective marketing requires companies or brands to cre-
ate opportunities with which to engage customers. Pei Wei
was successful because it used multiple interactive channels
to engage—connect with—current and potential custom-
ers. Brands have a tremendous opportunity to connect with
consumers on their mobiles in stores and on Twitter and
Facebook.
A 2010 ExactTarget study of more than 1,500 U.S.
consumers entitled The Collaborative Future found that:
• 27 percent of consumers said they are more likely to
purchase from a brand after subscribing to e-mail.
• 17 percent of consumers are more likely to purchase after
liking a brand on Facebook.
A study by Forrester Consulting found that 48 percent
of interactive marketing executives ranked understanding
customers’ cross-channel interactions as one of the top
challenges facing marketing today.
Questions
1. What software capabilities did Pei Wei need to launch its
marketing campaign?
2. What factors contributed to the success of Pei Wei’s
campaign?
3. Why is a high-capacity (massive) infrastructure needed to
launch e-mail or text campaigns?
4. Visit ExactTarget.com. Identify and describe how the
vendor makes it easy for companies to connect via e-mail
and Twitter.
5. What solutions for small businesses does ExactTarget
offer?
c01DoingBusinessinDigitalTimes.indd Page 31 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch01/text_s
32 Chapter 1 Doing Business in Digital Times
CASE 1.3
Video Case: What Is the Value of Knowing More and Doing More?
Teradata (Teradata.com) is a leading provider of big data
and data analytics solutions. In a video, Teradata explains
that when you know the right thing to do, you can do
more of what truly matters for your business and your
customers. View the video entitled “What Would You Do
If You Knew?”™ at http://www.teradata.com/Resources/
Videos/What-would-you-do-if-you-knew/
Questions
1. What did you learn from the video?
2. What is the value of knowing and doing more?
Accenture Technology Vision 2013.
Alesci, C. & S. Saitto. “AutoTrader.Com Said to Be in Talks
About Possible IPO of Buyer-Seller Site.” Bloomberg,
February 4, 2012.
Bureau of Labor Statistics. Occupational Outlook Handbook.
U.S. Department of Labor, 2012–2013.
Central Intelligence Agency (CIA). World Factbook.
Cooper, B. B. “10 Surprising Social Media Statistics That Will
Make You Rethink Your Social Strategy.” Fast Company,
November 18, 2013.
Davenport, T.H. & D.J. Patil. “Data Scientist: The Sexiest Job
of the 21st Century.” Harvard Business Review Magazine.
October 2012.
“Gartner Reveals Top Predictions for IT Organizations and
Users for 2013 and Beyond.” Gartner Newsroom. October 24,
2012.
glassdoor.com. “Data Analyst Salaries.” May 8, 2014.
Gnau, S. “Putting Big Data in Context.” Wired, September 10,
2013.
Joy, O. “What Does It Mean to Be a Digital Native?” CNN,
December 8, 2012.
Kelly, M. “Data Scientists Needed: Why This Career Is
Exploding Right Now.” VentureBeat.com, November 11, 2013.
Lockard, C.B. & M. Wolf. “Occupational Employment Projec-
tions to 2020.” Monthly Labor Review, January 2012.
McCain Foods. “McCain Foods: Integrating Data from the
Plant to the Boardroom to Increase the Bottom Line.”
Teradata.com, 2013.
NFC World. “News in Brief.” February 2014.
Pogue, D. “Embracing the Mothers of Invention.” The New
York Times, January 25, 2012.
Porter, M. E. The Competitive Advantage: Creating and Sustaining
Superior Performance. NY: Free Press. 1985.
Porter, M. E. “Strategy and the Internet.” Harvard Business
Review, March 2001.
Schmidt-Subramanian, M., H. Manning, J. Knott, & M. Murphy.
“The Business Impact of Customer Experience, 2013.” For-
rester Research, June 10, 2013.
Smith, Gavin. “Frozen Food Production in the US Industry
Market Research Report from IBISWorld Has Been Updated.”
PRWeb, March 27, 2013.
softwareag.com. “Orders Are in the Fast Lane at AutoTrader.
com—Thanks to BPM.” 2011.
Transparency Market Research. “Frozen Food Market—Global
Industry Analysis, Size, Share, Growth, Trends and Forecast,
2013–2019.” September 2013.
U.S. Department of Labor, Bureau of Labor Statistics. 2014.
Walsh, M. “Autotrader.com Tops In Local Online Ad Dollars.”
MediaPost.com, April 3, 2012.
References
c01DoingBusinessinDigitalTimes.indd Page 32 12/11/14 1:53 PM f-392 /208/WB01490/9781118897782/ch01/text_s
Chapter Snapshot
High performance is about outperforming rivals again
and again, even as the basis of competition in an indus-
try changes. Markets do not stand still and the basis of
competition is changing at a faster pace. By the time a
company’s financial performance starts tapering off, it
might be too late to start building new market-relevant
capabilities. To stay ahead, today’s leaders seek out new
ways to grow their businesses during rapid technology
changes, more empowered consumers and employees,
and more government intervention.
Effective ways to thrive over the long term are to
launch new business models and strategies or devise new
ways to outperform competitors. In turn, these perfor-
mance capabilities depend on a company’s enterprise IT
Data Governance and
IT Architecture Support
Long-Term Performance2
Chapter
1. Explain the business benefits of information management
and how data quality determines system success or failure.
2. Describe how enterprise architecture (EA) and data
governance play leading roles in guiding IT growth and
sustaining long-term performance.
3. Map the functions of various types of information
systems to the type of support needed by business
operations and decision makers.
4. Describe the functions of data centers, cloud computing,
and virtualization and their strengths, weaknesses, and
cost considerations.
5. Explain the range of cloud services, their benefits, and
business and legal risks that they create.
Learning Outcomes
33
Chapter Snapshot
Case 2.1 Opening Case: Detoxing Dirty Data
with Data Governance at Intel Security
2.1 Information Management
2.2 Enterprise Architecture and Data
Governance
2.3 Information Systems: The Basics
2.4 Data Centers, Cloud Computing, and
Virtualization
2.5 Cloud Services Add Agility
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 2.2 Business Case: Data Chaos Creates Risk
Case 2.3 Video Case: Cloud Computing:
Three Case Studies
References
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 33 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
architecture and data governance. The enterprise IT archi-
tecture, or simply the enterprise architecture (EA), guides
the evolution and expansion of information systems,
digital technology, and business processes. This guide is
needed in order to leverage IT capability for competitive
advantage and growth. Data governance, or information
governance, is the control of enterprise data through for-
mal policies and procedures. A goal of data governance
is to provide employees and business partners with high-
quality data they trust and can access on demand.
CASE 2.1 OPENING CASE
Detoxing Dirty Data with Data Governance at Intel Security
COMPANY OVERVIEW
CUSTOMER-CENTRIC
BUSINESS MODEL
Intel Security protects data and IT resources from attack and unauthorized access.
The company provides cybersecurity services to large enterprises, governments,
small- and medium-sized businesses, and consumers. A significant portion of its
revenues comes from postsales service, support, and subscriptions to its software
and managed services. The company sells directly and also through resellers to
corporations and consumers in the United States, Europe, Asia, and Latin America.
Intel Security management recognized that it needed to implement a best-practices
customer-centric business model. In the fiercely competitive industry, the ability
to connect with customers, anticipate their needs, and provide flawless customer
service is essential to loyalty and long-term growth. Why? Mostly because social
and mobile technology is forcing businesses to offer excellent customer experiences
(CX) across every available touchpoint, including chat, video, mobile apps, and
alerts (Figure 2.2). A touchpoint is “any influencing action initiated through com-
munication, human contact or physical or sensory interaction” (De Clerck, 2013).
Most customers search for and exchange detailed information about the good
and bad of their encounters with companies. (You will read about Yelp and the
34
Customer-centric business
models strive to create the
best solution or experience
for the customer. In contrast,
product-centric models are
internally focused on creating
the best product.
TABLE 2.1 Opening Case Overview
Company McAfee was renamed Intel Security in 2014. It is a sub-
sidiary of Intel Corp. headquartered in Santa Clara, CA.
Has more than $2 billion in revenues annually, over 7,600
employees, and over 1 million customers.
Industry Cybersecurity software, hardware, and services.
Product lines The company develops, markets, distributes, and supports
cybersecurity products that protect computers, networks,
and mobile devices. They offer managed security services
to protect endpoints, servers, networks, and mobile devices.
Consulting, training and support services are also provided.
Digital technology Data governance and master data management (MDM) in
order to build a best-in-class customer data management
capability to facilitate the company’s vision.
Business vision To become the fastest-growing dedicated security
company in the world.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 34 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
CASE 2.1 Opening Case 35
BUSINESS CHALLENGES
FROM POOR-QUALITY
CUSTOMER DATA
Intel Security is following a growth-driven business strategy. Its vision is to become
the fastest-growing dedicated security company in the world. Management rec-
ognized that accurate customer data are the foundation of top-notch customer
service. But, they faced a common business problem—poor-quality customer data.
Characteristics of poor-quality data, also known as dirty data, are listed in Table 2.2.
Duplicate customer records and incomplete customer data were harming
sales. The company could not effectively cross-sell (sell complementary products
or services) or up-sell (sell more expensive models or features). Opportunities to
get customers to renew their software licenses—and keep them loyal—were being
lost. Data errors degraded sales forecasts and caused order-processing mistakes.
Time was wasted trying to find, validate, and correct customer records and manu-
ally reconcile month-end sales and calculate sales commissions. Until the causes of
dirty data were identified and corrected, the growth strategy could not be achieved.
Dirty data are data of such
poor quality that they cannot
be trusted or relied upon for
decisions.
Figure 2.2 Providing
excellent service to
customers via their preferred
touchpoints, such as online
chat, has never been more
important as consumers use
social media to rate brands,
expose bad service, and vent
their frustrations.
Intel Security
(formerly McAfee, Inc.)
Data governance
Master data management (MDM)
Digital Technology
Delivers proactive cybersecurity
solutions and services for
information systems, networks,
and mobile devices around the
world.
Brand Aligned Data
Management with
Business Strategy
Implemented data governance to
build a best-in-class customer data
management capability in order to
achieve the company’s strategic
vision.
Figure 2.1 Intel Security overview.
United Breaks Guitar video in Chapter 7.) This transparency gives companies a
strong incentive to work harder to make customers happy before, during, and after
their purchases.
By creating a customer-centric business model, Intel Security can track what is
working for its customers and what is not. Using digital technology and data analytics
to understand customer touchpoints would enable the company to connect with
customers in meaningful ways. Committing to a better experience for customers can
increase revenue and promote loyalty—and achieve the company’s growth objective.
©
A
nd
re
i S
hu
m
sk
iy
/S
hu
tt
er
st
oc
k
©
fa
ys
al
/S
hu
tt
er
st
oc
k
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 35 07/11/14 4:15 PM f-392 /208/WB01490/9781118897782/ch02/text_s
36 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
TABLE 2.2 Characteristics of Poor-Quality or Dirty Data
Characteristic of Dirty Data Description
Incomplete Missing data.
Outdated or invalid Too old to be valid or useful.
Incorrect Too many errors.
Duplicated or in confl ict Too many copies or versions of the same
data—and the versions are inconsistent or in
confl ict with each other.
Nonstandardized Data are stored in incompatible formats—and
cannot be compared or summarized.
Unusable Data are not in context to be understood or
interpreted correctly at the time of access.
DATA QUALITY
SOLUTION: DATA
GOVERNANCE
Working with consulting company First San Francisco Partners, Intel Security
planned and implemented data governance and master data management (MDM).
Master data are the business-critical information on customers, products, accounts,
and other things that is needed for operations and business transactions. Master
data were stored in disparate systems spread across the enterprise. MDM would
link and synchronize all critical data from those disparate systems into one file,
called a master file, that provided a common point of reference. Data governance
and MDM manage the availability, usability, integrity, and security of the data used
throughout the enterprise. Intel Security’s data governance strategy and MDM
were designed after a thorough review of its 1.3 million customer records, sales
processes, and estimated future business requirements.
BENEFITS OF DATA
GOVERNANCE AND
MDM
Data governance and MDM have improved the quality of Intel Security’s customer
data, which were essential for its customer-centric business model. With high-quality
data, the company is able to identify up-sell and cross-sell sales opportunities. Best
practices for customer data management improved customer experiences that
translated into better customer retention and acquisition. The key benefits achieved
after implementing data governance and the MDM architecture to improve data
quality are:
• Better customer experience
• Greater customer loyalty and retention
• Increased sales growth
• Accurate sales forecasts and order processing
Intel Security has successfully aligned its IT capabilities to meet business needs. All
these efforts benefit the business by improving productivity as a result of reduced
data-cleansing efforts, and by increasing sales as a result of better customer experi-
ences.
Sources: Compiled from mcafee.com (2013), De Clerck, (2013), First San Francisco Partners (2009), and
Rich (2013).
Data governance is the
control of enterprise data
through formal policies and
procedures to help ensure
that data can be trusted and
are accessible.
Master data management
(MDM) methods synchronize
all business-critical data from
disparate systems into a
master file, which provides
a trusted data source.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 36 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.1 Information Management 37
Questions
1. What is the difference between customer-centric and product-centric
business models?
2. Explain the business challenges caused by Intel Security’s dirty data.
3. What is the function of data governance?
4. Describe the function of master data.
5. Why is it important to keep data synchronized across disparate systems?
6. Why did Intel Security need master data management (MDM)?
7. How did MDM and data governance enable the company to achieve its
vision?
8. What benefi ts did the company achieve as a result of implementing
data governance and MDM?
Most business initiatives succeed or fail based on the quality of their data. Effective
planning and decisions depend on systems being able to make data available to
decision makers in usable formats on a timely basis. Most everyone manages infor-
mation. You manage your social and cloud accounts across multiple mobile devices
and computers. You update or synchronize (“synch”) your calendars, appoint-
ments, contact lists, media files, documents, and reports. Your productivity depends
on the compatibility of devices and apps and their ability to share data. Not being
able to transfer and synch whenever you add a device or app is bothersome and
wastes your time. For example, when you switch to the latest mobile device, you
might need to reorganize content to make dealing with data and devices easier. To
simplify add-ons, upgrades, sharing, and access, you might leverage cloud services
such as iTunes, Instagram, Diigo, and Box.
This is just a glimpse of the information management situations that organiza-
tions face today—and why a continuous plan is needed to guide, control, and govern
IT growth. As with building construction (Figure 2.3), blueprints and models help
guide and govern future IT and digital technology investments.
2.1 Information Management
Information management is
the use of IT tools and
methods to collect, process,
consolidate, store, and
secure data from sources that
are often fragmented and
inconsistent.
INFORMATION
MANAGEMENT
HARNESSES SCATTERED
DATA
Business information is generally scattered throughout an enterprise, stored in
separate systems dedicated to specific purposes, such as operations, supply chain
management, or customer relationship management. Major organizations have over
100 data repositories (storage areas). In many companies, the integration of these
disparate systems is limited—as is users’ ability to access all the information they
Figure 2.3 Blueprints and
models, like those used for
building construction, are
needed to guide and govern
an enterprise’s IT assets. ©
M
ar
tin
B
ar
ra
ud
/A
la
m
y
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 37 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
38 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
need. Therefore, despite all the information flowing through companies, executives,
managers, and workers often struggle to find the information they need to make
sound decisions or do their jobs. The overall goal of information management is to
eliminate that struggle through the design and implementation of data governance
and a well-planned enterprise architecture.
Providing easy access to large volumes of information is just one of the chal-
lenges facing organizations. The days of simply managing structured data are over.
Now, organizations must manage semistructured and unstructured content from
social and mobile sources even though that data may be of questionable quality.
Information management is critical to data security and compliance with con-
tinually evolving regulatory requirements, such as the Sarbanes-Oxley Act, Basel III,
the Computer Fraud and Abuse Act (CFAA), the USA PATRIOT Act, and the
Health Insurance Portability and Accountability Act (HIPAA).
Issues of information access, management, and security must also deal with
information degradation and disorder—where people do not understand what data
mean or how they can be useful.
REASONS FOR
INFORMATION
DEFICIENCIES
Companies’ information and decision support technologies have developed over
many decades. During that time span, there have been different management teams
with their own priorities and understanding of the role of IT; technology advanced
in unforeseeable ways, and IT investments were cut or increased based on compet-
ing demands on the budget. These are some of the contributing factors. Other com-
mon reasons why information deficiencies are still a problem include:
1. Data silos. Information can be trapped in departments’ data silos (also called
information silos), such as marketing or production databases. Data silos are
illustrated in Figure 2.4. Since silos are unable to share or exchange data, they
cannot consistently be updated. When data are inconsistent across multiple
enterprise applications, data quality cannot (and should not) be trusted without
extensive verifi cation. Data silos exist when there is no overall IT architecture
to guide IS investments, data coordination, and communication. Data silos sup-
port a single function and, as a result, do not support an organization’s cross-
functional needs.
For example, most health-care organizations are drowning in data, yet they
cannot get reliable, actionable insights from these data. Physician notes, regis-
tration forms, discharge summaries, documents, and more are doubling every
five years. Unlike structured machine-ready data, these are messy data that take
Data silos are stand-alone
data stores. Their data are
not accessible by other ISs
that need it or outside that
department.
Information Requirements:
Understandable
Relevant
Timely
Accurate
Secure
Parts Replenish
Procuring
Design
Build
Ship
Sales
Fulfillment
Billing
Support
Customer data
Product data
Procurement data
Contract data
Data order
Parts inventory data
Engineering data
Logistics data
Data Types
Operations
silos
Sourcing
silos
Customer-facing
silos
Figure 2.4 Data (or
information) silos are ISs that
do not have the capability to
exchange data with other ISs,
making timely coordination
and communication across
functions or departments
diffi cult.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 38 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.1 Information Management 39
too much time and effort for health-care providers to include in their business
analysis. So, valuable messy data are routinely left out. Millions of patient notes
and records sit inaccessible or unavailable in separate clinical data silos because
historically there has been no easy way to analyze the information.
2. Lost or bypassed data. Data can get lost in transit from one IS to another. Or,
data might never get captured because of inadequately tuned data collection
systems, such as those that rely on sensors or scanners. Or, the data may not get
captured in suffi cient enough detail, as described in Tech Note 2.1.
3. Poorly designed interfaces. Despite all the talk about user-friendly interfaces,
some ISs are horrible to deal with. Poorly designed interfaces or formats that
require extra time and effort to fi gure out increase the risk of errors from misun-
derstanding the data or ignoring them.
4. Nonstandardized data formats. When users are presented with data in inconsis-
tent or nonstandardized formats, errors increase. Attempts to compare or ana-
lyze data are more diffi cult and take more time. For example, if the Northeast
division reports weekly gross sales revenues per product line and the South-
west division reports monthly net sales per product, you cannot compare their
performance without converting the data to a common format. Consider the
extra effort needed to compare temperature-related sales, such as air condition-
ers, when some temperatures are expressed in degrees Fahrenheit and others in
Centigrade.
5. Cannot hit moving targets. The information that decision makers want keeps
changing—and changes faster than ISs can respond to because of the fi rst four
reasons in this list. Tracking tweets, YouTube hits, and other unstructured con-
tent requires expensive investments—which managers fi nd risky in an economic
downturn.
Without information management, these are the data challenges managers
have to face. Companies undergoing fast growth or merger activity or those with
decentralized systems (each division or business unit manages its own IT) will end
up with a patchwork of reporting processes. As you would expect, patchwork sys-
tems are more complicated to modify, too rigid to support an agile business, and yet
more expensive to maintain.
TECH NOTE 2.1 Need to Measure in Order to Manage
A residential home construction company had two divisions: standard homes and
luxury homes. The company was not capturing material, labor, and other costs
associated with each type of construction. Instead, these costs were pooled, making
it impossible to allocate costs to each type of construction and then to calculate the
profi t margins of each division. They had no way of calculating profi t margins on
each type of home within the divisions. Without the ability to measure costs, they did
not have any cost control.
After upgrading their ISs, they began to capture detailed data at the house level.
They discovered a wide profi t margin on standard homes, which was hiding the nega-
tive margins (losses) of the luxury home division. Without cost control data, the prof-
itable standard homes division had been subsidizing the luxury home division for
many years.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 39 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
40 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
Executives at a large chemical corporation were supported
by an information system specifically designed for their
needs—called an executive information system (EIS). The
EIS was designed to provide senior managers with internal
and external data and key performance indicators (KPIs)
that were relevant to their specific needs. Tech Note 2.2
describes KPIs. As with any system, the value of the EIS
depends on the data quality.
Too Much Irrelevant Data
The EIS was a failure. Executives found that only half of
the data available through the EIS related to their level of
analysis and decision making—the corporate level. A worse
problem was that the data they needed were not available
when and how they wanted them. For example, executives
needed current detailed sales revenue and cost data for
every strategic business unit (SBU), product line, and operat-
ing business. Sales and cost data were needed for analysis
and to compare performance. But, data were not in stan-
dardized format as is needed for accurate comparisons and
analysis. A large part of the problem was that SBUs reported
sales revenues in different time frames (e.g., daily, weekly,
monthly, or quarterly), and many of those reports were not
available because of delays in preparing them. As a result,
senior management could not get a trusted view of the com-
pany’s current overall performance and did not know which
products were profitable.
There were two reasons for the failure of the EIS:
1. IT architecture was not designed for customized
reporting. The design of the IT architecture had been
based on financial accounting rules. That is, the data
were organized to make it easy to collect and consolidate
the data needed to prepare financial statements and
reports that had to be submitted to the SEC (Securities
and Exchange Commission) and other regulatory agen-
cies. These statements and reports have well-defined or
standardized formats and only need to be prepared at
specific times during the year, typically annually or quar-
terly. The organization of the data (for financial reporting)
did not have the flexibility needed for the customized ad
hoc (unplanned) data needs of the executives. For exam-
ple, it was nearly impossible to generate customized
sales performance (nonfinancial) reports or do ad hoc
analyses, such as comparing inventory turnover rates by
product for each region for each sales quarter. Because
of lags in reports from various SBUs, executives did not
trust the underlying data.
2. Complicated user interface. Executives could not easily
review the KPIs. Instead, they had to sort through screens
packed with too much data—some of interest and some
irrelevant. To compensate for poor interface design, sev-
eral IT analysts themselves had to do the data and KPI
analyses for the executives—delaying response time and
driving up the cost of reporting.
Solution: New Enterprise IT Architecture
with Standardized Data Formats
The CIO worked with a task force to design and implement
an entirely new EA. Data governance policies and proce-
dures were implemented to standardize data formats com-
panywide. Data governance eliminated data inconsistencies
to provide reliable KPI reports on inventory turns, cycle
times, and profit margins of all SBUs.
The new architecture was business-driven instead of
financial reporting-driven. It was easy to modify reports—
eliminating the costly and time-consuming ad hoc analyses.
Fewer IT resources are needed to maintain the system.
Because the underlying data are now relatively reliable, EIS
use by executives increased significantly.
Questions
1. Why was an EIS designed and implemented?
2. What problems did executives have with the EIS?
3. What were the two reasons for those EIS problems?
4. How did the CIO improve the EIS?
5. What are the benefits of the new IT architecture?
6. What are the benefits of data governance?
IT at Work 2 .1
Data Quality Determines Systems Success and Failure
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 40 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.1 Information Management 41
TECH NOTE 2.2 KPIs
KPIs are performance measurements. These measures demonstrate the effective-
ness of a business process at achieving organizational goals. KPIs present data in
easy-to-comprehend and comparison-ready formats. Examples of key comparisons
are actual vs. budget, actual vs. forecasted, and this year vs. prior years. KPIs help
reduce the complex nature of organizational performance to a small number of
understandable measures, including:
• Financial KPIs: current ratio; accounts payable turnover; inventory turn-
over; net profit margin
• Social media KPIs: social traffic and conversions (number of visitors who
are converted to customers); likes; new followers per week; social visits and
leads
• Sales and marketing KPIs: cost per lead; how much revenue a marketing
campaign generates
• Operational and supply chain KPIs: units per transaction; carrying cost of
inventory; order status; back order rate
• Environmental and carbon-footprint KPIs: energy, water, or other resource
use; spend by utility; weight of landfill waste
FACTORS DRIVING
THE SHIFT FROM SILOS
TO SHARING AND
COLLABORATION
BUSINESS BENEFITS
OF INFORMATION
MANAGEMENT
Senior executives and managers know about their data silos and information
management problems, but they also know about the huge cost and disruption
associated with converting to newer IT architectures. A Tech CEO Council Report
estimated that Fortune 500 companies waste $480 billion every year on inefficient
business processes (techceocouncil.org, 2010). However, business process improve-
ments are being made. An IBM study of more than 3,000 CIOs showed that more
than 80 percent plan to simplify internal processes, which includes integrated siloed
global applications (IBM Institute, 2011). Companies are struggling to integrate
thousands of siloed global applications, while aligning them to business operations.
To remain competitive, they must be able to analyze and adapt their business pro-
cesses quickly, efficiently and without disruption.
Greater investments in collaboration technologies have been reported by the
research firm Forrester (Keitt, 2011). The three factors that Forrester identified as
driving the trend toward collaboration and data sharing technology are shown in
Figure 2.5.
Based on the examples you have read, the obvious benefits of information manage-
ment are the following:
1. Improves decision quality. Decision quality depends on accurate and complete
data.
2. Improves the accuracy and reliability of management predictions. It is essential
for managers to be able to predict sales, product demand, opportunities, and
competitive threats. Management predictions focus on “what is going to happen”
as opposed to fi nancial reporting on “what has happened.”
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 41 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
42 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
3. Reduces the risk of noncompliance. Government regulations and compliance
requirements have increased signifi cantly in the past decade. Companies that
fail to comply with laws on privacy, fraud, anti-money laundering, cybersecurity,
occupational safety, and so on face harsh penalties.
4. Reduces the time and cost of locating and integrating relevant information.
Figure 2.5 Factors that
are increasing demand for
collaboration technology.
Questions
1. Explain information management.
2. Why do organizations still have information defi ciency problems?
3. What is a data silo?
4. Explain KPIs and give an example.
5. What three factors are driving collaboration and information sharing?
6. What are the business benefi ts of information management?
Every enterprise has a core set of information systems and business processes
that execute the transactions that keep it in business. Transactions include
processing orders, order fulfillment and delivery, purchasing inventory and sup-
plies, hiring and paying employees, and paying bills. The enterprise architecture
(EA) helps or impedes day-to-day operations and efforts to execute business
strategy.
Success of EA and data governance is measured in financial terms of prof-
itability and return on investment (ROI), and in the nonfinancial terms of
improved customer satisfaction, faster speed to market, and lower employee
turnover.
2.2 Enterprise Architecture and Data Governance
MAINTAINING IT–
BUSINESS ALIGNMENT
As you read in Chapter 1, the volume, variety, and velocity of data being collected
or generated have grown exponentially. As enterprise information systems become
more complex, the importance of long-range IT planning increases dramatically.
Companies cannot simply add storage, new apps, or data analytics on an as-needed
basis and expect those additions to work with the existing systems.
62% of the workforce works
outside an office at some
point. This number is
increasing.
Global, mobile
workforce
Growing number of cloud
collaboration services
Mobility-driven
consumerization
Growing need to connect
anybody, anytime, anywhere
on any device
Principle of “any”
Enterprise architecture (EA)
is the way IT systems and
processes are structured. EA
is an ongoing process of cre-
ating, maintaining, and lever-
aging IT. It helps to solve two
critical challenges: where an
organization is going and
how it will get there.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 42 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.2 Enterprise Architecture and Data Governance 43
The relationship between complexity and planning is easier to see in physical
things such as skyscrapers and transportation systems. If you are constructing a
simple cabin in a remote area, you do not need a detailed plan for expansion or
to make sure that the cabin fits into its environment. If you are building a simple,
single-user, nondistributed system, you would not need a well-thought-out growth
plan either. Therefore, it is no longer feasible to manage big data, content from
mobiles and social networks, and data in the cloud without the well-designed set of
plans, or blueprint, provided by EA. The EA guides and controls software add-ons
and upgrades, hardware, systems, networks, cloud services, and other digital tech-
nology investments.
ONGOING PROCESS
OF LEVERAGING IT
According to consulting firm Gartner, enterprise architecture is the ongoing process
of creating, maintaining, and leveraging IT. It helps to solve two critical challenges:
where an organization is going and how it will get there.
Shared Vision of the Future
EA has to start with the organization’s target–where it is going—not with where it is.
Gartner recommends that an organization begin by identifying the strategic direc-
tion in which it is heading and the business drivers to which it is responding. The
goal is to make sure that everyone understands and shares a single vision. As soon
as managers have defined this single shared vision of the future, they then consider
the implications of this vision on the business, technical, information, and solutions
architectures of the enterprise. The shared vision of the future will dictate changes
in all these architectures, assign priorities to those changes, and keep those changes
grounded in business value.
Strategic Focus
There are two problems that the EA is designed to address:
1. IT systems’ complexity. IT systems have become unmanageably complex and
expensive to maintain.
2. Poor business alignment. Organizations fi nd it diffi cult to keep their increasingly
expensive IT systems aligned with business needs.
Business and IT Benefits of EA
Having the right architecture in place is important for the following reasons:
• EA cuts IT costs and increases productivity by giving decision makers access
to information, insights, and ideas where and when they need them.
• EA determines an organization’s competitiveness, flexibility, and IT eco-
nomics for the next decade and beyond. That is, it provides a long-term view
of a company’s processes, systems, and technologies so that IT investments
do not simply fulfill immediate needs.
• EA helps align IT capabilities with business strategy—to grow, innovate,
and respond to market demands, supported by an IT practice that is 100
percent in accord with business objectives.
• EA can reduce the risk of buying or building systems and enterprise apps
that are incompatible or unnecessarily expensive to maintain and integrate.
Basic EA components are listed and described in Table 2.3. IT at Work 2.2 describes
Gartner’s view of EA.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 43 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
44 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
TABLE 2.3 Components of Enterprise Architecture
Business architecture The processes the business uses to meet its goals.
Application architecture How specifi c applications are designed and how they
interact with each other.
Data architecture How an enterprise’s data stores are organized and
accessed.
Technical architecture The hardware and software infrastructure that
supports applications and their interactions.
In order to keep IT and business in alignment, the EA must
be a dynamic plan. As shown in the model in Figure 2.6, the
EA evolves toward the target architecture, which represents
the company’s future IT needs. According to this model, EA
defines the following:
1. The organization’s mission, business functions, and future
direction
2. Information and information flows needed to perform the
mission
3. The current baseline architecture
4. The desired target architecture
5. The sequencing plan or strategy to progress from the
baseline to the target architecture.
IT at Work 2 .2
EA Is Dynamic
Figure 2.6 The importance of viewing EA as a
dynamic and evolving plan. The purpose of the EA is
to maintain IT–business alignment. Changes in priorities
and business are refl ected in the target architecture to
help keep IT aligned with them (GAO, 2010).
Baseline Transition Target
Im
p
le
m
en
ta
ti
o
n
S
ta
tu
s
Baseline architecture
Sequencing plan
Target architecture
Essential Skills of an Enterprise Architect
Enterprise architects need much more than technol-
ogy skills. The job performance and success of such
an architect—or anyone responsible for large-scale IT
projects—depend on a broad range of skills.
• Interpersonal or people skills. The job requires inter-
acting with people and getting their cooperation.
• Ability to influence and motivate. A large part of
the job is motivating users to comply with new pro-
cesses and practices.
• Negotiating skills. The project needs resources—
time, money, and personnel—that must be negoti-
ated to get things accomplished.
CAREER INSIGHT 2 . 1
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 44 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.2 Enterprise Architecture and Data Governance 45
• Critical-thinking and problem-solving skills. Architects
face complex and unique problems. Being able to
expedite solutions prevents bottlenecks.
• Business and industry expertise. Knowing the busi-
ness and industry improves the outcomes and the
architect’s credibility.
Managing EA implementations requires someone who
is able to handle multiple aspects of a project at one
time. Project management is covered in Chapter 13.
DATA GOVERNANCE:
MAINTAINING DATA
QUALITY AND COST
CONTROL
Data governance is the process of creating and agreeing to standards and require-
ments for the collection, identification, storage, and use of data. The success of
every data-driven strategy or marketing effort depends on data governance. Data
governance policies must address structured, semistructured, and unstructured data
(discussed in Section 2.3) to ensure that insights can be trusted.
Enterprisewide Data Governance
With an effective data governance program, managers can determine where their
data are coming from, who owns them, and who is responsible for what—in order
to know they can trust the available data when needed. Data governance is an
enterprise-wide project because data cross boundaries and are used by people
throughout the enterprise. New regulations and pressure to reduce costs have increased
the importance of effective data governance. Governance eliminates the cost of
maintaining and archiving bad, unneeded, or wrong data. These costs grow as the
volume of data grows. Governance also reduces the legal risks associated with
unmanaged or inconsistently managed information.
Three industries that depend on data governance to comply with regulations or
reporting requirements are the following:
• Food industry. In the food industry, data governance is required to comply
with food safety regulations. Food manufacturers and retailers have sophis-
ticated control systems in place so that if a contaminated food product, such
as spinach or peanut butter, is detected, they are able to trace the problem
back to a particular processing plant or even the farm at the start of the food
chain.
• Financial services industry. In the financial services sector, strict report-
ing requirements of the Dodd–Frank Wall Street Reform and Consumer
Protection Act of 2010 are leading to greater use of data governance. The
Dodd–Frank Act regulates Wall Street practices by enforcing transparency
and accountability in an effort to prevent another significant financial crisis
like the one that occurred in 2008.
• Health-care industry. Data are health care’s most valuable asset. Hospitals
have mountains of electronic patient information. New health-care account-
ability and reporting obligations require data governance models for trans-
parency to defend against fraud and to protect patients’ information.
As you read in the Intel Security opening case, data governance and MDM are
a powerful combination. As data sources and volumes continue to increase, so does
the need to manage data as a strategic asset in order to extract its full value. Making
business data consistent, trusted, and accessible across the enterprise is a critical
first step in customer-centric business models. With data governance, companies
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 45 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
46 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
are able to extract maximum value from their data, specifically by making better
use of opportunities that are buried within behavioral data. According to Adele
Pugliese, data governance director of Toronto-based Scotiabank, “If we are able
to leverage and understand the data, and achieve integrity and a level of accuracy
with that data, in terms of our touchpoints with the customers, we should be able to
change that customer experience and take it to the next level where we know a lot
more about our customers” (Hamilton, 2013).
Master Data and MDM
Master data describe key entities such as customers, products and services, vendors,
locations, and employees around which business is conducted. Master data are typi-
cally quite stable—and fundamentally different from the high volume, velocity, and
variety of big data and traditional data. For example, when a customer applies for
automobile insurance, data provided on the application become the master data
for that customer. In contrast, if the customer’s vehicle has a device that sends data
about his or her driving behavior to the insurer, those machine-generated data are
transactional or operational, but not master data.
Data are used in two ways—both depend on high-quality trustworthy data:
1. For running the business: Transactional or operational use
2. For improving the business: Analytic use
Strong data governance is needed to manage the availability, usability, integrity,
and security of the data used throughout the enterprise so that data are of sufficient
quality to meet business needs. The characteristics and consequences of weak or
nonexistent data governance are listed in Table 2.4.
MDM solutions can be complex and expensive. Given their complexity and
cost, most MDM solutions are out of reach for small and medium companies.
Vendors have addressed this challenge by offering cloud-managed MDM ser-
vices. For example, in 2013 Dell Software launched its next-generation Dell Boomi
MDM. Dell Boomi provides MDM, data management, and data quality services
(DQS)—and they are 100 percent cloud-based with near real time synchronization.
Politics: The People Conflict
In an organization, there may be a culture of distrust between the technology and
business employees. No enterprise architecture methodology or data governance
can bridge this divide unless there is a genuine commitment to change. That com-
mitment must come from the highest level of the organization—senior management.
Methodologies cannot solve people problems; they can only provide a framework in
which those problems can be solved.
TABLE 2.4 Characteristics and Consequences of Weak or Nonexistent
Data Governance
• Data duplication causes isolated data silos.
• Inconsistency exists in the meaning and level of detail of data elements.
• Users do not trust the data and waste time verifying the data rather than
analyzing them for appropriate decision making.
• Leads to inaccurate data analysis.
• Bad decisions are made on perception rather than reality, which can negatively
affect the company and its customers.
• Results in increased workloads and processing time.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 46 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.3 Information Systems: The Basics 47
Questions
1. Explain the relationship between complexity and planning. Give an
example.
2. Explain enterprise architecture.
3. What are the four components of EA?
4. What are the business benefi ts of EA?
5. How can EA maintain alignment between IT and business strategy?
6. What are the two ways that data are used in an organization?
7. What is the function of data governance?
8. Why has interest in data governance and MDM increased?
9. What role does personal confl ict or politics play in the success of data
governance?
Information systems (ISs) are built to achieve specific goals, such as processing cus-
tomer orders and payroll. In general, ISs process data into meaningful information
and knowledge.
2.3 Information Systems: The Basics
DATA, INFORMATION,
AND KNOWLEDGE
Data, or raw data, describe products, customers, events, activities, and transactions
that are recorded, classified, and stored. Data are the raw material from which
information is produced; the quality, reliability, and integrity of the data must be
maintained for the information to be useful. Examples are the number of hours an
employee worked in a certain week or the number of new Toyota vehicles sold in
the first quarter of 2015.
A database is a repository or data store that is organized for efficient access,
search, retrieval, and update.
Information is data that have been processed, organized, or put into context
so that they have meaning and value to the person receiving them. For example,
the quarterly sales of new Toyota vehicles from 2010 through 2014 is information
because it would give some insight into how the vehicle recalls during 2009 and 2010
impacted sales. Information is an organization’s most important asset, second only
to people.
Knowledge consists of data and/or information that have been processed,
organized, and put into context to be meaningful, and to convey understanding,
experience, accumulated learning, and expertise as they apply to a current problem
or activity. Knowing how to manage a vehicle recall to minimize negative impacts
on new vehicle sales is an example of knowledge. Figure 2.7 shows the differences
in data, information, and knowledge.
ISs collect or input and process data, distribute reports or other outputs that
support decision making and business processes. Figure 2.8 shows the input-
processing-output (IPO) model.
Figure 2.9 shows how major types of ISs relate to one another and how data
flow among them. In this example,
1. Data from online purchases are captured and processed by the TPS, or transac-
tion processing system and then stored in the transactional database.
2. Data needed for reporting purposes are extracted from the database and used
by the MIS (management information system) to create periodic, ad hoc, or
other types of reports.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 47 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
48 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
Figure 2.7 Examples of data,
information, and knowledge.
Figure 2.8 Input-processing-
output model.
Figure 2.9 Flow of data
from the point of sale (POS)
through processing, storage,
reporting, decision support,
and analysis. Also shows
the relationships among
information systems.
Q1-
2008 2008
Q2-
2008
Q3-
2008
Q4-
2009
Q1-
2009
Q2-
2009
Q3-
2009
Q4-
2010
Q1-
2010
Q2-
2010
Q3-
2010
Q4-
Number of new vehicles sold in the
1st quarter of 2010 (Q1-2010)
Information
Data
Managing a vehicle recall in a way that minimizes
negative impacts on new vehicle sales and net income
Knowledge
Storage
Temporary memory (RAM), hard disks, flash memory, cloud
People
Users, clients, customers, operators, technicians, governments, companies
Sending
results,
collecting
data,
feedback
Communication
Working with
information,
changing,
calculating,
manipulating
Processing
Data collected,
captured,
scanned,
snapped from
transactions
Input
Showing
results on
screen,
hardcopy, digital
copy, archive
Output
Data
Data Data
Data are extracted,
transformed, &
loaded (ETL)
Data from online
purchases
of transactional
data
Database
Reporting
MIS
Models applied to
data for analysis
DSS
Processes raw
data
TPS
Analytical processing
of data to discover
trends and learn
insights
Data Warehouse
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 48 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.3 Information Systems: The Basics 49
TRANSACTION
PROCESSING SYSTEMS
Transaction processing systems (TPSs) are designed to process specific types of
data input from ongoing transactions. TPSs can be manual, as when data are typed
into a form on a screen, or automated by using scanners or sensors to capture bar-
codes or other data (Figure 2.10).
Organizational data are processed by a TPS—sales orders, payroll, accounting,
financial, marketing, purchasing, inventory control, and so forth. Transactions are
either:
• Internal transactions that originate within the organization or that occur
within the organization. Examples are payroll, purchases, budget trans-
fers, and payments (in accounting terms, they are referred to as accounts
payable).
• External transactions that originate from outside the organization, for
example, from customers, suppliers, regulators, distributors, and financing
institutions.
TPSs are essential systems. Transactions that are not captured can result in lost
sales, dissatisfied customers, and many other types of data errors with finan-
cial impacts. For example, if the accounting department issued a check to pay
an invoice (bill) and it was cashed by the recipient, but information about that
transaction was not captured, then two things happen. First, the amount of cash
listed on the company’s financial statements is wrong because no deduction was
made for the amount of the check. Second, the accounts payable (A/P) system
3. Data are output to a decision-support system (DSS) where they are analyzed
using formulas, fi nancial ratios, or models.
Data collected by the TPS are converted into reports by the MIS and analyzed by
the DSS to support decision making. Corporations, government agencies, the mili-
tary, health care, medical research, major league sports, and nonprofits depend on
their DSSs at all levels of the organization. Innovative DSSs create and help sustain
competitive advantages. DSSs reduce waste in production operations, improve
inventory management, support investment decisions, and predict demand. The
model of a DSS consists of a set of formulas and functions, such as statistical, finan-
cial, optimization, and/or simulation models.
Customer data, sales, and other critical data are selected for additional analy-
sis, such as trend analysis or forecasting demand. These data are extracted from
the database, transformed into a standard format, and then loaded into a data
warehouse.
Figure 2.10 Scanners
automate the input of data
into a transaction processing
system (TPS). ©
Ja
n_
N
ev
ill
e/
iS
to
ck
p
ho
to
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 49 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
50 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
will continue to show the invoice as unpaid, so the accounting department might
pay it a second time. Likewise, if services are provided, but the transactions are
not recorded, the company will not bill for them and thus not collect that service
revenue.
Batch vs. Online Real Time Processing
Data captured by a TPS are processed and stored in a database; they then become
available for use by other systems. Processing of transactions is done in one of two
modes:
1. Batch processing: A TPS in batch processing mode collects all transaction for
a day, shift, or other time period, and then processes the data and updates the
data stores. Payroll processing done weekly or bi-weekly is an example of batch
mode.
2. Online transaction processing (OLTP) or real time processing: The TPS pro-
cesses each transaction as it occurs, which is what is meant by the term real time
processing. In order for OLTP to occur, the input device or website must be
directly linked via a network to the TPS. Airlines need to process fl ight reserva-
tions in real time to verify that seats are available.
Batch processing costs less than real time processing. A disadvantage is that data
are inaccurate because they are not updated immediately, in real time.
Processing Impacts Data Quality
As data are collected or captured, they are validated to detect and correct obvi-
ous errors and omissions. For example, when a customer sets up an account with a
financial services firm or retailer, the TPS validates that the address, city, and postal
code provided are consistent with one another and also that they match the credit
card holder’s address, city, and postal code. If the form is not complete or errors
are detected, the customer is required to make the corrections before the data are
processed any further.
Data errors detected later may be time-consuming to correct or cause other
problems. You can better understand the difficulty of detecting and correcting
errors by considering identity theft. Victims of identity theft face enormous chal-
lenges and frustration trying to correct data about them.
MANAGEMENT
INFORMATION
SYSTEMS
Functional areas or departments—accounting, finance, production/operations,
marketing and sales, human resources, and engineering and design—are supported
by ISs designed for their particular reporting needs. General-purpose reporting
systems are referred to as management information systems (MISs). Their objective
is to provide reports to managers for tracking operations, monitoring, and control.
Typically, a functional system provides reports about such topics as operational
efficiency, effectiveness, and productivity by extracting information from databases
and processing it according to the needs of the user. Types of reports include the
following:
• Periodic: These reports are created or run according to a pre-set schedule.
Examples are daily, weekly, and quarterly. Reports are easily distributed via
e-mail, blogs, internal websites (called intranets), or other electronic media.
Periodic reports are also easily ignored if workers do nott find them worth
the time to review.
• Exception: Exception reports are generated only when something is outside
the norm, either higher or lower than expected. Sales in hardware stores
prior to a hurricane may be much higher than the norm. Or sales of fresh
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 50 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.3 Information Systems: The Basics 51
produce may drop during a food contamination crisis. Exception reports are
more likely to be read because workers know that some unusual event or
deviation has occurred.
• Ad hoc, or on demand: Ad hoc reports are unplanned reports. They are gen-
erated to a mobile device or computer on demand as needed. They are gener-
ated on request to learn more about a situation, problem, or opportunity.
Reports typically include interactive data visualizations, such as column and pie
charts, as shown in Figure 2.11.
Functional information systems that support business analysts and other
departmental employees can be fairly complex, depending on the type of employ-
ees supported. The following examples show the support that IT provides to major
functional areas.
1. Bolsa de Comercio de Santiago, a large stock exchange in Chile, processes
high-volume trading in microseconds using IBM software. The stock exchange
increased its transaction capacity by 900 percent by 2011. The Chilean stock
exchange system can do the detective work of analyzing current and past
transactions and market information, learning and adapting to market trends
and connecting its traders to business information in real time. Immediate
throughput in combination with analytics allows traders to make more accu-
rate decisions.
2. According to the New England Journal of Medicine, 1 in 5 patients suffers from
preventable readmissions, which cost taxpayers over $17 billion a year. Begin-
ning in 2012, hospitals have been penalized for high readmission rates with cuts
to the payments they receive from the government (Miliard, 2011). Using a DSS
and predictive analytics, the health-care industry can leverage unstructured in-
formation in ways not possible before, according to Charles J. Barnett, president/
CEO of Seton Health Care. “With this solution, we can access an integrated view
of relevant clinical and operational information to drive more informed decision
making. For example, by predicting which patients might be readmitted, we can
reduce costly and preventable readmissions, decrease mortality rates, and ulti-
mately improve the quality of life for our patients” (Miliard, 2011).
DECISION SUPPORT
SYSTEMS
Decision support systems (DSSs) are interactive applications that support decision
making. Configurations of a DSS range from relatively simple applications that
support a single user to complex enterprisewide systems. A DSS can support the
analysis and solution of a specific problem, evaluate a strategic opportunity, or sup-
port ongoing operations. These systems support unstructured and semistructured
decisions, such as make-or-buy-or-outsource decisions, or what products to develop
and introduce into existing markets.
Figure 2.11 Sample report
produced by an MIS. ©
D
am
ir
K
ar
an
/iS
to
ck
p
ho
to
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 51 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
52 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
Degree of Structure of Decisions
Decisions range from structured to unstructured. Structured decisions are those
that have a well-defined method for solving and the data necessary to reach a sound
decision. An example of a structured decision is determining whether an applicant
qualifies for an auto loan, or whether to extend credit to a new customer—and the
terms of those financing options. Structured decisions are relatively straightforward
and made on a regular basis, and an IS can ensure that they are done consistently.
At the other end of the continuum are unstructured decisions that depend on
human intelligence, knowledge, and/or experience—as well as data and models to
solve. Examples include deciding which new products to develop or which new mar-
kets to enter. Semistructured decisions fall in the middle of the continuum. DSSs
are best suited to support these types of decisions, but they are also used to support
unstructured ones. To provide such support, DSSs have certain characteristics to
support the decision maker and the overall decision-making process.
Three Defining DSS Characteristics
These characteristics of DSSs include:
1. An easy-to-use interactive interface
2. Models or formulas that enable sensitivity analysis, what-if analysis, goal seek-
ing, and risk analysis
3. Data from multiple sources—internal and external sources plus data added by
the decision maker who may have insights relevant to the decision situation
Having models is what distinguishes DSS from MIS. Some models are devel-
oped by end users through an interactive and iterative process. Decision makers can
manipulate models to conduct experiments and sensitivity analyses, for example,
what-if and goal seeking. What-if analysis refers to changing assumptions or data in
the model to observe the impacts of those changes on the outcome. For example, if
sale forecasts are based on a 5 percent increase in customer demand, a what-if anal-
ysis would replace the 5 percent with higher and/or lower estimates to determine
what would happen to sales if demand changed. With goal seeking, the decision
maker has a specific outcome in mind and needs to figure out how that outcome
could be achieved and whether it is feasible to achieve that desired outcome. A DSS
can also estimate the risk of alternative strategies or actions.
California Pizza Kitchen (CPK) uses a DSS to support inventory decisions.
CPK has 77 restaurants located in various states in the United States. Maintaining
optimal inventory levels at all restaurants was challenging and time-consuming. A
DSS was built to make it easy for the chain’s managers to maintain updated records
and make decisions. Many CPK restaurants increased sales by 5 percent after
implementing a DSS.
Building DSS Applications
Planners Lab is an example of software for building DSSs. The software is free to
academic institutions and can be downloaded from plannerslab.com. Planners Lab
includes:
• An easy-to-use model-building language
• An easy-to-use option for visualizing model output, such as answers to what-if
and goal-seeking questions, to analyze the impacts of different assumptions
These tools enable managers and analysts to build, review, and challenge the
assumptions upon which their decision scenarios are based. With Planners Lab,
decision makers can experiment and play with assumptions to assess multiple views
of the future.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 52 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.4 Data Centers, Cloud Computing, and Virtualization 53
DATABASE VOLATILITY
AND DATA
WAREHOUSING
Given the huge number of transactions, the data in databases are constantly in use
or being updated. This characteristic of databases—referred to as volatility—makes
it impossible to use them for complex decision-making and problem-solving tasks.
For this reason, data are extracted from the database transformed (processed to
standardize the data), and then loaded into a data warehouse. As a result of the
extract, transformation, and load (ETL), operations data in the data warehouse are
better formatted for analyses.
ISS EXIST WITHIN
A CULTURE
ISs do not exist in isolation. They have a purpose and a social (organizational)
context. A common purpose is to provide a solution to a business problem. The
social context of the system consists of the values and beliefs that determine what
is admissible and possible within the culture of the organization and among the
people involved. For example, a company may believe that superb customer service
and on-time delivery are critical success factors. This belief system influences IT
investments, among other factors.
The business value of IT is determined by the people who use them, the busi-
ness processes they support, and the culture of the organization. That is, IS value
is determined by the relationships among ISs, people, and business processes—all
of which are influenced strongly by organizational culture, as shown in Figure 2.12.
Figure 2.12 Organizational
culture plays a signifi cant
role in the use and benefi ts
of Information systems.
Questions
1. Contrast data, information, and knowledge.
2. Defi ne TPS and give an example.
3. When is batch processing used?
4. When are real time processing capabilities needed?
5. Explain why TPSs need to process incoming data before they are
stored.
6. Defi ne MIS and DSS and give an example of each.
7. Why are databases inappropriate for doing data analysis?
On-premises data centers, virtualization, and cloud computing are types of IT
infrastructures or computing systems. Long ago, there were few IT infrastructure
options. Mostly, companies owned their servers, storage, and network com-
ponents to support their business applications and these computing resources
were on their premises. Now, there are several choices for an IT infrastructure
2.4 Data Centers, Cloud Computing, and Virtualization
Organizational Culture
Information
Systems:
hardware, software,
networks, and data
Business
Processes
People
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 53 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
54 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
strategy—including virtualization and cloud computing. As is common to IT
investments, each infrastructure configuration has strengths, weaknesses, and cost
considerations.
DATA CENTERS A data center consists of a large number of network servers (Figure 2.13) used for the
storage, processing, management, distribution, and archiving of data, systems, Web
traffic, services, and enterprise applications. Data center also refers to the building or
facility that houses the servers and equipment. Here are some examples of data centers:
• National Climatic Data Center. The National Climatic Data Center is an
example of a public data center that stores and manages the world’s largest
archive of weather data.
• U.S. National Security Agency. The National Security Agency’s (NSA) data
center in Bluffdale, UT, shown in Figure 2.14, opened in the fall of 2013. It
is the largest spy data center for the NSA. People who think their corre-
spondence and postings through sites like Google, Facebook, and Apple are
safe from prying eyes should rethink that belief. You will read more about
reports exposing government data collection programs in Chapter 5.
• Apple. Apple has a 500,000-square-foot data center in Maiden, NC, that
houses servers for various iCloud and iTunes services. The center plays
a vital role in the company’s back-end IT infrastructure. In 2014 Apple
expanded this center with a new, smaller 14,250 square-foot tactical data
center that also includes office space, meeting areas, and breakrooms.
Companies may own and manage their own on-premises data centers or pay
for the use of their vendors’ data centers, such as in cloud computing, virtualization,
and software, as service arrangements (Figure 2.15).
Figure 2.13 A row of
network servers in data
center.
Figure 2.14 The NSA
data center (shown under
construction) opened in the
fall of 2013 in Bluffdale, UT. It
is the largest spy data center
for the NSA. People who
believe their correspondence
and postings through sites
like Google, Facebook, and
Apple are safe from prying
eyes should think again.
©
O
le
ks
iy
M
ar
k/
Sh
ut
te
rs
to
ck
©
e
p
a
eu
ro
p
ea
n
p
re
ss
p
ho
to
ag
en
cy
b
.v
./
A
la
m
y
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 54 11/7/14 7:46 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.4 Data Centers, Cloud Computing, and Virtualization 55
Since only the company owns the infrastructure, a data center is more suitable
for organizations that run many different types of applications and have complex
workloads. A data center, like a factory, has limited capacity. Once it is built, the
amount of storage and the workload the center can handle does not change without
purchasing and installing more equipment.
When a Data Center Goes Down, so Does Business
Data center failures disrupt all operations regardless of who owns the data center.
Here are two examples.
• Uber. The startup company Uber experienced an hour-long outage in
February 2014 that brought its car-hailing service to a halt across the coun-
try. The problem was caused by an outage at its vendor’s West Coast data
center. Uber users flooded social media sites with complaints about prob-
lems kicking off Uber’s app to summon a driver-for-hire.
• WhatsApp. WhatsApp also experienced a server outage in early 2014 that took
the service offline for 2.5 hours. WhatsApp is a smartphone text-messaging
service that had been bought by Facebook for $19 billion. “Sorry we currently
experiencing server issues. We hope to be back up and recovered shortly,”
WhatsApp said in a message on Twitter that was retweeted more than 25,000
times in just a few hours. The company has grown rapidly to 450 million active
users within five years, nearly twice as many as Twitter. More than two-thirds of
these global users use the app daily. WhatsApp’s’ server failure drove millions
of users to a competitor. Line, a messaging app developed in Japan, added 2
million new registered users within 24 hours of WhatsApp’s outage—the big-
gest increase in Line’s user base within a 24-hour period.
These outages point to the risks of maintaining the complex and sophisticated
technology needed to power digital services used by millions or hundreds of mil-
lions of people.
Figure 2.15 Data centers
are the infrastructure
underlying cloud computing,
virtualization, networking,
security, delivery systems,
and software as a service.
Many of these issues are
discussed in this chapter. ©
M
ic
ha
el
D
B
ro
w
n/
Sh
ut
te
rs
to
ck
INTEGRATING DATA TO
COMBAT DATA CHAOS
An enterprise’s data are stored in many different or remote locations—creating
data chaos at times. And some data may be duplicated so that they are available
in multiple locations that need a quick response. Therefore, the data needed for
planning, decision making, operations, queries, and reporting are scattered or dupli-
cated across numerous servers, data centers, devices, and cloud services. Disparate
data must be unified or integrated in order for the organization to function.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 55 11/7/14 7:46 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
56 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
Unified Data Center
One solution is Cisco’s Unified Data Center (UDC). UDC can significantly speed
up the integration and consolidation of data and cut data center costs. UDC inte-
grates compute, storage, networking, virtualization, and management into a single
or unified platform. That platform provides an infrastructure that simplifies data
management and improves business agility or responsiveness. UDC can run appli-
cations more quickly in virtual and cloud computing environments.
Data Virtualization
Cisco provides data virtualization, which gives greater IT flexibility. Using virtual-
ization methods, enterprises can respond to change more quickly and make better
decisions in real time without physically moving their data, which significantly cuts
costs. Cisco Data Virtualization makes it possible to:
• Have instant access to data at any time and in any format.
• Respond faster to changing data analytics needs.
• Cut complexity and costs.
Compared to traditional (nonvirtual) data integration and replication methods,
Cisco Data Virtualization accelerates time to value with:
• Greater agility: speeds 5 to 10 times faster than traditional data integration
methods
• Streamlined approach: 50 to 75 percent time savings over data replication
and consolidation methods
• Better insight: instant access to data
Cisco offers videos on cloud computing, virtualization, and other IT infrastruc-
tures at its video portal at video.cisco.com.
CLOUD COMPUTING
INCREASES AGILITY
In a business world where first movers gain the advantage, IT responsiveness and
agility provide a competitive edge. Yet, many IT infrastructures are extremely
expensive to manage and too complex to easily adapt. A common solution is cloud
computing. Cloud computing is the general term for infrastructures that use the
Internet and private networks to access, share, and deliver computing resources.
The National Institute of Standards and Technology (NIST) more precisely defines
cloud computing as “a model for enabling convenient, on-demand network access to
a shared pool of configuration computing resources that can be rapidly provisioned
and released with minimal management effort or service provider interaction”
(NIST, 2012).
SELECTING A CLOUD
VENDOR
Because cloud is still a relatively new and evolving business model, the decision to
select a cloud service provider should be approached with even greater diligence
than other IT decisions. As cloud computing becomes an increasingly important
part of the IT delivery model, assessing and selecting the right cloud provider also
become the most strategic decisions that business leaders undertake. Providers are
not created equally, so it is important to investigate each provider’s offerings prior to
subscribing. When selecting and investing in cloud services, there are several service
factors a vendor needs to address. These evaluation factors are listed in Table 2.5.
Vendor Management and Service-Level Agreements
The move to the cloud is also a move to vendor-managed services and cloud service-
level agreements (SLAs). An SLA is a negotiated agreement between a company
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 56 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.4 Data Centers, Cloud Computing, and Virtualization 57
and service provider that can be a legally binding contract or an informal contract.
You can review an example of the Google Apps SLA by visiting its website at
Google.com and searching for “SLA.” Staff experienced in managing outsourcing
projects may have the necessary expertise for managing work in the cloud and polic-
ing SLAs with vendors. The goal is not building the best SLA terms, but getting the
terms that are most meaningful to the business.
The Cloud Standards Customer Council published the Practical Guide to
Cloud Service Level Agreements (2012), which brings together numerous customer
experiences into a single guide for IT and business leaders who are considering
cloud adoption. According to this guide, an SLA serves:
as a means of formally documenting the service(s), performance expectations,
responsibilities and limits between cloud service providers and their users. A
typical SLA describes levels of service using various attributes such as: availability,
TABLE 2.5 Service Factors to Consider when Evaluating Cloud Vendors
or Service Providers
Factors Examples of Questions to Be Addressed
Delays What are the estimated server delays and network
delays?
Workloads What is the volume of data and processing that can be
handled during a specifi c amount of time?
Costs What are the costs associated with workloads across
multiple cloud computing platforms?
Security How are data and networks secured against attacks?
Are data encrypted and how strong is the encryption?
What are network security practices?
Disaster recovery How is service outage defi ned? What level of
and business redundancy is in place to minimize outages, including
continuity backup services in different geographical regions? If a
natural disaster or outage occurs, how will cloud
services be continued?
Technical expertise Does the vendor have expertise in your industry or
and understanding business processes? Does the vendor understand what
you need to do and have the technical expertise to
fulfi ll those obligations?
Insurance in case Does the vendor provide cloud insurance to mitigate
of failure user losses in case of service failure or damage? This is
a new and important concept.
Third-party audit, or Can the vendor show objective proof with an audit
an unbiased assessment that it can live up to the promises it is making?
of the ability to rely on
the service provided by
the vendor
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 57 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
58 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
serviceability, performance, operations, billing, and penalties associated with
violations of such attributes. (Cloud Standards Customer Council, 2012, pp. 5–6.)
Implementing an effective management process is an important step in ensur-
ing internal and external user satisfaction with cloud services.
CLOUD VS. DATA
CENTER: WHAT IS THE
DIFFERENCE?
A main difference between a cloud and data center is that a cloud is an off-premise
form of computing that stores data on the Internet. In contrast, a data center refers
to on-premises hardware and equipment that store data within an organization’s
local network. Cloud services are outsourced to a third-party cloud provider who
manages the updates, security, and ongoing maintenance. Data centers are typically
run by an in-house IT department.
Cloud computing is the delivery of computing and storage resources as a ser-
vice to end-users over a network. Cloud systems are scalable. That is, they can be
adjusted to meet changes in business needs. At the extreme, the cloud’s capacity is
unlimited depending on the vendor’s offerings and service plans. A drawback of the
cloud is control because a third party manages it. Companies do not have as much
control as they do with a data center. And unless the company uses a private cloud
within its network, it shares computing and storage resources with other cloud users
in the vendor’s public cloud. Public clouds allow multiple clients to access the same
virtualized services and utilize the same pool of servers across a public network. In
contrast, private clouds are single-tenant environments with stronger security and
control for regulated industries and critical data. In effect, private clouds retain all
the IT security and control provided by traditional data center infrastructures with
the advantage of cloud computing.
Companies often use an arrangement of both on-premises data centers and
cloud computing (Figure 2.16).
A data center is physically connected to a local network, which makes it easier
to restrict access to apps and information to only authorized, company-approved
people and equipment. However, the cloud is accessible by anyone with the proper
credentials and Internet connection. This accessibility arrangement increases expo-
sure to company data at many more entry and exit points.
CLOUD
INFRASTRUCTURE
The cloud has greatly expanded the options for enterprise IT infrastructures
because any device that accesses the Internet can access, share, and deliver data.
Cloud computing is a valuable infrastructure because it:
1. Provides a dynamic infrastructure that makes apps and computing power avail-
able on demand. Apps and power are available on demand because they are
provided as a service. For example, any software that is provided on demand is
referred to as software as a service, or SaaS. Typical SaaS products are Google
Apps and Salesforce.com. Section 2.5 discussed SaaS and other cloud services.
2. Helps companies become more agile and responsive while signifi cantly reducing
IT costs and complexity through improved workload optimization and service
delivery.
Move to Enterprise Clouds
A majority of large organizations have hundreds or thousands of software licenses
that support business processes, such as licenses for Microsoft Office, Oracle database
management, IBM CRM (customer relationship management), and various network
security software. Managing software and their licenses involves deploying, provi-
sioning, and updating them—all of which are time-consuming and expensive. Cloud
computing overcomes these problems.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 58 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.4 Data Centers, Cloud Computing, and Virtualization 59
Figure 2.16 Corporate IT
infrastructures can consist of
an on-premises data center
and off-premises cloud
computing.
ISSUES IN MOVING
WORKLOADS FROM
THE ENTERPRISE TO
THE CLOUD
Building a cloud strategy is a challenge, and moving existing apps to the cloud is
stressful. Despite the business and technical benefits, the risk exists of disrupting
operations or customers in the process. With the cloud, the network and WAN
(wide area network) become an even more critical part of the IT infrastructure.
Greater network bandwidth is needed to support the increase in network traffic.
And, putting part of the IT architecture or workload into the cloud requires dif-
ferent management approaches, different IT skills, and knowing how to manage
vendor relationships and contracts.
Infrastructure Issues
There is a big difference because cloud computing runs on a shared infrastructure,
so the arrangement is less customized to a specific company’s requirements. A
comparison to help understand the challenges is that outsourcing is like renting an
apartment, while the cloud is like getting a room at a hotel.
With cloud computing, it may be more difficult to get to the root of perfor-
mance problems, like the unplanned outages that occurred with Google’s Gmail
and Workday’s human resources apps. The trade-off is cost vs. control.
Increasing demand for faster and more powerful computers, and increases in
the number and variety of applications are driving the need for more capable IT
architectures.
VIRTUALIZATION AND
VIRTUAL MACHINES
Computer hardware had been designed to run a single operating system (OS) and
a single app, which leaves most computers vastly underutilized. Virtualization is a
technique that creates a virtual (i.e., nonphysical) layer and multiple virtual machines
(VMs) to run on a single physical machine. The virtual (or virtualization) layer makes
it possible for each VM to share the resources of the hardware. Figure 2.17 shows the
relationship among the VMs and physical hardware.
©
K
itt
ic
ha
i/
Sh
ut
te
rs
to
ck
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 59 11/7/14 7:46 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
60 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
What Is a Virtual Machine?
Just as virtual reality is not real, but a software-created world, a virtual machine is
a software-created computer. Technically, a virtual machine (VM) is created by a
software layer, called the virtualization layer, as shown in Figure 2.17. That layer
has its own Windows or other OS and apps, such as Microsoft Office, as if it were
an actual physical computer. A VM behaves exactly like a physical computer and
contains its own virtual—that is, software-based—CPU, RAM (random access
memory), hard drive, and network interface card (NIC). An OS cannot tell the dif-
ference between a VM and a physical machine, nor can apps or other computers
on a network tell the difference. Even the VM thinks it is a “real” computer. Users
can set up multiple real computers to function as a single PC through virtualization
to pool resources to create a more powerful VM.
Virtualization is a concept that has several meanings in IT and therefore sev-
eral definitions. The major type of virtualization is hardware virtualization, which
remains popular and widely used. Virtualization is often a key part of an enter-
prise’s disaster recovery plan. In general, virtualization separates business applica-
tions and data from hardware resources. This separation allows companies to pool
hardware resources—rather than dedicate servers to applications—and assign those
resources to applications as needed.
The major types of virtualization are the following:
• Storage virtualization is the pooling of physical storage from multiple net-
work storage devices into what appears to be a single storage device man-
aged from a central console.
• Network virtualization combines the available resources in a network by
splitting the network load into manageable parts, each of which can be
assigned (or reassigned) to a particular server on the network.
• Hardware virtualization is the use of software to emulate hardware or a total
computer environment other than the one the software is actually running
in. It allows a piece of hardware to run multiple operating system images at
once. This kind of software is sometimes known as a virtual machine.
Virtualization Characteristics and Benefits
Virtualization increases the flexibility of IT assets, allowing companies to consoli-
date IT infrastructure, reduce maintenance and administration costs, and prepare
for strategic IT initiatives. Virtualization is not primarily about cost-cutting, which
Figure 2.17 Virtual machines
running on a simple
computer hardware layer.
Application
Virtualization Layer
Hardware Layer
Operating
System
Application
Operating
System
Application
Operating
System
Virtual Machines
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 60 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.4 Data Centers, Cloud Computing, and Virtualization 61
is a tactical reason. More importantly, for strategic reasons, virtualization is used
because it enables flexible sourcing and cloud computing.
The characteristics and benefits of virtualization are as follows:
1. Memory-intensive. VMs need a huge amount of RAM (random access memory,
or primary memory) because of their massive processing requirements.
2. Energy-effi cient. Minimizes energy consumed running and cooling servers in
the data center—representing up to a 95 percent reduction in energy use per
server.
3. Scalability and load balancing. When a big event happens, such as the Super
Bowl, millions of people go to a website at the same time. Virtualization pro-
vides load balancing to handle the demand for requests to the site. The VMware
infrastructure automatically distributes the load across a cluster of physical serv-
ers to ensure the maximum performance of all running VMs. Load balancing is
key to solving many of today’s IT challenges.
Virtualization consolidates servers, which reduces the cost of servers, makes
more efficient use of data center space, and reduces energy consumption. All of
these factors reduce the total cost of ownership (TCO). Over a three-year life cycle,
a VM costs approximately 75 percent less to operate than a physical server.
Liberty Wines supplies to restaurants, supermarkets, and
independent retailers from its headquarters in central
London. Recipient of multiple international wine awards—
including the International Wine Challenge on Trade Supplier
of the Year for two years running—Liberty Wines is one of the
United Kingdom’s foremost wine importers and distributors.
IT Problems and Business Needs
As the business expanded, the existing servers did not have
the capacity to handle increased data volumes, and main-
tenance of the system put a strain on the IT team of two
employees. Existing systems were slow and could not pro-
vide the responsiveness that employees expected.
Liberty Wines had to speed up business processes to
meet the needs of customers in the fast-paced world of
fine dining. To provide the service their customers expect,
employees at Liberty Wines needed quick and easy access
to customer, order, and stock information. In the past, the
company relied on 10 physical servers for apps and services,
such as order processing, reporting, and e-mail.
Virtualized Solution
Liberty Wines deployed a virtualized server solution incor-
porating Windows Server 2008 R2. The 10 servers were
replaced with 3 physical servers, running 10 virtual servers.
An additional server was used as part of a backup system,
further improving resilience and stability.
By reducing the number of physical servers from 10
to 4, power use and air conditioning costs were cut by
60 percent. Not only was the bottom line improved, but the
carbon footprint was also reduced, which was good for the
environment.
The new IT infrastructure cut hardware replacement costs
by £45,000 (U.S. $69,500) while enhancing stability with the
backup system. Apps now run faster, too, so employees can
provide better customer service with improved productivity.
When needed, virtual servers can be added quickly and eas-
ily to support business growth.
Questions
1. What business risks had Liberty Wines faced?
2. How does Liberty Wines’ IT infrastructure impact its com-
petitive advantage?
3. How did server virtualization benefit Liberty Wines and
the environment?
IT at Work 2 . 3
Business Continuity with Virtualization
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 61 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
62 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
Managers want streamlined, real time data-driven enterprises, yet they may face
budget cuts. Sustaining performance requires the development of new business
apps and analytics capabilities, which comprise the front end—and the data stores
and digital infrastructure, or back end, to support them. The back end is where the
data reside. The problem is that data may have to navigate through a congested
IT infrastructure that was first designed decades ago. These network or database
bottlenecks can quickly wipe out the competitive advantages from big data, mobility,
and so on. Traditional approaches to increasing database performance—manually tun-
ing databases, adding more disk space, and upgrading processors—are not enough
when you are have streaming data and real time big data analytics. Cloud services
help to overcome these limitations.
2.5 Cloud Services Add Agility
XAAS: “AS A SERVICE”
MODELS
The cloud computing model for on-demand delivery of and access to various types
of computing resources also extends to the development of business apps. Figure 2.18
shows four “as a service” (XaaS) solutions based on the concept that the resource—
software, platform, infrastructure, or data–can be provided on demand regardless
of geolocation.
CLOUD COMPUTING
STACK
Figure 2.19 shows the cloud computing stack, which consists of the following three
categories:
• SaaS apps are designed for end-users.
• PaaS is a set of tools and services that make coding and deploying these
apps faster and more efficient.
• IaaS consists of hardware and software that power computing resources—
servers, storage, operating systems, and networks.
Questions
1. What is a data center?
2. Describe cloud computing.
3. What is the difference between data centers and cloud computing?
4. What are the benefi ts of cloud computing?
5. How can cloud computing solve the problems of managing software
licenses?
6. What is an SLA? Why are SLAs important?
7. What factors should be considered when selecting a cloud vendor or
provider?
8. When are private clouds used instead of public clouds?
9. Explain three issues that need to be addressed when moving to cloud
computing or services.
10. How does a virtual machine (VM) function?
11. Explain virtualization.
12. What are the characteristics and benefi ts of virtualization?
13. When is load balancing important?
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 62 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
2.5 Cloud Services Add Agility 63
Software as a Service
Software as a service (SaaS) is a widely used model in which software is available
to users as needed. Specifically, in SaaS, a service provider hosts the application at
its data center and customers access it via a standard Web browser. Other terms for
SaaS are on-demand computing and hosted services. The idea is basically the same:
Instead of buying and installing expensive packaged enterprise applications, users
can access software apps over a network, with an Internet browser being the only
necessity.
A SaaS provider licenses an application to customers either on-demand,
through a subscription, based on usage (pay-as-you-go), or increasingly at no cost
when the opportunity exists to generate revenue from advertisements or through
other methods.
Figure 2.19 The cloud
computing stack consists
of SaaS, PaaS, and IaaS.
Figure 2.18 Four as-a-service
solutions: software, platform,
infrastructure, and data as a
service. ©
Va
lle
p
u/
Sh
ut
te
rs
to
ck
©
Y
ab
re
ss
e/
Sh
ut
te
rs
to
ck
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 63 11/7/14 7:47 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
64 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
The SaaS model was developed to overcome the common challenge to an
enterprise of being able to meet fluctuating demands on IT resources efficiently.
It is used in many business functions, primarily customer relationship management
(CRM), accounting, human resources (HR), service desk management, and col-
laboration.
There are thousands of SaaS vendors. Salesforce.com is one of the most widely
known SaaS providers. Other examples are Google Docs and collaborative presen-
tation software Prezi. For instance, instead of installing Microsoft Word on your
own computer, and then loading Word to create a document, you use a browser to
log into Google Docs. Only the browser uses your computer’s resources.
Platform as a Service
Platform as a service (PaaS) benefits software development. PaaS provides a stan-
dard unified platform for app development, testing, and deployment. This comput-
ing platform allows the creation of Web applications quickly and easily without the
complexity of buying and maintaining the underlying infrastructure. Without PaaS,
the cost of developing some apps would be prohibitive. The trend is for PaaS to
be combined with IaaS. For an example of the value of SaaS and PaaS, see IT at
Work 2.4.
Within only 12 weeks, Unilever had its new digital social
platform built and implemented. The platform was designed
to support Unilever Global Marketing by connecting its mar-
keters, brand managers, and partners in 190 countries. The
new social platform is built on the Salesforce Platform and
leverages Salesforce Chatter, which is an enterprise social
networking technology. It enables Unilever marketers to share
knowledge, best practices, and creative assets across the net-
work. According to Mark McClennon, the CIO Consumer at
Unilever, “We’ve gone from a blank piece of paper all the way
through to rolling out the first release of the platform in about
three months using Salesforce technology” (Accenture, 2013).
IT at Work 2 . 4
Unilever
Infrastructure as a Service
Infrastructure as a service (IaaS) is a way of delivering cloud computing infrastruc-
ture as an on-demand service. Rather than purchasing servers, software, data center
space, or networks, companies instead buy all computing resources as a fully out-
sourced service. IaaS providers are Amazon Web Services (AWS) and Rackspace.
Data as a Service
Similar to SaaS, PaaS, and IaaS, data as a service (DaaS) enables data to be
shared among clouds, systems, apps, and so on regardless of the data source or
where they are stored. DaaS makes it easier for data architects to select data from
different pools, filter out sensitive data, and make the remaining data available
on demand.
A key benefit of DaaS is the elimination of the risks and burdens of data man-
agement to a third-party cloud provider. This model is growing in popularity as data
become more complex, difficult, and expensive to maintain.
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 64 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
Key Terms 65
At-a-Service Models are Enterprisewide
and Can Trigger Lawsuits
The various at-a-service models are used in various aspects of business. You will
read how these specific services, such as CRM and HR management, are being
used for operational and strategic purposes in later chapters. Companies are fre-
quently adopting software, platform, infrastructure, data management and starting
to embrace mobility as a service and big data as a service because they typically no
longer have to worry about the costs of buying, maintaining, or updating their own
data servers. Both hardware and human resources expenses can be cut significantly.
Service arrangements all require that managers understand the benefits and trade-
offs—and how to negotiate effective SLAs. Regulations mandate that confidential
data be protected regardless of whether the data are on-premises on in the cloud.
Therefore, a company’s legal department needs to get involved in these IT deci-
sions. Put simply, moving to cloud services is not simply an IT decision because the
stakes around legal and compliance issues are very high.
GOING CLOUD Cloud services can advance the core business of delivering superior services to
optimize business performance. Cloud can cut costs and add flexibility to the
performance of critical business apps. And, it can improve responsiveness to end-
consumers, application developers, and business organizations. But to achieve these
benefits, there must be IT, legal, and senior management oversight because a com-
pany still must meet its legal obligations and responsibilities to employees, customers,
investors, business partners, and society.
Questions
1. What is SaaS?
2. Describe the cloud computing stack.
3. What is PaaS?
4. What is IaaS?
5. Why is DaaS growing in popularity?
6. How might companies risk violating regulation or compliance requirements with
cloud services?
Key Terms
ad hoc report
batch processing
cloud computing
cloud computing stack
cross-sell
customer-centric
data
data as a service (DaaS)
data center
data governance
data silo
database
decision support system
(DSS)
dirty data
enterprise architecture (EA)
exception report
executive information
system (EIS)
goal seeking
information
information management
infrastructure as a service
(IaaS)
IT infrastructure
knowledge
management information
system (MIS)
master data
master data management
(MDM)
master fi le
model
online transaction
processing (OLTP)
platform as a service
(PaaS)
private cloud
public cloud
real time processing
service-level agreements
(SLAs)
software as a service
(SaaS)
structured decisions
transaction processing
system (TPS)
touchpoint
unstructured decisions
up-sell
virtualization
virtual machine (VM)
volatility
what-if analysis
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 65 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
66 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
Assuring Your Learning
1. Why is a strong market position or good profi t
performance only temporary?
2. Explain the difference between customer-centric
and product-centric business models.
3. Assume you had:
a. A tall ladder with a sticker that listed a weight
allowance only 5 pounds more than you
weighed. You know the manufacturer and
model number.
b. Perishable food with an expiration date 2 days
into the future.
c. A checking account balance that indicated you
had suffi cient funds to cover the balance due on
an account.
In all three cases, you cannot trust the data to be ex-
actly correct. The data could be incorrect by about 20
percent. How might you fi nd the correct data for each
instance? Which data might not be possible to verify?
How does dirty data impact your decision making?
4. If business data are scattered throughout the enter-
prise and not synched until the end of the month,
how does that impact day-to-day decision making
and planning?
5. Assume a bank’s data are stored in silos based on
fi nancial product—checking accounts, saving accounts,
mortgages, auto loans, and so on. What problems do
these data silos create for the bank’s managers?
6. Why do managers and workers still struggle to fi nd
information that they need to make decisions or
take action despite advances in digital technology?
That is, what causes data defi ciencies?
7. According to a Tech CEO Council Report, Fortune
500 companies waste $480 billion every year on
ineffi cient business processes. What factors cause
such huge waste? How can this waste be reduced?
8. Explain why organizations need to implement
enterprise architecture (EA) and data governance.
9. What two problems can EA solve?
10. Name two industries that depend on data gov-
ernance to comply with regulations or reporting
requirements. Given an example of each.
11. Why is it important for data to be standardized?
Given an example of unstandardized data.
12. Why are TPSs critical systems?
13. Explain what is meant by data volatility. How does
it affect the use of databases for data analysis?
14. Discuss why the cloud acts as the great IT delivery
frontier.
15. What are the immediate benefi ts of cloud computing?
16. What are the functions of data centers?
17. What factors need to be considered when selecting
a cloud vendor?
18. What protection does an effective SLA provide?
19. Why is an SLA a legal document?
20. How can virtualization reduce IT costs while
improving performance?
DISCUSS: Critical Thinking Questions
21. When selecting a cloud vendor to host your en-
terprise data and apps, you need to evaluate the
service level agreement (SLA).
a. Research the SLAs of two cloud vendors, such
as Rackspace, Amazon, or Google.
b. For the vendors you selected, what are the
SLAs’ uptime percent? Expect them to be
99.9 percent or less.
c. Does each vendor count both scheduled down-
time and planned downtime toward the SLA
uptime percent?
d. Compare the SLAs in terms of two other criteria.
e. Decide which SLA is better based on your com-
parisons.
f. Report your results and explain your decision.
22. Many organizations initiate data governance pro-
grams because of pressing compliance issues that
impact data usage. Organizations may need data
governance to be in compliance with one or more
regulations, such as the Gramm–Leach Bliley Act
(GLB), HIPAA, Foreign Corrupt Practices Act
(FCPA), Sarbanes–Oxley Act, and several state and
federal privacy laws.
a. Research and select two U.S. regulations or
privacy laws.
b. Describe how data governance would help an
enterprise comply with these regulations or
laws.
23. Visit eWeek.com Cloud Computing Solutions
Center for news and reviews at eweek.com/c/s/
Cloud-Computing. Select one of the articles listed
EXPLORE: Online and Interactive Exercises
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 66 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
CASE 2.2 Business Case 67
under Latest Cloud Computing News. Prepare an
executive summary of the article.
24. Visit Rackspace.com and review the company’s
three types of cloud products. Describe each of
those cloud solutions.
25. Visit Oracle.com. Describe the types of virtualiza-
tion services offered by Oracle.
26. Visit YouTube.com and search for two videos on
virtualization. For each video, report what you
learned. Specify the complete URL, video title, who
uploaded the video and the date, video length, and
number of views.
27. Financial services fi rms experience large fl uctua-
tions in business volumes because of the cyclical
nature of fi nancial markets. These fl uctuations
are often caused by crises—such as the subprime
mortgage problems, the discovery of major fraud,
or a slowdown in the economy. These fl uctuations
require that executives and IT leaders have the abil-
ity to cut spending levels in market downturns and
quickly scale up when business volumes rise again.
Research SaaS solutions and vendors for the fi nan-
cial services sector. Would investment in SaaS help
such fi rms align their IT capacity with their business
needs and also cut IT costs? Explain your answer.
28. Despite multimillion-dollar investments, many IT
organizations cannot respond quickly to evolving
business needs. Also, they cannot adapt to large-
scale shifts like mergers, sudden drops in sales, or
new product introductions. Can cloud computing
help organizations improve their responsiveness
and get better control of their IT costs? Explain
your answer.
29. Describe the relationship between enterprise archi-
tecture and organizational performance.
30. Identify four KPIs for a major airline (e.g., American,
United, Delta) or an automobile manufacturer
(e.g., GM, Ford, BMW). Which KPI would be the
easiest to present to managers on an online dash-
board? Explain why.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
CASE 2.2
Business Case: Data Chaos Creates Risk
Data chaos often runs rampant in service organizations, such
as health care and the government. For example, in many
hospitals, each line of business, division, and department has
implemented its own IT applications, often without a thorough
analysis of its relationship with other departmental or divisional
systems. This arrangement leads to the hospital having IT
groups that specifi cally manage a particular type of applica-
tion suite or data silo for a particular department or division.
Data Management
When apps are not well managed, they can generate terabytes
of irrelevant data, causing hospitals to drown in such data. This
data chaos could lead to medical errors. In the effort to man-
age excessive and massive amounts of data, there is increased
risk of relevant information being lost (missing) or inaccurate—
that is, faulty or dirty data. Another risk is data breaches.
• Faulty data: By 2016 an estimated 80 percent of health-
care organizations will adopt electronic health records,
or EHRs (IDC MarketScape, 2012). It is well known that an
unintended consequence of EHR is faulty data. According
to research done at Columbia University, data in EHR sys-
tems may not be as accurate and complete as expected
(Hripscak & Albers, 2012). Incorrect lab values, imaging
results, or physician documentation lead to medical
errors, harm patients, and damage the organization’s ac-
creditation and reputation.
• Data breaches: More than 25 million people have been
affected by health-care system data breaches since the
Offi ce for Civil Rights, a division of the U.S. Department
of Health and Human Services, began reporting breaches
in 2009. Most breaches involved lost or stolen data on
laptops, removable drives, or other portable media.
Breaches are extremely expensive and destroy trust.
Accountability in health care demands compliance with
strong data governance efforts. Data governance programs
verify that data input into EHR, clinical, fi nancial, and opera-
tional systems are accurate and complete—and that only
authorized edits can be made and logged.
Vanderbilt University Medical Center
Adopts EHR and Data Governance
Vanderbilt University Medical Center (VUMC) in Nashville, TN,
was an early adopter of EHR and implemented data governance
in 2009. VUMC’s experience provides valuable lessons.
VUMC consists of three hospitals and the Vanderbilt Clinic,
which have 918 beds, discharge 53,000 patients each year, and
count 1.6 million clinic visits each year. On average, VUMC has
an 83 percent occupancy rate and has achieved HIMSS Stage 6
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 67 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
68 Chapter 2 Data Governance and IT Architecture Support Long-Term Performance
hospital EHR adoption. HIMSS (Healthcare Information and
Management Systems Society, himss.org) is a global, nonprofi t
organization dedicated to better health-care outcomes through
IT. There are seven stages of EHR adoption, with Stage 7 be-
ing a fully paperless environment. That means all clinical data
are part of an electronic medical record and, as a result, can
be shared across and outside the enterprise. At Stage 7, the
health-care organization is getting full advantage of the health
information exchange (HIE). HIE provides interoperability so
that information can fl ow back and forth among physicians,
patients, and health networks (Murphy, 2012).
VUMC began collecting data as part of its EHR efforts in
1997. By 2009 the center needed stronger, more disciplined
data management. At that time, hospital leaders initiated a
project to build a data governance infrastructure.
Data Governance Implementation
VUMC’s leadership team had several concerns.
1. IT investments and tools were evolving rapidly, but they
were not governed by HIM (Healthcare Information and
Management) policies.
2. As medical records became electronic so they might be
transmitted and shared easily, they became more vulner-
able to hacking.
3. As new uses of electronic information were emerging, the
medical center struggled to keep up.
Health Record Executive Committee
Initially, VUMC’s leaders assigned data governance to their tra-
ditional medical records committee, but that approach failed.
Next, they hired consultants to help develop a data governance
structure and organized a health record executive committee
to oversee the project. The committee reports to the medi-
cal board and an executive committee to ensure executive
involvement and sponsorship. The committee is responsible for
developing the strategy for standardizing health record prac-
tices, minimizing risk, and maintaining compliance. Members
include the chief medical information offi cer (CMIO), CIO, legal
counsel, medical staff, nursing informatics, HIM, administration,
risk management, compliance, and accreditation. In addition,
a legal medical records team was formed to support additions,
corrections, and deletions to the EHR. This team defi nes pro-
cedures for removal of duplicate medical record numbers and
policies for data management and compliance.
Costs of Data Failure
Data failures incur the following costs:
• Rework
• Loss of business
• Patient safety errors
• Malpractice lawsuits
• Delays in receiving payments because billing or medical
codes data are not available
Measuring the Value of Data Governance
One metric to calculate the value of a data governance
program is confi dence in data-dependent assumptions, or
CIDDA. CIDDA is computed by multiplying three confi dence
estimates as follows:
CIDDA G M TS
where
G Confi dence that data are good enough for their
intended purpose
M Confi dence that data mean what you think they do
TS Confi dence that you know where the data come from
and trust the source
CIDDA is a subjective metric for which there are no industry
benchmarks, yet it can be evaluated over time to gauge any
improvement in data quality confi dence.
Benefi ts Achieved from Data Governance
As in other industries, in health care, data are the most valu-
able asset. The handling of data is the real risk. EHRs are
effective only if the data are accurate and useful to support
patient care. Effective ongoing data governance has achieved
that goal at VUMC.
Sources: Compiled from Murphy (2012), HIMSS.org (2014),
HIMSSanalytics.org (2014), Reeves & Bowen (2013).
Questions
1. What might happen when each line of business, division,
and department develops its own IT apps?
2. What are the consequences of poorly managed apps?
3. What two risks are posed by data chaos? Explain why.
4. What are the functions of data governance in the health-
care sector?
5. Why is it important to have executives involved in data
governance projects?
6. List and explain the costs of data failure.
7. Calculate the CIDDA over time:
Q1: G 40%, M 50%, TS 20%
Q2: G 50%, M 55%, TS 30%
Q3: G 60%, M 60%, TS 40%
Q4: G 60%, M 70%, TS 45%
8. Why are data the most valuable asset in health care?
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 68 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch02/text_s
References 69
CASE 2.3
Video Case: Cloud Computing: Three Case Studies
When organizations say they are “using the cloud,” they can
mean a number of very different things. Using an IaaS service
such as Amazon EC2 or Terremark is different from using
Google Apps for outsourced e-mail, which is different again
from exposing an API in Facebook.
A video shows three cloud computing case studies
from Vordel’s customers. The cases cover SaaS, IaaS, and
PaaS. In fi rst two examples, customers are connecting to the
cloud: fi rst to Google Apps (for single sign-on to Google
Apps e-mail) and second to Terremark to manage virtual
servers. In the third example, the connection is from the
cloud using a Facebook app to a company’s APIs. You might
spot Animal House references. Follow these three steps:
Visit SOAtoTheCloud.com/2011/10/video-three-cloud-
computing-case.html. View the 11-minute video of the three
case studies.
Question
1. Explain the value or benefi ts of each organization’s cloud
investment.
Cloud Standards Customer Council. Practical Guide to Cloud
Service Level Agreements. Version 1. April 10, 2012. http://
www.cloudstandardscustomercouncil.org/2012_Practical_
Guide_to_Cloud_SLAs
De Clerck, J. P. “Optimizing the Digital and Social Customer
Experience.” Social Marketing Forum, February 16, 2013.
Enterprise Architecture Research Forum (EARF). 2012.
First San Francisco Partners. “How McAfee Took Its First
Steps to MDM Success.” 2009.
GAO (General Accounting Offi ce). “Practical Guide to
Federal Enterprise Architecture.” Version 2. August 2010.
Hamilton, N. “Choosing Data Governance Battles.” Inside
Reference Data, December 2013.
HIMSS.org (2014)
HIMSSanalytics.org (2014),
Hripscak, G. & D. J. Albers. “Next Generation Phenotyping of
Electronic Health Records.” Journal of the American Medical
Informatics Association, Volume 19, Issue 5. September 2012.
IBM Institute for Business Value. “IBM Chief Information
Offi cer Study: The Essential CIO.” May 2011.
IDC MarketScape. “U.S. Ambulatory EMR/EHR for Small
Practices.” 3012 Vendor Assessment. May 2012.
Keitt, T.J. “Demystifying The Mobile Workforce–An Informa-
tion Workplace Report.” Forrester.com. June 7, 2011.
mcafee.com. McAfee Fact Sheet. 2013.
Miliard, M. “IBM Unveils New Watson-based Analytics.”
Healthcare IT News. October 25, 2011.
Murphy, K. “Health Information Exchange.” EHR Intelligence,
April 9, 2012.
National Institute of Standards and Technology (NIST). Cloud
Computing Program. 2012.
Reeves, M. G. & R. Bowen. “Developing a Data Governance
Model in Health Care.” Healthcare Finance Management,
February 2013.
Rich, R. “Master Data Management or Data Governance? Yes,
Please.” Teradata Magazine Q3, 2013.
Tech CEO Council Report 2010. techceocouncil.org/news/
reports/
References
c02DataGovernanceAndITArchitectureSupportLong-TermPerformance.indd Page 69 07/11/14 4:15 PM f-392 /208/WB01490/9781118897782/ch02/text_s
70
Chapter Snapshot
Analytics differentiates business in the 21st century.
Transactional, social, mobile, cloud, web, and sensor
data offer enormous potential. But without tools to ana-
lyze these data types and volumes, there would not be
much difference between business in the 20th century
and business today—except for mobile access. High-
quality data and human expertise are essential to the
value of analytics (Figure 3.1).
Human expertise is necessary because analytics alone
cannot explain the reasons for trends or relationships;
1. Describe the functions of database and data warehouse
technologies, the differences between centralized and
distributed database architecture, how data quality impacts
performance, and the role of a master reference file in cre-
ating accurate and consistent data across the enterprise.
2. Evaluate the tactical and strategic benefits of big data
and analytics.
3. Describe data and text mining, and give examples of
mining applications to find patterns, correlations, trends,
or other meaningful relationships in organizational data
stores.
4. Explain the operational benefits and competitive advan-
tages of business intelligence, and how forecasting can
be improved.
5. Describe electronic records management and how it
helps companies meet their compliance, regulatory, and
legal obligations.
Chapter Snapshot
Case 3.1 Opening Case: Coca-Cola Manages
at the Point That Makes a Difference
3.1 Database Management Systems
3.2 Data Warehouse and Big Data Analytics
3.3 Data and Text Mining
3.4 Business Intelligence
3.5 Electronic Records Management
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 3.2 Business Case: Financial Intelligence
Fights Fraud
Case 3.3 Video Case: Hertz Finds Gold in
Integrated Data
References
Learning Outcomes
Data Management,
Big Data Analytics, and
Records Management3
Chapter
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 70 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
71
know what action to take; or provide sufficient context
to determine what the numbers represent and how to
interpret them.
Database, data warehouse, big data, and business
intelligence (BI) technologies interact to create a new
biz-tech ecosystem. Big data analytics and BI discover
insights or relationships of interest that otherwise might
not have been recognized. They make it possible for
managers to make decisions and act with clarity, speed,
and confidence. Big data analytics is not just about man-
aging more or varied data. Rather, it is about asking new
questions, formulating new hypotheses, exploration and
discovery, and making data-driven decisions. Ultimately,
a big part of big data analytic efforts is the use of new
analytics techniques.
Mining data or text taken from day-to-day busi-
ness operations reveals valuable information, such as
customers’ desires, products that are most important, or
processes that can be made more efficient. These insights
expand the ability to take advantage of opportunities,
minimize risks, and control costs.
While you might think that physical pieces of paper
are a relic of the past, in most offices the opposite is
true. Aberdeen Group’s survey of 176 organizations
worldwide found that the volume of physical documents
is growing by up to 30 percent per year. Document man-
agement technology archives digital and physical data
to meet business needs, as well as regulatory and legal
requirements (Rowe, 2012).
CASE 3.1 OPENING CASE
Coca-Cola Manages at the Point That Makes a Difference
COCA-COLA’S DATA
MANAGEMENT
CHALLENGES
The Coca-Cola Company is a Fortune 100 company with over $48 billion in sales
revenue and $9 billion in profit (Figure 3.2). The market leader manages and
analyzes several petabytes (Pb) of data generated or collected from more than
500 brands and consumers in 206 countries. Its bottling partners provide sales and
shipment data, while retail customers transmit transaction and merchandising data.
Other data sources are listed in Table 3.1. From 2003 to spring 2013, data analysts
at Coca-Cola knew there were BI opportunities in the mountains of data its bottlers
were storing, but finding and accessing all of that data for analytics proved to be
nearly impossible. The disparate data sources caused long delays in getting analytics
reports from IT to sales teams. The company decided to replace the legacy software
at each bottling facility and standardize them on a new BI system, a combination of
MicroStrategy and Microsoft BI products.
Enterprise Data Management Like most global companies, Coca-Cola relies
on sophisticated enterprise data management, BI, and analytic technologies to sus-
tain its performance in fi ercely competitive markets (Figure 3.3). Data are managed
Petabyte (Pb) 1,000
Terabytes (Tb) 1 million
Gigabytes (Gb).
Human
expertise
Data
analytics
High-Quality
data
Trends or
relationships
Context to understand
what the numbers
represent and how
to interpret them
What action to take
+
+
Figure 3.1 Data analytics,
and human expertise
and high-quality data,
are needed to obtain
actionable information.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 71 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
72 Chapter 3 Data Management, Big Data Analytics, and Records Management
in a centralized database, as illustrated in Figure 3.4. Data warehousing, big data,
analytics, data modeling, and social media are used to respond to competitors’ activ-
ity, market changes, and consumer preferences.
To support its business strategy and operations, Coca-Cola changed from a
decentralized database approach to a centralized database approach. Now its data
are combined centrally and accessible via shared platforms across the organization
(Figure 3.5). Key objectives of the data management strategy are to help its retail
customers such as Walmart, which sells $4 billion of Coca-Cola products annually, sell
Figure 3.3 Coca-Cola World Headquarters in Atlanta, GA, announced on
January 25, 2010, that new packaging material for plastic bottles will be made
partially from plants—as part of its sustainability efforts.
Centralized database stores
data at a single location that
is accessible from anywhere.
Searches can be fast because
the search engine does not
need to check multiple dis-
tributed locations to find
responsive data.
Data warehouses that inte-
grate data from databases
across an entire enterprise
are called enterprise data
warehouses (EDW).
©
K
at
he
rin
e
W
el
le
s/
Sh
ut
te
rs
to
ck
World’s largest nonalcoholic
beverage company with more
than 500 brands of beverages,
ready-to-drink coffees, juices, and
juice drinks.
Has the world’s largest beverage
distribution system, with
consumers in more than 200
countries.
Products consumed at a rate of
1.9 billion servings a day
worldwide.
Brand
Business Ethics &
Sustainability
Focused on initiatives that reduce their
environmental footprint; support
active, healthy living; create a safe
work environment; and enhance the
economic development of the
communities where they operate.
Digital Technology
Centralized database
Enterprise data warehouse (EDW)
Big data analytics
Decision models
70 million Facebook followers
The Coca-Cola
Company
Figure 3.2 The Coca-Cola Company overview.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 72 11/7/14 7:51 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
CASE 3.1 Opening Case 73
TABLE 3.1 Opening Case Overview
Company • The Coca-Cola Company, coca-cola.com
• Sustainability: www.coca-colacompany.com/sustainability
• $48 billion in sales revenue and profi ts of $9 billion, 2013
Industry • The global company manufactures, sells, and distributes
nonalcoholic beverages.
Product lines • More than 500 brands of still and sparkling beverages,
ready-to-drink coffees, juices, and juice drinks.
Digital technology • Enterprise data warehouse (EDW)
• Big data and analytics
• Business intelligence
• In 2014, moved from a decentralized approach to a central-
ized approach, where the data are combined centrally and
available via the shared platforms across the organization.
Business challenges • In 2010, Coca-Cola had 74 unique databases, many of them
used different software to store and analyze data. Dealing
with incompatible databases and reporting systems re-
mained a problem from 2003 to 2013.
• Chief Big Data Insights Offi cer Esat Sezer has stated that
Coca-Cola took a strategic approach instead of a tactical
approach with big data.
Global data sources • Transaction and merchandising data
• Data from nationwide network of 74 bottlers
• Multichannel retail data
• Customer profi le data from loyalty programs
• Social media data
• Supply chain data
• Competitor data
• Sales and shipment data from bottling partners
Figure 3.4 Centralized data
architecture.
more Coca-Cola products and to improve the consumer experience. The company
has implemented a data governance program to ensure that cultural data sensitivi-
ties are respected.
©
V
al
le
p
u/
Sh
ut
te
rs
to
ck
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 73 11/7/14 7:51 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
74 Chapter 3 Data Management, Big Data Analytics, and Records Management
SUSTAINING BUSINESS
PERFORMANCE
All data are standardized through a series of master data management (MDM)
processes, as discussed in Chapter 2. An enterprise data warehouse (EDW) gener-
ates a single view of all multichannel retail data. The EDW creates a trusted view
of customers, sales, and transactions, enabling Coca-Cola to respond quickly and
accurately to changes in market conditions.
Throughout Coca-Cola’s divisions and departments, huge volumes of data
are analyzed to make more and better time-sensitive, critical decisions about
products, shopper marketing, the supply chain, and production. Point-of-sale
(POS) data are captured from retail channels and used to create customer pro-
files. Those profiles are communicated via a centralized iPad reporting system.
POS data are analyzed to support collaborative planning, forecasting, and
replenishment processes within its supply chain. (Supply chain management,
collaborative planning, forecasting, and replenishment are covered in greater
detail in Chapter 10.)
Coca-Cola’s Approach to Big Data and Decision Models Big data are
treated as a strategic asset. Chief Big Data Insights Offi cer Esat Sezer has stated
that Coca-Cola takes a strategic approach instead of a tactical approach with big
data. The company is far advanced in the use of big data to manage its products,
sales revenue, and customer experiences in near real time and to reduce costs. For
example, it cut overtime costs almost in half by analyzing the service center data.
Big data help Coca-Cola relate to its 70 million Facebook followers—many of them
bolster the Coke brand.
Figure 3.5 Data from online and offl ine transactions are stored in databases.
Data about entities such as customers, products, orders, and employees are
stored in an organized way.
©
a
lp
ha
sp
iri
t/
Sh
ut
te
rs
to
ck
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 74 11/7/14 7:52 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.1 Database Management Systems 75
Big data play a key role in ensuring that its orange juice tastes the same year-
round and is readily available anywhere in the world. Oranges used by Coca-Cola
have a peak growing season of only three months. Producing orange juice with a
consistent taste year-round despite the inconsistent quality of the orange supply is
complex. To deal with the complexity, an orange juice decision model was devel-
oped, the Black Book model. A decision model quantifies the relationship between
variables, which reduces uncertainty. Black Book combines detailed data on the
600 flavors that make up an orange, weather, customer preferences, expected
crop yields, cost pressures, regional consumer preferences, and acidity or sweet-
ness rate. The model specifies how to blend the orange juice to create a consistent
taste. Coke’s Black Book juice model is considered to be one of the most complex
business analytics apps. It requires analyzing up to 1 quintillion (10E18) decision
variables to consistently deliver the optimal blend.
With the power of big data and decision models, Coca-Cola is prepared for
disruptions in supply far in advance. According to Doug Bippert, Coca-Cola’s vice
president of business acceleration, “If we have a hurricane or a freeze, we can
quickly re-plan the business in five or 10 minutes just because we’ve mathematically
modeled it” (BusinessIntelligence.com, 2013b).
Sources: Compiled from Burns (2013), Fernandez (2012), BusinessIntelligence.com (2013a, 2013b),
CNNMoney (2014), Big Data Startups (2013), and Teradata (2012).
Questions
1. Why does the Coca-Cola Company have petabytes of data?
2. Why is it important for Coca-Cola to be able to process POS data in
near real time?
3. How does Coca-Cola attempt to create favorable customer
experiences?
4. What is the importance of having a trusted view of the data?
5. What is the benefi t of a decision model?
6. What is the Black Book model?
7. Explain the strategic benefi t of the Black Book model.
Data are the driving force behind any successful business. Operations, plan-
ning, control, and all other management functions rely largely on processed
information, not raw data. And, no one wants to wait for business-critical
reports or specific answers to their questions. Data management technologies
that keep users informed and support the various business demands are the
following:
• Databases store data generated by business apps, sensors, operations, and
transaction-processing systems (TPS). Data in databases are extremely vola-
tile. Medium and large enterprises typically have many databases of various
types.
• Data warehouses integrate data from multiple databases and data silos, and
organize them for complex analysis, knowledge discovery, and to support
3.1 Database Management Systems
Databases are collections of
data sets or records stored
in a systematic way.
Volatile refers to data that
change frequently.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 75 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
76 Chapter 3 Data Management, Big Data Analytics, and Records Management
DATABASE
MANAGEMENT
SYSTEMS AND SQL
Database management systems (DBMSs) integrate with data collection systems
such as TPS and business applications; store the data in an organized way; and
provide facilities for accessing and managing that data. Over the past 25 years, the
relational database has been the standard database model adopted by most enter-
prises. Relational databases store data in tables consisting of columns and rows,
similar to the format of a spreadsheet, as shown in Figure 3.6.
Relational management systems (RDBMSs) provide access to data using a
declarative language—structured query language (SQL). Declarative languages
simplify data access by requiring that users only specify what data they want to
access without defining how access will be achieved. The format of a basic SQL
statement is
SELECT column_name(s)
FROM table_name
WHERE condition
An instance of SQL is shown in Figure 3.7.
Database management
systems (DBMSs) are
software used to manage the
additions, updates, and dele-
tions of data as transactions
occur, and to support data
queries and reporting. They
are OLTP systems.
SQL is a standardized query
language for accessing
databases.
decision making. For example, data are extracted from a database, processed
to standardize their format, and then loaded into data warehouses at specific
times, such as weekly. As such, data in data warehouses are nonvolatile—and
ready for analysis.
• Data marts are small-scale data warehouses that support a single function or
one department. Enterprises that cannot afford to invest in data warehous-
ing may start with one or more data marts.
• Business intelligence (BI) tools and techniques process data and do statisti-
cal analysis for insight and discovery—that is, to discover meaningful rela-
tionships in the data, keep informed in real time, detect trends, and identify
opportunities and risks.
Data-processing techniques, processing power, and enterprise performance
management capabilities have undergone revolutionary advances in recent years
for reasons you are already familiar with—big data, mobility, and cloud comput-
ing. The last decade, however, has seen the emergence of new approaches, first in
data warehousing and, more recently, for transaction processing, as you read in this
chapter.
Figure 3.6 Illustration of
structured data format.
Numeric and alphanumeric
data are arranged into rows
and predefi ned columns
similar to those in an Excel
spreadsheet. ©
A
le
xa
nd
er
F
ed
ia
ch
ov
/A
la
m
y
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 76 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.1 Database Management Systems 77
DBMS Functions
An accurate and consistent view of data throughout the enterprise is needed so
one can make informed, actionable decisions that support the business strategy.
Functions performed by a DBMS to help create such a view are:
• Data filtering and profiling: Process and store data efficiently. Inspect
the data for errors, inconsistencies, redundancies, and incomplete
information.
• Data integrity and maintenance: Correct, standardize, and verify the consis-
tency and integrity of the data.
• Data synchronization: Integrate, match, or link data from disparate sources.
• Data security: Check and control data integrity over time.
• Data access: Provide authorized access to data in both planned and ad hoc
ways within acceptable time.
Today’s computing hardware is capable of crunching through huge datasets
that were impossible to manage a few years back and making them available on-
demand via wired or wireless networks (Figure 3.8).
Figure 3.7 An instance of SQL to access employee information based on date
of hire.
©
P
io
tr
A
d
am
ow
ic
z/
Sh
ut
te
rs
to
ck
TECH NOTE 3.1 Factors That Determine the Performance of a DBMS
Factors to consider when evaluating the performance of a database are the following.
Data latency. Latency is the elapsed time (or delay) between when data are created
and when they are available for a query or report. Applications have different toler-
ances for latency. Database systems tend to have shorter latency than data ware-
houses. Short latency imposes more restrictions on a system.
Queries are ad hoc
(unplanned) user requests for
specific data.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 77 11/7/14 7:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
78 Chapter 3 Data Management, Big Data Analytics, and Records Management
Figure 3.8 Database queries are processed in real time (a), and results are transmitted via wired or wireless
networks to computer screens or handhelds (b).
(a) (b)
©
C
or
b
is
R
F/
A
la
m
y
©
F
oc
us
T
ec
hn
ol
og
y/
A
la
m
y
Ability to handle the volatility of the data. The database has the processing power
to handle the volatility of the data. The rates at which data are added, updated, or
deleted determine the workload that the database must be able to control to prevent
problems with the response rate to queries.
Query response time. The volume of data impacts response times to queries and
data explorations. Many databases pre-stage data—that is, summarize or precalcu-
late results—so queries have faster response rates.
Data consistency. Immediate consistency means that as soon as data are updated,
responses to any new query will return the updated value. With eventual consistency,
not all query responses will refl ect data changes uniformly. Inconsistent query results
could cause serious problems for analyses that depend on accurate data.
Query predictability. The greater the number of ad hoc or unpredictable queries, the
more fl exible the database needs to be. Database or query performance manage-
ment is more diffi cult when the workloads are so unpredictable that they cannot be
prepared for in advance. The ability to handle the workload is the most important
criterion when choosing a database.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 78 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.1 Database Management Systems 79
Online Transaction Processing and Online
Analytics Processing
When most business transactions occur—for instance, an item is sold or returned,
an order is sent or cancelled, a payment or deposit is made—changes are made
immediately to the database. These online changes are additions, updates, or
deletions. DBMSs record and process transactions in the database, and support
queries and reporting. Given their functions, DBMSs are referred to as online
transaction-processing (OLTP) systems. OLTP is a database design that breaks
down complex information into simpler data tables to strike a balance between
transaction-processing efficiency and query efficiency. OLTP databases process
millions of transactions per second. However, databases cannot be optimized for
data mining, complex online analytics-processing (OLAP) systems, and decision
support. These limitations led to the introduction of data warehouse technology.
Data warehouses and data marts are optimized for OLAP, data mining, BI, and
decision support. OLAP is a term used to describe the analysis of complex data
from the data warehouse. In summary, databases are optimized for extremely fast
transaction processing and query processing. Data warehouses are optimized for
analysis.
DBMS AND DATA
WAREHOUSING
VENDORS RESPOND
TO LATEST DATA
DEMANDS
One of the major drivers of change in the data management market is the
increased amount of data to be managed. Enterprises need powerful DBMSs and
data warehousing solutions, analytics, and reporting. The four vendors that domi-
nate this market—Oracle, IBM, Microsoft, and Teradata—continue to respond
to evolving data management needs with more intelligent and advanced software
and hardware. Advanced hardware technology enables scaling to much higher
data volumes and workloads than previously possible, or it can handle specific
workloads. Older general-purpose relational databases DBMSs lack the scal-
ability or flexibility for specialized or very large workloads, but are very good at
what they do.
DBMS Vendor Rankings
The highest-ranking enterprise DBMSs in mid-2014 were Oracle’s MySQL,
Microsoft’s SQL Server, PostgreSQL, IBM’s DB2, and Teradata Database. Most
run on multiple operating systems (OSs).
• MySQL, which was acquired by Oracle in January 2010, powers hundreds of
thousands of commercial websites and a huge number of internal enterprise
applications.
• SQL Server’s ease of use, availability, and Windows operating system inte-
gration make it an easy choice for firms that choose Microsoft products for
their enterprises.
• PostgreSQL is the most advanced open source database, often used by
online gaming applications and Skype, Yahoo!, and MySpace.
• DB2 is widely used in data centers and runs on Linux, UNIX, Windows, and
mainframes.
Trend Toward NoSQL Systems
RDBMSs are still the dominant database engines, but the trend toward NoSQL
(short for “not only SQL”) systems is clear. NoSQL systems increased in popu-
larity by 50 percent from 2013 to 2014. Although NoSQL have existed for as
Online transaction
processing (OLTP) systems
are designed to manage
transaction data, which are
volatile.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 79 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
80 Chapter 3 Data Management, Big Data Analytics, and Records Management
long as relational DBMS, the term itself was not introduced until 2009. That
was when many new systems were developed in order to cope with the unfold-
ing requirements for DBMS—namely, handling big data, scalability, and fault
tolerance for large Web applications. Scalability means the system can increase
in size to handle data growth or the load of an increasing number of concurrent
users. To put it differently, scalable systems efficiently meet the demands of high-
performance computing. Fault tolerance means that no single failure results in
any loss of service.
NoSQL systems are such a heterogeneous group of database systems that
attempts to classify them are not very helpful. However, their general advantages
are these:
• Higher performance
• Easy distribution of data on different nodes, which enables scalability and
fault tolerance
• Greater flexibility
• Simpler administration
Starting in 2010 and continuing through 2014, Microsoft has been working on
the first rewrite of SQL Server’s query execution since Version 7 was released in
1998. The goal is to offer NoSQL-like speeds without sacrificing the capabilities of
a relational database.
With most NoSQL offerings, the bulk of the cost does not lie in acquiring the
database, but rather in implementing it. Data need to be selected and migrated
(moved) to the new database. Microsoft hopes to reduce these costs by offering
migration solutions.
CENTRALIZED
AND DISTRIBUTED
DATABASE
ARCHITECTURE
Databases are centralized or distributed, as shown in Figure 3.9. Both types of data-
bases need one or more backups and should be archived onsite and offsite in case
of a crash or security incident.
Centralized Database Architecture
A centralized database stores all related files in a central location—as you read in
the opening Coca-Cola case. For decades the main database platform consisted of
centralized database files on massive mainframe computers. Benefits of centralized
database configurations include:
1. Better control of data quality. Data consistency is easier when data are kept
in one physical location because data additions, updates, and deletions can be
made in a supervised and orderly fashion.
2. Better IT security. Data are accessed via the centralized host computer, where
they can be protected more easily from unauthorized access or modifi cation.
A major disadvantage of centralized databases, like all centralized systems,
is transmission delay when users are geodispersed. More powerful hardware and
networks compensate for this disadvantage.
Distributed Database Architecture
A distributed database system allows apps on computers and mobiles to access data
from both local and remote databases, as diagrammed in Figure 3.10. Distributed
databases use client/server architecture to process information requests. Computers
and mobile devices accessing the servers are called clients. The databases are stored
on servers that reside in the company’s data centers, a private cloud, or a public cloud.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 80 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.1 Database Management Systems 81
Users
Los Angeles
Users
New York
Users
Kansas City
Users
Chicago
New York
Users
Los Angeles
Los Angeles
Users
Kansas City
Kansas City
Central Location
Central
Location
New York
Users
New York
(a)
(b)
New York
Users
Chicago
Chicago
Figure 3.9 Comparison of centralized and distributed databases.
GARBAGE IN,
GARBAGE OUT
Data collection is a highly complex process that can create problems concerning
the quality of the data being collected. Therefore, regardless of how the data are
collected, they need to be validated so users know they can trust them. Classic
expressions that sum up the situation are “garbage in, garbage out” (GIGO) and
the potentially riskier “garbage in, gospel out.” In the latter case, poor-quality
data are trusted and used as the basis for planning. You have encountered data
safeguards, such as integrity checks, to help improve data quality when you fill in
an online form. For example, the form will not accept an e-mail address that is not
formatted correctly.
Dirty Data Costs and Consequences
Dirty data—that is, poor-quality data—lack integrity and cannot be trusted.
Too often managers and information workers are actually constrained by data
that cannot be trusted because they are incomplete, out of context, outdated,
inaccurate, inaccessible, or so overwhelming that they require weeks to analyze.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 81 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
82 Chapter 3 Data Management, Big Data Analytics, and Records Management
In such situations, the decision maker is facing too much uncertainty to make
intelligent business decisions. The cost of poor-quality data may be expressed
as a formula:
Cost to
Correct
Errors
Cost to
Prevent
Errors
Lost
Business
Cost of Poor-
Quality Data
Examples of these costs include:
• Lost business. Business is lost when sales opportunities are missed, orders
are returned because wrong items were delivered, or errors frustrate and
drive away customers.
• Time spent preventing errors. If data cannot be trusted, then employees
need to spend more time and effort trying to verify information in order to
avoid mistakes.
• Time spent correcting errors. Database staff need to process corrections
to the database. For example, the costs of correcting errors at Urent
Corporation are estimated as follows:
a) Two database staff members spend 25 percent of their workday process-
ing and verifying data corrections each day:
2 people * 25% of 8 hours/day 4 hours/day correcting errors
b) Hourly salaries are $50 per hour based on pay rate and benefits:
$50/hour * 4 hours/day $200/day correcting errors
c) 250 workdays per year:
$200/day * 250 days $50,000/year to correct errors
The costs of poor-quality data spread throughout a company, affecting
systems from shipping and receiving to accounting and customer service. Data
Distributed databases on servers
Manufacturing
Manufacturing
clients
Headquarter
clients
Headquarters
Sales &
Marketing
Sales & marketing clients
Figure 3.10 Distributed database architecture for headquarters, manufacturing,
and sales and marketing.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 82 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.1 Database Management Systems 83
errors typically arise from the functions or departments that generate or create
the data—and not within the IT department. When all costs are considered, the
value of finding and fixing the causes of data errors becomes clear. In a time of
decreased budgets, some organizations may not have the resources for such proj-
ects and may not even be aware of the problem. Others may be spending most of
their time fixing problems, thus leaving them with no time to work on preventing
them.
Bad data are costing U.S. businesses hundreds of billions of dollars a year
and affecting their ability to ride out the tough economic climate. Incorrect
and outdated values, missing data, and inconsistent data formats can cause lost
customers, sales, and revenue; misallocation of resources; and flawed pricing
strategies.
For a particular company, it is difficult to calculate the full cost of poor data
quality and its long-term effects. Part of the difficulty is the time delay between the
mistake and when it is detected. Errors can be very difficult to correct, especially
when systems extend across the enterprise. Another concern is that the impacts of
errors can be unpredictable or serious. For example, the cost of errors due to unre-
liable and incorrect data alone is estimated to be as high as $40 billion annually in
the retail sector (Zynapse, 2010). And, one health-care company whose agents were
working with multiple ISs, but were not updating client details in every IS, saw its
annual expenses increase by $9 million.
Data Ownership and Organizational Politics
Despite the need for high-quality data, organizational politics and technical issues
make that difficult to achieve. The source of the problem is data ownership—that
is, who owns or is responsible for the data. Data ownership problems exist when
there are no policies defining responsibility and accountability for managing data.
Inconsistent data formats of various departments create an additional set of prob-
lems as organizations try to combine individual applications into integrated enter-
prise systems.
The tendency to delegate data-quality responsibilities to the technical teams
who have no control over data quality, as opposed to business users who do have
such control, is another common pitfall that stands in the way of accumulating high-
quality data.
Those who manage a business or part of a business are tasked with trying
to improve business performance and retain customers. Compensation is tied to
improving profitability, driving revenue growth, and improving the quality of cus-
tomer service. These key performance indicators (KPIs) are monitored closely by
senior managers who want to find and eliminate defects that harm performance. It
is strange then that so few managers take the time to understand how performance
is impacted by poor-quality data. Two examples make a strong case for investment
in high-quality data.
Retail banks: For retail bank executives, risk management is the number-
one issue. Disregard for risk contributed to the 2008 financial services meltdown.
Despite risk management strategies, many banks still incur huge losses. Part of the
problem in many banks is that their ISs enable them to monitor risk only at the
product level—mortgages, loans, or credit cards. Product-level risk management
ISs monitor a customer’s risk exposure for mortgages, or for loans, or for credit
cards, and so forth—but not for a customer for all products. With product-level ISs,
a bank cannot see the full risk exposure of a customer. The limitations of these siloed
product-level risks have serious implications for business performance because
bad-risk customers cannot be identified easily, and customer data in the various ISs
may differ. For example, consider what happens when each product-level risk man-
agement IS feeds data to marketing ISs. Marketing may offer bad-risk customers
incentives to take out another credit card or loan that they cannot repay. And since
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 83 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
84 Chapter 3 Data Management, Big Data Analytics, and Records Management
the bank cannot identify its best customers either, they may be ignored and enticed
away by better deals offered by competitors. This scenario illustrates how data own-
ership and data-quality management are critical to risk management. Data defects
and incomplete data can quickly trigger inaccurate marketing and mounting losses.
One retail bank facing these problems lost 16 percent of its mortgage business
within 18 months while losses in its credit card business increased (Ferguson, 2012).
Manufacturing. Many manufacturers are at the mercy of a powerful customer
base—large retailers. Manufacturers want to align their processes with those of
large retail customers to keep them happy. This alignment makes it possible for
a retailer to order centrally for all stores or to order locally from a specific manu-
facturer. Supporting both central and local ordering makes it difficult to plan pro-
duction runs. For example, each manufacturing site has to collect order data from
central ordering and local ordering systems to get a complete picture of what to
manufacture at each site. Without accurate, up-to-date data, orders may go unfilled,
or manufacturers may have excess inventory. One manufacturer who tried to keep
its key retailer happy by implementing central and local ordering could not process
orders correctly at each manufacturing site. No data ownership and lack of control
over how order data flowed throughout business operations had negative impacts.
Conflicting and duplicate business processes at each manufacturing site caused data
errors, leading to mistakes in manufacturing, packing, and shipments. Customers
were very dissatisfied.
These two examples represent the consequences of a lack of data ownership
and data quality. Understanding the impact of mismanaged data makes data owner-
ship and accurate data a higher priority.
Compliance with numerous federal and state regulations relies on rock-solid
data and trusted metrics used for regulatory reporting. Data ownership, data quality,
and formally managed data are high on the agenda of CFOs and CEOs who are held
personally accountable if their company is found to be in violation of regulations.
DATA LIFE CYCLE AND
DATA PRINCIPLES
The data life cycle is a model that illustrates the way data travel through an organi-
zation, as shown in Figure 3.11. The data life cycle begins with storage in a database,
to being loaded into a data warehouse for analysis, then reported to knowledge
workers or used in business apps. Supply chain management (SCM), customer
relationship management (CRM), and e-commerce are enterprise applications that
require up-to-date, readily accessible data to function properly.
Three general data principles relate to the data life cycle perspective and help
to guide IT investment decisions:
1. Principle of diminishing data value. The value of data diminishes as they age.
This is a simple, yet powerful principle. Most organizations cannot operate at
peak performance with blind spots (lack of data availability) of 30 days or
longer. Global fi nancial services institutions rely on near real time data for peak
performance.
Figure 3.11 Data life cycle.
Data Sources
and Databases
Personal
expertise &
judgment
Data
Visualization
SCM
E-commerce
Strategy
Others
CRM
Data AnalysisData Storage Results
Business Analytics
Business
Applications
Internal
Data
External
Data
Data
Warehouse
Data
Marts
Data
Marts
OLAP,
Queries,
EIS, DSS
Data
Mining
Decision
Support
Knowledge
and its
Management
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 84 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.1 Database Management Systems 85
2. Principle of 90/90 data use. According to the 90/90 data-use principle, a majority
of stored data, as high as 90 percent, is seldom accessed after 90 days (except for
auditing purposes). That is, roughly 90 percent of data lose most of their value
after 3 months.
3. Principle of data in context. The capability to capture, process, format, and
distribute data in near real time or faster requires a huge investment in data
architecture (Chapter 2) and infrastructure to link remote POS systems to data
storage, data analysis systems, and reporting apps. The investment can be justi-
fi ed on the principle that data must be integrated, processed, analyzed, and for-
matted into “actionable information.”
MASTER DATA AND
MASTER DATA
MANAGEMENT
As data become more complex and their volumes explode, database performance
degrades. One solution is the use of master data and master data management
(MDM), as introduced in Chapter 2. MDM processes integrate data from various
sources or enterprise applications to create a more complete (unified) view of a cus-
tomer, product, or other entity. Figure 3.12 shows how master data serve as a layer
between transactional data in a database and analytical data in a data warehouse.
Although vendors may claim that their MDM solution creates “a single version of
the truth,” this claim is probably not true. In reality, MDM cannot create a single
unified version of the data because constructing a completely unified view of all
master data is simply not possible.
Master Reference File and Data Entities
Realistically, MDM consolidates data from various data sources into a master refer-
ence file, which then feeds data back to the applications, thereby creating accurate
and consistent data across the enterprise. In IT at Work 3.1, participants in the
health-care supply chain essentially developed a master reference file of its key data
entities. A data entity is anything real or abstract about which a company wants to
collect and store data. Master data entities are the main entities of a company, such
as customers, products, suppliers, employees, and assets.
Each department has distinct master data needs. Marketing, for example, is
concerned with product pricing, brand, and product packaging, whereas production
is concerned with product costs and schedules. A customer master reference file can
feed data to all enterprise systems that have a customer relationship component,
thereby providing a more unified picture of customers. Similarly, a product master
reference file can feed data to all the production systems within the enterprise.
An MDM includes tools for cleaning and auditing the master data elements as
well as tools for integrating and synchronizing data to make them more accessible.
MDM offers a solution for managers who are frustrated with how fragmented and
dispersed their data sources are.
Figure 3.12 An enterprise
has transactional, master, and
analytical data.
Transactional data supports
the applications.
Transactional
Data
Master
Data
Analytical
Data
Enterprise
Data
Master data describes the enterprise’s
business entities upon which
transactions are done and the
dimensions (Customer, Product,
Supplier, Account, and Site), around
which analyses are done.
Analytical data supports
decision making and planning.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 85 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
86 Chapter 3 Data Management, Big Data Analytics, and Records Management
At an insurance company, the cost of processing each claim
is $1, but the average downstream cost due to errors in a
claim is $300. The $300 average downstream costs included
manual handling of exceptions, customer support calls initi-
ated due to errors in claims, and reissuing corrected docu-
ments for any claims processed incorrectly the first time. In
addition, the company faced significant soft costs from
regulatory risk, lost revenues due to customer dissatisfaction,
and overpayment on claims due to claims-processing errors.
These soft costs are not included in the hard cost of $300.
Every day health-care administrators and others through-
out the health-care supply chain waste 24 to 30 percent of
their time correcting data errors. Each transaction error costs
$60 to $80 to correct. In addition, about 60 percent of all
invoices among supply chain partners contain errors, and
each invoice error costs $40 to $400 to reconcile. Altogether,
errors and conflicting data increase supply costs by 3 to
5 percent. In other words, each year billions of dollars are
wasted in the health-care supply chain because of supply
chain data disconnects, which refer to one organization’s IS
not understanding data from another’s IS.
Questions
1. Why are the downstream costs of data errors so high?
2. What are soft costs?
3. Explain how soft costs might exceed hard costs. Give an
example.
IT at Work 3 . 1
Data Errors Increase Costs Downstream
Questions
1. Describe a database and a database management system (DBMS).
2. Explain what an online transaction-processing (OLAP) system does.
3. Why are data in databases volatile?
4. Explain what processes DBMSs are optimized to perform.
5. What are the business costs or risks of poor data quality?
6. Describe the data life cycle.
7. What is the function of master data management (MDM)?
The senior marketing manager of a major U.S. retailer learned that her company
was steadily losing market share to a competitor in many of their profitable seg-
ments. Losses continued even after a sales campaign that combined online promo-
tions with improved merchandizing (Brown, Chui, & Manyika, 2011). To under-
stand the causes, a team of senior managers studied their competitor’s practices.
They discovered that the problems were not simply due to basic marketing tactics,
but ran much deeper. The competitor:
• Had invested heavily in IT to collect, integrate, and analyze data from each
store and sales unit.
• Had linked these data to suppliers’ databases, making it possible to adjust
prices in real time, to reorder hot-selling items automatically, and to shift
items from store to store easily.
• Was constantly testing, integrating, and reporting information instantly
available across the organization—from the store floor to the CFO’s office.
The senior management team realized that their competitor was stealing away
their customers because big data analytics enabled them to pinpoint improvement
3.2 Data Warehouse and Big Data Analytics
Market share is the percent-
age of total sales in a market
captured by a brand, product,
or company.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 86 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.2 Data Warehouse and Big Data Analytics 87
opportunities across the supply chain—from purchasing to in-store availabil-
ity management. Specifically, the competitor was able to predict how customers
would behave and used that knowledge to be prepared to respond quickly. This
case is an example of what researchers have learned. According to the McKinsey
Global Institute (MGI), big data analytics have helped companies outperform their
competitors. MGI estimates that retailers using big data analytics increase their
operating margin by more than 60 percent. Leading retailers, insurance, and
financial services use big data to capture market share away from local competi-
tors (Breuer, Forina, & Moulton, 2013). An IBM study shows that companies with
advanced business analytics and optimization can experience 20 times more profit
growth and 30 percent higher return on invested capital (ibm.com, 2011).
In this section, you will learn about the value, challenges, and technologies
involved in putting data and analytics to use to support decisions and action. The four
V’s of analytics—variety, volume, velocity, and veracity—are described in Table 3.2.
Big data can have a dramatic impact on the success of any enterprise, or they
can be a low-contributing major expense. However, success is not achieved with
technology alone. Many companies are collecting and capturing huge amounts of
data, but spending very little effort to ensure the veracity and value of data captured
at the transactional stage or point of origin. Emphasis in this direction will not only
increase confidence in the datasets, but also significantly reduce the efforts for ana-
lytics and enhance the quality of decision making. Success depends also on ensuring
that you avoid invalid assumptions, which can be done by testing the assumptions
during analysis.
Operating margin is a
measure of the percent of a
company’s revenue left over
after paying for its variable
costs, such as wages and
raw materials. An increasing
margin means the company
is earning more per dollar of
sales. The higher the operating
margin, the better.
TABLE 3.2 Four V’s of Data Analytics
1. Variety: The analytic environment has expanded from pulling data from enter-
prise systems to include big data and unstructured sources.
2. Volume: Large volumes of structured and unstructured data are analyzed.
3. Velocity: Speed of access to reports that are drawn from data defi nes the differ-
ence between effective and ineffective analytics.
4. Veracity: Validating data and extracting insights that managers and workers
can trust are key factors of successful analytics. Trust in analytics has grown
more diffi cult with the explosion of data sources.
Managing and Interpreting Big Data Are in Highest Demand
The IT job market is on the rise, and top jobs include
anything in big data, mobile, cloud, or IT security.
TechRepublic held a roundtable of IT executives and
tech recruiters to learn about the latest hiring trends.
Here are three forecasts (Hammond, 2014):
• Pete Kazanjy, co-founder of TalentBin, stated
there “will be the continued uptick in demand
for technical talent, but more broadly across the
entire economy, and not just siloed in its own tech
sector. Technology is ceasing to be a sector on its
own, and is instead becoming more critical in every
industry.”
• Tendu Yogurtcu, vice president of engineering at
Syncsort, explained: “With the rising popularity of
Hadoop, positions are geared towards filling these
roles, with lots of interest placed on big data and data
mining and analysis. Most of the new hires are recent
graduates, since they embody a lot of creativity and
forward thinking, both qualities needed in the indus-
try of big data.”
CAREER INSIGHT 3 . 1 JOBS
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 87 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
88 Chapter 3 Data Management, Big Data Analytics, and Records Management
TORTURE DATA LONG
ENOUGH AND IT WILL
CONFESS . . . BUT MAY
NOT TELL THE TRUTH
As someone posted in a Harvard Business Review (HBR) blog, “If you torture
the data long enough, it will confess” (Neill, 2013). That is, analytics will produce
results, but those results may be meaningless or misleading. For example, some
believe that Super Bowl results in February predict whether the stock market will
go up or down that year. If the National Football Conference (NFC) wins, the mar-
ket goes up; otherwise, stocks take a dive. Looking at results over the past 30 years,
most often the NFC has won the Super Bowl and the market has gone up. Does this
mean anything? No.
HUMAN EXPERTISE
AND JUDGMENT ARE
NEEDED
Human expertise and judgment are needed to interpret the output of analytics
(refer to Figure 3.1). Data are worthless if you cannot analyze, interpret, under-
stand, and apply the results in context. This brings up several challenges:
• Data need to be prepared for analysis. For example, data that are incom-
plete or duplicated need to be fixed.
• Dirty data degrade the value of analytics. The “cleanliness” of data is very
important to data mining and analysis projects. Analysts have complained
that data analytics is like janitorial work because they spend so much time
on manual, error-prone processes to clean the data. Large data volumes and
variety mean more data that are dirty and harder to handle.
• Data must be put into meaningful context. If the wrong analysis or datasets
are used, the output would be nonsense, as in the example of the Super Bowl
winners and stock market performance. Stated in reverse, managers need
context in order to understand how to interpret traditional and big data.
IT at Work 3.2 describes how big data analytics, collaboration, and human
expertise have transformed the new drug development process.
• Robert Noble, director of software of engineering
at WhitePages, gave an overview of the recruiting
issues: “The demand for tech and software talent
is exploding. A lot of companies have been aggres-
sive and creative to compete for candidates in these
fields. For instance, besides compensation and the
technical work of the job role, companies are using
culture as a key differentiator. They are not only
talking about the company, they are also talking
about the perks outside of work, and benefits, like
cool team events, providing free haircuts, massages,
food and more.”
Drug development is a high-risk business. Almost 90 percent
of new drugs ultimately fail. One of the challenges has been
the amount, variety, and complexity of the data that need to
be systematically analyzed. Big data technologies and private–
public partnerships have made biomedical analytics feasible.
New Drug Development Had Been Slow
and Expensive
Biotechnology advances have produced massive data on the
biological causes of disease. However, analyzing these data
and converting discoveries into treatments are much more
difficult. Not all biomedical insights lead to effective drug
targets, and choosing the wrong target leads to failures late in
the drug development process, costing time, money, and lives.
Developing a new drug—from early discovery through Food
and Drug Administration (FDA) approval—takes over a decade
and has a failure rate of more than 95 percent (Figure 3.13). As
a consequence, each success ends up costing more than $1
billion.
IT at Work 3 . 2
Researchers Use Genomics and Big Data in Drug Discovery
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 88 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.2 Data Warehouse and Big Data Analytics 89
For example, by the time Pfizer Inc., Johnson & Johnson,
and Eli Lilly & Co. announced their new drugs had only lim-
ited benefit for Alzheimer’s patients in late-stage testing, the
industry had spent more than $30 billion researching amyloid
plaque in the brain.
Cutting Risk of Failure
Drug makers, governments, and academic researchers have
partnered to improve the odds of drug success. Partnerships
bring together the expertise of scientists from biology,
chemistry, bioinformatics, genomics, and big data. They are
using big data to identify biological targets for drugs and
eliminate failures before they reach the human testing stage.
GlaxoSmithKline, the European Bioinformatics Institute (EBI),
and the Wellcome Trust Sanger Institute established the Centre
for Therapeutic Target Validation (CTTV) near Cambridge,
England. CTTV partners combine cutting-edge genomics with
the ability to collect and analyze massive amounts of biological
data. By not developing drugs that target the wrong biological
pathways, they avoid wasting billions of research dollars.
Janet Thornton, director of the EBI, explained that
maximizing “our use of ‘big data’ in the life sciences is
critical for solving some of society’s most pressing problems”
(Kitamura, 2014). With biology now a data-driven discipline,
collaborations such as CTTV are needed to improve efficien-
cies, cut costs, and provide the best opportunities for suc-
cess. Other private–public partnerships that had formed to
harness drug research and big data include:
• Accelerating Medicines Partnership and U.S. National
Institutes of Health (NIH). In February 2014 the NIH
announced that the agency, 10 pharmaceutical companies,
and nonprofit organizations were investing $230 million in
the Accelerating Medicines Partnership.
• Target Discovery Institute and Oxford University.
Oxford University opened the Target Discovery Institute in
2013. Target Discovery helps to identify drug targets and
molecular interactions at a critical point in a disease-
causing pathway—that is, when those diseases will
respond to drug therapy. Researchers try to understand
complex biological processes by analyzing image data
that have been acquired at the microscopic scale.
“By changing our business model, taking a more open-
minded approach to sharing information and forging collab-
orations like the CTTV, we believe there is an opportunity to
accelerate the development of innovative new medicines,”
said Patrick Vallance, president of Glaxo’s pharmaceuticals
research and development (Kitamura, 2014).
Sources: Compiled from Kitamura (2014), NIH (2014), and HealthCanal
(2014).
Questions
1. What are the consequences of new drug development
failures?
2. What factors have made biomedical analytics feasible?
Why?
3. Large-scale big data analytics are expensive. How can the
drug makers justify investments in big data?
4. Why would drug makers such as Glaxo and Pfizer be
willing to share data given the fierce competition in their
industry?
Figure 3.13 An estimated 90 to 95 percent of new
drugs that undergo clinical trials ultimately fail. These
costs drive up the prices of drugs that are a success—
to an average of $1 billion.
©
a
ny
ai
va
no
va
/S
hu
tt
er
st
oc
k
ENTERPRISE DATA
WAREHOUSE AND
DATA MART
Data warehouses store data from various source systems and databases across
an enterprise in order to run analytical queries against huge datasets collected
over long time periods. Warehouses are the primary source of cleansed data
for analysis, reporting, and BI. Often the data are summarized in ways that enable
quick responses to queries. For instance, query results can reveal changes in cus-
tomer behavior and drive the decision to redevelop the advertising strategy.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 89 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
90 Chapter 3 Data Management, Big Data Analytics, and Records Management
Data warehouses that pull together data from disparate sources and databases
across an entire enterprise are called enterprise data warehouses (EDW). Tech
Note 3.2 summarizes key characteristics of the two types of data stores.
The high cost of data warehouses can make them too expensive for a company
to implement. Data marts are lower-cost, scaled-down versions that can be imple-
mented in a much shorter time, for example, in less than 90 days. Data marts serve
a specific department or function, such as finance, marketing, or operations. Since
they store smaller amounts of data, they are faster, easier to use, and navigate.
TECH NOTE 3.2 Summary of Differences Between Databases and Data Warehouses
Databases are:
• Designed and optimized to ensure that every transaction gets recorded and
stored immediately.
• Volatile because data are constantly being updated, added, or edited.
• OLTP systems.
Data warehouses are:
• Designed and optimized for analysis and quick response to queries.
• Nonvolatile. This stability is important to being able to analyze the data and
make comparisons. When data are stored, they might never be changed or
deleted in order to do trend analysis or make comparisons with newer data.
• OLAP systems.
• Subject-oriented, which means that the data captured are organized to have
similar data linked together.
Procedures to Prepare EDW Data for Analytics
Consider a bank’s database. Every deposit, withdrawal, loan payment, or other
transaction adds or changes data. The volatility caused by constant transaction
processing makes data analysis difficult—and the demands to process millions of
transactions per second consume the database’s processing power. In contrast, data
in warehouses are relatively stable, as needed for analysis. Therefore, select data
are moved from databases to a warehouse. Specifically, data are:
1. Extracted from designated databases.
2. Transformed by standardizing formats, cleaning the data, integrating them.
3. Loaded into a data warehouse.
These three procedures—extract, transform, and load—are referred to by their
initials ETL (Figure 3.14). In a warehouse, data are read-only; that is, they do not
change until the next ETL.
Three technologies involved in preparing raw data for analytics include ETL,
change data capture (CDC), and data deduplication (“deduping the data”). CDC
processes capture the changes made at data sources and then apply those changes
throughout enterprise data stores to keep data synchronized. CDC minimizes the
resources required for ETL processes by only dealing with data changes. Deduping
processes remove duplicates and standardize data formats, which helps to minimize
storage and data synch.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 90 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.2 Data Warehouse and Big Data Analytics 91
BUILDING A DATA
WAREHOUSE
Figure 3.15 diagrams the process of building and using a data warehouse. The orga-
nization’s data are stored in operational systems (left side of the figure). Not all data
are transferred to the data warehouse. Frequently, only summary data are trans-
ferred. The warehouse organizes the data in multiple ways—by subject, functional
area, vendor, and product. As shown, the data warehouse architecture defines the
flow of data that starts when data are captured by transaction systems; the source
data are stored in transactional (operational) databases; ETL processes move data
from databases into data warehouses or data marts, where the data are available for
access, reports, and analysis.
REAL TIME SUPPORT
FROM ACTIVE DATA
WAREHOUSE
Early data warehouse technology primarily supported strategic applications that
did not require instant response time, direct customer interaction, or integration
with operational systems. ETL might have been done once per week or once per
month. But, demand for information to support real time customer interaction and
operations leads to real time data warehousing and analytics—known as an active
data warehouse (ADW). Massive increases in computing power, processing speeds,
and memory made ADW possible. ADW are not designed to support executives’
Business Intelligence Management
Analytics
Reporting
Queries
Data Mining
InformationData Marts
Data Mart
Data
Warehouse
Data
Warehouse
Business
Intelligence
Environment
ETL
processes
Transaction
Systems
Operational
Databases
Figure 3.15 Database, data warehouse and marts, and BI architecture.
Figure 3.14 Data enter
databases from transaction
systems. Data of interest are
extracted from databases,
transformed to clean and
standardize them, and
then loaded into a data
warehouse. These three
processes are called ETL. ©
Va
lle
p
u/
Sh
ut
te
rs
to
ck
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 91 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
92 Chapter 3 Data Management, Big Data Analytics, and Records Management
strategic decision making, but rather to support operations. For example, shipping
companies like DHL use huge fleets of trucks to move millions of packages. Every
day and all day, operational managers make thousands of decisions that affect the
bottom line, such as: “Do we need four trucks for this run?” “With two drivers
delayed by bad weather, do we need to bring in extra help?” Traditional data ware-
housing is not suited for immediate operational support, but active data warehous-
ing is. For example, companies with an ADW are able to:
• Interact with a customer to provide superior customer service.
• Respond to business events in near real time.
• Share up-to-date status data among merchants, vendors, customers, and
associates.
Here are some examples of how two companies use ADW:
Capital One. Capital One uses its ADW to track each customer’s “profitability
score” to determine the level of customer service to provide that person. Higher-
cost personalized service is only given to those with high scores. For instance, when
a customer calls Capital One, he or she is asked to enter a credit card number, which
is linked to a profitability score. Low-profit customers get a voice response unit
only; high-profit customers are connected to a live customer service representative
(CSR) because the company wants to minimize the risk of losing those customers.
Travelocity. If you use Travelocity, an ADW is finding the best travel deals
especially for you. The goal is to use “today’s data today” instead of “yesterday’s
data today.” The online travel agency’s ADW analyzes your search history and des-
tinations of interest; then predicts travel offers that you would most likely purchase.
Offers are both relevant and timely to enhance your experience, which helps close
the sale in a very competitive market. For example, when a customer is searching
flights and hotels in Las Vegas, Travelocity recognizes the interest—the customer
wants to go to Vegas. The ADW searches for the best-priced flights from all car-
riers, builds a few package deals, and presents them in real time to the customer.
When customers see a personalized offer they are already interested in, the ADW
helps generate a better customer experience. The real time data-driven experience
increases the conversion rate and sales.
Data warehouse content can be delivered to decision makers throughout the
enterprise via the cloud or company-owned intranets. Users can view, query, and
analyze the data and produce reports using Web browsers. These are extremely
economical and effective data delivery methods.
Data Warehousing Supports Action
as Well as Decisions
Many organizations built data warehouses because they were frustrated with incon-
sistent data that could not support decisions or actions. Viewed from this perspec-
tive, data warehouses are infrastructure investments that companies make to support
ongoing and future operations, such as:
• Marketing and sales. Keeps people informed of the status of products, mar-
keting program effectiveness, and product line profitability; and allows them
to take intelligent action to maximize per-customer profitability.
• Pricing and contracts. Calculates costs accurately in order to optimize
pricing of a contract. Without accurate cost data, prices may be below or
too near to cost; or prices may be uncompetitive because they are too high.
• Forecasting. Estimates customer demand for products and services.
• Sales. Calculates sales profitability and productivity for all territories
and regions; analyzes results by geography, product, sales group, or
individual.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 92 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.2 Data Warehouse and Big Data Analytics 93
• Financial. Provides real time data for optimal credit terms, portfolio analysis,
and actions that reduce risk or bad debt expense.
Table 3.3 summarizes several successful applications of data warehouses.
BIG DATA ANALYTICS
AND DATA DISCOVERY
Data analytics help users discover insights. These insights combined with human
expertise enable people to recognize meaningful relationships more quickly or easily;
and furthermore, realize the strategic implications of these situations. Imagine try-
ing to make sense of the fast and vast data generated by social media campaigns on
Facebook or by sensors attached to machines or objects. Low-cost sensors make it
possible to monitor all types of physical things—while analytics make it possible to
understand those data in order to take action in real time. For example, sensors data
can be analyzed in real time:
• To monitor and regulate the temperature and climate conditions of perish-
able foods as they are transported from farm to supermarket.
• To sniff for signs of spoilage of fruits and raw vegetables and detect the risk
of E. coli contamination.
• To track the condition of operating machinery and predict the probability
of failure.
• To track the wear of engines and determine when preventive maintenance
is needed.
TABLE 3.3 Data Warehouse Applications by Industry
Industry Applications
Airline Crew assignment, aircraft deployment, analysis of
route profi tability, customer loyalty promotions
Banking and fi nancial Customer service, trend analysis, product and
service services promotions, reduction of IS
expenses
Credit card Customer service, new information service for a
fee, fraud detection
Defense contracts Technology transfer, production of military
applications
E-business Data warehouses with personalization capabilities,
marketing/shopping preferences allowing for
up-selling and cross-selling
Government Reporting on crime areas, homeland security
Health care Reduction of operational expenses
Investment and insurance Risk management, market movements analysis,
customer tendencies analysis, portfolio
management
Retail chain Trend analysis, buying pattern analysis, pricing
policy, inventory control, sales promotions, optimal
distribution channel decision
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 93 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
94 Chapter 3 Data Management, Big Data Analytics, and Records Management
Machine-generated sensor data are becoming a larger proportion of big data
(Figure 3.16), according to a research report by IDC (Lohr, 2012b). It is predicted
that these data will increase to 42 percent of all data by 2020, representing a signifi-
cant increase from the 11 percent level of 2005.
The value of analyzing machine data was recognized by General Electric (GE)
Company, the United States’ largest industrial company. Since 2011 GE has been put-
ting sensors on everything from gas turbines to hospital beds. GE’s mission is to design
the software for gathering data, and the algorithms for analyzing them to optimize cost
savings and productivity gains. Across the industries that it covers, GE estimates effi-
ciency opportunities will slash costs by as much as $150 billion (Lohr, 2012a).
Federal health reform efforts have pushed health-care organizations toward
big data and analytics. These organizations are planning to use big data analytics to
support revenue cycle management, resource utilization, fraud prevention, health
management, and quality improvement.
Hadoop and MapReduce
Big data volumes exceed the processing capacity of conventional database
infrastructures. A widely used processing platform is Apache Hadoop (hadoop.
apache.org/). It places no conditions on the structure of the data it can process.
Hadoop distributes computing problems across a number of servers. Hadoop
implements MapReduce in two stages:
1. Map stage: MapReduce breaks up the huge dataset into smaller subsets; then dis-
tributes the subsets among multiple servers where they are partially processed.
2. Reduce stage: The partial results from the map stage are then recombined and
made available for analytic tools.
Figure 3.16 Machine-
generated data from physical
objects are becoming a much
larger portion of big data
and analytics. ©
K
itt
ic
ha
is
/i
St
oc
kp
ho
to
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 94 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.2 Data Warehouse and Big Data Analytics 95
To store data, Hadoop has its own distributed file system, HaDoop File Systems
(HDFS), which functions in three stages:
• Loads data into HDFS.
• Performs the MapReduce operations.
• Retrieves results from HDFS.
Figure 3.17 diagrams how Facebook uses database technology and Hadoop. IT
at Work 3.3 describes how First Wind has applied big data analytics to improve the
operations of its wind farms and to support sustainability of the planet by reducing
environmentally damaging carbon emissions.
Figure 3.17 Facebook’s
MySQL database and
Hadoop technology provide
customized pages for its
members.
Wind power can play a major role in meeting America’s ris-
ing demand for electricity—as much as 20 percent by 2030.
Using more domestic wind power would reduce the nation’s
dependence on foreign sources of natural gas and also
decrease carbon dioxide (CO2) emissions that contribute to
adverse climate change.
First Wind is an independent North American renew-
able energy company focused on the development, financ-
ing, construction, ownership, and operation of utility-scale
power projects in the United States. Based in Boston, First
Wind has developed and operates 980 megawatts (MW) of
generating capacity at 16 wind energy projects in Maine,
New York, Vermont, Utah, Washington, and Hawaii. First
Wind has a large network of sensors embedded in the wind
turbines, which generate huge volumes of data continu-
ously. The data are transmitted in real time and analyzed
on a 24/7 real time basis to understand the performance of
each wind turbine.
Sensors collect massive amounts of data on the tem-
perature, wind speeds, location, and pitch of the blades.
The data are analyzed to study the operation of each turbine
in order to adjust them to maximum efficiency. By analyzing
sensor data, highly refined measurements of wind speeds
are possible. In wintry conditions, turbines can detect when
they are icing up, and speed up or change pitch to knock off
the ice. In the past, when it was extremely windy, turbines in
the entire farm had been turned off to prevent damage from
rotating too fast. Now First Wind can identify the specific
portion of turbines that need to be shut down. Based on
certain alerts, decisions often need to be taken within a few
seconds.
Upgrades on 123 turbines on two wind farms have
improved energy output by 3 percent, or about 120 megawatt
hours per turbine per year. That improvement translates to
$1.2 million in additional revenue a year from these two
farms.
Sources: Compiled from Lohr (2012a), FirstWind.com (2014), and U.S.
Department of Energy (2008).
Questions
1. What are the benefits of big data analytics to First Wind?
2. What are the benefits of big data analytics to the environ-
ment and the nation?
3. How do big data analytics impact the performance of
wind farms?
IT at Work 3 . 3
Industrial Project Relies on Big Data Analytics
MySQL databases capture and
store Facebook’s data.
Results are transferred back into
MySQL for use in pages that are
loaded for members.
Members see customized Facebook
pages.
Data are loaded into Hadoop where
processing occurs, such as identifying
recommendations for you based on
your friends’ interests.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 95 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
96 Chapter 3 Data Management, Big Data Analytics, and Records Management
Questions
1. Why are human expertise and judgment important to data analytics?
Give an example.
2. What is the relationship between data quality and the value of analytics?
3. Why do data need to be put into a meaningful context?
4. What are the differences between databases and data warehouses?
5. Explain ETL and CDC.
6. What is an advantage of an active data warehouse (ADW)?
7. Why might a company invest in a data mart?
8. How can manufacturers and health care benefi t from data analytics?
9. Explain how Hadoop implements MapReduce in two stages.
As you read, DBMSs support queries to extract data or get answers from huge
databases. But in order to perform queries, you must first know what to ask for or
what you want answered. In data mining and text mining, it is the opposite. Data
and text mining are used to discover knowledge that you did not know existed in
the databases.
Business analytics describes the entire function of applying technologies, algo-
rithms, human expertise, and judgment. Data and text mining are specific analytic
techniques.
3.3 Data and Text Mining
CREATING BUSINESS
VALUE
Enterprises invest in data mining tools to add business value. Business value falls
into three categories, as shown in Figure 3.18.
Here are brief cases illustrating the types of business value created by data and
text mining.
1. Using pattern analysis, Argo Corporation, an agricultural equipment manufacturer
based in Georgia, was able to optimize product confi guration options for farm
machinery and real time customer demand to determine the optimal base confi gu-
rations for its machines. As a result, Argo reduced product variety by 61 percent
and cut days of inventory by 81 percent while still maintaining its service levels.
2. The mega-retailer Walmart wanted its online shoppers to fi nd what they were
looking for faster. Walmart analyzed clickstream data from its 45 million monthly
online shoppers; then combined that data with product and category-related
popularity scores. The popularity scores had been generated by text mining the
retailer’s social media streams. Lessons learned from the analysis were integrated
into the Polaris search engine used by customers on the company’s website.
Polaris has yielded a 10 to 15 percent increase in online shoppers completing a
purchase, which equals roughly $1 billion in incremental online sales.
3. McDonald’s bakery operation replaced manual equipment with high-speed
photo analyses to inspect thousands of buns per minute for color, size, and sesame
seed distribution. Automatically, ovens and baking processes adjust instantly
to create uniform buns and reduce thousands of pounds of waste each year.
Another food products company also uses photo analyses to sort every french
fry produced in order to optimize quality.
4. Infi nity Insurance discovered new insights that it applied to improve the per-
formance of its fraud operation. The insurance company text mined years of
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 96 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.3 Data and Text Mining 97
adjuster reports to look for key drivers of fraudulent claims. As a result, the
company reduced fraud by 75 percent, and eliminated marketing to customers
with a high likelihood of fraudulent claims.
DATA AND TEXT
MINING
Data mining software enables users to analyze data from various dimensions or
angles, categorize them, and find correlations or patterns among fields in the data
warehouse. Up to 75 percent of an organization’s data are nonstructured word-
processing documents, social media, text messages, audio, video, images and diagrams,
faxes and memos, call center or claims notes, and so on. Text mining is a broad
category that involves interpreting words and concepts in context. Any customer
becomes a brand advocate or adversary by freely expressing opinions and attitudes
that reach millions of other current or prospective customers on social media. Text
mining helps companies tap into the explosion of customer opinions expressed
online. Social commentary and social media are being mined for sentiment analysis
or to understand consumer intent. Innovative companies know they could be more
successful in meeting their customers’ needs, if they just understood them better.
Tools and techniques for analyzing text, documents, and other nonstructured con-
tent are available from several vendors.
Combing Data and Text Mining
Combining data and text mining can create even greater value. Palomäki and
Oksanen (2012) pointed out that mining text or nonstructural data enables organi-
zations to forecast the future instead of merely reporting the past. They also noted
that forecasting methods using existing structured data and nonstructured text from
both internal and external sources provide the best view of what lies ahead.
Figure 3.18 Business value
falls into three buckets.
Making more informed decisions at the time they need to be made
Discovering unknown insights, patterns, or relationships
Automating and streamlining or digitizing business processes
The Defense Advanced Research Projects Agency (DARPA)
was established in 1958 to prevent strategic surprise from
negatively impacting U.S. national security and to create stra-
tegic surprise for U.S. adversaries by maintaining the techno-
logical superiority of the U.S. military. One DARPA office is
the Information Innovation Office (I2O). I2O aims to ensure
U.S. technological superiority in all areas where information
can provide a decisive military advantage. This includes intel-
ligence, surveillance, reconnaissance, and operations support.
Figure 3.19 is an example. Nexus 7 is one of DARPA’s intel-
ligence systems.
Nexus 7, Data Mining System
Nexus 7 is a massive data mining system put into use by the
U.S. military in Afghanistan to understand Afghan society,
and to look for signs of weakness or instability. The classified
program ties together “everything from spy radars to fruit
prices” in order to read the Afghan social situation and help
IT at Work 3 . 4
U.S. Military Uses Data Mining Spy Machine for Cultural Intelligence
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 97 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
98 Chapter 3 Data Management, Big Data Analytics, and Records Management
the U.S. military plot its strategy. DARPA describes Nexus
7 as both a breakthrough data analysis tool and an oppor-
tunity to move beyond its traditional, long-range research
role into a more active wartime mission. Nexus 7 gathers
information that can reveal exactly where a town is working
and where it is broken; and where the traffic piles up and
where it flows free.
Cultural Intelligence
On the military’s classified network, DARPA technologists
describe Nexus 7 as far-reaching and revolutionary, taking
data from many agencies to produce population-centric,
cultural intelligence. For example, Nexus 7 searches the
vast U.S. spy apparatus to figure out which communities in
Afghanistan are falling apart and which are stabilizing, which
are loyal to the government in Kabul, and which are falling
under the influence of militants.
A small Nexus 7 team is currently working in Afghanistan
with military-intelligence officers, while a much larger group
in Virginia with a “large-scale processing capacity” handles
the bulk of the data crunching, according to DARPA. “Data
in the hands of some of the best computer scientists working
side by side with operators provides useful insights in ways
that might not have otherwise been realized” (Shachtman,
2011).
Sources: Compiled from DARPA.mil (2012), Shachtman (2011), and
Defense Systems (2011).
Questions
1. What is Nexus 7?
2. How does data mining help I2O achieve its mission?
3. What are Nexus 7’s data sources?
4. According to DARPA, what benefit does Nexus 7 provide
that could not be realized without it?
Text Analytics Procedure
With text analytics, information is extracted from large quantities of various types
of textual information. The basic steps involved in text analytics include:
1. Exploration. First, documents are explored. This might occur in the form of sim-
ple word counts in a document collection, or by manually creating topic areas to
categorize documents after reading a sample of them. For example, what are the
major types of issues (brake or engine failure) that have been identifi ed in recent
automobile warranty claims? A challenge of the exploration effort is misspelled
or abbreviated words, acronyms, or slang.
2. Preprocessing. Before analysis or the automated categorization of content, the
text may need to be preprocessed to standardize it to the extent possible. As in
traditional analysis, up to 80 percent of preprocessing time can be spent preparing
and standardizing the data. Misspelled words, abbreviations, and slang may need
to be transformed into consistent terms. For instance, BTW would be standard-
ized to “by the way” and “left voice message” could be tagged as “lvm.”
3. Categorizing and Modeling. Content is then ready to be categorized. Catego-
rizing messages or documents from information contained within them can be
achieved using statistical models and business rules. As with traditional model
development, sample documents are examined to train the models. Additional
documents are then processed to validate the accuracy and precision of the
model, and fi nally new documents are evaluated using the fi nal model (scored).
Models can then be put into production for the automated processing of new
documents as they arrive.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 98 11/7/14 7:52 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.4 Business Intelligence 99
Quicken Loans, Inc. is the largest online mortgage lender and second largest overall
retail lender in the United States. The Detroit-based company closed more than
$70 billion in home loans in 2012, which was more than double the $30 billion figure
in 2011. In 2013 Quicken Loans continued its explosive growth, closing a company
record $80 billion in home loan volume. The company also grew its loan servicing
capabilities to become the 11th largest mortgage servicer in the nation, with more
than $138 billion in home loans in its portfolio.
In 2014 FORTUNE Magazine ranked Quicken Loans one of the top 5 places to
work nationwide, which marked the 11th consecutive year it ranked in the top 30 of
Fortune’s benchmark workplace culture study. For the fourth consecutive year, the
company was named by J.D. Power as the highest in customer satisfaction among
all home loan lenders in America.
One key success factor is BI. At the 2013 Data Warehousing Institute’s (TDWI)
Best Practices Awards that recognized companies for their world-class BI and data
warehousing solutions, Quicken managers explained:
This growth can be attributed to the success of our online lending plat-
form. Our scalable, technology-driven loan platform has allowed us to
handle a large surge in loan applications while keeping closing times for
the majority of our loans at 30 days or less. (TDWI, 2013)
Using BI, the company has increased the speed from loan application to close,
which allows it to meet client needs as thoroughly and quickly as possible. Over
almost a decade, performance management has evolved from a manual process of
report generation to BI-driven dashboards and user-defined alerts that allow busi-
ness leaders to proactively deal with obstacles and identify opportunities for growth
and improvement.
The field of BI started in the late 1980s and has been a key to competitive
advantage across industries and in enterprises of all sizes. What started as a tool to
support sales, marketing, and customer service departments has widely evolved into
an enterprisewide strategic platform. While BI systems are used in the operational
management of divisions and business processes, they are also used to support
strategic corporate decision making. The dramatic change that has taken effect
over the last few years is the growth in demand for operational intelligence across
multiple systems and businesses—increasing the number of people who need access
to increasing amounts of data. Complex and competitive business conditions do not
leave much slack for mistakes.
3.4 Business Intelligence
Text analytics can help identify the ratio of positive/negative posts relating to
the promotion. It can be a powerful validation tool to complement other primary
and secondary customer research and feedback management initiatives. Companies
that improve their ability to navigate and text mine the boards and blogs relevant
to their industry are likely to gain a considerable information advantage over their
competitors.
Questions
1. Describe data mining.
2. How does data mining generate or provide value? Give an example.
3. What is text mining?
4. Explain the text mining procedure.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 99 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
100 Chapter 3 Data Management, Big Data Analytics, and Records Management
BUSINESS BENEFITS
OF BI
BI provides data at the moment of value to a decision maker—enabling it to
extract crucial facts from enterprise data in real time or near real time. A BI solu-
tion with a well-designed dashboard, for example, provides retailers with better
visibility into inventory to make better decisions about what to order, how much,
and when in order to prevent stock-outs or minimize inventory that sits on ware-
house shelves.
Companies use BI solutions to determine what questions to ask and find
answers to them. BI tools integrate and consolidate data from various internal and
external sources and then process them into information to make smart decisions.
BI answers questions such as these: Which products have the highest repeat sales
rate in the last six months? Do customer likes on Facebook relate to product pur-
chase? How does the sales trend break down by product group over the last five
years? What do daily sales look like in each of my sales regions?
According to TDWI, BI “unites data, technology, analytics, and human knowl-
edge to optimize business decisions and ultimately drive an enterprise’s success.
BI programs usually combine an enterprise data warehouse and a BI platform or
tool set to transform data into usable, actionable business information” (TDWI,
2014). For many years, managers have relied on business analytics to make better-
informed decisions. Multiple surveys and studies agree on BI’s growing importance
in analyzing past performance and identifying opportunities to improve future
performance.
COMMON CHALLENGES:
DATA SELECTION AND
QUALITY
Companies cannot analyze all of their data—and much of them would not add
value. Therefore, an unending challenge is how to determine which data to use for
BI from what seems like unlimited options (Schroeder, 2013). One purpose of a
BI strategy is to provide a framework for selecting the most relevant data without
limiting options to integrate new data sources. Information overload is a major
problem for executives and for employees. Another common challenge is data quality,
particularly with regard to online information, because the source and accuracy
might not be verifiable.
ALIGNING BUSINESS
STRATEGY WITH BI
STRATEGY
Reports and dashboards are delivery tools, but they may not be delivering business
intelligence. To get the greatest value out of BI, the CIO needs to work with the
CFO and other business leaders to create a BI governance program whose mission
is to achieve the following (Acebo et al., 2013):
1. Clearly articulate business strategies.
2. Deconstruct the business strategies into a set of specifi c goals and objectives—
the targets.
3. Identify the key performance indicators (KPIs) that will be used to measure
progress toward each target.
4. Prioritize the list of KPIs.
5. Create a plan to achieve goals and objectives based on the priorities.
6. Estimate the costs needed to implement the BI plan.
7. Assess and update the priorities based on business results and changes in busi-
ness strategy.
After completing these activities, BI analysts can identify the data to use in BI
and the source systems. This is a business-driven development approach that starts
with a business strategy and work backward to identify data sources and the data
that need to be acquired and analyzed.
Businesses want KPIs that can be utilized by both departmental users and
management. In addition, users want real time access to these data so that they
can monitor processes with the smallest possible latency and take corrective action
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 100 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.4 Business Intelligence 101
whenever KPIs deviate from their target values. To link strategic and operational
perspectives, users must be able to drill down from highly consolidated or summa-
rized figures into the detailed numbers from which they were derived to perform
in-depth analyses.
BI ARCHITECTURE
AND ANALYTICS
BI architecture is undergoing technological advances in response to big data and
the performance demands of end-users (Watson, 2012). BI vendors are facing the
challenges of social, sensor, and other newer data types that must be managed
and analyzed. One technology advance that can help handle big data is BI in the
cloud. Figure 3.19 lists the key factors contributing to the increased use of BI. It
can be hosted on a public or private cloud. With a public cloud, a service provider
hosts the data and/or software that are accessed via an Internet connection. For
private clouds, the company hosts its own data and software, but uses cloud-based
technologies.
For cloud-based BI, a popular option offered by a growing number of BI tool
vendors is software as a service (SaaS). MicroStrategy offers MicroStrategy Cloud,
which provides fast deployment with reduced project risks and costs. This cloud
approach appeals to small and midsize companies that have limited IT staff and
want to carefully control costs. The potential downsides include slower response
times, security risks, and backup risks.
Competitive Analytics in Practice: CarMax
CarMax, Inc. is the nation’s largest retailer of used cars and for a decade has
remained one of FORTUNE Magazine’s 100 Best Companies to Work For. CarMax
was the fastest retailer in U.S. history to reach $1 billion in revenues. In 2013 the
company had $11 billion in revenues, representing a 9.6 percent increase above the
Figure 3.19 Four factors
contributing to increased use
of BI.
Figure 3.20 CarMax is the
United States’ largest used-
car retailer and a Fortune 500
company.
have created demand for
effortless 24/7 access to
insights.
Smart Devices
Everywhere
when they provide insight
that supports decisions
and action.
Data are Big
Business
help to ask questions that
were previously unknown
and unanswerable.
Advanced Bl and
Analytics
are providing low-cost and
flexible solutions.
Cloud Enabled Bl
and Analytics
B
lo
om
b
er
g
/G
et
ty
Im
ag
es
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 101 11/7/14 7:52 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
102 Chapter 3 Data Management, Big Data Analytics, and Records Management
prior year’s results. The company grew rapidly because of its compelling customer
offer—no-haggle prices and quality guarantees backed by a 125-point inspection
that became an industry benchmark—and auto financing. In 2014 CarMax recruited
for more than 1,200 employee positions in locations across the country in response
to continued growth. CarMax currently operates 131 used car superstores in
64 markets.
CarMax continues to enhance and refine its information systems, which it
believes to be a core competitive advantage. CarMax’s IT includes:
• A proprietary IS that captures, analyzes, interprets, and distributes data
about the cars CarMax sells and buys.
• Data analytics applications that track every purchase; number of test drives
and credit applications per car; color preferences in every demographic and
region.
• Proprietary store technology that provides management with real time data
about every aspect of store operations, such as inventory management,
pricing, vehicle transfers, wholesale auctions, and sales consultant produc-
tivity.
• An advanced inventory management system that helps management antici-
pate future inventory needs and manage pricing.
Throughout CarMax, analytics are used as a strategic asset and insights gained
from analytics are available to everyone who needs them.
Questions
1. How has BI improved performance management at Quicken Loans?
2. What are the business benefi ts of BI?
3. What are two data-related challenges that must be resolved for BI to
produce meaningful insight?
4. What are the steps in a BI governance program?
5. What is a business-driven development approach?
6. What does it mean to drill down, and why is it important?
7. What four factors are contributing to increased use of BI?
8. How did BI help CarMax achieve record-setting revenue growth?
All organizations create and retain business records. A record is documentation of
a business event, action, decision, or transaction. Examples are contracts, research
and development, accounting source documents, memos, customer/client com-
munications, hiring and promotion decisions, meeting minutes, social posts, texts,
e-mails, website content, database records, and paper and electronic files. Business
documents such as spreadsheets, e-mail messages, and word-processing documents
are a type of record. Most records are kept in electronic format and maintained
throughout their life cycle—from creation to final archiving or destruction by an
electronic records management (ERM) system.
ERM systems consist of hardware and software that manage and archive
electronic documents and image paper documents; then index and store them
according to company policy. For example, companies may be required by law
to retain financial documents for at least seven years, product designs for many
3.5 Electronic Records Management
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 102 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.5 Electronic Records Management 103
LEGAL DUTY TO RETAIN
BUSINESS RECORDS
Companies need to be prepared to respond to an audit, federal investigation, law-
suit, or any other legal action against them. Types of lawsuits against companies
include patent violations, product safety negligence, theft of intellectual property,
breach of contract, wrongful termination, harassment, discrimination, and many
more.
Because senior management must ensure that their companies comply with
legal and regulatory duties, managing electronic records (e-records) is a strategic
issue for organizations in both the public and private sectors. The success of ERM
depends greatly on a partnership of many key players, namely, senior manage-
ment, users, records managers, archivists, administrators, and most importantly, IT
personnel. Properly managed, records are strategic assets. Improperly managed or
destroyed, they become liabilities.
ERM BEST PRACTICES Effective ERM systems capture all business data and documents at their first
touchpoint—data centers, laptops, the mailroom, at customer sites, or remote offices.
Records enter the enterprise in multiple ways—from online forms, bar codes, sensors,
websites, social sites, copiers, e-mails, and more. In addition to capturing the entire
document as a whole, important data from within a document can be captured and
stored in a central, searchable repository. In this way, the data are accessible to support
informed and timely business decisions.
In recent years, organizations such as the Association for Information
and Image Management (AIIM; ww.aiim.org), National Archives and Records
Administration (NARA), and ARMA International (formerly the Association of
Records Managers and Administrators; www.arma.org) have created and published
industry standards for document and records management. Numerous best practices
articles, and links to valuable sources of information about document and records
management, are available on their websites. IT at Work 3.5 describes ARMA’s
generally accepted recordkeeping principles.
ERM BENEFITS Departments or companies whose employees spend most of their day filing or
retrieving documents or warehousing paper records can reduce costs significantly
with ERM. These systems minimize the inefficiencies and frustration associated
with managing paper documents and workflows. However, they do not create a
paperless office as had been predicted.
An ERM can help a business to become more efficient and productive by:
• Enabling the company to access and use the content contained in
documents.
• Cutting labor costs by automating business processes.
• Reducing the time and effort required to locate information the business
needs to support decision making.
• Improving the security of content, thereby reducing the risk of intellectual
property theft.
• Minimizing the costs associated with printing, storing, and searching for
content.
decades, and e-mail messages about marketing promotions for a year. The major
ERM tools are workflow software, authoring tools, scanners, and databases.
ERM systems have query and search capabilities so documents can be identified
and accessed like data in a database. These systems range from those designed
to support a small workgroup to full-featured, Web-enabled enterprisewide
systems.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 103 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
104 Chapter 3 Data Management, Big Data Analytics, and Records Management
When workflows are digital, productivity increases, costs decrease, compli-
ance obligations are easier to verify, and green computing becomes possible.
Green computing is an initiative to conserve our valuable natural resources
by reducing the effects of our computer usage on the environment. You can
read about green computing and the related topics of reducing an organiza-
tion’s carbon footprint, sustainability, and ethical and social responsibility in
Chapter 14.
ERM FOR DISASTER
RECOVERY, BUSINESS
CONTINUITY, AND
COMPLIANCE
Businesses also rely on their ERM system for disaster recovery and business con-
tinuity, security, knowledge sharing and collaboration, and remote and controlled
access to documents. Because ERM systems have multilayered access capabili-
ties, employees can access and change only the documents they are authorized to
handle.
When companies select an ERM to meet compliance requirements, they should
ask the following questions:
1. Does the software meet the organization’s needs? For example, can the DMS be
installed on the existing network? Can it be purchased as a service?
2. Is the software easy to use and accessible from Web browsers, offi ce applications,
and e-mail applications? If not, people will not use it.
3. Does the software have lightweight, modern Web and graphical user interfaces
that effectively support remote users?
Generally accepted recordkeeping principles are a frame-
work for managing business records to ensure that they sup-
port an enterprise’s current and future regulatory, legal, risk
mitigation, environmental, and operational requirements.
The framework consists of eight principles or best prac-
tices, which also support information governance. These
principles were created by ARMA International and legal and
IT professionals.
• Principle of Accountability. An organization will assign
a senior executive to oversee a recordkeeping program;
adopt policies and procedures to guide personnel; and
ensure program audit ability.
• Principle of Transparency. The processes and activi-
ties of an organization’s recordkeeping program will be
documented in an understandable manner and available
to all personnel and appropriate parties.
• Principle of Integrity. A recordkeeping program will be
able to reasonably guarantee the authenticity and reli-
ability of records and data.
• Principle of Protection. The recordkeeping program
will be constructed to ensure a reasonable level of
protection to records and information that are private,
confidential, privileged, secret, or essential to business
continuity.
• Principle of Compliance. The recordkeeping program
will comply with applicable laws, authorities, and the
organization’s policies.
• Principle of Availability. Records will be maintained
in a manner that ensures timely, efficient, and accurate
retrieval of needed information.
• Principle of Retention. Records and data will be main-
tained for an appropriate time based on legal, regula-
tory, fiscal, operational, and historical requirements.
• Principle of Disposition. Records will be securely dis-
posed of when they are no longer required to be main-
tained by laws or organizational policies.
IT at Work 3 . 5
Generally Accepted Recordkeeping Principles
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 104 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
3.5 Electronic Records Management 105
4. Before selecting a vendor, it is important to examine workfl ows and how data,
documents, and communications fl ow throughout the company. For example,
know which information on documents is used in business decisions. Once those
needs and requirements are identifi ed, they guide the selection of technology
that can support the input types—that is, capture and index them so they can be
archived consistently and retrieved on-demand.
IT at Work 3.6 describes how several companies currently use ERM. Simply
creating backups of records is not sufficient because the content would not be
organized and indexed to retrieve them accurately and easily. The requirement
to manage records—regardless of whether they are physical or digital—is not
new.
Questions
1. What are business records?
2. Why is ERM a strategic issue rather than simply an IT issue?
3. Why might a company have a legal duty to retain records? Give an
example.
4. Why is creating backups an insuffi cient way to manage an organization’s
documents?
5. What are the benefi ts of ERM?
Here are a few examples of how companies use ERM:
• The Surgery Center of Baltimore stores all medical
records electronically, providing instant patient informa-
tion to doctors and nurses anywhere and at any time.
The system also routes charts to the billing department,
which can then scan and e-mail any relevant information
to insurance providers and patients. The ERM system
helps maintain the required audit trail, including the
provision of records when they are needed for legal
purposes. How valuable has ERM been to the center?
Since it was implemented, business processes have been
expedited by more than 50 percent, the costs of these
processes have been significantly reduced, and the
morale of office employees in the center has improved
noticeably.
• American Express (AMEX) uses TELEform, developed
by Alchemy and Cardiff Software, to collect and process
more than 1 million customer satisfaction surveys every
year. The data are collected in templates that consist of
more than 600 different survey forms in 12 languages
and 11 countries. AMEX integrated TELEform with
AMEX’s legacy system, which enables it to distribute
processed results to many managers. Because the
survey forms are now readily accessible, AMEX has
reduced the number of staff who process these forms
from 17 to 1, thereby saving the company more than
$500,000 a year.
• The University of Cincinnati provides authorized access
to the personnel files of 12,000 active employees and
tens of thousands of retirees. The university receives
more than 75,000 queries about personnel records every
year and then must search more than 3 million records
to answer these queries. Using a microfilm system to find
answers took days. The solution was an ERM that digi-
tized all paper and microfilm documents, without help
from the IT department, making them available via the
Internet and the university’s intranet. Authorized employees
access files using a browser.
IT at Work 3 . 6
ERM Applications
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 105 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
106 Chapter 3 Data Management, Big Data Analytics, and Records Management
Key Terms
active data warehouse
(ADW)
business analytics
business intelligence (BI)
business record
business-driven
development approach
centralized database
change data capture (CDC)
data entity
data mart
data mining
data warehouse
database
database management
system (DBMS)
decision model
declarative language
distributed database
system
electronic records
management (ERM)
extract, transform, load
(ETL)
enterprise data warehouse
(EDW)
eventual consistency
fault tolerance
HaDoop
information overload
immediate consistency
latency
MapReduce
market share
master data management
(MDM)
NoSQL
online transaction-
processing (OLTP)
systems
online analytical-processing
(OLAP) systems
operating margin
petabyte
relational database
relational management
system (RDBMS)
sentiment analysis
scalability
structured query language
(SQL)
text mining
volatile
1. Visit YouTube.com and search for SAS Enterprise
Miner Software Demo in order to assess the features
and benefi ts of SAS Enterprise Miner. The URL is
http://www.youtube.com/watch?v=Nj4L5RFvkMg.
a. View the SAS Enterprise Miner Software demo,
which is about 7 minutes long.
b. Based on what you learn in the demo, what skills or
expertise are needed to build a predictive model?
c. At the end of the demo, you hear the presenter
say that “SAS Enterprise Miner allows end-users
to easily develop predictive models and to
generate scoring to make better decisions about
future business events.” Do you agree that SAS
Enterprise Miner makes it easy to develop such
models? Explain.
d. Do you agree that if an expert develops
predictive models, it will help managers make
better decisions about future business events?
Explain.
e. Based on your answers to (c), (d), and (e), under
what conditions would you recommend SAS
Enterprise Miner?
2. Research two electronic records management
vendors, such as Iron Mountain.
EXPLORE: Online and Interactive Exercises
Assuring Your Learning
1. What are the functions of databases and data ware-
houses?
2. How does data quality impact business performance?
3. List three types of waste or damages that data
errors can cause.
4. What is the role of a master reference fi le?
5. Give three examples of business processes or opera-
tions that would benefi t signifi cantly from having
detailed real time or near real time data and identify
the benefi ts.
6. What are the tactical and strategic benefi ts of big
data analytics?
7. Explain the four V’s of data analytics.
8. Select an industry. Explain how an organization in
that industry could improve consumer satisfaction
through the use of data warehousing.
9. Explain the principle of 90/90 data use.
10. Why is master data management (MDM) important
in companies with multiple data sources?
11. Why would a company invest in a data mart instead
of a data warehouse?
12. Why is data mining important?
13. What are the operational benefi ts and competitive
advantages of business intelligence?
14. How can ERM decrease operating costs?
DISCUSS: Critical Thinking Questions
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 106 11/7/14 7:53 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
Assuring Your Learning 107
1. Visit Oracle.com. Click the Solutions tab to open the
menu; then click Data Warehousing under Technology
Solutions.
a. Select one of the Customer Highlights.
b. Describe the customer’s challenges, why it
selected a particular Oracle solution, and how
that solution met their challenge.
2. Visit the Microsoft SQL Server website at Microsoft.
com/SQLserver.
a. Click the CloudOS tab and select Customer
Stories.
b. Filter the customer stories by selecting Business
Intelligence and Data Discovery.
c. Summarize each company’s business problems
or challenges and why it selected a particular
solution.
d. What were the benefi ts of the BI solution?
3. Visit Teradata.com. Click Resources and review
Video News, and select one of the videos related
to analytics. Explain the benefi ts of the solution
chosen.
4. Spring Street Company (SSC) wanted to reduce the
“hidden costs” associated with its paper-intensive
processes. Employees jokingly predicted that if
the windows were open on a very windy day, total
chaos would ensue as thousands of papers started
to fl y. If a fl ood, fi re, or windy day occurred, the
business would literally grind to a halt. The com-
pany’s accountant, Sam Spring, decided to calculate
the costs of its paper-driven processes to identify
their impact on the bottom line. He recognized that
several employees spent most of their day fi ling or
retrieving documents. In addition, there were the
monthly costs to warehouse old paper records. Sam
measured the activities related to the handling of
printed reports and paper fi les. His average esti-
mates were as follows:
a. Dealing with a fi le: It takes an employee
12 minutes to walk to the records room, locate
a fi le, act on it, refi le it, and return to his or
her desk. Employees do this 4 times per day
(5 days per week).
b. Number of employees: 10 full-time employees
perform the functions.
c. Lost document replacement: Once per day, a
document gets “lost” (destroyed, misplaced, or
covered with massive coffee stains) and must be
recreated. The total cost of replacing each lost
document is $200.
d. Warehousing costs: Currently, document storage
costs are $75 per month.
Sam would prefer a system that lets employees
fi nd and work with business documents without leav-
ing their desks. He’s most concerned about the human
resources and accounting departments. These person-
nel are traditional heavy users of paper fi les and would
greatly benefi t from a modern document management
system. At the same time, however, Sam is also risk
averse. He would rather invest in solutions that would
reduce the risk of higher costs in the future. He recog-
nizes that the U.S. PATRIOT Act’s requirements that
organizations provide immediate government access to
records apply to SSC. He has read that manufacturing
and government organizations rely on effi cient docu-
ment management to meet these broader regulatory
imperatives. Finally, Sam wants to implement a disaster
recovery system.
Prepare a report that provides Sam with the
data he needs to evaluate the company’s costly paper-
intensive approach to managing documents. You will
need to conduct research to provide data to prepare
this report. Your report should include the following
information:
1. How should SSC prepare for an ERM if it decides to
implement one?
2. Using the data collected by Sam, create a spread-
sheet that calculates the costs of handling paper at
SSC based on average hourly rates per employee of
$28. Add the cost of lost documents to this. Then, add
the costs of warehousing the paper, which increases
by 10 percent every month due to increases in vol-
ume. Present the results showing both monthly totals
and a yearly total. Prepare graphs so that Sam can
easily identify the projected growth in warehousing
costs over the next three years.
3. How can ERM also serve as a disaster recovery
system in case of fi re, fl ood, or break-in?
4. Submit your recommendation for an ERM solution.
Identify two vendors in your recommendation.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
a. What are the retention recommendations made
by the vendors? Why?
b. What services or solutions does each vendor
offer?
3. View the “Edgenet Gain Real time Access to Retail
Product Data with In-Memory Technology” video
on YouTube. Explain the benefi t of in-memory
technology.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 107 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
108 Chapter 3 Data Management, Big Data Analytics, and Records Management
CASE 3.2
Business Case: Financial Intelligence Fights Fraud
The Financial Crimes Enforcement Network (FinCEN;
fi ncen.gov) is a bureau of the Treasury Department and the
fi nancial intelligence unit of the United States. The bureau
reports to the undersecretary for terrorism and fi nancial
intelligence. FinCEN’s mission is to safeguard the fi nancial
system from abuses of fi nancial crimes, to institute anti-
money laundering (AML) programs, and to promote national
security through the collection, analysis, and dissemination
of fi nancial intelligence.
Constrained by Defi cient Data Analytics
Prior to 2008, FinCEN was not able to effectively gather data,
analyze them, and deliver them to users. Data that fi nancial
institutions had to report to FinCEN suffered from incon-
sistent quality and lack of validation and standardization.
When trying to analyze its data, FinCEN was limited to small
datasets and simple routines. The bureau could not conduct
analysis across massive datasets and lacked capabilities for
proactive analysis and trend prediction.
Reporting data to agencies was done using numerous
offl ine systems. Data had to be cleaned and transformed,
thus delaying user access. Analytics and reporting defi cien-
cies made it diffi cult for FinCEN to quickly detect new and
emerging threats and aid in disrupting criminal enterprises.
FinCEN Upgrades Data Analytics and
Query Capabilities
In 2008 FinCEN launched a major effort to upgrade its ana-
lytics capabilities, IT infrastructure, and databases. Upgraded
analytics were needed to better collect and analyze data from
multiple sources and provide them to federal, state, and local
law enforcement and regulatory authorities.
Then in May 2010 FinCEN launched the Bank Secrecy
Act (BSA) IT Modernization (IT Mod) program and further
improved its IT infrastructure. The IT Mod program has
improved data quality and the ability of 9,000 authorized users
to access, search, and analyze data. The bureau provides
federal, state, and local law enforcement and regulators with
direct access to BSA data. These users make approximately
18,000 queries of the extensive database each day.
Additional milestones achieved by FinCEN were:
• Converted 11 years of data from its legacy system to
FinCEN’s new System of Record. FinCEN is able to elec-
tronically receive, process, and store all FinCEN reports.
• Deployed a new advanced analytics tool that provides
FinCEN analysts with improved analytic and examination
capabilities.
• Released the FinCEN Query Web-based app, a new
search tool accessed by FinCEN analysts, law enforce-
ment, intelligence, and regulatory users as of September
2012. FinCEN Query provides real time access to over
11 years of BSA data.
Predictive Capabilities Attack Crimes
Consulting fi rm Deloitte helped FinCEN with the massive
critical tasks of deploying systems and populating data,
providing user access, and ensuring system security. Effective
data analytics identify patterns and relationships that reveal
potential illicit activity. This intelligence has increased the
speed and ability to detect money launderers and terrorist
fi nanciers and disrupt their criminal activity.
Sources: Compiled from FinCEN.gov (2014), Fact Sheet Bank Secrecy
Act (BSA) IT Modernization (IT Mod) Program (2013), and Deloitte (2014).
Questions
1. Explain FinCEN’s mission and responsibilities.
2. What data and IT problems were limiting FinCEN’s ability
to fi ght fi nancial crime?
3. Describe the IT upgrades and capabilities needed by
FinCEN in order to achieve its mission.
4. On what does fi nancial intelligence depend?
5. Why is the ability to identify patterns and relationships
critical to national security?
6. Research recent fi nancial crimes that FinCEN has detected
and disrupted. Explain the role of data analytics in crime
detection.
CASE 3.3
Video Case: Hertz Finds Gold in Integrated Data
Finding CRM gold after integrating customer data, Hertz is
dominating the global rental car market by giving customers
unique, real time offers through multiple channels, with
upwards of 80,000 during peak times. Visit Teradata.com and
search for the video “Hertz: Finding Gold in Integrated Data.”
1. Describe Hertz’s new strategy and data solution.
2. How did Hertz strengthen customer loyalty?
3. What did Hertz need to do to its data prior to
implementing its new solution?
4. Describe the potential short-term and longer-term business
benefi ts of integrated data.
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 108 11/7/14 7:53 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
References 109
Acebo, A., J. Gallo, J. Griffi n, & B. Valeyko. “Aligning Business
Strategy with BI Capabilities.” Business Intelligence Journal,
2013.
Breuer, P., F. Forina, & J. Moulton. “Beyond the Hype: Capturing
Value from Big Data and Advanced Analytics.” McKinsey &
Company. April 2013.
MIT Sloan Management Review, Improvisations, February 2, 2012.
Brown, B., M. Chui, & J. Manyika. “Are You Ready for the Era
of ‘Big Data?’” McKinsey Quarterly, October 2011.
Burns, E. “Coca-Cola Overcomes Challenges to Seize BI
Opportunities.” TechTarget.com. August 2013.
BusinessIntelligence.com. “How Coca-Cola Takes a Refreshing
Approach on Big Data.” July 18, 2013a.
BusinessIntelligence.com. “Coca-Cola’s Juicy Approach to Big
Data.”July 29, 2013b. http://businessintelligence.com/
bi-insights/coca-colas-juicy-approach-to-big-data/
CNNMoney, The Coca-Cola Co (NYSE:KO) 2014.
DARPA.mil, 2012.
Defense Systems. “DARPA Intell Program Sent to Afghanistan
to Spy.” July 21, 2011.
Deloitte.com. “Case Study: Checkmate—Delivering Next-Gen
Financial Intelligence at FinCEN.” February 19, 2014.
Fernandez, J. “Big Companies, Big Data.” Research-Live.com,
October 4, 2012.
Ferguson, M. “Data Ownership and Enterprise Data Manage-
ment: Is Your Data Under Control?” DataFlux.com, 2012.
FinCEN.gov, 2014.
FirstWind web site, 2014. Hammond, T. “Top IT Job Skills for
2014: Big Data, Mobile, Cloud, Security.” TechRepublic.com,
January 31, 2014.
HealthCanal. “Where Do You Start When Developing a New
Medicine?” March 27, 2014.
ibm.com. “IBM Big Data Success Stories.” 2011.
Kitamura, M. “Big Data Partnerships Tackle Drug Develop-
ment Failures.” Bloomberg News, March 26, 2014.
Lohr, S. “Looking to Industry for the Next Digital Disruption.”
The New York Times. November 23, 2012a.
Lohr, S. “Big Data: Rise of the Machines.” The New York
Times, December 31, 2012b.
Neill, J. “Big Data Demands Big Context.” HBR Blog Network,
December 3, 2013.
NIH (National Institute of Health). Accelerating Medicines
Partnership. February 2014. http://www.nih.gov/science/amp/
index.htm
Palomäki, P. & M. Oksanen. “Do We Need Homegrown
Information Models in Enterprise Architectures?” Business
Intelligence Journal. Vol. 17, no. 1, March 19, 2012.
Rowe, N. “Handling Paper in a Digital Age: The Impact of
Document Management.” Aberdeen Research Report.
February 1, 2012. aberdeen.com/research/7480/ra-document-
processing-management/content.aspx
Shachtman, N. “Inside Darpa’s Secret Afghan Spy Machine.”
Wired, July 21, 2011.
Schroeder, H. “The Art and Science of Transformation for New
Business Intelligence.” Cost Management, September/October
2013.
The Data Warehousing Institute (TDWI). “Winners: TDWI
Best Practices Awards 2013.” Business Intelligence Journal 18,
no. 3, 2013.
The Data Warehousing Institute (TDWI). tdwi.org/portals/
business-intelligence.aspx, 2014.
U.S. Department of Energy. “Wind Energy Could Produce
20 Percent of U.S. Electricity By 2030.” Energy.gov. May
12, 2008. energy.gov/articles/wind-energy-could-produce-
20-percent-us-electricity-2030* Watson, H. J. “This Isn’t Your
Mother’s BI Architecture.” Business Intelligence Journal.
Vol. 17, no. 1, March, 2012.
Zynapse, “New Strategies for Managing Master Data.”
zynapse.com. September 10, 2010.
References
c03DataManagementBigDataAnalyticsAndRecordsManagement.indd Page 109 10/29/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch03/text_s
110
Chapter Snapshot
The basic technology that makes global communication
possible is the Internet Protocol, or IP. Each device attached
to a network has a unique IP address that enables it to send
and receive files. Files are broken down into blocks known
as packets in order to be transmitted over a network to
their destination, which also has a unique IP address. Most
networks use IP Version 4 (IPv4). In April 2014 ARIN, the
group that oversees Internet addresses, reported that IPv4
Networks for Effi cient
Operations and
Sustainability4
Chapter
1. Describe data networks, their quality-of-service (QOS)
issues, and how IP addresses and APIs function. Identify
opportunities to apply networked devices to improve
operational efficiency and business models.
2. Describe wireless 3G and 4G networks, mobile network
infrastructure, and how they support worker productivity,
business operations, and strategy.
3. Evaluate performance improvements from virtual
collaboration and communication technologies, and
explain how they support group work.
4. Describe how companies can contribute to sustainability,
and green, social, and ethical challenges related to the
use and operations of IT networks.
Chapter Snapshot
Case 4.1 Opening Case: Sony Builds an IPv6
Network to Fortify Competitive Edge
4.1 Data Networks, IP Addresses, and APIs
4.2 Wireless Networks and Mobile Infrastructure
4.3 Collaboration and Communication
Technologies
4.4 Sustainability and Ethical Issues
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 4.2 Business Case: Google Maps API
for Business
Case 4.3 Video Case: Fresh Direct Connects
for Success
References
Learning Outcomes
c04NetworksForEfficientOperationsAndSustainability.indd Page 110 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
111
CASE 4.1 OPENING CASE
Sony Builds an IPv6 Network to Fortify Competitive Edge
IPv4
IPv6
32 bit address
0000.0000.0000.0000
128 bit address
0000.0000.0000.0000.0000.0000.0000.0000
Figure 4.1 IPv4 addresses have 4 groups of four alphanumeric characters, which
allows for 232 or roughly 4.3 billion unique IP address. IPv6 addresses have
8 groups of alphanumerics, which allows for 2128, or 340 trillion, trillion, trillion
addresses. IPv6 offers also enhanced quality of service that is needed by the
latest in video, interactive games, and e-commerce.
addresses were running out—making it urgent that enterprises move to the newer IPv6
(Figure 4.1). Enterprises need to prepare for the 128-bit protocol because switching
from IPv4 to IPv6 is not trivial.
Networking is undergoing tremendous change. The convergence of access tech-
nologies, cloud, advanced 4G networks, multitasking mobile operating systems, and
collaboration platforms continues to change the nature of work, the way we do busi-
ness, how machines interact, and other things not yet imagined. The downsides of
such massive use of energy-dependent wired and wireless networks are their carbon
footprints and damage to the environment as well as personal privacy. Intelligently
planned sustainability efforts can reduce the depletion of the earth’s natural resources
significantly. Efforts to protect what is left of personal privacy are less successful.
Internet Protocol (IP) is
the method by which data
are sent from one device to
another via a network.
IP address. Every device that
communicates with a network
must have a unique identify-
ing IP address. An IP address
is comparable to a telephone
number or home address.
IP Version 4 (IPv4) has
been Internet protocol for
over three decades, but
has reached the limits of
its design. It is difficult to
configure, it is running out
of addressing space, and it
provides no features for site
renumbering to allow for
an easy change of Internet
Service Provider (ISP), among
other limitations.
Figure 4.2 Sony Corporation
overview.
SONY’S RAPID
BUSINESS GROWTH
In the early 2000s, Sony Corporation had been engaged in strategic mergers and
acquisitions to strengthen itself against intensifying competition. By 2007 Sony’s
enterprise network (internal network) had become too complex and incapable
Sony Corporation
Global Reach
Network Solution
Sony aims to accelerate global
collaboration and business across
business units to achieve goal of
“One Sony.”
Cisco Enterprise IPv6 network
integrated with IPv4 network.
Consumer electronics equipment
and services; music, pictures,
computer entertainment.
More versatile network
Network without communications
constraints, supporting “One Sony”
through information systems.
Brand
Business Results
c04NetworksForEfficientOperationsAndSustainability.indd Page 111 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
112 Chapter 4 Networks for Efficient Operations and Sustainability
TABLE 4.1 Opening Case Overview
Company Sony Corporation, Sony.com
Location Headquartered in Tokyo, Japan. Over 700 total
network sites worldwide.
Industries One of the largest consumer electronics and enter-
tainment companies in the world, including audio/
video equipment, semiconductors, computers,
and video games. Also engaged in production and
distribution of recorded music, motion picture,
and video.
Business challenges • Network expansion required too much time due
to complexity of enterprise network.
• Networking TCO (total cost of ownership) was
continually increasing.
• Numerous constraints on networks obstructing
communication between companies in Sony
Group.
Network technology Integrated its IPv4 networks with new IPv6
solution solutions from Cisco. The integrated IPv4/IPv6
network has been used by Sony as infrastructure
for the development of new products and enterprise-
wide collaboration.
Sony also upgraded its Cisco switches at the
corporate data center, campuses, and remote offi ces
to handle concurrent IPv4 and IPv6 traffi c.
NETWORK
LIMITATIONS
of supporting communication, operations, and further business growth. The
enterprise network was based on IPv4. A serious limitation was that the IPv4
network could not provide real time collaboration among business units and
group companies.
Expansion efforts were taking too long because of the complicated structure
of the network, and total cost of ownership (TCO) was increasing. Also, a number
of technical limitations were blocking internal communications.
Many of the Sony Group companies had developed independently—and had inde-
pendent networks. Devices connected to the independent networks were using the
same IP addresses. That situation is comparable to users having duplicate telephone
numbers—making it impossible to know which phone was being called. Also,
phones with the same number could not call each other.
Once these networks were integrated, the duplicate IP address caused traffic-
routing conflicts. Routing conflicts, in turn, led to the following problems:
1. Sony’s employee communication options were severely limited, which harmed
productivity.
2. File sharing and real time communication were not possible.
3. Introducing cloud services was diffi cult and time-consuming.
c04NetworksForEfficientOperationsAndSustainability.indd Page 112 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.1 Data Networks, IP Addresses, and APIs 113
MIGRATION TO IPV6
NETWORKS: AN
INVESTMENT IN
THE FUTURE
To eliminate these limitations, Sony decided to invest in IPv6-based networks in
2006; it then launched a full-scale effort in 2008. With its virtually unlimited number
of IP addresses, IPv6 would support Sony’s long-term, next-generation information
and communications technology (ICT) infrastructure strategy and improve collabo-
ration and productivity.
Migrating from IPv4 to IPv6 involved 700 sites, hundreds of thousands of net-
working devices, and hundreds of thousands of network users spread around the
globe. During the transition, Sony realized that it was necessary to support both IP
protocols. That is, the IPv6 would supplement and coexist with the existing enter-
prise IPv4 network, rather than replace it. Running both protocols on the same
network at the same time was necessary because Sony’s legacy devices and apps
only worked on IPv4.
Sony selected Cisco as a key partner in the migration and integration of IPv4
and IPv6 traffic because of the maturity of its IPv6 technology. The integrated net-
work has been used by Sony as infrastructure for product development. Sony also
upgraded its Cisco network switches at the corporate data center, campuses, and
remote offices to handle concurrent IPv4 and IPv6 traffic.
BUSINESS RESULTS The use of IPv6 eliminated the issue of conflicting IP addresses, enabling Sony
employees in all divisions to take advantage of the productivity benefits of real time
collaboration applications. Other business improvements are:
• Flexibility to launch new businesses quickly
• Reduced TCO of enterprise network
• Network without communications constraints, supporting “One Sony” through
information systems
Sources: Compiled from Cisco (2014a; 2014b), Khedekar (2012), and AT&T (2012).
Questions
1. Why might IPv6 be a business continuity issue for organizations?
2. Explain how Sony’s IPv4 enterprise network was restricting the
productivity of its workers.
3. What problems did duplicate IP addresses cause at Sony? Give an
analogy.
4. Why did Sony need to run both protocols on its network instead of
replacing IPv4 with IPv6?
5. Describe the strategic benefi t of Sony’s IPv6 implementation.
6. Do research to determine the accuracy of this prediction: “Today,
almost everything on the Internet is reachable over IPv4. In a few years,
both IPv4 and IPv6 will be required for universal access.”
Managers now need to understand the technical side of networks, IP addressing,
and APIs in order to make intelligent investment decisions that impact operations
and competitive position. Enterprises run on networks—wired and mobile—and
depend upon their ability to interface with other networks and applications.
4.1 Data Networks, IP Addresses, and APIs
IP Version 6 (IPv6) is
replacing IPv4 because it
has run out of IP addresses.
c04NetworksForEfficientOperationsAndSustainability.indd Page 113 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
114 Chapter 4 Networks for Efficient Operations and Sustainability
Networks are changing significantly with the shift to IPv6 and the build-out of 5G
networks. 5G will offer huge gains in both speed and capacity over existing 4G
networks—along with opportunities at the operations and strategic levels. At the
2014 Mobile World Congress in Barcelona, Neelie Kroes, the vice president of the
European Commission, discussed how deploying 5G networks could reduce high-
level youth unemployment across Europe. In the short term, the 5G infrastructure
build-out would create new jobs. In the longer term, 5G would create entirely
new markets and economic opportunities driven by superior mobile capabilities in
industries ranging from health care to automotive (Basulto, 2014).
5G (fifth generation), the
next-generation mobile
communications network.
FUNDAMENTALS OF
DATA NETWORKS
The capacity and capabilities of data networks provide opportunities for more
automated operations and new business strategies. M2M communications over
wireless and wired networks automate operations, for instance, by triggering
action such as sending a message or closing a valve. The speed at which data can
be sent depends on the network’s bandwidth. Bandwidth characteristics are shown
in Figure 4.3.
Bandwidth is the capacity or
throughput per second of a
network.
TECH NOTE 4.1 4G and 5G Networks in 2018
More Mobile Network Traffi c and Users
Cisco predicts that by 2018, global mobile data traffi c will have increased 11 times
from current levels. Much of that traffi c will be driven by billions of devices talking
to other devices wirelessly. This includes a major increase in M2M communications
and the number of wearable technology devices. The number of mobile data con-
nections will total more than 10 billion by 2018—8 billion of which will be personal
mobile devices and 2 billion M2M connections.
Faster Mobile Network Speeds
Cisco expects that the average global mobile network speed will almost double from
1.4 Mbps in 2013 to 2.5 Mbps by 2018. And 5G networks are promising speeds that
will be 100 times faster than mid-2014 speeds.
Figure 4.3 Network
bandwidth.
Bandwidth is the communication
capacity of a network.
Bandwidth is the amount of data that
passes through a network connection
over time as measured in bits per
second (bps).
Bandwidth is used in both
directions—for uploads and
downloads.
Very large data transfers reduce
availability for everyone on the
network.
Network speed depends on
amount of traffic. Data flows
quickly and smoothly when
traffic volume on the network
is small relative to its capacity.
c04NetworksForEfficientOperationsAndSustainability.indd Page 114 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.1 Data Networks, IP Addresses, and APIs 115
Figure 4.4 Four drivers of
global mobile traffi c through
2018.
Figure 4.5 Basic functions
of business networks.
FUNCTIONS
SUPPORTED BY
BUSINESS NETWORKS
Figure 4.5 describes the basic functions of business networks: communication,
mobility, collaboration, relationships, and search. These functions depend on net-
work switches and routers—devices that transmit data packets from their source
to their destination based on IP addresses. A switch acts as a controller, enabling
networked devices to talk to each other efficiently. For example, switches connect
computers, printers, and servers within an office building. Switches create a net-
work. Routers connect networks. A router links computers to the Internet, so users
HIGH DEMAND FOR
HIGH-CAPACITY
NETWORKS
As described in Tech Note 4.1, global mobile data traffic is increasing. The four
drivers of that demand are shown in Figure 4.4. Demand for high-capacity networks
is growing at unprecedented rates. Examples of high-capacity networks are wireless
mobile, satellite, wireless sensor, and VoIP (voice over Internet Protocol) such as
Skype. Voice over IP (VoIP) networks carry voice calls by converting voice (analog
signals) to digital signals that are sent as packets. With VoIP, voice and data trans-
missions travel in packets over telephone wires. VoIP has grown to become one of
the most used and least costly ways to communicate. Improved productivity, flex-
ibility, and advanced features make VoIP an appealing technology.
Over 10 billion
2.5 megabits per second (Mbps)
Almost 5 billion
70% of mobile traffic
By 2018
More Mobile
Connections
Faster Mobile
Speeds
More Mobile
Users
More Mobile
Video
Communication
Mobility
Provides secure, trusted,
and reliable access from any
mobile device anywhere at
satisfactory download and
upload speeds.
Relationships
Manages interaction with
customers, supply chain
partners, shareholders,
employees, regulatory
agencies, and so on.
Search
Able to locate data, contracts,
documents, spreadsheets, and other
knowledge within an organization
easily and efficiently.
Collaboration
Supports teamwork
that may be synchronous
or asynchronous;
brainstorming; and
knowledge and
document sharing.
Provides sufficient capacity for human
and machine-generated transmissions.
Delays are frustrating, such as when
large video files pause during download
waiting for the packets to arrive.
Buffering means the network cannot
handle the speed at which the video is
being delivered and therefore stops to
collect packets.
c04NetworksForEfficientOperationsAndSustainability.indd Page 115 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
116 Chapter 4 Networks for Efficient Operations and Sustainability
can share the connection. Routers act like a dispatcher, choosing the best paths for
packets to travel.
Investments in data networks, IP addresses, routers, and switches are business
decisions because of their impact on productivity, security, user experiences, and
customer service.
QUALITY OF SERVICE An important management decision is the network’s quality of service (QoS),
especially for delay-sensitive data such as real time voice and high-quality video.
The higher the required QoS, the more expensive the technologies needed to man-
age organizational networks. Bandwidth-intensive apps are important to business
processes, but they also strain network capabilities and resources. Regardless of the
TECH NOTE 4.2 Circuit and Packet Switching
All generations of networks are based on switching. Prior to 4G, networks included
circuit switching, which is slower than packet switching. 4G was fi rst to be fully
packet switched, which signifi cantly improved performance. The two basic types of
switching are:
Circuit switching: A circuit is a dedicated connection between a source and destina-
tion. In the past, when a call was placed between two landline phones, a circuit or
connection was created that remained until one party hung up. Circuit switching
is older technology that originated with telephone calls; it is ineffi cient for digital
transmission.
Packet switching: Packet switching transfers data or voice in packets. Files are bro-
ken into packets, numbered sequentially, and routed individually to their destina-
tion. When received at the destination, the packets are reassembled into their proper
sequence.
Wireless networks use packet switching and wireless routers whose antennae trans-
mit and receive packets. At some point, wireless routers are connected by cables to
wired networks, as shown in Figure 4.6.
Figure 4.6 Network cables
plug into a wireless router.
The antennae create wireless
access points (WAP). ©
M
et
ta
d
ig
ita
l/
A
la
m
y
c04NetworksForEfficientOperationsAndSustainability.indd Page 116 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.1 Data Networks, IP Addresses, and APIs 117
type of traffic, networks must provide secure, predictable, measurable, and some-
times guaranteed services for certain types of traffic. For example, QoS technolo-
gies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive or latency-
sensitive apps, such as voice and video, are given priority on the network.
• Throttle traffic: In order to give latency-sensitive apps priority, other types
of traffic need to be held back (throttled).
The ability to prioritize and throttle network traffic is referred to as traffic shaping
and forms the core of the hotly debated Net neutrality issue, which is discussed in
IT at Work 4.1.
In 2014 the battle over the complicated issue of net neu-
trality heated up. Net neutrality is a principle that Internet
Service Providers (ISPs) and their regulators treat all Internet
traffic the same way. On the opposing side of that issue is
traffic shaping. Traffic shaping creates a two-tier system for
specific purposes such as:
1. Time-sensitive data are given priority over traffic that
can be delayed briefly with little-to-no adverse effect.
Companies like Comcast argue that Net neutrality rules
hurt consumers. Certain applications are more sensi-
tive to delays than others, such as streaming video and
Internet phone services. Managing data transfer makes
it possible to assure a certain level of performance or
QoS.
2. In a corporate environment, business-related traffic may
be given priority over other traffic, in effect, by paying
a premium price for that service. Proponents of traffic
shaping argue that ISPs should be able to charge more
to customers who want to pay a premium for priority
service.
Specifically, traffic is shaped by delaying the flow of less
important network traffic, such as bulk data transfers, P2P
file-sharing programs, and BitTorrent traffic.
Traffic shaping is hotly debated by those in favor of Net
neutrality. They want a one-tier system in which all Internet
data packets are treated the same, regardless of their con-
tent, destination, or source. In contrast, those who favor the
two-tiered system argue that there have always been differ-
ent levels of Internet service and that a two-tiered system
would enable more freedom of choice and promote Internet-
based commerce.
Federal Communications Commission’s
2010 Decision
On December 21, 2010, the Federal Communications
Commission (FCC) approved a compromise that created two
classes of Internet access: one for fixed-line providers and
the other for the wireless Net. In effect, the new rules are
Net semi-neutrality. The FCC banned any outright blocking
of and “unreasonable discrimination” against websites or
applications by fixed-line broadband providers. But the rules
do not explicitly forbid “paid prioritization,” which would
allow a company to pay an ISP for faster data transmission.
Net Semi-Neutrality Overturned in 2014
In January 2014 an appeals court struck down the FCC’s
2010 decision. The court allowed ISPs to create a two-tiered
Internet, but promised close supervision to avoid anticom-
petitive practices, and banned “unreasonable” discrimina-
tion against providers.
On April 24 FCC Chairman Tom Wheeler reported that
his agency would propose new rules to comply with the
court’s decision that would be finalized by December 2014.
Wheeler stated that these rules “would establish that behavior
harmful to consumers or competition by limiting the openness
of the Internet will not be permitted” (Wheeler, 2014). But
Wheeler’s proposal would allow network owners to charge
extra fees to content providers. This decision has angered
consumer advocates and Net neutrality advocates who view
Wheeler with suspicion because of his past work as a lobbyist
for the cable industry and wireless phone companies.
Sources: Compiled from Federal Communications Commission (fcc.
gov, 2014), Wheeler (2014), and various blog posts.
IT at Work 4 . 1
Net Neutrality Debate Intensifies
c04NetworksForEfficientOperationsAndSustainability.indd Page 117 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
118 Chapter 4 Networks for Efficient Operations and Sustainability
Questions
1. What is Net neutrality?
2. What tiers are created by traffic shaping?
3. Why did the battle over Net neutrality intensify in 2014?
4. Did the FCC’s 2010 ruling favor either side of the debate?
Explain.
5. What has been a reaction to the 2014 appeals court deci-
sion? Explain.
NETWORK
TERMINOLOGY
To be able to evaluate networks and the factors that determine their functionality,
you need to be familiar with the following network basics:
• Bandwidth: Bandwidth depends on the network protocol. Common wire-
less protocols are 802.11b. 802.11g, 802.11n, and 802.16. For an analogy to
bandwidth, consider a pipe used to transport water. The larger the diameter
of the pipe, the greater the throughput (volume) of water that flows through
it and the faster water is transferred through it.
• Protocol: Protocols are rules and standards that govern how devices on a
network exchange data and “talk to each other.” An analogy is a country’s
driving rules—whether to drive on the right or left side of the road.
• TCP/IP: Transmission control protocol/Internet protocol (TCP/IP) is the
basic communication protocol of the Internet. This protocol is supported
by every major network operating system (OS) to ensure that all devices on
the Internet can communicate. It is used as a communications protocol in a
company’s private network for internal uses.
• Fixed-line broadband: Describes either cable or DSL Internet connections.
• Mobile broadband: Describes various types of wireless high-speed Internet
access through a portable modem, telephone, or other device.
• 3G: 3G networks support multimedia and broadband services, do so over a
wider distance, and at faster speeds than prior 1G and 2G generations. 3G
networks have far greater ranges because they use large satellite connec-
tions to telecommunication towers.
• 4G: 4G mobile network standards enable faster data transfer rates. 4G net-
works are digital, or IP, networks.
Overall, 2G networks were for voice, 3G networks for voice and data, and 4G net-
works for broadband Internet connectivity.
TECH NOTE 4.3 Origin of the Internet, e-mail, and TCP/IP
The Advanced Research Projects Agency network (ARPAnet) was the fi rst real net-
work to run on packet-switching technology. In October 1969 computers at Stanford
University, UCLA, and two other U.S universities connected for the fi rst time—
making them the fi rst hosts on what would become the Internet. ARPAnet was
designed for research, education, and government agencies. ARPAnet provided a
communications network linking the country in the event that a military attack or
nuclear war destroyed conventional communications systems.
In 1971 e-mail was developed by Ray Tomlinson, who used the @ symbol to
separate the username from the network’s name, which became the domain name.
Broadband (short for broad
bandwidth) means high-
capacity or high-speed
network.
c04NetworksForEfficientOperationsAndSustainability.indd Page 118 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.1 Data Networks, IP Addresses, and APIs 119
On January 1, 1983, ARPAnet computers switched over to the TCP/IP protocols
developed by Vinton Cerf. A few hundred computers were affected by the switch.
The original ARPAnet protocol had been limited to 1,000 hosts, but the adoption of
the TCP/IP standard made larger numbers of hosts possible. The number of Internet
hosts reached nearly 1 billion by 2013.
3G AND 4G 4G delivers average realistic download rates of 3 Mbps or higher (as opposed to
theoretical rates, which are much higher). In contrast, today’s 3G networks typically
deliver average download speeds about one-tenth of that rate. Even though individ-
ual networks, ranging from 2G to 3G, started separately with their own purposes,
soon they will be converted to the 4G network.
4G is based purely on the packet-based IP—unlike 2G and 3G that have a
circuit-switched subsystem. Users can obtain 4G wireless connectivity through one
of the following standards:
1. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16 specifi cations are:
• Range: 30 miles (50 km) from base station
• Speed: 70 megabits per second (Mbps)
• Line-of-sight not needed between user and base station
WiMAX operates on the same basic principles as Wi-Fi in that it transmits data
from one device to another via radio signals.
2. Long-Term Evolution (LTE) is a GSM-based technology that is deployed by
Verizon, AT&T, and T-Mobile. LTE capabilities include:
• Speed: Downlink data rates of 100 Mbps and uplink data rates of 50 Mbps
Improved network performance, which is measured by its data transfer capacity,
provides fantastic opportunities for mobility, mobile commerce, collaboration,
supply chain management, remote work, and other productivity gains.
BUSINESS USES
OF NEAR-FIELD
COMMUNICATION
Near-field communication (NFC) enables two devices within close proximity to
establish a communication channel and transfer data through radio waves. NFC are
location-aware technologies that are more secure than other wireless technologies
like Bluetooth and Wi-Fi. Unlike RFID, NFC is a two-way communication tool.
Location-aware NFC technology can be used to make purchases in restaurants,
resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains.
Here are some examples of NFC applications and their potential business value.
• The Apple iWatch wearable device with NFC communication capabilities
could be ideal for mobile payments. Instead of a wallet, users utilize their
iWatch as a credit card or wave their wrists to pay for their Starbucks coffee.
With GPS and location-based e-commerce services, retailers could send a
coupon alert to the iWatch when a user passes their store. Consumers would
then see the coupon and pay for the product with the iWatch.
• Ticketmaster Spain teamed up with Samsung to offer NFC tickets to a Dum
Dum Girls concert in Madrid. Consumers needed to download the NFC
Ticketmaster app from the Samsung app store to purchase a ticket, which
was then stored in their phone for secure entry at the door.
• International fresh produce distributor Total Produce plans to give consum-
ers access to videos, recipes, and interactive games about the benefits of a
healthy diet via NFC tag–equipped SmartStands located in supermarkets
c04NetworksForEfficientOperationsAndSustainability.indd Page 119 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
120 Chapter 4 Networks for Efficient Operations and Sustainability
and convenience stores. “We can upload a new video to these units instantly
to respond to opportunities; a barbecue-themed video on a sunny afternoon,
a pumpkin carving video for Halloween or a recipe video to complement an
in-store price promotion,” says Vince Dolan, European marketing manager
at Total Produce. “Similarly, we can update grower videos to reflect changes
in product range at any time” (Boden, 2014).
• Passengers on public transportation systems can pay fares by waving an
NFC smartphone as they board.
Mashup of GPS and Bluetooth
The mashup of GPS positioning and short-range wireless technologies, such as
Bluetooth and Wi-Fi, can provide unprecedented intelligence. These technologies
create opportunities for companies to develop solutions that make a consumer’s life
better. They could, for example, revolutionize traffic and road safety. Intelligent
transport systems being developed by car manufacturers allow cars to communicate
with each other and send alerts about sudden braking. In the event of a collision,
the car’s system could automatically call emergency services. The technology could
also apply the brakes automatically if it was determined that two cars were getting
too close to each other.
Advancements in networks, devices, and RFID sensor networks are changing
enterprise information infrastructures and business environments dramatically. The
preceding examples and network standards illustrate the declining need for a physi-
cal computer, as other devices provide access to data, people, or services at any
time, anywhere in the world, on high-capacity networks.
Fans attending gigs by The Wild Feathers were given gui-
tar picks embedded with an NFC tag. Warner Music had
distributed the guitar picks for fans to enter a competition,
share content via social media, and vote at the gig simply
by tapping with an NFC phone. NFC-embedded picks were
inserted into the band’s promotional flyers at six European
venues. Each pick was encoded with a unique URL and also
printed with a unique code for iPhone users to enable track-
ing and monitoring.
Marketing Campaign Success Shows
an Exciting Future for NFC
The tags generated a high response rate. Over 65 percent of
the NFC guitar picks had registered in the competition. And
35 percent of the fans had shared content on social media—
spending an average of five minutes on the site.
NFC is being used in marketing campaigns because
the technology offers slick one-tap interaction. NFC allows
brands to engage with their customers in unique ways and
create exciting user experiences. With millions of NFC-
equipped smartphones set to reach users over the next few
years and the technology’s advantages for shoppers and
businesses, NFC is emerging as a major technology.
Questions
1. Assume you attended a concert and were given a bro-
chure similar to the one distributed to fans at The Wild
Feathers concert. Would you use the guitar pick or com-
parable NFC-embedded item to participate in a contest?
To post on Facebook or tweet about the concert? Explain
why or why not.
2. How can NFC be applied to create an interesting user
experience at a sporting event? At a retail store or coffee
shop?
3. Refer to your answers in Question 2. What valuable
information could be collected by the NFC tag in these
businesses?
IT at Work 4 . 2
NFC-Embedded Guitar Picks
Mashup is a general term
referring to the integration
of two or more technologies.
c04NetworksForEfficientOperationsAndSustainability.indd Page 120 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.1 Data Networks, IP Addresses, and APIs 121
APPLICATION
PROGRAM INTERFACES
AND OPERATING
SYSTEMS
When software developers create applications, they must write and compile the
code for a specific operating system (OS). Figure 4.7 lists the common OSs. Each
OS communicates with hardware in its own unique way; each OS has a specific API
that programmers must use. Video game consoles and other hardware devices also
have APIs that run software programs.
What Is an API?
An API consists of a set of functions, commands, and protocols used by program-
mers to build software for an OS. The API allows programmers to use predefined
functions or reusable codes to interact with an OS without having to write a soft-
ware program from scratch. APIs simplify the programmer’s job.
APIs are the common method for accessing information, websites, and data-
bases. They were created as gateways to popular apps such as Twitter, Facebook,
and Amazon and enterprise apps provided by SAP, Oracle, NetSuite, and many
other vendors.
Automated API
The current trend is toward automatically created APIs that are making innovative
IT developments possible. Here are two examples of the benefits of automated APIs:
• Websites such as the European Union Patent office have mappings of every
one of their pages to both URLs for browser access and URLs for REST
APIs. Whenever a new page is published, both access methods are sup-
ported.
• The startup SlashDB offers the capability to automatically create an API
to access data in a SQL database. This API simplifies many of the details
of SQL usage and makes it much easier for developers to get at the data
(Woods, 2013a and 2013b).
Application program inter-
face (API). An interface is the
boundary where two sepa-
rate systems meet. An API
provides a standard way for
different things, such as
software, content, or web-
sites, to talk to each other in
a way that they both under-
stand without extensive
programming.
TECH NOTE 4.4 Spotify Released Its API to Developers
In early 2012 the digital music service Spotify released its API to developers. The
developers quickly created hundreds of apps that fans are using to discover and share
new music. The most popular new app is Tunigo, which uses its music experts to curate
playlists targeted to various moods. The Tunigo service was so successful that Spotify
bought it and made it part of Browse. Browse is the in-house curation department
that searches Spotify’s catalog and continuously delivers new playlists (Dean, 2013).
Browse lets you search for specifi c playlists based on your mood. These playlists
are created by other users and selected by Spotify staffers. Users have created over
1 billion playlists, which grow and morph every day.
Android
iOS
Windows Phone
Common Mobile OS
Windows
Mac OS X
Linux
Common Desktop OS
Figure 4.7 Common mobile
and desktop operating
systems. Each computer
OS provides an API for
programmers. Mobile
OSs are designed around
touchscreen input.
c04NetworksForEfficientOperationsAndSustainability.indd Page 121 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
122 Chapter 4 Networks for Efficient Operations and Sustainability
API Value Chain in Business
APIs deliver more than half of all the traffic to major companies like Twitter and
eBay. APIs are used to access business assets, such as customer information or a
product or service, as shown in Figure 4.8. IT developers use APIs to quickly and
easily connect diverse data and services to each other. APIs from Google, Twitter,
Amazon, Facebook, Accuweather, Sears, and E*Trade are used to create many
thousands of applications. For example, Google Maps API is a collection of APIs
used by developers to create customized Google Maps that can be accessed on a
Web browser or mobile devices.
The API value chain takes many forms because the organization that owns the
business asset may or may not be the same as the organization that builds the APIs.
Different people or organizations may build, distribute, and market the applica-
tions. At the end of the chain are end-users who benefit from the business asset.
Often, many APIs are used to create a new user experience.
The business benefits of APIs are listed in Table 4.2.
The power of Spotify was demonstrated in 2013 when it won a challenge with
Pink Floyd to gain access to the group’s entire music collection: every track from
every album the band had ever released. The Pink Floyd collection became part of
Spotify’s streaming music service when the tracks were offi cially “unlocked” in June
2013. The challenge was for the song “Wish You Were Here” to be streamed by fans
over 1 million times in just a few days. Pink Floyd members fulfi lled the deal.
Figure 4.8 API value chain
in business.
TABLE 4.2 Business Benefi ts of APIs
APIs are channels to new customers and markets: APIs enable partners to
use business assets to extend the reach of a company’s products or services to
customers and markets they might not reach easily.
APIs promote innovation: Through an API, people who are committed to a
challenge or problem can solve it themselves.
APIs are a better way to organize IT: APIs promote innovation by allowing
everyone in a company to use each other’s assets without delay.
APIs create a path to lots of Apps: Apps are going to be a crucial channel
in the next 10 years. Apps are powered by APIs. Developers use APIs and
combinations of APIs to create new user experiences.
API Developers
Provides quick,
easy access to
business assets.
Applications
created using
APIs
Use APIs to
create new
business.
Business Assets
Data
information
products
services
Customers, employees,
and end-users use the
business apps that give
them access to assets.
c04NetworksForEfficientOperationsAndSustainability.indd Page 122 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.2 Wireless Networks and Mobile Infrastructure 123
In the 21st-century global economy, advanced wireless networks are a foundation
on which global economic activity takes place. Current 3G and 4G networks and
technologies provide that foundation, moving entire economies. For any nation to
stay competitive and prosperous, it is imperative that investment and upgrades in
these technologies continue to advance to satisfy demand.
Global mobile data traffic is forecasted to increase nearly 11-fold between
2013 and 2018. Mobile data traffic will grow at a compound annual growth rate
(CAGR) of 61 percent from 2013 to 2018, reaching 15.9 exabytes (EB) per month
by 2018, according to the Cisco Visual Networking Index (VNI): Global Mobile
Data Traffic Forecast Update, 2013–2018. Mobile data traffic will reach the following
milestones:
1. The average mobile connection speed will surpass 2 Mbps by 2016.
2. Smartphones will reach 66 percent of mobile data traffi c by 2018.
3. Monthly mobile tablet traffi c will surpass 2.5 EB per month by 2018.
4. Tablets will exceed 15 percent of global mobile data traffi c by 2016.
5. 4G traffi c will be more than half of total mobile traffi c by 2018.
6. There will be more traffi c offl oaded from cellular networks and onto Wi-Fi net-
works than remains on cellular networks by 2018.
7. In addition to supporting mobile users, increased bandwidth is needed to sup-
port the numerous industrial applications that leverage wireless technologies—
primarily the smart grid, or smart energy, and health-care segments.
With a combination of smart meters, wireless technology, sensors, and soft-
ware, the smart grid allows utilities to accurately track power grids and cut back
on energy use when the availability of electricity is stressed. And consumers
gain insight into their power consumption to make more intelligent decisions
about how to use energy. A fully deployed smart grid has the potential of saving
between $39.69 and $101.57, and up to 592 pounds of carbon dioxide emissions,
per consumer per year in the United States, according to the Smart Grid Consumer
Collaborative (SGCC).
Wireless hospitals and remote patient monitoring, for example, are grow-
ing trends. Tracking medical equipment and hospital inventory, such as gurneys,
is done with RFID tagging at a number of hospitals. Remote monitoring apps
are making health care easier and more comfortable for patients while reaching
patients in remote areas.
4.2 Wireless Networks and Mobile Infrastructure
Questions
1. Why has IPv6 become increasingly important?
2. What is an IP address?
3. What are bandwidth and broadband?
4. Briefl y described the basic network functions.
5. What is the difference between circuit switching and packet switching?
6. What is the difference between 3G and 4G?
7. What are the mobile network standards?
8. Explain the Net neutrality debate.
9. What are two applications of NFC?
10. What are the benefi ts of APIs?
c04NetworksForEfficientOperationsAndSustainability.indd Page 123 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
124 Chapter 4 Networks for Efficient Operations and Sustainability
In the small city of Santander on Spain’s Atlantic coast,
Mayor Iñigo de la Serna raised $12 million, mostly from
the European Commission, to launch SmartSantander.
SmartSantander is a smart city experiment that is improving
the quality of life, reducing energy consumption, and engag-
ing its citizens in civic duties.
10,000 Sensors Embedded
The city implemented wireless sensor networks and embed-
ded 10,000 sensors in its streets and municipal vehicles to
monitor garbage collection, crime, and air quality and manage
street lighting for better energy efficiency. Sensors communi-
cate with smartphone apps to inform drivers and commuters
on parking availability, bus delays, road closures, and the
current pollen count in real time. Parking apps direct drivers
to available spaces via cell phone alerts. Drivers benefit from
a reduction in the time and annoyance of finding parking
spots. Anyone can feed his or her own data into the system
by, for example, snapping a smartphone photo of a pothole
or broken streetlight to notify the local government that a
problem needs to be fixed.
Build-Out of Smart City Applications
This mobile technology can help cities contribute to a greener
planet. Municipal landscape sprinklers can send facts to city
agencies for analysis to conserve water usage. Sensors can
monitor weather and pollen counts as well as water and
power leaks.
Police State
The data streams and mobile apps that keep citizens
informed also keep the government informed. What is the
difference between a smart city and a police state? Consider
how data collected from sensors mounted outside a bar to
track noise levels might be used.
• Scenario #1. Instances of loud noises and squealing tires
are transmitted to local police. The city uses the informa-
tion to enforce public nuisance laws and make arrests.
• Scenario #2: People who live in the neighborhood show
civic leaders what is keeping them up at night and
receive help in resolving the problem.
• Scenario #3: Landlords could use data showing less noise
and cleaner air to promote their apartments or office
buildings.
The Dark Side of Smart
The wireless networks and sensors need to be maintained.
Thousands of batteries embedded in roadways could have
expensive and disruptive maintenance requirements.
Parking space alerts might create other annoyances. If
everyone becomes aware of a parking spot up the street, the
rush of cars converging on a few open locations could lead
to rage and defeat the purpose of such an alert.
Sources: Compiled from O’Connor (2013) and Edwards (2014).
Questions
1. What are the benefits of a smart city?
2. What are the potential abuses of data collected in this way?
3. Consider the dark side of smart. Are you skeptical of the
benefits of a smart city?
4. Would you want to live in a smart city? Explain.
5. How would you prevent Santander from becoming a
police state?
IT at Work 4 . 3
Smart City or Police State?
STRATEGIC BUILD-
OUT OF MOBILE
CAPABILITIES
Enterprises are moving away from the ad hoc adoption of mobile devices and
network infrastructure to a more strategic planning build-out of their mobile capa-
bilities. As technologies that make up the mobile infrastructure evolve, identifying
strategic technologies and avoiding wasted investments require more extensive
planning and forecasting. Factors to consider are the network demands of multi-
tasking mobile devices, more robust mobile OSs, and their applications.
Mobile Infrastructure
Mobile infrastructure consists of the integration of technology, software, support,
security measures, and devices for the management and delivery of wireless com-
munications.
c04NetworksForEfficientOperationsAndSustainability.indd Page 124 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.2 Wireless Networks and Mobile Infrastructure 125
TECH NOTE 4.5 Wi-Fi Networking Standards
• 802.11b. This standard shares spectrum with 2.4-GHz cordless phones,
microwave ovens, and many Bluetooth products. Data are transferred at
distances up to 100 meters or 328 feet.
Wi-Fi and Bluetooth
Bluetooth is a short-range—up to 100 meters or 328 feet—wireless communications
technology found in billions of devices, such as smartphones, computers, medical
devices, and home entertainment products. When two Bluetooth-enabled devices
connect to each other, this is called pairing.
Wi-Fi is the standard way computers connect to wireless networks. Nearly all
computers have built-in Wi-Fi chips that allow users to find and connect to wireless
routers. The router must be connected to the Internet in order to provide Internet
access to connected devices.
Wi-Fi technology allows devices to share a network or Internet connection
without the need to connect to a commercial network. Wi-Fi networks beam packets
over short distances using part of the radio spectrum, or they can extend over larger
areas, such as municipal Wi-Fi networks. However, municipal networks are not com-
mon because of their huge costs. See Figure 4.9 for an overview of how Wi-Fi works.
Bluetooth is a short-range
wireless communications
technology.
Wi-Fi is the standard way
computers connect to
wireless networks.
Figure 4.9 Overview of Wi-Fi.
Wireless Network
Acess Point
Cable/DSL
Modem
Antenna
Radio
Waves
Directional Antenna
and PC Card
Laptop(s) or Desktop(s)
1
2
3
Radio-equipped access point connected to the Internet
(or via a router). It generates and receives radio waves
(up to 400 feet).
Several client devices, equipped with PC cards, generate
and receive radio waves.
Router is connected to the Internet via a cable or
DSL modem, or is connected via a satellite.
Wireless Network
PC Card
2
1 3
Satellite
Internet
PC
Router
c04NetworksForEfficientOperationsAndSustainability.indd Page 125 11/3/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
126 Chapter 4 Networks for Efficient Operations and Sustainability
Figure 4.10 WiMAX/Wi-Fi
network.
Notebook with
built-in
WiMAX adapter
Wi-Fi
hotspots
Base station
WiMAX
hub
InternetWiMAX
network
WIRELESS WIDE AREA
NETWORKS
There are three general types of mobile networks: wide area networks (WANs),
WiMAX, and local area networks (LANs). WANs for mobile computing are known as
wireless wide area networks (WWANs). The range of a WWAN depends on the trans-
mission media and the wireless generation, which determines which services are avail-
able. Two components of wireless infrastructures are wireless LANs and WiMAX.
LANs
Wireless LANs use high-frequency radio waves to communicate between comput-
ers, devices, or other nodes on the network. A wireless LAN typically extends an
existing wired LAN by attaching a wireless AP to a wired network.
WiMAX
Wireless broadband WiMAX transmits voice, data, and video over high-frequency
radio signals to businesses, homes, and mobile devices. It was designed to bypass
traditional telephone lines and is an alternative to cable and DSL. WiMAX is
based on the IEEE 802.16 set of standards and the metropolitan area network
(MAN) access standard. Its range is 20 to 30 miles and it does not require a clear
line of sight to function. Figure 4.10 shows the components of a WiMAX/Wi-Fi
network.
• 802.11a. This standard runs on 12 channels in the 5-GHz spectrum in North
America, which reduces interference issues. Data are transferred about 5 times
faster than 802.11b, improving the quality of streaming media. It has extra
bandwidth for large files. Since the 802.11a and b standards are not interopera-
ble, data sent from an 802.11b network cannot be accessed by 802.11a networks.
• 802.11g. This standard runs on three channels in the 2.4-GHz spectrum, but
at the speed of 802.11a. It is compatible with the 802.11b standard.
• 802.11n. This standard improves upon prior 802.11 standards by adding
multiple-input multiple-output (MIMO) and newer features. Frequency
ranges from 2.4 GHz to 5 GHz with a data rate of about 22 Mbps, but perhaps
as high as 100 Mbps.
c04NetworksForEfficientOperationsAndSustainability.indd Page 126 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.3 Collaboration and Communication Technologies 127
TECH NOTE 4.6 Mobile Network Evaluation Factors
When evaluating mobile network solutions, there are four factors to consider. They
are:
1. Simple: Easy to deploy, manage, and use.
2. Connected: Always makes the best connection possible.
3. Intelligent: Works behind the scenes, easily integrating with other systems.
4. Trusted: Enables secure and reliable communications.
Questions
1. What factors are contributing to mobility?
2. Why is strategic planning of mobile networks important?
3. How does Wi-Fi work?
4. What is a WLAN?
5. Why is WiMAX important?
6. What factors should be considered when selecting a mobile network?
Now more than ever, business gets done through information sharing and col-
laborative planning. Business performance depends on broadband data networks
for communication, mobility, and collaboration. For example, after Ford Motor
Company began relying on UPS Logistics Group’s data networks to track millions
of cars and trucks and to analyze any potential problems before they occur, Ford
realized a $1 billion reduction in vehicle inventory and $125 million reduction in
inventory carrying costs annually.
People need to work together and share documents. Teams make most of the
complex decisions in organizations. And organizational decision making is difficult
when team members are geographically spread out and working in different time
zones.
Messaging and collaboration tools include older communications media such
as e-mail, videoconferencing, fax, and texts—and blogs, Skype, Web meetings,
and social media. Yammer is an enterprise social network that helps employees
collaborate across departments, locations, and business apps. These private social
sites are used by more than 400,000 enterprises worldwide. Yammer functions as a
communication and problem-solving tool and is rapidly replacing e-mail. You will
read about Yammer is detail in Chapter 7.
4.3 Collaboration and Communication Technologies
VIRTUAL
COLLABORATION
Leading businesses are moving quickly to realize the benefits of virtual collabora-
tion. Several examples appear below.
Information Sharing Between Retailers and Their Suppliers
One of the most publicized examples of information sharing exists between Procter &
Gamble (P&G) and Walmart. Walmart provides P&G with access to sales informa-
tion on every item Walmart buys from P&G. The information is collected by P&G
c04NetworksForEfficientOperationsAndSustainability.indd Page 127 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
128 Chapter 4 Networks for Efficient Operations and Sustainability
on a daily basis from every Walmart store, and P&G uses that information to man-
age the inventory replenishment for Walmart.
Retailer–Supplier Collaboration: Asda Corporation
Supermarket chain Asda (asda.com) has rolled out Web-based electronic data
interchange (EDI) technology to 650 suppliers. Web EDI technology is based on
the AS2 standard, an internationally accepted HTTP-based protocol used to send
real time data in multiple formats securely over the Internet. It promises to improve
the efficiency and speed of traditional EDI communications, which route data over
third-party, value-added networks (VANs).
Lower Transportation and Inventory Costs
and Reduced Stockouts: Unilever
Unilever’s 30 contract carriers deliver 250,000 truckloads of shipments annually.
Unilever’s Web-based database, the Transportation Business Center (TBC), pro-
vides these carriers with site specification requirements when they pick up a shipment
at a manufacturing or distribution center or when they deliver goods to retailers.
TBC gives carriers all of the vital information they need: contact names and phone
numbers, operating hours, the number of dock doors at a location, the height of the
dock doors, how to make an appointment to deliver or pick up shipments, pallet
configuration, and other special requirements. All mission-critical information that
Unilever’s carriers need to make pickups, shipments, and deliveries is now available
electronically 24/7.
Reduction of Product Development Time
Caterpillar, Inc. is a multinational heavy-machinery manufacturer. In the traditional
mode of operation, cycle time along the supply chain was long because the process
involved paper–document transfers among managers, salespeople, and technical
staff. To solve the problem, Caterpillar connected its engineering and manufactur-
ing divisions with its active suppliers, distributors, overseas factories, and customers
through an extranet-based global collaboration system. By means of the collabora-
tion system, a request for a customized tractor component, for example, can be
transmitted from a customer to a Caterpillar dealer and on to designers and sup-
pliers, all in a very short time. Customers also can use the extranet to retrieve and
modify detailed order information while the vehicle is still on the assembly line.
GROUP WORK AND
DECISION PROCESSES
Managers and staff continuously make decisions as they develop and manufacture
products, plan social media marketing strategies, make financial and IT invest-
ments, determine how to meet compliance mandates, design software, and so on.
By design or default, group processes emerge, referred to as group dynamics, and
those processes can be productive or dysfunctional.
Group Work and Dynamics
Group work can be quite complex depending on the following factors:
• Group members may be located in different places or work at different
times.
• Group members may work for the same or different organizations.
• Needed data, information, or knowledge may be located in many sources,
several of which are external to the organization.
Despite the long history and benefits of collaborative work, groups are not
always successful.
c04NetworksForEfficientOperationsAndSustainability.indd Page 128 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.3 Collaboration and Communication Technologies 129
Online Brainstorming in the Cloud
Brainstorming ideas is no longer limited to a room full of people offering their
ideas that are written on a whiteboard or posters. Companies are choosing an
alternative—online brainstorming applications, many of them cloud-based. An
advantage is the avoidance of travel expenses if members are geographically
dispersed, which often restricts how many sessions a company can afford to hold.
The following are two examples of online brainstorming apps:
• Evernote (evernote.com) is a cloud-based tool that helps users gather and
share information, and brainstorm ideas. One function is Synch, which keeps
Evernote notes up-to-date across a user’s computers, phones, devices and the
Web. See Figure 4.11. A free version of Evernote is available for download.
• iMindmap Online, from UK-based ThinkBuzan (thinkbuzan.com), relies on
mind mapping and other well-known structured approaches to brainstorm-
ing. iMindmap Online helps streamline work processes, minimize informa-
tion overload, generate new ideas, and boost innovation.
INTRANETS,
EXTRANETS, AND
VIRTUAL PRIVATE
NETWORKS
Intranets are used within a company for data access, sharing, and collaboration.
They are portals or gateways that provide easy and inexpensive browsing and
search capabilities. Colleges and universities rely on intranets to provide services
to students and faculty. Using screen sharing and other groupware tools, intranets
can support team work.
An extranet is a private, company-owned network that can be logged into
remotely via the Internet. Typical users are suppliers, vendors, partners, or custom-
ers (Figure 4.12). Basically, an extranet is a network that connects two or more
companies so they can securely share information. Since authorized users remotely
access content from a central server, extranets can drastically reduce storage space
on individual hard drives.
A major concern is the security of the transmissions that could be intercepted
or compromised. One solution is to use virtual private networks (VPNs), which
encrypt the packets before they are transferred over the network. VPNs consist of
encryption software and hardware that encrypt, send, and decrypt transmissions, as
shown in Figure 4.13. In effect, instead of using a leased line to create a dedicated,
physical connection, a company can invest in VPN technology to create virtual
Figure 4.11 Evernote
brainstorming, note taking,
and archiving software
website. ©
N
et
Ph
ot
os
/A
la
m
y
c04NetworksForEfficientOperationsAndSustainability.indd Page 129 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
130 Chapter 4 Networks for Efficient Operations and Sustainability
Figure 4.12 Example of an
AT&T extranet used by a
customer to access account
information. ©
Ia
n
D
ag
na
ll/
A
la
m
y
Figure 4.13 Virtual private
networks (VPNs) create
encrypted connections to
company networks. ©
tu
ng
p
ho
to
/i
St
oc
kp
ho
to
Being profit-motivated without concern for damage to the environment is unaccept-
able. Society expects companies to generate a profit and to conduct themselves in
an ethical, socially responsible, and environmentally sustainable manner. Four fac-
tors essential to preserving the environment are shown in Figure 4.14. Sustainability
grows more urgent every year as carbon emissions contribute to climate changes
that are threatening quality of life—and possibly life itself.
4.4 Sustainability and Ethical Issues
connections routed through the Internet from the company’s private network to the
remote site or employee. Extranets can be expensive to implement and maintain
because of hardware, software, and employee training costs if hosted internally
rather than by an application service provider (ASP).
Questions
1. Why is group work challenging?
2. What might limit the use of in-person brainstorming?
3. How can online brainstorming tools overcome those limits?
4. What is the difference between an intranet and an extranet?
5. How does a virtual private network (VPN) provide security?
c04NetworksForEfficientOperationsAndSustainability.indd Page 130 11/14/14 1:49 PM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.4 Sustainability and Ethical Issues 131
Figure 4.14 The 4 Rs of
environmental sustainability.
GLOBAL TEMPERATURE
RISING TOO MUCH
TOO FAST
At the United Nations’ 2009 climate conference in Copenhagen, climatologists
estimated that countries must keep the global mean temperature (GMT) from ris-
ing by more than 2 C (3.6 F) above the preindustrial GMT in order to avoid pro-
found damage to life on the earth. Damage includes water and food scarcity, rising
sea levels, and greater incidence and severity of disease. Only three years later,
GMT had already increased by 0.7 C, or 1.3 F. In 2012 IEA chief economist Faith
Birol warned that this trend is perfectly in line with a temperature increase of 6 C
by 2050, which would have devastating impacts on the planet. Since 2005 the Prince
of Wales’ Corporate Leaders Group on Climate Change has lobbied for more
aggressive climate legislation within the United Kingdom, the European Union,
and internationally. It holds that carbon emission reductions between 50 percent
and 85 percent are necessary by 2050 to prevent the global temperature from rising
too much too fast because of the greenhouse effect, as shown in Figure 4.15.
TECH NOTE 4.7 NASA’s Greenhouse Gas Emission Warnings
According to NASA (climate.nasa.gov), CO2 and other greenhouse gases (GHGs)
trap the sun’s heat within the earth’s atmosphere, warming it and keeping it at habit-
able temperatures. Scientists have concluded that increases in CO2 resulting from
human activities have thrown the earth’s natural carbon cycle off balance, increasing
global temperatures and changing the planet’s climate.
GHG emissions worldwide hit record highs in 2011, according to the Interna-
tional Energy Agency (IEA). The IEA’s preliminary estimates indicate that global
emissions of carbon dioxide (CO2) from fossil-fuel combustion spiked to 31.6 giga-
tonnes (Gt) in 2011, an increase of 1 Gt or 3.2 percent from the 2010 level (Lemonick,
2012). One Gt equals 1 billion metric tons. GHG is now a serious a global concern.
The main international treaty on climate change is the United Nations Framework
Convention on Climate Change (UNFCCC).
In 2010 parties to the UNFCCC agreed that future global warming should be
limited to below 2 C (3.6 F) relative to the preindustrial level. Analysis suggests
that meeting the 2 C target would require annual global emissions of GHG to peak
©
s
ke
g
b
yd
av
e/
iS
to
ck
p
ho
to
c04NetworksForEfficientOperationsAndSustainability.indd Page 131 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
132 Chapter 4 Networks for Efficient Operations and Sustainability
Figure 4.16 Carbon cycle.
The Orbiting Carbon
Observatory-2 was
launched in July 2014. The
observatory is NASA’s fi rst
satellite mission dedicated
to studying CO2, which
is a critical component of
the earth’s carbon cycle
driving changes in the
earth’s climate. CO2 is
also the largest human-
produced GHG. Courtesy
of genomicscience.
energy.gov.
Figure 4.15 Illustration of the
earth’s greenhouse effect.
GLOBAL WARMING Global warming refers to the upward trend in GMT. It is one of the most compli-
cated issues facing world leaders. Figure 4.16 shows the relationship of fossil fuel,
soil, water, atmosphere, and so on in the carbon cycle. Even though the global
carbon cycle plays a central role in regulating CO2 in the atmosphere and thus the
earth’s climate, scientists’ understanding of the interlinked biological processes
that drive this cycle is limited. They know that whether an ecosystem will capture,
store, or release carbon depends on climate changes and organisms in the earth’s
biosphere. The biosphere refers to any place that life of any kind can exist on the
earth and contains several ecosystems. An ecosystem is a self-sustaining functional
unit of the biosphere; it exchanges material and energy between adjoining ecosys-
tems. Global warming occurs because of the greenhouse effect, which is the holding
of heat within the earth’s atmosphere. GHGs such as CO2, methane (CH4), and
nitrous oxide (N2O) absorb infrared radiation (IR), as diagrammed in Figure 4.17.
ICT’s Role in Global Warming
The IT industry sector is called the information and communications technology, or
ICT, in emission reports. ICT has certainly supported economic growth in developed
and developing countries and transformed societies, businesses, and people’s lives.
But what impacts do our expanding IT and social media dependence have on global
warming? How can business processes change or reduce GHGs? And what alternative
©
Im
ag
eZ
oo
/A
la
m
y
U
.S
. D
ep
ar
tm
en
t
of
E
ne
rg
y
G
en
om
ic
S
ci
en
ce
p
ro
g
ra
m
(h
tt
p
:/
/g
en
om
ic
sc
ie
nc
e.
en
er
g
y.
g
ov
)
before the year 2020 and decline signifi cantly thereafter, with emissions in 2050 reduced
by 30 to 50 percent compared to 1990 levels.
Analyses by the United Nations Environment Programme and International
Energy Agency warn that current policies are too weak to achieve the 2 C target.
c04NetworksForEfficientOperationsAndSustainability.indd Page 132 11/7/14 7:44 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.4 Sustainability and Ethical Issues 133
energy sources can be used to power the increasing demands for connectivity? Listed
below are several reports and initiatives to help answer these questions.
Global e-Sustainability Initiative and the SMART 2020 Report
The Climate Group’s SMART 2020 Report is the world’s first comprehensive global
study of the IT sector’s growing significance for the world’s climate. On behalf of
the Global e-Sustainability Initiative (GeSI, gesi.org), Climate Group found that
ICT plays a key role in reducing global warming. Transforming the way people and
businesses use IT could reduce annual human-generated global emissions by 15
percent by 2020 and deliver energy efficiency savings to global businesses of over
500 billion euros, or $800 billion U.S. And using social media, for example, to
inform consumers of the grams (g) of carbon emissions associated with the products
they buy could change buyer behavior and ultimately have a positive eco-effect. Like
food items that display calories and grams of fat to help consumers make healthier
food choices, product labels display the CO2 emissions generated in the production
of an item, as shown in Figure 4.18. By 2020 not only will people become more con-
nected, but things will, too—an estimated 50 billion machine-to-machine connec-
tions in 2020. A benefit of machine-to-machine connections is that they can relay
data about climate changes that make it possible to monitor our emissions.
Figure 4.17 Greenhouse
gases absorb infrared
radiation (IR) emitted from
the earth and reradiate it
back, thus contributing to
the greenhouse effect. ©
U
ni
ve
rs
al
Im
ag
es
G
ro
up
L
im
ite
d
/A
la
m
y
Figure 4.18 Label showing
the amount of CO2 emission
generated by the production
of an item. ©
A
le
x
Se
g
re
/A
la
m
y
c04NetworksForEfficientOperationsAndSustainability.indd Page 133 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
134 Chapter 4 Networks for Efficient Operations and Sustainability
Recommended Actions for the IT Sector
Analysis conducted by management consultants McKinsey & Company concludes
the following:
• The IT sector’s own footprint of 2 percent of global emissions could double
by 2020 because of increased use of tablets, smartphones, apps, and services.
To help, rather than worsen, the fight against climate change, the IT sector
must manage its own growing impact and continue to reduce emissions from
data centers, telecom networks, and the manufacture and use of its products.
• IT has the unique ability to monitor and maximize energy efficiency both within
and outside of its own industry sector to cut CO2 emissions by up to 5 times this
amount. This represents a savings of 7.8 Gt of CO2 per year by 2020, which is
greater than the 2010 annual emissions of either the United States or China.
The SMART 2020 Report gives a picture of the IT industry’s role in addressing
global climate change and facilitating efficient and low-carbon development. The
role of IT includes emission reduction and energy savings not only in the sector itself,
but also by transforming how and where people work. The most obvious ways are
by substituting digital formats—telework, video-conferencing, e-paper, and mobile
and e-commerce—for physical formats. Researchers estimate that replacing physical
products/services with their digital equivalents would provide 6 percent of the total
benefits the IT sector can deliver. Greater benefits are achieved when IT is applied
to other industries. Examples of those industries are smart building design and use,
smart logistics, smart electricity grids, and smart industrial motor systems.
SUSTAINABILITY YouTube reported that 100 hours of video are uploaded every minute in 2014—
more than double the 48 hours per minute in 2012. Over 6 billion hours of video are
watched each month on YouTube—almost an hour for every person on the earth.
Within 5 years, from 2008 through 2013, most U.S. households tripled the number
of computing, gaming, consumer electronics, and mobile devices. Statistics about
Twitter and other social services also show phenomenal growth. Almost all of these
network activities are powered by the burning of fossil fuels. Today’s connected
lifestyles will further harm the environment unless corrective actions are taken such
as those listed in Figure 4.19.
Global Warming: A Hot Debate
Does our society have the capacity to endure in such a way that the 9 billion people
expected on the earth by 2050 will all be able to achieve a basic quality of life? The
Reducing barriers to the use
of public transport and
improving people’s experience
of the journey. For example,
smart ticketing and free Wi-Fi.
Facilitating car sharing and
eco-driving.
Encouraging and enforcing
speed limits by using average
speed cameras and intelligent
speed adaptation, which help
drivers to avoid fines and
stay safe.
Enabling home working and
using video conferencing and
e-commerce to reduce travel.
Figure 4.19 Recommendations for ICT from the Sustainable Development
Commission (2010).
c04NetworksForEfficientOperationsAndSustainability.indd Page 134 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.4 Sustainability and Ethical Issues 135
answer is uncertain—and hotly debated. As you read, many scientists and experts
are extremely alarmed by global warming and climate change, but other experts
outright deny that they are occurring.
This debate may be resolved to some degree by NASA. A NASA spacecraft
was designed to make precise measurements of carbon dioxide (CO2) in the earth’s
atmosphere. The Orbiting Carbon Observatory-2 (OCO-2) was launched in July
2014. The observatory is NASA’s first satellite mission dedicated to studying CO2,
a critical component of the earth’s carbon cycle that is the most prevalent human-
produced GHG driving changes in the earth’s climate (Figure 4.16).
OCO-2 is a new tool for understanding both the sources of CO2 emissions and
the natural processes that remove CO2 from the atmosphere, and how they are
changing over time. The mission’s data will help scientists reduce uncertainties in
forecasts of how much carbon dioxide is in the atmosphere and improve the accu-
racy of global climate change predictions.
According to NASA, since the start of the Industrial Revolution more than
200 years ago, the burning of fossil fuels, as well as other human activities, have led
to an unprecedented buildup in this GHG, which in 2014 was at its highest level in
at least 800,000 years. Human activities have increased the level of CO2 by more
than 25 percent in just the past half century.
It is possible that we are living far beyond the earth’s capacity to support human
life. While sustainability is about the future of our society, for businesses, it is also
about return on investment (ROI). Businesses need to respect environmental lim-
its, but also need to show an ROI.
Sustainability Through Climate Change Mitigation
There are no easy or convenient solutions to carbon emissions from the fossil fuels
burned to power today’s tech dependencies. But there are pathways to solutions,
and every IT user, enterprise, and nation plays a role in climate change mitigation.
Climate change mitigation is any action to limit the magnitude of long-term climate
change. Examples of mitigation include switching to low-carbon renewable energy
sources and reducing the amount of energy consumed by power stations by increasing
their efficiency. There have been encouraging successes. For example, investments
in research and development (R&D) to reduce the amount of carbon emitted by
power stations for mobile networks are paying off. Announced in April 2014, a break-
through in the design of signal amplifiers for mobile technology will cut 200 mega-
watts (MW) from the load of power stations, which will reduce CO2 emissions by
0.5 million tonnes a year (Engineering and Physical Sciences Research Council, 2014).
Mobile, Cloud, and Social Carbon Footprint
No one sees CO2 being emitted from their Androids or iPhones. But wired and
mobile networks enable limitless data creation and consumption—and these activi-
ties increase energy consumption. Quite simply, the surge in energy used to power
data centers, cell towers, base stations, and recharge devices is damaging the envi-
ronment and depleting natural resources. It is critical to develop energy systems
that power our economy without increasing global temperatures beyond 2 C. To
do their part to reduce damaging carbon emissions, some companies have imple-
mented effective sustainability initiatives.
Sustainability Initiatives
Communications technology accounts for approximately 2 percent of global
carbon emissions; it is predicted that this figure will double by 2020 as end-
user demand for high-bandwidth services with enhanced quality of experience
explodes worldwide. Innovative solutions hold the key to curbing these emissions
and reducing environmental impact.
c04NetworksForEfficientOperationsAndSustainability.indd Page 135 12/11/14 2:05 PM f-392 /208/WB01490/9781118897782/ch04/text_s
136 Chapter 4 Networks for Efficient Operations and Sustainability
Network service providers as well as organizations face the challenges of
energy efficiency, a smaller carbon footprint, and eco-sustainability. To deal with
these challenges, wired and wireless service providers and companies need to
upgrade their networks to next-generation, all-IP infrastructures that are opti-
mized and scalable. The network must provide eco-sustainability in traffic trans-
port and deliver services more intelligently, reliably, securely, efficiently and at the
lowest cost.
For example, Alcatel-Lucent’s High Leverage Network (HLN) can reduce total
cost of ownership (TCO) by using fewer devices, creating an eco-sustainable choice
for service providers. Fewer devices mean less power and cooling, which reduces
the carbon footprint. HLN can also handle large amounts of traffic more efficiently
because the networks are intelligent, sending packets at the highest speed and most
efficiently.
ETHICAL
CONSIDERATIONS OF
HYPER-CONNECTED
HUMANS
The complexity of a connected life will increase as we move to the new era of nano-
sensors and devices, virtual spaces, and 3D social networks exchanging zillions of
bytes of data. Managers and workers need to consider ethical and social issues, such
as quality of life and working conditions. Individuals will experience both positive
and negative impacts from being linked to a 24/7 workplace, working in virtual
teams, and being connected to handhelds whose impact on health can be damag-
ing. A 2008 study by Solutions Research Group found that always being connected
is a borderline obsession for many people. According to the study, 68 percent of
Americans may suffer from disconnect anxiety—feelings of disorientation and ner-
vousness when deprived of Internet or wireless access for a period of time. Consider
this development and its implications.
Driving while distracted is a crime. Texting while driving is comparable to
driving under the influence (DUI), according to safety experts. Several studies indi-
cate that the use of mobile devices is a leading cause of car crashes. At any given
moment, more than 10 million U.S. drivers are talking on handheld cell phones,
according to the National Highway Traffic Safety Administration. Why is this a
problem? Mobiles are a known distraction, and the NHTSA has determined that
driver inattention is a primary or contributing factor in as many as 25 percent of all
police-reported traffic accidents. This does not include the thousands of accidents
not reported to the authorities.
In most or all states, distracted driving is a crime that carries mandatory fines
(Figure 4.20). For example, in California and New York State, drivers charged with
this crime face fines and have their driving license suspended. If driving while dis-
tracted causes injury or death to others, violators face jail time.
The importance of understanding ethical issues has been recognized by the
Association to Advance Collegiate Schools of Business (AACSB International,
aacsb.edu). For business majors, the AACSB International has defined Assurance
Figure 4.20 Texting while
driving is a crime and
potentially fatal. ©
ZU
M
A
W
ire
S
er
vi
ce
/A
la
m
y
c04NetworksForEfficientOperationsAndSustainability.indd Page 136 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
4.4 Sustainability and Ethical Issues 137
of Learning Requirements for ethics at both the undergraduate and graduate levels.
In Standard 15: Management of Curricula (AACSB, 2006), the association identi-
fies general knowledge and skill learning experiences that include “ethical under-
standing and reasoning abilities” at the undergraduate level. At the graduate level,
Standard 15 requires learning experiences in management-specific knowledge and
skill areas to include “ethical and legal responsibilities in organizations and society”
(AACSB, 2006).
Additions and Life Out of Control
The technologies covered in this chapter blur work, social, and personal time. IT
keeps people connected with no real off switch. Tools that are meant to improve
the productivity and quality of life in general can also intrude on personal time.
Managers need to be aware of the huge potential for abuse by expecting a 24/7
response from workers.
The report Looking Further with Ford—2014 Trends identifies trends in
how the technology explosion will affect consumer choices and behaviors. Sheryl
Connelly, Ford global trend and futuring manager, summarized what was learned:
“There is no escaping the impact—both positive and negative—of the rapid pace
of technology. . . . We are seeing a consumer culture that is increasingly mindful of
the need to nurture society’s valuable and irreplaceable resources” (Ford Motors,
2013). Four trends were discussed in this report:
1. Micro Moments: With so much information at our fi ngertips, downtime has given
way to fi lling every moment with bite-sized chunks of information, education,
and entertainment—seemingly packing our lives with productivity.
2. Myth of Multitasking: In an increasingly screen-saturated, multitasking mod-
ern world, more and more evidence is emerging to suggest that when we do
everything at once, we sacrifi ce the quality—and often safety—of each thing
we do.
3. Vying for Validation: In a world of hyper-self-expression, chronic public journal-
ing, and other forms of digital expression, consumers are creating a public self
that may need validation even more than their authentic self.
4. Sustainability: The world has been fi xated on going green, and now attention is
shifting beyond recycling and eco-chic living to a growing concern for the power
and preciousness of the planet’s water.
In our hyper-connected world, people are always on, collaborating, communi-
cating, and creating—and not always aware of how technology impacts them. We
need to learn how to harness that energy and connection to develop the next gen-
eration of critical, thoughtful thinkers.
Questions
1. Why do some experts warn that carbon emission reductions between
50 percent and 85 percent are necessary by 2050?
2. What contributes to the rise of global mean temperature?
3. What is the greenhouse effect?
4. How does the use of mobile devices contribute to the level of green-
house gases?
5. What is ICT’s role in global warming?
6. Why is global warming hotly debated?
7. Explain the goal of sustainability.
8. Explain the characteristics of a life out of control.
c04NetworksForEfficientOperationsAndSustainability.indd Page 137 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
138 Chapter 4 Networks for Efficient Operations and Sustainability
Key Terms
3G
4G
5G
application program
interface (API)
bandwidth
Bluetooth
carbon footprint
circuit switching
climate change
climate change mitigation
extranet
fi xed-line broadband
greenhouse gases
(GHGs)
group dynamics
information and commu-
nications technology
(ICT)
Internet Protocol (IP)
intranet
IP address
IP Version 4 (IPv4)
IP Version 6 (IPv6)
latency-sensitive apps
local area network (LAN)
Long-Term Evolution
(LTE)
mashup
mobile broadband
near-fi eld communication
(NFC)
Net neutrality
Net semi-neutrality
packet
packet switching
protocol
quality of service (QoS)
router
sustainability
switch
traffi c shaping
transmission control
protocol/Internet
protocol (TCP/IP)
virtual private network
(VPN)
voice over IP (VoIP)
wide area network (WAN)
Wi-Fi
WiMAX
Assuring Your Learning
1. Explain how network capacity is measured.
2. How are devices identifi ed to a network?
3. Explain how digital signals are transmitted.
4. Explain the functions of switches and routers.
5. QoS technologies can be applied to create two tiers
of traffi c. What are those tiers? Give an example of
each type of traffi c.
6. Typically, networks are confi gured so that down-
loading is faster than uploading. Explain why.
7. What are signifi cant issues about 4G wireless
networks?
8. What are two 4G wireless standards?
9. How is network performance measured?
10. Discuss two applications of near-fi eld communica-
tion (NFC).
11. What are the benefi ts of APIs?
12. Describe the components of a mobile communica-
tion infrastructure.
13. What is the range of WiMAX? Why does it not
need a clear line of sight?
14. Why are VPNs used to secure extranets?
15. How can group dynamics improve group work?
How can it disrupt what groups might accomplish?
16. What are the benefi ts of using software to conduct
brainstorming in the cloud (remotely)?
17. How do mobile devices contribute to carbon
emissions?
18. Discuss the ethical issues of anytime-anywhere
accessibility.
19. What health and quality-of-life issues are associ-
ated with social networks and a 24/7 connected
lifestyle?
20. Is distracted driving an unsolvable problem? Explain.
DISCUSS: Critical Thinking Questions
21. Visit the Alcatel-Lucent website (www.alcatel-lucent.
com) and search for “eco-sustainability strategy.”
a. Read about Alcatel’s eco-sustainability strategy.
b. Describe how the company is developing eco-
sustainable networks. In your opinion, is this an
effective strategy? Explain.
c. Explain how the company is enabling a low-
carbon economy. What is its most signifi cant
contribution to sustainability?
22. Visit the Google apps website. Identify three types of
collaboration support and their value in the workplace.
23. Compare the various features of broadband
wireless networks (e.g., 3G, Wi-Fi, and WiMAX).
Visit at least three broadband wireless network
vendors.
a. Prepare a list of capabilities for each network.
b. Prepare a list of actual applications that each
network can support.
c. Comment on the value of such applications to
users. How can the benefi ts be assessed?
EXPLORE: Online and Interactive Exercises
c04NetworksForEfficientOperationsAndSustainability.indd Page 138 11/3/14 7:32 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
CASE 4.2 Business Case 139
24. Visit Youtube.com and search for tutorials on the
latest version of iMindMap. Watch a few of the
tutorials. As an alternative, watch the video at http://
www.youtube.com/watch?v=UVt3Qu6Xcko&list=PL
A42C25431E4EA4FF. Describe the potential value
of sharing maps online and synching maps with other
computers or devices. What is your opinion of the
ease or complexity of the iMindMap interface?
25. Visit Google Green at www.google.com/green/
bigpicture. Describe Google’s efforts to minimize
the environmental impact of its services. Do you
believe that Google can reduce its carbon footprint
beyond zero, as the company claims? Explain your
answer.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
CASE 4.2
Business Case: Google Maps API for Business
A restaurant owner has a website where customers can place
orders for delivery. When a customer inputs a delivery address,
a software script verifi es whether the address is within the
delivery range of the restaurant. If the address is not in the
delivery range, the site does not let the customer check out
and sends a message informing the customer that he or she
is outside of the delivery range. The script requests informa-
tion from Google Maps via an API to calculate whether or not
the address was in the range. The free version, called Google
Maps API, allows up to 2,500 requests per day from a single
IP address and is limited to noncommercial purposes.
The owner needs to purchase a Google Maps API for
Business license because any requests in excess of 2,500 will
be ignored. The Google Maps API for Business provides bet-
ter resolution, scale, and enhanced features and support to
businesses that add maps to their websites, mobile apps,
or asset-tracking applications.
Directions and Routing Features
The Google Maps API delivers the full power of Google’s
routing engine to applications. Among other features, it:
• Generates routes between up to 23 locations for driving,
walking, or cycling.
• Generates routes to avoid toll roads or highways.
• Reduces travel time by calculating the optimal order to
visit each location.
• Calculates travel time and distance between locations,
for example, to offer users a way to fi lter search results by
drive time.
Data Visualization
The Google Maps API lets managers visualize data using heat
maps, symbols, and custom styles. For U.S. maps, companies
have access to a demographics layer containing up-to-date
census data provided by Nielsen and 5-year projections of
many data fi elds. The demographics layer may only be used
on intranets or internal websites.
Advanced Analytics
The Google Maps API for Business offers an analytics tool
that shows how visitors interact with the maps—for example,
how many visitors switched to satellite view, what they
zoomed, and which map features were used the most. Using
this information, businesses can customize the user experi-
ence based on their preferences and better engage with
customers.
Automobile Association
Google Maps is the most widely used online mapping service
in the world, with more than 800,000 sites using the Google
Maps API and over 250 million active users on mobile devices
alone. In the United Kingdom, the Automobile Association
(AA) provides roadside assistance and directions to motor-
ists. AA invested in the Google Maps API for Business to offer
interactive route planning and improve visitors’ experiences.
The value AA derived from the API was a 12 percent increase
in the number of routes downloaded, hitting an average of
4 million downloads per week of its routing or trip-planning
service. Approximately 20 percent of site visitors remained
on the site for at least fi ve minutes—up from only six percent
prior to implementation. The API also cuts the time and cost
of IT support for the mapping platform.
Questions
1. Describe Google Maps API.
2. Why do you think Google provides free noncommercial
use of its Maps API?
3. How many times have you used a website’s mapping
feature for directions or to calculate distance? How did
having a familiar interface improve your experience?
4. Google claims that its Maps API helps a company’s
customers and employees make better business and
purchasing decisions by visualizing important informa-
tion on a familiar map. Explain how data visualization
provides these benefi ts. Give two examples in your
explanation.
c04NetworksForEfficientOperationsAndSustainability.indd Page 139 11/3/14 10:57 AM f-w-204a /208/WB01490/9781118897782/ch04/text_s
140 Chapter 4 Networks for Efficient Operations and Sustainability
CASE 4.3
Video Case: Fresh Direct Connects for Success
Visit and explore the Fresh Direct website at www.freshdirect.
com to learn about the company. Visit the Cisco website at
www.cisco.com. Search for the video “Fresh Direct Produce.”
The URL is www.cisco.com/cisco/web/solutions/small_
business/resource_center/index.html. Watch the video to
learn how Fresh Direct uses network technology to connect
employees, suppliers, and customers. Meet CEO Davis
Yung and see how Cisco wireless technology gives his team
constant connectivity to meet customer demands (video runs
2:50 minutes).
Questions
1. Describe how network technology enables Fresh Direct’s
business model.
2. What factors are critical to Fresh Direct’s performance?
AT&T Enterprise. “Sony Builds an IPv6 Network for the
Future.” AT&T VPN Services Case Study. October 16, 2012.
business.att.com/content/customertestimonial/sony-case-
study-IP-VPN
Basulto, D. “Five Reasons to Get Excited About 5G Networks.”
The Washington Post, February 27, 2014.
Boden, R. “Total Produce Pushes Fruit and Veg with NFC in
Supermarkets.” NFC World, April 15, 2014.
Cisco. Cisco Visual Networking Index (VNI): Global Mobile
Data Traffi c Forecast Update, 2013–2018. February 5, 2014a.
Cisco. “Sony Adopts Cisco Solution for Global IPv6 Project.”
Cisco Public Information, Customer Case Study. 2014b.
Dean, J. “Let a Billion Streams Bloom.” Fast Company,
November 2013.
Edwards, J. “The Connected Life.” Teradata Magazine, Q1, 2014.
Engineering and Physical Sciences Research Council.
“New Design for Mobile Phone Masts Could Cut Carbon
Emissions.” April 22, 2014.
Ford Motors. “Looking Further with Ford—2014 Trends.” 2013.
Khedekar, N. “IPv6 Demystifi ed—What You Should Know.”
Tech 2 FirstPost, June 7, 2012.
O’Connor, M. C. “Santander: Test Bed for Smart Cities and
Open Data Policies.” SmartPlanet.com, May 8, 2013.
Sustainable Development Commission. “Smarter Moves:
How Information Communications Technology Can Promote
Sustainable Mobility.” SDC Report. January 25, 2010.
Wheeler, T. “Setting the Record Straight on the FCC’s Open
Internet Rules.” FCC blog, April 24, 2014.
Woods, D. “The Strengths and Limits of Automatically Created
APIs.” CITO Research, September 20, 2013a.
Woods, D. “The Strengths and Limits of Automatically
Created APIs.” CITO Research, October 2, 2013b.
References
c04NetworksForEfficientOperationsAndSustainability.indd Page 140 07/11/14 5:22 PM f-392 /208/WB01490/9781118897782/ch04/text_s
Chapter Snapshot
Managers no longer question whether their networks
will be attacked, but how much damage will be done,
how long the investigation will take, and how much
the investigation and fines will cost. After detecting a
network hack, credit card-processing company Global
Payments, Inc. spent 14 months investigating the resulting
data breach that exposed 1.5 million U.S. debit and credit
card accounts. Global’s damages totaled $93 million, bro-
ken down as follows: $36 million in fraud losses and fines
and $77 million for the investigation, remediation, credit
1. Describe today’s most destructive cyberthreats, data
breaches, targeted attacks, malware, and other IT
security risks facing organizations and why they are
so difficult to defend against.
2. Explain why cyber risk management is a business priority;
outline an organizational model for cybersecurity; and
describe the cybersecurity process.
3. Explain why mobile devices, apps, and cloud-based
services are high-risk attack vectors, the importance of
BYOD (bring your own devices) policies, and the defenses
needed to counteract exposure to mobile malware.
4. Describe the characteristics of fraud and how enterprises
can defend against and detect fraudulent activities.
5. Explain how internal controls help ensure compliance
with industry and federal regulations. Assess the ability
to maintain business operations in the event of a
network crash, debilitating hacker attack, or other IT
disruption.
Learning Outcomes
141
Chapter Snapshot
Case 5.1 Opening Case: BlackPOS Malware
Steals Target’s Customer Data
5.1 The Face and Future of Cyberthreats
5.2 Cyber Risk Management
5.3 Mobile, App, and Cloud Security
5.4 Defending Against Fraud
5.5 Compliance and Internal Control
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 5.2 Business Case: Lax Security at
LinkedIn Exposed
Case 5.3 Video Case: Botnets, Malware Security,
and Capturing Cybercriminals
References
Cybersecurity and
Risk Management5
Chapter
c05CybersecurityAndRiskManagement.indd Page 141 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
monitoring, and identity theft insurance for affected con-
sumers. In October 2013 a data breach at Adobe exposed
the account information of up to 152 million users—the
largest data breach in history. No costs have yet been
reported, but according to the Ponemon 2013 Cost
of Data Breach Study, the average cost of a breached
account is $188 (Ponemon Institute, 2013). In August
2014, fraudsters targeted customers of JPMorgan Chase,
the No. 1 U.S. bank by assets. The massive phishing
campaign, called Smash and Grab, was unusual because
it collected customers’ login data and also infected PCs
with Dyre, a banking trojan that lifted login data for
other institutions. The bank was not able to identify who
was behind the Smash and Grab attack.
In Chapter 5, you will learn about devastating cyber-
threats, data breaches, fraud, damages caused by cyber-
criminals’ aggressive tactics—and how organizations
defend against them.
CASE 5.1 OPENING CASE
BlackPOS Malware Steals Target’s Customer Data
Target is a major discount retailer in the United States (Figure 5.1). Target’s man-
agement admitted that 40 million credit and debit card accounts were exposed
between November 27 and December 15, 2013. During that peak holiday shopping
season, hackers captured credit card data from the stores’ point-of-sale (POS)
payment terminals (Figure 5.2).
Target disclosed the breach on December 19, 2013; then on January 10, 2014,
the retailer also reported that hackers stole 40 million credit card numbers along
with the personal information of another 70 million customers. The incident scared
shoppers away, affecting the company’s profits throughout 2014.
142
Figure 5.1 Target data
breach overview.
HOW THE ATTACK
WAS CARRIED OUT
Several experts believe that POS malware bought from the criminal underground
was responsible. Malware, short for malicious software, are computer programs
whose code causes disruption, destruction, or other devious action. Malware named
BlackPOS is sold on the black market for $1,800 or more. The malware is adver-
tised on Internet underground forums under the generic name Dump Memory
Grabber by Ree. BlackPOS is malware designed to be installed on POS devices in
2nd largest retail discounter in the
United States.
4Q 2013 profit dropped 46% and
sales revenue fell 5.3% after
breach was disclosed.
Company Profile
Hackers installed malware,
probably bought from a criminal
underground website, on Target’s
POS terminals to capture data
from credit and debit cards and
transmit back to the hackers.
Data Breach
Personal and financial data from
up to 70 million customers stolen
by hackers using malware.
Estimated the breach to cost
from $400 million to $450 million.
Extent of the Breach
and Costs
Target
c05CybersecurityAndRiskManagement.indd Page 142 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
CASE 5.1 Opening Case 143
order to record data from credit and debit cards swiped through the infected device.
Specifically, the malware identifies the process associated with the credit card
reader and steals payment card Track 1 and Track 2 data from its memory. These
are the data stored on the magnetic strip of payment cards that were used to clone
or create counterfeit cards.
More feature-rich versions of BlackPOS selling for roughly $2,300 provide
encryption support for stolen data. The BlackPOS creator is not confirmed, but
experts tracking the malware suggest that the hacker may be based in Russia or
Ukraine. The U.S. Secret Service estimated that the type of malware that led to
Target’s breach has affected over 1,000 U.S. businesses.
Figure 5.2 POS payment
terminal. Malware-infected
POS terminals caused
Target’s data breach.
FINANCIAL IMPACT OF
THE DATA BREACH
In February 2014 Target reported that its 2013 fourth-quarter (4Q) profit dropped
46 percent and sales revenue fell 5.3 percent. A few months later, in May 2014,
Target estimated that technological changes to harden its IT security would cost
more than $100 million in addition to $61 million incurred in breach-related
expenses in Q4 2013. These costs and damages harmed the company’s profitability.
Gregg Steinhafel, chairman, president, and CEO of Target, tried to reassure
customers and investors, saying, “As we plan for the new fiscal year, we will continue
to work tirelessly to win back the confidence of our guests. . . . We are encouraged
that sales trends have improved in recent weeks” (D’Innocenzio, 2014).
Six months after the breach, it still was not clear when Target would fully
recover. A security analyst at the tech firm Gartner estimated the costs of the breach
to range from $400 million to $450 million. That includes the bills associated with
fines from credit card companies and services for its customers like free credit card
report monitoring. Target also faced at least 70 lawsuits related to privacy invasion
and negligence, alleging Target did not take proper steps to protect consumer data.
TARGET BRUSHED
OFF WARNINGS
According to financial services firm Cowen Group’s note to investors, criminals
were able to hack into Target’s database due to a lack of security, which might have
been a result of underinvestment by senior management.
Target’s cybersecurity staff had also warned management to review the security
of its payment card system at least two months before the breach. At the time of
the warning, Target was updating the payment terminals, which makes them more
vulnerable to attack, in preparation for the holiday season. Data security was not a
top priority. Months before the attack, the federal government and private research
firms were also warning companies about the emergence of new types of malware
©
A
le
p
h
St
ud
io
/S
hu
tt
er
st
oc
k
c05CybersecurityAndRiskManagement.indd Page 143 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
144 Chapter 5 Cybersecurity and Risk Management
(malicious computer code) targeting payment terminals. However, because of
numerous security warnings that retailers receive every week, it is difficult to identify
or decide which ones are the most urgent.
EXECUTIVE FALLOUT On May 5, 2014, CEO Steinhafel resigned from all his positions effective immedi-
ately, after extensive discussions with the board of directors. Steinhafel had been
CEO since 2008 and a Target employee for 35 years. The company stated that
Steinhafel and board members had mutually decided that it was time for Target
to continue under new leadership. Target shares were down close to 3 percent in
morning trading following the news.
Steinhafel’s untimely exit was the second significant executive fallout from the
data breach. In April 2014 Target’s CIO had also been replaced.
Sources: Compiled from D’Innocenzio (2014), Yadron et al. (2014), Krebs on Security (2014), Sharf
(2014), O’Connor (2014), and Kratsas (2014).
Questions
1. Was cybersecurity a priority at Target? Explain.
2. How did lax security impact Target’s sales revenue and profi t performance?
3. According to experts, how was the data breach executed?
4. In addition to the data theft, what else was damaged by this incident?
5. Was this cybersecurity incident foreseeable? Was it avoidable?
6. Why might management not treat cyberthreats as a top priority?
7. Research recent news concerning this data breach. Has Target recovered
from it? Explain.
8. Assuming that the CEO and CIO were forced to resign, what message
does that send to senior management at U.S. companies?
Since 2013 the number of data records stolen by hackers has increased at an alarm-
ing rate, as shown in Figure 5.3. In fact, 2013 has been dubbed the “Year of the
Breach” because there were 2,164 reported data breaches that exposed an estimated
823 million records. Almost half of the 2013 breaches occurred in the United
States, where the largest number of records were exposed—more than 540 million
data records or 66 percent. Table 5.1 lists the top seven biggest data breaches
5.1 The Face and Future of Cyberthreats
Figure 5.3 Number of
reported data records
breached worldwide,
2009–2013.
900
600
800
700
300
400
500
200
100
0
2009
M
ill
io
n
2010 2011 2012 2013
193M
95M
413M
264M
823M
c05CybersecurityAndRiskManagement.indd Page 144 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.1 The Face and Future of Cyberthreats 145
TABLE 5.1 Biggest Data Breaches Worldwide, 2013–2014, in Terms of Number
of Data Records Breached
Number of
Data Records
Company Breached
eBay
Online auction
Attackers compromised several employees’ log-in credentials between Up to 145 million
February and March 2014 to gain access to the company’s network and,
through it, compromised a database that contained customer names,
encrypted passwords, email addresses, physical addresses, phone numbers,
and dates of birth.
Michaels Stores
Retail stores
The POS systems at 54 Michaels stores were attacked by criminals using 2.6 million payment
highly sophisticated malware between May 2013 and card numbers and
January 2014. expiration dates
Adobe
Software vendor
The stolen fi les contained active and inactive accounts for numerous 150 million
Adobe products: Acrobat, Photoshop, ColdFusion, and CreativeCloud.
The fi les hold Adobe IDs, e-mail addresses, passwords, credit/debit card
numbers, expiration dates, and other PII (Personally Identifi able
Information).
Target
2nd largest discount retailer in the United States 110 million
UbiSoft
3rd largest gaming company in Europe and the United States 58 million
Turkish Government
No antivirus software was installed on the hacked system. 54 million
Evernote
Online note-taking service 50 million
Living Social
Daily deals website 50 million
Cupid Media
Popular dating service
The records of 56 Department of Homeland Security employees were 42 million
stolen in this breach.
c05CybersecurityAndRiskManagement.indd Page 145 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
146 Chapter 5 Cybersecurity and Risk Management
worldwide in 2013. The consequences of lax cybersecurity include damaged repu-
tations, financial penalties, federal and state government fines, lost market share,
falling share prices, and consumer backlash.
The main cause of a data breach is hacking, but the reason hacking is so suc-
cessful is negligence—management not doing enough to defend against cyber-
threats. Even high-tech companies and market leaders, as shown in Table 5.1,
appear to be detached from the value of the confidential data they store and the
threat that highly motivated hackers will try to steal them. As you will read in this
section, robust data security is not the responsibility of IT alone, but the ongoing
duty of everyone in an organization.
Hacks of high-tech companies like LinkedIn, Google, Amazon, eBay, and
Sony, and top security agencies like the CIA and FBI are proof that no one is
safe. Cyberwarriors are too well funded and motivated. Countering cyber-threats
demands diligence, determination, and investment. IT at Work 5.1 illustrates the
self-destructing and encryption features of a secure smartphone in order to protect
conversations, transmissions, and stored data effectively.
Boeing Co. is an aerospace and defense contractor known
for its fighter planes, jets, and satellites (Figure 5.4). It pos-
sesses advanced technology that prevents its products from
being hacked. Boeing made the unusual decision to build a
smartphone that provides complete security against hacking
and spying by governments or well-financed adversaries.
The Black smartphone, released in 2014, is an Android
phone manufactured as a sealed device, with both epoxy
around the casing and screws with tamper-proof covering.
The phone encrypts voice and data communication and, if
tampered with, self-destructs. For instance, any attempt to
open the Black’s casing deletes all data and software on the
device and leaves it inoperable.
Boeing Black’s Security Features
Manufactured in the United States, Black uses dual SIM
cards to enable it to access multiple cell networks instead of
a single network. It can be configured to connect with bio-
metric sensors and to communicate via satellite. Due to the
phone’s security features, Boeing released few details about
the wireless network operators or manufacturer it was work-
ing with. The advanced features needed to achieve this level
of cybersecurity include:
• Encryption to store sensitive information securely
• Hardware root of trust to ensure software authenticity
IT at Work 5 . 1
Black—the Self-Destructing Smartphone
Figure 5.4 Boeing Co. is
best known as a jet and
fi ghter plane manufacturer.
The company expanded
into the secure smartphone
market with the release of
Black. ©
Jo
rd
an
T
an
/S
hu
tt
er
st
oc
k
c05CybersecurityAndRiskManagement.indd Page 146 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.1 The Face and Future of Cyberthreats 147
• Hardware crypto engine to protect both stored and
transmitted data
• Embedded secure components to enable trusted operations
• Trusted platform modules to provide secure key storage
• Secure boot to maintain device image integrity
Boeing applied the defense-in-depth model to Black to
ensure that if one layer of security was compromised, other
layers would continue to secure the device, its data, and
transmissions. Multilayered defense-in-depth models are
absolutely necessary.
Assessing the Value of Smartphone Security
According to Boeing’s filings with the U.S. Federal
Communications Commission (FCC), Black is designed for
use by government agencies and contractors who need to
secure their communication and data. It is also for companies
aiming to keep their data away from the prying tactics of the
NSA or other spying organizations. Black enables the secure
access and exchange of critical data and communications on
a trusted mobile device.
It is believed that the use of a secure smartphone like
Black might have prevented a recent leaked telephone call
that undercut Washington’s diplomacy in Ukraine. A senior
U.S. State Department officer and ambassador to Ukraine
apparently used unencrypted cell phones for a call about
political developments in Ukraine that became public—and
caused embarrassment. All State Department government-
owned BlackBerry devices have data encryption, but not
voice encryption.
Sources: Compiled from Hosenball (2014), Westcott (2014),
Boeing.com (2014), and Gallagher (2014).
Questions
1. Why do you think government-issued smartphones are a
target for data theft and transmission theft?
2. What security precautions is Boeing taking with respect
to the manufacture and sale of Black?
3. What security features are built into Black?
4. Why is voice encryption an important digital security
measure?
5. Why is a defense-in-depth model vital to a security smart-
phone such as Black?
BATTLING
CYBERTHREATS IS
THE COST OF DOING
BUSINESS
Cybersecurity experts warn that battling distributed denial-of-service (DDoS)
and malware attacks has become part of everyday business for all organizations.
Hackers, hactivists, crime syndicates, the military, militant groups, industrial spies,
disgruntled employees, fraudsters, and hostile governments will continue to attack
networks for profit, fame, revenge, or an ideology; to wage warfare, terrorism, or an
antiterrorism campaign; or to disable their target. For example, the Department of
Homeland Security (DHS) Industrial Control Systems Cyber Emergency Response
Team (ICS-CERT) warned that attacks against critical infrastructure are growing
(Figure 5.5). There were more than 200 brute-force cyberattack incidents reported
Figure 5.5 Six of the 18 national critical infrastructures (from upper left,
clockwise): commercial facilities; defense industrial base; transportation systems;
national monuments and icons; banking and fi nance; and agriculture and food.
© Zoonar/NREY/
Age Fotostock
© Zoonar/unknown/
Age Fotostock
© Blakeley/Age
Fotostock
© Philip Lange/Age Fotostock
© Werner Nick/Age Fotostock © alptraum/Age Fotostock
c05CybersecurityAndRiskManagement.indd Page 147 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
148 Chapter 5 Cybersecurity and Risk Management
between October and May 2013, surpassing the 198 total attacks in all of fiscal
year 2012. More than half of the attacks were against the energy sector. Attacks on
critical infrastructure could significantly disrupt the functioning of government and
business—and trigger cascading effects far beyond the targeted sector and physical
location of the incident.
International, federal, and state laws and industry regulations mandate that
enterprises invest in cybersecurity defenses, audits, and internal controls to help
secure confidential data, prevent attacks, and defend against fraud and unauthor-
ized transactions such as money laundering. To help keep managers updated on
the latest cyberthreats and prioritize defenses, KPMG publishes its Data Loss
Barometer. The annual report describes the latest trends and statistics for data
losses worldwide. Key findings and predictions are listed in Table 5.2.
Social Engineering and BYOD
New cyberthreats are emerging and overtaking the familiar threats—viruses, lost
disks, and DDoS attacks. Experts believe the greatest cybersecurity dangers over
the next few years will involve persistent threats, mobile computing, and the use
of social media for social engineering. Social engineering is also known as human
hacking—tricking users into revealing their credentials and then using them to gain
access to networks or accounts. From an IT security perspective, social engineering
is a hacker’s clever use of deception or manipulation of people’s tendency to trust,
be helpful, or simply follow their curiosity. Powerful IT security systems cannot
defend against what appears to be authorized access.
Humans are easily hacked, making them and their social media posts high-risk
attack vectors. For instance, it is often easy to get users to infect their corporate
network or mobiles by tricking them into downloading and installing malicious apps
or backdoors.
Another more recent vulnerability is bring your own device (BYOD). The
BYOD trend is driven by employees using their own devices for business purposes
because they are more powerful than those the company has provided. Another
factor is mobility. More and more people are working from home and on the go—
putting an end to the formerly typical 9 to 5 workday. In consequence, employees
do not want to juggle multiple devices. With BYOD, companies cut costs by not
having to purchase and maintain mobile devices.
Of course, when an employee’s device is lost, the company can suffer a data
breach if the device is not encrypted. In the past, and before the BYOD push,
A distributed denial-of-
service (DDoS) attack bom-
bards a network or website
with traffic (i.e., requests for
service) to crash it and leave
it vulnerable to other threats.
Hactivist is short for hacker-
activist or someone who
does hacking for a cause.
Hacking, regardless of
motive, is a crime.
Critical infrastructure is
defined as “systems and
assets, whether physical or
virtual, so vital to the United
States that the incapacity or
destruction of such systems
and assets would have a
debilitating impact on secu-
rity, national economic secu-
rity, national public health or
safety, or any combination of
those matters.”
TABLE 5.2 KPMG Data Loss Barometer
Key fi ndings from KPMG Data Loss Barometer Report and its predictions for
the next few years:
• Hacking is the number-one cause of data loss.
• Internal threats have reduced signifi cantly, while external threats are increasing
signifi cantly.
• The most hacked sectors are technology, fi nancial services, retail, and media.
• Expect increased loss of data from mobile devices.
• Expect a steep rise in automated hacking and botnets.
• Expect less tolerant regulators and greater fi nes and negative consequences.
• Expect greater visibility and reporting of data loss as a result of less tolerant
regulators.
Source: KPMG (2012).
c05CybersecurityAndRiskManagement.indd Page 148 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.1 The Face and Future of Cyberthreats 149
employees would be at their desks on a land line and on a computer plugged into
the wall with a network cable. This change in exposure requires greater investment
to defend against BYOD risks.
Cybercrime Survey
Respondents to the 2013 U.S. State of Cybercrime Survey indicated that secu-
rity incidents increased 33 percent despite implementation of security practices.
Current cybersecurity technologies and policies are simply not keeping pace with
fast-evolving threats. Many threats and challenges that organizations face today
were unimaginable 10 years ago. And longstanding threats such as fraud and iden-
tity theft still remain. Cyberthreats will continue to emerge, evolve, and worsen
over the next 10 years and beyond. IT at Work 5.2 provides a summary of the
2014 Global State of Information Security Survey. The results of Survey 2014 show
that executives are responding to the need to fund enhanced security activities
and have substantially improved technology safeguards, processes, and strategies.
Unfortunately, adversaries have done better.
The 2014 Global State of Information Security Survey is
conducted by the consulting firm PwC US (Pricewaterhouse
Coopers, pwc.com) and CIO and CSO magazines (PWC,
2014). According to the annual global survey:
• Defending yesterday. While organizations have
improved security significantly, they are not keeping
pace with today’s determined adversaries. Too many rely
on yesterday’s cybersecurity practices that are ineffective
at combating today’s threats.
• Bigger attack surface. The attack surface—consisting of
business partners, suppliers, customers, and others—has
expanded due to larger volumes of data flowing through
multiple channels. Protecting all data at an equally high
level is no longer practical. Cybersecurity strategies need
to classify and prioritize defenses.
• Implementing before securing. Popular technologies
like cloud computing, mobile, and BYOD (bring your own
device) are implemented before they are secured.
• Not ready for next-generation cyberthreats. Few organi-
zations are prepared to manage future threats. According
to Gary Loveland, a principal in PwC’s security practice,
“What’s needed is a new model of information security,
one that is driven by knowledge of threats, assets, and
the motives and targets of potential adversaries” (PWC,
2014).
• Unsafe cloud. While 47 percent of respondents use
cloud computing, only 18 percent include provisions for
cloud in their security policy. SaaS is the most widely
adopted cloud service, but PaaS shows strong growth.
• Unprepared for advanced persistent threats (APT).
Among the most dangerous cyberthreats are advanced
persistent threats (APT). APT is a stealth network attack in
which an unauthorized person gains access to a network
and remains undetected for a long time. Skilled hack-
ers launch APT attacks to steal data continuously (e.g.,
daily) over months or year—rather than to cause damage
that would reveal their presence. APTs require a new
information-protection model that focuses on continuous
monitoring of network activity and high-value informa-
tion. Most U.S organizations lack these capabilities.
IT at Work 5 . 2
Global State of Information Security Survey
HIGH-VISIBILITY
CYBERCRIMINALS AND
HACKTIVISTS
Advanced persistent threat (APT) attackers want to remain unnoticed so they
can continue to steal data, as described in IT at Work 5.2. Profit-motivated cyber-
criminals often operate in stealth mode. In contrast, hackers and hacktivists with
personal agendas carry out high-profile attacks.
c05CybersecurityAndRiskManagement.indd Page 149 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
150 Chapter 5 Cybersecurity and Risk Management
Hacktivists’ Motivations and Dangerous Pranks
These types of cybercriminals seemed to take on everyone from Sony and security
firm RSA to the CIA (Central Intelligence Agency) and a Mexican drug cartel
throughout 2011 and 2012. During the Arab Spring (street revolutions of 2013),
hacktivists LulzSec and Anonymous showed how vulnerable anyone’s online pres-
ence was, even that of major governments. One of LulzSec’s specialties is finding
websites with poor security, and then stealing and posting information from them
online. Some of their attacks may seem more like Internet pranks than serious
cyberwarfare, but they are still illegal.
Hacktivist Attacks and Victims
Hackers committed daring data breaches, compromises, data leaks, thefts, threats,
and privacy invasions in 2012. Two cases are listed below.
Combined Systems, Inc. Proudly displaying its hacktivist flag, Anonymous
took credit for knocking Combined Systems, Inc. offline and stealing personal
data from its clients. Anonymous went after Combined Systems, which sells
tear gas and crowd-control devices to law enforcement and military organiza-
tions, to protest war profiteers.
CIA. In February 2012, for the second time in less than a year, Anonymous
launched a denial of service (DoS) attack that forced the CIA website offline.
The CIA takedown followed a busy week for the hacktivists. Within 10 days,
the group also went after Chinese electronics manufacturer Foxconn, American
Nazi groups, antivirus firm Symantec, and the office of Syria’s president.
LulzSec is a hacker group
and spin-off of the loosely
organized hacking collective.
STEALTH, PROFIT-
MOTIVATED
CYBERCRIMES
Most hack activities do not become headline-grabbers until after the incidents are
detected and reported. However, victimized companies are reluctant to discuss
them so statistics are scarce. Most data breaches go unreported, according to cyber-
security experts, because corporate victims fear that disclosure would damage their
stock price, or because they never knew they were hacked in the first place.
Theft of Trade Secrets and Other Confidential Information
Theft of trade secrets has always been a threat from corporate moles, disgruntled
employees, and other insiders. Of course, now it is easier to steal information
remotely, mostly because of smartphones and the BYOD trend. Hackers’ preferred
modus operandi is to break into employees’ mobile devices and leapfrog into
employers’ networks––stealing secrets without a trace.
U.S. cybersecurity experts and government officials are increasingly concerned
about breaches from other countries into corporate networks either through mobile
devices or other means. Mike McConnell, former director of the National Security
Agency (NSA), warned: “In looking at computer systems of consequence—in govern-
ment, Congress, at the Department of Defense, aerospace, companies with valuable
trade secrets—we’ve not examined one yet that has not been infected by an advanced
persistent threat” (Perlroth, 2012b). In the meantime, companies are leaking critical
information, often without realizing it. Scott Aken, a former FBI agent who special-
izes in counterintelligence and computer intrusion, stated, “In most cases, companies
do not realize they’ve been burned until years later when a foreign competitor puts out
their very same product—only they’re making it 30 percent cheaper” (Perlroth, 2012b).
Do-Not-Carry Rules
U.S. companies, government agencies, and organizations are now imposing do-
not-carry rules, which are based on the assumption that devices will inevitably
be compromised according to Mike Rogers, current chairman of the House
Intelligence Committee. House members can bring only “clean” devices and are
c05CybersecurityAndRiskManagement.indd Page 150 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.1 The Face and Future of Cyberthreats 151
forbidden from connecting to the government’s network while abroad. Rogers said
he travels “electronically naked” to ensure cybersecurity during and after a trip. IT
at Work 5.3 describes the reasons for following do-not-carry rules.
OBJECTIVES OF
CYBERSECURITY
Cybersecurity needs to accomplish the following:
• Make data and documents available and accessible 24/7 while simultaneously
restricting access.
• Implement and enforce procedures and acceptable use policies (AUPs) for
data, networks, hardware, and software that are company- or employee-
owned, as discussed in the opening case.
• Promote secure and legal sharing of information among authorized persons
and partners.
• Ensure compliance with government regulations and laws.
• Prevent attacks by having network intrusion defenses in place.
• Detect, diagnose, and respond to incidents and attacks in real time.
• Maintain internal controls to prevent unauthorized alteration of data and
records.
• Recover from business disasters and disruptions quickly.
Business policies, procedures, training, and disaster recovery plans as well as hard-
ware and software are critical cybersecurity.
When Kenneth G. Lieberthal, an expert at the Brookings
Institution, travels to other countries, he follows a routine
that seems straight from a secret agent movie. He leaves his
smartphone and laptop at home. Instead, he brings loaner
devices, which he erases before he leaves the United States
and wipes clean the minute he returns. While traveling, he
disables Bluetooth and Wi-Fi and never lets his phone out of
his sight. While in meetings, he not only turns off his phone,
but also removes the battery for fear his microphone could
be turned on remotely.
Lieberthal connects to the Internet only through an
encrypted, password-protected channel. He never types in a
password directly, but copies and pastes his password from
a USB thumb drive. By not typing his password, he eliminates
the risk of having it stolen if key-logging software were to be
installed on his device.
Questions
1. Many travelers might consider Lieberthal’s method too
inconvenient. Clearly, his electronically clean methods
are time-consuming and expensive. In your opinion,
is there a trade-off between cybersecurity and conve-
nience? Explain.
2. Create a list of best cybersecurity practices for travelers
based on Lieberthal’s methods.
IT at Work 5 . 3
Traveling Electronically Clean
The U.S. Chamber of Commerce did not learn that it and its member organiza-
tions were the victims of a cybertheft for months until the FBI informed the Chamber
that servers in China were stealing data from four of its Asia policy experts, individuals
who frequently travel to Asia (Perlroth, 2012a). Most likely, the experts’ mobile
devices had been infected with malware that was transmitting information and files
back to the hackers. By the time the Chamber hardened (secured) its network, hackers
had stolen at least six weeks of e-mails, most of which were communications with
the largest U.S. corporations. Even later, the Chamber learned that its office printer
and a thermostat in one of its corporate apartments were communicating with an
Internet address in China. The Chamber did not disclose how hackers had infiltrated
its systems, but its first step was to implement do-not-carry rules.
c05CybersecurityAndRiskManagement.indd Page 151 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
152 Chapter 5 Cybersecurity and Risk Management
In 2013 cyberthreats were at the top of US intelligence reports for the first time.
Cyberthreats are now the number one type of danger facing the United States,
according to current U.S. National Intelligence Director James Clapper, who coor-
dinates the CIA, NSA, and many other agencies.
Questions
1. Why was 2013 dubbed the “Year of the Breach”?
2. What causes or contributes to data breaches?
3. Why are cybercriminals so successful?
4. What was the biggest data breach in history?
5. Describe the basic method of a distributed denial-of-service (DDoS)
attack.
6. What is a critical infrastructure? List three types of critical infrastructures.
7. What are the motives of hactivists?
8. What is the number-one cause of data loss or breaches?
9. Why is social engineering a technique used by hackers to gain access
to a network?
10. What are two BYOD security risks?
11. Explain why APT attacks are diffi cult to detect.
12. What are the objectives of cybersecurity?
Every enterprise has data that profit-motivated criminals want. Customer data,
networks, websites, proprietary information systems, and patents are examples of
assets—things of value that need to be protected. The greater the value of the asset
to the company and to criminals, the greater the security needs to be. The smart
strategy is to invest more to protect the company’s most valuable assets rather than
try to protect all assets equally, as discussed in IT at Work 5.2. The IT security
field—like sports and law—has its own terminology, which is summarized for quick
reference in Table 5.3 and Figure 5.6.
5.2 Cyber Risk Management
Figure 5.6 Basic IT security
concepts.
Threat
Someone or something that
can cause loss, damage,
or destruction.
Vulnerability
Weakness or flaw in a system that
allows an attack to be successful.
Companies’ IT security defenses
influence how vulnerable they are
to threats.
Asset
Something of value that needs to
protected.
Customer data, trade secrets,
proprietary formulas, & other
intellectual property.
Exploit
A program (code) that allows attackers
to automatically break into a system
through a vulnerability.
To attack or take advantage of a
vulnerability.
Risk
Probability of a threat exploiting a
vulnerability and the resulting cost of
the loss, damage, disruption,
or destruction.
Risk = f (Threat, Vulnerability, Cost of
the impact)
c05CybersecurityAndRiskManagement.indd Page 152 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.2 Cyber Risk Management 153
TABLE 5.3 Defi nitions of IT Security Terms
Term Defi nition
Threat Something or someone that may result in harm to an asset
Risk Probability of a threat exploiting a vulnerability
Vulnerability A weakness that threatens the confi dentiality, integrity, or availability
(CIA) of an asset
CIA triad (confi dentiality, Three key cybersecurity principles
integrity, availability)
Exploit Tool or technique that takes advantage of a vulnerability
Risk management Process of identifying, assessing, and reducing risk to an acceptable
level
Exposure Estimated cost, loss, or damage that can result if a threat exploits a
vulnerability
Access control Security feature designed to restrict who has access to a network, IS,
or data
Audit Procedure of generating, recording, and reviewing a chronological
record of system events to determine their accuracy
Encryption Transforming data into scrambled code to protect them from being
understood by unauthorized users
Plaintext or clear text Readable text
Ciphertext Encrypted text
Authentication Method (usually based on username and password) by which an IS
validates or verifi es that a user is really who he or she claims to be
Biometrics Methods to identify a person based on a biological feature, such as a
fi ngerprint or retina
Firewall Software or hardware device that controls access to a private network
from a public network (Internet) by analyzing data packets entering
or exiting it
Intrusion detection A defense tool used to monitor network traffi c (packets) and
system (IDS) provide alerts when there is suspicious traffi c, or to quarantine
suspicious traffi c
Fault tolerance The ability of an IS to continue to operate when a failure occurs, but
usually for a limited time or at a reduced level
Botnet (short for A network of hijacked computers that are controlled remotely—
Bot network) typically to launch spam or spyware. Also called software robots.
Botnets are linked to a range of malicious activity, including identity
theft and spam.
c05CybersecurityAndRiskManagement.indd Page 153 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
154 Chapter 5 Cybersecurity and Risk Management
A threat is something or someone that can damage, disrupt, or destroy an asset.
Vulnerabilities are gaps, holes, weaknesses, or flaws in corporate networks, IT secu-
rity defenses, user training, policy enforcement, data storage, software, operating
systems, apps, or mobile devices that expose an organization to intrusions or other
attacks. Vulnerabilities threaten the confidentiality, integrity, or availability (CIA)
of data and information systems, as defined in Figure 5.7.
Vulnerabilities exist in networks, operating systems, apps, databases, mobile
devices, and cloud environments. These vulnerabilities are attack vectors or entry
points for malware, hackers, hactivists, and organized crime.
The term exploit has more than one meaning. An exploit is a hacker tool or
software program used to break into a system, database, or device. An attack or
action that takes advantage of a vulnerability is also called an exploit. Criminal and
terrorist groups buy exploits from more than 25 underground forums or brokers.
Exploits themselves are not against the law, and several legitimate firms also sell
them. For example, in 2012 Massachusetts-based Netragard (netragard.com) sold
more than 50 exploits to businesses and government agencies in the United States
for prices ranging from $20,000 to more than $250,000.
Risk is the probability of a threat successfully exploiting a vulnerability and
the estimated cost of the loss or damage. For example, car insurance premiums are
based on risk calculations that take into consideration the probability of an accident
and the cost of the damage.
Figure 5.7 Three objectives
of data and information
systems security.
TECH NOTE 5.1 Vulnerabilities in Microsoft Sidebar and Gadgets
In July 2012 Microsoft issued a security advisory warning of vulnerabilities in Gad-
gets and Sidebar:
We’ve discovered that some Vista and Win7 gadgets don’t adhere to
secure coding practices and should be regarded as causing risk to the
systems on which they’re run.
Hackers Exploit Gadget: How Did They Do That?
A vulnerability in Windows Gadgets makes it easy for hackers to gain access and
run malware or a malicious app as if the hacker were the real user. That means, if the
legitimate user is logged on with administrative (admin) user rights, then those rights
give the attacker complete control of the system.
Confidentiality: No unauthorized data disclosure.
Integrity: Data, documents, messages, and other files
have not been altered in any unauthorized way.
Availability: Data is accessible when needed by those
authorized to do so.
c05CybersecurityAndRiskManagement.indd Page 154 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.2 Cyber Risk Management 155
Security Solution: Fix It
An automated Fix It solution was posted on Microsoft’s support site. Clicking the
Fix It button disabled the Windows Sidebar and Gadgets on Windows Vista and
Windows 7 platforms, so the vulnerability could not be exploited.
Key Observation
Toolbars, gadgets, and any other add-ons are pieces of code, or software—and can
create vulnerabilities or actually be malware. Many free add-ons, apps, and other
downloads are trojans. These trojans look and function as you expect them to, but in
stealth mode they track everything you do on the Internet and then send that infor-
mation to the creator of the malware.
HACKERS: INTERNET
UNTOUCHABLES
How big is the threat of malware? IT security researchers discover roughly 70,000
malicious programs every day. Why would so many hackers be spending so much
time generating or launching these programs? The simple answers are that hacking
is a profitable industry, a big part of underworld cybercrime, and a way for hactivists
to protest. Hackers feel untouchable knowing that they face very low risk of capture
and punishment.
Inside Look at How the Hacking Industry Operates
Hacking is an industry with its own way of operating, a workforce, and support services.
Contract hackers are available for hire or complete hack attacks can be bought. Hacking
help desks provide 24/7 support—making sophisticated attacks easier to arrange.
Hackers use social networks and underground forums to share exploits, usernames, and
passwords—the credentials needed to infect users’ personal and work accounts.
Organized crime groups quickly learned that cybercrimes have better payoffs
than the drug trade and with almost no risk. They become virtually untouchable by
law enforcement because no one sees the crime. It is not surprising then that almost
every survey reaches the same troubling conclusion—the costs and frequency of
cybercrimes are increasing. That means much stronger IT security practices and
defenses are obviously needed. One of the greatest weaknesses is users who ignore
the dangers of weak passwords. Password management is essential to security.
Users Set Themselves up for Cybermuggings
In July 2012 the hacker group D33Ds Company published almost half a million
e-mail addresses and passwords on underground sites that allegedly had been
stolen from Yahoo. D33Ds claims it hacked into Yahoo’s database by exploiting a
common vulnerability that had not been patched. Here is a breakdown of the users
whose passwords invited a cybermugging:
• 1,600 users used “1234546”
• 800 users used “password”
• 1,400 users used “mypassword” or “password” as the base word, such as
“password1”
Weak passwords are clearly dangerous. If any password, such as for Adobe
software, becomes known to hackers, they can try that e-mail/password combina-
tion at all popular sites like Facebook, Gmail, and so on and compromise not one
but many of your accounts. Unfortunately, too many people are lazy and choose
passwords that are easily guessable, short, common, or a word in the dictionary.
Strong passwords contain a combination of upper- and lowercase letters, numbers,
and punctuation marks, and are at least eight characters long.
c05CybersecurityAndRiskManagement.indd Page 155 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
156 Chapter 5 Cybersecurity and Risk Management
Internal Threats
Threats from employees, referred to as internal threats, are a major challenge large-
ly due to the many ways an employee can carry out malicious activity. Insiders may
be able to bypass physical security (e.g., locked doors) and technical security (e.g.,
passwords) measures that organizations have put in place to prevent unauthorized
access. Why? Because defenses such as firewalls, intrusion detection systems (IDS),
and locked doors mostly protect against external threats. Despite the challenges,
insider incidents can be minimized with a layered defense-in-depth strategy consist-
ing of security procedures, acceptable use policies, and technology controls.
Phishing and Web-based Threats
Companies increasingly adopt external, Web-based applications and employees
bring consumer applications into the enterprise. Criminal enterprises are following
the money on the Internet, a global market of potential victims.
Phishing is a deceptive method of stealing confidential information by pretend-
ing to be a legitimate organization, such as PayPal, a bank, credit card company, or
other trusted source. Phishing messages include a link to a fraudulent phish website
that looks like the real one. When the user clicks the link to the phish site, he or
she is asked for a credit card number, social security number, account number, or
password. Phishing remains successful and profitable for criminals.
Criminals use the Internet and private networks to hijack large numbers of PCs
to spy on users, spam them, shake down businesses, and steal identities. But why
are they so successful? The Information Security Forum (securityforum.org), a self-
help organization that includes many Fortune 100 companies, compiled a list of the
top information problems and discovered that nine of the top ten incidents were the
result of three factors:
1. Mistakes or human error
2. Malfunctioning systems
3. Misunderstanding the effects of adding incompatible software to an existing
system
Unfortunately, these factors can too easily defeat cybersecurity technologies
that companies and individuals use to protect their information. A fourth factor
identified by the Security Forum is motivation, as described in IT at Work 5.4.
According to the U.S. Department of State (state.gov), orga-
nized crime rings rely on money laundering to fund their
operations. This practice poses international and national
security threats. It undermines free enterprise by crowding
out the private sector, and it threatens the financial stability
of nations.
Funds used to finance terrorist operations are very dif-
ficult to track. Despite this obscurity, by adapting methods
used to combat money laundering, such as financial analysis
and investigations, authorities can significantly disrupt the
financial networks of terrorists and build a paper trail and
base of evidence to identify and locate leaders of terrorist
organizations and cells.
International organized crime syndicates, al-Qaeda–
affiliated groups, and other cybercriminals steal hundreds of
billions of dollars every year. Cybercrime is safer and easier
than selling drugs, dealing in black market diamonds, or
robbing banks. Online gambling offers easy fronts for inter-
national money-laundering operations.
IT at Work 5 . 4
Money Laundering, Organized Crime, and Terrorist Financing
c05CybersecurityAndRiskManagement.indd Page 156 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.2 Cyber Risk Management 157
GOVERNMENT
REGULATIONS
IT defenses must satisfy ever-stricter government and international regulations.
Primary regulations are the United States’ Sarbanes-Oxley Act (SOX), Gramm-
Leach-Bliley Act (GLB), Federal Information Security Management Act (FISMA),
and USA PATRIOT Act; Japan’s Personal Information Protection Act; Canada’s
Personal Information Protection and Electronic Document Act (PIPEDA);
Australia’s Federal Privacy Act; the United Kingdom’s Data Protection Act; and
global financial services’ Basel III. All mandate the protection of personally iden-
tifiable information (PII). The director of the Bureau of Consumer Protection at
the Federal Trade Commission (FTC) warned that the agency would bring enforce-
ment action against small businesses lacking adequate policies and procedures to
protect consumer data.
Two accepted models for IT governance are enterprise risk management (ERM)
and Control Objectives for Information and Related Technology (COBIT). ERM
is a risk-based approach to managing an enterprise that integrates internal control,
the Sarbanes–Oxley Act mandates, and strategic planning. ERM is intended to be
part of routine planning processes rather than a separate initiative. The ideal place
to start is with buy-in and commitment from the board and senior leadership.
COBIT, which is described in IT at Work 5.5, is an internationally accepted IT
governance and control framework for aligning IT with business objectives, deliver-
ing value, and managing associated risks. It provides a reference for management,
users, and IS audit, control, and security practitioners.
INDUSTRY STANDARDS Industry groups imposed their own standards to protect their customers and their
members’ brand images and revenues. One example is the Payment Card Industry
Data Security Standard (PCI DSS) created by Visa, MasterCard, American
Express, and Discover. PCI is required for all members, merchants, or service pro-
viders that store, process, or transmit cardholder data. PCI DSS requires merchants
IT governance is the supervision, monitoring, and control
of an organization’s IT assets. The IT Governance Institute
(itgi.org) publishes COBIT, which many companies use as
their IT governance guide. COBIT can be downloaded from
isaca.org.
The Sarbanes-Oxley Act requires that companies pro-
vide proof that their financial applications and systems are
controlled (secured) to verify that financial reports can be
trusted. This requires that IT security managers work with
business managers to do a risk assessment to identify which
systems depend on technical controls rather than on busi-
ness process controls. To meet COBIT, IT systems should be
based on the following three principles:
• Principle of economic use of resources: This principle
acknowledges that the cost of information security
needs to be balanced with its benefits. It is the basic
cost–benefit principle with which you are familiar. For
example, you would not spend more to protect your
auto, home, or other asset than they were worth.
Because it is possible, for instance, for companies to set
a very low value on the confidential data of customers
and employers and therefore avoid basic information
security defenses, the next two principles try to ensure
that this does not happen.
• Principle of legality: This principle requires that compa-
nies invest in information security to meet minimum legal
requirements. This is a basic security principle, just like
having hand railings on stairways, fire extinguishers, and
alarm systems.
• Accounting principles: These principles require that the
integrity, availability, and reliability of data and informa-
tion systems be maintained.
IT at Work 5 . 5
COBIT and IT Governance Best Practices
c05CybersecurityAndRiskManagement.indd Page 157 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
158 Chapter 5 Cybersecurity and Risk Management
and card payment providers to make certain their Web applications are secure. If
done correctly, this could reduce the number of Web-related security breaches.
The purpose of the PCI DSS is to improve customers’ trust in e-commerce,
especially when it comes to online payments, and to increase the Web security of
online merchants. To motivate following these standards, the penalties for noncom-
pliance are severe. The card brands can fine the retailer, and increase transaction
fees for each credit or debit card transaction. A finding of noncompliance can be
the basis for lawsuits.
IT SECURITY DEFENSE-
IN-DEPTH MODEL
Defense-in-depth is a multilayered approach to information security. The basic
principle is that when one defense layer fails, another layer provides protection. For
example, if a wireless network’s security was compromised, then having encrypted
data would still protect the data, provided that the thieves could not decrypt it.
The success of any type of IT project depends on the commitment and involve-
ment of executive management, also referred to as the tone at the top. The same
is true of IT security. This information security tone makes users aware that inse-
cure practices and mistakes will not be tolerated. Therefore, an IT security model
begins with senior management commitment and support, as shown in Figure 5.8.
The model views information security as a combination of people, processes, and
technology.
Step 1: Senior management commitment and support. Senior managers’ influence
is needed to implement and maintain security, ethical standards, privacy practices,
and internal control. IT security is best when it is top-driven. Senior managers
decide how stringent infosec policies and practices should be in order to comply
with laws and regulations. Financial institutions are subject to strict security and
antimoney laundering (AML) rules because they face numerous national and
international regulations and have high-value data. Advertising agencies and less
regulated firms tend to have more lenient rules. Other factors influencing infosec
policies are a corporation’s culture and how valuable their data are to criminals.
For instance, management may decide to forbid employees from using com-
pany e-mail accounts for nonwork purposes, accessing social media during work
hours, or visiting gambling sites. These decisions will then become rules stated in
company policy, integrated into procedures, and implemented with technology
defenses. Sites that are forbidden, for instance, can be blocked by firewalls.
Step 2: Acceptable use policies and IT security training. Organizations need to put
in place strong policies and processes that make responsibilities and accountabilities
clear to all employees. An acceptable use policy (AUP) explains what management
has decided are acceptable and unacceptable activities, and the consequences of
noncompliance. Rules about tweets, texting, social media, e-mail, apps, and hard-
ware should be treated as extensions of other corporate policies—such as physical
safety, equal opportunity, harassment, and discrimination. No policy can address
Figure 5.8 IT security
defense-in-depth model.
Step 4 Hardware and software
(kept up-to-date)
Step 3 IT security procedures
and enforcement
Step 2 Acceptable use policies
and IT security training
Step 1 Senior management
commitment and support
c05CybersecurityAndRiskManagement.indd Page 158 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.2 Cyber Risk Management 159
every future situation, so rules need to be evaluated, updated, or modified. For
example, if a company suffers a malware infection traced to an employee using an
unprotected smartphone to connect to the company network, policies to restrict or
prohibit those connections might be advisable.
Step 3: IT security procedures and enforcement. Secure procedures define how
policies will be enforced, how incidents will be prevented, and how to respond to
an incident. Here are the basic secure procedures to put in place:
1. Defi ne enforcement procedures. Rules that are defi ned in the AUP must be en-
forced and enforcement procedures must be applied consistently. Procedures for
monitoring employee Internet and network usage are defi ned at this stage.
2. Designate and empower an internal incident response team (IRT). The IRT
typically includes the CISO, legal counsel, senior managers, experienced com-
municators, and key operations staff. Minimizing the team size and bureaucracy
can expedite decision making and response. Because there may be signifi cant
liability issues, legal counsel needs to be involved in incident response planning
and communication.
3. Defi ne notifi cation procedures. When a data breach occurs, the local police de-
partment, local offi ce of the FBI, Securities and Exchange Commission (SEC),
the U.S. Secret Service, or other relevant agency needs to be notifi ed immedi-
ately. Federal and state laws or industry regulations may defi ne how and when
affected people need to be notifi ed.
4. Defi ne a breach response communications plan. Effective incident response
communication plans include personnel and processes with lists, channels, and
social media needed to execute all communications that might be needed.
5. Monitor information and social media sources. Monitor Twitter, social media,
and news coverage as a standard procedure to understand how people are re-
sponding to the incident and criticizing the company. Damage control proce-
dures may be needed.
When an incident occurs, the organization is ready to respond intelligently—
having the correct information to be honest, open, and accountable, and to commu-
nicate with consumers and other important audiences as quickly as possible.
Step 4: Hardware and software. The last step in the model is implementation of
software and hardware needed to support and enforce the AUP and secure practic-
es. The selection of hardware and software defenses is based on risk, security bud-
get, AUP, and secure procedures. Every device that connects to an organization’s
network; every online activity and mobile app of employees; and each file sent or
received is an access point. Technology defense mechanisms need to be:
• able to provide strong authentication and access control.
• industrial-grade.
• appropriate for the types of networks and operating systems.
• installed and configured correctly.
• tested rigorously.
• maintained regularly.
Keep in mind that security is an ongoing unending process, and not a problem
that can be solved with hardware or software. Hardware and software security
defenses cannot protect against irresponsible business practices.
One of the biggest mistakes managers make is underestimating IT vulnerabilities
and threats. Most workers use their laptops and mobiles for both work and leisure,
and in an era of multitasking, they often do both at the same time. Yet offtime
or offsite use of devices remains risky because, despite policies, employees continue
c05CybersecurityAndRiskManagement.indd Page 159 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
160 Chapter 5 Cybersecurity and Risk Management
to engage in dangerous online and communication habits. Those habits make them
a weak link in an organization’s otherwise solid security efforts. These threats can
be classified as unintentional or intentional.
UNINTENTIONAL
THREATS
Unintentional threats fall into three major categories: human error, environ-
mental hazards, and computer system failures.
• Human error can occur in the design of the hardware or information system.
It can also occur during programming, testing, or data entry. Not changing
default passwords on a firewall or failing to manage patches creates security
holes. Human errors also include untrained or unaware users responding to
phishing scams or ignoring security procedures. Human errors contribute to
the majority of internal control and information security problems.
• Environmental hazards include volcanoes, earthquakes, blizzards, floods,
power failures or strong fluctuations, fires (the most common hazard),
defective air conditioning, explosions, radioactive fallout, and water-
cooling-system failures. In addition to the primary damage, computer
resources can be damaged by side effects, such as smoke and water. Such
hazards may disrupt normal computer operations and result in long wait-
ing periods and exorbitant costs while computer programs and data files
are recreated.
• Computer systems failures can occur as the result of poor manufactur-
ing, defective materials, and outdated or poorly maintained networks.
Unintentional malfunctions can also happen for other reasons, ranging from
lack of experience to inadequate testing.
INTENTIONAL THREATS Examples of intentional threats include data theft; inappropriate use of data (e.g.,
manipulating inputs); theft of mainframe computer time; theft of equipment and/
or programs; deliberate manipulation in handling, entering, processing, transfer-
ring, or programming data; labor strikes, riots, or sabotage; malicious damage to
computer resources; destruction from viruses and similar attacks; and miscellaneous
computer abuses and Internet fraud.
TYPES OF MALWARE Viruses, worms, trojans, rootkits, backdoors, botnets, and keyloggers are types of
malware. Technically, malware is a computer program or code that can infect any-
thing attached to the Internet and is able to process the code. Most viruses, trojans,
and worms are activated when an attachment is opened or a link is clicked. But
when features are automated, they may trigger malware automatically, too. For
example:
• If an e-mail client, such as Microsoft Outlook or Gmail, is set to allow script-
ing, then virus infection occurs by simply opening a message or attachment.
• Viewing e-mail messages in HTML, instead of in plain text, can trigger virus
infections.
Remote-access trojans, or RATS, create an unprotected backdoor into a sys-
tem through which a hacker can remotely control that system. As the name implies,
a backdoor provides easy access to a system, computer, or account by eliminating
the need to authenticate with a username and password. Whenever you store your
username and password, you create a backdoor to that account.
A malware’s payload refers to the actions that occur after a system has been
infected. The payload carries out the purpose of the malware. The payload could
cause damage that is visible or operate in stealth mode so as to remain undetected.
A vector is the specific method that malware uses to propagate, or spread, to other
machines or devices. Malware may also replicate, or make copies of itself.
c05CybersecurityAndRiskManagement.indd Page 160 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.2 Cyber Risk Management 161
Today’s malware is designed for long-term control of infected machines.
Advanced malware sets up outbound communication channels in order to upload
stolen data, download payloads, or do reconnaissance.
Malware creators use social engineering to maximize the range or impact of
their viruses, worms, and so forth. For example, the ILoveYou worm used social
engineering to entice people to open malware-infected e-mail messages. The
ILoveYou worm attacked tens of millions of Windows computers in May 2000
when it was sent as an e-mail attachment with the subject line: ILOVEYOU. Often
out of curiosity, people opened the attachment named LOVE-LETTER-FOR-
YOU.TXT.vbs—releasing the worm. Within nine days, the worm had spread world-
wide, crippling networks, destroying files, and causing an estimated $5.5 billion in
damages. Notorious hacker Kevin Mitnick, who served time in jail for hacking, used
social engineering as his primary method to gain access to computer networks. In
most cases, the criminal never comes face-to-face with the victim, but communi-
cates via the phone or e-mail.
Malware Reinfection, Signatures, Mutations, and Variants
When a host computer is infected, attempts to remove the malware may fail—and
the malware may reinfect the host for these two reasons:
1. Malware is captured in backups or archives. Restoring the infected backup or
archive also restores the malware.
2. Malware infects removable media. Months or years after the initial infection,
the removable media may be accessed, and the malware could attempt to infect
the host.
Most antivirus (AV) software relies on signatures to identify and then block
malware. According to the Worldwide Malware Signature Counter, at the start of
2013, there were an estimated 19 million malware signatures. Detecting and pre-
venting infections are not always a possibility. Zero-day exploits—malware so new
their signatures are not yet known—are an example. Malware authors also evade
detection by AV software and firewalls by altering malware code to create variants,
which have new signatures. But not all procedures or AV tools are capable of
removing every trace of the malware. Even if the malicious parts of the infection
can be cleaned from a system, the remaining pieces of code could make the system
unstable or exposed to future infection.
Data tampering is a common means of attack that is overshadowed by other
types of attacks. It refers to an attack during which someone enters false or fraudu-
lent data into a computer, or changes or deletes existing data. Data tampering is
extremely serious because it may not be detected. This is the method often used by
insiders and fraudsters.
TARGETED ATTACKS
ON ENTERPRISES
Corporate and government secrets are currently being stolen by APTs. Most APT
attacks are launched through phishing. Typically, this type of attack begins with
some reconnaissance on the part of attackers. This can include researching pub-
licly available information about the company and its employees, often from social
networking sites. This information is then used to create targeted phishing e-mail
messages. A successful attack could give the attacker access to the enterprise’s
network.
APTs are designed for long-term espionage. Once installed on a network, APTs
transmit copies of documents, such as Microsoft Office files and PDFs, in stealth
mode. APTs collect and store files on the company’s network; encrypt them; then
send them in bursts to servers often in China or Russia. This type of attack has
been observed in other large-scale data breaches that exposed significant numbers
of identities.
c05CybersecurityAndRiskManagement.indd Page 161 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
162 Chapter 5 Cybersecurity and Risk Management
APT Example: Operation Aurora
An attack named Operation Aurora proved to be very successful at targeting,
exploiting, accessing, and stealing valuable intellectual property from its victims’
databases. Operation Aurora attacked in six steps, as described in Figure 5.9.
Standard IT security technologies failed to prevent these six steps from occurring
and users did not know they had been hacked. Once attackers gain access to inter-
nal systems (Step 6), they can steal corporate secrets.
Botnets
A botnet is a collection of bots, which are malware-infected computers. Those infected
computers, called zombies, can be controlled and organized into a network of zombies
on the command of a remote botmaster (also called bot herder). Storm worm, which is
spread via spam, is a botnet agent embedded inside over 25 million computers. Storm’s
combined power has been compared to the processing might of a supercomputer, and
Storm-organized attacks are capable of crippling any website. Zombies can be com-
manded to monitor and steal personal or financial data—acting as spyware. Botnets are
used to send spam and phishing e-mails and launch DDoS attacks. Botnets are extremely
dangerous because they scan for and compromise other computers, which then can be
used for every type of crime and attack against computers, servers, and networks.
Spear Phishing
Spear phishers often target select groups of people with something in common—they
work at the same company, bank at the same financial institution, or attend the same
university. The scam e-mails appear to be sent from organizations or people the
potential victims normally receive e-mails from, making them even more deceptive.
Here is how spear phishing works:
1. Spear phish creators gather information about people’s companies and jobs
from social media or steal it from computers and mobile devices, and then use
that same information to customize messages that trick users into opening an
infected e-mail.
2. Then they send e-mails that look like the real thing to targeted victims, offering
all sorts of urgent and legitimate-sounding explanations as to why they need
your personal data.
3. Finally, the victims are asked to click on a link inside the e-mail that takes them
to a phony but realistic-looking website, where they are asked to provide pass-
words, account numbers, user IDs, access codes, PINs, and so on.
Figure 5.9 Overview of the
six steps in Operation Aurora
APT attack.
1. A targeted user
receives a link in an
e-mail or text from
a “trusted” source.
4. The exploit
downloads a binary
disguised as an
image and executes
the malicious payload.
5. The payload sets
up a backdoor and
connects to C and C
servers in Taiwan.
6. Attackers now
have complete
access to internal
systems. They are
now a persistent
threat.
2. When the user
clicks the link, a
website hosted in
Taiwan loads. It
contains malicious
JavaScript.
3. The user’s
browser downloads
and executes the
JavaScript, which
includes a zero-day
IE exploit.
c05CybersecurityAndRiskManagement.indd Page 162 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.3 Mobile, App, and Cloud Security 163
IT Defenses
Since malware and botnets use many attack methods and strategies, multiple tools
are needed to detect them and/or neutralize their effects. Three essential defenses
are the following:
1. Antivirus Software: Antimalware tools are designed to detect malicious codes
and prevent users from downloading them. They can also scan systems for the
presence of worms, trojans, and other types of threats. This technology does not
provide complete protection because it cannot defend against zero-day exploits.
Antimalware may not be able to detect a previously unknown exploit.
2. Intrusion Detection Systems (IDSs): As the name implies, an IDS scans for un-
usual or suspicious traffi c. An IDS can identify the start of a DoS attack by the
traffi c pattern, alerting the network administrator to take defensive action, such
as switching to another IP address and diverting critical servers from the path of
the attack.
3. Intrusion Prevention Systems (IPSs): An IPS is designed to take immediate
action—such as blocking specifi c IP addresses—whenever a traffi c-fl ow anomaly
is detected. An application-specifi c integrated circuit–based (ASIC) IPS has the
power and analysis capabilities to detect and block DDoS attacks, functioning
somewhat like an automated circuit breaker.
Questions
1. What are threats, vulnerabilities, and risk?
2. Explain the three components of the CIA triad.
3. What is an attack vector? Give an example.
4. What is an exploit? Give an example.
5. What is a contract hacker?
6. Give an example of a weak password and a strong password.
7. How are phishing attacks done?
8. What are the four steps in the defense-in-depth IT security model?
9. Defi ne and give an example of an unintentional threat.
10. Defi ne and give an example of an intentional threat.
11. List and defi ne three types of malware.
12. What are the risks caused by data tampering?
13. Defi ne botnet and explain its risk.
14. Explain spear phishing.
15. What are the functions of an IDS and IPS?
With the popularity of e-readers, netbooks, Google’s Chrome OS, Facebook,
YouTube, Twitter, LinkedIn, and other social networks, IT security dangers are
growing worse.
5.3 Mobile, App, and Cloud Security
CLOUD COMPUTING
AND SOCIAL NETWORK
RISKS
Social networks and cloud computing increase vulnerabilities by providing a single
point of failure and attack for organized criminal networks. Critical, sensitive, and
private information is at risk, and like previous IT trends, such as wireless networks,
the goal is connectivity, often with little concern for security. As social networks
increase their services, the gap between services and information security also
c05CybersecurityAndRiskManagement.indd Page 163 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
164 Chapter 5 Cybersecurity and Risk Management
increases. E-mail viruses and malware have been declining for years as e-mail secu-
rity has improved. This trend continues as communication shifts to social networks
and newer smartphones. Unfortunately, malware finds its way to users through
security vulnerabilities in these new services and devices. Web filtering, user educa-
tion, and strict policies are key to preventing widespread outbreaks.
In Twitter and Facebook, users invite in and build relationships with others.
Cybercriminals hack into these trusted relationships using stolen logins. Fake anti-
virus and other attacks that take advantage of user trust are very difficult to detect.
An overriding reason why these networks and services increase exposure to
risk is the time-to-exploitation of today’s sophisticated spyware and mobile viruses.
Time-to-exploitation is the elapsed time between when vulnerability is discovered
and when it is exploited. That time has shrunk from months to minutes so IT staff
have ever-shorter timeframes to find and fix flaws before they are compromised by
an attack. Some attacks exist for as little as two hours, which means that enterprise
IT security systems must have real time protection.
When new vulnerabilities are found in operating systems, applications, or wired
and wireless networks, patches are released by the vendor or security organization.
Patches are software programs that users download and install to fix a vulnerability.
Microsoft, for example, releases patches that it calls service packs to update and fix
vulnerabilities in its operating systems, including Vista, and applications, including
Office 2010. Service packs can be downloaded from Microsoft’s website.
Left undetected or unprotected, vulnerabilities provide an open door for IT
attacks and business disruptions and their financial damages. Despite even the best
technology defenses, information security incidents will occur mostly because of
users who do not follow secure computing practices and procedures.
BYOD Users bringing their personal mobile devices and their own mobile apps to work and
connecting them to the corporate network is part of the larger consumerization of
information technology (COIT) trend. Bring your own device (BYOD) and bring
your own apps (BYOA) are practices that move enterprise data and IT assets to
employees’ mobiles and the cloud, creating a new set of tough IT security challenges.
Figure 5.10 summarizes how apps, mobiles, and cloud services put organizations at a
greater risk of cyberattack. Widely used apps that are outside of the organization’s
firewall are Twitter, Google Analytics, Dropbox, WebEx, and Salesforce.com.
Enterprises take risks with BYOD practices that they never would consider
taking with conventional computing devices. One possible reason is that new
TECH NOTE 5.2 Android Botnet over SMS
A botnet of exploited Android phones was sending massive amounts of spam
via Yahoo e-mail servers using the short messaging service (SMS) as the command
and control (C&C) channel. Infected androids, or bots, log into the owner’s Yahoo
Mail account to send spam. Most of the devices were located in Chile, Venezuela,
Thailand, Indonesia, Lebanon, Philippines, Russia, and Saudi Arabia—that is, in
countries where users are less likely to get their Android apps from the Google Play
market, which automatically ensures that the apps are safe. Users downloading free
phone apps from third-party app stores to avoid paying for legitimate versions were
actually downloading the Android malware.
User should only download apps from trusted sources and also check the
reviews to verify the apps are legitimate because there are many bogus apps.
c05CybersecurityAndRiskManagement.indd Page 164 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.3 Mobile, App, and Cloud Security 165
devices, apps, and systems, such as the Windows Phone 7 platform, have been
rolled out so quickly. As a result, smartphones are not being managed as secure
devices, with fewer than 20 percent of users installing antimalware and 50 per-
cent using some type of data encryption. In fact, employees expected instant
approval of (or at least no disapproval of) and support for their new iPads within
hours of the product’s release.
BYOD raises serious and legitimate areas of concern. Hackers break into
employees’ mobile devices and leapfrog into employers’ networks—stealing secrets
without a trace. New vulnerabilities are created when personal and business data
and communications are mixed together. All cybersecurity controls—authentication,
access control, data confidentiality, and intrusion detection—implemented on
corporate-owned resources can be rendered useless by an employee-owned device.
Also, the corporation’s mobile infrastructure may not be able to support the
increase in mobile network traffic and data processing, causing unacceptable delays
or requiring additional investments.
Figure 5.10 Factors that
expose companies and users
to attack.
NEW ATTACK VECTORS Mobile devices and apps, social media, and cloud services introduce even more
attack vectors for malware, phishing, and hackers. By mid-2012, roughly 75 percent
of U.S. organizations had adopted BYOD practices, but many rushed in without
considering security. Mobiles rarely have strong authentication, access controls, and
encryption even though they connect to mission-critical data and cloud services.
Only 20 percent of Androids have a security app installed.
Malicious (Rogue) Mobile Apps
The number of malicious Android apps is growing at an alarming rate. According to the
report Mobile Phone Biometric Security Analysis and Forecasts 2011–2015 (Egan, 2011),
at least 5,000 new malicious Android apps were found in the first quarter of 2012 (Q1
2012). During the next quarter (Q2 2012), 10,000 new rogue apps were found within
one month—and by the end of the quarter, there were 40,000 rogue apps (TrendMicro
TrendLabs, 2012). Almost all of these apps were found in unreliable third-party stores.
But 17 rogue apps managed to get into Google Play and they were downloaded over
700,000 times before being removed. Rogue mobile apps can serve up trojan attacks,
other malware, or phishing attacks.
Companies offering legitimate apps for online banking, retail shopping, gam-
ing, and other functions might not be aware of threats lurking in their app stores.
And despite their best efforts, legitimate app store operators cannot reliably police
their own catalogs for rogue apps.
With a single click on a malicious link, users can launch a targeted attack
against their organizations.
Minimum Security Defenses for Mobiles
Minimum security defenses for mobile devices are mobile biometrics, rogue app
monitoring, remote wipe capability, and encryption. For travelers, do-not-carry
rules may be a necessary defense.
• Business operations are controlled by apps, systems,
and networks that are so interconnected that
anyone’s mobile device is an entry point for attacks.
• Cloud services have created vulnerabilities in systems
and apps that are surprising even the experts.
Cloud services
create
vulnerabilities
Apps and mobiles
create attack
vectors
c05CybersecurityAndRiskManagement.indd Page 165 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
166 Chapter 5 Cybersecurity and Risk Management
Mobile biometrics, such as voice and fingerprint biometrics, can significantly
improve the security of physical devices and provide stronger authentication for
remote access or cloud services. When Apple acquired Siri, Inc. in 2010, the voice-
based personal assistant Siri was integrated into its operating system, iOS 5. Siri
gave Apple the potential to move into voice biometrics. Voice biometrics is an
effective authentication solution across a wide range of consumer devices including
smartphones, tablets, and TVs. Future mobile devices are expected to have finger-
print sensors to add another authentication factor.
Another type of defense is rogue app monitoring to detect and destroy mali-
cious apps in the wild. Several vendors offer 24/7 monitoring and detection services
to monitor major app stores and shut down rogue apps to minimize exposure and
damage.
In the event of loss or theft of a device, a mobile kill switch or remote wipe
capability is needed as well as encryption. All major smartphone platforms have
some kind of remote erase capability and encryption option.
In response to mobile security threats, many U.S. companies and govern-
ment agencies are imposing do-not-carry rules on mobiles to prevent compromise.
Travelers can bring only “clean” devices and are forbidden from connecting to the
government’s network while abroad.
Questions
1. How do social networks and cloud computing increase vulnerability?
2. Why are patches and service packs needed?
3. What is consumerization of information technology (COIT)?
4. Why does BYOD raise serious and legitimate areas of concern?
5. What are two types of mobile biometrics?
6. Explain rogue app monitoring.
7. Why is a mobile kill switch or remote wipe capability important?
8. What are the purposes of do-not-carry rules?
Crime can be divided into two categories depending on the tactics used to carry out
the crime: violent and nonviolent. Fraud is nonviolent crime because instead of a
gun or knife, fraudsters use deception, confidence, and trickery. Fraudsters carry
out their crime by abusing the power of their position or by taking advantage of the
trust, ignorance, or laziness of others.
5.4 Defending Against Fraud
FRAUD Occupational fraud refers to the deliberate misuse of the assets of one’s
employer for personal gain. Internal audits and internal controls are essential
to the prevention and detection of occupation frauds. Several examples are
listed in Table 5.4.
High-profile cases of occupational fraud committed by senior executives
such as Bernard Madoff have led to increased government regulation. However,
increased legislation has not put an end to fraud. IT at Work 5.6 gives some insight
into Madoff’s multibillion fraud that also led to the investigation of the agency
responsible for fraud prevention—the U.S. Securities and Exchange Commission
(SEC, sec.gov/).
c05CybersecurityAndRiskManagement.indd Page 166 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.4 Defending Against Fraud 167
TABLE 5.4 Types and Characteristics of Organizational Fraud
Does This Fraud
Impact Financial
Type of Fraud Statements? Typical Characteristics
Operating No Occurs off the books. Median loss
management due to corruption: over 6 times
corruption greater than median loss due to
misappropriation ($530,000 vs.
$80,000).
Confl ict of No A breach of confi dentiality,
interest such as revealing competitors’
bids; often occurs coincident
with bribery.
Bribery No Uses positional power or money
to infl uence others.
Embezzlement or Employee theft: employees’
“misappropriation” access to company property
creates the opportunity for
embezzlement.
Senior management Yes Involves a massive breach of
fi nancial reporting trust and leveraging of positional
fraud power.
Accounting cycle Yes This fraud is called “earnings
fraud management” or earning
engineering, which are in violation
of generally accepted accounting
principles (GAAP) and all other
accounting practices. See aicpa.org.
Disgraced financier Bernard Madoff is in jail after pleading
guilty in 2009 to the biggest fraud in Wall Street history. For
four decades, Madoff perpetrated a complex and sinister
fraud. Prior to his arrest, Madoff was viewed as a charis-
matic man and stellar financier with favorable connections
to power brokers on Wall Street and in Washington. Since
his arrest, federal prosecutors have maintained that Bernard
Madoff ran a scheme that bilked wealthy individuals and
large nonprofits out of an estimated $64.8 billion.
Social Engineering
Fundamentally, Madoff relied on social engineering and
the predictability of human nature to generate income for
himself—and not on financial expertise. Madoff would ask
people to invest in his funds, which were by invitation only,
to create the illusion of exclusivity. Madoff used this tactic to
create the illusion that only the elite could invest because of
consistent returns and his stellar Wall Street reputation. As
IT at Work 5 . 6
Madoff Defrauds Investors of $64.8 Billion
c05CybersecurityAndRiskManagement.indd Page 167 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
168 Chapter 5 Cybersecurity and Risk Management
he expected, wealthy investors mistook exclusivity to mean
a secret formula for a sure thing.
Unusual steady returns were one of the many well-
known red flags indicating fraud that investors and watch-
dogs chose to disregard. In fact, in hindsight, investors admit
they missed several glaring red flags.
The Red Flags
Among others, the following classic red flags would have
made this fraud detectable much earlier if they had not been
consistently ignored:
• Madoff was trusted because he was a Wall Street fixture,
so his work was not given full scrutiny.
• Unbelievable returns defied the market. They were
impossible, yet this fact was ignored.
• Madoff used a sense of exclusivity—a hook to play “hard
to get.” This false sense of exclusivity is a telltale sign of
a Ponzi scheme.
• Reports of consistently good but never spectacular gains,
so-called steady returns, lulled all kinds of investors into
a false sense of security over time.
Madoff and SEC Under Investigation
Not only did this scandal trigger an investigation into Madoff;
it also prompted an investigation of the watchdog agency,
the SEC. It was investigated by Congress and the agency’s
inspector general for repeatedly ignoring whistleblowers’
warnings about Madoff’s operations. Created by Congress
in 1934 during the Great Depression, the SEC is charged
with ensuring that public companies accurately disclose their
financials and business risks to investors, and that brokers
who trade securities for clients make their investors’ interests
a first priority.
Madoff is not the only party at fault. Madoff worked
with dozens of feeder funds and other middlemen to lure
money into his Ponzi scheme. The investigation into “how-
could-this-have-happened?” has involved forensic account-
ing as well as computer forensics. The latter experts were
tasked with uncovering any smoking-gun e-mails and other
digital messages that revealed “who knew what” and “who
did what.” Forensics experts dug deeper into the physical
evidence to determine who else was complicit in the fraud.
Regulatory Reaction
In January 2009 the Senate Banking Committee introduced
legislation to provide $110 million to hire 500 new FBI
agents, 50 new assistant U.S. attorneys, and 100 new SEC
enforcement officials to crack down on fraud.
Sources: Compiled from Antilla (2008), Chew (2009), Gold (2008), and
Quinn (2009).
Questions
1. How important was trust to Madoff’s scheme?
2. What else did Madoff rely upon to carry out his fraud?
3. What is a red flag?
4. In your opinion, how were so many red flags ignored
given the risk that investors faced?
5. Could such a large investment fraud happen again—or are
there internal fraud prevention and detection measures
in place that would prevent or stop it from occurring?
Explain your answer.
INTERNAL FRAUD
PREVENTION AND
DETECTION
The single most effective fraud prevention tactic is making employees know that
fraud will be detected by IT monitoring systems and punished, with the fraudster
possibly turned over to the police or FBI. The fear of being caught and prosecuted
is a strong deterrent. IT must play a visible and major role in detecting fraud.
Corporate Governance
IT monitoring and control also demonstrate that the company has implemented
effective corporate governance and fraud prevention measures. Regulators look
favorably on companies that can demonstrate best practices in corporate gover-
nance and operational risk management. Management and staff would then spend
less time worrying about regulations and more time adding value to their brands
and business.
Internal fraud prevention measures are based on the same controls used to pre-
vent external intrusions—perimeter defense technologies, such as firewalls, e-mail
scanners, and biometric access. They are also based on human resource (HR) pro-
cedures, such as recruitment screening and training.
c05CybersecurityAndRiskManagement.indd Page 168 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.5 Compliance and Internal Control 169
Intelligent Analysis and Anomaly Detections
Most detection activity can be handled by intelligent analysis engines using
advanced data warehousing and analytics techniques. These systems take in audit
trails from key systems and personnel records from the HR and finance depart-
ments. The data are stored in a data warehouse where they are analyzed to detect
anomalous patterns, such as excessive hours worked, deviations in patterns of
behavior, copying huge amounts of data, attempts to override controls, unusual
transactions, and inadequate documentation about a transaction. Information from
investigations is fed back into the detection system so it learns of any anomalous
patterns. Since insiders might work in collusion with organized criminals, insider
profiling is important to find wider patterns of criminal networks.
An enterprisewide approach that combines risk, security, compliance, and IT
specialists greatly increases the prevention and detection of fraud. Prevention is the
most cost-effective approach, since detection and prosecution costs are enormous
in addition to the direct cost of the loss. It starts with corporate governance culture
and ethics at the top levels of the organization.
Identity Theft
One of the worst and most prevalent crimes is identity theft. Such thefts where indi-
viduals’ Social Security and credit card numbers are stolen and used by thieves are
not new. Criminals have always obtained information about other people—by steal-
ing wallets or dumpster diving. But widespread electronic sharing and databases
have made the crime worse. Because financial institutions, data processing firms,
and retail businesses are reluctant to reveal incidents in which their customers’
personal financial information may have been stolen, lost, or compromised, laws
continue to be passed that force those notifications.
Questions
1. What are the two categories of crime?
2. Explain fraud and occupational fraud.
3. What defenses help prevent internal fraud?
4. What are two red fl ags of internal fraud?
5. Explain why data on laptops and computers need to be encrypted.
6. Explain how identity theft can occur.
All enterprises are subject to federal and state laws and regulations. Compliance
with regulations always requires internal controls to ensure that sensitive data are
protected and accurate.
5.5 Compliance and Internal Control
INTERNAL CONTROL The internal control environment is the work atmosphere that a company sets for
its employees. Internal control (IC) is a process designed to achieve:
• Reliability of financial reporting, to protect investors
• Operational efficiency
• Compliance with laws, regulations, and policies
• Safeguarding of assets
c05CybersecurityAndRiskManagement.indd Page 169 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
170 Chapter 5 Cybersecurity and Risk Management
The Sarbanes-Oxley Act (SOX) mandates more accurate business reporting and
disclosure of generally accepted accounting principles (GAAP) violations. Section
302 deters corporate and executive fraud by requiring that the CEO and CFO verify
that they have reviewed the financial report, and, to the best of their knowledge, the
report does not contain an untrue statement or omit any material fact. To motivate
honesty, executive management faces criminal penalties including long jail terms
for false reports. Section 805 mandates a review of the Sentencing Guidelines to
ensure that “the guidelines that apply to organizations . . . are sufficient to deter
and punish organizational criminal conduct.” The Guidelines also focus on the
establishment of “effective compliance and ethics” programs. As indicated in the
Guidelines, a precondition to an effective compliance and ethics program is “an
organizational culture that encourages ethical conduct and a commitment to com-
pliance with the law.”
Among other measures, SOX requires companies to set up comprehensive
internal controls. There is no question that SOX, and the complex and costly provi-
sions it requires public companies to follow, have had a major impact on corporate
financial accounting. For starters, companies have had to set up comprehensive
internal controls over financial reporting to prevent fraud, catching it when it
occurs. Since the collapse of Arthur Andersen, following the accounting firm’s
conviction on criminal charges related to the Enron case, outside accounting firms
have gotten tougher with clients they are auditing, particularly with regard to their
internal controls.
SOX and the SEC are making it clear that if controls can be ignored, there is no
control. Therefore, fraud prevention and detection require an effective monitoring
system. If a company shows its employees that it can find out everything that every
employee does and use that evidence to prosecute a wrongdoer to the fullest extent
possible under the law, then the likelihood of any employee adopting an “I can get
away with it” attitude drops drastically.
Approximately 85 percent of occupational fraud could have been prevented if
proper IT-based internal controls had been designed, implemented, and followed.
DEFENSE STRATEGY The objective of IT security management practices is to defend all of the compo-
nents of an information system, specifically data, software applications, hardware,
and networks, so they remain in compliance. Before they make any decisions con-
cerning defenses, the people responsible for security must understand the require-
ments and operations of the business, which form the basis for a customized defense
strategy.
The defense strategy and controls that should be used depend on what needs
to be protected and a cost–benefit analysis. That is, companies should neither
underinvest nor overinvest. The SEC and FTC impose huge fines for data breaches
to deter companies from underinvesting in data protection. The following are the
major objectives of defense strategies:
1. Prevention and deterrence. Properly designed controls may prevent errors from
occurring, deter criminals from attacking the system, and, better yet, deny access
to unauthorized people. These are the most desirable controls.
2. Detection. Like a fi re, the earlier an attack is detected, the easier it is to combat,
and the less damage is done. Detection can be performed in many cases by using
special diagnostic software, at a minimal cost.
3. Contain the damage. This objective involves minimizing or limiting losses once
a malfunction has occurred. It is also called damage control. This can be accom-
plished, for example, by including a fault-tolerant system that permits operation
in a degraded mode until full recovery is made. If a fault-tolerant system does
not exist, a quick and possibly expensive recovery must take place. Users want
their systems back in operation as fast as possible.
c05CybersecurityAndRiskManagement.indd Page 170 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.5 Compliance and Internal Control 171
4. Recovery. A recovery plan explains how to fi x a damaged information system as
quickly as possible. Replacing rather than repairing components is one route to
fast recovery.
5. Correction. Correcting the causes of damaged systems can prevent a problem
from occurring again.
6. Awareness and compliance. All organization members must be educated about
the hazards and must comply with the security rules and regulations.
A defense strategy is also going to require several controls, as shown in Figure 5.11.
General controls are established to protect the system regardless of the specific
application. For example, protecting hardware and controlling access to the data
center are independent of the specific application. Application controls are safe-
guards that are intended to protect specific applications. In the next two sections,
we discuss the major types of these two groups of information system controls.
GENERAL CONTROLS The major categories of general controls are physical controls, access controls, data
security controls, communication network controls, and administrative controls.
Physical Controls
Physical security refers to the protection of computer facilities and resources. This
includes protecting physical property such as computers, data centers, software,
manuals, and networks. It provides protection against most natural hazards as well
as against some human hazards. Appropriate physical security may include several
physical controls such as the following:
• Appropriate design of the data center. For example, the data center should
be noncombustible and waterproof.
• Shielding against electromagnetic fields.
• Good fire prevention, detection, and extinguishing systems, including a
sprinkler system, water pumps, and adequate drainage facilities.
Figure 5.11 Major defense
controls.
Defense Control
Web Controls
Biometrics
Data Security
Communication
Administrative
Other
Access
Physical
Output
Processing
Input
Encryption
Cable Testers
Firewalls
Virus Protection
Authentication Biometrics
General Application
c05CybersecurityAndRiskManagement.indd Page 171 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
172 Chapter 5 Cybersecurity and Risk Management
• Emergency power shutoff and backup batteries, which must be maintained
in operational condition.
• Properly designed and maintained air-conditioning systems.
• Motion detector alarms that detect physical intrusion.
Access Controls
Access control is the management of who is and is not authorized to use a com-
pany’s hardware and software. Access control methods, such as firewalls and access
control lists, restrict access to a network, database, file, or data. It is the major
line of defense against unauthorized insiders as well as outsiders. Access control
involves authorization (having the right to access) and authentication, which is also
called user identification (proving that the user is who he or she claims to be).
Authentication methods include:
• Something only the user knows, such as a password
• Something only the user has, for example, a smart card or a token
• Something only the user is, such as a signature, voice, fingerprint, or retinal
(eye) scan; implemented via biometric controls, which can be physical or
behavioral
Biometric Controls
A biometric control is an automated method of verifying the identity of a person,
based on physical or behavioral characteristics. Most biometric systems match
some personal characteristic against a stored profile. The most common biometrics
are a thumbprint or fingerprint, voice print, retinal scan, and signature. Biometric
controls have been integrated into e-business hardware and software products.
Biometric controls do have some limitations: They are not accurate in certain cases,
and some people see them as an invasion of privacy.
Administrative Controls
While the previously discussed general controls are technical in nature, adminis-
trative controls deal with issuing guidelines and monitoring compliance with the
guidelines. Examples of controls are shown in Table 5.5.
TABLE 5.5 Representative Administrative Controls
• Appropriately selecting, training, and supervising employees, especially in
accounting and information systems
• Fostering company loyalty
• Immediately revoking access privileges of dismissed, resigned, or transferred
employees
• Requiring periodic modifi cation of access controls, such as passwords
• Developing programming and documentation standards (to make auditing
easier and to use the standards as guides for employees)
• Insisting on security bonds or malfeasance insurance for key employees
• Instituting separation of duties, namely, dividing sensitive computer duties
among as many employees as economically feasible in order to decrease the
chance of intentional or unintentional damage
• Holding periodic random audits of the system
c05CybersecurityAndRiskManagement.indd Page 172 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
5.5 Compliance and Internal Control 173
BUSINESS CONTINUITY Risk management is not complete without a business continuity plan that has been
tested to verify that it works. Business continuity refers to maintaining business
functions or restoring them quickly when there is a major disruption. The plan cov-
ers business processes, assets, human resources, business partners, and more. Fires,
earthquakes, floods, power outages, malicious attacks, and other types of disas-
ters hit data centers. Yet business continuity planning capabilities can be a tough
sell because they do not contribute to the bottom line—that is, until it is too late.
Compare them to an insurance policy: If and only if a disaster occurs, the money has
been well spent. And spending on business continuity preparedness is an ongoing
process because there is always more that could be done to better prepare.
The purpose of a business continuity plan is to keep the business running after
a disaster occurs. Each function in the business should have a feasible backup plan.
For example, if the customer service center or call center was destroyed by a storm
or lost all power, would anyone know how the reps would continue to answer cus-
tomer calls? The backup plan could define how to provide necessary network access
to enable business to continue.
AUDITING
INFORMATION
SYSTEMS
An audit is an important part of any control system. Auditing can be viewed as an
additional layer of controls or safeguards. It is considered as a deterrent to criminal
actions, especially for insiders. Auditors attempt to answer questions such as these:
• Are there sufficient controls in the system? Which areas are not covered by
controls?
• Which controls are not necessary?
• Are the controls implemented properly?
• Are the controls effective? That is, do they check the output of the system?
• Is there a clear separation of duties of employees?
• Are there procedures to ensure compliance with the controls?
• Are there procedures to ensure reporting and corrective actions in case of
violations of controls?
Auditing a website is a good preventive measure to manage the legal risk. Legal
risk is important in any IT system, but in Web systems it is even more important due
to the content of the site, which may offend people or be in violation of copyright
laws or other regulations (e.g., privacy protection). Auditing e-commerce is also
more complex since, in addition to the website, one needs to audit order taking,
order fulfillment, and all support systems.
COST–BENEFIT
ANALYSIS
It is usually not economical to prepare protection against every possible threat.
Therefore, an IT security program must provide a process for assessing threats and
deciding which ones to prepare for and which ones to ignore or provide reduced
protection against. Two methods are risk assessment and business impact analysis.
Risk Assessment
Risk assessments are done using an app or spreadsheet. The basic computations are
shown here:
Expected loss P1 P2 L
where
P1 probability of attack (estimate, based on judgment)
P2 probability of attack being successful (estimate, based on judgment)
L loss occurring if attack is successful
c05CybersecurityAndRiskManagement.indd Page 173 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
174 Chapter 5 Cybersecurity and Risk Management
Example:
P1 .02, P2 .10, L $1,000,000
Then expected loss from this particular attack is
P1 P2 L 0.02 0.1 $1,000,000 $2,000
The amount of loss also depends on the duration of a system being out of operation.
Business impact analysis
A business impact analysis (BIA) estimates the consequences of disruption of a
business function and collects data to develop recovery strategies. Potential loss
scenarios are first identified during the risk assessment. Operations may also be
interrupted by the failure of a supplier of goods or services or delayed deliveries.
There are many possible scenarios that should be considered.
The BIA identifies both operational and financial impacts resulting from a dis-
ruption. Several examples of impacts to consider include (Ready.gov, 2014):
• Lost sales and income
• Delayed sales or income
• Increased expenses (e.g., overtime labor, outsourcing, expediting costs, etc.)
• Regulatory fines
• Contractual penalties or loss of contractual bonuses
• Customer dissatisfaction or defection
• Delay of new business plans
These costs and losses should be compared with the costs for possible recovery
strategies. The BIA report should prioritize the order of events for restoration of
the business, with processes having the greatest operational and financial impacts
being restored first.
Questions
1. Why are internal controls needed?
2. What federal law requires effective internal controls?
3. Why do the SEC and FTC impose huge fi nes for data breaches?
4. What are the two types of controls in a defense strategy?
5. Explain authentication and two methods of authentication.
6. What are biometric controls? Give an example.
7. Why do organizations need a business continuity plan?
8. Why should websites be audited?
9. How is expected loss calculated?
10. Explain business impact analysis.
Key Terms
acceptable use policy
(AUP)
access control
administrative controls
advanced persistent threat
(APT)
Anonymous
application controls
assets
attack vectors
audit
backdoor
biometric control
BlackPOS
Black smartphone
botnet
bring your own apps
(BYOA)
bring your own device
(BYOD)
business continuity
plan
business impact analysis
(BIA)
c05CybersecurityAndRiskManagement.indd Page 174 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
Assuring Your Learning 175
command and control
(C&C) channel
consumerization of
information technology
(COIT)
contract hacker
Control Objectives for
Information and
Related Technology
(COBIT)
corporate governance
critical infrastructure
data tampering
distributed denial-of-ser-
vice (DDoS) attack
do-not-carry rules
enterprise risk manage-
ment (ERM)
exploit
general controls
hacker
hacktivist
internal control (IC)
internal threats
intrusion detection
system (IDS)
intrusion prevention sys-
tem (IPS)
iOS 5
IT governance
LulzSec
malware
mobile biometrics
occupational fraud
patches
payload
Payment Card Industry
Data Security Standard
(PCI DSS)
phishing
physical controls
programming attacks
remote access trojan
(RAT)
remote wipe capability
risk
rogue app monitoring
rootkit
service pack
signature
social engineering
spam
spear phishing
spyware
threat
time-to-exploitation
vector
virus
voice biometrics
vulnerability
worm
zero-day exploit
zombie
Assuring Your Learning
1. Why is cybercrime expanding rapidly? Discuss some
possible solutions.
2. In addition to hackers, what kinds of cybercriminals
do organizations need to defend against?
3. What are the major motives of cybercriminals?
4. In what ways do users make themselves vulnerable
to cybercrimes?
5. Why do malware creators alter their malware?
6. Why should you set a unique password for each
website, service, and device that you use?
7. How can malware be stopped from stealing or dis-
closing data from an organization’s network?
8. What impact might huge fi nes have on how much a
company budgets for IT security defenses?
9. Why are BYOD, BYOA, and do-not-carry rules
important to IT security? Why might users resist
such rules?
10. Why do users refuse to use strong passwords
even though they know how dangerous weak
passwords are?
11. How can the risk of occupational fraud be
decreased?
12. Why should information control and security be of
prime concern to management?
13. Explain what fi rewalls protect and what they do not
protect.
14. Why are authentication and authorization
important in e-commerce?
15. Some insurance companies will not insure a
business unless the fi rm has a computer disaster
recovery plan. Explain why.
16. Explain why risk management should involve
the following elements: threats, exposure associated
with each threat, risk of each threat occurring,
cost of controls, and assessment of their
effectiveness.
17. Discuss why the Sarbanes-Oxley Act focuses on
internal control. How does that focus infl uence
information security?
DISCUSS: Critical Thinking Questions
1. The Wall Street Journal (WSJ.com) has detailed a
cyberattack against the U.S. Chamber of Commerce
in which e-mails were stolen. Review The Wall Street
Journal interactive graphic “China Hackers Hit U.S.
Chamber, Attacks Breached Computer System of
Business-Lobbying Group; Emails Stolen,” dated
December 21, 2011. Also view the video. The links
are posted in the book’s website at www.wiley.com/
EXPLORE: Online and Interactive Exercises
c05CybersecurityAndRiskManagement.indd Page 175 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
http://www.wiley.com/college/turban
176 Chapter 5 Cybersecurity and Risk Management
college/turban or you can search the WSJ.com
website using the video title.
a. Explain the importance and role of social
engineering in this intrusion and cybertheft.
b. What can be done to prevent this type of intrusion
from occurring again?
c. How serious was the intrusion and when did it
occur?
d. What or who did the hackers focus on? Why?
e. What information could the hackers have
gleaned from the intrusion of the Chamber?
f. What did the Chamber do to increase cybersecu-
rity after learning of the intrusion and
cybertheft?
g. Explain why cars and appliances can be hack
targets.
h. What other resources are at risk?
i. Does this incident indicate about how wide-
spread hacking is? Explain your answer.
2. Access the Anti-Phishing Working Group website
(antiphishing.org) and download the most recent
Phishing Activity Trends Report.
a. Describe the recent trends in phishing attacks.
b. Explain the reasons for these trends.
3. Research a botnet attack. Explain how the botnet
works and what damage it causes. What preventive
methods are offered by security vendors?
4. Visit cio.com and search for a recent article on
security, privacy, or compliance. What three lessons
are learned from the article?
5. Research vendors of biometrics. Select one vendor
and discuss three of its biometric devices or technol-
ogies. Prepare a list of major capabilities. What are
the advantages and disadvantages of its biometrics?
1. Many fi rms concentrate on the wrong questions and
end up throwing a great deal of money and time at
minimal security risks while ignoring major vulner-
abilities. Why?
2. Assessing how much a company is legally obligated
to invest in cybersecurity remains a challenge. Since
there is no such thing as perfect security (i.e., there
is always more that you can do), resolving these
questions can signifi cantly affect cost.
a. When are a company’s security measures suffi –
cient to comply with its obligations? For example,
does installing a fi rewall and using virus detection
software satisfy a company’s legal obligations?
b. Is it necessary for an organization to encrypt all
of its electronic records?
6. Assume that the daily probability of a major earth-
quake in Los Angeles is .07 percent. The chance of
your computer center being damaged during such a
quake is 5 percent. If the center is damaged, the
average estimated damage will be $1.6 million.
a. Calculate the expected loss (in dollars).
b. An insurance agent is willing to insure your
facility for an annual fee of $15,000. Analyze the
offer, and discuss whether to accept it.
7. Should an employer notify employees that their
usage of computers is being monitored? Why or
why not?
8. Twenty-fi ve thousand messages arrive at an organi
zation each year. Currently, there are no fi rewalls.
On average, 1.2 successful hackings occur each
year. Each successful hack attack results in a loss
of about $130,000 to the company. A major fi rewall
is proposed at a cost of $66,000. The estimated useful
life is 3 years. The chance that an intruder will break
through the fi rewall is 0.0002. In such a case, the
damage will be $100,000 (30%), or $200,000 (50%),
or no damage. There is an annual maintenance cost
of $20,000 for the fi rewall.
a. Should management buy the fi rewall?
b. An improved fi rewall that is 99.9988 percent
effective and that costs $84,000, with a life of
3 years and annual maintenance cost of $16,000,
is available. Should this fi rewall be purchased
instead of the fi rst one?
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
c05CybersecurityAndRiskManagement.indd Page 176 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
http://www.wiley.com/college/turban
CASE 5.2 Business Case 177
CASE 5.2
Business Case: Lax Security at LinkedIn Exposed
On any social network, most users mistakenly believe that
their privacy is only as good as the privacy of their most
careless—or temporary—friend. In fact, weak passwords and
hackers can deprive users of all privacy.
Business social networking site LinkedIn was hacked
in June 2012 (Figure 5.12). Hackers stole 6.5 million pass-
words and e-mail addresses. This data breach was discovered
by IT security experts when they found millions of LinkedIn
passwords posted on a Russian underground website
(Figure 5.13). Experts also determined that a hacker named
Dwdm was asking underground members for help in cracking
the stolen passwords. Within only two days, most passwords
were cracked. Why were LinkedIn’s passwords cracked so
quickly? The simple answer is that LinkedIn was using an
outdated encryption method instead of up-to-date industry-
standard encryption. As a result, members’ passwords were
really only camoufl aged—and crackable.
LinkedIn Criticized for Bad Data Security
What could hackers do to your online accounts if they had
your passwords for 48 hours and you did not know? That is
what LinkedIn allowed to happen by waiting two days before
notifying members that their passwords had been stolen. The
company took a lot of criticism for not notifying members
via Twitter or Facebook immediately. According to the chief
executive of the Public Relations Consultants Association,
Francis Ingham, LinkedIn ignored the fi rst rule of crisis man-
agement, which is to be fi rst to tell your customers.
What surprised customers and IT security experts was
that a company that collects and profi ts from vast amounts
of data had taken a negligent approach to protecting it.
Figure 5.14 explains why it was surprising and alarming that
LinkedIn’s password protection was weak.
E-mail Addresses Are Universal Usernames
At most e-commerce and social sites, usernames are e-mail
addresses—making them our universal username for online
accounts. If the e-mail is a work account, then everyone also
knows where we work and our login name. Therefore, know-
ing users’ usernames and passwords provides authorized
access to corporate accounts with almost no risk of being
detected. Hackers attacked LinkedIn to gain access to over
161 million members’ credentials as a means to gain access
to much more valuable business networks and databases.
Figure 5.12 LinkedIn data
breach overview.
Figure 5.13 LinkedIn did not
discover its own data breach
and, when informed of it,
delayed notifying members.
Hackers breached Linkedln’s
network and stole 6.5 million of its
customers’ passwords, which had
been only lightly encrypted. They
were posted to a Russian hacker
forum for all to see and steal.
Data Breach
Linkedln
Hack attack led to 6.5 million
e-mail addresses and passwords
being compromised.
Over $1 million in costs
associated with forensic work,
investigating, and addressing
the breach.
Seven-figure investments in IT
infrastructure to update and
harden network and data security.
Costs
©
K
ev
in
B
rit
la
nd
/A
la
m
y
c05CybersecurityAndRiskManagement.indd Page 177 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
178 Chapter 5 Cybersecurity and Risk Management
Business Risks and Collateral Damage
The hack caused the following business risks and collateral
damage.
• Takeover of members’ other accounts by hackers,
fraudsters, and other criminals. Hackers know that
people reuse passwords; once their LinkedIn accounts
are linked to Facebook and Twitter, far too much informa-
tion may be revealed. Knowing where people worked
and their e-mail accounts allowed hackers to quickly use
the stolen LinkedIn passwords to log in to corporate
accounts, online bank accounts, and so on to steal more
data or transfer funds.
• Damage to LinkedIn’s biggest revenue source—its
advertising business. LinkedIn’s fi nancial success is tied
to its advertising revenues, which in turn are based on the
number of active members and membership growth.
• Fines for violating privacy laws and regulations. Any
company exposing the confi dential data of customers or
employees faces steep fi nes. Regulators impose harsh
penalties for breaking privacy laws and not taking reason-
able care to defend against data breaches. Strict data
privacy laws in states such as Massachusetts and California
could keep LinkedIn fi ghting legal battles for years.
• Cleanup costs. The cleanup cost LinkedIn nearly $1 million
and another $2 to $3 million in upgrades. Forensic work on
the password theft cost another $500,000 to $1 million.
Data Security: A Top Management Concern
Data security is a senior management concern and respon-
sibility. It affects a company’s operations, reputation, and
customer trust, which ultimately impact revenue, profi ts, and
competitive edge. Yet defenses that could help to prevent
breaches are not always implemented.
Some experts argue that senior management continues
to skimp on basic protections because computer security is
not regulated—that is, until a business suffers a major crisis.
After the data breach, LinkedIn implemented improved pass-
word storage encryption, hired private security and forensics
experts, and called in the Federal Bureau of Investigation
(FBI) to help investigate the security breach.
Jeremiah Grossman, chief technology offi cer of White
Hat Security, estimated that it would have cost LinkedIn “a
couple hundred thousand dollars” to secure its members’
passwords, Web servers, and applications (Perlroth, 2012a).
How This Attack Compares to Others
While 6.5 million leaked passwords represents a serious
breach, it affected a relatively small percent of the more than
175 million members LinkedIn had at that time. Overall, the
LinkedIn breach, while somewhat costly, did not do as much
harm as those experienced by other hacked companies such
as Global Payments, Sony, and Certifi cate Authority
DigiNotar, which was literally hacked out of business.
Sources: Compiled from Perlroth (2012a), Ponemon Institute (2013),
whitehatsec.com, and prca.org.uk.
Questions
1. LinkedIn does not collect the credit card or other
fi nancial account information of its members. Why then
would profi t-motivated hackers be interested in stealing
LinkedIn’s stored data? What data would they be most
interested in?
2. Companies are often slow to self-detect data breaches so
a cyberattack can occur without a company even know-
ing it has a problem. What effect do you think LinkedIn’s
failure to self-detect its massive data breach had on its
popularity and credibility?
Figure 5.14 Three reasons why
LinkedIn’s underinvestment
in data security did not make
business sense.
• Linkedln’s business model: collect and profit from data.
• Linkedln was not some cash-poor startup company.
The company had piles of cash from its successful
initial public offering (IPO) in May 2011. Once it went
public, Linkedln, like all public companies, had to
report hack attacks to the SEC.
• Linkedln’s net income for the first quarter of 2012 was
$5 million, more than double its $2.1 million net income
in the first quarter 2011. Linkedln had a lot to protect . . .
and lose.
Its most valuable asset is data
It’s a high-tech, public company with a brand
image to protect
It had a lot of net income to protect
c05CybersecurityAndRiskManagement.indd Page 178 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
References 179
3. Most corporate security incidents are uncovered by a
third party, like a security fi rm, that picks up on evidence
of malicious activity. Why do you think IT security experts
and not LinkedIn discovered the data breach?
4. LinkedIn’s lax approach to members’ information security
and weak passwords was very surprising to members and
information security professionals. Why?
5. Identify and evaluate the actual and potential business
risks and damages from LinkedIn’s data breach.
6. Why is data encryption an important information security
defense?
7. Discuss why information security is a concern of senior
managers.
8. Explain why someone who used the same password for
several sites would need to change all those passwords.
In your opinion, was LinkedIn negligent in protecting its
main asset? Explain.
CASE 5.3
Video Case: Botnets, Malware Security, and Capturing Cybercriminals
Gunter Ollmann, vice president of research at Damballa,
Inc., explains the Aurora attacks against major companies.
Thousands of botnet operators launched targeted botnet
campaigns with the help of automated tools. In the video,
you learn why it is diffi cult for law enforcement to track and
prosecute cybercriminals and the effectiveness of Microsoft’s
legal action to shut down the C&C (command and control)
network of the Waladec botnet. Visit searchsecurity.techtarget.
com/video/Botnets-malware-and-capturing-cybercriminals to
view the video and read the transcript of it.
Questions
1. What are botnets used for?
2. What is needed to get started in the botnet industry?
Explain why.
3. Given your answers, what should users and organizations
do and/or not do to reduce the threat of botnets?
Quiz
1. From research into Operation Aurora and analysis of the
botnets, investigators learned all of the following except:
a. There are about 50 botnet operators.
b. Botnet operators have increased their range by
running multiple botnets and campaigns.
c. The feature set of modern malware is similar for both
the amateur and the professional operator.
d. Many of the advanced types of malware are available
in kit form.
2. What really differs between the professional
practice and the amateur operator is the way that
they __________.
a. select their targets.
b. have hardened their malware.
c. infect a network.
d. use proxies.
3. Armoring malware is done to make sure that if researchers
obtain a sample of the code, it cannot be automatically
used for deconstructing who the command and control
chains are. True or false?
4. Many consumers know that a traditional antivirus program
has value, but that value is depreciating considerably.
True or false?
Antilla, S. “Red Flags Were There All Along: Suspicious Activi-
ties Largely Unquestioned.” Gazette (Montreal), December
16, 2008.
Boeing.com. “Overview: Boeing Black Smartphone.” 2014.
Chew, R. “A Madoff Whistle-Blower Tells His Story.” Time,
February 4, 2009.
D’Innocenzio, A. “Data-breach Cuts Target Profi t.” Timesleader.
com, February 26, 2014.
Egan, S. “New Report Predicts High Growth in Mobile Bio-
metric Security.” SecureIDNews.com. September 15, 2011.
Gallagher, S. “Update: Boeing’s Black—This Android Phone
Will Self-Destruct.” Ars Technica, February 26, 2014.
Gold, L. “Forensic Accounting: Finding the Smoking E-mail:
E-discovery Is Now a Critical Part of Forensics—and of Firm
Policy.” Accounting Today 22, no. 8, May 5, 2008.
Hosenball, M. “Leaked Call on Ukraine Made on Unencrypted
Cellphones—U.S. Offi cials.” Reuters, February 7, 2014.
Kratsas, G. “Reports: Target Warned Before Data Breach.”
USA Today, February 18, 2014.
KPMG. Data Loss Barometer. 2012. http://www.kpmg.com/US/
en/IssuesAndInsights/ArticlesPublications/Documents/data-
loss-barometer
Krebs on Security. “A First Look at the Target Intrusion,
Malware.” January 14, 2014.
References
c05CybersecurityAndRiskManagement.indd Page 179 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
180 Chapter 5 Cybersecurity and Risk Management
Mobile Phone Biometric Security Analysis and Forecasts
2011–2015.
O’Connor, C. “Target CEO Gregg Steinhafel Resigns in Data
Breach Fallout.” Forbes, May 5, 2014.
Perlroth, N. “Hacked Chamber of Commerce Opposed Cyber-
security Law.” bits.blogs.nytimes.com, December 21, 2012a.
Perlroth, N. “Traveling Light in a Time of Digital Thievery.”
The New York Times, February 10, 2012b.
Ponemon Institute. “2013 Cost of Data Breach Study: Global
Analysis.” Ponemon Institute Research Report. May 2013.
PricewaterhouseCoopers (PWC). 2014 Global State of
Information Security Survey. http://www.pwc.com/gx/en/
consulting-services/information-security-survey/download.
jhtml
Quinn, J. “On the Trail of Madoff’s Missing Billions.” The
Sunday Telegraph (London), January 18, 2009.
Ready.gov. “Business Impact Analysis.” January 29, 2014.
Sharf, S. “Target Shares Drop After CEO Gregg Steinhafel’s
Resignation.” Forbes, May 5, 2014.
TrendMicro TrendLabs, “Repeating History.” 2012 http://www.
trendmicro.com/cloud-content/us/pdfs/security-intelligence/
reports/rpt-repeating-history
Westcott, L. “Boeing’s New Self Destructing Phone Is Ideal for
Those Who Need to Keep Secrets.” The Wire, March 5, 2014.
Yadron, D., P. Ziobro, & D. Barrett. “Target Warned of
Vulnerabilities Before Data Breach.” The Wall Street Journal,
February 14, 2014.
c05CybersecurityAndRiskManagement.indd Page 180 10/29/14 10:58 AM f-w-204a /208/WB01490/9781118897782/ch05/text_s
Chapter Snapshot
Every day, over 1.5 billion people around the world
use what seems to be a simple tool to find information
online—a search engine. We sometimes take for granted
that behind a relatively simple user interface, an increas-
ingly complex set of search engine technologies are at
work, helping us find the information we need to do
our jobs, conduct research, locate product reviews, or
find information about the television shows we watch.
Attracting Buyers with
Search, Semantic, and
Recommendation
Technology
6
Chapter
1. Describe how search engines work and identify ways
that businesses gain competitive advantage by using
search technology effectively.
2. Describe how to improve website ranking on search
results pages by optimizing website design and creating
useful content.
3. Describe how companies manage paid search advertising
campaigns to increase awareness and drive sales volume.
4. Describe how semantic Web technology enhances the
accuracy of search engines results and how businesses
can optimize their websites to take advantage of this
emerging technology.
5. Describe how recommendation engines are used
to enhance user experience and increase sales on
e-commerce websites.
Learning Outcomes
181
Winning, Engaging, and Retaining
Consumers with TechnologyPart 2
Chapter Snapshot
Case 6.1 Opening Case: Nike Golf Drives Web
Traffic with Search Engine Optimization
6.1 Using Search Technology for Business
Success
6.2 Organic Search and Search Engine
Optimization
6.3 Pay-Per-Click and Paid Search Strategies
6.4 A Search for Meaning—Semantic
Technology
6.5 Recommendation Engines
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 6.2 Business Case: Recommending Wine
to Online Customers
Case 6.3 Video Case: Power Searching with
Google
References
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 181 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
Because most search engine services are free, people
are not generally aware that “Search” has become a
multibillion-dollar-a-year business. More importantly,
the way search engines work and how they rank-order
the links displayed when we conduct a search have huge
implications for millions of other businesses. Because
consumers typically don’t look past the first few pages
of search results, having your business appear at the top
of a search results page can make a big difference in
how much traffic your website gets. In this chapter, you
will read about how search engines work and how they
determine page rankings. You will also read about the
strategies companies use to increase their presence on
search results pages including search engine optimization
(SEO) and pay-per-click (PPC) advertising.
Semantic technologies are increasingly being used by
search engines to understand webpage content. In this
chapter you will read about the ways that search engines
are using semantic technology to improve performance,
increasing relevant pages and decreasing the number of
irrelevant pages that appear in search results.
Finally, you will read about recommendation engines.
These tools attempt to anticipate online information you
might be interested in. Netflix uses recommendation
engines to suggest movies you might like to watch and
news organizations use them to recommend stories you
might want to read on their websites. Amazon credits its
recommendation technology for increasing sales by sug-
gesting products that customers might want to buy.
Business managers need to understand search and
recommendation technologies because their influence
in directing potential consumers to business websites is
already significant and expected to grow substantially in
the future.
Search Engine Results Page
(SERP): the list of links and
other descriptive information
about webpages returned by
a search engine in response
to a search query.
Keywords: in the context of
web search or SEO, words
or phrases that describe
the content on a webpage.
Search engines use keywords
to match webpages with user
search queries.
CASE 6.1 OPENING CASE
Nike Golf Drives Web Traffic with Search Engine Optimization
According to some estimates, 50 to 75 percent of Web traffic is generated by search
engines (Pick, 2012, Safran, 2013, Van Zelst, 2013, Willcocks, 2013). This should not
come as a surprise to most of us, considering how often we use search engines like
Google, Bing, or Yahoo to find online information. Because businesses compete for
our attention, they have a vested interest in maintaining a high degree of visibility
on search engine results pages, or SERPs.
Traffic from search engines comes from two basic sources: organic search results
and paid search advertisements. Organic search results are heavily influenced by
website content and design features (e.g., the technology used to create the site,
webpage coding, etc.). Paid search traffic is the result of ads that appear on SERPs.
Companies pay search engines to place these ads on SERPs when certain keywords
are used in a search query. Search engine users frequently ignore these ads—about
85 percent of website traffic generated by search engines is the result of organic
search listings (Downhill & Peggie, 2005).
182
COMPANY OVERVIEW Nike, Inc., based near Beaverton, OR, is one of the world’s most recognized brand
names in sports apparel and equipment. Revenues in 2013 increased 8 percent from
the previous year to $25.3 billion. The company is currently experiencing a period of
growth, particularly with its “direct to consumer” (DTC) sales strategy involving a
combination of online sales and company stores (Figure 6.1). DTC sales at the com-
pany grew 24 percent to $4.3 billion compared to the previous year. This was fueled,
in part, by increasing the number of company stores from 557 to 645 worldwide over
the past year (Nikeinc.com, 2013).
Nike is frequently associated with what it calls a “big athlete, big ad, big prod-
uct” marketing strategy (Nikeinc.com, 2014). This involves signing endorsement
deals with the most widely recognized athletes in the sporting world, creating
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 182 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
CASE 6.1 Opening Case 183
signature products, and supporting them with high-powered advertising campaigns
featuring the company’s famous tagline, “Just do it.” Perhaps the best example
of this promotional strategy is Nike’s popular campaign for Air Jordans, a line
of basketball shoes named for Michael Jordan. Other well-known Nike athletes
include golf pro Tiger Woods, Russian tennis star Maria Sharapova, Brazilian
soccer phenomenon Ronaldinho, and professional skateboarder Paul Rodriguez,
Jr. (Goldman, 2008).
Figure 6.1 Nike is expanding
its “direct to consumers”
name-brand stores worldwide
like this one in Beijing, China.
(shutterstock.com.)
TABLE 6.1 Opening Case Overview
Company Nike, Inc., nikeinc.com
History Founded in 1964 as Blue Ribbon Sports, the company
changed its name to Nike in 1971 and sells products
under a variety of brand names, including Nike Golf,
Nike Pro, Air Jordan, Nike Vision, Converse, and Nike
Skateboarding.
Industry Athletic apparel, footwear, and equipment
Product lines The global company manufactures, sells, and distributes
athletic footwear, apparel, and sports equipment to
retail outlets, colleges and universities, sports clubs,
professional sports teams, and directly to consumers.
Digital technology Nike is a leader in e-commerce innovation, for instance,
allowing consumers to design their own individual
footwear. Nike products integrate traditional sports
equipment with digital technology (e.g., mobile apps,
wristbands, watches, and software) that allow athletes
to monitor and track their performance.
Business challenges • Placing greater emphasis on digital marketing
strategies, including search engine marketing.
• Growing its direct to consumer (DTC) sales
channels.
• Expanding the Nike Digital Sports division.
Taglines “Just do it.”
©
t
es
tin
g
/S
hu
tt
er
st
oc
k.
co
m
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 183 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
184 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
More recently, Nike has shifted its marketing and promotion strategy, placing
greater emphasis on digital or online channels, attempting to engage consumers in
ways not possible via traditional mass media. See Figure 6.2.
Figure 6.2 Nike, Inc.
overview.
NIKE’S BUSINESS
CHALLENGES
In order to continue online sales growth, Nike’s e-commerce sites need to maintain
high levels of visibility on major search engines. This means that when consum-
ers conduct searches for things like “golf shoes,” “sports equipment,” or “athletic
gear,” Nike would like to appear at the top of SERP listings. Unfortunately, the
Nike website does not appear in the search results of many queries for which you
would expect it to.
BUSINESS AND IT
STRATEGIES
Despite its well-known brand name and established position as a market leader in
sports apparel, footwear, and athletic equipment, Nike has not historically done
well in search engine rankings. The company hired SwellPath, a digital marketing
agency based in Portland, OR, to help it increase the visibility of its golf brand
on popular search engines for the 2011 golf season. Swellpath set out to improve
Nike’s organic search rankings and provide an analysis of the company’s improved
performance in search. The strategy involved identifying changes that needed to be
made to Nike’s golf site (nikegolf.com) and researching keywords that prospective
customers were most likely to use when searching for the type of products that Nike
sells. Changing the design and content of a website to improve its ranking in SERPs
is called search engine optimization (SEO).
SwellPath discovered that Nike had built its website using Java technology,
which created attractive and visually compelling webpages, but was practically invis-
ible to the tools (called spiders) that search engines use to crawl webpage content
looking for keywords that serve as clues to what the website is about. This was a big
problem since search engines rely on matching words in search queries with words
in the website content to determine if a page is relevant.
SwellPath also analyzed the keywords that people were likely to use when
searching for the kind of products Nike sells. It is not practical or effective to
optimize for all possible keywords, so SwellPath set out to identify the words that
not only produced traffic to Nike’s site, but also attracted customers most likely to
Search Engine Optimization
(SEO): a collection of
strategies and techniques
designed to increase the
number of visitors to a web-
site as a result of the web-
site’s rank on search engine
results pages.
Manufacturing: 998,888
workers, 744 factories in 43
countries.
Nike.com online sales to 24
countries worldwide.
Retail stores in approximately
190 countries.
Global Reach
Innovation
Intensly loyal employees
Corporate Culture
Just do it.
“If you have a body, you’re an
athlete”
Swoosh Logo
Brand
Search Engine Optimization
Social Media Marketing
Digital Athletic Gear
Digital Technology
Nike, Inc.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 184 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
CASE 6.1 Opening Case 185
“convert” (purchase products). For instance, the company examined the words “golf
apparel,” “golf clothing,” “golf clothes,” and “golf sportswear.” Research showed
that people in the U.S. searched on the words “golf apparel” more frequently, and
customers who visited the site when searching those words stayed on the Nike site
longer, visited more pages, and were more likely to purchase an item.
SEO SOLUTION Completely redesigning Nike’s Java-based website was not a viable option because
of the cost involved. SwellPath recommended an alternative solution—creating a
parallel site using HTML, a more basic Web programming language that could be
read by search engine spiders. Visitors to the site still saw the original Java-based
site with the attractive pages, but search engines could easily read the content on
the parallel site. In addition, it turned out that the HTML site displayed better on
mobile devices, an added benefit.
Once the site’s technology problem was solved, SwellPath optimized the con-
tent for “golf apparel” along with other terms and phrases it had identified in its
keyword research.
PERFORMANCE
RESULTS
Between the 2010 and 2011 golf seasons, Web traffic from organic search increased
169 percent, an impressive gain. However, SwellPath discovered that most of this
traffic derived from consumers who included the word “Nike” in their search que-
ries. These are referred to as branded search queries. To really judge the impact of
SEO, SwellPath evaluated changes in Web traffic from nonbranded searches (such
as “golf shoes” vs. “Nike golf shoes”). It discovered that traffic from nonbranded
organic searches actually slipped 17 percent. As a result, the SwellPath team redou-
bled its efforts by continued research on keywords and adding site content around
terms and phrases likely to attract customers. The effort paid off. When its plan
was fully implemented, nonbranded traffic to the Nike site increased 250 percent
between the 2011 and 2012 golf seasons.
More recently, the SwellPath team helped Nike Vision, the company’s unit that sells
sunglasses and athletic eyewear. Prior to the 2012 Olympic Games in London, Nike
signed professional beach volleyball star Misty May-Treanor (see Figure 6.3). Knowing
that people would be using search engines to look up information on star athletes dur-
ing the Olympics, SwellPath optimized the Nike Vision website with blog content about
Misty May-Treanor and her Nike-branded sunglasses. As a result, during the six-day
period that Misty May-Treanor competed in the London Olympics, organic traffic from
search engines to Nikevision.com increased 169 percent. If Nike had failed to update
its site with optimized blog posts and other content about Misty May-Treanor prior to
Figure 6.3 Misty May-
Treanor’s success at the
London Olympics helped
drive traffi c to the Nike Vision
website as a result of careful
planning by the company’s
SEO team. DA
N
IE
L
G
A
RC
IA
/A
FP
/G
et
ty
Im
ag
es
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 185 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
186 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
the Olympics, it would have missed out on an opportunity to capture the attention of
thousands of prospective customers (Arnesen, 2012). This example illustrates how SEO
is a constantly evolving strategy, requiring companies to anticipate the interests, search
behavior, and needs of the marketplace and to regularly create optimized content that
will rank high in organic SERPs.
As Nike expands its product line into digital products (Figure 6.4) that allow
athletes to monitor and track their performance, the Nike Digital Sports division
will need to optimize its webpages with content that will rank high in search results.
What type of content and keywords do you think will help people discover these
new digital products on search engines?
Figure 6.4 Olympic athlete
Shawn Johnson (L) and
Nike Vice President of
Digital Sport Stefan Olander
discussing Nike’s new digital
wristband product at a 2013
NikeFuel Forum in New York
City.
Sources: Compiled from Safran (2013), Van Zelst (2013), Pick (2012), Willcocks (2013), Nikeinc.com
(2013, 2014), Goldman (2008), Arnesen (2012), SwellPath.com (2012), Downhill & Peggie (2005).
Discussion Questions
1. Why is it important that companies strive to have high rankings on
search engine results pages?
2. What is meant by the term “organic search results”?
3. What two basic strategies did SwellPath use to optimize the Nike Golf
website?
4. How did Nike take advantage of Olympic star Misty May-Treanor’s
popularity to increase its search-related Web traffi c?
5. Why do organic search results produce more website traffi c than PPC or
paid search advertisements?
Search engines like Google, Bing, Yahoo, and others have traditionally been
regarded as a consumer technology. But search technology has become an impor-
tant business tool with many different uses and applications. In this section, you will
read about how search engines work. You will learn about the role search engines
play in generating revenue and consumer awareness for organizations. You will also
discover how businesses use enterprise search technology to unlock hidden content
with their organizations. Finally, you will read about how search and Internet tech-
nology is evolving to provide more accurate and useful results.
6.1 Using Search Technology for Business Success
M
ik
e
La
w
rie
/G
et
ty
Im
ag
es
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 186 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.1 Using Search Technology for Business Success 187
HOW SEARCH ENGINES
WORK
People use the word search engine to refer to many different kinds of information
retrieval (IR) services that find content on the World Wide Web. However, these
services vary in significant ways. Understanding the nature of these differences is
important if you want to get the best results from your search. Listed below is a brief
description of different IR services for finding Web content:
• Crawler search engines rely on sophisticated computer programs called
“spiders,” “crawlers,” or “bots” that surf the Internet, locating webpages,
links, and other content that are then stored in the search engine’s page
repository. The most popular commercial search engines, Google and Bing,
are based on crawler technology.
• Web directories are categorized listings of webpages created and maintained
by humans. Because websites are only included after being reviewed by a
person, it is less likely that search results will contain irrelevant websites.
Examples of popular directories include Open Directory Project (dmoz.org),
Best of the Web (botw.org), and Looksmart.com.
• Hybrid search engines combine the results of a directory created by humans
and results from a crawler search engine, with the goal of providing both
accuracy and broad coverage of the Internet. Yahoo.com, the third most
popular commercial search tool, uses a hybrid approach to information
search.
• Meta-search engines compile results from other search engines. For instance,
Dogpile.com generates listings by combining results from Google and Yandex,
two crawler-based search engines, and Yahoo, a hybrid search tool.
• Semantic search engines are designed to locate information based on the nature
and meaning of Web content, not simple keyword matches. The goal of these
search engines is to dramatically increase the accuracy and usefulness of search
results. Semantic search engines are described in more detail in Section 6.4
Search engine: an applica-
tion for locating webpages
or other content (e.g., docu-
ments, media files) on a
computer network. Popular
web-based search engines
include Google, Bing and
Yahoo.
WEB DIRECTORIES Before crawler search engines became the dominant method for finding Web
content, people relied on directories created by human editors to help them find
information. Web directories are typically organized by categories (for instance,
see the homepage of the popular Web directory dmoz.org). Webpage content is
usually reviewed by directory editors prior to its listing in a category to make sure
it is appropriate. This reduces the number of irrelevant links generated in a search.
The review process, however, is very slow compared to the automated process used
by crawlers (described below). As a result, the listings in a Web directory represent
a relatively small portion of the Web. Directories are particularly useful when con-
ducting searches on a narrow topic, such as identifying suppliers of a specific type
of product or service. Companies who need to identify vendors or suppliers may
consult a niche Web directory created for just this purpose. For example, see the
Web directory at business.com.
HOW CRAWLER
SEARCH ENGINES
WORK
The two most popular commercial search engines on the Web, Google and Bing,
are based on crawler technology. Behind the relatively simple interfaces of these
two powerful search engines, a great deal of complex technology is at work
(Figure 6.5). Because modern search engines use proprietary technology in the
race to stay ahead of competitors, it is not possible to tell exactly how they decide
what websites will appear in a search engine results page (SERP). While they
each produce different results, it is possible to describe the basic process shared
by most crawler search engines. The following description is based on publications
by Grehan (2002) and Oak (2008).
Spiders: also known as
crawlers, web bots or simply
“bots,” spiders are small
computer programs
designed to perform auto-
mated, repetitive tasks over
the Internet. Used by search
engines for scanning web-
pages and returning informa-
tion to be stored in a page
repository.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 187 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
188 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
1. The crawler control module assigns webpage URLs to programs called spiders
or bots. The spider downloads these webpages into a page repository and scans
them for links. The links are transferred to the crawler control module and
used to determine where the spiders will be sent in the future. (Most search
engines also allow webmasters to submit URLs, requesting that their websites
be scanned so they will appear in search results. These requests are added to the
crawler control queue.)
2. The indexer module creates look-up tables by extracting words from the web-
pages and recording the URL where they were found. The indexer module also
creates an inverted index that helps search engines effi ciently locate relevant
pages containing keywords used in a search. (See Figure 6.6 for examples of an
inverted index.)
3. The collection analysis module creates utility indexes that aid in providing
search results. The utility indexes contain information about things like how
many pages are in a website, the geographic location of the website, number of
pictures on a webpage, webpage length, or other site-specifi c information the
search engine may use to determine the relevance of a page.
4. The retrieval/ranking module determines the order in which pages are listed in
a SERP. The methods by which search engines determine page rank vary and
the specifi c algorithms they use are often carefully guarded trade secrets. In
some cases, a search engine may use hundreds of different criteria to determine
which pages appear at the top of a SERP. Google, for instance, claims to use over
200 “clues” to determine how it ranks pages (Google.com, 2014). According to
Dover and Dafforn (2011), all these factors can be grouped into two categories:
relevance and popularity (or “authority”).
5. Webpages retrieved by the spiders, along with the indexes and ranking informa-
tion, are stored on large servers (see IT at Work 6.1).
6. The query interface is where users enter words that describe the kind of infor-
mation they are looking for. The search engine then applies various algorithms
to match the query string with information stored in the indexes to determine
what pages to display in the SERP.
Figure 6.5 Components
of crawler search engine
(Adapted from Grehan,
2002).
Page Repository
WWW
Text Utility
Indexer
Module
Structure
Collection
Analisys Module
Surfer–Client QueriesSpiders/
Crawlers
Crawler Control
Indexes
URL
Submissions
1. URL
2. URL
3. URL.
Query
Formulation
Results
Ranking
..
Page repository: a data
structure that stores and
manages information from a
large number of webpages,
providing a fast and efficient
means for accessing and
analyzing the information
at a later time.
Crawler control module: a
software program that con-
trols a number of “spiders”
responsible for scanning or
crawling through information
on the Web.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 188 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.1 Using Search Technology for Business Success 189
Each search engine utilizes variations and refinements of the above steps in
an attempt to achieve superior results. The Web search industry is highly competi-
tive and the proprietary advances in search technology used by each company are
closely guarded secrets. For instance, even the first step in the process, crawling the
Web for content, can vary greatly depending on the strategic goals of the search
engine. Some search engines limit the number of pages scanned at each website,
seeking instead to use limited computing power and resources to cover as many
websites as possible. Other search engines, however, program their spiders to scan
deep into each website, seeking more complete coverage of the site’s content. Still
other search engines direct their spiders to seek out websites that contain certain
types of content, such as government sites, shopping (e-commerce) sites, and so on.
Another decision that search engines make with regard to spiders is the amount of
resources directed at searching new websites versus devoting resources to exploring
previously indexed pages for updates or changes.
One of the many challenges faced by large commercial search engines is stor-
age. In the simplest sense, the crawler approach to search requires a company to
store a copy of the Web in large data centers. In addition to the petabytes of storage
required to maintain this copy of the Web, the search engine must also store the
results of its indexing process and the list of links for future crawls.
Figure 6.6 Search engines use inverted indexes to effi ciently locate Web
content based on search query terms.
Document ID
1
To the heart, real love
always endures. www.lovesickpoems.com
www.enduringlove.com
www.lovecrazy.com
Though passion may
cool, love remains true.
True love kindles the
passion in my heart.
2
3
Content URL
Search Query:
Page Index
Inverted Index
ID Term Document: Position
1 1:3, 3:7
1:4
1:5, 2:5, 3:2
1:6
1:7
2:7, 3:2
2:1
2:2, 3:5
2:3
2:4
2:6
3:3
3:8
heart
real
love
always
endures
true
though
passion
may
cool
remains
kindles
heart
2
3
4
5
6
7
8
9
10
11
12
13
True love
Results Ranking (based on position)
True love kindles the passion in my heart.
www.enduringlove.com
Though passion may cool, love remains true.
www.lovecrazy.com
Documents with
both terms: 2 and 3
Petabyte: a unit of measure-
ment for digital data storage.
A petabyte is equal to one
million gigabytes.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 189 11/7/14 9:40 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
190 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
Not only does Google maintain a copy of the Internet for its
search engine services, it is also constantly updating a map of
the entire planet for users of its popular Google Earth appli-
cation. In addition, the company is making a full-text, search-
able copy of all 129,864,880 known books, equal to 4 billion
pages or 2 trillion words. And then there are applications
like Gmail, serving roughly 425 million people and YouTube,
where 100 hours of video are uploaded every minute! Add
all this up, and Google is facing perhaps the biggest data
storage challenge ever. So where does Google store all of
these data?
Challenges: Energy, Performance, and Security
Information collected by Google is housed on over 1 million
servers spread across 12 different facilities worldwide. The
facilities are large, factorylike installations containing row
upon row of racked and stacked servers. Cooling systems,
required to keep servers from overheating, are a significant
component of any large data center (Figure 6.7). Google
pioneered the software systems that connect the company’s
servers and make it possible for various applications to access
data stored on the machines. Unlike other companies that
purchase servers from outside suppliers, Google builds its
own. Based on its experience creating the hardware, soft-
ware, and facilities necessary to power the company on a
global scale, Google is recognized as a leader in data center
operations.
The company’s data centers, including the servers, are
built with energy efficiency, reliability, and performance in
mind. As Google is a leading provider of Internet services,
its data infrastructure must keep up with growing consumer
demand for speedy performance and reliability. A typical
Google search delivers millions of pages of results in less
than half a second. Consumer expectations for perfor-
mance have grown so high that waiting more than a few
seconds for an e-mail to load or a search to run can cause
frustration.
More recently, Google has had to contend with revela-
tions that the U.S. National Security Agency (NSA) breached
its server network security. This follows cyberattacks in 2010
and 2011 by hackers suspected of being associated with
the Chinese government. Protecting company data from
criminals is a significant challenge in itself, but Google is
understandably frustrated by the fact that it must now fight
off attacks from two world superpowers, one of which is its
own government.
Environmental Impact
Industrywide, data centers used 38,000 megawatts of elec-
tricity in 2012, representing a tremendous increase of over
63 percent from the previous year. Industrywide, data cen-
ter energy use and the related environmental impact have
become an issue of growing concern. Google is widely
recognized as operating some of the most efficient data
centers in the world, but many critics are disturbed by the
industry’s overall level of energy consumption. According
to some estimates, data centers account for about 2 per-
cent of the world’s energy use and the fast rate of growth
is cause for concern (see Figure 6.8). Google has taken an
active approach to reducing its environmental footprint by
increasing the company’s use of renewable energy sources
and continuously developing new ways to become more
energy-efficient. (For further information, see google.com/
about/datacenters.)
Google Data Center Statistics
• Number of servers worldwide: Over 1 million
• Number of data centers: 6 to 12 in North America, 1 in
South America, 2 in Asia, and 3 in Europe
• 2013 capital investment in data centers: $7.35 billion
IT at Work 6 .1
Google Data Centers
Figure 6.7 Pipes pass through the chiller plant at the
Google, Inc. data center in Changhua, Taiwan. Google
doubled its spending plan for its new data center in
Taiwan to $600 million amid surging demand from
Asia for its Gmail and YouTube services.
B
lo
om
b
er
g
/G
et
ty
Im
ag
es
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 190 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.1 Using Search Technology for Business Success 191
Figure 6.8 New, large-scale data centers being
constructed for companies like Google, Microsoft, and
Facebook house thousands of servers and are creating
concern among environmentalists over increases in
energy consumption.
• Average energy efficiency: PUE* 1.12
• Energy use: Continual use of about 260 megawatts of
electricity, approximately 0.01 percent of global energy
consumption
• Energy use comparisons: Owns about 3 percent of serv-
ers worldwide, but only uses about 1 percent of data
center industry energy
• Renewable energy: Claims that approximately 35 per-
cent of its energy use comes from renewable sources
*PUE stands for Power Usage Effectiveness. A PUE of 2.0 means that
for every watt of power devoted to computing, an additional watt is
spent on cooling, power distribution, and overhead. The Data Center
Industry average PUE falls between 1.8 and 1.89.
Sources: Anthony (2013), Miller (2013), Glanz (2011, 2012), Venkatraman
(2012), Schneider (2011), Gallagher (2012), Grifantini (2011), Newman
(2011), Jacobson (2010).
• Estimated investment in data centers since 2006:
$21 billion
• Data processing volume: Over 20 petabytes a day
©
a
sh
ar
ky
u/
Sh
ut
te
rs
to
ck
WHY SEARCH IS
IMPORTANT FOR
BUSINESS
Search engines have become a part of our everyday life. They are free, easy to
use, and become more powerful and effective every day. Most of us take them for
granted and are generally unaware of the complex technologies that power these
tools. For the average Web user, it may not be vitally important to understand how
search technology is evolving. But for business managers, understanding the poten-
tial power of search technology is crucial and becoming more important every day.
It has long been recognized that access to information is a competitive advantage.
Search technology impacts business in each of the following ways:
• Enterprise search—finding information within your organization
• Recommendation engines—presenting information to users without requir-
ing them to conduct an active search
• Search engine marketing (SEM)—getting found by consumers on the Web
• Web search—finding crucial business information online
Each of these important search technology applications is described below.
Enterprise Search
Enterprise search tools are used by employees to search for and retrieve information
related to their work in a manner that complies with the organization’s information-shar-
ing and access control policies. Information can come from a variety of sources, including
publicly available information, enterprise information found in databases and intranets,
as well as information on individual employee computers (Delgado, Laplanche, &
Krishnamurthy, 2005, Smartlogic.com, 2012). An organization’s ability to share knowl-
edge among employees is vital to its ability to compete (Bock, Zmud, Kim, & Lee, 2007;
Brown & Duguid, 2000; Small & Sage, 2006, Hatala & Lutta, 2009). Enterprise search
tools allow companies to leverage the value of internal information by unlocking content
that would otherwise remain hidden or “siloed” because of:
• Technology silos—incompatible software or systems (Thomas, 2013)
• Departments operating as individual business units with different priorities
and goals (Smith, 2012)
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 191 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
192 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
• Concerns about the cost of integrating information (Walker, 2014)
• Organizational structure and culture (Simon, 1998, Hattal & Lutta, 2009)
• Security concerns (Hattal & Lutta, 2009)
• Concerns about diverting or overloading employees’ work-related attention
(Hattal & Lutta, 2009)
In most organizations today, a large portion of employees are “knowledge
workers” (e.g., business analysts, marketing managers, purchasing agents, IT
managers, etc.). Almost half of their time is spent on unproductive work—gathering
information, unsuccessful searches, converting data to different formats, or recre-
ating information (Google.com, 2008, Feldman & Sherman, 2001).
Enterprise search tools allow businesses, companies, and organizations to
extract information from databases, intranets, content management systems, files,
contracts, policy manuals, and documents to make timely decisions, adding value to
the company and enhancing its competitive advantage.
Structured vs. unstructured data One of the challenges encountered by
developers of enterprise search tools is that information is not always in the same
format. Data exist in two formats: structured or unstructured. Structured data can
be defined as “information with a high degree of organization, such that inclusion in
a relational database is seamless and readily searchable by simple, straightforward
search engine algorithms or other search operations” (Brightplanet.com, 2012).
Unstructured data, sometimes called messy data, refers to information that is not
organized in a systematic or predefined way. Unstructured data files are also more
likely to contain inaccuracies or errors. Examples of unstructured data include
e-mails, articles, books, and documents. It is estimated that unstructured data
accounts for about 80 percent of all the data present on computers today (Kahn,
2012). Originally, enterprise search tools worked only with structured data. Many
newer systems claim to work with unstructured information as well, although there
is great variability in terms of how well they actually do this.
Security issues in enterprise search Unlike a Web search, enterprise search
tools must balance the goal of making information widely available throughout the
organization with the need to restrict access based on an employee’s job function
or security clearance. Limiting access to certain documents or data is referred to as
access control. Enterprise search tools introduce the potential for a number of secu-
rity breaches or access of unauthorized information. Most of these can be addressed
as long as the organization’s IT workers install and maintain the search system’s secu-
rity features, including security integrations with other enterprise programs. An audit
of requests logs should be conducted regularly to look for patterns or inconsistencies.
Enterprise search vendors Market analysts Frost and Sullivan (Prnewswire.com,
2013) estimate that the global market for enterprise search tools was over $1.47 bil-
lion in 2012; it is predicted that the market will grow to $4.68 billion by 2019. Clearly,
organizations around the world recognize the value of this technology. Several differ-
ent companies make and sell enterprise search systems, Autonomy, Google, Coveo
and Perceptive Software being the top contenders (Andrews and Koehler-Kruener,
2014). Vendors can be broken down into the following three categories:
• Specialized search vendors (for instance, Attivio, Endeca, Vivisimo):
Software designed to target specific user information needs
• Integrated search vendors (for instance, Autonomy, IBM, Microsoft): Software
designed to combine search capabilities with information management tools
• Detached search vendors (for instance, Google, ISYS): Software designed to
target flexibility and ease of use
With so many options available for enterprise search, it is important that orga-
nizations conduct a careful needs analysis prior to acquisition (Martin, 2012).
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 192 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.1 Using Search Technology for Business Success 193
Recommendation Engines
Recommendation engines represent an interesting twist on IR technology. Unlike Web
search engines that begin with a user query for information, recommendation engines
attempt to anticipate information that a user might be interested in. Recommendation
engines are used by e-commerce sites to recommend products, news organizations to
recommend news articles and videos, Web advertisers to anticipate the ads people
might respond to, and so on. They represent a huge potential for businesses and devel-
opers. While the use of recommendation engines is widespread, there is still a lot of
work to be done to improve the accuracy of these fascinating applications. You can read
more about recommendation engines in Section 6.5.
Search Engine Marketing
Most traditional advertising methods target customers who are not actively engaged
in shopping for a product. Instead, they are watching television, listening to the
radio, reading a magazine, or driving down the road, paying little attention to the
billboards they pass. To most people, advertising represents an unwelcome interrup-
tion. On the other hand, people using search engines are actively looking for infor-
mation. As a result, they are much more likely to be interested in product and service
information found in SERPs as long as it is related to the topic they are searching for.
Efforts to reach this targeted audience are much more likely to produce sales. That’s
why search engine marketing (SEM) has become an important business strategy.
Industry experts report that people generally engage in three basic types of searches:
1. Informational search—using search engines to conduct research on a topic. This
is the most common type of search.
2. Navigational search—using a search engine to locate particular websites or web-
pages.
3. Transactional search—using a search engine to determine where to purchase a
product or service.
You might think businesses would be primarily interested in transactional
searches, but all three types are important and play a key role in the buying pro-
cess. Say you are interested in purchasing a new tablet computer. Your first step is
likely to engage in an informational search, attempting to learn about the product
category of mobile tablet devices. Businesses should offer content on their websites
and social media sites for consumers seeking general product information. An infor-
mational search also represents an opportunity to influence consumers early in the
purchasing process.
After researching a product category, you might try finding websites of particu-
lar companies to learn more about individual tablet computer brands (navigational
search). Companies need to design their websites so that they can be found easily
by search engines.
Finally, you might try to determine where to buy your tablet computer by
searching on terms like “lowest price,” “free shipping,” and so on. This is an exam-
ple of a transactional search.
Search engine marketing (SEM) (Figure 6.9) consists of designing and adver-
tising a webpage, with the goal of increasing its visibility when consumers conduct
the three types of searches just described. SEM strategies and tactics produce two
different, but complementary outcomes:
1. Organic search listings are the result of content and website design features in-
tended to improve a site’s ranking on SERPs that result from specifi c keyword que-
ries. No payments are made to the search engine service for organic search listings.
2. Paid search listings are a form of advertising and are purchased from search en-
gine companies. The placement and effectiveness of paid search ads on SERPs
Search Engine Marketing
(SEM): a collection of online
marketing strategies and
tactics that promote brands
by increasing their visibility in
SERPs through optimization
and advertising.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 193 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
194 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
are a function of several factors in addition to the fees paid by advertisers. You
will read more about these factors in Section 6.3 below.
Businesses utilize search engine optimization (SEO) to improve their website’s
organic listings on SERPs. SEO specialists understand how search engines work
and guide companies in designing websites and creating content that will produce
higher organic SERP rankings than competitive websites.
Paid search listings are often referred to as pay-per-click (PPC) advertising.
This is because advertisers pay search engines based on how many people click
on the ads. Typically, PPC ads are listed separately from organic search results.
Managing an effective PPC ad campaign involves making strategic decisions about
what keyword search queries you want to trigger the display of your ad. You will
read more about PPC or paid search advertising in Section 6.3.
Social media optimization refers to strategies designed to enhance a company’s
standing on various social media sites. Increasingly, search engines evaluate a com-
pany’s presence on social media to determine its reputation, which in turn influ-
ences how the company is ranked in SERPs. You will read more about social media
strategies in Chapter 7.
Growth of search engine marketing As companies begin to realize the power
of search engine marketing, more money is being spent on this highly effective
strategy. Forrester Research estimates that search marketing is the largest segment
of the digital marketing category, and will account for over $33 million by 2016,
representing an increase of 77.6 percent since 2011 (VanBoskirk, 2011).
Unlike many traditional advertising methods, return on investment (ROI) can
be calculated for search engine marketing by tracking click-through rates (CTRs),
changes in site traffic, and purchasing behavior.
Mobile Search (and Mobile Search SEO)
Mobile devices have become ubiquitous (Figure 6.10). With the emergence of
smartphones and tablets like the Apple iPad, mobile devices account for over a
quarter of all website traffic (Sterling, 2013). Mobile Web traffic is expected to tri-
ple by 2017 due to an annual growth rate of approximately 61 percent (Cisco, 2014).
With the dramatic increase in smartphones, tablets, and other mobile devices,
companies need to make sure their websites and content can be found via search
engines on mobile devices. This means optimizing mobile websites differently from
a desktop site. The two essential issues that need to be addressed are:
1. Properly confi guring the technical aspects of the mobile site so that it can be
crawled and indexed by search engines.
Figure 6.9 Search engine marketing integrates three different strategies: search
engine optimization, pay-per-click advertising, and social media optimization.
©
a
rk
a3
8/
Sh
ut
te
rs
to
ck
Click-through rate: the per-
centage of people who click
on a hyperlinked area of a
SERP or webpage.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 194 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.1 Using Search Technology for Business Success 195
2. Providing content that is useful to people using mobile devices. Webmasters
should consider how people use their mobile devices and adjust content accord-
ingly (see Table 6.2).
When designing a mobile site for e-commerce, Web developers should make
sure that information about store location, product reviews, and promotional offers is
easily available and optimized so that it is likely to appear in a mobile SERP. Mobile
shoppers also use barcode scanning apps as a kind of mobile search engine for locat-
ing product reviews and price comparisons while shopping in stores. This practice,
called showrooming, is becoming increasingly popular with consumers and creating a
great deal of frustration and worry on the part of brick-and-mortar retailers.
Web Search for Business
Commercial search engines and Web directories are useful tools for knowledge
workers in business. To use search engines effectively, workers should familiar-
ize themselves with all the features available on the search engine they use. Since
Google is the most popular search engine, we highlight some of those features
below. Many of these features are also available on Bing.com.
• Focused search: You can focus your search to information in different
formats—webpages, videos, images, maps, and the like—by selecting the
appropriate navigation button on the SERP page.
• Filetype: If you are looking specifically for information contained in a
certain file format, you can use the “filetype:[file extension]” command
following your keyword query. For instance, the search “private colleges
filetype:xls” will produce links to MSExcel files with information related to
private colleges. Use this command to find Adobe files (pdf), MSWord files
(doc), PowerPoint files (ppt), and so on.
• Advanced search: To narrow your search, go to the Advanced Search panel.
From this page, you can set a wide range of parameters for your search,
including limiting the search to certain domains (e.g., .gov, .org, .edu), lan-
guages, dates, and even reading level. You can also use this to narrow your
search to a particular website.
• Search tools button: Allows you to narrow your results to listings from spe-
cific locations or time frames.
• Search history: Have you ever found a page using a search engine, but later
had trouble finding it again? If you are logged into your Google account
while using the search engine, it’s possible to review your search history. It
will show you not only your search queries, but also the pages you visited
following each query.
Figure 6.10 Mobile phone
users watch One Direction
perform on Good Morning
America in New York City’s
Central Park on November 6,
2013. ©
JS
to
ne
/S
hu
tt
er
st
oc
k.
co
m
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 195 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
196 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
TABLE 6.2 How In-Store Shoppers are Use Mobile Devices
Shopping Behavior Percentage
Use a mobile device to assist with shopping at least 62%
once a month
Use a mobile device to assist with shopping at least 17%
weekly
Use their smartphones for more than 15 minutes while in 50%
a store
Use a search engine to browse product information 82%
while shopping in a store (Search engines dominate
store websites, brand websites, store apps, and brand
apps as a starting point.)
Use their smartphone for preshopping activities such 90%
as fi nding store locations, fi nding product reviews,
making price comparisons, fi nding promotional offers,
and so on
Top mobile shopping categories include:
Appliances 97%
Groceries 89%
Baby care 87%
Electronics 87%
Household care 86%
Across all product categories, mobile shoppers report 33%
using their smartphones instead of asking for information
from store employees
Use smartphones instead of asking for information from 55%
store employees when shopping for appliances
Use smartphones instead of asking for information from 48%
store employees when shopping for electronics
In-store price comparisons are the most common shopping
activity across product categories
Appliances 74%
Electronics 70%
Baby care 62%
Household care 58%
Mobile shoppers prefer to view mobile websites vs. 65% vs. 35%
mobile apps
Source: ThinkWithGoogle.com (2013).
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 196 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.1 Using Search Technology for Business Success 197
These are just a few of the many features you can use to conduct a power
search. While you are in college, take the time to become proficient with using dif-
ferent search engine features. Not only will it help with your immediate research
needs, it will help you in your career as well. At the end of this chapter, we include
information for a free online Power Search course offered by Google. This is a good
way to enhance your ability to find the information you need.
Finding intellectual property Your business may have an interest in protecting
certain kinds of intellectual property being used without permission on the Web. This
might include confidential reports, images, copyrighted blog posts, creative writing
(e.g., poetry, novels, etc.), and so on. You can use search engines to find where some-
one may have posted your intellectual property on the Web without permission (see
Osher, 2014). You can search for text-based work by simply using queries containing
strings of text from the material you’re looking for. Images can be found by using
Google’s reverse image search engine (images.google.com). Tin Eye is an alternative
reverse image search engine with a number of interesting features (tineye.com).
Real time search Sometimes you need information about things as they happen.
For instance, you may be interested in monitoring news stories written about your
company or you might need to know what people are saying about your brand or a
political candidate on Twitter. For these situations, you’ll need a real time search tool.
Say your company wants to explore accepting Bitcoin payments. (Bitcoin is a
digital currency that was launched in 2009.) After engaging in a traditional Web
search to learn about the currency, you decide you want to learn about public inter-
est in the currency and find news stories about it that have recently been published.
You might consider using the following tools:
• Google Trends—Trends (google.com/trends) will help you identify current
and historical interest in the topic by reporting the volume of search activity
over time. Google Trends allows you to view the information for different
time periods and geographic regions.
• Google Alerts—Alerts (google.com/alerts) is an automated search tool for
monitoring new Web content, news stories, videos, and blog posts about
some topic. Users set up alerts by specifying a search term (e.g., a company
name, product, or topic), how often they want to receive notices, and an
e-mail address where the alerts are to be sent. When Google finds content
that match the parameters of the search, users are notified via e-mail. Bing
has a similar feature called News Alerts.
• Twitter Search—You can leverage the crowd of over 650 million Twitter
users to find information as well as gauge sentiment on a wide range of topics
and issues in real time. Twitter’s search tool (twitter.com/search-home) looks
similar to other search engines, and includes an advanced search mode.
Social bookmarking search Social bookmarking sites (described in Chapter 7)
provide a way for users to save links they want to access at a later time. When saving
page links, users tag them with keywords that describe the page’s content. In effect,
the bookmarked links form a graph of content on the Web that can be used by oth-
ers. The two largest social bookmarking services are delicious.com and diigo.com.
Because the webpages are tagged by humans, search results are often different from
and more relevant than what you get from commercial search engines.
Specialty search engines: vertical search As described previously, large
commercial search engines use indicators of popularity or reputation to determine
website quality. This seems to work well for a generalized Web search, but it might
not be effective when users search on very specific topics such as rare disease,
which by definition, does not generate a lot of activity on the Web. Crawlers also
do not often index pages in the lower levels of less popular websites. Vertical search
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 197 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
198 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
engines are programmed to focus on webpages related to a particular topic and to
drill down by crawling pages that other search engines are likely to ignore. Vertical
search engines exist for a variety of industries. Ironically, the best way to find a
vertical search engine for a particular industry or topic is to search for it on a com-
mercial search engine like Google or Bing.
Questions
1. What is the primary difference between a Web directory and a crawler-
based search engine?
2. What is the purpose of an index in a search engine?
3. Why are companies increasingly interested in enterprise search tools
capable of handling unstructured data?
4. What is the difference between search engine optimization and PPC
advertising?
5. Describe three different real time search tools.
The goal of SEO practitioners is to help organizations increase traffic to their web-
sites. They accomplish this by optimizing websites in an effort to increase visibility
and ranking on SERPs. Using Web analytics programs like Google Analytics, com-
panies can determine how many people visit their site, what specific pages they visit,
how long they spend on the site, and what search engines are producing the most traf-
fic (see Figure 6.11). More sophisticated SEO practitioners will also analyze keyword
conversion rates, or the likelihood that using a particular keyword to optimize a page
will result in conversions (i.e., when a website visitor converts to a buyer).These are
just a few of the many metrics used to measure the effectiveness of SEO strategies.
6.2 Organic Search and Search Engine Optimization
Figure 6.11 Tools like
Google Analytics are used
to monitor changes in
website traffi c as a result of
search engine optimization
practices.
STRATEGIES FOR
SEARCH ENGINE
OPTIMIZATION
As mentioned at the beginning of this chapter, all search engines use somewhat dif-
ferent proprietary methods for determining where a website will appear in search
results. As a result, it is not possible to tell what specific factors will be used and
how much weight they will carry in determining SERP ranking. However, in the
section below, we describe three categories of ranking factors (see Brown, 2013)
and attempt to illustrate each with a few examples.
©
fr
an
ck
re
p
or
te
r/
iS
to
ck
p
ho
to
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 198 11/7/14 9:41 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.2 Organic Search and Search Engine Optimization 199
Ranking Factors
Ranking factors can be grouped into at least three different categories: reputation
or popularity, relevance, and user satisfaction.
Reputation or Popularity: In simple terms, search engines attempt to provide links
to good websites—sites that contain high-quality content. But how do they deter-
mine this? It is not possible for the search engine to directly evaluate the quality
of a website’s content. That would require the system to understand the site’s
content and have expertise in all possible subject matters. Instead, search engines
use indirect measures of quality. One way of assessing the quality of a website is
to use measures of popularity. This is based on the assumption that websites with
good content will be more popular than sites with poor-quality content. Google’s
PageRank algorithm is perhaps one of the most well-known attempts to use popu-
larity to determine website quality. It is based on the assumption that people are
more likely to link to high-quality websites than poor-quality sites. Therefore, the
algorithm counts backlinks—external links that point back to a site. The effective-
ness of the PageRank strategy is what initially set Google apart from competing
search engines and led to its dominance in the marketplace. SEO practitioners and
writers in the field have placed great emphasis on the importance of backlinks over
the years. A number of creative strategies have been developed for encouraging
others to link to a website (see Zrekat, 2013, Solihin, 2013, Gaiker, 2012, Ward &
French, 2013).
Recent changes in Google’s ranking methods have led others to speculate that
backlinks, while still very important, are not weighted as heavily as they used to be
(see Schachinger, 2012). Table 6.3 lists a number of other factors that SEO special-
ists believe are used by search engines to gauge reputation.
TABLE 6.3 Popularity Factors Used by Search Engines
Social media indicators: Webpages being discussed in social media are more likely to be popular. Examples
include comments on Facebook and Google , shares, Tweets, Likes, and so on.
Site traffi c: The more traffi c a site gets, the more likely it is to contain quality content.
Listings in quality Web directories: Sites that have been accepted for listing in quality Web directories are more
likely to contain quality content because they have been reviewed by human editors.
Reputation on review sites: Sites with high ratings on review sites (such as Yelp.com, Zagat.com, and Epinions.com)
are more likely to have quality content.
PageRank of sites containing backlinks: Backlinks from sites with high PageRank scores themselves are thought
to be more valuable.
SERP click-through rate (CTR): Google and other search engines monitor how often searchers click through on
a SERP listing. People tend to click listings that appear to contain quality content.
Onpage factors: Metadata (e.g., page titles, page descriptions) and descriptive URLs infl uence how a listing
appears on a SERP. This, in turn, can affect the CTR.
Dwell time and bounce rate: Dwell time is the amount of time a user stays on a page before returning to the SERP.
Longer dwell times suggest users found content that was worth reading. A “bounce” is an extremely short dwell
time—in other words, a user who clicks on a listing and comes right back is said to “bounce.” Low bounce rates and
long dwell times correlate with high content quality.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 199 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
200 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
TABLE 6.4 Factors That Affect Relevance Scores
Keywords related to the search topic suggest relevant content.
Page titles: Words in the page title that are related to the topic suggest relevant content.
Relevant phrases in text: In addition to keywords, search engines look at the words and phrases on the page to
determine relevance.
Amount of text on page that appears relevant: The proportion of relevant text to nonrelevant text can infl uence
relevance.
Backlinks from relevant sites and Web directories: Webpages that are listed in relevant categories of Web directories
are more likely to be relevant because they were reviewed by human editors.
SERP click-through rate (CTR): Searchers are more likely to click on listings that contain relevant content.
Onpage factor: Metadata (such as page titles, page descriptions) and descriptive URLs should refl ect the page
content. People use the information in search listings to determine if a link contains relevant information. This
affects CTR.
Dwell time and bounce rate are impacted by how relevant a website’s content is. Long dwell times and short
bounce rates suggest relevant content related to the search.
Inbound marketing: an
approach to marketing that
emphasizes SEO, content
marketing and social media
strategies to attract custom-
ers. Often viewed as an alter-
native to traditional marketing
strategies based on advertis-
ing and personal selling.
CONTENT AND
INBOUND MARKETING
The ultimate goal of a search engine is to help users find the information or
content that they are searching for. Sometimes it seems that SEO practitioners
lose sight of this and spend too much time chasing down hundreds of factors they
think are being used by search engine ranking algorithms. At worst, SEO can
represent an attempt to “game the system” or trick search engines into ranking a
site higher than its content deserves (see the discussion of black hat SEO in the
next section).
Perhaps the most important action an organization can take to improve its
website’s ranking and satisfy website visitors is provide helpful content that is
current and updated regularly. When SEO practices are combined with valuable
content, websites become easier to find in search engines but, more importantly,
contribute to building brand awareness, positive attitudes toward the brand, and
brand loyalty.
Inbound marketing represents an alternative approach to traditional outbound
marketing strategies (e.g., mass media advertising) that have been used by compa-
nies historically (see Figure 6.12).
Relevance: In addition to popularity, search engines attempt to determine if the
content on a webpage is relevant to what the searcher is looking for. As with qual-
ity, the search engine cannot determine relevance directly, so algorithms have
been developed to look for clues that suggest a site might be relevant. The factors
listed in Table 6.4 have been identified by SEO specialists as likely clues used by
search engines to determine relevance scores. Note that some of these are the same
or similar to factors used to evaluate popularity, but are interpreted to evaluate
relevance.
User Satisfaction: Like all successful businesses, search engines want their custom-
ers to be satisfied. As a result, SERP ranking is influenced by factors that impact
user satisfaction. Table 6.5 lists factors that are likely to influence a search engine’s
user satisfaction rating.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 200 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.2 Organic Search and Search Engine Optimization 201
Inbound marketers attract customers to their websites with content that is
informative, useful, or entertaining. Inbound marketing campaigns are based on
strategies that integrate content generation, SEO, and social media tactics. In
Chapter 7, you will read more about how inbound marketers integrate content,
SEO, and social media strategies into powerful marketing campaigns that deliver
sales and profits to companies that use this new approach to marketing.
TABLE 6.5 Factors Affecting User Satisfaction
Dwell time: Users who stay on a site longer are probably more satisfi ed.
Site speed: Slow page loading time on websites reduces satisfaction.
Reading level: Reading levels that are too high or too low frustrate users.
Hacked sites, malware, spam reduce user satisfaction signifi cantly.
Website satisfaction surveys: Google created user satisfaction surveys that
webmasters can embed in their websites. Positive responses to these surveys can
improve ranking.
Barriers to content: Making people register, provide names, or fi ll out forms to
get to content has a negative impact on user satisfaction.
Other factors: Too many ads, page-not-found errors, duplicate content/pages,
content copied from other websites, and spam in comment sections all detract
from user satisfaction.
BLACK HAT VS. WHITE
HAT SEO: ETHICAL
ISSUES IN SEARCH
ENGINE OPTIMIZATION
Search engines regularly update their algorithms to improve results. Two well-
known Google updates called Panda (released in 2011) and Penguin (released in
2012) were designed to improve the ranking of websites with quality content and
downgrade poor-quality sites. Both updates are designed to defeat what are com-
monly referred to as black hat SEO tactics. People who employ black hat SEO
Figure 6.12 Inbound marketers use valuable content, SEO, and social media
to attract customers.
Communication
is interactive
or two-way
Marketers
promote
company by
educating or
entertaining
Typical
strategies:
content, social
media & SEO
Customers
seek
out the
business
Inbound Marketing
Communication
is one-way
Businesses
broadcast
messages that
interrupt
customers
Typical
strategies:
TV, radio,
print, outdoor,
cold calls
Businesses
seek out
customers
Outbound Marketing
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 201 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
202 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
tactics try to trick the search engine into thinking a website has high-quality content,
when in fact it does not. Some examples of obvious black hat techniques are listed
below. With stronger detection systems now in place, websites that use these tactics
(or even appear to use them) will be severely downgraded in Google’s ranking
system.
Link spamming—generating backlinks for the primary purpose of SEO, not
adding value to the user. Black hat SEOs use tricks to create backlinks. Some
examples include adding a link to a page in the comments section of an unre-
lated blog post, or building sites called link farms solely for the purpose of link-
ing back to the promoted page.
Keyword tricks—Black hat SEOs will embed several high-value keywords
on pages with unrelated content to drive up traffic statistics. For instance, an
e-commerce site might embed words like “amazon” (a word that frequently
shows up in search queries) in an attempt to get listed on SERPs of people
looking for amazon.com.
Ghost text—This tactic involves adding text on a page that will affect page
ranking. The text may not have anything to do with the real content of the
page, or it may simply repeat certain words to increase the content density.
The text is then hidden, usually by making it the same color as the back-
ground.
Shadow pages—Also called ghost pages or cloaked pages, this black hat tactic
involves creating pages that are optimized to attract lots of people. The pages,
however, contain a redirect command so that users are sent to another page to
increase traffic on that page.
These particular tactics are no longer effective as a result of updates Google has
made to its ranking system. Most likely, other major search engines have adopted
similar measures. However, there will always be people who attempt to take short-
cuts to achieve higher SERP rankings. Businesses need to be very careful when hir-
ing SEO consultants or agencies to make sure they do not use inappropriate SEO
techniques because when they are discovered, Google and other search engines will
usually punish the business by dramatically lowering the website’s rank so that it
does not show up on SERPs at all.
Questions
1. Search engines use many different “clues” about the quality of a
website’s content to determine how a page should be ranked in search
results. These clues fall into three primary categories: Reputation or
Popularity, Relevance, and User Satisfaction. Explain the rationale for
using each of these three categories as an indicator of a website’s con-
tent quality.
2. Backlinks were a key factor in Google’s original PageRank algorithm.
Explain what a backlink is and why Google has reduced its emphasis on
backlinks and instead uses many other additional factors in its ranking
algorithm.
3. Explain why so-called black hat SEO tactics are ultimately short-sighted
and can lead to signifi cant consequences for businesses that use them.
4. How do organizations evaluate the effectiveness of their search engine
optimization (SEO) strategies and tactics?
5. Explain why providing high quality, regularly updated content is the
most important aspect of any SEO strategy.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 202 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.3 Pay-Per-Click and Paid Search Strategies 203
In addition to organic listings, most search engines display paid or sponsored list-
ings on their SERPs. These advertisements provide revenue for the search engine
and allow it to offer Web search services to the general public for free. They also
provide a way for smaller organizations or businesses with new websites to gain
visibility on SERPs while waiting for their SEO strategies to produce results. Most
major search engines differentiate organic search results from paid ad listings on
SERPs with labels, shading, and placing the ads in a different place on the page.
Some critics have complained that paid advertisements receive preferential page
placement and are not clearly distinguished from organic listings. However, at
the time of this publication, it is easy to distinguish ads from organic results on
Google and Bing SERPs. Defenders of the search engine companies argue that
since the paid ads make it possible for everyone to use search services for free, the
preferential page placement is justified.
6.3 Pay-Per-Click and Paid Search Strategies
CREATING A PPC
ADVERTISING
CAMPAIGN
There are four steps to creating a PPC advertising campaign on search engines.
1. Set an overall budget for the campaign.
2. Create ads—most search engine ads are text only.
3. Select keywords associated with the campaign.
4. Set up billing account information.
Search advertising allows businesses to target customers who are likely to pur-
chase their products. They do this by selecting keywords that correspond to search
queries that potentially identify someone as a customer. For instance, a company
that sells women’s purses may want to appear on a SERP when someone conducts
a search using any of the following terms or phrases:
• Purse
• Handbag
• Women’s purses
• Ladies’ purses
• Designer purses
• Designer handbags
Google and other search engines provide advertisers with tools for evaluating
the impact of different keywords or phrases. These tools typically display informa-
tion about how often people use the word in a search and also recommend alternative
words the advertiser may want to consider including in the campaign. Advertisers
“bid” on having their ads appear when someone searches on one of their keywords.
Higher bids result in a greater probability that the ad will be selected to appear
when someone searches on a particular keyword, but also deplete the advertiser’s
budget more quickly. If a bid is too low, the ad might not appear very often or not
at all. The keyword tools usually provide information about typical bid prices for
each keyword or phrase. Smart advertisers will typically start with a modest bid and
increase it over time to achieve the ad placement rate they desire.
The likelihood of ad placement can also influenced by a quality score deter-
mined by factors related to the user’s experience. Ads that are considered to be
more relevant (and therefore more likely to be clicked on) will cost less and more
likely run in a top position. According to Google, quality scores are determined by
several factors:
• Expected keyword CTR
• The past CTR of your URL
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 203 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
204 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
• Past effectiveness (overall CTR of ads and keywords in the account)
• Landing page quality (relevance, transparency, ease of navigation, etc.)
• Relevance of keywords to ads
• Relevance of keywords to customer search query
• Geographic performance—account success in geographic regions being
targeted.
• How well ads perform on different devices (quality scores are calculated for
mobile, desktop/laptop, and tablets).
Relevant ads are good for all parties—the search engine makes more money
from clicked ads, the advertiser experiences more customers visiting its site, and the
customer is more likely to find what he or she is looking for.
In addition to selecting keywords and setting bid prices, advertisers also set
parameters for the geographic location they want their ad to appear in and the
time of day. These factors allow for additional customer targeting designed to help
advertisers reach the consumers most likely to purchase their products.
In their review of paid search advertising, Jansen and Mullen (2008) point out
that the effectiveness of PPC ads is heavily influenced by factors on the webpages
that ads are linked to. For instance, sometimes companies create product-oriented
ads, but then link to the main page of their website instead of a page with informa-
tion about the product in the ad. Other factors include landing page design, effec-
tiveness of the call to action, and the quality of the shopping cart application. It does
not make sense to spend a lot of money on a PPC campaign if the website is not
attractive to consumers once they reach it.
You can learn more about advertising on the major commercial search engines
by visiting the following websites:
• Google: adwords.google.com
• Bing: advertise.bingads.microsoft.com
• Yahoo: advertising.yahoo.com
METRICS FOR PAID
SEARCH ADVERTISING
In addition to more effective targeting, one of the key benefits of online adver-
tising is the ability to evaluate its contribution to sales revenue more effectively.
PPC advertisers use the following metrics to gauge the effectiveness of their
campaigns:
Click-through rates (CTRs)—By themselves, CTRs do not measure the finan-
cial performance of an ad campaign. But they are useful for evaluating many of
the decisions that go into a campaign, such as keyword selection and ad copy.
Keyword conversion—High CTRs are not always good if they do not lead to
sales. Since the cost of the campaign is based on how many people click an ad,
you want to select keywords that lead to sales (conversions), not just site visits.
PPC advertisers monitor which keywords lead to sales and focus on those in
future campaigns.
Cost of customer acquisition (CoCA)—This metric represents the amount of
money spent to attract a paying customer. To calculate CoCA for a PPC cam-
paign, you divide the total budget of the campaign by the number of customers
who purchased something from your site. For instance, if you spent $1,000 on
a campaign that yielded 40 customers, your CoCA would be $1,000/40 $25
per customer.
Return on advertising spend (ROAS)—The campaign’s overall financial effec-
tiveness is evaluated with ROAS (revenue/cost). For example, if $1,000 was spent
on a campaign that led to $6,000 in sales, ROAS would be $6,000/$1,000 $6. In
other words, for every dollar spent on PPC ads, $6 was earned.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 204 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.4 A Search for Meaning—Semantic Technology 205
Questions
1. What would most people say is the fundamental difference between
organic listings and PPC listings on a search engine?
2. What are the four primary steps to creating a PPC advertising campaign
on search engines?
3. In addition to the “bid price” for a particular keyword, what other
factor(s) infl uence the likelihood that an advertisement will appear on a
search results page? Why don’t search engines just rely on the advertis-
ers bid when deciding what ads will appear on the search results page?
4. How do webpage factors infl uence the effectiveness of PPC advertise-
ments?
5. Describe four metrics that can be used to evaluate the effectiveness of
a PPC advertising campaign.
If there is one thing history has taught us, it is that the future is hard to predict. It
might seem silly to predict what the future Internet will look like when it’s clear so
many people are having trouble understanding all the implications of the Internet
that now exists. However, forward-thinking businesses and individuals are begin-
ning to plan for the next evolution, which is sometimes called Web 3.0.
The current Web is disjointed, requiring us to visit different websites to get con-
tent, engage in commerce, and interact with our social networks (community). The
future Web will use context, personalization, and vertical search to make content,
commerce, and community more relevant and easier to access (Mitra, 2007). With
the addition of mobile technology, this Web will be always accessible.
• Context defines the intent of the user; for example, trying to purchase music,
to find a job, to share memories with friends and family.
• Personalization refers to the user’s personal characteristics that impact how
relevant the content, commerce, and community are to an individual.
• Vertical search, as you have read, focuses on finding information in a par-
ticular content area, such as travel, finance, legal, and medical.
Many technologies are being developed that will create a new, richer experi-
ence for Web users of the future. Semantic technology is one of those growth areas.
6.4 A Search for Meaning—Semantic Technology
WHAT IS THE
SEMANTIC WEB?
Semantic refers to the meaning of words or language. The semantic Web is one in
which computers can interpret the meaning of content (data) by using metadata:
“Semantics (in an IT setting) is meaningful computing: the application of
natural language processing (NLP) to support information retrieval, ana-
lytics, and data-integration that compass both numerical and “unstruc-
tured” information.” (Grimes, 2010)
Tim Berners-Lee, creator of the technology that made the World Wide Web
possible is the director of the World Wide Web Consortium (W3C). This group
develops programming standards designed to make it possible for data, informa-
tion, and knowledge to be shared even more widely across the Internet. The result
of these standards is a metadata language, or ways of describing digital information
so that it can be used by a wide variety of applications. Much of the world’s digital
information is stored in files structured so that they can only be read by the pro-
grams that created them. With metadata, the content of these files can be labeled
Metadata: data that describe
and provide information
about other data.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 205 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
206 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
with tags describing the nature of the information, where it came from, or how it is
arranged, essentially making the Web one large database that can be read and used
by a wide variety of applications.
It is helpful to think about the semantic Web against the background of earlier
Internet functionality (see Table 6.6). The early Internet allowed programmers and
users to access information and communicate with one another without worrying
about the details associated with the machines they used to connect to the network and
store the information. The semantic Web continues this evolution, by making it pos-
sible to access information about real things (people, places, contracts, books, chemi-
cals, etc.) without worrying about the details associated with the nature or structure
of the data files, pages, and databases where these things are described or contained
(Hendler and Berners-Lee, 2010). This will increase the amount of information avail-
able on the Web and enhance our ability to search for and find useful information.
TABLE 6.6 Evolution of the Web
Web 1.0 (The Initial Web) Pages or documents are “hyperlinked,” making
A Web of Pages it easier than ever before to access connected
information.
Web 2.0 (The Social Web) Applications are created that allow people to
A Web of Applications easily create, share, and organize information.
Web 3.0 (The Semantic Web) Information within documents or pages is
A Web of Data tagged with metadata, allowing users to access
specifi c information across platforms, regardless
of the original structure of the fi le, page, or
document that contains it. It turns the Web into
one giant database.
THE LANGUAGE(S)
OF WEB 3.0
The early Web was built using hypertext markup language (HTML). Web 2.0 was
made possible, in part, by the development of languages like XML and JavaScript.
The semantic Web utilizes additional languages that have been developed by the
W3C. These include resource description framework (RDF), Web ontology lan-
guage (OWL), and SPARQL protocol and RDF query language (SPARQL). RDF
is a language used to represent information about resources on the Internet. It will
describe these resources using metadata uniform resource identifiers (URIs) like
“title,” “author,” “copyright and license information.” It is one of the features that
allow data to be used by multiple applications.
As the acronym SPARQL implies, it is used to write programs that can retrieve
and manipulate data stored in RDF format. OWL is the W3C language used to
categorize and accurately identify the nature of things found on the Internet. These
three languages, used together, will enhance the element of context on the Web,
producing more fruitful and accurate information searches. The W3C continues its
work, with input by programmers and the broader Internet community to improve
the power and functionality of these languages.
SEMANTIC WEB AND
SEMANTIC SEARCH
As you have read, the semantic Web is (or will be) described by metadata, making it
easier for a broad range of applications to identify and utilize data. One of the barriers
to creating the semantic Web, however, is the tagging process. Who will tag all of the
data that currently exist on the Web? How can we be sure that such data will be tagged
correctly? Will people purposely tag data incorrectly to gain some kind of advantage in
the same way that black hat SEO tactics are used to mislead search engines?
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 206 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.4 A Search for Meaning—Semantic Technology 207
Semantic search engines could be programmed to take advantage of metadata
tags, but their usefulness would be very limited if they could only identify Web
content that had been tagged with metadata:
“Semantic search is the process of typing something into a search engine
and getting more results than just those that feature the exact keyword
you typed into the search box. Semantic search will take into account
the context and meaning of your search terms. It’s about understanding
the assumptions that the searcher is making when typing in that search
query.” (DiSilvestro, 2013)
Instead of relying solely on metadata tags, current semantic search engines
use alternative approaches to understanding the meaning of content on the Web.
Semantic search engines use natural language processing, contextual cues, syn-
onyms, word variations, concept matching, specialized queries, and other strategies
to generate search results that are superior to those created by simple keyword-
matching algorithms. Understanding the context or intent of users is particularly
important. If a search engine understood the proper context of a search query con-
taining the word “Disneyworld,” it would know if the search engine should return
information that would be of interest to people
• planning a vacation, or
• looking for a job at the theme park, or
• interested in the history of Disneyworld.
Simple keyword matching is likely to produce a wide assortment of informa-
tion, much of which will not be of interest to users with a specific goal in mind.
Semantic Search Features and Benefits
So what can semantic search engines do that is superior to search engines that work
solely on keyword matching? Grimes (2010) provides a list of practical benefits that
could result from semantic search technology:
Related searches/queries. The engine suggests alternative search queries that
may produce information related to the original query. Search engines may also
ask you, “Did you mean: [search term]?” if it detects a misspelling.
Reference results. The search engine suggests reference material related to the
query, such as a dictionary definition, Wikipedia pages, maps, reviews, or stock
quotes.
Semantically annotated results. Returned pages contain highlighting of search
terms, but also related words or phrases that may not have appeared in the
original query. These can be used in future searches simply by clicking on them.
Full-text similarity search. Users can submit a block of text or even a full docu-
ment to find similar content.
Search on semantic/syntactic annotations. This approach would allow a user
to indicate the “syntactic role the term plays—for instance, the part-of-speech
(noun, verb, etc.)—or its semantic meaning—whether it’s a company name,
location, or event.” For instance, a keyword search on the word “center” would
produce too many results. Instead, a search query could be written using a syn-
tax such as the following:
This would only return documents where the word “center” was part of an
organization’s name (e.g., Johnson Research Center or Millard Youth Center).
Google currently allows you to do something similar to specify the kind of files
you are looking for (e.g., filetype:pdf).
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 207 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
208 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
Concept search. Search engines could return results with related concepts.
For instance, if the original query was “Tarantino films,” documents would be
returned that contain the word “movies” even if not the word “films.”
Ontology-based search. Ontologies define the relationships between data. An
ontology is based on the concept of “triples”: subject, predicate, and object.
This would allow the search engine to answer questions such as “What veg-
etables are green?” The search engine would return results about “broccoli,”
“spinach,” “peas,” “asparagus,” “Brussels sprouts,” and so on.
Semantic Web search. This approach would take advantage of content tagged
with metadata as previously described in this section. Search results are likely
to be more accurate than keyword matching.
Faceted search. Faceted search provides a means of refining results based on pre-
defined categories called facets. For instance, a search on “colleges” might result
in options to “refine this search by. . .” location, size, degrees offered, private or
public, and so on. Faceted search tools available today tend to focus on a specific
domain, such as Wikipedia or Semidico, a search tool for biomedical literature.
Clustered search. This is similar to a faceted search, but without the predefined
categories. Visit Carrot2.org to better understand this concept. After conducting
a search, click on the “foamtree” option to see how you can refine your search.
The refining options are extracted from the content in pages of the initial search.
Natural language search. Natural language search tools attempt to extract words
from questions such as “How many countries are there in Europe?” and cre-
ate a semantic representation of the query. Initially, this is what people hoped
search engines would evolve toward, but Grimes wonders if we have become
so accustomed to typing just one or two words into our queries that writing out
a whole question may seem like too much work.
You may recognize some of these search enhancements when using popular
commercial search engines like Google or Bing. That is because they have begun
to build semantic technologies into their systems. You are encouraged to explore
other search engines that are developing semantic search features: DuckDuckGo.com,
Hakia.com, and Swoogle (swoogle.umbc.edu).
SEMANTIC WEB FOR
BUSINESS
What opportunities and challenges does the semantic Web hold for businesses?
Perhaps the most immediate challenge faced by businesses is the need to optimize their
websites for semantic search. Because search engines are responsible for directing so
much traffic to business websites, it will be important that companies take advantage
of semantic technologies to ensure they continue to remain visible to prospective
customers who use search engines. While the details of semantic SEO are beyond the
scope of this book, we can illustrate one important benefit of semantic website opti-
mization. Websites optimized for semantic technology with metadata produce richer,
more attractive listings on SERPs. Google calls these rich snippets (see Figure 6.13).
Note how detailed the organic search listing in Figure 6.13 is compared to a
basic listing. These enhanced search listings are more visually attractive and pro-
duce greater CTRs.
Businesses need to stay up-to-date with advances in semantic search so that they
can continuously optimize their sites to increase traffic from major search engines.
Questions
1. List fi ve different practical ways that semantic technology is enhancing
the search experience of users.
2. How do metadata tags facilitate more accurate search results?
3. Briefl y describe the three evolutionary stages of the Internet?
4. Defi ne the words “context,” “personalization,” and “vertical search” and
explain how they make for more powerful and accurate search results.
5. What are the three languages developed by the W3C and associated
with the semantic Web?
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 208 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.5 Recommendation Engines 209
Figure 6.13 The Google
search listing for this New
York–based grocery chain
is more attractive because
it uses metadata from the
business’s website. (Google
and the Google logo are
registered trademarks of
Google, Inc., used with
permission.)
A lot of times, people don’t know what they want until you show it to them.
—Steve Jobs (quoted in Business Week, May 12, 1998)
Think about the challenge faced by large e-commerce websites like Amazon or
Netflix. Brick-and-mortar retailers can capture people’s attention in the store with
eye-catching point-of-purchase displays or suggestive selling by store employees.
However, these are not options for retail websites. They need an effective way of
recommending their vast array of products to customers. Most e-commerce sites
provide website search tools based on the technologies previously discussed in this
chapter. Relying on customers to find products through an active search, however,
assumes customers know what they want and how to describe it when forming
their search query. For these reasons, many e-commerce sites rely on recommenda-
tion engines (sometimes called recommender systems). Recommendation engines
proactively identify products that have a high probability of being something the
consumer might want to buy. Amazon has long been recognized as having one of
the best recommendation engines. Each time customers log into the site, they are
presented with an assortment of products based on their purchase history, brows-
ing history, product reviews, ratings, and many other factors. In effect, Amazon
customizes their e-commerce site for each individual, leading to increased sales.
According to Amazon employees, click-through and conversion rates “vastly
exceed those of untargeted content such as banner advertisements and top-seller
lists” (Linden, Smith & York, 2003).
6.5 Recommendation Engines
RECOMMENDATION
FILTERS
There are three widely used approaches to creating useful recommendations:
content-based filtering, collaborative filtering, and hybrid strategies (Burke, 2007).
Content-Based Filtering
Content-based filtering recommends products based on the product features of items
the customer has interacted with in the past (Figure 6.14). Interactions can include
viewing an item, “liking” an item, purchasing an item, saving an item to a wish list,
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 209 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
210 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
and so on. In the simplest sense, content-based filtering uses item similarity to make
recommendations. For instance, the Netflix recommendation engine attempts to rec-
ommend movies that are similar to movies you already watched (see IT at Work 6.2).
Music-streaming site Pandora creates its recommendations or playlists based on the
Music Genome Project©, a system that uses approximately 400 different attributes
to describe songs (Glaser et al., 2006). These detailed systems for describing movies
and songs enhance Netflix’s and Pandora’s positions in highly competitive industries
because of their ability to offer superior recommendations to their customers.
3. Recommendation: “Based on your rating of fruity
cocktail umbrella drink you may also like…”
1. Customer likes fruity cocktail
umbrella drink
2. Computer searches products for fruity
cocktail umbrella drink
Figure 6.14 Content-
based fi ltering produces
recommendations based on
similarity of product features.
Alexis Madrigal (2014) reverse-engineered Netflix’s list of
movie genres and was surprised to learn the company uses
approximately 76,897 different ways to describe movies,
creating the potential for some unusually specific movie
recommendations. Christian Brown (2012) compiled a list of
possible humorous and sometimes disturbing movie catego-
ries, a few of which are listed below:
10. Cerebral Con-Game Thrillers
9. Visually Striking Father-Son Movies
8. Violent Nightmare-Vacation Movies
7. Understated Independent Workplace Movies
6. Feel-Good Opposites-Attract Movies
5. Witty Dysfunctional-Family TV Animated Comedies
4. Period Pieces About Royalty Based on Real Life
3. Campy Mad-Scientist Movies
2. Mind-Bending Foreign Movies
1. More like Arrested Development
The fact that Netflix went to the trouble of creating
so many detailed and descriptive labels suggests that a
content-based filtering strategy is at use in the company’s
recommendation system.
IT at Work 6 . 2
Violent Nightmare-Vacation Movies and Other Fun Movie Genres at Netflix
Collaborative Filtering
Collaborative filtering makes recommendations based on a user’s similarity to
other people. For instance, when a customer gives a product a high rating, he or
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 210 11/8/14 9:11 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.5 Recommendation Engines 211
she may receive recommendations based on the purchases of other people who
also gave the same product a high rating. Sometimes websites will explain the
reason for the recommendations with the message, “Other people who liked this
product also bought. . .” Many collaborative filtering systems use purchase his-
tory to identify similarities among customers. In principle, however, any customer
characteristic that improves the quality of recommendations could be used (see
Figure 6.15).
In an effort to develop increasingly better recommendation engines, developers
are exploring a number of creative ways to predict what consumers might like based
on patterns of consumer behavior, interests, ratings, reviews, social media contacts
and conversations, media use, financial information, and so on.
In addition to content filtering and collaborative filtering, two other
approaches to recommendation engines are mentioned in the literature: knowl-
edge-based systems and demographic systems (Burke, 2007). Knowledge-based
systems use information about a user’s needs to recommend products. This kind
of system is useful for developing recommendations for products that consumers
do not shop for very often. For instance, an insurance company may ask a cus-
tomer a series of questions about his or her needs, and then use that information
to recommend policy options. Demographic systems base recommendations on
demographic factors corresponding to a potential customer (i.e., age, gender,
race, income, etc.). While similarity to other customers might play a role in
developing these recommendations, such systems are different from collaborative
filtering systems that typically rely on information about a person’s behavior (i.e.,
purchase, product ratings, etc.).
Systems are being developed that leverage big data streams from multiple
sources to refine and enhance the performance of current systems.
Limitations of Recommendation Engines
While recommendation engines have proven valuable and are widely used, there
are still challenges that must be overcome. Four commonly cited limitations are
described below:
Cold start or new user—Making recommendations for a user who has not
provided any information to the system is a challenge for most systems since
they require a starting point or information about the user (Burke, 2007,
Adomavicius & Alexander, 2005). Tiroshi and colleagues (2011) have suggested
3. Recommendations: “Other customers who like pink beverage also like…”
1. Customer likes pink beverage 2. Other customers like pink beverage
Figure 6.15 Collaborative
fi ltering bases
recommendations on
similarity to other customers.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 211 11/8/14 9:11 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
212 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
consumers’ existing social media profiles from sites like Facebook and Twitter
could be used in situations where a website did not have sufficient information
of its own to make recommendations.
Sparsity—Collaborative systems depend on having information about a criti-
cal mass of users to compare to the target user in order to create reliable or
stable recommendations. This is not always available in situations where
products have only been rated by a few people or when it is not possible to
identify a group of people who are similar to a user with unusual preferences
(Burke, 2007).
Limited feature content—For content filter systems to work, there must be
sufficient information available about product features and the information
must exist in a structured format so it can be read by computers. Often feature
information must be entered manually, which can be prohibitive in situations
where there are many products (Adomavicius & Alexander, 2005).
Overspecialization—If systems can only recommend items that are highly
similar to a user profile, then the recommendations may not be useful. For
instance, if the recommendation system is too narrowly configured on a web-
site that sells clothing, the user may only see recommendations for the same
clothing item he or she liked, but in different sizes or colors (Adomavicius &
Alexander, 2005).
Hybrid Recommendation Engines
Hybrid recommendation engines develop recommendations based on some combi-
nation of the methodologies described above (content-based filtering, collaboration
filtering, knowledge-based and demographic systems). Hybrid systems are used to
increase the quality of recommendations and address shortcomings of systems that
only use a single methodology. Burke (2007) identified various ways that hybrid
recommendation engines combine results from different recommender systems. To
illustrate the potential complexity and variation in hybrid systems, four approaches
are listed below:
• Weighted hybrid: Results from different recommenders are assigned a
weight and combined numerically to determine a final set of recommenda-
tions. Relative weights are determined by system tests to identify the levels
that produce the best recommendations.
• Mixed hybrid: Results from different recommenders are presented along-
side of each other.
• Cascade hybrid: Recommenders are assigned a rank or priority. If a tie
occurs (with two products assigned the same recommendation value),
results from the lower-ranked systems are used to break ties from the
higher-ranked systems.
• Compound hybrid: This approach combines results from two recommender
systems from the same technique category (e.g., two collaborative filters),
but uses different algorithms or calculation procedures.
Recommendation engines are now used by many companies with deep content
(e.g., large product inventory) that might otherwise go undiscovered if the compa-
nies depended on customers to engage in an active search.
To simplify our description of recommendation engines, most of the examples
above have been based on the e-commerce sites recommending products to custom-
ers. However, this technology is used by many different kinds of business organiza-
tions, as illustrated in Table 6.7.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 212 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
6.5 Recommendation Engines 213
TABLE 6.7 Examples of Recommendation Engine Applications
Company How It Uses Recommendation Engines. . .
Amazon
Recommends products using multiple fi ltering
methods.
Netfl ix
Approximately 75 percent of Netfl ix movies are
selected as a result of its recommendation system.
Pandora
This streaming-music site creates playlists based on
similarity to initial songs or artists selected by the
user.
CNN, Time, Fast
These news and entertainment companies all use a
Company, Rolling
recommendation engine (or “content discovery
Stone, NBCNews.com,
system”) created by Outbrain.com to suggest
Reuters, Us Weekly
additional articles related to the one site visitors
initially viewed.
YouTube
YouTube uses a variation of Amazon’s
recommendation engine to suggest additional
videos people might like to watch (Linden, 2011).
Goodreads
This social website for readers recommends books
based on user ratings of books they have read.
Samsung
Uses recommendation engines built into its “smart
TVs” to suggest television programming to viewers.
Facebook and LinkedIn
These social networking services use
recommendation engines to suggest people
that users may want to connect with.
Apple Helps users fi nd mobile apps they might enjoy.
Microsoft Xbox 360
Suggests new games based on what users have
previously shown an interest in.
Tripadvisor
Recommends travel destinations and services based
on destinations people have viewed or rated.
Stitch Fix
This fashion start-up uses a recommender system in
conjunction with human stylists to select and ship
clothing products to customers, before customers
viewed or ordered them!
Fashioning Change
This online clothing retailer lets customers select
what their recommendations are based on: style
preferences, personality, causes, and “likes.”
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 213 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
214 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
Questions
1. How is a recommendation engine different from a search engine?
2. Besides e-commerce websites that sell products, what are some other
ways that recommendation engines are being used on the Web today?
3. What are some examples of user information required by recommendation
engines that use collaborative fi ltering?
4. Before implementing a content-based recommendation engine, what
kind of information would website operators need to collect about their
products?
5. What are the four distinct methodologies used by recommender systems
to create recommendations?
6. What is a recommendation engine called that combines different
methodologies to create recommendations? What are three ways these
systems combine methodologies?
Key Terms
access control
backlinks
black hat SEO
bounce rates
click-through rate (CTRs)
collaborative fi ltering
collection analysis module
content-based fi ltering
crawler control module
crawler search engines
dwell time
enterprise search
ghost pages
hybrid recommendation
engines
hybrid search engines
inbound marketing
indexer module
informational search
keyword conversion rates
keywords
link farms
link spamming
metadata
meta-search engines
navigational search
organic search listings
page repository
PageRank
paid search listings
pay-per-click (PPC)
petabyte
quality score
query interface
recommendation engines
resource description
framework (RDF)
retrieval/ranking module
rich snippets
search engine
search engine marketing
(SEM)
search engine optimization
(SEO)
search engine results page
(SERP)
semantic search engines
semantic web
shadow pages
showrooming
social media optimization
SPARQL protocol and
RDF query language
(SPARQL)
spiders
structured data
transactional search
uniform resource
identifi ers (URIs)
unstructured data
vertical search engines
Web directories
Web ontology language
(OWL)
Assuring Your Learning
1. Why is it important that businesses maintain a high
level of visibility on search engine results pages?
2. Why are organic search listings more valuable than
paid search listings for most companies over the
long term? Even though organic search listings are
more valuable, what are some reasons that compa-
nies should consider using PPC advertising as part
of their search marketing strategies?
3. Why is relevant and frequently updated content a
signifi cant factor for companies concerned about
their visibility on popular search engines? Does
the quality of content impact organic results, paid
results, or both? Explain.
4. Explain the differences between Web directories,
crawler search engines, and hybrid search engines.
5. Why do search engines consider their page-
ranking algorithms to be trade secrets? What
would be the consequences of providing detailed
information about how a search engine ranks
SERP listings?
6. Why do consumer search engines like Google and
Bing require vast amounts of data storage? What
actions do they take to address this need?
7. Explain why enterprise search technology is be-
coming increasingly important to organizations.
Describe how enterprise search applications are
DISCUSS: Critical Thinking Questions
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 214 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
Assuring Your Learning 215
different from consumer search engines in terms
of their functionality, purpose, and the special
challenges they must overcome.
8. Explain why people are much more likely to view
and pay attention to product and service informa-
tion in SERPs compared to traditional mass media
advertising? What strategies are businesses adopt-
ing to take advantage of this trend?
9. Why is it easier to measure the return-on-investment
of resources spent on search engine marketing com-
pared to mass media advertising?
10. How are consumers using mobile devices to search
for information about goods and services? How can
businesses respond to this trend to gain a competi-
tive advantage?
11. Identify at least fi ve ways that Google has changed
its page-ranking algorithms in recent years to en-
courage website developers to do more than simply
list keywords in an attempt to improve their ranking
on search results.
12. The ultimate goal of Google, Bing, and other con-
sumer search engines is to provide users with search
listings that contain useful information on the topic
of their search. What recommendations would you
make to a website owner with regard to website
content that will improve its rank on search result
listings over time?
13. Why are “black hat” SEO techniques (see
Section 6.2) considered unethical? Who is harmed
by the use of such techniques? What are the conse-
quences of using these questionable SEO tactics?
14. Explain how search engines determine if websites
contain relevant information or content.
15. Identify and describe the four steps to creating a
pay-per-click (PPC) ad campaign.
16. How does an advertiser’s bid and quality score
determine the frequency of PPC ad placement on
SERPs? What are the factors that Google uses to
determine an advertiser’s quality score? Why does
Google use the quality score instead of relying
solely on the advertiser’s bid?
17. Describe three metrics used by PPC advertisers to
evaluate the effectiveness of their search ad campaign.
18. Describe the difference between the semantic Web
and semantic search.
19. Describe fi ve ways that semantic search engines will
enhance functionality for users. How will businesses
benefi t from the development of semantic search
functions?
20. Recommender systems use different approaches to
generating recommendations. Explain the differ-
ence between content-based fi ltering and collab-
orative fi ltering. Describe the kind of information
required for each approach to work.
21. What are the alternatives to content-based fi ltering
and collaborative fi ltering recommender systems?
When is it most useful to use these alternatives?
22. Hybrid recommendation engines utilize two or
more fi ltering strategies to create recommendations.
Describe the four different approaches to creating a
hybrid system.
1. Select a search query term or phrase based on a class
assignment, a product you plan to purchase, or some
area of personal interest. Use the query at each of
the following search engines:
a. Google.com
b. Bing.com
c. Yahoo.com
d. Hakia.com
For each site, make the following observations:
a. How relevant or useful are the websites listed on
the fi rst two pages of search results?
b. What differences do you observe in terms of how
the search engines list websites on the search
results page?
c. Do you see any indication that the search engine
is using semantic technology to generate results
(see “Semantic Search Features and Benefi ts”
in Section 6.4)?
2. Visit the Nike website for its Fuelband product here:
nike.com/us/en_us/c/nikeplus-fuelband.
a. Make a list of nonbranded keywords that you
would recommend Nike use to optimize pages so
that they would show up in organic search listings.
b. Make a list of recommendations for content (i.e.,
articles, blog posts, information, etc.) that Nike
should add to its website for this product to in-
crease the chances that it will show up in organic
search results. What keywords should be empha-
sized in the content you recommend?
3. Use an existing account, or sign up for an account, at
one of the websites listed in Table 6.7. Make a list of
the ways that the website recommends its content,
goods, or services to you. Based on your observations,
are you able to determine what kind of recommenda-
tion system is in use by the website?
4. Pretend you are going to purchase an expensive item
like a large fl at-screen television or a major appliance
EXPLORE: Online and Interactive Exercises
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 215 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
216 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
from a national retailer like Best Buy or Sears. Using
your mobile phone, attempt to fi nd store locations,
product information, and customer reviews. Next,
install one of the popular shopping and price com-
parison apps listed below on your phone:
• Red Laser
• Amazon Price Check, or Flow (also by Amazon)
• Google Shopper
• Barcode Scanner
• Or, fi nd a similar price-checking app at your
mobile app store.
Now, go shopping (visit the store). While shopping,
use your mobile app to fi nd product reviews and
make price comparisons of the products you fi nd.
Briefl y describe your mobile shopping experience.
How did the mobile technology help or hinder your
shopping experience? What challenges does mobile
technology pose for traditional retailers?
5. Pretend you are an SEO consultant for a local busi-
ness or not-for-profi t organization. Visit the organiza-
tion’s website to familiarize yourself with the brand,
mission, products, services, and so on. Next, make a
list of keywords or phrases that you think should be
used to optimize the site for search engines. Rank-
order the list based on how frequently you think the
words are used in searches. Finally, go to google.com/
trends/explore and enter your keywords or phrases,
creating a graph that illustrates how often they have
been used in search queries. Based on what you
learn, what keywords or phrases would you recom-
mend the organization use to optimize its site?
1. Perform a search engine query using the terms “data
center” “environmental impact”. Describe the
environmental concerns that large-scale data centers
are creating around the globe and steps that com-
panies are taking to address these concerns. Read
about Google’s efforts at google.com/green. In your
opinion, is Google making a satisfactory effort to
minimize its negative impact on the environment?
Explain your answer.
2. Review the information in Section 6.1 about the
three types of searches (informational, navigational,
and transactional) that people conduct on search
engines. Put yourself in the role of an SEO consul-
tant for your college or university. Create a set of
content and/or keyword strategies that you would
recommend to your institution’s leaders to increase
the chances of appearing on SERPs resulting from
prospective students conducting each kind of search.
3. Review Table 6.3, Popularity Factors Used by Search
Engines. Select three factors that search engines use
to evaluate a website’s reputation. Next, generate a
list of strategies or ways that a website owner could
use the factors to improve its ranking on a search
engine. For instance, if one of your factors is “site
traffi c,” you might recommend that the website owner
post links to the website on the company Facebook
page to increase traffi c. Or, you might recommend
the website run a contest that requires people to visit
the site to enter. This would increase traffi c during the
contest. Come up with as many creative ideas as you
can for each popularity factor.
4. Traditional brick-and-mortar stores are increasingly
frustrated by competition with online retailers. Online
websites often have a cost advantage because they
do not have to maintain physical storefronts or pay
salespeople, and can use more effi cient logistical and
operational strategies. This sometimes allows them to
offer better prices to consumers. With the emergence
of recommendation engines, they appear to be gaining
another advantage—the ability to suggest products
to customers based on their past shopping history
and personal characteristics. Pretend you are a senior
manager for a national retail chain. How could your
company make use of recommendation systems to
suggest products to customers shopping in your store?
Outline a creative approach to this problem that iden-
tifi es the information you would need to collect, the
in-store technology required, and the manner in which
you would inform customers about the personalized
recommendations generated by your system.
5. Select a consumer product or service for which there
are at least three popular brand names. For example,
you might choose the category “cell phone carriers”
which includes Verizon, AT&T, Sprint and T-Mobile.
On the Google.com/trends page, type the brand
names, separated by commas, into the search fi eld
at the top of the screen (e.g. Verizon, AT&T, Sprint,
T-Mobile). The resulting chart will display the search
query volume by brand, an indicator of how much
interest each brand has received over time. Using the
Google Trends data, answer the following questions.
Tip: Before answering the questions below, use
Google’s search engine to fi nd articles on “how to
interpret Google trends”. This will help you better
understand the Google trends report and make it
easier to answer the questions below.
a. Using the date setting at the top of the Google
Trends page, explore different periods of time.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 216 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
CASE 6.2 Business Case 217
Briefl y summarize how interest in each brand has
changed over the last four years.
b. In the Regional Interest section, you can see how
interest in each brand varies by country or city.
In which countries and cities is each brand most
popular?
c. In the Related Searches section, you will see a list
of topics and query terms of interest to people
who used one of the brand names in a search.
How does the list of related topics change from
one brand name to another? Do the topic and
query term lists give you any insight into what
kind of information people may be interested in
relative to each brand?
d. Using a search engine, see if you can fi nd mar-
ket share data for the product or industry you
researched on Google Trends. If you fi nd this
information, does there seem to be any relation-
ship between search volume and market share
for the brand names you explored?
CASE 6.2
Business Case: Recommending Wine to Online Customers
Wine.com, headquartered in San Francisco, CA, is the world’s
largest online wine retailer, selling over 2 million bottles a
year. The company maintains an inventory of over 13,000
different wines and ships its product throughout the United
States. The company also operates wineshopper.com, a
members-only site for customers interested in special sales
and discounts on wine products.
While online retailers in other product categories have
enjoyed considerable success over the years, online wine sell-
ers have to work harder because of several political and regu-
latory factors. Chief among these challenges is complying
with a number of federal laws controlling the sale of alcohol
as well as state-level regulations that vary across the country.
Wine.com had to create seven different distribution centers
around the country to comply with varying state regulations,
raising its cost of doing business. Wine is also a potentially
perishable product, which means the company must take fac-
tors like weather into consideration when shipping during the
hot summer months.
A quick look at the Wine.com website will give you some
insight into how hard the company works to maintain its top
spot in online wine sales. The website features an extensive
community section where customers provide product reviews
and create wish lists of wines they would like to try. A blog
on the site keeps customers informed about the latest wine
news and the company engages its customers through social
media using Facebook and Twitter.
When consumers purchase wine at a local retailer, they
often rely on the expertise and recommendations of a knowl-
edgeable salesperson. This benefi t can be diffi cult to repli-
cate on a website. Historically, Wine.com placed information
for alternative wine selections on product pages, but these
recommendations were not customized to individual users.
These “static” recommendations were sometimes based on
wines the company wanted to promote, or the price category
and type of wine the customer was viewing at the time. For
instance, a product page for a particular type of Chardonnay
might display recommendations for three alternative brands
of Chardonnay in the same price category. All customers
viewing that page would see the same three recommenda-
tions.
In an effort to provide more attractive and relevant rec-
ommendations, Wine.com contracted with RichRelevance, a
San Francisco–based company, to create a system capable of
providing personalized recommendations. The new sys-
tem uses customer purchases, product search history, and
information about the wine purchases of similar customers to
create pages containing unique, personalized recommenda-
tions. Customers are encouraged to create profi le pages on
the site to aid in identifying shoppers who are similar to one
another. As well, customers can write product reviews that
provide additional information about consumer preferences
to the recommendation system. According to Wine.com
Director of Business Development Cam Fortin, “By analyzing
the data pulled from each purchase and then personalizing
the product recommendations, we can enable customers to
discover great new wines that fi t with their tastes and life-
style” (Wine.com, 2012).
The new system allows wine.com to deliver several differ-
ent types of recommendations:
• Customers With Similar Interests Also Viewed. . .
• Customer Lists Including This Wine. . .
• Customers Who Bought This Item Also Bought. . .
• Customers Who Viewed This Item Also Viewed. . .
• Top Sellers Of This Varietal/Region/Price Range
• Other products (similar to the one being viewed)
Recommendations appear on search results pages,
homepages, product detail pages, and on the site’s Gift Center
page. In addition to this automated recommender system,
wine.com sales representatives sometimes appear in chat
windows offering to assist customers with making a product
selection.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 217 11/8/14 9:11 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
218 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
When Wine.com launched its personalized recommenda-
tion engine in 2009, the company did not have to wait long to
see impressive results (marketingsherpa.com, 2009):
• Unit sales and revenue on gift baskets increased.
• Sales from recommendations increased to 10 percent of
the company’s total volume.
• Orders that included products from recommendations
had a value that was 15 percent higher than the site’s
overall average.
• Conversions, or sales resulting from recommendations,
were 52 percent higher than the site’s overall average.
Since the initial launch of its recommendation system,
Wine.com has continued to work with RichRelvance to
improve and expand system capabilities as well as imple-
menting other customer-centric features on its site. Today,
Wine.com represents a good example of how online retailers
can utilize a wide variety of technological features to over-
come challenges and provide a personalized and positive
shopping experience that inspires customer loyalty and
growth for the company.
Sources: Compiled from Bensinger (2012), wine.com (2012),
marketingsherpa.com (2009), dmnews.com (2009).
Questions
1. Based on the information in this case, would you catego-
rize the Wine.com recommendation system as content
fi ltering, collaborative fi ltering, or hybrid?
2. Why does Wine.com have to work harder to succeed
than other online retailers?
3. Visit the Wine.com website. Identify website features the
company has created to enhance the consumer’s shop-
ping experience.
4. Why do you think the recommendations provided by the
new recommendation system are likely to have a greater
infl uence on consumer behavior than the company’s
earlier attempt to make recommendations?
5. What impact has the new recommendation system had
on Wine.com’s business performance?
CASE 6.3
Video Case: Power Searching with Google
This video case is a bit different from what you have seen in
other chapters. Google has created two easy-to-follow video
courses designed to teach you how to use search engines
more effectively: Power Searching and Advanced Power
Searching. Each course contains a series of videos that you
can view at your own pace. Following each video, you are
shown a set of activities and small quizzes that you can use
to test your knowledge. Start with the Power Searching
course. Once you have mastered the basic skills discussed
in that course, move on to the Advanced Power Searching
course.
Visit Google’s Search Education Page for Power Search-
ing. Go to powersearchingwithgoogle.com. On this page,
you will see links for the two self-guided courses: Power
Searching and Advanced Power Searching. Select the Power
Searching link, and begin viewing the course videos. After
each video, do the related activities and test your knowledge
with any online quizzes or tests that are provided. After you
have completed the Power Searching course, go back and
take the Advanced Power Searching course.
While it may take several days to complete both courses,
we encourage you to do so. The time you invest in learning
these power search techniques will pay off next time you
need to use a search engine for a class or work-related
research project.
Question
1. Describe two or three search techniques you learned from
these tutorial videos that you think will be particularly
helpful.
Adomavicius, G. & T. Alexander. “Toward the Next Generation
of Recommender Systems: A Survey of the State-of-the-Art
and Possible Extensions.” IEEE Transactions on Knowledge
and Data Engineering 17, no. 6, 2005, 734–749.
Andrews, W. & H. Koehler-Kruener. “Magic Quadrant for
Enterprise Search.” gartner.com, July 16, 2014.
Anthony, S. “Microsoft Now Has One Million Servers—
Less than Google, But More than Amazon, Says Ballmer.”
extremetech.com, July 19, 2013.
Arnesen, M. “Olympic-sized Traffi c Spikes for Misty May-
Treanor Sunglasses or, the Online Effect of Offl ine Wins.”
SwellPath.com, August 1, 2012.
Bensinger, G. “Wine: The Web’s Final Frontier.” Wall Street
Journal, October 26, 2012.
Bock, G. W., R. W. Zmud, Y. G. Kim, & J. N. Lee. “Behavioral
Intention Formation in Knowledge Sharing: Examining the
Roles of Extrinsic Motivators, Social-Psychological Forces,
and Organizational Climate.” Management Information
Systems Quarterly 29, no. 1, March 30, 2007, 87–111.
Brightplanet.com. “Structured vs. Unstructured Data.” June 28,
2012.
Brown, C. “43 Increasingly Precise Netfl ix Custom Genre
Recommendations.” TheAwl.com, March 16, 2012.
References
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 218 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
References 219
Brown, M. “5 Questions About Semantic SEO.” The Moz Blog
(moz.com), June 25, 2013.
Brown, J. S. & P. Duguid. The Social Life of Information.
Cambridge, MA: Harvard Business School Press, 2000.
Burke, R. “Hybrid Recommender Systems.” In Brusilovsky, P.,
A. Kobsa, & W. Nejdl (eds.), The Adaptive Web, pp. 377–408.
Heidelberg: Springer-Verlag Berlin, 2007.
Cisco. “Cisco Visual Networking Index: Global Mobile Data
Traffi c Forecast Update 2013–2018.” February 5, 2014.
Delgado, J., L. Renaud, & V. Krishnamurthy. “The New Face of
Enterprise Search: Bridging Structured and Unstructured In-
formation.” Information Management Journal 39, no. 6, 2005,
40–46. Business Source Premier. Web. February 28, 2014.
DiSilvestro, A. “The Difference Between Semantic Search and
Semantic Web.” Search Engine Journal, July 10, 2013.
dmnews.com. “DMNews Chats with Amy Kennedy, VP of Mar-
keting at Wine.com.” Direct Marketing News, October 26, 2009.
Dover, D. & E. Dafforn. Search Engine Optimization (SEO)
Secrets. Indianapolis, IN: John Wiley & Sons, 2011.
Downhill, D. & J. Peggie. “SEO: The Secret Weapon in the
E-Commerce Wars.” Sempo.org, 2005.
Feldman, S. & C. Sherman. “The High Cost of Not Finding
Information.” White paper, IDC, June 2001.
Gaikar, V. “Effective Backlink Strategies for SEO.”
tricksmachine.com, October 20, 2012.
Gallagher, S. “The Great Disk Drive in the Sky: How Web Giants
Store Big—and We Mean Big—Data.” Arstechnica.com,
January 26, 2012.
Glanz, J. “The Cloud Factories: Power, Pollution and the
Internet.” The New York Times, September 22, 2012.
Glanz, J. “Google Details, and Defends, Its Use of Electricity.”
The New York Times, September 8, 2011.
Glaser, W., T. Westergren, J. Stearns, & J. Kraft. “Music Genome
Project US Patent: No. 7,003,515.” Filed May 16, 2002; issued
February 21, 2006.
Goldman, L. “Nike’s Superstar Endorsers.” Forbes.com, Janu-
ary 24, 2008.
Google.com. “Algorithms.” Google.com, accessed March 24, 2014.
Google.com. “Custom Search: Overview.” September 26, 2013.
Google.com. “Enterprise Findability Without the Complexity.”
2008.
Grehan, M. “How Search Engines Work.” Excerpted from
Search Engine Marketing: The Essential Best Practice Guide,
New York: Incisive Media, 2002.
Grifantini, K. “What It Takes to Power Google.” MIT Technol-
ogy Review, September 9, 2011.
Grimes, S. “Breakthrough Analysis: Two Nine Types of
Semantic Search.” InformationWeek.com, January 1, 2010.
Hatala, J. & J. G. Lutta. “Managing Information Sharing Within
an Organizational Setting: A Social Network Perspective.”
Performance Improvement Quarterly 21, no. 4, 2009, 5–33.
ERIC. Web. February 28, 2014.
Hendler, J. & T. Berners-Lee. “From the Semantic Web to
Social Machines: A Research Challenge for AI on the World
Wide Web.” Artifi cial Intelligence 174, 2010.
Jacobson, J. “Google: 129 Million Different Books Have Been
Published.” PCWorld.com, August 6, 2010.
Jansen, B. J. & T. Mullen. “Sponsored Search: An Overview of
the Concept, History, and Technology.” International Journal
of Electronic Business 6, no. 2, 2008, 114–131.
Kahn, K. “Structuring the Unstructured: Why Big Data Is
Suddenly Interested in Enterprise Search.” cmswire.com,
December 6, 2012.
Linden, G. “YouTube Uses Amazon’s Recommendation Algo-
rithm.” glinden.blogspot.com, February 1, 2011.
Linden, G., B. Smith, & J. York. “Amazon.com Recommenda-
tions: Item-to-Item Collaborative Filtering.” IEEE Internet
Computing, 7, no. 1, January–February 2003, 76–80.
Madrigal, A. “How Netfl ix Reverse Engineered Hollywood.”
The Atlantic, January 2, 2014.
marketingsherpa.com. “Revamped Recommendations Lift
Order Value 15%: 5 Steps to More Relevant Suggestions.”
November 18, 2009.
Martin, J. “How to Choose an Enterprise Search Solution.”
computerworkduk.com, February 8, 2012.
Miller, R. “Google Has Spent $21 Billion on Data Centers.”
Datacenterknowledge.com, September 17, 2013.
Mitra, S. “Web 3.0 (4C P VS).” Sramanamitra.com,
February 14, 2007.
Newman, J. “6 Things You’d Never Guess About Google’s
Energy Use.” Techland.time.com September 9, 2011.
Nikeinc.com. “History and Heritage.” 2014.
Nikeinc.com. “Nike, Inc. Reports Fiscal 2013 Fourth Quarter
and Full Year Results.” Press release, June 27, 2013.
Oak, M. “How Does a Search Engine Work?” buzzle.com, June
5, 2008.
oracle.com. “Oracle Secure Enterprise Search 11g R1.” July 2011.
Osher, M. “Finding Copyright Infringements of Your Artwork
on the Internet.” MarianOsher.com, February 9, 2014.
Pick, T. “How Much of Your Traffi c ‘Should’ Come from
Search?” SocialMediaToday.com, July 3, 2012.
Prnewswire.com. “Growth of Big Data in Businesses Intensifi es
Global Demand for Enterprise Search Solutions, Finds Frost &
Sullivan.” January 24, 2013.
Reinhardt, A. “Steve Jobs on Apple’s Resurgence: Not a One
Man Show”, Business Week, May 12, 1998.
Safran, N. “310 Million Visits: Nearly Half of All Web Site
Traffi c Comes From Natural Search [Data].” Conductor.com,
June 25, 2013.
Schachinger, K. “10 Website Quality Indicators That Can Sink
Your SEO Battleship.” SearchEngineWatch.com, November
29, 2012.
Schneider, D. “Under the Hood at Google and Facebook.”
spectrum.ieee.org, May 31, 2011.
Simon, N. “Barriers to an Information Sharing Culture.” Com-
petitive Intelligence Magazine 1, no. 3, October–December
1998.
Small, C. T. & A. P. Sage. “Knowledge Management and
Knowledge Sharing: A Review.” Information Knowledge
Systems Management 5, no. 3, 2006, 153–169.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 219 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
220 Chapter 6 Attracting Buyers with Search, Semantic, and Recommendation Technology
Smartlogic.com. “Enterprise Search.” 2012.
Smith, N. “To Build Your Business, Smash Your Silos.”
Fastcompany.com, June 5, 2012.
Solihin, N. “Search Engine Optimization: A Survey of Current
Best Practices.” Garden Valley State University Technical
Library, Paper 151, 2013.
Sterling, G. “Mobile Now 28 Percent of Total Web Traffi c—
Report.” Marketingland.com, November 6, 2013.
SwellPath.com. “SEO Case Study: How SwellPath Grew Nike
Golf’s Organic Traffi c by 250% .” 2012.
ThinkwithGoogle.com. “Mobile In-Store Research: How In-store
Shoppers Are Using Mobile Devices.” Google Shopper
Marketing Council and M/A/R/C Research. April 2013.
Thomas, V. “Six Reasons to Break Out of Your Organization’s
Silos.” mangoapps.com, September 24, 2013.
Tiroshi, A., T. Kufl ik, J. Kay, & B. Kummerfeld. “Recommender
Systems and the Social Web.” In Proceedings of the Inter-
national Workshop on Augmenting User Models with Real
World Experiences to Enhance Personalization and Adapta-
tion (AUM), Girona, Spain, July 15, 2011. Ardissono, L., and
Kufl ik, T. (Eds.), Springer-Verlag Berlin, Heidelberg, 2012.
Van Boskirk, S. “U.S. Interactive Marketing Forecast,
2011–2016.” Forester Research. August 24, 2011.
Van Zelst, P. “What Is the Average Percentage of Traffi c
from Search Engines That a Website Receives?” Moz.com,
October 18, 2013.
Venkatraman, A. “Global Census Shows Data Centre Power
Demand Grew 63% in 2012.” Computerweekly.com, October
8, 2012.
Walker, M. “Data Silos Obstruct Quest for Competitive
Advantage.” datasciencecentral.com, February 11, 2014.
Ward, E. & G. French. “Ultimate Guide to Link Building.”
Irvine, California: Entrepreneur Press, 2013.
Willcocks, R. “E-commerce Marketing: Where Your Website
Traffi c Will Come From & How.” ScreenPages.com, 2013.
wine.com. “Wine.com Launches Advanced Personalized
Recommendations to Enhance Shopping Experience.”
pr.wine.com, May 16, 2012.
Zreikat, L. “Effective Link Building Strategies.” laithzreikat.com,
April 5, 2013.
c06AttractingBuyerswithSearch,Semantic,andRecommendationTechnology.indd Page 220 11/7/14 9:42 AM f-w-204a /208/WB01490/9781118897782/ch06/text_s
Chapter Snapshot
Everyone is talking about social media. Chances are you
and your friends connect on social networking services or
other forms of social media frequently. Every day, people
discover new ways to share things with their network of
friends through messaging, photographs, videos, and blogs.
The digital-savvy connected generation or millenials—
teens and those in their early twenties—“get” social media,
but might not be able to accurately define it or how compa-
nies use social technology to influence brand attitudes and
consumer behavior. After you venture past the big brand
names—Facebook, Twitter, YouTube, and LinkedIn—
awareness of social media tools drops off quickly. Most
social media use among Millennials is for recreational or
entertainment purposes. There is little understanding of
Social Networking,
Engagement, and
Social Metrics7
Chapter
1. Understand the key technologies that made Web 2.0 pos-
sible, and appreciate the opportunities and challenges
that social media represents for business organizations.
2. Describe the features and capabilities of large social
networking services.
3. Explain how blogs and microblogs facilitate communication
on a global scale.
4. Describe how mashups, RSS technology, and monitoring
tools are valuable to business organizations and indi-
vidual users.
5. Describe how organizations and groups make use of
new Web 2.0 collaboration tools and services.
Learning Outcomes
221
Chapter Snapshot
Case 7.1 Opening Case: The Connected
Generation Influences Banking Strategy
7.1 Web 2.0—The Social Web
7.2 Social Networking Services and
Communities
7.3 Engaging Consumers with Blogs and
Microblogs
7.4 Mashups, Social Metrics, and Monitoring
Tools
7.5 Knowledge Sharing in the Social Workplace
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 7.2 Business Case: Social Customer Service
Case 7.3 Video Case: Viral Marketing: Will It
Blend?
References
c07SocialNetworkingEngagementandSocialMetrics.indd Page 221 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
how social media can be used for marketing, recruiting,
research, collaboration on projects, or personal branding.
Facebook has caught the attention of business orga-
nizations because the number of people who use the
site is huge (and continues to grow!). Businesses are
also exploring promotional opportunities on sites like
Twitter, Pinterest, Tumblr, and YouTube. Companies
get 24/7 advertising, live interaction with customers and
prospects, and targeted ads. Organizations are work-
ing feverishly to prompt consumers to engage—to like,
tweet, comment, and share their brand experiences with
others. And they are spending a lot of time doing just
that. According to media consulting firm BIA/Kelsey,
companies will spend $8 billion promoting goods and
services through social media by 2015.
In this chapter, you will learn what makes social
media social. You will also learn about social media
applications that have both personal and professional
uses, and you will learn how business organizations make
use of social media to gain competitive advantages in the
marketplace.
222
CASE 7.1 OPENING CASE
The Connected Generation Influences Banking Strategy
THREE KEY
OBSERVATIONS
1. Banks, even the biggest ones, need to think in terms of the consumer because
social media has given them a powerful voice.
2. The two most effective mechanisms for banks dealing with connected cus-
tomers is to provide great service and to listen to them when they are not
happy. The process can be brutal because it demands that banks be transpar-
ent. Bad surprises and “hidden fees” will be exposed in negative tweets and
posts.
3. Unless you honestly engage customers and get rid of outdated processes that
harm customer service, you risk negatively impacting your brand image or rev-
enues.
BACKGROUND ON THE
BANKING INDUSTRY
During the 2010s, the banking industry worldwide was in serious trouble. In the
United States, mortgage foreclosures, a soft economy, high unemployment, and
distrust of large corporations stirred by Occupy Wall Street protests against “big
money” were just some of the problems facing retail banks.
BIG BANKS FACING
CUSTOMER DISTRUST
AND PROTEST
In late 2011 big retail banks were losing huge numbers of customers to credit unions
(CU) and small community banks. According to an October 2011 survey by Intuit
Financial Services, more than 36 percent of long-time banking customers said they
had already moved or planned to move their accounts to a CU or other financial
institution largely because of the high checking account and debit card fees their
banks had imposed.
The seriousness of the situation led to an event called Bank Transfer Day, a
Facebook-organized protest against “ridiculous fees and poor customer service”
originally aimed at Bank of America (BoA), but expanded to include large banks in
general. It is an example of a groundswell-organized group that came into existence
via the shared opinions of a large number of people on social media.
People were urged to close accounts at multinational banks and encouraged
to “move your money” to a neighborhood bank or CU by November 5, 2011.
Even though BoA reversed its initial fees after mass outrage, the response was
c07SocialNetworkingEngagementandSocialMetrics.indd Page 222 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
CASE 7.1 Opening Case 223
ADAPTING TO
CUSTOMERS AND
THE POWER OF
SOCIAL MEDIA
Consumers today have a voice that can reward organizations that listen to them,
and punish those that do not. Social media can provide that powerful voice. “Social
media is rewriting the rules and increasing the speed with which banks have to
respond,” says Mark Schwanhausser, a senior analyst for Javelin Strategy and
Research (Quittner, 2011). Troubled banks (those that had angered customers)
needed a turnaround strategy to restore customers’ trust and satisfaction, while
also holding down costs and complying with many regulations. Citigroup is a large,
global banking and financial services enterprise (see Figure 7.1). The strategies
employed by its Citibank division are a good example of how some banks have
chosen to respond to new consumer needs.
ACTION STEP:
CITIBANK RESPONDS
TO THE CONNECTED
GENERATION WITH A
SOCIAL STRATEGY
Citibank’s turnaround strategies involve using social outreach to better solve cus-
tomer issues in real time, engage them for marketing purposes, and monitor online
comments to know what to fix. Citi is reaching out to tech-savvy customers, dubbed
the Connected Generation, or Gen C, using YouTube, Facebook, and other social
platforms. Gen C typically offers the most long-term value to big banks, which
make investments in social networks worthwhile. Citi’s ultimate goal is to attract
Gen C customers who remain loyal by building their trust through increased inter-
activity and involvement.
Citi worked extensively with three companies to support its social media strat-
egy: CoTweet Inc. (now part of salesforce.com), Hearsay Social, and Socialware,
Inc. On August 16, 2011, Citibank used the front page of the Wall Street Journal to
promote its Facebook page. On the Facebook site for Citibank US (facebook.com/
citibank), visitors were prompted to hit “Like” to learn how to get special access to
Beyonce tickets. The payoff was this: By midnight, Citi had acquired an additional
2,000 fans or likes.
Sources: Compiled from Fiorenza (2011), Quittner (2011), Skinner (2011), White (2011).
too late. In less than two months, over 650,000 customers had opened accounts
at nonprofit CUs in the U.S., taking away an estimated $4.5 billion from big
banks.
Figure 7.1 Citigroup, Inc.
overview.
Global corporation involved in
retail, corporate, and
investment banking and credit
card services.
Brand
Communicates with customers
and investors via social media
channels while maintaining
compliance with industry
regulations.
Business Results
Citigroup is a U.S. corporation
serving markets around the
world.
Global Reach
Citigroup, Inc.
Customer engagement, investor
relations and communications,
customer service, employee
collaboration.
Social Media Use
c07SocialNetworkingEngagementandSocialMetrics.indd Page 223 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
224 Chapter 7 Social Networking, Engagement, and Social Metrics
TABLE 7.1 Opening Case Overview
Company Citigroup, Inc.
Location Headquartered in Manhattan, New York City, Citigroup is a publicly held U.S. fi rm
with customers and markets around the world.
Industries Citigroup is a banking and fi nancial services fi rm that offers a wide range of products
and services including retail, corporate, and investment banking; credit cards; global
wealth management; fi nancial analysis; and private equity services.
Business challenges Federal regulations place severe limits and substantial disclosure requirements
on communications with customers. Banks have traditionally responded to these
regulations by carefully screening all promotional messages (i.e., ads, direct mail,
brochures, etc.) for regulatory compliance before distribution to the marketplace.
The emergence of social media as a communications channel represents signifi cant
challenges because of the real time, individual, and public nature of “conversations”
on social media. Banks do not have the ability to manage social media communica-
tions to ensure that their employees will comply with all regulations in each and
every interaction that takes place.
Technology solution Citigroup has created a presence on major social media sites—Facebook, Twitter,
YouTube—and added a blog to its website (new.citi.com).
Hired Frank Eliason, who pioneered social customer service at Comcast, to oversee
its social media strategy.
Employees who interact with customers via social media are trained to express
concern for customers’ issues, but move conversations to more secure channels
(i.e., direct message or phone) to protect customer privacy.
Citigroup uses Facebook and YouTube to provide timely and accurate information to
investors.
The company created a private social network for homeowners called homeowner-
support.com. This online community for homeowners offers homeowner support
forums, information about mortgage options, a homeowner support blog, and links
for talking to mortgage counselors.
Questions
1. Technology can greatly infl uence businesses. How has social media
changed retail banking?
2. Imagine having to live the next 24 hours without your smartphone,
tablet, or any other mobile computing or communication device—and
without any access to social media, texting, or tweets. What would be
your biggest challenges? List two changes you would have to make to
survive.
3. Think over what you expect from companies, such as airlines, banks,
voice and data service providers, and online retailers. Select two com-
panies. How have your “customer service” expectations for each of
these companies changed in the past three years?
4. Have you used social media to let others know of great or bad service
or product problems? Explain what you did or did not do, and why.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 224 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.1 Web 2.0—The Social Web 225
In your lifetime, there have been dramatic changes in the way people use the
Internet. In the early 1990s, many people did not have regular access to the Internet,
and those who did typically “dialed up” their network from a home or office tele-
phone. Dial-up access meant long waits as content from webpages “downloaded”
onto the screen. Some users joked that the letters “www” in a Web address stood
for “world wide wait.” E-mail was the primary mechanism for social interaction.
Online communities were often like public bulletin boards where all members of
the community could read the messages that others posted. Websites were static,
essentially online billboards for the businesses that created them. Online purchas-
ing (e-commerce) was rare and risky because there were few safeguards in place to
protect your credit card information. But all that has changed.
7.1 Web 2.0—The Social Web
THE CONSTANTLY
CHANGING WEB
Today, most of us access the Internet using wired or wireless broadband technol-
ogy, consuming bandwidth that was unheard of a few years ago. We expect to be
able to stream audio and video files, and watch feature-length films over wireless
connections and mobile devices. We surf webpages that constantly change their
appearance in response to how we interact with them. While e-mail is still a com-
mon form of communication in business, young people tend to view it with disdain
in favor of tweets, texts, or social networking sites like Facebook. We keep track of
our world, interests, and hobbies by reading blogs and online newspapers, and use a
variety of tools and services for sharing them with others. In addition to consuming
content, we add comments or reviews and signal our appreciation for the content
by clicking a “Like” or “ 1” button.
Increasingly, Internet users are becoming content creators—they write their
own blogs, post videos on YouTube, and share pictures using sites like Flickr or
Photobucket. E-commerce continues to grow and evolve, in some cases changing
entire industries. E-books are now more popular than print books on sites like
Amazon. More people purchase music from sites like iTunes or use streaming-music
sites like Pandora or Spotify than purchase music on CDs. Sites like Travelocity
and Orbitz have almost completely replaced traditional travel agencies and agents.
Many people are more likely to use sites like eBay and Craigslist to get rid of
unwanted household items instead of holding garage sales or placing classified
ads in a local paper. One of the biggest changes in online retail is the use of social
features by e-commerce sites. Most online retailers make use of customer reviews,
customer ratings, and information sharing on social networks.
While there are many exciting examples of companies that have embraced the
potential of Web 2.0 technologies (Figure 7.2) and the emerging social culture that
characterizes our modern online experience, many businesses, agencies, and indi-
viduals have been slow to understand both the challenges and opportunities created
Figure 7.2 Web 2.0 is also
referred to as the social Web. ©
s.
s.
/A
la
m
y
Web 2.0: a term used to
describe a phase of World
Wide Web evolution
characterized by dynamic
webpages, social media,
mashup applications,
broadband connectivity and
user-generated content.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 225 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
226 Chapter 7 Social Networking, Engagement, and Social Metrics
by the social Web. Smart managers are constantly evaluating how changes in social
media and related technologies affect their business and industry. Businesses and
business professionals must devote time and resources to consistently monitoring
technological innovation and related changes in consumer behavior in order to
remain relevant, taking advantage of potential opportunities to create competitive
advantages when they arise.
INVENTION OF THE
WORLD WIDE WEB
The World Wide Web (WWW) was invented by Tim Berners-Lee and launched
in 1991. Its use outside of scientific and academic circles was uncommon until the
mid-1990s. Web access from homes was mostly via telephone lines, slow 56-kbps
(kilobits per second) dial-up modems, and paid subscription network services such
as CompuServe and America Online (AOL). Websites were primitive static designs
that served as online billboards or postcards. You can view archived websites using
the WayBackMachine at www.archive.org. During that time, e-mail was viewed as
a sophisticated communications tool that most people accessed at work or college
campuses, but not from home.
As the above description suggests, communication was primarily uni-directional.
There were no easy-to-use conduits for widespread social interaction. The average
user was the target or recipient of communications, not a creator.
WWW AS A PLATFORM
FOR SERVICES AND
SOCIAL INTERACTION
Now the Web is a platform for all kinds of activity—shopping, entertainment, news,
education, research, and business processes like logistics and electronic funds trans-
fer (EFT). Homes maintain broadband wireless networks to connect multiple users
simultaneously to the Internet from computers, tablets, video game systems, and
video-streaming devices like the Roku box. In addition to the activities listed above,
new Web technologies gave rise to websites with features and services that make it
easy for people to interact with one another. As a result, these services collectively
are referred to as social media. While the applications that are labeled as Web 2.0
may simply be an extension of earlier advances, it is the change in user behavior
that matters most to business organizations around the world. The new technolo-
gies dramatically increase the ability of people to interact with businesses and each
other, sharing and finding information, and forming relationships. This perspective
explains why Web 2.0 is often called the social Web.
Broadband: refers to wide
bandwidth technologies that
create fast, high volume
connections to the Internet
and World Wide Web.
TABLE 7.2 Web 1.0 vs. Web 2.0
Web 1.0—The Early Web Web 2.0—The Social Web
Static pages, HTML Dynamic pages, XML, and Java
Author-controlled content User-controlled content
Computers Computers, cell phones, televisions, PDAs,
game systems, car dashboards
Users view content Users create content
Individual users User communities
Marketing goal: infl uence Marketing goal: relationships
Data: single source Data: multiple sources, e.g., mashups
World Wide Web: a net-
work of documents on the
Internet, called webpages,
constructed with HTML
markup language that
supports links to other
documents and media (e.g.
graphics, video, audio, etc.).
Social media: a collection
of Web applications, based
on Web 2.0 technology and
culture, that allows people to
connect and collaborate
with others by creating and
sharing digital content.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 226 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.1 Web 2.0—The Social Web 227
EMERGENCE OF
SOCIAL APPLICATIONS,
NETWORKS, AND
SERVICES
Starting in 2000, a series of developments in the technology and business environ-
ment occurred that set the stage (infrastructure) for Web 2.0.
1. Broad bandwidth (broadband). Internet access became faster and more widely
available due to large-scale adoption of broadband technology. Website load
times shrank from a minute to instantaneous. Huge bandwidth is required to
support byte-intensive music downloads and streaming video and movie ser-
vices. Figure 7.3 shows the increase in the number of broadband connections in
people’s homes. Speed increased the overall attractiveness and accessibility of
the Internet—laying the foundation for interactivity and the social Web.
2. Sustainable business models. After the dot.com bust in the late 1990s when many
badly conceived Internet businesses failed, a new breed of business emerged.
These businesses had realistic revenue models. Companies like Amazon, Google,
eBay, and others began to demonstrate that it was possible to create e-commerce
and consumer service sites that could generate revenue and become not only
self-sustaining, but also profi table.
3. New Web programming technologies. New Web programming languages and
technologies were developed that made it possible for programmers to create
dynamic and feature-rich websites. In some cases, these new features and website
capabilities created new business opportunities, which in turn led to increased
demand for Web access. Increased Web usage then led to larger potential mar-
kets for businesses with successful revenue models. The businesses frequently
reinvested earnings into expanding their technological capabilities in an effort
to attract even more customers. This cycle of enhanced technological features
leading to greater value for the consumer/Web user and then to more people using
the Web continues today. Some of these new Web technologies are described in
more detail in Tech Note 7.1.
4. Application programming interface (API). APIs facilitate the transfer of data
from one website app to another. APIs can be either proprietary or open source.
Use of a proprietary API requires the developer to pay a fee to gain access to
data.
Fortunately, many popular APIs are open source, which means that anyone
can use them for free, although there may be other terms and conditions placed on
their use. Not surprisingly, the most popular API on the Web is the Google Maps
API, which is used by over 30 percent of the mashups on the Web today. Visit
programmableWeb.com/apis for a listing of popular APIs. The Google Maps API
allows developers to create apps where information like store locations can be dis-
played on a map that comes from Google.
Figure 7.3 The increased number of broadband at-home connections was a
critical driver of online interactivity. (Horrigan, 2009.)
0%
10%
20%
30%
40%
50%
60%
70%
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009
U.S. Internet Connection Trends
Broadband at home Dial-up at home
c07SocialNetworkingEngagementandSocialMetrics.indd Page 227 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
228 Chapter 7 Social Networking, Engagement, and Social Metrics
TECH NOTE 7.1 AJAX Technologies and APIs
AJAX technologies, or asynchronous JavaScript and XML, is a term referring to a
group of technologies and programming languages that make it possible for web-
pages to respond to users’ actions without requiring the entire page to reload. AJAX
makes it possible for Web developers to create small apps that run on a page instead
of a server. This capability makes programs run much faster, eliminating a key source
of frustration with the early Web. Another important programming development
is the application programming interface (API), which acts as a software gateway
programmers can use to pass data back and forth between two or more applica-
tions, platforms, or websites (see IT at Work 7.1). With AJAX and APIs, website pro-
grammers can import data from other sources to create new functions and features
that we have come to associate with social media applications (see the discussion of
mashups later in this chapter).
AJAX technologies include JavaScript, extendable markup language
(XML), document object model (DOM), hypertext markup language (HTML),
XMLHttpRequest, and cascading style sheets (CSS), all of which are defi ned in
Table 7.3.
TABLE 7.3 AJAX Technologies for Web 2.0
HTML: The predominant language for webpages; it is used, along with CSS, to
describe how things will appear on a webpage.
CSS: A language used to enhance the appearance of webpages written in a
markup language.
DOM: A programming API for documents. Programmers use it to manipulate
(e.g., build, add, modify, delete, etc.) HTML documents.
XML: A set of rules and guidelines for describing data that can be used by
other programming languages. It makes it possible for data to be shared across
the Web.
JavaScript: An object-oriented language used to create apps and functionality
on websites. Examples of JavaScript apps include pop-up windows, validation of
webform inputs, and images that change when a cursor passes over them.
XMLHttpRequest: A JavaScript object that serves as an API used by programs
to retrieve data or resources from a URL without requiring a page load. It plays an
important role in providing programmers with the ability to create dynamic and
interactive webpages and applications.
Sources: W3C (2010); techterms.com (2014); Hegaret, Wood, & Robie (2000);
van Kesteren et al. (2014).
c07SocialNetworkingEngagementandSocialMetrics.indd Page 228 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.1 Web 2.0—The Social Web 229
APIs also make it possible for businesses to create apps
for interacting with users. Taking advantage of Facebook’s
Social Graph API, American Express recently created the
Link, Like, Love app that allows users to link their American
Express card to their Facebook profile. This makes it possible
for American Express to deliver customized deals and offers
to users that are based on things they do on Facebook (Kim,
2011). For instance, card members who discuss vacation and
travel plans with friends on Facebook may receive special
offers for hotel and airline tickets.
Sources: Kim (2011), American Express (2011).
IT at Work 7 .1
American Express – Feeling the Love
WHY MANAGERS
SHOULD UNDERSTAND
WEB TECHNOLOGY
You might ask yourself why business managers who are not directly involved in
managing an organization’s website should be concerned about the underlying tech-
nology of Web 2.0 and social media. The answer is that these technologies deter-
mine website features and capabilities. In other words, they determine what is pos-
sible on the Web. Understanding how Web technology is evolving helps managers
identify strategic opportunities and threats as well as the ways in which a company
might develop sustainable competitive advantages in the marketplace. Therefore,
it is important to monitor the ongoing development of APIs, Web development
languages, and other technologies that affect the functioning of the Web.
APIs: For instance, APIs associated with Facebook determine the nature of apps
that can be written to interact with core Facebook features. Major changes to the
Facebook APIs are often rolled out to much fanfare because they define opportuni-
ties for developing new ways for users to create and share content on Facebook and
across the Web, as described in IT at Work 7.1.
At Facebook’s annual developer conferences in 2010 and 2011, founder Mark
Zuckerberg made announcements about changes in Facebook APIs that would
extend the social networking giant’s presence across the Web through the use of
social plug-ins, which are listed in Table 7.4. See the discussion of Open Graph in
Section 7.2.
Plug-Ins: Plug-ins are buttons or features on non-Facebook sites that interact with
Facebook in some way. For instance, CNN.com might include a Recommend but-
ton on all its news articles. When a Facebook user presses the button, a link to the
story is automatically created on the user’s Facebook page. You don’t have to be
a Web programmer to follow and understand public announcements about API
updates from Facebook, Google Maps, YouTube, Twitter, and other popular social
media platforms. Using the monitoring tools discussed later in this chapter, you can
stay informed about these changes and begin to assess how they will impact you as
an individual, website developer, or business manager.
COMMUNICATING
ON THE WEB
Collectively, social media apps have shifted the locus of control for mass commu-
nications from large organizations to one shared with individual users. Now people
as well as organizations control both the message and the medium. Instead of an
organization broadcasting a single message to a mass audience, a massive number of
conversations take place among any number of people and organizations.
No one has complete control over the message or the medium, yet everyone
can play a part. The challenge for businesses today is to change mindsets and
c07SocialNetworkingEngagementandSocialMetrics.indd Page 229 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
230 Chapter 7 Social Networking, Engagement, and Social Metrics
develop strategies that take advantage of social media. Instead of a focus on
developing sophisticated ways of getting their message heard, companies must
now develop sophisticated strategies for listening and responding to what their
consumers are saying.
Because of the relatively low cost and ease of use, social media is a power-
ful force for democratization; the network structure enables communication and
collaboration on a massive scale. Figure 7.4 shows the emergence of mass social
TABLE 7.4 Facebook Social Plug-Ins Used Across the Web
Like button
Shares pages from a website back to a user’s Facebook profi le
with a single click.
Send button
Allows users to send content from a website to their Facebook
friends.
Comments
This plug-in allows users to comment on a webpage’s content
using their Facebook profi le and shows the activity to the user’s
friends in a newsfeed.
Embedded Places content from any public Facebook post on to your website
posts or blog.
Facepile
This feature displays the profi le photos of the people who have
connected with your Facebook page or app.
Login button
Shows profi le pictures of the user’s friends who have already
signed up for your site in addition to a login button.
Source: Facebook (2014).
Figure 7.4 The emergence
and rise of mass social
media.
Network
Effects
Consumer
Control
Videos
Podcasts
Tweets
Forums
Wikis
Enterprise 2.0 Platforms
Institutional
Control
Traditional Media
Social
Consumption
Social Media
Blogosphere
Blog
Blog
Blog Blog
Blog Blog
Print
Via comments,
Inst. Msg., Feedback,
Ratings, Reviews
Radio
Movies
Media
Outlets
S
hi
ft
Observe
Pub
lish
Contribute
Television
c07SocialNetworkingEngagementandSocialMetrics.indd Page 230 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.1 Web 2.0—The Social Web 231
SOCIAL MEDIA
APPLICATIONS
AND SERVICES
Early descriptions of Web 2.0 would often identify the apps listed in Table 7.5 as
typical of social media. You will read more about each of these applications later
in the chapter.
Few apps fit neatly into these categories anymore because of feature conver-
gence. For instance, Facebook started as a social networking service, but now has
features that span almost all of the categories in Table 7.5. It is a sharing site used
by many to distribute photos. It is increasingly common for people to tag or label
photos with the names of people in the picture, making it easy to find and display
photos of individuals that have been saved in multiple locations on Facebook.
Users can maintain blogs on their Facebook page and Facebook hosts thousands
of apps that pull data from sources outside of the social network, making it a huge
mashup app.
Likewise, YouTube (see Figure 7.5) started as a sharing site, making it easy for
people to share video clips with others. However, YouTube now contains many fea-
tures that make it difficult to distinguish from a social networking service. The same
is true of Flickr, a photo-sharing site that has really become a community platform
for people interested in photography.
While some original social media apps are still present on the Web today, thou-
sands of newer apps have sprung up that continue to blur the lines of the original
social media app categories.
media. The figure compares traditional and social media and illustrates the new
tools of social media, for example, blogs and video blogs (vlogs), as being in the
consumer’s control. With traditional media, content is tightly controlled and brand
messages are “pushed” out to users, often in the form of an ad interruption. With
social media, users are frequently attracted or “pulled” to content that is interesting
to them and they have greater freedom to decide if, when, and how they want to
interact with such content.
Notice that traditional media content goes from the technology to the people,
whereas in social media, people create and control the content.
TABLE 7.5 Web 2.0 Applications
Apps Descriptions
Social networking
Online communities
services (SNSs)
Blogs Online journals
Mashups/ Web apps that pull data from various sources and display
widgets/RSS on another page to create new functionality
Social An app for tagging or labeling online content for later
bookmarking/tags retrieval
Wikis
A collaborative app that allows multiple people to create
and edit online content
Sharing sites
Websites that make it easy for users to upload and share
digital content like photos, videos, or music
Social networking service
(SNS): an online platform or
website that allows subscrib-
ers to interact and form com-
munities or networks based
on real-life relationships,
shared interests, activities
and so on.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 231 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
232 Chapter 7 Social Networking, Engagement, and Social Metrics
SOCIAL MEDIA IS MORE
THAN FACEBOOK,
YOUTUBE, AND
TWITTER
Many people think that social media is limited to a few iconic companies or brand
names: Facebook, Twitter, YouTube, and LinkedIn. While those companies have
certainly capitalized on the new technology, in fact, social media is a term describing
a range of technologies that are used across the cloud (Internet) and are, in some
way, part of most websites you use today.
While you may be familiar with using social media for recreational purposes
or communicating with friends and family, businesses use social technologies for a
wide variety of other benefits:
• Collaboration
• Communication and Engagement with Customers (Marketing)
• Image and Reputation Management (Public Relations)
• Communication and Engagement with Employees and Partners
(Management)
• Talent Acquisition and Recruiting (Human Resources)
• Research and Knowledge Management
• Productivity and Information Utilities
• Fund Raising
The following section lists some of the key elements of social media that distin-
guish it from other types of media.
Elements of Social Media: What Makes it Different?
In order to understand what makes the modern Web so much different from its ear-
lier incarnation, it is helpful to understand the differentiating features and benefits
made possible by XML, Java Script, APIs, and related technologies.
User-generated content (UGC). In contrast to traditional media–TV, radio,
and magazines—social media make it possible for users to create and share
their own content. Using various social technologies, people share photographs,
music, and video with the world. They express themselves using the written
word in stories, articles, and opinion pieces that they publish on their own web-
sites or other platforms. They rate products and write reviews.
Content control. Most of this content creation and sharing is done without
editorial review—users thus decide for themselves what they want to create
and share. Social technologies have shifted control of online content to a broad
base of users. It is users who determine what content “goes viral” or becomes
highly popular through sharing, not advertising agencies or companies with
large advertising budgets.
Figure 7.5 YouTube, a
video-sharing site, is the
third most popular site on
the Internet. ©
M
4O
S/
A
la
m
y
c07SocialNetworkingEngagementandSocialMetrics.indd Page 232 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.1 Web 2.0—The Social Web 233
Conversation. With the advent of social media a paradigm shift occurred in
marketing communications, from a broadcast (one-way) communications
model to a conversation (two-way) communications model. Dialogue takes
place in the form of one-to-one, one-to-many, and many-to-one formats. Social
media websites contain features that allow people to talk back in a variety of
ways.
Community (common values, culture). Many social media technologies ulti-
mately result in the creation of communities. Like their offline counterparts,
these online communities are made up of people who share a bond of common
interests, values, norms, and even sanctions. Some communities are highly
structured, whereas others may be more fluid and informal. As businesses learn
to communicate on Web 2.0, some will attempt to create communities made up
of consumers who have a strong interest in a particular brand. Social network-
ing services lend themselves to this type of strategy, but brand communities can
be developed around blogs, wikis, sharing sites, and other types of social media
applications.
Categorization by users (tagging). Newer Web technologies have begun to
allow users to decide for themselves how to categorize and label information
they find online. This has created the potential for powerful forms of collabora-
tion and information sharing as well as alternative forms of information search
(see the discussion of social bookmarking later in the chapter).
Real people (profiles, usernames, and the human voice vs. the corporate “we”).
Social media technologies allow people to express their individuality through
the creation of online identities. In traditional media, communication and
expression come from celebrities or corporate spokespersons. Web 2.0 provides
people with the tools to create personal brands that characterize their personal,
professional, or creative identity.
Connections (followers, friends, members, etc.). There are many ways to
establish additional levels of connection and reflect some level of a relation-
ship. You can become someone’s friend on Facebook. Follow someone on
Twitter. Subscribe to a person’s blog. Perhaps just as important, these con-
nections can be severed when one party wants to end the relationship (see
Table 7.6).
TABLE 7.6 Things That Will Get You Un-Friended on Facebook
Posting unimportant and annoying stuff—Enough with the stupid quizzes
already!
Too many religious and political posts—If we really want to know, we’ll ask,
thank you.
Posting inappropriate stuff—Porn, sexist humor, racist stuff, etc. Remember:
Your friends’ moms or kids are all part of the extended network.
You’re just too boring—You aren’t Beyonce. People don’t care that you just made
a PB&J for lunch.
Too many posts—Watch how often your friends post to Facebook and avoid
being the person who shares twice as much as most other people.
Source: Based on Sibona & Walczak (2011).
c07SocialNetworkingEngagementandSocialMetrics.indd Page 233 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
234 Chapter 7 Social Networking, Engagement, and Social Metrics
Constant updating (real time, dynamic). Unlike the static Web of the 1990s,
social technologies reflect our constantly evolving relationships, opinions,
political views, religious beliefs, and values. The social Web is a constant stream
of communications that never turns off and can sometimes be overwhelming.
Content separated from form. Data from one source can be used or exported
to other platforms. This allows users to organize and display content in ways
they find most helpful. For instance, with an RSS aggregator, users pull content
from a number of sources into a single location, making it easier to follow news
stories and blog posts from multiple sites. Someone writing about local restau-
rants can pull content from food critics, customer comments, and map location
information from a variety of sources and aggregate this information into a
single site, making it easier for users to get a complete picture of a restaurant
without having to surf around to different sites.
Equipment independence. Increasingly, people access the Web and social
media from a variety of computers and mobile devices, including laptops,
tablets, smartphones, video game systems, DVD players, and televisions. In
the near future, you might access the Web from such home appliances as your
refrigerator or even a kitchen countertop. (Check out the amazing new technol-
ogy featured on videos by Corning Glass. Go to YouTube and search for “A
Day Made of Glass” using the YouTube search engine.)
WEB 2.0 ATTITUDE As you have read, the availability of Web 2.0 applications is changing not only
how people behave, but also the way they think about things. This new way of
thinking is captured in a provocative list of 95 statements called the Cluetrain
Manifesto (Levine et al., 2000). Perhaps the fundamental principle of the Manifesto
is described by its first thesis: Markets are conversations. Other excerpts from the
Manifesto are listed in Table 7.7. Over time, successful companies will learn to
engage customers in conversations as an alternative to the unidirectional or broad-
cast method of communication. While the Cluetrain Manifesto seemed idealistic,
impractical, and revolutionary when it was first written in 2000, we are starting
to see more examples of individuals and companies finding ways of turning those
principles into action.
While most companies still struggle with the concept of conversation, Forrester
researchers Charlene Li and Josh Bernoff describe a number of companies who
recognize the power of what they call the groundswell, “a spontaneous move-
ment of people using online tools to connect, take charge of their own experience
and get what they need—information, support, ideas, products, and bargaining
TABLE 7.7 Excerpts from the Cluetrain Manifesto
Select Cluetrain Theses
• “Markets are conversations.”
• These conversations enable powerful forms of social organization and
knowledge exchange.
• People have fi gured out they obtain better information and support from one
another than from vendors. So much for corporate rhetoric about adding
value to commoditized products.
• Companies should realize their markets are often laughing. At them.
Source: Levine et al. (2000).
c07SocialNetworkingEngagementandSocialMetrics.indd Page 234 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.2 Social Networking Services and Communities 235
power—from each other” (2008). Li and Bernoff identify five key strategic priori-
ties that companies should focus on to leverage the groundswell:
1. Listening—Monitoring what your customers say on social media. By listening to
what customers say to your company and what they say to each other, organiza-
tions can gain valuable insights.
2. Talking—While listening is perhaps the most important priority, businesses still
need to develop their message and communicate to their target audience(s).
3. Energizing—Using a variety of tactics, companies can create and maintain rela-
tionships with brand advocates who will support and promote the brand to their
friends and followers on the Web. Energizing brand advocates is analogous to
generating word-of-mouth communications in traditional marketing.
4. Supporting—Using social media to deliver effective and convenient customer
service is one way to support your customers. Some businesses create communi-
ties where customers can help each other with product-related issues and ques-
tions.
5. Embracing—Many companies are utilizing social media to solicit new product
ideas and suggestions for improving customer satisfaction from current custom-
ers. Managers are often surprised to learn that customers have great ideas for
how the company can do better.
These groundswell strategies identify the most significant activities that companies
should focus on with regard to using social media.
In the rest of this chapter, we describe a variety of social media apps that are
growing in popularity. We highlight some of the most attractive features, and encour-
age you to explore them firsthand. Most are free, so they are easy to try. You are also
encouraged to stay on top of new trends and applications by following online sources
like Mashable, Social Media Today, and Social Media Examiner. The only way to
truly understand the social media environment is to immerse yourself in it, experienc-
ing it directly. We think it is both fascinating and fun, and hope you will too.
Questions
1. How has Web 2.0 changed the behavior of Internet users?
2. What are the basic tools or applications that characterize Web 2.0?
3. Why is Web 2.0 referred to as the social Web?
4. What are some of the benefi ts or advantages that Web developers gain
from using AJAX technologies?
5. What are some of the most important messages for business organiza-
tions in the Cluetrain Manifesto?
6. What is feature convergence? Give some examples of this trend with
regard to social media apps.
Online or virtual communities parallel typical physical communities, such as neigh-
borhoods, clubs, and associations, except that they are not bound by political or
geographic boundaries. These communities offer several ways for members to inter-
act, collaborate, and trade. Virtual or online communities have been around for a
long time and pre-date the World Wide Web. The Usenet provided the initial plat-
form for online communities by making it possible for users to exchange messages
on various topics in public newsgroups, which are similar in many ways to online
bulletin board systems. While the Usenet is technically not part of the Internet,
7.2 Social Networking Services and Communities
c07SocialNetworkingEngagementandSocialMetrics.indd Page 235 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
236 Chapter 7 Social Networking, Engagement, and Social Metrics
much of its content can be accessed from Internet sites like Google Groups or
subscription-based news server services like Giganews and Astraweb. (For
additional information about online communities during the early phases of the
Internet, see Leiner et al., 2009.)
Online communities can take a number of forms. For instance, some people
view the blogosphere (all the blogs on the Web) as a community. YouTube is a
community of people who post, view, and comment on videos. Epinions is a com-
munity of people who share their experiences and opinions about products and
companies. Flickr, Photobucket, Webshots, and similar sites are photo-sharing
communities. Wikipedia is a community of people who create, edit, and maintain an
online knowledge base. Twitter is a community, or perhaps several communities, of
people who frequently share short, 140-character messages with one another about
a variety of topics. Obviously, social networking sites like Facebook and LinkedIn
are communities and have seen tremendous growth in recent years. The mass adop-
tion of social networking websites points to an evolution in human social interaction
(Weaver & Morrison, 2008).
Social network analysis (SNA) is the mapping and measuring of relationships
and flows between people, groups, organizations, computers, or other information-
or knowledge-processing entities. The nodes in the network are the people and
the groups, whereas the links show relationships or flows between the nodes. SNA
provides both a visual and a mathematical analysis of relationships. In its corporate
communications, Facebook has begun using the term social graph to refer to the
global social network reflecting how we are all connected to one another through
relationships (Figure 7.6). Facebook users can access a social graph application that
visually represents the connections among all the people in their network. Berners-
Lee (2007) extended this concept even further when he coined the term giant global
graph. This concept is intended to illustrate the connections between people and/
or documents and pages online. Connecting all points on the Giant Global Graph
is the ultimate goal for creators of the semantic Web, which you read about in
Chapter 6.
Online communities have received increasing attention from the business com-
munity. Online communities can be used as a platform for:
• Selling goods and services
• Promoting products to prospective customers; for example, advertising
• Prospecting for customers
• Building relationships with customers and prospective customers
• Identifying customer perceptions by “listening” to conversations
Figure 7.6 A social graph
uses nodes and ties to
illustrate relationships
between individuals and
groups of people. ©
To
m
D
e
Sp
ie
g
el
ae
re
/A
la
m
y
Semantic Web: An extension
of the World Wide Web that
utilizes a variety of conven-
tions and technologies that
allow machines to under-
stand the meaning of Web
content.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 236 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.2 Social Networking Services and Communities 237
• Soliciting ideas for new products and services from customers
• Providing support services to customers by answering questions, providing
information, and so on
• Encouraging customers to share their positive perceptions with others; for
example, via word of mouth
• Gathering information about competitors and marketplace perceptions of
competitors
• Identifying and interacting with prospective suppliers, partners, and collabo-
rators (See the discussion of Enterprise 2.0 in the next section.)
LEVERAGING THE
POWER OF THE CROWD
In recent years, several companies have created online communities for the purpose
of identifying market opportunities through crowdsourcing. Crowdsourcing is a model
of problem solving and idea generation that marshals the collective talents of a large
group of people. Using Web 2.0 tools, companies solicit, refine, and evaluate ideas for
new products and services based on input from their customers. Business organizations
that have implemented this approach include Fiat, Sara Lee, BMW, Kraft, Procter &
Gamble, and Starbucks. See Openinnovators.net for a list of other examples.
CROWDFUNDING More recently, businesses and entrepreneurs have turned to the crowdsourcing
model to raise money for business start-ups or projects. A number of crowdfunding
sites have become popular in recent years, including Kickstarter, GoFundMe, and
Indiegogo (see crowdfunding.com). The crowdfunding sites are each governed by
different rules that establish the kinds of projects or organizations that can use them
to raise money as well as the types of crowdfunding allowed on the site (Table 7.8).
TABLE 7.8 Types of Crowdfunding
Donations
Often used by charities and political campaigns, contributors
do not receive anything tangible in exchange for their donation,
just the knowledge that they are supporting a cause they like or
believe in. (In some cases, contributors may be eligible for a tax
write-off.)
Rewards
Contributors receive some kind of “perk” or thank-you gift.
Often it is something related to the project. For instance, people
who contribute to a fi lmmaker’s project may receive a copy of
the fi nished work on DVD.
Credit Contributors essentially make microloans to fund projects and
expect to be repaid with interest.
Equity
With this approach, contributors make “micro-investments” and
receive a proportional ownership stake in the company. It is
likely that regulatory agencies that oversee equities markets in
the U.S. and other countries will establish rules governing or
even restricting this type of crowdfunding.
Royalties
Contributors receive a percentage of the sales revenue generated
by a project. For instance, people who contribute to a musician’s
recording project might receive royalties from the sale of the
artist’s music.
Sources: Outlaw (2013), Wikipedia (2014).
c07SocialNetworkingEngagementandSocialMetrics.indd Page 237 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
238 Chapter 7 Social Networking, Engagement, and Social Metrics
The crowdfunding sites typically collect a percentage of the money raised. The fee
can vary significantly depending on the site and the crowdfunding model used, so it
is important to read the terms of service carefully before selecting a particular site
to raise money on.
Figure 7.7 Average time
spent per month on social
networking services,
2008–2011. (Nielsen, 2010,
comScore, 2011.)
07:12:00
06:00:00
03:36:00
04:48:00
02:24:00
01:12:00
00:00:00
2008
H
o
u
rs
2009
Time Spent on Social Networking Sites HH:MM:SS
2010 2011
02:13:24
03:32:49
06:00:25
06:54:00
Figure 7.8 LinkedIn is used
as a primary recruiting tool
by a majority of companies.
SOCIAL NETWORKING
SERVICES
Social networking services (SNSs) represent a special type of virtual community
and are now the dominant form of online community. With social networking, indi-
vidual users maintain an identity through their profile and can be selective about
which members of the larger community they choose to interact with. Over time,
users build their network by adding contacts or friends. On some social network
platforms, organizations create an identity by establishing discussion forums, group
pages, or some other presence. Social networking has increased substantially in
recent years. Research company comScore reported that people in the U.S. spent
an average of 6 hours and 54 minutes a month on social networking sites in 2011,
up from only 2 hours and 13 minutes in 2008. Figure 7.7 illustrates the growth rate
of time spent on social networking sites.
©
A
le
x
Se
g
re
/A
la
m
y
The number of social networking services has grown tremendously in recent
years. It is expected that the social networking sector will segment and consolidate
in the future just like other industries. Among the general-purpose SNS platforms,
Facebook is the clear leader with over 1.2 billion active users (Statista, 2014).
Facebook is the second most visited site on the Internet after Google, according
to alexa.com (2014), and it has publicly stated its intention to become number one
(Vogelstein, 2009, Harvey, 2010). If Facebook were a country, it would be the sec-
ond or third largest in the world. In the first quarter of 2014, Facebook’s active user
population appears to have grown slightly larger than the population of India, the
Terms of Service (TOS)
Agreement: a formal listing
of the policies, liability limits,
fees and user rights and respon-
sibilities associated with using a
particular service. Users are typi-
cally required to acknowledge
they have read, understand and
agree to the TOS before they
are allowed to use the service.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 238 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.2 Social Networking Services and Communities 239
second largest country in the world behind China. For an up-to-date list of popular
social networking sites around the world, see en.wikipedia.org/wiki/List_of_social_
networking_sites.
While SNS sites share some common features, they are not all alike. As the cat-
egory matures, sites are differentiating themselves in a variety of ways. For instance,
the SNS services in Wikipedia’s list differ in terms of:
• Target age group
• Geographic location of users
• Language
• Area of interest; for example, music, photography, gaming, travel
• Social vs. professional networking (see IT at Work 7.2)
• Interface; for example, profile page, microblog, virtual world, emphasis on
graphic vs. text content
Susan Heathfield, a human resources (HR) expert at About.com,
maintains that it is no longer sufficient to post job openings on
monster.com, Careerbuilder.com, and Craigslist.com. Job
postings on these large sites often generate hundreds of
applications from unqualified candidates. This can be over-
whelming for recruiters and very inefficient. Instead, many
have turned to professional networking sites like LinkedIn. In
a blog post, Heathfield identified a number of specific ways
that businesses can use LinkedIn to increase the effective-
ness of their recruiting:
• Identify potential candidates among your existing net-
work of professionals.
• Ask your network to identify or recommend candidates
for a position.
• Evaluate potential employees based on references and
referrals from your existing network.
• Actively search for candidates among LinkedIn users
using keywords or qualifications from their profiles.
• Ask current employees to search among their LinkedIn
networks for potential candidates.
• For a fee, you can post job openings on LinkedIn.
• Request introductions to potential candidates through
your existing network of professionals.
• Use Inmail (the internal LinkedIn e-mail system) to contact
potentially qualified individuals.
It is clear that recruiters have come to embrace LinkedIn as
an effective and cost-efficient way of generating qualified
candidates. As LinkedIn’s global presence grows, this will
provide an important benefit to companies who need to fill
positions internationally.
Source: Heathfield (2012).
Questions
1. Why have monster.com, Careerbuilder.com, and Craigslist.
com lost their effectiveness?
2. Why have HR departments turned to professional net-
working sites like LinkedIn?
3. Why is it so essential for career-minded workers to build
a professional social network? What can this network do
for you?
IT at Work 7 .2
Recruiters Use Professional Networking Sites
FACEBOOK
DOMINATES SOCIAL
NETWORKING
Facebook is the largest social networking service the world. (The next largest
social network is China’s Qzone with 848 million users.) Facebook was launched
in 2004 by a former Harvard student, Mark Zuckerberg. Photos, groups, events,
marketplace, posted items, and notes are the basic applications already installed in
c07SocialNetworkingEngagementandSocialMetrics.indd Page 239 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
240 Chapter 7 Social Networking, Engagement, and Social Metrics
Facebook. Apart from these basic applications, users can develop their own apps or
add any of the millions of Facebook apps that have been developed by other users.
Increasingly, people are accessing Facebook (and other social media sites) using
mobile devices instead of computers (Figure 7.9).
Facebook was responsible for originating a unique feature called Newsfeed.
This app featured a constantly updated stream of status updates from a user’s
friends. In late 2011 Facebook introduced another major revision to its site called
Timeline. The Timeline app is designed to show the chronological progression of
key events in a person’s life as illustrated by his or her Facebook status updates,
photos, the songs that person is listening to, bad haircuts, as well as changes in
occupations, locations, relationships, and the like. Facebook says it wants to make
it easier for people to tell their life stories by curating all the content they have
shared on the social networking service. Many users, however, were surprised by
the radical interface change and are uncomfortable with how easy it became for
others to access old, long forgotten posts and status updates. According to many
news reports, the new app has encouraged many to tighten their privacy settings
even further to limit the content that is shared with others.
When Zuckerberg created Facebook, he had very strong social ambitions
aimed at helping people connect to others on the Web. Facebook was initially an
online social space for college and high school students. It started by connecting
students to all others at the same school. In 2006 Facebook expanded to anyone
13 years or older with a valid e-mail address. The lack of privacy controls (e.g.,
tools that restrict who sees your profile) was among the biggest reasons why many
businesspeople resisted joining Facebook.
In 2008 Facebook introduced new controls that allow users to set different lev-
els of access to information about themselves for each of their groups; for example,
family, friends from school, friends from work, and so on. For instance, close friends
might see your mobile phone number, music favorites, e-mail address, and so forth,
while other friends might see only the basics of your résumé (Abram & Pearlman,
2008). Facebook is regularly criticized for its approach to user privacy, highlighting
an ongoing tension between the corporate goals of Facebook, which depends on a
high level of access to user data, and the desire of individual users to control access
to their personal information. See IT at Work 7.3 for additional information about
social media privacy issues.
Facebook has expanded to the rest of the world with the help of its foreign-
language members: Engineers first collected thousands of English words and
phrases throughout the site and invited members to translate those bits of text into
another language. Members then rated translations until a consensus was reached.
The Spanish version was done by about 1,500 volunteers in less than a month.
Figure 7.9 People are
increasingly using mobile
devices like tablets and
smartphones to access
Facebook and other social
media sites. ©
in
ca
m
er
as
to
ck
/A
la
m
y
c07SocialNetworkingEngagementandSocialMetrics.indd Page 240 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.2 Social Networking Services and Communities 241
The German version was done by 2,000 volunteers in less than two weeks. In
early March 2008 Facebook invited French members to help out. They completed
the translations in a few days. Facebook exists in over 70 different languages and
approximately 81 percent of their members reside outside of the U.S. In May
2012 Facebook went public with its Initial Public Offering (IPO), selling company
shares on the NASDAQ stock exchange. It raised over $16 billion, making it the
third largest ever IPO in U.S. history. While founder Mark Zuckerberg sold some
30 million shares during the offering (for $1.15 billion), he continues to own approx-
imately 22 percent of the company. His net worth of over $27.7 billion places him
among the 30 most wealthy people on the planet.
The Open Graph Initiative
A primary reason that Facebook expands is the network effect: More users mean
more value. In April 2010 Zuckerberg announced Facebook’s new initiative called
Open Graph. The goal was to connect all the different relationships that exist on
the Internet by linking websites to Facebook. Programmers at external websites
were encouraged to include a Facebook “Like” button on their websites. That
way, when a Facebook member visits the website, they can click “Like” and their
relationship with that website will be reflected back on their Facebook page for
friends to see.
Facebook also encourages other websites to allow people to use their Facebook
username and password to sign in or create accounts. For instance, if you are a
Facebook member and you visit Pandora.com (a music service) or Yelp.com (a
local directory service), you can sign into the sites using your Facebook username
and password. Facebook will then share your profile information with those
sites. This new initiative is exciting for its potential to enhance the social richness
and ease of use of the Internet. On the other hand, this is just one more example of
how Facebook creates concerns about how it shares users’ information with others.
Network effect: From the
field of economics, the net-
work effect explains how the
perceived value of a product
or service is affected by the
number of people using the
product or service.
GOOGLE TAKES ON
FACEBOOK WITH G
Launched in June 2011, Google , or G as some like to call it, is the latest entrant
to the SNS market and some believe it is capable of becoming a formidable com-
petitor to Facebook (see Figure 7.10). By March 2012 Google had over 100 mil-
lion users.
Like Facebook, Google offers building and sharing features, including
Google Hangouts, a popular and easy to use video conferencing feature.
It is clear that Mark Zuckerberg is not taking Google lightly. Facebook con-
tinues to launch new features and apps it hopes will help maintain its dominant
status. Search “Google vs. Facebook” for current news and information.
Figure 7.10 With the launch
of Google , the search
engine giant hopes to create
a social network that is fully
integrated with all of its other
services. ©
Zo
on
at
/D
V
as
ile
va
/A
g
e
Fo
to
st
oc
k
c07SocialNetworkingEngagementandSocialMetrics.indd Page 241 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
242 Chapter 7 Social Networking, Engagement, and Social Metrics
Figure 7.11 Second Life
residents participate in a
virtual world beauty contest
sponsored by cosmetics
manufacturer L’Oreal. ©
ST
R/
Re
ut
er
s/
C
or
b
is
AND NOW FOR
SOMETHING DIFFERENT:
SECOND LIFE
Second Life is a social network service unlike most others. What makes it unique is
that it uses a 3D virtual world interface in which users, called Residents, are repre-
sented by avatars, or cyberbodies that they create (Figure 7.11).
Developed by Linden Research in 2003, Second Life lets residents commu-
nicate with others in the virtual world through chat or voice communications.
Residents can create and trade things they make in Second Life, including virtual
clothes, art, vehicles, houses, and other architectural structures. They can also earn
money by providing services such as instruction in a foreign language or serving as a
DJ in a virtual club. This has led to the evolution of a Second Life economy with its
own currency, the Linden dollar (L$). While most of the economic activity remains
in the Second Life world, there are news reports of a few entrepreneurs who have
made considerable sums of real money. Residents who make a lot of Linden dollars
can exchange them at a rate of about 250 L$ for every U.S. dollar.
Between 2006 and 2008, there was a big spike in interest on the part of busi-
nesses that saw great potential in using Second Life. For example, IBM used it as
a location for meetings, training, and recruitment. American Apparel was the first
major retailer to set up shop in Second Life. Starwood Hotels used Second Life as
a relatively low-cost market research experiment in which avatars visit Starwood’s
virtual Aloft hotel. The endeavor created publicity for the company and feed-
back on the design of the hotel was solicited from visiting avatars. This informa-
tion was used in the creation of the first real-world Aloft hotel, which opened in
2008 (Carr, 2007). Starwood subsequently donated its Second Life property to a
not-for-profit educational organization. Fashion and clothing manufacturers like
Reebok, American Apparel, Adidas, and others used Second Life as a place to
feature new clothing designs, setting up virtual stores where Second Life citizens
could purchase digital clothing for their avatars. The hope was that awareness of
fashion products on Second Life would spur interest and eventual purchase of
real-world products. But efforts by these and other businesses, like 1-800-flowers,
to get Second Life citizens to purchase real-world products through the virtual
community have proven disappointing. Many businesses that were quick to
become part of the early excitement around Second Life have left the virtual world
community.
Will Second Life eventually replace Facebook and other 2D SNS platforms?
Probably not, in spite of its impressive interface. While Second Life is visually com-
pelling, it requires users to master a much larger range of controls and technology to
Avatar: an icon, figure or
visual representation of a
person in computer games,
simulations, virtual worlds or
online discussion forms.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 242 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.2 Social Networking Services and Communities 243
become fully functional. Its aesthetic similarity to video games may cause some to
underestimate its potential for more serious applications. Also, avatars interact in
real time, so users need to be online at the same time as their friends and acquain-
tances in order to interact. That said, there are some niche applications that show
promise. Using speakers and microphones, groups of people can conduct meetings
in Second Life. Teachers can interact with their students in Second Life. How would
you like it if your professor held offices hours on a virtual beach? Linden Labs
has revamped the special browser that residents use to participate in the virtual
world and is actively promoting its use for interesting business applications, but it is
unlikely to achieve the same level of attention as Facebook in its present form. We
believe, however, that Second Life will continue to provide benefit as a fascinating
niche player in the overall SNS marketplace.
PRIVATE SOCIAL
NETWORKS
The ultimate niche community is the private social networking service (SNS).
Private SNSs use social technology to create a community restricted to members
selected by the SNS’ owner. Private SNSs allow a greater degree of control over
the network. Companies can easily monitor activity on their own SNS platforms
and track conversations taking place about their brands and products. However,
managing a private SNS requires considerably more time, attention, and resources
than maintaining a presence on a general SNS. Organizations need to understand
up-front that they are making a substantial commitment with this strategy.
Most colleges and universities have Facebook pages. In addition, many institu-
tions have set up private SNSs to engage students even before they have started
school there. Students typically gain access to these private SNSs when they are
admitted to the institution. On the system, they can interact with admissions coun-
selors, current students, and other admitted students. Interactions that occur on
these networks set the stage for relationships and engagement that are simply not
possible with e-mail and phone calls.
In 2008 Mercedes-Benz created two private SNSs designed to increase engage-
ment with current and potential customers. The Mercedes Advisor network is for
current Mercedes-Benz owners. GenerationBenz.com is a private network for
prospective Mercedes owners. Membership in the network is limited to those who
fit Mercedes’ profile for younger luxury car buyers. Both of these communities
provide the company with an opportunity to engage their target audiences directly.
Members participate in market surveys and polls, provide feedback on prospective
ad campaigns and product features, and participate in discussion groups with com-
pany managers. This provides valuable feedback to Mercedes as well as creating
strong advocates for the company’s luxury car brand.
While engaging customers on a private SNS can be time-consuming and poten-
tially require significant staffing resources, the technological challenges associated
with setting up a private SNS are relatively small. A number of companies offer
a combination of free and subscription-based pricing for individuals or organiza-
tions wishing to create a private social network. Basic SNS sites can be set up
fairly quickly for free. Search on “private social network services” for the latest
information.
FUTURE OF SOCIAL
NETWORKING SYSTEMS
Social networking services are perhaps the most feature-rich applications of
Web 2.0. It is expected that growth and innovation in this sector will continue as
individual users and business organizations discover its power for building networks
and relationships. We expect that Facebook will continue to dominate the field, but
that smaller SNSs will stake out strong positions in niche markets using traditional
market segmentation strategies—focusing on the needs of specific geographic, cul-
tural, age, or special interest segments.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 243 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
244 Chapter 7 Social Networking, Engagement, and Social Metrics
Questions
1. What are the major differences between social networking services and older
online communities?
2. What is the basic difference between the social graph and Berners-Lee’s concept
of the Giant Global Graph?
3. Explain Facebook’s Open Graph initiative and how it plans to expand its influ-
ence across the World Wide Web.
4. What are some potential ways that business organizations can take advantage of
Second Life’s unique virtual world interface?
5. Why would a business want to create a private SNS? What are some of the chal-
lenges associated with doing this?
Privacy rights are too easily abused. Governments and indus-
try associations are trying to control these abuses through
legislation and professional standards, but they frequently
fail to provide adequate protection. One of the most effec-
tive deterrents is fear of backlash from abuses that become
public and cause outrage. So it is important to identify pri-
vacy issues that pertain to social media and specifically social
networking services. Examples of privacy violations include:
• Posting pictures of people on social networking sites
without their permission
• Tricking people into disclosing credit or bank account
information or investing in “work at home” scams
• Sharing information about members with advertisers
without the users’ knowledge or consent
• Disclosing an employer’s proprietary information or trade
secrets on social networking sites
• Posting information on social networking sites that could
compromise people’s safety or make them targets for
blackmail
Taking Control of Your Privacy
The most important thing that users can do to protect them-
selves is to understand that they are responsible for protect-
ing their own information. The basic solution is common
sense. Unfortunately, most social networking sites create
the illusion of privacy and control. This sometimes can lull
even the most vigilant users into making mistakes. Sites like
Facebook make us feel like our information is only going to
be seen by those we have allowed to become part of our
network. Wrong. Listed below are commonsense guidelines:
• Do not post private data. Nothing, absolutely nothing
you put on a social networking site is private. You should
avoid posting personal information including full birth
date, home address, phone number, and the like. This
information can be used for identity theft.
• Be smart about who you allow to become part of your
network. It is not uncommon for teenagers to “friend”
hundreds of individuals on their Facebook accounts. With
this many contacts, there is no way to protect profile or
other information.
• Do not rely on current privacy policies or terms of service
(TOS) agreements. Social networking sites change their
privacy policies regularly. Many have accused Facebook
of doing this specifically to wear down user vigilance
with regard to maintaining desired privacy settings.
Regularly review your social network service privacy poli-
cies explained in the TOS. Set your privacy settings at the
level offering maximum protection—operating as if you
have no privacy whatsoever.
• Minimize your use of applications, games, and third-party
programs on social networking sites until you have care-
fully investigated them. They can expose you to mali-
cious programs or viruses. Do not automatically click on
links that look as if they were sent to you by members of
your network.
Questions
1. Which of these guidelines is the easiest to follow? Which
is the toughest? Explain why.
2. Why is it recommended that you not post private data on
a social network, even those with privacy settings?
IT at Work 7 . 3
Addressing Social Media Privacy Concerns
c07SocialNetworkingEngagementandSocialMetrics.indd Page 244 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.3 Engaging Consumers with Blogs and Microblogs 245
One of the problems with traditional media, like newspapers and magazines, is that
editors and publishers decide what you should read. Often their decisions are based
on what the masses will buy at the newsstands. Space is limited and barriers to get-
ting published are high. News services frequently fail to devote sufficient space to
complex issues or viewpoints that might challenge the financial or business interests
of the publication’s owners or advertisers. But with social media, anyone can write
a column or article and publish it online for the world to read (see IT at Work 7.4,
“How to Create a Blog”).
Of course, this creates another potential problem: clutter. Blogging is so easy
that even people who do not have much to say can publish their thoughts, opinions,
and ideas. Readers need to be prepared to look at online content with a skeptical
eye and find ways to judge the credibility of the material they find on social media.
In their simplest form, blogs are websites where people regularly post content.
Some personal blogs are simply online diaries or journals where people share their
thoughts, reflections, or an account of their life. Other blogs are more sophisticated
and professional in format, resembling online newspapers or magazines. Because
blogging technology has become so commonplace, you may not always realize you
are reading a blog when accessing online content. Many organizations have integrated
one of the blogging platforms discussed later with their website. Blogging tools make
it easy for organizations to provide website visitors with frequently updated content
on pages with titles such as “What’s New,” “Company News,” or “Product Updates.”
As a result, you may be a frequent blog reader without realizing it!
Blogs contain content in a variety of digital formats including text, photographs,
video, and music. People who create and maintain blogs are referred to as bloggers.
Internet users increasingly use blogs as a source for information about topics of
interest. Technorati.com, an advertising network of blog publishers, listed approxi-
mately 1.3 million blogs as of February 22, 2014. The site also reports that it receives
138 million unique visitors each month, which suggests there is a sizable audience
for blogging sites.
7.3 Engaging Consumers with Blogs and Microblogs
WHAT IS THE PURPOSE
OF A BLOG?
Many professionals now blog as a way to establish their reputation and promote
their business interests, or because they enjoy writing and sharing their viewpoints
with others. Corporate bloggers use the medium to tell stories about their brands
and connect with customers.
On the surface, blogging appears to be a broadcast (one-to-many) communica-
tion tool. However, it can also be an effective tool for interactive dialogue. Many
blogs utilize comment features, allowing readers to respond to blog posts, interact-
ing with the blogger and other readers. Successful bloggers tend to comment on and
link to other blogs in their posts, in effect maintaining a dialogue or conversation
with other bloggers. These connections between blogs create what some refer to as
the blogosphere, or a network of blogs. IT at Work 7.5 lists a number of ways that
organizations use blogs for marketing.
BLOGGING AND PUBLIC
RELATIONS
Some bloggers have become highly successful and have developed a large audience
for their material. Many people approach blogging like a business and consider
themselves “publishers,” with the goal of generating enough readers or subscribers
that they can make money from advertisers and ad agencies who will pay to display
their ads on an individual blogger’s site (see technorati.com). Earlier in this chapter,
you read about a set of groundswell social media strategies described by Charlene
Li and Josh Bernhoff. One of those strategies, Energizing, is accomplished when
a business identifies a blogger whose audience matches its target market and per-
suades that person to write about the company’s product. This is similar to a public
relations manager sending a press release to a journalist, hoping he or she will write
a news story about the company in the local paper. When a highly credible and
c07SocialNetworkingEngagementandSocialMetrics.indd Page 245 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
246 Chapter 7 Social Networking, Engagement, and Social Metrics
influential blogger writes a positive story about your company, it can have a very
positive impact on your brand’s image. Bloggers can also have a negative impact if they
write unfavorable posts about the company or its products. As a result, public rela-
tions professionals are learning how to identify and form positive relationships with
influential bloggers with the goal of generating favorable coverage of the company
and its products. Frequently, this will involve doing things like providing the blogger
with information in advance of it being released to the public, providing access to
company executives for interviews, sending the blogger samples of the company’s
product so that he or she can write about it from firsthand experience, and so on. For
some companies, particularly those in the technology industry, building relationships
with influential bloggers has become an important public relations strategy.
READING AND
SUBSCRIBING
TO BLOGS
The best way to gain an understanding of the blogging phenomenon is to simply
start reading blogs. You can use search engines like Google or Yahoo to find blogs
on all kinds of topics. Most blogs make it easy to subscribe using an RSS reader (see
Section 7.4 later on in this chapter). Reading blogs is a great way to stay current on
rapidly evolving topics related to technology and business.
Setting up a blog is relatively easy. Making the effort to regu-
larly write and post content that others will find interesting is
more challenging. The following steps outline the process of
setting up a blog.
1. Create a plan. Successful blogging requires a certain
degree of organization and discipline. You can address
this part of the project by developing a plan at the out-
set. The plan should answer questions like these:
a. What are you going to blog about? What will be the
focus or topic of your blog?
b. Identify your target audience. For whom are you
writing?
c. How often do you intend to update your blog? Some
bloggers post new material daily, some weekly, and
some just a few times a month. How often you blog
is, of course, up to you, but readers are more likely to
follow blogs that are updated regularly. Avoid spo-
radic updates or only blogging when you feel like it.
Successful bloggers frequently set up a publication
schedule outlining topics and posting dates to keep
themselves on track.
d. Who else is blogging about the same topic? Identify
bloggers you can interact with through your posts and
comments on their blogs.
2. Determine if you will self-host your blog by purchasing
a hosting plan and domain name (URL), or if your blog
will use a free blogging service. Free services allow you
to get up and running quickly and do not require any
long-term commitments. This provides an easy, low-risk
way to get started. While this might be the most conve-
nient approach, you do not actually own your blog or the
content you post there because it is on a domain owned
by someone else. Your domain name in these situations
is usually in the form of “myblogname.blogspot.com,”
which can appear less professional to some readers.
Purchasing a hosting plan and domain name, however,
is the better long-term strategy since it creates a unique
identity for your blog.
3. Select a blogging platform (see the section below). This
is the software that will provide the look and feel of your
site and give you myriad features you can employ to
build a successful blog. Standard features in most blog
platforms include a comment section, RSS buttons so
readers can subscribe to your blog, and share buttons so
readers can post links to your blog on other social media
sites (e.g., Twitter, Facebook, Digg, etc.).
4. Set up your blog. Once you’ve set up your hosting and
platform arrangements, you will need to create the aes-
thetic design for your site. Most platforms make this easy
with a multitude of template options that you can further
customize to give your blog a unique look.
5. Get started. Now comes the challenging part, writing
your posts and regularly updating your blog to attract
readers. You can read blogs about blogging to get great
tips and advice.
IT at Work 7 . 4
How to Create a Blog
c07SocialNetworkingEngagementandSocialMetrics.indd Page 246 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.3 Engaging Consumers with Blogs and Microblogs 247
BLOGGING
PLATFORMS
Selecting a blogging platform is an important decision when setting up a blog.
Installing a platform when you are creating a blog is relatively easy. Converting
to a new blogging platform after using another one for a while is not. According
to a study by Technorati (2011), the two most popular platforms are WordPress
(51 percent) followed by Google’s Blogger platform (21 percent). Other blog plat-
forms include TypePad, Moveable Type, LiveJournal, and Tumblr. The Tumblr
platform is significantly different from traditional platforms in that it emphasizes
easy posting of photos and light copy. As such, it is considered to be a microblog-
ging platform and is discussed later in this chapter.
When choosing between WordPress and Blogger, WordPress is a feature-rich
platform and offers greater control over site appearance (Figure 7.12). Blogger is
simpler and easier to use, making it a more desirable choice for beginning bloggers
who want to get up and running without becoming bogged down in technological
issues. Blogger’s affiliation with Google might also be attractive because of the
potential for integration with other Google services. For instance, Blogger comes
with a built-in analytics program that appears to share many similarities with
Google Analytics, a stand-alone Web traffic–monitoring tool.
For now, begin by reading blogs about social media, information technology,
and other topics that are of personal interest. Note how these blogs vary in terms
of style, length, and appearance. Identify the features they offer readers for com-
menting on and sharing content. After you get a feel for how people blog, try setting
up your own blog using Google’s free platform and hosting service at www.google.
com/blogger.
Figure 7.12 WordPress is
one of the leading platforms
for online blogs. ©
N
et
Ph
ot
os
/A
la
m
y
Blogging Platform: a software
application used to create,
edit, and add features to a
blog. WordPress and Blogger
are two of the most popular
blogging platforms.
MICROBLOGS You may be a microblogger and not even know it! Microblogging is a way of shar-
ing content with people by the regular, often frequent posting of short messages.
Although people don’t usually call it microblogging, perhaps the most common
form of this social media activity occurs when you update your status message on
Facebook. More often, however, the term is used to describe popular microblogging
services like Twitter and Tumblr.
Most microblog content consists of text-based messages, although there appears
to be an increase in people who are microblogging photos and video on Twitter and
Tumblr. Tumblr has increased in popularity recently among younger Internet users
because of its multimedia capabilities and ease of use.
Microblog: a blog that
consists of frequent, but very
brief posts containing text,
pictures or videos. Twitter is
perhaps the most well-known
example of a microblog.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 247 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
248 Chapter 7 Social Networking, Engagement, and Social Metrics
Figure 7.13 Twitter is a
microblogging SNS that
limits users to messages
of 140 characters or less.
©
2
02
0W
EB
/A
la
m
y
Tweet: a brief 140-character
message or post broadcast
on Twitter, a microblogging
service.
Blogs and microblogs provide individuals and organizations
with a means to accomplish a variety of communications
objectives. Marketers use blogs and microblogs to:
• Develop relationships with independent bloggers,
encouraging them to write positive stories about the
brand, product, and company.
• Engage members of the blogging community, via corpo-
rate blogs, by providing helpful and interesting information.
• Tell the company’s “story,” position a product, create
brand identity, and differentiate from the competition.
• Engage customers and readers by soliciting comments
and feedback about information provided in blog posts.
• Drive traffic to the company website by using Twitter to
announce recent updates to the company blog.
• Inform current or prospective customers about positive
blog posts featuring your product or company that were
written by independent, third-party bloggers.
• Encourage repeat visits to the company website through
regular updates or new posts to the blog.
• Have a celebrity or influential expert send a tweet with
a promotional message about your brand using Twitter’s
new advertising program.
IT at Work 7 . 5
How Marketers Use Blogs and Microblogs
TWITTER Twitter has grown in popularity over the last few years, becoming one of the
world’s largest communication platforms. According to Twitter, approximately
5 million messages, or tweets, are sent each day by over 255 million active users
(see Figure 7.13).
Twitter has played a significant role in both global and domestic events (Lee,
2013). In countries where the media is largely dominated by government control,
Twitter has proven to be a valuable tool for activists engaged in organizing protests,
debating political viewpoints, and broadcasting real time information about sig-
nificant events that might otherwise be ignored by the mainstream media. Twitter
has been credited by many with playing a key role in the Arab Spring revolutions
that took place across the Middle East during the early 2010s. In the United States
presidential election of 2012, Twitter was used heavily by both candidates. The win-
ner, Barak Obama, is largely regarded as having out-performed his opponent, Mitt
Romney, on Twitter and other social media platforms. Because of Twitter’s reach,
most federal and state political leaders now use Twitter as a regular channel for
communicating with their followers. For the same reason, most advocacy groups
engage in what some call hashtag activism, using the service to maintain awareness
levels about their cause as well as influence people’s beliefs and attitudes on key
issues. Twitter has even begun to influence investment decisions made on Wall
Street. Financial research analysts have created algorithms that use the volume and
sentiment of Twitter traffic to predict the future stock value of a company.
Twitter is attractive to individuals, groups, and organizations because it pro-
vides a direct link to the public, bypassing traditional mass media which often acts
as an information gatekeeper. Ironically, Twitter frequently influences what we see
on traditional media. Journalists regularly use Twitter to broadcast breaking news
stories. Hashtag journalists increasingly monitor Twitter to identify newsworthy
events being tweeted (reported) by eyewitnesses and to gauge the public’s interest
in an event or issue by monitoring trending topics. Using Twitter to monitor public
sentiment as well as influence public opinion has become an important skill for
public relations professionals working for business and not-for-profit organizations.
Organizations can no longer afford to ignore the conversations that take place on
c07SocialNetworkingEngagementandSocialMetrics.indd Page 248 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.3 Engaging Consumers with Blogs and Microblogs 249
Twitter about their brands, products, and executives. Furthermore, public relations
professionals must understand how to actively participate in these conversations or
risk appearing aloof and out-of-touch.
Twitter is often used by consumers to complain about frustrations they are
having with a company or its products. In response, some companies have adopted
Twitter as a customer service channel, along with email and telephone call centers.
When customer service representatives find people complaining about their brand
or product, they can use the service to empathize with the customer’s frustration and
offer solutions for resolving the problem. Because conversations on Twitter are pub-
lic, other customers can watch or “listen in” on interactions between an unhappy cus-
tomer and a customer service representative and judge how effective the company is
at solving problems. This can be a benefit or liability for organizations depending on
how adept they are at communicating and resolving customer problems on Twitter.
While many businesses seem to intuitively understand the desirability of main-
taining a presence on an SNS like Facebook, many businesspeople freely admit to
being somewhat confounded by the success of Twitter, and the role that Twitter
should play in a company’s marketing strategy.
Like other social media tools, the best way to gain an understanding of Twitter
is to use it. The official Twitter interface is simple and efficient, but a large segment
of the Twittersphere uses third-party apps that have been developed to enhance the
site’s functionality and user experience. Some are considered essential tools in the
life of the power Twitter user:
• TweetDeck is an advanced, split-screen app that allows users to view
messages streaming from followers, people being followed, and people
the user might wish to follow. It also makes it easy to quickly reply to
incoming tweets, increasing the frequency of Twitter conversations. The
TweetDeck interface makes it easy to participate in Twitter forums or
online discussion groups similar to what takes place in a chat room. In
2011, this popular Twitter application was acquired by Twitter and contin-
ues to be a popular interface application for people accessing the service
from a computer.
• Twitpic allows users to add photos to their tweets.
• Twitterfeed automatically tweets posts published on a blog using RSS
technology.
• Twitterholic is a service that ranks users by number of followers, friends, and
updates.
Many users believe Twitter is best suited for mobile devices like smartphones
or tablets, which enable users to post spontaneous messages and updates regard-
less of their location. There are literally hundreds of third-party Twitter apps for
computers and mobile devices, with more being written every day. You can find
the most popular mobile apps by using an Internet search engine or searching your
phone’s app store.
How Do People and Businesses Use Twitter?
Think of Twitter as a social network where the dominant focus is on status updates.
People tweet messages to their followers that they think will be of interest. While
some businesses still struggle with ways to use Twitter effectively, many have
adopted strategies that engage consumers, enhance brand image and improve rev-
enue. Examples include:
• Celebrities use Twitter to update loyal fans about their day-to-day activities.
• Social media experts like Jeremiah Owyang and Brian Solis use Twitter
to share links to online material that people in their profession will find
interesting.
Twittersphere: the universe
of people who use Twitter, a
microblogging service.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 249 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
250 Chapter 7 Social Networking, Engagement, and Social Metrics
• Companies use Twitter to update customers about new products and special
offers.
• Mobile food service trucks in large cities use Twitter to update customers
about their current and future locations.
• News services like CNN and Mashable use Twitter as a “headline news”
stream, sending links to news stories on their websites.
• Coupon and shopping services use Twitter to send daily deals and special
offers to their followers.
• People use Twitter to send status updates to their friends, keeping others
informed about their activities, sharing stories and links to online material
they find interesting.
• Politicians use Twitter to communicate with their constituents, often linking
to stories or material on their website that they believe will help support
their positions on issues.
When users receive a tweet from someone they follow, they can “Reply” to
the message, or retweet it by forwarding the message to everyone in their network.
In this way, users engage in a dialogue of sorts with people they are connected to
on the service. Tweets that are retweeted among many different users can go viral.
People frequently attach descriptive keywords or hashtags, designated by the # sign,
to their tweets to make it easier for others to find (e.g., #news, #politics, #fail).
TUMBLR BLOGS Tumblr is often described as a microblogging service because it makes the post-
ing of multimedia content easy for users, and allows them to update their blogs
frequently. However, Tumblr blogs can include just as much text as a regular blog,
although most who use the service emphasize photographs and video as the primary
content. This emphasis on multimedia makes the Tumblr blogs more visually com-
pelling. Tumblr is particularly popular among those who are blogging about things
like fashion, entertainment, and the arts.
Questions
1. What is the difference between a blog and a microblog?
2. What is a blogging platform?
3. Why do marketers use blogs and microblogs?
4. What makes Twitter a more attractive communication channel than
traditional media for many individuals and organizations?
5. How is Tumblr different from other types of blogging platforms?
A mashup is a Web application that combines information from two or more
sources and presents this information in a way that creates some new benefit or
service. Using AJAX technologies and APIs, websites and applications can pull
information from a variety of sources. See IT at Work 7.6.
One of the most common examples of a consumer mashup that you are likely
to encounter involves the integration of map data (from companies such as Google
or Mapquest) with information like store names, locations, phone numbers, and
consumer reviews from other websites.
By combining this information in a single location or application, users enjoy a
powerful and visually compelling service. ProgrammableWeb maintains a directory
of mashups at programmableweb.com/mashups/directory.
7.4 Mashups, Social Metrics, and Monitoring Tools
c07SocialNetworkingEngagementandSocialMetrics.indd Page 250 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.4 Mashups, Social Metrics, and Monitoring Tools 251
Enterprise mashups combine data from internal business sources (e.g., sales
records, customer information, etc.) and/or information from external sources for
enhanced usefulness and productivity. For instance, a bank may utilize an enterprise
mashup to display a mortgage application from its own records, the property location
on a Google map, and information from county government property tax records.
WHAT MAKES A
MASHUP APP SOCIAL?
To begin with, many of the most popular APIs used in mashup apps are from
social media sites. That means the data involved in the mashup are likely to be
user-generated social information. The other reason mashups are considered social
media is that they represent the power to separate content from form—allowing
Web developers (and sometimes users) greater control over how information is
displayed and used on the Web.
Mashups also represent a change in philosophy for content creators. Traditionally,
a business that created content operated a closed system where it maintained almost
complete control over the “product.” On the social Web, content creators enjoy
greater distribution by allowing others access to their digital information through an
API. For instance, the Google brand name appears on thousands of websites due to
its open source API. If Twitter did not have an open source API, awareness and use
of the service would be far less than they are today because users would have to go to
the Twitter site in order to use it. By giving up some control, these content creators
enjoy much wider distribution and market penetration.
So while the ability to create powerful mashup applications has not yet reached
most individual Web users, it has decentralized control over how content is dis-
played and used, which is a key principle of social technologies (Section 7.1). We
anticipate that it will not be long before someone develops a technology that will
make it easier for the average user to create his or her own custom mashup applica-
tions (for instance, see Yahoo Pipes).
Mashup technology also represents a tremendous opportunity for new Web-
based businesses with limited start-up capital. For example, the online directory
and business review service, Yelp.com, uses the Google Maps API to make it easier
for users to locate restaurants and bars in their area. In turn, Yelp has an API that
allows sites like Zillow.com to use Yelp’s information when displaying information
about homes and neighborhoods to prospective real estate customers.
Figure 7.14 Users can
subscribe to online content
using RSS technology. ©
A
K
P
Ph
ot
os
/A
la
m
y
RSS TECHNOLOGY Another technology that extends control of Web content beyond the creator is really
simple syndication (RSS) (Figure 7.14). Traditionally, users had to visit multiple
sites in order to view content at each location. This is potentially time-consuming
and difficult for users who are interested in following several sources. RSS technol-
ogy allows users to subscribe to multiple sources (e.g., blogs, news headlines, video)
and have the content displayed in a single application, called an RSS reader or RSS
aggregator. Depending on the features of the aggregator, users can personalize how
they want information from their news sources organized and displayed.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 251 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
252 Chapter 7 Social Networking, Engagement, and Social Metrics
Businesses use mashups and RSS technology in a variety of
ways. Examples include:
• Integrating Google Maps with information about com-
pany store or office locations, so that they appear
together on a store locator webpage, making it easier for
customers to locate the business.
• Use the Twitter API to add a Twitter stream box to an
organization’s website, displaying a consistent stream of
tweets about the company, product, or brand.
• Create a desktop widget program that imports and dis-
plays useful information like sports scores, weather, or
stock prices on a user’s computer desktop or company
website. Branded widgets display the sponsor’s name
so that every time the user checks for updates, he or she
sees the brand name.
• Using RSS technology so customers and partners can
subscribe to your blog, newsletter, product reviews, and
articles. People are more likely to read content that is
easy to access.
IT at Work 7 . 6
How Businesses Use Mashups and RSS
Most RSS readers are available online for free. You can find articles that
provide reviews, descriptions, and recommendations about which one to use by
utilizing a search engine. If you do not have time to research all the options, any of
the following will probably provide a good initial experience with the technology:
feedly.com, theoldreader.com, Digg.com Reader, and Bloglines.com. All provide
the essential functionality of allowing you to subscribe to RSS content. The readers
tend to differ in terms of available social features and the aesthetics of the inter-
face. Feedly.com offers attractive displays that are visually compelling and contains
social features allowing people to share what they are reading with their network.
Some users, however, prefer a more rudimentary and basic interface, similar to
what you will find on the Digg Reader.
MONITORING SERVICES A fast-growing sector in the social technology field involves social monitoring
services. Monitoring applications allow users to track conversations taking place
on social media sites. The initial impetus for the growth of monitoring tools was
the need for business organizations to better understand what people were saying
about their brands, products, and executives (the “listening” part of the groundswell
strategy model). Monitoring services can be used to identify industry experts, com-
mentators and opinion leaders who post regularly to social media sites. Once identi-
fied, public relations professionals can build relationships with these individuals and
encourage them to become brand advocates who regularly portray the brand or
company positively in their online writing and social media posts. See IT at Work 7.7.
In the next section, we describe two categories of social monitoring tools:
subscription-based services and free monitoring services.
Subscription Monitoring Services
The most comprehensive social media monitoring tools require the user to pay
a subscription or licensing fee. These tools not only monitor the social media
environment for mentions of your brand or company name, but also provide
analytics and tools for measuring trends in the amount of conversation occur-
ring, the tone or sentiment (e.g., positive, negative, neutral) of the conversation,
and other important aspects of the social interactions occurring online. Some of
c07SocialNetworkingEngagementandSocialMetrics.indd Page 252 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.4 Mashups, Social Metrics, and Monitoring Tools 253
these tools are actually social media management platforms that help companies
administer social media marketing campaigns and inbound marketing programs.
The monitoring tools are just one of several features available in these enterprise-
level applications.
Most high-end monitoring tools report information using a dashboard interface,
which graphically represents the data it collects. Some of the most popular among
these paid services include Radian 6, Alterian SM2, Hubspot, Biz 360 Community,
and Nielsen Buzz Metrics. While prices for these high-end monitoring services can
vary widely (typically, hundreds of dollars a month), they are usually beyond the
budget of individual users.
• To identify brand advocates—people who repeatedly
discuss a particular topic.
• To find experts talking about technical or business topics.
• To assess reputation or sentiment in the online commu-
nity about a brand, person, or issue.
• To understand customers by listening—identifying topics
of interest to the online community.
• To track trends in the volume or nature of online conver-
sations.
• To assess the relationship between marketing actions
(e.g., product launch) and online conversations.
• To identify potential problems with your brand’s reputa-
tion before things get out of control.
IT at Work 7 . 7
Businesses Monitor Social Activity. . .
Free Monitoring Services
Fortunately, there are number of free monitoring tools that can be used by anyone.
Some of these tools, like Twitter Search, are designed to monitor conversations on
a single social media platform, while others, like Social Mention, are designed to
provide feedback on activity across a number of social media platforms including
Facebook, Twitter, and blogs. The following list provides a brief description of
some free social monitoring services.
Social mention Our favorite free monitoring tool can be found at socialmention.com.
This tool aggregates content from over 80 different social media sites including
Facebook, YouTube, and Twitter. The best thing about Social Mention is that it
provides users with four metrics that give insight into the nature of conversations
taking place on the Web.
Users can generate these statistics daily for a particular topic (e.g., brand name,
public figure, current event) and record them in a spreadsheet. Over a period of
time, it becomes easy to see trends developing with regard to factors such as how
many people are talking about a topic or how they feel about a topic. This is useful
information for the social media marketer.
Social mention metrics
• Strength—The likelihood that a particular topic is being discussed on social
media platforms
• Passion—A measure of the degree to which people who are talking about
your brand will do so repeatedly
c07SocialNetworkingEngagementandSocialMetrics.indd Page 253 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
254 Chapter 7 Social Networking, Engagement, and Social Metrics
• Sentiment—A measure of the tone of the conversation, which helps you
understand if people are feeling positive, negative, or neutral about the topic
• Reach—A measure of the range of people discussing a particular topic
Go to socialmention.com and explore what people are talking about with
regard to current events, celebrities, popular products, or any other issue you are
interested in. See what you can learn from the four metrics listed by the site.
Twitter search This tool on the Twitter website generates a list of recent tweets
containing a specific word or phrase. You can use the search engine to generate a
list of tweets containing keywords related to an issue, a brand name, a company
name, elected official, and so on. If your goal is to measure the sentiment of the
conversation about a particular topic or brand, you can accomplish this informally
by simply scrolling through the messages to get a feel for what people are saying
(see twitter.com/search).
If you want to do a more formal analysis, randomly sample, say, 100 tweets and
manually categorize each as positive, negative, or neutral. Repeat this on a daily
basis and you will be able to identify trends in the sentiment of online conversations
over time. Companies can use Twitter search to identify users who are having prob-
lems or complaining about their product and take corrective action by responding
to specific tweets.
Klout Klout claims to measure a user’s influence across a number of social media
sites including Facebook, Twitter, and more recently, LinkedIn, YouTube, and
Foursquare. Klout reports a user’s influence using a score from 0 to 100. Klout’s for-
mula for determining the influence score has been criticized (Clough, 2011, Walker,
2011). In fact, some believe that it is almost impossible to create a formula that truly
measures influence (Masnick, 2011, Singer, 2011). That said, Klout does quantify
aspects of a person’s potential to influence, which could be helpful to understand.
As Klout continues to build and improve on its influence algorithm, this tool could
prove increasingly valuable.
Google alerts Unlike the other tools listed above, Google alerts do not provide
much in the way of metrics that describe social media activity. However, it is an
extremely useful monitoring tool that conducts automated Google searches for
new Web content. Searches can be general or specific to social content on blogs
and discussion forums. Users receive regular e-mail updates with search results
(see google.com/alerts). This tool is particularly useful for managers who need to
be aware of any news stories, blog posts, and discussion forums where a particular
product, brand name, company, or person is mentioned. It is great for monitoring
competitive organizations. It is easy to use, and because the searches are auto-
mated, it is very convenient.
Social monitoring tools play an essential role in helping social media marketers
gain insight into the conversations taking place on the Web. They represent a set
of powerful tools in the arsenal of firms that seek to understand consumers, what
they are interested in, what they are talking about, and what they are thinking. As
such, it is important that you become familiar with these tools, their strengths and
weaknesses.
Questions
1. Why are mashups considered part of social media?
2. Describe a typical consumer mashup.
3. What is an RSS reader?
4. Describe the ways in which businesses can benefi t from using social
media monitoring tools.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 254 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.5 Knowledge Sharing in the Social Workplace 255
Face it: Working in groups can sometimes be a real pain. Whether you are working
with a group of fellow students on a class project, or a team of employees charged
with developing a marketing plan, there are all kinds of factors that can interfere
with success.
However, in today’s competitive environment, businesses must be agile, able to
respond quickly to a rapidly evolving marketplace. Employees must be able to work
collaboratively, communicate effectively, and work together to make decisions and
take action. Many businesses use Intranets to deploy tools that employees use for
collaboration and productivity. An Intranet is a password-protected computer net-
work that uses Web-based technologies (e.g., browsers, webpages). Think of it as
a private or internal Web. Unfortunately, many Intranets are based on older Web
technologies that do not include the social features we have become comfortable
with on the modern Web. Some companies, however, are updating their Intranets
to take advantage of advanced social features and technology. This trend is some-
times referred to as Enterprise 2.0.
In this section, we review a number of social tools for collaboration that are
available to everyone. Small businesses, startups, and nonprofits that lack resources
to deploy modern Intranets can use these tools for increased productivity. Larger
companies will use similar tools, but as part of their enhanced (Enterprise 2.0)
Intranets.
7.5 Knowledge Sharing in the Social Workplace
TOOLS FOR MEETINGS
AND DISCUSSIONS
Dialogue or synchronous communication is an important part of the collaborative
process. This can pose a challenge, however, for teams that cannot meet face to
face. In the last few years, services like Skype and ooVoo have become popular in
the marketplace for offering the possibility of reasonably good-quality video calls
between at least two people.
Both services now make it possible to conduct video calls among small groups,
making it easier to hold meetings. Google Hangouts is the latest entrant to this
field of services, allowing up to 10 people to participate in a video chat on the
Google social network (see Figure 7.15).
For something really unique, check out VenueGen.com. This service makes it pos-
sible for users to conduct meetings in a virtual world where users are represented by
avatars. Similar in appearance to the role-playing platform Second Life, VenueGen
is focused on the business organization’s need for online meetings, and has created
virtual environments for a variety of group sizes. Small meetings between two people
can take place in an office environment or a coffee shop. Larger groups can use
Synchronous communication:
dialogue or conversation
that takes place in real time,
without the long delays
between exchanges that
occur, for instance, in
email or discussion board
conversations.
Figure 7.15 On January
30, 2012, President Barack
Obama participated in an
online interview held through
a Google Hangout, making
it the fi rst completely virtual
interview from the White
House. ©
W
hi
te
H
ou
se
P
ho
to
/A
la
m
y
c07SocialNetworkingEngagementandSocialMetrics.indd Page 255 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
256 Chapter 7 Social Networking, Engagement, and Social Metrics
SOCIAL BOOKMARKING
TOOLS
Most Web browsers allow users to store links to online content by saving them to a
list of favorites or bookmarks. This approach becomes cumbersome as more infor-
mation is saved because lists grow long and difficult to use. Organizing bookmarks
into folders helps a bit, but the folders tend to hide information and users can forget
what folder they have stored information in.
Diigo and Delicious
Social bookmarking tools allow users to tag Web content with keywords of their
choosing. Users can retrieve links by searching on these keywords. Delicious.com
is the most well-known social bookmarking tool. In addition to retrieving links
tagged with keywords, users can search for Web content tagged by others. This is
what makes the bookmarking system “social.” Delicious can serve as an alterna-
tive search engine when seeking information. Searches on Delicious are based on
a folksonomy (folk taxonomy) producing results different from traditional search
engines because they are based on the way human beings tag content, not a com-
puter algorithm.
Diigo.com is a newer social bookmarking service and contains additional fea-
tures that make it an even more powerful collaboration tool. In Diigo, users can
form open or private groups for sharing links to Web content. Social tools on Diigo
allow users in these groups to comment on and discuss links as well as indicate their
approval of a link using a “Like” button. Diigo also has a highlight tool that allows
users to feature excerpts from webpages for other members of the group. Because
of these extra social features, Diigo is a powerful tool for collaboration. Public
TOOLS FOR RESEARCH
AND KNOWLEDGE
SHARING
A common step in many collaborative projects involves the identification and shar-
ing of information relevant to the project topic. Search engines like Google, Yahoo,
Bing, and others are among the most frequently used tools on the Web. Some of
these large search engines are beginning to incorporate social features into their
tools. Google makes it easy for users to share links on its SNS by placing a “ 1”
button next to each of the links in a search result. Yahoo includes a list of trending
topics on its start page, featuring the topics that most people are searching on at
the moment.
Searching the Web for information is not a particularly social activity, although
there are social tools that can be used, in addition to search engines, to acquire
information needed for a project. Discussion groups on SNSs can provide a forum
for asking questions to groups of people. For instance, the American Marketing
Association maintains a discussion group on LinkedIn that has over 6,500 members.
Participants can ask questions and solicit input from other members of the group.
Members can also monitor discussion groups, receiving periodic digests of group
activity that can be scanned for material of interest. In a similar fashion, people
frequently use Twitter as a way of asking questions and soliciting advice from their
network.
Finally, as you learned in the previous section, social media monitoring tools
can be used to search the Web for blog posts, tweets and other social activity by
industry experts and commentators that might prove to be sources of valuable
information. It is often possible to engage these experts on social media by com-
menting on blog posts, interacting on social networks or services like Twitter.
boardroom environments, and very large groups can use auditorium or theater-size
rooms. Within the virtual world, users can talk, make gestures, and display content
from documents, PowerPoint presentations, and spreadsheets, just as they would in
a face-to-face meeting.
Folksonomy: a system of
classifying and organizing
online content into categories
by the use of user-generated
metadata such as keywords.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 256 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
7.5 Knowledge Sharing in the Social Workplace 257
groups on Diigo can take on the feel of an online community, with potentially
large groups of people contributing, liking, and commenting on links related to a
particular topic.
CONTENT CREATION
AND SHARING
Sometimes, groups find it necessary to share documents and files as part of their
collaborative efforts. In the past, e-mail was perhaps the easiest way for working
teams to share documents. This approach has several drawbacks, perhaps the most
obvious being the challenge of keeping different versions of the work organized.
Dropbox
Dropbox.com is a cloud storage service that makes it easy to access your docu-
ments from any of the devices you work on. Think of it as a shared hard drive
for your computer, phone, and tablet computer. Dropbox also allows you to
share files and folders with others, making it a great tool for document sharing.
There are two features of Dropbox that make it a great tool. First, saving files to
Dropbox is just as easy as saving a file to your hard drive. Other services require
you to manually upload and download files. Dropbox also maintains a version
history for documents, making it easy to see changes made to a document and
undo them if necessary. This is a great feature for teams working on collaborative
writing projects.
Box.net
Like Dropbox, box.net is a cloud storage service but places greater emphasis on
social tools and features, which make it a great choice for collaborating teams. Users
can edit files stored on box.net without downloading to their hard drives. Like many
other social companies, box.net has created an open source API, allowing third-
party developers to write applications for box.net users that offer additional sharing
and collaboration features. Over 60 such apps have been developed so far.
Wikis
While Dropbox and box.net allow teams to collaborate on the creation of docu-
ments, a Wiki allows teams to collaborate on the creation of webpages. A wiki is
a website that allows many people to add or update information found on the site.
Wikis can be used as a work space for collaborative teams or they can become
public websites built by groups of collaborators. The most popular wiki project is
Wikipedia, the online encyclopedia (alexa.com, 2014). Businesses can create wikis
for a particular product and allow employees and even customers to contribute
information that will form a knowledge base resource for those who need informa-
tion about the product.
There are many different sites like wikispaces.com and wikidot.com that offer
free, basic wiki services to users.
Questions
1. How can working teams use social media as an alternative to face-to-
face meetings?
2. Why are social bookmarking services superior to the traditional method
of saving “favorites” or “bookmarks” in a browser?
3. What are some ways you can use social media to solicit knowledge,
information, and advice from experts on the Web?
4. What advantages do sites like Dropbox and box.net have over e-mail as
a way of sharing and collaborating on creating documents?
c07SocialNetworkingEngagementandSocialMetrics.indd Page 257 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
258 Chapter 7 Social Networking, Engagement, and Social Metrics
Key Terms
application programming
interface (API)
asynchronous JavaScript
and XML (AJAX)
blog
cascading style sheets (CSS)
cloud storage service
crowdfunding
crowdsourcing
document object model
(DOM)
enterprise mashups
extendable markup
language (XML)
Giant Global Graph
hashtags
hypertext markup
language (HTML)
JavaScript
mashup
microblog
network effect
Really Simple Syndication
(RSS)
RSS aggregator
RSS reader
semantic Web
sharing sites
social bookmarking
social media
social monitoring service
social network analysis
(SNA)
social networking service
(SNS)
social Web
synchronous
communication
terms of service (TOS)
agreement
twittersphere
Usenet
Web 2.0
widget
wiki
XMLHttpRequest
Assuring Your Learning
1. Explain the fundamental differences between
Web 1.0 and Web 2.0.
2. Defi ne social media and explain why these tech-
nologies are different from earlier manifestations
of the Web.
3. Compare the methods that companies chose to
communicate with their customers using the broad-
cast model vs. the ways that companies can have
conversations with their customers using Web 2.0
tools.
4. What are the four primary factors described in the
text that set the stage for Web 2.0 or the social Web
that we enjoy today?
5. What is an API? Why should marketing profession-
als monitor changes in the kind of APIs available to
Web developers?
6. Explain Facebook’s Open Graph Initiative. How do
Facebook’s social plug-ins play a role in the Open
Graph program?
7. Briefl y describe each of the following kinds of social
media:
a. social networking service
b. blog
c. microblogging service
d. social bookmarking service
e. RSS reader
f. sharing communities
g. mashup
h. wiki
8. Explain what is meant by “feature convergence”
and how it is blurring the distinction between
different types of social media tools.
9. Each of the following was listed as an element of
social media. Describe each and explain its role in
shaping and defi ning the social Web.
a. user-generated content (UGC)
b. content control
c. conversation
d. community (common values, culture)
e. categorization by users (tagging)
f. real people
g. connections
h. constant updating
i. content separated from form
j. equipment independence
10. If you were looking for a job or wanted to build
your reputation as an expert in some area related
to marketing, what social media tools would you
use for personal branding and why?
11. How can companies utilize social media collabora-
tion tools to become more competitive?
12. Describe how mashups create new benefi ts and
functionality from existing data or information.
13. Describe some common ways that marketers can
benefi t by using social media monitoring tools.
14. How will concern for individual privacy affect the
growth and expansion of social networking services
and other social Web applications?
DISCUSS: Critical Thinking Questions
c07SocialNetworkingEngagementandSocialMetrics.indd Page 258 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
Assuring Your Learning 259
1. Using online sources, research Facebook’s Open
Graph initiative. Make a list of “pros” and “cons”
regarding these changes from the viewpoint of a
Facebook user.
2. Using Google’s blog search tool, identify some active
blogs on a topic of interest to you and read a few posts.
Leave comments in the response section (if available).
See if the blog author or other readers reply.
3. Set up an account on two different RSS readers
(e.g., Digg Reader and Feedly.com) and use them
to subscribe to some blogs that are of interest to
you. Prepare a report or presentation comparing
the strengths and weakness of each application.
4. Using articles you can fi nd online, prepare a report
on the economic activity that takes place on Second
Life. Describe how people make money in the virtual
world and identify the opportunities and challenges
associated with making a living via Second Life.
5. If you have an account on Twitter, download
Tweetdeck, an alternative interface for Twitter.
Use Tweetdeck and prepare a brief report on the
advantages or disadvantages of using this program.
6. Visit the LinkedIn page for college students: students.
linkedin.com. Using the information on this page,
create a LinkedIn account and begin building your
professional network. Search the Internet for addi-
tional tips on using LinkedIn to fi nd jobs and prepare
a brief report on your fi ndings.
7. Using a search engine, fi nd four examples of mashup
applications. Prepare a report describing each one.
If possible, identify the website(s) where data are
pulled from to create the application.
8. Create an account on diigo.com, the social book-
marking site. Actively use it to tag and categorize
webpages that you want to remember for future
viewing. Use the search engine on diigo.com to fi nd
pages that other users have tagged. Compare the
effectiveness of your searches to similar searches
using Google and Yahoo.
EXPLORE: Online and Interactive Exercises
1. Use socialmention.com to evaluate the nature of con-
versations people are having about three telecommu-
nications companies: AT&T, Verizon, and Sprint. Based
on the four metrics provided by Social Mention, decide
which company is viewed most favorably and least
favorably by the marketplace. Using Twitter search, read
a sample of tweets where people discuss the companies.
Can you draw any conclusions as to specifi c reasons why
the companies are viewed favorably or unfavorably?
2. Your boss would like you to recommend a free ser-
vice for storing and sharing documents in the cloud.
Create accounts at box.net and dropbox.net. Explore
each service so that you understand how it works.
Make a recommendation and provide your reasons
for the service you select.
3. The supervisor of your department recently read
a story about companies that used Second Life to
conduct virtual meetings on the service. Create
an account on Second Life and spend a few hours
learning how to use it. With a handful of other
students, arrange to meet in Second Life for a
brief discussion. Based on your experience, pre-
pare a recommendation for your supervisor stating
whether or not you think using Second Life for
meetings would be a good idea. Justify your recom-
mendation.
4. After reading Video Case 7.3 below, get together
with two or three other students and brainstorm
some ideas for how your college or university could
create a viral video campaign. Use the success factors
listed in the case to evaluate your ideas. Write up a
brief recommendation for your best idea, describing
how it performs on each factor.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
CASE 7.2
Business Case: Social Customer Service
In 2008 a little-known musician by the name of Dave Carroll
initiated a social media fi restorm of bad publicity for United Air-
lines, Inc. (UAL) after the company refused to pay for damaging
his expensive Taylor guitar during a layover at Chicago’s O’Hare
Airport. After a frustrating year of negotiations with UAL, Carroll
became convinced the company had created a system de-
signed to simply wear down customers to avoid paying claims.
As a result, he launched what would become a legendary social
media attack on UAL’s alleged corporate stonewalling by pro-
ducing three YouTube videos that went viral, attracting millions
c07SocialNetworkingEngagementandSocialMetrics.indd Page 259 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
260 Chapter 7 Social Networking, Engagement, and Social Metrics
of viewers and generating countless news stories, blog posts,
and even a Harvard Business School (2010) business case. (Read
the full story and watch the videos at davecarrollmusic.com.)
While Carroll ultimately embarrassed the company into
settling his claim, it is clear that United Airlines continues to
struggle with not only its customer satisfaction levels, but
also its ability to manage the airline’s online reputation ef-
fectively. That is not the case, however, at several other large
companies that are increasingly learning to use social media
to engage customers, correct problems, and enhance their
brand image through social customer service.
Turning Complaints into Happy Customers
While business organizations were initially interested in social
media because of its potential for branding and public rela-
tions, many organizations have begun to realize its potential
for customer service and product support functions. In fact, a
recent study by Forrester Research (2010) shows that customer
service activities are the second most common application of
social technologies by business organizations (marketing was
fi rst). Even excellent companies sometimes make mistakes
or fail to completely satisfy customers. Because the cost of
retaining a customer is often less than the cost of acquiring a
new customer, many organizations invest in customer service
operations to assist customers when problems occur. Tradi-
tional customer service channels consist of phone (call centers),
mail, and in-store support. Today, customers may also use
e-mail for such exchanges, and a wide range of social chan-
nels including Facebook, Twitter, and YouTube. Furthermore,
customers may not complain directly to the company on its
offi cial Facebook or Twitter pages. Companies need to be able
to identify unhappy customers that share negative comments
outside of “offi cial” channels. Traditional wisdom suggests that
when consumers have a negative experience with a company,
they share it with as many as 10 people. But now, unhappy
customers can potentially share their experience with hundreds
of people using a single message on social media. Or, as David
Carroll learned, the message might reach tens of millions.
The WOW Factor at Zappos
At online shoe retailer Zappos, customer service through all
channels is designed to “WOW” customers (Figure 7.16). A
10-person team of social customer service agents is trained
and empowered to go the extra mile for customers who
contact them through Zappos’ offi cial Twitter channel,
@zappos_service. Agents have even gone as far as helping
customers fi nd the shoes they want at a competing retailer.
Zappos agents strive to personalize their service by talking
to customers in a normal “voice,” sharing their names,
and taking whatever time is necessary to address customer
concerns. The company does not use scripted responses or
policy documents restricting what agents can or cannot say
to customers on the company’s Twitter customer service
channel. The only objective is to WOW the customer. This
helps customers feel as if they are dealing with a real person
who cares about their needs. The absence of scripted
guidelines for assisting customers does not mean Zappos
takes customer service lightly. After a lengthy and care-
ful screening process, prospective Zappos agents receive
weeks of training and become immersed in its customer-
focused culture during their initial stages of employment.
Once the agent passes the training program, he or she is
actually offered money to quit the company! This is done
to ensure that only those agents who truly want to excel at
Zappos remain with the company. This approach to cus-
tomer service is one that extends throughout the company,
and refl ects Zappos’ corporate culture of happiness (see
Figure 7.16). As a result, Zappos has earned one of the best
reputations for its ability to please its customers, even when
mistakes happen.
Comcast Makes a Turnaround
with Social Media
Like United Airlines, cable giant Comcast was once the target
of many social media public relations disasters. YouTube
videos of service technicians falling asleep while on hold with
their own customer service call center were embarrassing for
Figure 7.16 Zappos CEOs
and co-founders Tony Hsieh
and Jenn Lim (shown here)
have worked hard to create
a culture of happiness across
the company, including the
customer service team. ©
Sc
ot
t
H
ar
ris
on
./
Re
tn
a
Lt
d
./
C
or
b
is
c07SocialNetworkingEngagementandSocialMetrics.indd Page 260 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
CASE 7.3 Video Case 261
the company. Now, Comcast is considered a pioneer in the
area of using social technologies for customer service. Under
the leadership of Frank Eliason (now senior vice president
of social media at Citibank), Comcast was one of the fi rst
corporations to recognize the potential of using Twitter for
customer service. Twitter allowed the company to respond
more quickly to customer complaints than with traditional
channels. In fact, because of the public nature of Twitter
messages, Eliason and his team were able to identify upset
customers even when they were not directly communicating
with the company. By monitoring Twitter for all messages
that mentioned Comcast, agents are able to offer assistance
to sometimes surprised customers who do not realize the
company is interested in helping them solve their problems.
Despite Comcast’s innovations in social customer service, a
quick scan of the Internet will produce evidence that lots of
people still grow frustrated with Comcast’s inability to deliver
cable and Internet service that meets their expectations. But
by using social tools to engage customers on the major social
platforms, Comcast has made great strides in helping to
solve customers’ problems when they arise.
Cisco Systems Creates Social
Tools for Customer Service
Cisco Systems, Inc. is an American multinational corporation
and a market leader in the design and manufacture of computer
networking equipment. Cisco not only uses social channels for
customer service, but also leverages its expertise in networking
and software development to create applications that other
companies can use to provide multiple channel support
services to customers. Cisco has developed a social customer
service app called SocialMiner. This app makes it possible for
companies to take a pro-active approach to social customer
service, monitoring conversations on Twitter, Facebook,
blogs, and other social media platforms. This makes it pos-
sible for service agents to identify and resolve issues as they
emerge. The app also stores conversations in a database for
later analysis, allowing companies to identify systematic
problems and take corrective action to prevent problems
from happening in the fi rst place.
Sources: Compiled from March (2011), Reisner (2009), Forrester
Research (2010), davecarrollmusic.com.
Questions
1. How does social media represent a threat to companies
who limit their customer support services to traditional
channels?
2. When customers have a negative experience with a com-
pany, what are the various ways they can use social media
to tell others about their experience?
3. Explain why companies can no longer afford to limit their
customer service to traditional channels (e.g., call centers).
4. What are some of the frustrations customers encounter
when seeking customer service support from a company?
CASE 7.3
Video Case: Viral Marketing: Will It Blend?
Founded in 1975, Blendtec is a Utah-based manufacturer of
high-quality blenders that typically sell for between $300 to
over $1,000. While the company’s products are perhaps the
most expensive on the market, they enjoy a reputation for
being among the strongest, most durable blenders available.
Part of the reason for Blendtec’s reputation is the success of
a promotional campaign that Advertising Age calls the “the
number one viral campaign of all time” (Learmonth, 2010).
The campaign has generated more views than any other viral
marketing campaign in history.
You can watch the videos at the campaign website: willit-
blend.com. Or, you can initiate a search on the “Will It Blend”
campaign at YouTube, or visit Blendtec’s YouTube channel:
youtube.com/user/blendteconsumer.
The “Will It Blend?” Campaign
Prior to 2006, Blendtec was relatively unknown outside of
the commercial food service equipment industry. That year
the company’s new marketing director, George Wright,
came up with the idea to make videos demonstrating the
strength and durability of the blender by grinding up all sorts
of unusual things: marbles, a McDonald’s Happy Meal, and
even a garden rake. The videos, featuring company founder
Tom Dickson in a white lab coat and goggles, were posted to
YouTube and quickly generated millions of views as people
shared them with others in their social network. The success
of the early videos inspired the company to make additional
episodes, resulting in over 130 videos. Some of the more out-
rageous episodes show Dickson grinding up iPhones, hockey
pucks, a video recorder, an iPad, Bic lighters, and even a stun
gun.
The Will It Blend? viral video campaign was effective
because it did well on success factors that experts have
identifi ed as essential for viral marketing campaigns.
Create Content that Appeals
to a Wide Audience
By defi nition, viral campaigns involve millions of people view-
ing and sharing content. Therefore, successful campaigns
are based on content that has mass appeal, as opposed to
narrow or niche market segments. Even though Blendtec’s
products are a specialty item with a price point that most
consumers would fi nd prohibitive, the videos are of inter-
est to a larger audience. Many of the products that are
“blended” in the videos (i.e., iPhones, iPads, Barbie dolls,
and Nike sneakers) have broad-based appeal.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 261 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
262 Chapter 7 Social Networking, Engagement, and Social Metrics
Create Content that People Want
to Share with Friends and Family
Viral marketing experts report that viral content tends to be
entertaining, emotional, novel or unexpected, humorous or
offers something free. Blendtec’s videos are both entertaining
and novel because they use the blender in a completely
unusual and unexpected way. Many of the videos are also
funny, depending on the item being destroyed.
Make Use of Large Social Media Platforms
for Easy Sharing
From the beginning, the Will It Blend? videos were posted
to both YouTube and a company website created specifi cally
for the campaign. Later, the company integrated Facebook,
Twitter, Google , and Pinterest into the campaign, which
expanded sharing across these large social sites.
Keep Fans Engaged
The problem with many viral campaigns is that they fi zzle out
after viewers tire of the original content. Great campaigns
fi nd ways of building on initial successes. The Blendtec
campaign has managed to maintain people’s interest since
2006 by creating sequels to the initial episodes. The com-
pany actively solicited suggestions from fans about what they
wanted to see blended. The most popular episode, added in
2010, blended an Apple iPad and generated over 16.9 million
views.
Employ Tactics to Generate Initial
Interest and Traffi c
Successful viral campaigns create the impression that all
the traffi c generated is organic, resulting purely from wide-
scale sharing by Internet users. However, in many cases,
the campaign creators employ a number of strategies at
the beginning of the campaign to jumpstart initial interest
and awareness. Examples of such strategies include e-mail
campaigns, promoting content to infl uential bloggers, SEO,
optimizing your YouTube page and/or channel (if the content
is in video format), promoting your content using PPC and/
or paid promotion of a video on YouTube. At the beginning
of the Will It Blend? campaign, Blendtec encouraged its em-
ployees to share the videos with their friends and family. The
company promoted its videos using Google’s Adwords and
early videos were featured on YouTube’s homepage, which
helped generate initial interest (Mendelson, 2013). Additional
traffi c was generated later in the campaign as a result of
public relations efforts that led to widespread news coverage
and appearances on NBC’s The Tonight Show and the History
Channel series Modern Marvels.
Campaign Results
The Will It Blend? campaign has generated over 294 million
views across its 130 video episodes on YouTube since
2006 (McDonald & Horan, 2014). The company continues
to build on the brand awareness created by the campaign.
Blendtec has over 702,000 YouTube subscribers, 53,806
“likes” on Facebook, and 24,700 followers on Twitter.
While the company has clearly achieved its original objec-
tive of building awareness for its brand, Blendtec also
experienced a 700 percent increase in retail sales between
2006 and 2008, about two years after the beginning of the
campaign (Briggs, 2009). The videos are so popular that
the company even makes approximately $50,000 a month
from advertising that YouTube places around the videos
(Akman, 2012).
Sources: Compiled from Mendelson (2013), Learmonth (2010),
McDonald & Horan (2014), Briggs (2009), Akman (2012).
Questions
1. Why do you think Blendtec’s video campaign was
more appealing to viewers than a traditional product
advertisement?
2. In addition to the success factors listed throughout this
case, what other aspects of the Will It Blend? campaign
contributed to its success?
3. On Blendtec’s YouTube channel, take a look at a handful
of the most recent videos that have been added to the
campaign. Does it appear that interest in the videos is
declining or growing stronger?
4. Based on the number of views (listed just below each
video on YouTube), what kinds of items seem to generate
the greatest interest when featured in a Will It Blend?
video? Based on this observation, what suggestions
would you give the company for items to feature in
future videos?
5. Why do you think the campaign had such a signifi cant
impact on retail sales as opposed to commercial sales
(e.g., sales to food service businesses)?
Abram, C. & L. Pearlman. Facebook for Dummies. Hoboken,
NJ: John Wiley & Sons, 2008.
Akman, M. “ ‘Will It Blend?’: An Early Social Media Success
Case Study.” Delightwave.com, April 27, 2012.
alexa.com. “Alexa Topsites.” June 5, 2014.
American Express. “American Express Launches ‘Link, Like,
Love’ on Facebook—First-Ever Platform to Deliver Deals,
Access and Experiences Based on Cardmember ‘Likes’ and
Interests.” Press release, about.americanexpress.com, July 19,
2011.
Berners-Lee, T. “Giant Global Graph.” Timbl’s blog,
Decentralized Information Group, November 2007.
Briggs, C. “BlendTec Will It Blend? Viral Video Case Study.”
socialens.com, January 2009.
References
c07SocialNetworkingEngagementandSocialMetrics.indd Page 262 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
References 263
Carr, D. “Is Business Ready for Second Life?” Baselinemag.com,
March 2007.
Clough, A. “Klout’s Peer Index Score Is 40, Peer Index’s Klout
Score Is 57. Do They Care?” LewisPR360, October 27, 2011.
comScore.com. “It’s a Social World: Top 10 Need-to-
Knows About Social Networking and Where It’s Headed.”
December 21, 2011.
Deighton, J. and Kornfeld, L. “United Breaks Guitars”,
Harvard Business School Case 510-057, hbr.org, January 6, 2010.
Facebook. “Social Plugins.” developers.facebook.com, June 10,
2014.
Fiorenza, P. “Daily Dose: More Trouble for Banking Industry.”
GovLoop.com, October 6, 2011.
Forrester Research. “Social Networking in The Enterprise:
Benefi ts and Inhibitors.” June 2010.
Harvey, M. “Facebook Sets Up Google War with Vast
Expansion through Open Graph.” thetimes.co.uk, April 22, 2010.
Heathfi eld, S. “Use LinkedIn for Recruiting Employees.”
Humanresources.com, (Accessed, August 12, 2012.
Hegaret, P., L. Wood, & J. Robie (eds.). “What Is the Docu-
ment Object Model?” World Wide Web Consorium, W3.org,
November 2000.
Horrigan, J. “Home Broadband Adoption 2009.” Pew Internet
& American Life Project, June 2009.
Kim, R. “American Express Delivers Deals via Facebook’s
Social Graph.” GigaOm.com, July 19, 2011.
Learmonth, M. “The Top 10 Viral Ads of All Time.” Advertising
Age (Adage.com), September 2010.
Lee, D. “How Twitter changed the world, hashtag-by-hashtag,”
bbc.com, November 7, 2013.
Leiner, B., V. Cerf, D. Clark . . . S., D., Kahn, R., Kleinrock, L.,
Lynch, D., Postel, J., Roberts, L., Wolff. “A Brief History of
the Internet.” ACM SIGCOMM Computer Communication
Review 39, no. 5, October 2009.
Levine, R., C. Locke, D. Searls, & D. Weinberger. The Cluetrain
Manifesto: The End of Business as Usual. Cambridge, MA:
Perseus, 2000.
Li, C. & J. Bernoff. Groundswell: Winning in a World Trans-
formed by Social Technologies. Cambridge, MA: Harvard
Business Press, 2008.
March, J. “Zappos: Delivering WOW Customer Service
through Twitter.” The Social Customer, November 25, 2011.
Masnick, M. “Is Infl uence a Number. . . And Is It Based on
Twitter?” TechDirt.com, May 25, 2011.
McDonald, C. & M. Horan. “Will It Blend?” knowyourmeme.
com, March 2014.
Mendelson, B. J. “Why Does Blendtec Lie About Their Viral
Marketing Success?” bjmendelson.com, December 2013.
Nielsen Company. “Facebook and Twitter Post Large Year over
Year Gains in Unique Users.” May 2010.
Outlaw, S. “What Type of Crowdfunding Is Best for You?”
Entrepreneur.com, October 3, 2013.
Quittner, J. “For Banks, There’s More Tech Behind Tweets.”
AmercianBanker.com, June 24, 2011.
Reisner, R. “Comcast’s Twitter Man.” Bloomberg Business-
week, January 2009.
Sibona, C. & S. Walczak. “Unfriending on Facebook: Friend
Request and Online/Offl ine Behavior Analysis.” Paper pre-
sented at 44th International Conference on System Sciences,
Hawaii, January 2011.
Singer, A. “Obsessed With Your Klout Score? You’re Doing It
Wrong.” thefuturebuzz.com, June 21, 2011.
Skinner, C. “Banks Have Bigger Development Shops than
Microsoft.” Financial Services Club Blog, September 9, 2011.
Statista.com. “Number of Monthly Active Facebook Users
Worldwide as of 1st Quarter 2014.” 2014.
technorati.com. “State of the Blogosphere 2011.” November 4,
2011.
techterms.com. “Javascript.” June 10, 2014.
van Kesteren, A., J. Aubourg, J. Song, & H. Steen (eds.). “XML
Http Request Level 1: W3C Working Draft 30 January 2014.”
World Wide Web Consortium, W3.org, January 2014.
Vogelstein, F. “Great Wall of Facebook: The Social Network’s
Plan to Dominate the Internet—And Keep Google Out.”
Wired Magazine, June 2009.
W3C. “XML Essentials.” World Wide Web Consorium, W3.org,
June 10, 2014.
Walker, L. “What to Do If Your Klout Score Drops.”
LauraleeWalker.com, October 27, 2011.
Weaver, A. & B. Morrison. “Social Networking.” Computer,
February 2008.
White, M. C. “Bank Transfer Day, the Day After.” Time
Moneyland, November 7, 2011.
Wikipedia. “Ajax (Programming).” June 10, 2014.
Wikipedia. “Crowdfunding.” June 10, 2014.
c07SocialNetworkingEngagementandSocialMetrics.indd Page 263 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch07/text_s
264
Chapter Snapshot
This is both an exciting and challenging time to be a
retailer. Traditional brick-and-mortar stores face increas-
ingly intense competition from other traditional retailers
as well as competitors in the online and mobile retail chan-
nels. Consumers, armed with mobile devices, have more
information than ever before about products, prices, and
alternative places to buy products. A particular source of
frustration for traditional retailers is the practice of show-
rooming, where consumers visit a store to look at merchan-
dise, seek information and advice from salespeople, maybe
even try on clothes, and then leave the store to make their
purchases online from a company that offers lower prices.
Retail, E-commerce,
and Mobile Commerce
Technology8
Chapter
1. Describe how the concept of omni-channel retailing is
changing the nature of shopping for consumers.
2. Identify five key challenges faced by online retail
businesses in the Business to Consumer (B2C)
marketplace.
3. Identify various ways that e-businesses are facilitating
trade between buyers and sellers in the Business to
Business (B2B) marketplace.
4. Understand how mobile technologies are creating
opportunities for new forms of commerce in established
industries.
5. Recognize how mobile payment methods benefit both
consumers and retailers.
Chapter Snapshot
Case 8.1 Opening Case: Macy’s Races Ahead
with Mobile Retail Strategies
8.1 Retailing Technology
8.2 Business to Consumer (B2C) E-commerce
8.3 Business to Business (B2B) E-commerce
and E-procurement
8.4 Mobile Commerce
8.5 Mobile Transactions and Financial Services
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 8.2 Business Case: Chegg’s Mobile Strategy
Case 8.3 Video Case: Searching with Pictures
Using MVS
References
Learning Outcomes
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 264 11/14/14 1:50 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
265
CASE 8.1 OPENING CASE
Macy’s Races Ahead with Mobile Retail Strategies
Online retailers also face significant challenges.
Maintaining an e-commerce website requires ongoing
investment in new technologies designed to enhance the
online shopping experience, increase operational and logis-
tical efficiency, as well as maintain high levels of customer
satisfaction. Thanks to social media, dissatisfied customers
now have numerous forums for informing others about
frustrating experiences they might have with a company. It
can be difficult meeting customer expectations that seem to
grow more and more demanding everyday.
Companies that are branching out into mobile com-
merce face challenges as well. For years, industry pundits
have said that mobile commerce, or m-commerce, is going
to be huge. But those predictions have failed to material-
ize for a number of reasons, leaving some to question their
investments in mobile technology. However, there are
signs that mobile devices have finally begun to make an
impact on retailing in noticeable ways. Nevertheless, the
question still remains whether or not this emerging chan-
nel will become as big a force as some have predicted for
years. In this chapter, you will read about the forces that
are shaping consumer shopping behavior, and the ways
that traditional, online, and mobile retailers are using
technology to address the many challenges they face.
Mobile devices, particularly smartphones, have become a key tool in the arsenal of
modern-day shoppers. Using barcode scanner apps, customers in brick-and-mortar
retail stores can quickly compare prices with other stores and online retailers. They
can access product information, check expert and consumer product reviews, and
even purchase products from online retailers. This practice, called showrooming,
represents a significant threat to many traditional retailers who continue to ignore
the impact of mobile consumer behavior.
Showrooming is frustrating to retailers who bear the costs of providing sales
support, product inventory and maintaining a store front, only to see customers
TABLE 8.1 Opening Case Overview
Company Macy’s, Inc.
The business Macy’s is a premier department store retailer with a signifi –
cant online e-commerce website and mobile shopping app.
Product lines Macy’s department stores offers a range of products, includ-
ing fashionable clothing, jewelry, footwear, furniture, bedding,
small kitchen appliances, cookware, and other household
goods.
Business Implementation of an omni-channel retail concept that
challenges allows consumers to freely and seamlessly engage with
Macy’s through a traditional storefront, e-commerce website,
or mobile technology.
Digital Macy’s embraces technology to enhance the shopping
technology experience through the use of QR codes and SMS text
messaging, mobile videos to provide information about
merchandise, and an SMS database for distribution of mobile
coupons and marketing communications.
Taglines “The Magic of Macy’s,” “Macy’s, way to shop!”
Barcode: A machine-
readable code consisting of
numbers and a pattern of
thick and thin lines that can
be scanned to identify the
object on which the code
appears.
Showrooming: The practice
of examining products in
a traditional retail store,
sometimes with the help
of a salesperson, and then
purchasing the product
online.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 265 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
266 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
purchase products at a lower price from an online retailer with lower overhead
costs. Target recently wrote to several of its vendors asking them to create special
products, only sold in Target stores, in an attempt to stifle consumer comparison
shopping via mobile devices (Zimmerman, 2012). But other retailers, recogniz-
ing the pervasive nature of mobile shopping trends, are developing strategies to
embrace and engage the mobile shopper.
Department store giant Macy’s (Figure 8.1) is recognized as a pioneer when
it comes to using mobile technologies to enhance the shopping experience of its
customers (Figure 8.2). Macy’s uses in-store displays to encourage customers to use
mobile devices while shopping. The Backstage Pass Program is designed to enhance
the in-store shopping experience at Macy’s. Using quick response (QR) codes
and short message service (SMS) technology, customers can easily access fun and
informative 30-second videos that highlight the retailer’s celebrity designers and
fashion experts (see related videos at youtube.com/Macys). Mobile shoppers can
access the videos by scanning the QR codes posted on displays in each department.
Shoppers who do not have a QR code scanner can access the videos by texting a
special keyword to Macy’s using codes supplied on the displays. Backstage Pass
is an example of what marketers call a mobile display strategy. It is supported by
Macy’s is one of the nation’s
premier retail organizations
specializing in the operation of
mid-range department stores.
Brand
Operates 840 department stores
in the U.S., Guam, and Puerto
Rico under the Macy’s and
Bloomingdales brand names.
Global Reach
QR codes, mobile video display,
augmented reality, coupons via
SMS, mobile payment.
Digital Technology
Macy’s, Inc.
Macy’s considers itself to be a
leader in omni-channel retailing
practices and innovation.
Corporate Culture
Figure 8.1 Macy’s, Inc.
overview.
Quick response (QR) codes:
A machine readable code
typically used to store a link
to a URL or web address
that can be read by a mobile
device.
Short message service
(SMS): A technology used
to send and receive text
messages on mobile devices
via a telecommunications
network.
Figure 8.2 Macy’s
encourages shoppers to
use mobile technology in
its stores through a variety
of strategies, including
mobile videos that describe
merchandise, benefi ts from
mobile check-in, and fun
augmented-reality apps. ©
g
p
oi
nt
st
ud
io
/S
hu
tt
er
st
oc
k
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 266 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
CASE 8.1 Opening Case 267
an integrated communications campaign involving traditional television and print
media advertising. Macy’s can measure customer interest in the program by track-
ing the number of times customers watch the videos. Based on the initial success
of the program, Macy’s has increased spending on mobile display strategies by
70 percent (Kats, 2012).
Another key mobile strategy used by Macy’s is the SMS database strategy,
growing its list of customers who have opted-in to receive discounts and special
offers via text message. According to Martine Reardon, executive vice president of
national marketing at Macy’s, New York, the retailer is including SMS short codes
in most of its printed coupons to encourage customers to opt-in to receive coupons
and other offers via text message. Macy’s customers have responded well to these
kinds of promotions, so growing the list of people who opt-in to this program should
be easy.
With its mobile check-in strategy, Macys has partnered with Foursquare and
Shopkick to create check-in programs that reinforce shopping behavior at retail
outlets. Mobile customers using the Shopkick app on their phones receive points on
their account just for visiting a Macy’s store. They may also receive special offers
from Macy’s via the Shopkick app when they visit particular departments or scan
featured merchandise. The points can be redeemed for restaurant vouchers, iTunes
gift cards, and gift cards from a variety of participating retailers. Macy’s partnered
with Foursquare and a charitable foundation created by insurance company Aflac.
For every consumer who checks-in at Macy’s via the Foursquare app, Aflac donates
$1 to its charity, The Aflac Cancer Center and Blood Disorders Service of Children’s
Healthcare of Atlanta. Aflac made the same offer to customers who checked-in
while watching Macy’s famous Thanksgiving Day Parade, using an entertainment
check-in service called GetGlue.com (now called tvtag.com). These kinds of part-
nerships and programs not only reinforce store shopping behavior, but also enhance
Macy’s positive brand reputation among target consumers.
Via the mobile payment strategy, customers can pay for products at Macy’s
using Google Wallet, a mobile payment app (Figure 8.3). At the register, customers
simply tap their phones on a Near-Field Communications (NFC) device in order
to transfer funds to Macy’s. Google Wallet is one of several approaches to mobile
payment competing to become the dominant alternative to traditional credit cards.
Mobile payment is expected to become widespread in the near future as banks,
retailers, and telecommunications companies gain experience with the technology.
(Read more about mobile payment in Section 8.5.)
Figure 8.3 Customers at
Macy’s can pay for purchases
with their smartphones by
using a mobile wallet app. ©
LD
Pr
od
/i
St
oc
kp
ho
to
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 267 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
268 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
In an augmented reality strategy, during the Thanksgiving and Christmas holi-
day season, Macy’s runs a program to benefit the Make-A-Wish Foundation. Over
the past few years, Macy’s has donated $1 for every customer who visits a store and
“mails” a letter to Santa. In 2011 Macy’s made that visit even more fun, inviting
customers to take pictures of their children in special holiday displays using aug-
mented reality apps that inserted one of the animated characters associated with
the campaign into the picture. Pictures could then be uploaded into a holiday card
template, shared by e-mail, or posted to the customer’s Facebook page.
While other retailers are still trying to understand mobile consumer behavior,
Macy’s is already adapting to a new retail environment where increasing numbers
of consumers are using handheld devices. It has shown that traditional brick-and-
mortar retailers can enhance the in-store shopping experience using mobile tech-
nologies in a variety of ways.
Sources: Compiled from Zimmerman (2012), Tsirulnik (2011), Macy’s (2011), Johnson (2011), Kats (2012).
Augmented reality: A tech-
nology that superimposes a
computer-generated image
onto an image of the real
world to provide information
or entertainment.
Questions
1. Describe how each of Macy’s mobile retail strategies enhances the
in-store shopping experience for customers.
2. What will most customers think about Target’s attempt to make mobile
price comparison more diffi cult?
3. How does Macy’s benefi t from the use of location-based apps like
Foursquare and Shopkick?
4. Why is it important that Macy’s get customers to “opt-in” to its program
before sending promotional text messages?
5. Does Macy’s Backstage Pass Program really add value to the customer,
or is it just a “gimmick” with short-term benefi ts?
6. Traditional retailers spend a considerable amount of money to maintain
an inventory of products and provide salespeople to service in-store
customers. Explain whether or not the practice of showrooming is
unethical. What can retailers do to respond to the showrooming trend?
Life is not easy for managers in the retail sector these days. The challenges faced by
retailers have never been more complex, frustrating, and fraught with peril. Consumers
are demanding, price-conscious, and easily swayed by competitors. Technology is both
a blessing and a curse. Countless new and innovative technology “solutions” to retail-
ing problems are offered by a dizzying array of both established and new vendors.
Many of the newest technologies promise to give retailers a competitive edge in the
marketplace, but are unproven. Budgets for technology are limited, and making the
wrong decision can lead to financial consequences, operational failures, and lost cus-
tomers. However, because of intense competition, retailers cannot afford to be too
conservative, or they risk losing out to competitors with technologies that enhance the
shopping experience, reduce costs, integrate sales channels, and improve record keep-
ing, data collection, and analysis of key performance indicators (KPIs).
8.1 Retailing Technology
KEEPING UP WITH
CONSUMER DEMANDS
AND BEHAVIOR
Understanding and responding to consumer needs and behavior is the key to sur-
vival for the modern retailer. The challenge, however, is increasingly complex as
retailers are confronted with a number of difficult industrywide trends and changing
consumer behavior (Galgey & Pattinson, 2013).
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 268 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.1 Retailing Technology 269
Empowered Price Sensitivity. Consumers have always been concerned about price.
In today’s retail environment, the consumer is more empowered than ever to find the
lowest price available for a product. Using the Web and mobile technology, consumers
can look up information about alternative products and prices from a variety of local
and online retailers using a mobile device. Retailers need clear strategies to respond
to the empowered consumer by price-matching or finding ways to offer greater value.
Nonlinear Search and Influence Patterns. The path by which consumers pursue
purchases today is often varied and unpredictable. In simpler times, consumers were
largely influenced by mass media advertising that drove them to brick-and-mortar
stores for purchase. While things were perhaps never quite that simple, consumers
today are influenced by a range of new communications channels including social
media, mobile ads, e-mail, search marketing, and other digital communications.
Channel Hopping. Just as consumers are influenced by a greater number of commu-
nications channels, their options for purchasing products have increased. Consumers
can now purchase products through traditional retailers, online, and via mobile
devices and apps. Some experts are beginning to view social media as a potential
retail channel called social commerce. For instance, Dell reportedly sells millions of
dollars of refurbished computer equipment each year through its @delloutlet Twitter
account (Leslie, Chawla, Aaker, 2010). The manner in which consumers use each
channel varies. Some consumers will use a brick-and-mortar store to gather informa-
tion about a product, but purchase it online. Others will do their research online, but
prefer to purchase the product through a traditional retailer. Some may plan to pur-
chase the product at a store, but if they find the product they want is not available
they will buy it from their mobile device while in the store. The many combinations
of shopping channel, communications channel, and stage of the shopping process are
enormous and make strategic planning a challenge. Modern retailers will increas-
ingly rely on data analytics to distinguish patterns or trends in consumer shopping
behavior across channels to identify the best ways to satisfy customer needs.
Digital Immigrants, Natives, and Dependents. Retailers have long been aware of the
difference between digital immigrants and digital natives. Digital natives are the first
generation to have grown up surrounded by digital devices (i.e., computers, smart-
phones, digital cameras, video recorders, etc.) and Internet connectivity. They are
comfortable using technology to move easily between various retail channels to opti-
mize their purchasing on price, convenience, and desire for instant gratification. Digital
immigrants, however, are older, and although they are increasingly comfortable with
technology, they fundamentally view retail channels as separate and distinct. They
are much less likely than natives to incorporate mobile technology into their shopping
behavior. Digital dependents represent the emerging generation of young people who
are growing up in a world of broadband connections, constant connectivity, and related
technology and become uncomfortable if they do not have access to it. This generation
will place even greater demands on retailers, expecting to use technology to accomplish
all facets of the shopping experience. Brick-and-mortar retailers will continue to play
an important role in the lives of this generation, but they will expect in-store shopping
to be fully integrated with the technology they have come to depend on.
Need for Convenience. As economic and social factors lead to more stressful
lives, consumers will be looking for products and shopping channels that reduce
the impact on their time and financial resources, while satisfying their demand for
immediate gratification and desirable goods and services.
THE OMNI-CHANNEL
RETAILING CONCEPT
As the retailing world began to evolve as a result of digital technology and the
Internet, new channels emerged that were initially thought to be separate and dis-
tinct. Most retailers and a fairly large segment of the consumer market still view
online shopping (e-commerce) and mobile commerce (m-commerce) channels as
competing with traditional brick-and-mortar stores.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 269 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
270 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
As you read in the opening case, Target feels threatened by customers who
showroom its stores using mobile devices. However, as businesses learn about the
full potential of mobile and other digital technologies, the distinction between the
newer channels and in-store retailing is beginning to blur. While most businesses
currently operate their e-commerce and mobile channels separately from the tradi-
tional retail channel, it is expected that strategies integrating the customer experi-
ence across channels will emerge, resulting in what the National Retail Federation
(2011) refers to as the omni-channel retailing approach.
As illustrated in Figure 8.4, many businesses operate separate retail channels.
For instance, in-store product prices may be different from those the customer finds
on the company’s e-commerce website and direct mail catalog. Records of customer
purchases from the e-commerce site may not be available to service personnel
assisting the customer at the store level. But retail strategy is evolving. The ulti-
mate goal is to offer consumers multiple brand–based “touchpoints” that leverage
the strengths of each channel. For instance, a company with a truly integrated or
omni-channel strategy might spark a customer’s interest using mobile advertising or
direct mail catalogs. The customer then visits a brick-and-mortar store to examine
the product firsthand and speak to a salesperson. In-store purchases might be made
using one of the mobile payment methods discussed later in this chapter. If the store
does not have the particular size or color of the product desired, the customer might
order it by accessing the store’s e-commerce site with his or her smartphone by
scanning a QR code placed strategically on an in-store display. The product would
then be delivered through the mail. Product returns could be handled through the
mail or returned to the store, depending on what is most convenient for the cus-
tomer. Customer service reps in a call center would have a record of the customer’s
purchase regardless of which channel the transaction had been completed through.
The omni-channel strategy will also take into consideration the potential impact of
social media, whereby customers interact with the brand on sites like Facebook or
Twitter and share brand experiences with others in their social network.
Single Channel
The Legacy
Consumer contact with
retailers limited to single
channel.
Retailers only had a single
“touch point” with which to
connect with consumers.
Retailers operate separate channels
as independent “silos” that
sometimes compete for consumer
attention.
Retailers have a single view of the
consumer, but continue to operate
separate channels as silos.
Retailers leverage the functionality of
each channel as well as their single view
of the customer to provide optimal
overall experience.
Customers enjoy an integrated,
value-added experience with brand
across multiple channels.
Customers see multiple but separate
channels with which they can interact
with the same brand.
Customers see multiple retail
channels available for acquiring
goods and servies.
The Reality The Aspiration Nirvana
Multi-Channel Cross-Channel Omni-Channel
Figure 8.4 Retail strategy
is evolving toward an
omni-channel approach
(adapted from National Retail
Federation, 2011).
Questions
1. Describe the factors that infl uence consumer shopping behavior today.
2. What does the concept of digital native, digital immigrant, and digital
dependent help us to understand about people’s use of technology
during shopping activities?
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 270 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.2 Business to Consumer (B2C) E-commerce 271
3. Why are retailers likely to view technology as both a blessing and a
curse?
4. Describe how an omni-channel retailer is likely to be different from a
traditional, single-channel retailer?
During the late 1990s, the idea of purchasing things online was still a novel concept.
People who purchased books and other low-priced items from websites were seen
as innovators. Nowadays, shopping for things online and finding the best deal by
comparing online prices with those in brick-and-mortar stores are common con-
sumer behaviors. In the past decade, the variety of goods and services available
through e-commerce sites has skyrocketed. If you look through older textbooks in
the IT field, you will find authors predicting that e-commerce will only be successful
with low-priced consumer goods. But we now know that this is simply not the case.
People today purchase everything from toothpaste to cars and diamond rings online.
E-commerce in the B2B sector is even larger than it is in the B2C marketplace.
Retail sales via online channels, financial services, travel services, and digital
products (e.g., music- and movie-streaming services) are widely popular forms of
B2C commerce. The most well-known B2C site is Amazon.com, whose IT develop-
ments received U.S. patents that keep it ahead of competition. Many of these are
described in IT at Work 8.1.
8.2 Business to Consumer (B2C) E-commerce
Entrepreneur and e-commerce pioneer Jeff Bezos envi-
sioned the huge potential for retail sales over the Internet
and selected books for his e-commerce venture. In July 1995
Bezos started Amazon.com, offering books via an electronic
catalog from its website. Key features offered by Amazon.com
were broad selection, low prices, easy searching and order-
ing, useful product information and personalization, secure
payment systems, and efficient order fulfillment. Early on,
recognizing the importance of order fulfillment, Amazon.com
invested hundreds of millions of dollars in building physical
warehouses designed for shipping small packages to hundreds
of thousands of customers.
Amazon has continually revised its business model by
improving the customer’s experience. For example, custom-
ers can personalize their Amazon accounts and manage
orders online with the patented One-Click order feature. This
personalized service includes an electronic wallet (e-wallet),
which enables shoppers to place an order in a secure manner
without the need to enter their address, credit card number,
and so forth, each time they shop. One-Click also allows
customers to view their order status and make changes on
orders that have not yet entered the shipping process. To
emphasize its large inventory of books, Amazon obtained
registered trademarks for its retail slogans: “Earth’s Biggest
Selection” and “If It’s in Print, It’s in Stock.”
In addition, Amazon added services and alliances to attract
more customers and increase sales. In January 2002 Amazon.
com declared its first-ever profit during the 2001 fourth quarter;
2003 was the first year it cleared a profit in each quarter.
Amazon has invested heavily in its IT infrastructure and
obtained patents for much of the technology that powers its
website. The select list of patents below gives a glimpse into
the legal side of the e-commerce giant, and explains why
numerous major retailers, such as Sears and Sony, have used
Amazon.com as its sales portal.
• 6,525,747: Method and system for conducting a discus-
sion relating to an item
IT at Work 8 . 1
Amazon.com’s IT Patents Create Competitive Edge
Electronic wallet (e-wallet):
A software application that
can store encrypted informa-
tion about a user’s credit
cards, bank accounts, and
other information necessary
to complete electronic trans-
actions, eliminating the need
to re-enter the information
during the transaction.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 271 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
272 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
• 6,029,141: Internet-based customer referral system, also
known as the Affiliate program
• 5,999,924: Method for producing sequenced queries
• 5,963,949: Method for data gathering around forms and
search barriers
• 5,960,411: Method and system for placing a purchase
order via a communications network (One-Click purchase)
• 5,826,258: Method and apparatus for structuring the que-
rying and interpretation of semi-structured information
• 5,727,163: Secure method for communicating credit card
data when placing an order on a nonsecure network
• 5,715,399: Secure method and system for communicating
a list of credit card numbers over a nonsecure network
Amazon launched the Kindle e-reader in 2007. Its suc-
cess demonstrated the viability of the e-book market and
led to the entry of numerous competitors, such as Barnes &
Noble’s Nook and the Apple iPad. E-books now account for
about 30 percent of all books sold, and Amazon’s share of
the e-book market is 65 percent (Bercovici, 2014). Since 2011
Amazon has sold more e-books than print books (Miller and
Bosman, 2011). See Figure 8.5.
In mid-2010 Amazon started rolling out a software
upgrade for Kindle, adding the ability for users to share
e-book passages with others on Facebook and Twitter.
The new social networking feature in Version 2.5 adds
another Web link to the standard Kindle and the larger Kindle
DX, as Amazon finds itself in an increasingly competitive
market because of the iPad’s features. The iPad is designed
for reading digital books, watching online video, listening to
music, and Web browsing, making it more of a tablet device
than simply an e-reader.
Finally, as you read in Chapter 6, Amazon has been a
pioneer in the development of recommendation engines
designed to suggest products to customers based on their
purchase history and shopping behavior. Amazon’s recom-
mendation system is considered among the best in the
industry.
Sources: Compiled from Gonsalves (2010), Rappa (2010), Bercovici
(2014), Miller & Bosman (2011).
Questions
1. Why is order fulfillment critical to Amazon’s success?
2. Why did Amazon patent One-Click and other IT infra-
structure developments?
3. How has Amazon adapted the Kindle to new technolo-
gies?
4. Why would other retailers form an alliance with Amazon.
com?
Figure 8.5 Amazon now sells more e-books than
print books and is considered the dominant e-book
retailer.
Several of the leading online service industries are banking, trading of securities
(stocks, bonds), and employment, travel, and real estate services.
ONLINE BANKING Online banking includes various banking activities conducted via the Internet
instead of at a physical bank location. Online banking, also called direct bank-
ing, offers capabilities ranging from paying bills to applying for a loan. Customers
can check balances and transfer funds at any time of day. For banks, it offers an
inexpensive alternative to branch banking. Transaction costs are about 2 cents per
transaction versus $1.07 at a physical branch.
Most brick-and-mortar conventional banks provide online banking services and
use e-commerce as a major competitive strategy. Customers are aware that if they
bank exclusively with a brick-and-mortar institution, they may be missing out on
high-paying investment options or competitive loan rates that easily undercut those
of many traditional banking entities.
©
n
ic
ol
am
ar
g
ar
et
/i
St
oc
kp
ho
to
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 272 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.2 Business to Consumer (B2C) E-commerce 273
A Crisis of Confidence in Consumer Banking
While the first Internet-only bank, or direct bank, appeared
in the mid-1980s, it wasn’t until around 2010 that these
online institutions became mainstream. Some have attrib-
uted general consumer frustration resulting from the 2008
economic crisis with generating consumer interest in new,
agile banking institutions that appear to be more respon-
sive to consumer needs for convenience and customer
support.
Banks have historically built their reputations on trust
and consumer confidence that they would act ethically, pro-
tect consumers’ money, and make customer interests a pri-
ority. However, the financial crisis of 2008 led to wide-scale
consumer mistrust and frustration with traditional banks and
financial services companies. Banking is now considered one
of the least trustworthy industries by consumers (Edleman,
2013, O’Connell, 2013). Consumers also believe that irre-
sponsible behavior by banking organizations was a primary
cause of the economic meltdown that led to high levels of
unemployment and fiscal uncertainty in the U.S. and across
the globe (The Financial Brand, 2013).
Many banks only made matters worse during this period
when they instituted a number of business practices that
further alienated consumers (O’Connell, 2013). During a
time when consumers were already frustrated with financial
institutions because of the economic crisis, many banks hiked
interest rates on loans, reduced the interest rate they paid
on consumer savings and checking accounts, made it more
difficult for consumers to open credit accounts, imposed new
types of fees on consumer services, and oftentimes failed to
transparently disclose information about fees and interest
rates in promotional messages and other forms of commu-
nication with consumers. As a result, consumer confidence
in the banking industry dropped to an all-time low following
the 2008 financial crisis (Gallup, 2014). See Figure 8.6.
In an effort to take advantage of widespread consumer
frustration and dissatisfaction with traditional banking com-
panies, a number of new, smaller, and more agile banks are
moving to offer alternative approaches to consumer banking
services. Ally Bank is a popular Internet-only bank that is
widely recognized for its success in developing a business
model with significant appeal to retail banking customers.
Overview of Ally Bank
Ally Bank, based in Midvale, Utah, is a subsidiary of Ally
Financial, formerly GMAC, the financial unit of General
Motors Corporation. Since its launch in 2009, Ally Bank has
worked hard to create a public image that differentiates
itself from business practices that caused consumers to mis-
trust and grow frustrated with traditional banks and financial
service corporations. Ally’s marketing communications mes-
sages emphasize that it:
• Puts customer needs first.
• Offers consumers smart banking alternatives with no hid-
den fees and higher interest rates on savings and invest-
ment accounts.
IT at Work 8 . 2
Ally Bank – Building Trust and Confidence Online
Figure 8.6 Consumer
confi dence in the banking
industry from 1979 to 2014.
Source: Gallup, 2014
0.00%
*percent of consumers who indicated a “great deal” or “quite a lot” of confidence in banks
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
19
79
19
81
19
83
19
84
19
85
19
86
19
87
19
88
19
89
19
90
19
91
19
92
19
93
19
94
19
95
19
96
19
97
19
98
19
99
20
00
20
01
20
02
20
03
20
04
20
05
20
06
20
07
20
08
20
09
20
10
20
11
20
12
20
13
20
14
Consumer confidence in banking industry*
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 273 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
274 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
• Is friendly, transparent, and easy to work with, unlike
large, fee-happy banks.
• Is new, innovative, fun and offers an attractive alternative
to traditional banking corporations.
What Makes Ally Bank Different?
Apart from a brand image that differentiates Ally Bank from
its competitors, the company uses technology to distinguish
itself in three important ways:
1. The company is part of a growing group of Internet-only,
or direct banks. Instead of brick-and-mortar bank branches,
Ally Bank’s customers use the Web to access their
accounts, make transactions, and monitor their funds.
2. Unlike other banks that have been slow to embrace
social media, Ally Bank is recognized as a leader in the
banking industry for its use of social media to engage
consumers.
3. Ally Bank offers customers mobile banking apps to make
doing business with the company even more convenient.
Internet banks provide customers with the convenience of
24/7 banking services through the Web. Consumers access
their account information using a computer, tablet or smart-
phone. Deposits are made by scanning or photographing
checks and transferring the image to the bank. Checks can
also be mailed to the bank. Internet banks typically offer
savings and checking accounts, certificates of deposit, retire-
ment accounts, and various types of loans and mortgages.
Because Internet banks do not bear the cost of maintaining
physical branch offices, they often offer customers bet-
ter interest rates and lower fees than traditional banks. To
retrieve cash, customers use ATM machines. Many Internet
banks reimburse customers for fees they incur when using
the ATM machines of other banks.
Social Media
Traditional banks have been reluctant to utilize social
media channels for engaging consumers for fear of vio-
lating long-standing banking regulations that govern
disclosures and consumer privacy. Given the current level
of consumer frustration, many banks are probably also
hesitant about what their customers are likely to say about
them through comments, ratings, and reviews on social
media. This hesitation to embrace new media has created
an opportunity for upstart banking organizations such as
Ally Bank. Since the Internet bank lacks a physical pres-
ence, social media is the primary channel for interacting
with customers in ways that promote trust, confidence,
and loyalty, key ingredients for maintaining long-term
financial relationships.
Ally Bank is recognized as an industry leader when
it comes to its innovative use of social media. According
to Smith (2014), Ally Bank excels in three areas of social
media:
• Communicating the brand via social channels
• Using data to drive social marketing decisions
• Cross-platform integration of marketing strategies
Examples of Ally’s social media marketing include using
Twitter to offer personal finance advice. Ally has also teamed
up with Bankrate.com to sponsor a monthly, hour-long
TweetChat (discussion group) called #AllyBRchat, where
participants discuss a range of personal finance issues. The
firm’s Facebook page is used to engage consumers with links
to Ally’s “Straight Talk Blog,” opinion polls, and educational
videos. On Ally Bank’s YouTube channel, visitors will find
installments of financial advice programs with titles such as
“Ally Bank Financial Etiquette,” “Discovering Retirement,”
and “Behind the Scenes with Kiplinger.” Across all of these
social platforms, Ally Bank offers consumers information,
advice, and tools by posting over 1,500 pieces of content
every month (Tejwani, 2012).
Ally Bank’s Mobile Strategy
Ally Bank’s adoption of mobile technology follows the
bank’s philosophy of putting the customer first and creating
the most convenient ways for them to access and manage
their money. According to Carrie Sumlin, a Digital Deposits
Executive at Ally Bank, the company’s goal with both
mobile and Web technology is to make sure that all applica-
tions live up to the promise of transparency, simplicity, and
ease of use (Yurcan, 2014). First introduced in April 2012,
Ally’s mobile apps offer a wide range of functionality includ-
ing account management, bill payment, fund transfers to
external banks, and a tool for finding ATM and cash-back
locations. Managers at Ally Bank are constantly evaluat-
ing customer reaction to the mobile apps by monitoring
how the apps are used, which devices are being used, and
customer feedback collected through social media, Web-
based consumer surveys, and calls to their customer service
center.
Results
In a study of 22 leading banks, credit unions, and finan-
cial service firms conducted by the research firm Change
Sciences, Ally Bank was ranked #1 for its use of social
media. The study cited the importance of “authenticity” in
social media communications—going beyond advertising
by addressing customer needs and communicating in a per-
sonal tone or real voice instead of a corporate tone (Yurcan,
2012, Tejwani, 2012).
A 2011 study by the Ponemon Institute ranked Ally Bank
among the top five most-trusted banks in the industry based
on a survey of 5,571 consumers.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 274 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.2 Business to Consumer (B2C) E-commerce 275
Ally Bank was rated among the best in the nation by the
Pew Charitable Trusts for its use of best disclosure practices,
evidence that the company is succeeding in its goal to be
transparent about fees and other information important to
consumers (Malone, 2014).
Ally Bank is regularly recognized by organizations
and publications like Money Magazine, Kiplinger, Forester
Research, and Bank Tracker as being among the best banks in
the industry, providing the best banking website, and provid-
ing an excellent customer experience. For an extensive list of
awards and recognitions, see the Media Center—Awards and
Recognitions page on the Allybank.com website.
Conclusion
Ally Bank is clearly an innovator and a disruptive competitor
in an otherwise tradition-bound industry that has not always
been responsive to consumer needs. The company has
distinguished itself by its innovative, technology-driven
approach to providing financial services, a provocative and
engaging marketing and branding strategy, and an ability
to communicate with consumers through social media chan-
nels. In the short time that Ally Bank has been in business, it
has attracted over 825,000 customers, manages $45 billion
in retail deposits, and achieves customer satisfaction levels
of over 90 percent (Ally Financial, 2014). It is recognized as a
leader in the direct banking segment of the consumer bank-
ing industry.
Questions
1. Visit Ally Bank’s Facebook page. Identify examples of
how the company speaks in an authentic or real voice to
its customers.
2. How has Ally Bank attempted to take advantage of nega-
tive consumer sentiment toward traditional banks in the
industry?
3. As Ally Bank develops its mobile banking service, what
guides the company’s development of the necessary
technological applications?
4. Visit Ally Bank’s YouTube channel. After reviewing video
clips of Ally’s past advertising campaigns, how would you
describe its brand image?
5. Visit Allybank.com and review the information about its
banking services. Do you think that Internet-only banks
will eventually attract a significant number of customers
away from traditional banks?
INTERNATIONAL AND
MULTIPLE-CURRENCY
BANKING
International banking and the ability to handle trading in multiple currencies are
critical for international trade. Electronic fund transfer (EFT) and electronic letters
of credit are important services in international banking. An example of support for
e-commerce global trade is provided by TradeCard (tradecard.com). TradeCard
offers a software-as-a-service (SaaS) model that provides supply chain collaboration
and a trade finance compliance platform.
Although some international retail purchasing can be done by giving a credit
card number, other transactions may require cross-border banking support. For
example, Hong Kong and Shanghai Bank (hsbc.com.hk) has developed a special
system, HSBCnet, to provide online banking in 60 countries. Using this system, the
bank has leveraged its reputation and infrastructure in the developing economies of
Asia to rapidly become a major international bank without developing an extensive
new branch network.
Electronic fund transfer
(EFT): A transfer of funds
from one bank account to
another over a computerized
network.
ONLINE JOB MARKET Most companies and government agencies advertise job openings, accept résumés,
and take applications via the Internet. The online job market is especially effective
and active for technology-oriented jobs. While sites like dice.com and monster.com
can still be helpful, job seekers nowadays are employing a variety of social media
tools, including the use of LinkedIn.com, to develop a network of contacts and
establish a personal, online reputation. In many countries, governments must adver-
tise job openings on the Internet. In addition, hundreds of job-placement brokers
and related services are active on the Web.
ISSUES IN ONLINE
RETAILING
Despite the tremendous growth of online retailers, many face challenges that can
interfere with business growth. Major issues include:
1. Resolving channel confl ict. Sellers that are click-and-mortar companies,
such as Levi’s or GM, face a confl ict with their regular wholesale and retail
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 275 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
276 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
distributors when they circumvent those distributors by selling online directly
to customers. (These distributors are other businesses that carry the compa-
ny’s product.) This situation is called channel confl ict because it is a confl ict
between an online selling channel and physical selling channels. Channel con-
fl ict has forced some companies to limit their B2C efforts, or not to sell direct
online. An alternative approach is to try to collaborate in some way with the
existing distributors whose services may be restructured. For example, an auto
company could allow customers to confi gure a car online, but require that the
car be picked up from a dealer, where customers could also arrange fi nancing,
warranties, and service.
2. Resolving confl icts within click-and-mortar organizations. When an established
company sells online directly to customers, it creates confl ict with its own offl ine
operations. Confl icts may arise in areas such as pricing of products and services,
allocation of resources (e.g., advertising budget), and logistics services provided
by the offl ine activities to the online activities (e.g., handling of returns of items
bought online). To minimize this type of confl ict, companies may separate the
online division from the traditional division. The downside is that separation can
increase expenses and reduce the synergy between the two organizational parts.
3. Managing order fulfi llment and logistics. Online retailers face tough order fulfi ll-
ment and logistics problems when selling online because of the need to design
systems to accept and process a huge volume of small orders, to physically pick
items from warehouse shelves and put them into boxes, to be sure that the cor-
rect labels are applied, and to accept returns. The return process is referred to as
reverse logistics.
4. Determining viability and risk of online retailers. Many pure online retailers
went bankrupt in the dot.com era, the result of problems with cash fl ow, custom-
er acquisition, order fulfi llment, and demand forecasting. Online competition,
especially in commodity-type products such as CDs, toys, books, or groceries,
became very fi erce due to the ease of entry into the marketplace. As Porter’s
(2008) fi ve competitive forces model explains, low entry barriers intensify com-
petition in an industry. So a problem most new and established online retailers
face is to determine how long to operate while you are still losing money and
how to fi nance those losses.
5. Identifying appropriate revenue (business) models. One early dot.com model
was to generate enough revenue from advertising to keep the business afl oat
until the customer base reached critical mass. This model did not always work.
Too many dot.coms were competing for too few advertising dollars, which went
mainly to a small number of well-known sites such as AOL, MSN, Google, and
Yahoo. In addition, there was a “chicken-and-egg” problem: Sites could not
get advertisers to come if they did not have enough visitors. To succeed in
e-commerce, it is necessary to identify appropriate revenue models and modify
those models as the market changes.
Channel conflict:
Competition between a
manufacturer’s distribution
partners who sell through
different channels. Channel
conflict can occur at the
wholesale, retail, or internal
sales department level.
ONLINE BUSINESS AND
MARKETING PLANNING
Online marketing planning is very similar to any other marketing plan. It is not a
best practice, though, and somewhat strange, to devise separate online and offline
plans because that is not how customers perceive a business. Here are several online
business and planning recommendations:
1. Build the marketing plan around the customer, rather than on products.
2. Monitor progress toward the one-year vision for the business in order to identify
when adjustments are needed, and then be agile enough to respond.
3. Identify all key assumptions in the marketing plan. When there is evidence that
those assumptions are wrong, identify the new assumptions and adjust the plan.
4. Make data-driven, fact-based plans.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 276 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.3 Business to Business (B2B) E-commerce and E-procurement 277
Questions
1. Describe how digital content and services can lead to signifi cantly lower
costs.
2. Why does channel confl ict sometimes occur when companies sell their
products through both traditional and online channels?
3. How has Amazon maintained its competitive edge?
4. Describe some of the ways that Ally Bank has become one of the most
successful direct banks in the industry today.
5. Explain why retail banking has become one of the least trusted indus-
tries by consumers since the early 2000s.
6. List three online marketing planning recommendations.
In business-to-business (B2B) markets, the buyers, sellers, and transactions
involve only organizations. B2B comprises about 85 percent of e-commerce dol-
lar volume. It covers applications that enable an enterprise to form electronic
relationships with its distributors, resellers, suppliers, customers, and other part-
ners. By using B2B, organizations can restructure their supply chains and partner
relationships.
There are several business models for B2B applications. The major ones are
sell-side marketplaces and e-sourcing (the buy-side marketplace).
8.3 Business to Business (B2B) E-commerce and E-procurement
SELL-SIDE
MARKETPLACES
In the sell-side marketplace model, organizations sell their products or services to
other organizations from their own private website or from a third-party site. This
model is similar to the B2C model in which the buyer is expected to come to the
seller’s site, view catalogs, and place an order. In the B2B sell-side marketplace,
however, the buyer is an organization. The two key mechanisms in the sell-side
model are forward auctions and online catalogs, which can be customized for each
buyer.
Sellers such as Dell Computer (dellauction.com) use auctions extensively. In
addition to auctions from their own websites, organizations can use third-party auc-
tion sites, such as eBay, to liquidate items. Companies such as Overstock.com help
organizations to auction obsolete and excess assets and inventories.
The sell-side model is used by hundreds of thousands of companies and is
especially powerful for companies with superb reputations. The seller can be
either a manufacturer (e.g., IBM), a distributor (e.g., avnet.com is an example
of a large distributor in IT), or a retailer (e.g., Walmart.com). The seller uses
e-commerce to increase sales, reduce selling and advertising expenditures,
increase delivery speed, and reduce administrative costs. The sell-side model is
especially suitable to customization. For example, organizational customers can
configure their orders online at cisco.com and other sites. Self-configuration of
orders results in fewer misunderstandings about what customers want and much
faster order fulfillment.
E-SOURCING E-sourcing refers to many different procurement methods that make use of an
electronic venue for identifying, evaluating, selecting, negotiating and collaborating
with suppliers. The primary methods are online auctions, RFQ (request for quote)
processing, and private exchanges. E-sourcing also applies to many other secondary
activities, which add to the cycle time and transaction costs when performed using
traditional methods. Secondary activities include trading partner collaboration,
contract negotiation, and supplier selection.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 277 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
278 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
E-PROCUREMENT Corporate procurement, also called corporate purchasing, deals with the transac-
tional elements of buying products and services by an organization for its opera-
tional and functional needs. Organizations procure materials to produce finished
goods, which is referred to as direct procurement, and products for daily opera-
tional needs, which is referred to as indirect procurement. E-procurement refers to
the reengineered procurement process using e-business technologies and strategies.
Strategies and solutions linked to e-procurement have two basic goals:
• Control costs: The first goal is to control corporate spending. Organizations
want to spend intelligently for procurement activities to maximize the value
of their spending, that is, to ensure that money spent to procure items results
in procuring the right products at the best value. Corporate e-procurement
constitutes a substantial portion of an organization’s operational spending.
For example, it is common for large manufacturing organizations to spend
millions of U.S. dollars procuring products and services. Organizations thus
design e-procurement systems to facilitate and control overall procurement
spending.
• Simplify processes: The second goal is to streamline the procurement pro-
cess to make it efficient. Inefficiencies in the procurement process introduce
delays in ordering and receiving items and tax internal resources.
The two goals of cost control and streamlining can be met in three ways:
1. Streamline the e-procurement process within an organization’s value chain. Do-
ing so reduces the number of employees needed to process purchasing, reduces
the procurement cycle time to order and receive items, and empowers an organi-
zation’s staff with enough information about the products and services to enable
them to make intelligent decisions when procuring items.
2. Align the organization’s procurement process with those of other trading part-
ners, which belong to the organization’s virtual supply chain. Alignment can be
achieved by automating the process from end-to-end, including trading partner’s
systems, and simplifi es the buying process. This enables suppliers to react effi –
ciently to buyers’ needs.
3. Use appropriate e-procurement strategies and solutions. Organizations analyze
spending patterns in an effort to improve spending decisions and outcomes.
PUBLIC AND PRIVATE
EXCHANGES
Exchanges are sites where many buyers and sellers conduct business transactions.
They may be public or private, depending on whether or not they are open to the
public.
Vertical exchanges serve one industry (e.g., automotive, chemical), along
the entire supply chain. Horizontal exchanges serve many industries that use the
same products or services (e.g., office supplies, cleaning materials). Four types of
exchanges are:
1. Vertical exchanges for direct materials. These are B2B marketplaces where
direct materials—materials that are inputs to manufacturing—are traded, usually
in large quantities in an environment of long-term relationship known as system-
atic sourcing. An example is PlasticsNet.com, a vertical marketplace for industry
professionals.
2. Indirect materials in one industry are purchased as needed using a practice
called spot sourcing. Buyers and sellers may not even know each other. In verti-
cal exchanges, prices change continuously (like a stock exchange), based on the
matching of supply and demand. Auctions are typically used in this kind of B2B
marketplace. Some question exists as to how viable the market is for this type
of exchange. Several companies that have been previously cited as successful
indirect material vertical exchanges have gone out of business: paperexchange.
com, chemconnect.com, esteel.com, and Altra Energy Technologies.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 278 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.4 Mobile Commerce 279
3. Horizontal exchanges. These are many-to-many e-marketplaces for indirect ma-
terials, such as offi ce supplies, light bulbs, and cleaning materials used by any in-
dustry. Because these products are used for maintenance, repair, and operations
(and not resold to generate revenue), these indirect supplies are called MRO
supplies. Prices are fi xed or negotiated in this systematic exchange. Examples
are Worldbid.com, Globalsources.com, and Alibaba.com.
American Express applied its own experience in indirect purchasing to
develop tools that improve compliance with established procurement rules on
indirect purchases, or MRO supplies. Instead of a pile of catalogs or personal
supplier preferences, the system relies on a master catalog that lists only
approved products from authorized vendors. One of the big gains is the elimination
of maverick buying. Maverick buying is outside the established system. If the
procurement process is too complicated, people will go outside the system, and
buy from a local vendor. Maverick buying can prove costly not only because that
vendor’s prices may be high, but it can also keep the company from achieving
volume levels that could trigger a new tier of discounts.
Since catalog purchases have high transaction costs, American Express put
catalogs from multiple suppliers and from various categories of spending into its
master catalog, CatalogPro. This catalog makes it easier for users to fi nd the right
items and purchase at contract rates.
4. Functional exchanges. Needed services such as temporary help or extra space
are traded on an as-needed basis. For example, Employease.com (recently pur-
chased by ADP) can fi nd temporary labor using employers in its Employease
Network (eease.com). Prices are dynamic, and vary depending on supply and
demand.
Another important facet of managing procurement is demand management—
knowing or predicting what to buy, when, and how much. The best procurement
cost is zero, when people are not buying what they do not need.
Questions
1. Briefl y differentiate between the sell-side marketplace and e-sourcing.
2. What are the two basic goals of e-procurement? How can those goals
be met?
3. What is the role of exchanges in B2B?
4. Explain why maverick buying might take place and its impact on
procurement costs.
In 1997 two Coca-Cola vending machines that accepted payment via SMS text mes-
sage were installed in Helsinki, Finland. Ever since, industry experts and pundits
have been predicting that mobile commerce was about to become “the next big
thing” in marketing and the sale of consumer goods. Before we explore how mobile
commerce has evolved since 1997, let us define some terms related to this topic:
Mobile commerce, or m-commerce: The buying or selling of goods and services
using a wireless, handheld device such as a cell phone or tablet (slate) computer.
Mobile e-commerce: The use of a wireless handheld devices to order and/or
pay for goods and services from online vendors. Example: Ordering a pair of
shoes from Zappos.com using a mobile app, or purchasing music from iTunes
from your iPod.
8.4 Mobile Commerce
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 279 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
280 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
Mobile retailing: The use of mobile technology to promote, enhance, and add
value to the in-store shopping experience. Example: Using a coupon on your
cell phone when checking out at the Hard Rock Café, or “checking-in” to a retail
location using a mobile app from ShopKick.com or Foursquare.com.
Mobile marketing: A variety of activities used by organizations to engage,
communicate, and interact over Wi-Fi and telecommunications networks with
consumers using wireless, handheld devices. Example: Sending special offers to
customers who have opted-in to receive discounts via SMS text message or adver-
tising a brand on a popular mobile game app like Angry Birds. For additional
illustrations of mobile marketing, see IT at Work 8.3.
These four terms are not mutually exclusive. Mobile e-commerce, mobile retail-
ing, and mobile marketing are all forms of mobile commerce. Mobile e-commerce
emphasizes the use of mobile apps and mobile websites for carrying out transac-
tions and does not necessarily involve interaction with a traditional retail store.
Mobile retailing, on the other hand, emphasizes in-store shopping using a mobile
device, but could include situations where the customer ultimately orders from a
website or mobile app. Mobile marketing is the term used to describe promotional
strategies and tactics that encourage both mobile e-commerce and mobile retail.
This overlap is a reflection of the evolution toward the omni-channel retail concept
discussed earlier in the chapter (see Figure 8.4).
Although there have been some interesting and even successful examples of
m-commerce since 1997, predictions about mobile technology becoming a pervasive
force in consumer retailing have proven overly optimistic. There are several reasons
why consumers and businesses have been slow to embrace m-commerce:
• Relatively primitive mobile devices (compared to modern smartphones and
tablets)
• Concerns about privacy and security
• Slow network connection speeds
• Limited market size
• Limited and inconvenient mobile payment options
• Lack of technological standardization (devices, OSs, browsers, etc.)
However, many of these barriers have been reduced or eliminated. As you read
in the previous section, the number of people who now own mobile devices, particu-
larly smartphones, has grown dramatically. According to one widely quoted statistic,
more people own cell phones today than own toothbrushes! Telecommunications
carriers have expanded their coverage of populated areas using high-speed net-
works. Modern smartphones and tablet devices have features that make shopping
via bright colorful screens fun and easy. While security will always be an evolv-
ing concern, consumer comfort with completing transactions on mobile devices
continues to grow. A number of mobile payment methods are emerging that are
more convenient than traditional transaction methods. So after years of waiting, it
appears the stage is finally set for earlier predictions about m-commerce to come
true. In this section, we will describe some of the many ways businesses and con-
sumers are using mobile technologies to buy and sell goods and services.
INFORMATION:
COMPETITIVE
ADVANTAGE IN
MOBILE COMMERCE
Integrating mobile technology with a brand’s retail and e-commerce strategy pro-
vides another important benefit to business: customer information and identifica-
tion. When customers interact with a brand using a mobile device, information
is collected about the customer that can be used to optimize the interaction. For
instance, when customers use a brand’s mobile app to shop for products, their
shopping experience can be customized based on the company’s knowledge of
previous purchases, payment methods, product preferences, and even location.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 280 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.4 Mobile Commerce 281
In-Store Tracking. In-store shopping experiences can be optimized through mobile
technology that can track a customer’s movement through a retail store. This is
analogous to e-commerce sites that track the pages a customer looks at in order to
better understand consumer interests and to make decisions about website design.
Tracking how a customer moves through a store, noting what displays the cus-
tomer looks at, or what departments the customer spends the most time in can be
extremely helpful for understanding individual consumer preferences as well as cre-
ating optimal store layout. Systems for tracking customers based on signals emitted
from cell phones and other mobile devices are under development. It is expected
that they will be available on a commercial basis in the near future.
Although the goal of in-store tracking is to provide an enhanced shopping
experience for the consumer, most people are likely to find this kind of monitoring
a violation of privacy. In plain language, many will find it creepy. Businesses that
are not careful about how they implement these programs will experience customer
backlash and may even run afoul of new privacy laws and regulations. Therefore, it is
important that brands involved in mobile e-commerce and mobil retailing have clear
privacy statements and use an opt-in system to obtain permission from customers
before tracking their online and offline shopping behaviors. Customers are generally
willing to give up some degree of privacy as long as companies explain how collecting
the information will benefit them and identify the safeguards used to protect custom-
ers’ information. Companies often reward customers for providing information and
opting-in to monitoring programs. This is generally accomplished through loyalty
programs that offer discounts and special premiums to customers who opt-in.
Few businesses fully utilize mobile tracking and monitoring systems at present.
But as brands become more sophisticated with mobile technology, it is expected
they will strive to gain a competitive advantage by using this information to provide
better service, convenience, and a more enjoyable shopping experience, both online
and in traditional stores.
Quick Response (QR) Codes. In Japan, many products are tagged with QR codes.
Consumers in that country frequently scan QR codes to access product informa-
tion from a mobile device. Using a barcode scanner app and the camera feature
of a mobile device, customers scan the QR code containing a link to an Internet
webpage. You read in the case at the beginning of this chapter how Macy’s uses
QR codes on in-store displays to direct customers to promotional videos that fea-
ture its products. The QR code is supposed to be an easier alternative to typing a
URL address into a mobile browser (see Figure 8.7). While QR codes have not
been as popular in the U.S. as they are in Asia, marketers have used them in print
advertising and direct mail ads with some success. Charitable organizations use
QR codes on the outside of direct mail solicitations. Scanning the code takes the
user to a video explaining the mission of the organization and typically makes a
more compelling request for a donation than is possible through print media.
Figure 8.7 Smartphone users
can scan QR codes that help
them easily access product
information on the Internet
without the hassle of typing
a URL code into a mobile
browser.
Mobile browser: A Web
browser that is optimized
to display Web content
effectively on a small mobile
device such as a smart
phone.
©
p
re
ss
ur
eU
A
/i
St
oc
kp
ho
to
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 281 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
282 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
Additionally, responses to the QR code promotions can be tracked and used to
evaluate program effectiveness.
Some experts believe, however, that QR code technology is never going to be
as popular in the U.S. as it is in Asia. They cite studies that report many smartphone
users simply do not know what to do with a QR code. Other research suggests that
users think the scanning process is either inconvenient or that QR codes frequently
direct users to pages that do not really contain anything of interest. For QR codes
to become something American consumers use frequently, businesses will have
to prove that they help mobile users find content that is interesting and valuable.
Mobile visual search technology is emerging as an alternative to QR codes. See
Video Case 8.3 at the end of this chapter for additional information.
Mobile visual search
engine: A search engine that
uses an image instead of a
text-based query to search
for information on the Web.
Have you ever played popular mobile games like Angry Birds
(Figure 8.8), Candy Crush, or the highly addictive Flappy
Bird? Media research firm Nielsen (2011) reports that games
are the most popular mobile apps in the U.S. While many
apps in this category are free, 93 percent of app download-
ers are willing to pay for game apps, compared to 76 percent
for news apps, another popular category. Mobile gamers
spend an average of 7.8 hours a month playing games, but
smartphone users appear to be heavier users of this cat-
egory, with iPhone owners playing 14.7 hours/month and
Android owners playing 9.3 hours/month. Reports of market
size and growth rates differ on the exact amounts, but agree
this category is sizable and growing rapidly. Estimates of
2013 mobile game revenue range from approximately $12
billion to $17 billion and analysts predict the market could
grow to as much as $22 billion by 2015.
To put this in perspective, in 2009, iOS and Android
mobile gaming apps accounted for just 11 percent of the
portable (handheld) gaming market dominated by Sony and
Nintendo. By 2013, mobile games accounted for 27 percent
of the gaming market and are projected to rise to 35 percent
by 2017. Clearly, mobile gaming apps have become a dis-
ruptive force in the marketplace, displacing two historically
strong companies. Even more impressive is the fact that the
above statistics are based on revenues produced by paid
downloads and don’t reflect the millions of free games
downloaded every year. Many mobile games are available as
free apps supported by advertising revenues. Some analysts
estimate that ad revenue produced by mobile games was
approximately $297 million in 2013 (eMarketer, 2013).
Sources: Compiled from Dotson (2012), Nielsen (2011), Asante (2012),
eMarketer (2013).
Questions
1. Why did established companies like Nintendo and Sony
fail to gain an early position in the growing mobile gaming
market?
2. How are mobile games different from traditional video
games? What advantages do mobile game apps have
over traditional video games?
3. Gaming and social media are among the most popular
mobile app categories in the U.S. What do you think this
says about the role of mobile devices in the lives of U.S.
consumers?
4. Since many gaming apps are free, how do developers
make money in this category?
IT at Work 8 . 3
Angry Birds Make Mobile Game Developers Happy
Figure 8.8 Angry Birds is such a popular mobile game
that it generates additional revenue from sales of
clothing, plush toys, posters, lunch boxes, and even
bed linens.
©
Ia
n
D
ag
na
ll/
A
la
m
y
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 282 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.4 Mobile Commerce 283
MOBILE
ENTERTAINMENT
Mobile entertainment is expanding on wireless devices. Most notable are music,
movies, videos, games, adult entertainment, sports, and gambling apps. For more
information about the most popular mobile app category, mobile gaming, see IT at
Work 8.3.
Sports enthusiasts enjoy a large number of apps and services on their mobile
devices. Apps exist to check game scores; track news about specific athletes, teams,
or sports; take part in fantasy team contests like fantasy football; and participate
in sports-oriented social networking services. A number of sports-related games
like mobile golf and sports trivia apps are widely available. There are even apps
designed to provide tips and information for improving your own athletic perfor-
mance. Apps are available to record workout times, schedule training exercises,
record heart rates and a variety of other information related to athletic training.
The iPhone even has an app that analyzes a person’s golf swing and provides advice
for improving performance.
ESPN is widely acknowledged as a leader in mobile marketing to the sports fan.
It offers a number of popular branded mobile apps that deliver information and
entertainment to its target audience. It also utilizes well-designed mobile websites
and has a large database of fans that have opted-in to receive sports-related news
alerts sent to their phones via text messages.
Industry analysts predict that recent improvements in mobile devices will lead
to an even bigger increase in the number of people who watch video clips, movies,
and television programming on their mobile devices. The screen size of devices
like Apple’s iPad makes watching video programming more attractive than on a
smartphone. However, the number of people viewing video on smartphones seems
to be increasing as well (Google, IPSOS OTX MediaCT, 2011). Companies like
theChanner.com offer television programming to mobile device users. Popular
streaming services such as Netflix and Hulu now offer mobile apps for iOS and
Android devices.
The iTunes Store continues to be a leading in distributor of digital music,
movies, TV shows, e-books, and podcasts available to consumers for a fee. While
most iTunes content is available to be purchased, there are frequently e-books,
movies, and other digital content available for free. Mobile users can also access
music from digital streaming sites like Pandora.com and Grooveshark.com. Both
of these services offer free streaming music. Users can upgrade their accounts by
paying a subscription fee, which then reduces the amount of advertising they are
exposed to.
While still relatively small, the mobile gambling industry is expected to grow
substantially over the next few years. Some predict this type of mobile com-
merce could generate as much as $20 billion in the near future. Primary growth
of this market is expected to take place in Japan and other Asian countries, such
as horse racing in Hong Kong. Current laws in the U.S. prohibit most forms of
online gambling; consequently, gambling via mobile devices is largely unavail-
able in the U.S.
Many mobile apps are available for consumers interested in home-based enter-
tainment activities. The Food Network offers an app with tips and recipes for fine
dining and entertaining. Martha Stewart’s Digital Magazines publishes a number
of home entertainment and lifestyle mobile apps (see marthastewart.com/apps).
Mobatech is the maker of a mobile bartending app with numerous recipes for cock-
tails and party drinks.
HOTEL SERVICES AND
TRAVEL GO WIRELESS
In recent years, smartphones and other mobile devices have become essential
travel aids. Most major airlines, hotel chains, and Internet travel agencies have
developed mobile apps to help travelers manage their arrangements. Airlines
frequently give passengers the option of receiving up-to-date information about
their flights via SMS text messaging. Google Maps is perhaps one of the most
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 283 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
284 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
popular apps used by travelers, particularly those traveling by automobile. Even
AAA, the automobile club, has a mobile app that helps drivers plan their trips
and an app for drivers who need roadside assistance. Other interesting mobile
travel tools include apps that translate text when traveling abroad, apps for
finding nearby Wi-Fi hotspots, and apps created by a number of popular travel
guides.
Most large hotels chains and many independent hotels and inns offer guests
in-room, wireless high-speed Internet connections, although this is not always a
free service. Some of these same hotels offer Wi-Fi Internet access in public areas
like the lobby and meeting rooms. Larger hotel chains have apps that allow guests
to make reservations, check their bills, and locate hotel services using a mobile
app. Starwood, Hilton and other hotels are experimenting with mobile check-in
programs whereby guests use their mobile devices to gain access to their rooms
using NFC or SMS text message technology. This makes it possible to check-in to
the hotel without having to stop first at the front desk. Many airlines now offer
travelers the option of loading a boarding pass onto their mobile devices (see
Figure 8.9).
Figure 8.9 Travelers use
mobile apps to book
reservations, fi nd directions,
and locate reviews and
recommendations for a
wide range of travel and
hospitality services.
MOBILE SOCIAL
NETWORKING
People are increasingly using mobile devices to connect with social networking sites
such as Facebook and Twitter. According to Nielsen (2011), social media apps are
the third most popular kind of mobile app (after games and weather apps). Much
like Web-based social networking, mobile social networking occurs in virtual com-
munities. All of the most popular social networking sites offer apps that allow users
to access their accounts from a smartphone or other mobile device. Some experts
predict that mobile social media will continue to be a primary driving force in the
growth of the mobile market.
Industry analysts expect advertising in the mobile chan-
nel to heat up. Increasing numbers of smartphones, better
browsers, enhanced GPS capabilities, and better ways of
measuring advertising effectiveness are all factors powering
this growth. The following are a few examples of wireless
advertising in action.
IT at Work 8 . 4
Wireless Marketing and Advertising in Action
©
A
le
ks
an
d
ra
G
ig
ow
sk
a/
Sh
ut
te
rs
to
ck
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 284 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.4 Mobile Commerce 285
Location-Based Marketing. Foursquare.com is one of the
most popular apps in the growing field of mobile location-
based marketing and mobile advertising. The Foursquare
app makes use of the mobile device’s GPS system to
determine the user’s location. Part of Foursquare’s success
is the fact that most users do not view it as an advertising
program. Structured as a mobile social media game, users
“check-in” from their phones when they visit retail shops
and restaurants. Users provide information and ratings
based on their reaction to these outlets. This information
is shared with advertisers and friends who are also part of the
Foursquare network. Foursquare develops a profile of users
based on the kinds of businesses they frequent and can use
this information to better target consumers with advertising
messages. Foursquare reinforces member use of the service
by awarding badges to members for various types and levels
of usage. Members who are the most frequent shoppers at
a particular location are awarded the title of Mayor and may
receive special attention and discounts from the retailer.
The company provides advertisers with information about
target customers that they usually do not have: their loca-
tion. This helps advertisers deliver timely messages that can
be more relevant and meaningful to consumers, increasing
the chances that the ads will lead to a purchase transaction.
See Figure 8.10.
Another popular location-based mobile marketing app is
Shopkick. When the Shopkick app is activated, users receive
points when they visit a participating retailer. Retailers use
the app to encourage and reward specific kinds of shopper
behavior. Shopkick points are used to reward consumers for
visiting specific locations in a store, purchasing products,
scanning featured products, and even participating in brief
surveys. Shoppers often receive targeted discounts and pro-
motional offers when they are in a store. Shopkick users can
trade in their points for restaurant vouchers, iTunes cards, or
gift cards from participating retailers.
Augmented Reality (AR). These apps utilize a special tech-
nology that will become more commonplace in the future.
Augmented reality involves computer-generated graphic
images that are superimposed on pictures of real things
(e.g., people, rooms, buildings, roads, etc.). This technology
can be used by advertisers in several ways. For instance, a
mobile phone user might point his or her phone camera at
an office building and activate an AR app that generates the
logos of all food-service outlets (e.g., Starbucks, Subway,
McDonalds) inside the building. Furniture retailer IKEA offers
shoppers an AR app that allows them to project images of its
products onto pictures of the rooms in their homes so they
can “visualize” how the products will look (MobiAdNews.
com, 2009). Industry experts expect that AR advertising will
grow as smartphone users become more familiar with the
concept (see Figure 8.11).
Figure 8.10 The NBC Universal store at Rockefeller Center in New York City
encourages customers to check-in to the store using the popular Foursquare app.
Mobile location-based
marketing: a marketing
strategy that uses informa-
tion from a mobile device’s
GPS or customer’s mobile
check-in on a social network
to determine the content of
marketing communications
they receive on the device
(e.g., advertisements,
coupons, special offers).
©
R
ic
ha
rd
L
ev
in
e/
A
la
m
y
Jo
n
Si
m
on
F
ea
tu
re
P
ho
to
S
er
vi
ce
/N
ew
sC
om
Figure 8.11 IBM’s augmented reality shopping
app automatically delivers personalized coupons,
customer reviews, and hidden product details (such as
whether packaging is biodegradable) to smartphones
as consumers browse store shelves. The app transforms
marketing promotions from intrusions into services
that customers welcome.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 285 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
286 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
Mobile Directories. Companies like Signal Mind, Mobile
Marketing Studio, and Mowbi Mobile Directories sell mobile
directory software to businesses and organizations that want
to create local mobile directories. Businesses that purchase
these apps can generate revenue by selling listings in their
directory and offering a variety of marketing promotions, like
mobile coupons, to companies that pay to be listed in the
directory. Another popular directory service, Yellow Pages,
uses augmented reality as part of its mobile strategy. You
can find several interesting examples of augmented reality
applications on YouTube. Simply go to YouTube and enter
“augmented reality” in the search engine.
Sources: Compiled from Moore (2010) and Whitfield (2010).
Questions
1. Although the benefits of location-based apps for busi-
ness are perhaps obvious, many previous attempts to get
people to use apps that identify their location have met
with limited results. Why do you think consumers are less
enthusiastic about location apps and what would it take
to prompt people to use a location-based app regularly?
2. Review the Foursquare and Shopkick apps and explain
which one you think people will be most likely to use.
Explain your answer.
3. At present, augmented reality apps are still relatively
new and have not enjoyed high levels of adoption. What
do you predict will happen with this technology? What
applications of augmented reality seem most interesting
to you? What barriers will have to be overcome to get
people to use this technology?
Questions
1. Describe some of the ways that people are using mobile devices to
shop for products and services.
2. What are some ways in which traditional brick-and-mortar retailers
can use mobile technology to enhance a customer’s in-store shopping
experience?
3. List the types of mobile entertainment available to consumers.
4. List some ways that travelers and travel-related businesses are using
mobile technology.
5. How are companies using QR codes to promote products and services
to mobile consumers? Why are QR codes not as popular in the U.S. as
they are in Asia and other parts of the world?
6. Explain why the mobile gaming market represents such a lucrative
market opportunity.
8.5 Mobile Transactions and Financial Services
MOBILE PAYMENT
SYSTEMS
Consumers use mobile devices for a wide range of shopping or commercial activi-
ties. As discussed in the case at the beginning of this chapter, shoppers are using
mobile devices to compare prices, research products prior to purchase, and identify
alternative product options and alternative retailers. Increasingly, mobile devices are
becoming an attractive way to pay for products. According to comScore’s Mobile
“Future in Focus” report (2012), mobile payment activity during the holiday shop-
ping season (October–December) increased over 80 percent from 2010 to 2011.
Other industry reports, such as the “World Payments Report” (Capgemini et al.,
2011), suggest that the overall use of mobile payment systems will continue to
increase at least 50 percent a year for the next three years. Some forms of mobile
payment represent an attractive option for consumers who do not have credit cards.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 286 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.5 Mobile Transactions and Financial Services 287
Additionally, retailers may benefit from new payment options that carry lower
transaction costs compared to what banks charge when credit cards are used.
As mobile commerce grows, a greater demand exists for payment systems that
make transactions from smartphones and other mobile devices convenient, safe,
and secure. A number of businesses have attempted to meet this demand using a
variety of technologies. There are two basic transaction types of interest: using a
mobile device for the online purchase of goods and services (e.g., ordering a book
from Amazon.com) and for payment of goods and services in a traditional brick-
and-mortar store. Here are examples of some approaches under development:
Charge to Phone Bill with SMS Confirmation (see zong.com and boku.com).
This e-commerce payment solution is a lot easier than entering credit card
and other information on a small mobile handheld device. It requires users to
set up an account with a payment company like zong.com. When completing
an online transaction, users click the “ZONG–Buy with Mobile” button and
enter their phone number. They receive an SMS text message with a secure
PIN number that they enter on the e-commerce website to complete the trans-
action. The amount of the charge is then added to the payer’s phone bill and
the telecom carrier remits this amount to the payee. Telecom companies may
deduct a service charge from the amount paid. (Zong was recently purchased
by PayPal.)
Near-Field Communications (NFC) (see Google Wallet and Isis Mobile
Wallet). Another approach to mobile payment is designed for payments in tra-
ditional retail stores. At check-out, the mobile user simply passes or taps his or
her phone on a merchant terminal and payment is transferred. Users receive an
SMS text message confirmation. While Google Wallet has received consider-
able attention in the technology press, in part because of Google’s power and
influence in the industry, relatively few consumers can use this option. Only a
small number of phones have the required NFC feature. Additionally, the pro-
gram is only available to people with Citi MasterCard with PayPass or Google’s
prepaid credit card. To be successful, the program will have to expand beyond
these limitations.
Phone-Displayed Barcode That Retailer Scans. A number of companies are
developing mobile payment systems that generate a QR code on the user’s
phone, which is, in turn, scanned by the retailer. Starbucks uses this approach
with its mobile payment system (Tsirulnik, 2011). Customers create an
account with Starbucks as part of the retailer’s loyalty program and transfer
money to a prepaid account. Upon check-out, a user activates the Starbucks
app, which creates a barcode that can be scanned at check-out. The funds
are then deducted from the user’s account. Other companies are working on
programs that could be used at a variety of retailers, much as you currently
use a credit card.
Credit Card Webform. Using a mobile Web browser, the buyer makes online
purchases by entering his or her credit card number and other identifying
information just the way that person would if using a personal computer. This
process can be cumbersome given the smaller screens and keyboards on most
mobile devices, but it is an option.
Transfer of Funds from Payment Account Using SMS (see obopay.com and
paypal.com). Using this approach, the user creates an account at a company
like obopay.com and transfers money into it from a bank or credit card account.
Using a mobile phone and SMS, the user can then transfer money to anyone
else with a mobile phone number. The receiver must create an account at the
payment company in order to retrieve the funds.
Mobile Phone Card Reader (see Square.com and Paypal.com). This novel
approach requires mobile phone users to insert a small card reader into the
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 287 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
288 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
audio jack of their mobile device. The card reader, which resembles a small
cube (Square) or pyramid (PayPal), allows those with accounts at Square or
PayPal to make or receive credit card payments without a merchant account.
See Figure 8.12.
User Scan of 2D Tags Generated by Retailer (see Cimbal.com). This payment
system uses QR codes or 2D tags (a barcode-like image) to identify the mer-
chant or payee. The buyer scans the merchant’s tag using a special smartphone
app and then approves a funds transfer when it shows up on the device. Person-
to-person transfers are also possible since the app can generate custom QR tags
that individuals may scan from one another’s mobile devices.
Almost all of the payment systems described above are illustrated by
videos on Youtube.com. Interested readers are encouraged to view these video
resources for a more complete explanation of how the different mobile payment
systems work.
Wireless payment systems transform mobile phones into secure, self-
contained purchasing tools capable of instantly authorizing payments over
the cellular network. One advantage of many mobile payment systems over
traditional credit card systems is the ability to handle micropayments, or
transactions involving relatively small sums of money. The ability to make
micropayments allows individuals to use their mobile devices to do things
like purchase a beverage from a vending machine or make a payment to a
municipal parking meter. Many cities in Europe, and a growing number in
the U.S., have adopted mobile phone payment systems for parking and report
dramatic increases in revenue because of the reduction in loss due to theft and
broken meters, and the reduced expense associated with collecting cash from
traditional meters.
Mobile Bill Payments. In addition to paying bills through wireline banking or
from ATMs, a number of companies are now providing their customers with the
option of paying bills directly from a cell phone. Western Union, HDFC Bank in
India, Citibank, and several other institutions worldwide currently offer mobile
bill payment services. This trend is proving particularly attractive to mobile users
in developing countries where many people do not have bank accounts.
Figure 8.12 With a small
card reader plugged into a
mobile device, merchants
and individuals can accept
credit card payments.
MOBILE BANKING AND
FINANCIAL SERVICES
Mobile banking is generally defined as carrying out banking transactions and other
related activities via mobile devices (Figure 8.13). The services offered include bill
payments and money transfers, account administration and checkbook requests,
balance inquiries and statements on an account, interest and exchange rates, and
so on.
©
P
ho
to
In
c/
iS
to
ck
p
ho
to
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 288 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
8.5 Mobile Transactions and Financial Services 289
Banks and other financial institutions allow customers to use mobile devices for
a wide range of services (see Table 8.2).
People access financial services using a combination of mobile media channels
including short message service (SMS), mobile Web browsers, and customized apps.
Mobile banking is a natural extension of online banking services, which have grown
in popularity over the last decade.
Throughout Europe, the U.S., and Asia, an increasing percentage of banks
offer mobile access to financial and account information. In 2009 ABI Research
evaluated 29 U.S. banks on accessibility of their mobile banking services. Six of
the banks received top marks: BB&T, Eastern Bank, Fifth Third Bank, Northeast
Bank, USAA, and Wells Fargo. Bank of America and Chase also received positive
evaluations.
In Sweden, Merita Bank has pioneered many services and the Royal Bank of
Scotland offers mobile payment services. Banamex, one of Mexico’s largest banks,
is a strong provider of wireless services to customers. Many banks in Japan allow
all banking transactions to be done via cell phone. Experts predict that growth in
the mobile banking services sector could reach between 894 million and 1.5 billion
customers globally by 2015. The Asia-Pacific region is expected to emerge as the
predominant market for mobile banking services (berginsight.com, 2010, Global
Industry Analysts, 2010).
TABLE 8.2 Most Common Mobile Banking Services
Account alerts, security alerts, and reminders
Account balances, updates, and history
Customer service via mobile
Branch or ATM location information
Bill-pay (e.g., utility bills) and delivery of online payments by secure agents and
mobile phone client apps
Funds transfers
Transaction verifi cation
Source: Mobile Marketing Association (2009).
Figure 8.13 Mobile banking,
stock trading, and payment
services have increased in
recent years. ©
b
lo
om
ua
/S
hu
tt
er
st
oc
k
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 289 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
290 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
SHORT CODES Banks and financial service organizations have two basic options for providing
mobile services. Smartphone users can download dedicated apps to conduct bank-
ing transactions. The other option is to provide service through SMS (text message)
technology. As you know, text messaging is still widely popular, even with people
who use smartphones. Many mobile financial services make use of short codes for
sending SMS texts. A short code works like a telephone number, except that it is
only five or six characters long and easier to remember. Businesses lease short codes
from the Common Short Code Association (CSCA) for $500 to $1,000 a month. The
lower price is for randomly assigned codes, whereas companies that want a specific
short code pay a higher monthly rate. Once a company has leased its short code, it
can begin using that code in promotions and interactive exchanges with customers.
Short codes are used for a wide variety of SMS text services, not just financial
services. For example, voting on the popular television show American Idol is done
with short codes. Each contestant is assigned a specific short code and viewers are
encouraged to send text messages indicating which performer they like the best.
The annual MTV Movie Awards also uses short code voting, which allows viewers
to pick the winning entry in certain prize categories. On some telecommunications
networks, ring tones are sold using short codes and SMS texts.
TABLE 8.3 Mobile Banking Security Risks
Cloning Duplicating the electronic serial number (ESM) of one phone and using
it in second phone, the clone. This allows the perpetrator to have calls and other
transactions billed to the original phone.
Phishing Using a fraudulent communication, such as an e-mail, to trick the
receiver into divulging critical information such as account numbers, passwords,
or other identifying information.
Smishing Similar to phishing, but the fraudulent communication comes in the
form of an SMS message.
Vishing Again, similar to phishing, but the fraudulent communication comes in
the form of a voice or voicemail message encouraging the victim to divulge
secure information.
Lost or stolen phone Lost or stolen cell phones can be used to conduct fi nancial
transactions without the owner’s permission.
Sources: Compiled from Howard (2009), McGee (2008), and Mobile Marketing
Association (2009).
SECURITY ISSUES At present, the benefits associated with mobile banking seem to outweigh potential
security threats. However, as the number of people who engage in mobile banking
increases, the likelihood that criminals will target mobile financial activity is sure to
grow as well. What kinds of threats exist to mobile banking? Table 8.3 lists the most
common mobile banking risks.
Questions
1. What are the two basic technologies used for mobile banking and
fi nancial services?
2. Why have e-wallets not been widely adopted and what will makers of
e-wallets need to do to make this payment method more attractive to
consumers?
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 290 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
Assuring Your Learning 291
3. What are the most common types of mobile banking activities consumers
perform?
4. What are the most common security risks associated with online retailers?
5. Research some of the mobile payment systems currently available to
merchants and consumers.
6. What is a micropayment and why is it benefi cial to consumers and
businesses that mobile payment systems can process these types of
transactions?
Key Terms
2D tags
augmented reality
barcode
digital dependents
digital immigrants
digital natives
disruptive innovation
electronic fund transfer
(EFT)
electronic wallet (e-wallet)
e-procurement
e-sourcing
horizontal exchanges
in-store tracking
micropayments
mobile check-in strategy
mobile commerce,
m-commerce
mobile display strategy
mobile location-based
marketing
mobile marketing
mobile payment
mobile retailing
mobile visual search
engine
omni-channel retailing
quick response (QR)
codes
short code
short message service
(SMS)
showrooming
SMS database strategy
social commerce
Assuring Your Learning
1. What is showrooming? Are customers who engage
in it acting ethically? Provide reasons for your
answer.
2. What are some creative and constructive ways for
traditional retailers to respond to showrooming?
3. Describe the ways in which online retailer Amazon.
com has acted strategically to maintain its position
as a leading e-commerce site. What does this suggest
about what it takes to be successful in e-commerce
today?
4. How is Amazon’s investment in the Kindle and
e-books consistent with other trends in consumer
behavior today?
5. Why is mobile technology potentially important to
the banking industry? What consumer needs does it
fulfi ll?
6. Identify and describe fi ve key challenges faced by
online retailers in the market today.
7. Why is the online B2B market so much larger than
the online B2C market?
8. Explain the fundamental difference between buy-
side and sell-side exchanges in the online B2B
market.
DISCUSS: Critical Thinking Questions
9. What is the difference between direct procurement
and indirect procurement? Why do you think this
distinction is important?
10. What are the two primary goals of companies who
engage in e-procurement and what strategies do
they use to achieve those goals?
11. Discuss the benefi ts of a B2B exchange to sellers
and buyers.
12. Discuss the various ways to pay online in B2C.
13. Why do you think that company employees engage
in maverick buying? What can companies do to
limit maverick buying?
14. Explain how mobile computing technology is being
used by brick-and-mortar retailers to enhance the
in-store shopping experience.
15. QR codes are very popular in Japan and other parts
of Asia. Manufacturers place QR codes on product
packages and advertisements, making it easy for
consumers to access information about the products
using a mobile device. Why do you think QR codes
are not popular with U.S. consumers? Do you think
QR codes will eventually become accepted by U.S.
consumers? Why or Why not?
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 291 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
292 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
16. How are people using mobile devices to conduct
banking and other fi nancial services?
17. Evaluate the various mobile electronic payment
processes described in this chapter. Which do you
think are likely to emerge as the dominant method
for mobile payment? Explain your answer.
18. What are some of the risks faced by consumers who
use mobile devices for banking and other fi nancial
transactions?
19. What are the key benefi ts of using a mobile wallet?
Do you think new improvements to this mobile
application will make it more attractive to end-users?
20. How has mobile computing changed the retail shop-
ping behavior of consumers?
21. Describe the mobile entertainment market and the
ways people can use their mobile devices to have fun.
22. Why is mobile social networking expected to grow
dramatically in the next few years?
23. How is mobile computing creating an attractive
opportunity for advertisers? Will consumers be
receptive to this type of communication? Why or
why not?
24. List some location-based services and explain their
value to both businesses and mobile device users.
1. Assume you are interested in buying a car. You can
fi nd information about fi nancing and insurance for
cars at autos.msn.com or autobytel.com. Decide what
car you want to buy. Confi gure your car by going to
the car manufacturer’s website. Finally, try to fi nd
the car at autobytel.com. What information is most
supportive of your decision-making process? Was the
experience pleasant or frustrating?
2. Visit amazon.com and identify at least three specifi c
elements of its personalization and customization fea-
tures. Browse specifi c books on one particular subject,
leave the site, and then go back and revisit the site.
What do you observe? Are these features likely to
encourage you to purchase more books in the future
from Amazon.com? How does the “One-Click”
feature encourage sales from mobile devices?
3. Read Google’s new privacy policy at www.google.
com/policies/privacy. What types of information does
Google collect about people who use its services?
How can people either restrict or avoid having
Google collect information about them? How does
Google say it uses the information it collects about
people who utilize its services?
4. Conduct a study on selling diamonds and gems on-
line. Each group member investigates one company
such as bluenile.com, diamond.com, thaigem.com,
tiffany.com, or jewelryexchange.com.
a. What features are used in these sites to educate
buyers about gemstones?
b. How do the sites attract buyers?
c. How do the sites increase trust in online
purchasing?
d. What customer service features are provided?
e. Would you buy a $5,000 diamond ring online?
Why or why not?
5. If you have a smartphone, download the shopping
app Shopkick.com. Use the app for a few weeks and
then prepare a report or presentation about your
experience. Describe how Shopkick uses behavioral
reinforcement to encourage specifi c kinds of shop-
ping behaviors (e.g., store visits, looking for promo-
tional products, participating in marketing surveys,
etc.). Explain whether or not you think you will
continue using this application.
EXPLORE: Online and Interactive Exercises
1. Go to nacha.org. What is the National Automated
Clearing House Association (NACHA)? What is
its role? What is the Automated Clearing House
(ACH)? Who are the key participants in an ACH
e-payment? Describe the “pilot” projects currently
under way at ACH.
2. Visit IBM’s “Many Eyes” website at www.ibm.com/
manyeyes. Select visualizations from the left-side
menu bar. Generate two visualizations. How does
visualization improve understanding of the datasets?
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
3. Have each team study a major bank with extensive
e-commerce offerings. For example, Wells Fargo
Bank is well on its way to being a cyberbank.
Hundreds of brick-and-mortar branch offi ces are
being closed. In the spring of 2003, the bank served
more than 1.2 million cyberaccounts (see wellsfargo.
com). Other banks to consider are Citicorp,
Netbank, and HSBC (Hong Kong). Each team
should attempt to convince the class that its e-bank
activities are the best.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 292 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
CASE 8.2 Business Case 293
4. As an independent IT contract worker, you must
often arrange travel to and from your clients’ places
of business. You do not typically have time to always
explore every travel website when planning travel, so
you wish to identify the one that over time will work
the best for you. Working in a small group of three to
four people, use the Internet to explore the follow-
ing travel sites: orbitz.com, travelocity.com, kayak.
com, concierge.com, and expedia.com (search “online
travel sites” for additional options). Select a handful
of travel destinations and see how helpful each site is
in terms of:
a. Finding the lowest airfare.
b. Identifying hotels for business travel.
c. Recommendations for dining and other location-
based services.
d. Evaluate the site for its ability to aid in interna-
tional travel arrangements.
e. Availability and usefulness of travel tips, adviso-
ries, and other helpful information.
Prepare a report comparing how each site performed
in terms of its ease of use, helpfulness, and best over-
all deal. Which site would you recommend?
5. Using Youtube.com or any other video-sharing site,
watch examples of augmented reality handhelds
and promotional campaigns. Write a brief report
describing your reaction to this new technology and
predict if it will become more commonplace in the
future.
CASE 8.2
Business Case: Chegg’s Mobile Strategy
Mobile technologies are considered a disruptive innovation
because they have the capability of transforming traditional
business practices by creating new value networks, spawning
new markets, and eventually displacing earlier technologies.
Popular examples of disruptive innovation include Apple’s
iTunes service that replaced music CDs with downloadable
digital mp3 fi les. Netfl ix and other movie-streaming services
disrupted the previous model of distributing movies on DVDs
through brick-and-mortar retail outlets. Several companies
are now exploring the use of mobile technologies as a disrup-
tive innovation in the college textbook market.
End-users (college students) have traditionally had very
little power in the college textbook market. Textbook pub-
lishers promoted their products to college professors who
decided what books to require for their courses. Competition
at the retail level was for the most part nonexistent—students
almost always had to purchase textbooks from a college
bookstore or a used textbook from another student.
All that began to change, however, with the emergence
of e-commerce. Nowadays, students have a range of options
for purchasing new and used textbooks, renting textbooks,
reading books online, or purchasing textbooks in an e-book
format. Publishers and booksellers who once held fairly
secure positions in the distribution channel now face com-
petition from a variety of nonconventional sources, including
online retailers (e.g., Amazon), C2C e-commerce sites (e.g.,
Craigslist, eBay, half.com), and publishers who sell directly to
students (e.g., Flatworld Knowledge).
Chegg.com
As part of this industry restructuring, Chegg.com began rent-
ing textbooks to students in 2007, creating an alternative to
purchasing from college bookstores and online booksellers
like Amazon.com. While renting textbooks was an innovative
approach at the time, Chegg managers realized that to
remain competitive, they needed to position their company
in a way that was not focused on a particular product form
(e.g., printed textbook) or distribution method (e.g., retail
bookstore). Instead, Chegg set out to create a learning net-
work for students, offering a range of products and services
through various channels that enhance students’ educational
experience. See Table 8.4.
Mobile technology has been a key component of
Chegg’s value strategy from the beginning. In 2009, just two
years after entering the rental market, Chegg created a mo-
bile website and an SMS-based service that made it possible
for students to check rental prices for textbooks by texting
the ISBN number of the book they were interested in. The
following year, Chegg launched an app for iPhone and iPad
users. Android users can still access services from the com-
pany’s well-designed mobile site. In 2012 Chegg launched a
cloud-based e-textbook reader designed to give students
access to their textbooks from a wide range of mobile devices.
While Chegg is not the fi rst company to make textbooks
available online, the e-textbook reader provides powerful
features for highlighting text, taking notes, and checking
word defi nitions. Users can view Key Highlights, or mate-
rial crowdsourced from the highlighting activities of other
students using the reader. Finally, readers can access Chegg’s
Always on Q&A Service, where students ask questions about
various academic subjects and often receive an answer back
from subject matter experts within hours.
Despite Chegg’s innovative and customer-oriented
strategy, it faces an increasingly competitive marketplace.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 293 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
294 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
Well-funded competitors such as Amazon.com and Barnes
& Noble now offer textbook rentals and e-textbooks with
some of the same features as Chegg’s reader. CourseSmart
is another online vendor offering digital content from major
publishers such as Pearson, Cengage, McGraw Hill, and John
Wiley & Sons (the publisher of this textbook). CourseSmart
provides a number of mobile apps for various devices as well
as the capability to read texts through mobile browsers (no
app download necessary). Finally, Apple has announced its
desire to transform the textbook market in much the same
way it changed the music business. However, the existing list
of companies that are already practicing disruptive innovation
may make it more diffi cult for Apple to have quite the same
impact as it did in the music business.
Questions
1. Evaluate the mobile features of Chegg’s textbook
program. Does it offer services that are truly helpful to
college students or are they just a gimmick?
2. Go to Chegg.com to view a demo of its e-textbook reader.
After reviewing the service, evaluate whether the reader
will motivate students to obtain their textbooks from
Chegg instead of using alternative textbook suppliers.
3. How does Chegg’s mobile price comparison service pro-
vide a benefi t to college students? Do you think it helps
to increase rentals and purchases from Chegg?
4. What other ways could Chegg use mobile technologies
to provide further value to college students?
5. Using a mobile device, check the purchase and/or rental
prices of the textbooks you are using this semester. Com-
pare these with prices from alternative vendors (e.g., your
college bookstore, Amazon.com, half.com, etc.). Prepare
a table comparing your overall cost from each supplier.
Based on your fi ndings, do you plan to change the way
you obtain textbooks in the future?
Sources: Chegg.com (2010), Conneally (2012), Wired Academic
(2012), Crook (2009), Eldon (2012).
TABLE 8.4 The Chegg Learning Network
Purchase New/Used Textbooks
Online, mobile app, or mobile website
Renting Textbooks
Online, mobile app, mobile website, and bookstores and rental stands at select
colleges
Homework Help Q&A
Online and mobile website
e-Textbooks
Cloud-based mobile textbook reader
Course Reviews, Grade Distributions, and Schedule Planning Tools
Online and mobile website
Source: Chegg.com (2012).
CASE 8.3
Video Case: Searching with Pictures Using MVS
Earlier in the chapter, you read that U.S. consumers were not
responding to QR code marketing with the same enthusi-
asm as Asian consumers. In response, some companies are
experimenting with an alternative to QR codes called mobile
visual search (MVS) technology. MVS is an image recognition
technology that proponents claim will be more attractive to
consumers.
With an MVS app, users scan the pictures they fi nd on
product labels, catalogs, or advertisements. This initiates a
search function that returns information to the user. Depend-
ing on the MVS app used, the search information might be
general in nature, similar to what you get when conducting a
search on Google. Or, the app may return specifi c information,
for instance, a page where the user can order the product.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 294 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
References 295
This technology has spawned a new industry of mobile visual
search services that include companies like Snaptell (now
owned by Amazon), PixlinQ (LTU Mobile), BuzzAR,
Mobile Acuity, and, of course, Google (see Figure 8.14).
Find and watch videos of three different MVS applica-
tions on YouTube or other video-sharing sites:
Figure 8.14 Mobile visual
search using Google’s
Goggle app.
MVS Application/ Videos at
Developer YouTube.com
Goggles/Google
Search for “Google
Goggles Experiment
Video”
PixlinQ/LTU Mobile
Search for “Shopgate—
Mobile Shopping”
Buzzar
Search for “buzzAR-
mobile visual search
platform”
Get the latest news and information about MVS by searching
on the phrase “mobile visual search” using Google or some
other search engine. Compare and contrast MVS with
marketing strategies using QR codes.
Questions
1. If consumers begin to use MVS on a wide-scale basis,
how should businesses adjust their marketing practices
to take advantage of this technology?
2. Based on the videos and additional research, how do the
MVS services differ from one another?
Ally Financial. “Company Overview – CEO Letter.” media.
ally.com, May, 2014.
Asante, J. “Mobile Gaming Powers Up: ‘99 Cents Is the New
Quarter.’” NPR.org, April 3, 2012.
Bercovici, J. “Amazon vs. Book Publishers, by the Numbers.”
Forbes.com, February 20, 2014.
Berginsight.com. “Berg Insight Predicts 894 Million Mobile
Banking Users by 2015.” April 2010.
Capgemini, the Royal Bank of Scotland plc (RBS), and Efma.
“World Payments Report.” capgemini.com, 2011.
Chegg.com. “Chegg.com Introduces Two New Ways for Col-
lege Students to Easily Rent Their Textbooks.” PRNewswire,
August 11, 2010.
comScore, Inc. “Mobile Future in Focus.” comscore.com,
February 2012.
References
©
G
re
g
or
y
R.
W
oo
d
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 295 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
296 Chapter 8 Retail, E-commerce, and Mobile Commerce Technology
Conneally, T. “Everything You Need to Know about
e-Textbooks before Apple Gets Involved.” Betanews.com,
January 17, 2012.
Crook, J. “Chegg Adds Mobile Components to Textbook
Rental Service.” Mobile Marketer, August 31, 2009.
Dotson, C. “How Mobile Games Leapt from Cult to Cultural
Phenomenon.” Mashable.com, January 20, 2012.
Eldon, E. “Chegg Launches Mobile Reader for Online
Textbooks.” Techcrunch.com, January 18, 2012.
Edelman. “2013 Edelman Trust Barometer Reports Financial
Services Is Least Trusted Industry Globally.” Edelman.com,
April 9, 2013.
eMarketer. “Half of Mobile Users to Play Games in 2013.”
eMarketer.com, May 30, 2013
Galgey, W. & S. Pattinson. “The Future Shopper: How Changing
Shopper Attitudes and Technology Are Reshaping Retail.”
White paper, the Futures Company/Kanter Retail, 2013.
Gallup, Inc. “Confi dence in Institutions 1973–2014”, Gallup.com,
Sept. 18, 2014.
Global Industry Analysts. “Global Mobile Banking Customer
Base to Reach 1.1 Billion by 2015.” February 2010.
Gonsalves, A. “Amazon Kindle 2.5 Adds Social Networking.”
InformationWeek, May 3, 2010.
Google, IPSOS OTX MediaCT. “The Mobile Movement:
Understanding Smartphone Users.” April 2011.
Howard, N. “Is It Safe to Bank by Cell Phone?” MSN Money,
July 2009.
Johnson, L. “Macy’s, Afl ac Partner for Holiday Donation
Campaign.” Mobile Commerce Daily, November 29, 2011.
Kats, R. “Macy’s Mobile Spend Up 70pc: FirstLook Keynote.”
Mobile Marketer, January 20, 2012.
Leslie, S., R. Chawla, & J. Aaker. “Deals @Delloutlet: How
Dell Clears Inventory Through Twitter.” Stanford Graduate
School of Business, Case M-334, May 10, 2010.
Macy’s. “Macy’s Backstage Pass.” Press release, February 2011.
Malone, C. “The Loyalty Storm Brewing for Banks, Wireless
and Cable Companies.” Business2community.com,
September 15, 2014.
McGee, B. “Mobile Banking Security—Phishing for Answers?”
Netbanker.com, January 2008.
Miller, C. & J. Bosman. “E-Books Outsell Print Books at
Amazon.” New York Times, May 19, 2011.
MobiAdNews.com. “IKEA Uses Mobile Augmented Reality to
Engage Shoppers’ Imagination.” August 2009.
Mobile Marketing Association. “Mobile Banking Overview
(NA).” January 2009.
Moore, G. “Foursquare Leads New Mobile Advertising
Model.” Masshightech.com, April 2010.
National Retail Federation. “Mobile Retailing Blueprint:
A Comprehensive Guide for Navigating the Mobile
Landscape.” January 4, 2011.
Nielsen. “Play Before Work: Games Most Popular Mobile App
Category in US.” NielsenWire, July 7, 2011.
O’Connell, B. “Consumer Frustration Threatens Billions in
Revenue at 10 Banks This Year.” TheStreet.com, July 23,
2013.
Porter, M. “The Five Competitive Forces That Shape Strategy.”
Harvard Business Review, 86, no. 1 January 2008, pp. 86–104.
Rappa, M. “Case Study: Amazon.com.” DigitalEnterprise.com,
2010.
Smith, C. “Trio of Online Banks Dominate Social Media Chan-
nels.” Thefi nancialbrand.com, April 28, 2014.
Tejwani, A. “One Bank that Got Social Media right – Ally
Bank (Case Study).” Sociallycharged.com, Sept. 17, 2012.
The Financial Brand. “Majority of Americans Still Hold a
Grudge Against Banks.” thefi nancialbrand.com, April 8, 2013.
Tsirulnik G. “Macy’s Is 2011 Mobile Marketer of the Year.”
Mobile Marketer, December 9, 2011.
Whitfi eld, T. “Augmented Reality for Mobile Advertising.”
Econsultancy.com, February 2010.
Wired Academic. “Chegg Trots Out Its HTML5 E-Textbook
Reader, Challenging Inkling, Cengage, Kno, et al.” January
28, 2012.
Yurcan, B. “Ally, USAA Top Bank Social Media Study.”
Banktech.com, March 15, 2012.
Yurcan, B. “Ally Bank’s Mobile Strategy.” Banktech.com, April
18, 2014.
Zimmerman, A. “Showdown Over ‘Showrooming’: Target Asks
Vendors for Help Keeping Comparison Shoppers.” Wall
Street Journal, January, 23, 2012.
c08RetailE-CommerceAndMobileCommerceTechnology.indd Page 296 11/7/14 1:51 PM f-w-204a /208/WB01490/9781118897782/ch08/text_s
Chapter Snapshot
Every business is managed through multiple business
functions, each responsible for managing certain aspects
of the business. Consider an electronics company. The
finance function is responsible for acquiring capital
needed for research and development (R&D) and other
investment processes. The marketing function is respon-
sible for product promotion and pricing, identifying tar-
get customers, and improving the customer experience
(CX). The operations function plans and coordinates
all the resources needed to design, manufacture, and
Effective and Effi cient
Business Functions9
Chapter
1. Describe various types of functional systems and how they
support managers and workers at the operational level.
2. Define how manufacturing, production, and transporta-
tion information systems enable organizational processes
and support supply chain operations and logistics.
3. Explain how sales and marketing information systems
support advertising, market research, intelligence gath-
ering, getting products and services to customers, and
responding quickly and efficiently to customers’ needs.
4. Describe how accounting, auditing, and finance appli-
cation systems meet compliance mandates, help deter
fraud, and facilitate capital budgeting and forecasting.
5. Analyze how human resources information systems
(HRIS) improve business-to-employee (B2E) communica-
tions, workforce productivity, and compliance with fed-
eral employment laws; and discuss ethical issues related
to the use of HRIS data.
Learning Outcomes
297
Optimizing Performance with Enterprise
Systems and AnalyticsPart 3
Chapter Snapshot
Case 9.1 Opening Case: Ducati Redesigns
Its Operations
9.1 Solving Business Challenges
at All Management Levels
9.2 Manufacturing, Production, and
Transportation Management Systems
9.3 Sales and Marketing Systems
9.4 Accounting, Finance, and Regulatory
Systems
9.5 Human Resource Systems, Compliance,
and Ethics
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 9.2 Business Case: HSBC Combats Fraud in
Split-Second Decisions
Case 9.3 Video Case: United Rentals Optimizes
Its Workforce with Human Capital Management
References
c09EffectiveAndEfficientBusinessFunctions.indd Page 297 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
transport products. The IT function is responsible for
the technology infrastructure, data management, and
social, mobile, and cloud services. Accounting manages
assets and meet compliance mandates. Human resource
(HR) recruits, trains, and develops a talented workforce.
These business functions involve complex processes that
depend on access to data, collaboration, communication,
and data analysis to pinpoint what must be done—and
employees’ workflows to make that happen.
While most attention is on external interests—
customers, competitors, and partners—they are only part
of the solution. Business success also depends on internal
factors—the efficiency and effectiveness of managers,
employees, core business processes and functions. A wide
range of specialized technology, such as Salesforce.com
and eXtensible Business Reporting Language (XBRL)
for financial reporting, supports problem solving, deci-
sion making, and compliance (Figure 9.1).
Business is messy, sometimes chaotic. Resolving
those situations requires human creativity, critical think-
ing, and judgment—all of which relate back to corporate
culture, training, and empowerment of employees. These
topics are covered in Chapter 9.
Ultimately, data from functional systems are used by
enterprise applications, including business intelligence
(BI), e-commerce, customer relationship management
(CRM), and supply chain management (SCM), as shown
in Figure 9.2.
Figure 9.2 Data from
functional area ISs support
enterprise apps.
298
• Real time data employees
can trust
• Useful dashboards and mashups
• Real time collaboration
• Knowledge sharing
• Enterprise social computing
• Data analytics and reporting
• Automated and standardized
core processers
• Customer acquisition and
retention
• Customer experience
• Customer relationships
• Social networking
• Digital marketing
• B2C commerce
• Supplier and vendor relationships
• Sourcing decisions
• Supply chain management
• B2B commerce
• Regulatory reporting
• Compliance reporting
Internal support External support
Customers Partners & RegulatorsEmployees
Figure 9.1 Comparison of the IT capabilities that enterprises provide to
employees, consumers, business partners, and regulators.
Accounting
External Systems
Customers
Partners
Government
Support Systems
Finance
Manufacturing, Production, &
Transportation
Acccccouunttiing
Government
FFinnaancce
Manufacturing, Production, &
Transportation
Integration
Integration
Integration
Transaction
Processing
Systems
Human Resources
Sales &
Marketing
Knowledge Management,
Customer Relationship
Management, Compliance
In
te
gr
at
io
n
c09EffectiveAndEfficientBusinessFunctions.indd Page 298 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
CASE 9.1 OPENING CASE
Ducati Redesigns Its Operations
Figure 9.3 Ducati Motor
Holding overview.
CASE 9.1 Opening Case 299
COMPANY OVERVIEW Ducati Motor Holding manufactures motorcycles known worldwide for their preci-
sion engineering, lightning speed, and sleek design and for customers who are pas-
sionate about their motorcycles. Six models make up the product lines, with prices
starting at $15,000 to the $90,000 Superleggera Superbike, which produces up to
200 HP at the crankshaft. Ducati is owned by Audi through its Italian subsidiary
Lamborghini. Its 2013 net sales were $518 million.
Awards
In March 2014 Ducati received five awards at the annual Motorrad des Jahres
(Motorcycle of the Year) event in Stuttgart, Germany. Ducati’s Multistrada and
Diavel were awarded Motorcycle of the Year in the Allrounder and Cruiser cat-
egories, respectively (Figure 9.4). Ducati’s models are benchmarks in innovative
design and technology.
Product Lines
In addition to six motorcycle brands, the company sells parts, apparel, accessories,
and other items to create the Ducati experience. Dealers need to be familiar with
thousands of products and customization options for their customers.
BUSINESS CHALLENGES Companies worldwide were faced with tougher competition and economic condi-
tions after the financial meltdown in 2008. And as global manufacturers, geography
was a marketing challenge.
Internally, its sales staff struggled with conflicting or outdated data on product
inventory, availability, and ordering time schedules. The source of the problem was
multiple communication systems and data silos that were not coordinated.
High-performance motorcycles
with precison engineering and
innovative designs.
Motorcycle apparel, accessories,
and gear.
Brand
Ducati’s distribution and sales
operation spans a thousand
dealers in 88 countries, with
primary focus on the European,
North American, and Asia Pacific
markets.
Global Reach
New dealer communication
application for mobile devices
called DCS, or Ducati
Communication System.
iPad app to communicate with
dealer network and customers.
Digital Technology
Ducati Motor Holding
Build motorcycles that dominate
the dreams of the most passionate
motorcycle enthusiasts.
Implement best practices with
dealerships and customers.
Create a single point of access to
Ducati’s original equipment
manufacturers and back-end
systems.
Business Strategy
c09EffectiveAndEfficientBusinessFunctions.indd Page 299 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
300 Chapter 9 Effective and Efficient Business Functions
Figure 9.4 Ducati Multistrada and Diavel were awarded Motorcycle of the Year
in 2014 in their class for their innovative design and technology.
To resolve these challenges and grow the business, Ducati focused on:
1. improving the sales process
2. engaging the customer in the design of its motorcycles, and
3. decreasing the cost of operations
The plan was to redesign dealer operations, business processes, and communication
tools to align them with leading industry practices.
TABLE 9.1 Opening Case Overview
Ducatiusa.com and Ducati.com
Founded in 1926. Has 911 employees.
Company Ducati’s main factory site and headquarters are located
in Bologna, Italy, with an additional assembly factory in
Thailand.
Industry
Racing-inspired motorcycles characterized by
“Desmodromic” performance engines, and innovative
design and technology.
Product lines
Six models: Diavel, Hypermotard, Monster, Multistrada,
Streetfi ghter, and Superbike.
Digital technology
New dealer communication application for mobile de-
vices called DCS, or Ducati Communication System. The
interface lets dealers easily fi nd, send, and receive all the
information they need to place orders and track them
through production and delivery. The high-performance
global communication system serves more than 5,500
users worldwide in seven languages.
Business challenges
Because of competition and tough economic
conditions worldwide, motorcycle dealerships had to
offer customers better value and after-sales services.
©
im
ag
eB
RO
K
ER
/A
la
m
y
©
J
oh
nr
ob
/i
St
oc
kp
ho
to
c09EffectiveAndEfficientBusinessFunctions.indd Page 300 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
CASE 9.1 Opening Case 301
Partnership with Accenture and Apple
Ducati selected Accenture to help redesign operations and processes; and to roll
out a new integrated communication application for its dealers worldwide. Ducati
equipped its sales network with iPads and developed a custom in-house app called
DCS, or Ducati Communication System. The DCS app gives dealers a single point
of access to Ducati’s back-end systems. The DCS is an SAP-based interface used
by dealers to easily find, send, and receive data necessary to place orders through
a point-of-sale (POS) device; and then to track orders through the production and
delivery processes.
Authorized dealers receive updates directly through the Apple App Store. They
also have access to a configurator app on their iPads to configure a customer’s
dream motorcycle. An e-mail detailing the customized motorcycle and accessories
is then sent to the customer. Dealers communicate in real time with colleagues and
complete the sale without delay.
Intuitive User Experience
The familiar user experience was designed to be the same for desktop computers,
iPads, and iPhones.
Cristiano Silei, vice president of Global Sales at Ducati, said: “It was clear from
the start that iPad was the right device. It’s the simplicity, the immediate usability.
Everyone understands how it works in just a few minutes.”
Visiting a dealership is a very emotional experience for customers. Dealers want
to make the experience unforgettable. According to Silei, the iPad helps gives the
future Ducati owner a richer experience.
In addition to providing real time sales support, the DCS app on iPad acts as
a training interface to keep dealers updated on Ducati’s evolving product line. A
change management program helped dealers transition smoothly from the old solu-
tion to DCS. DCS was quickly embraced by Ducati dealers, whose positive feedback
included comments like “It’s a game changer” and “a great time saver.”
PERFORMANCE
IMPROVEMENTS
Ducati’s high-performance global DCS was deployed to 88 countries across four
continents. DCS serves more than 5,500 users worldwide in seven languages.
By leveraging dealer communication, Ducati is able to capture and consolidate
local and global sales activity, spare parts, warranty, and service activity. As a
result:
• Ducati is able to capture and consolidate local and global sales activity,
spare parts, warranty, and service activity, improving the company’s ability
to respond daily to changing consumer demand.
• Dealers run all parts of their business and have a robust tool to execute their
operational, growth, and customer objectives.
• Dealers respond more quickly to customer demands and market conditions,
making each dealership easier for customers to do business with.
• Dealers are equipped with leading practices for their processes to help them
better serve customers in a simple, streamlined fashion.
The dealer system is one of the most innovative and effective user experiences
in the industry. It is user-friendly and sleek, and reinforces Ducati’s brand.
Sources: Compiled from Ducati websites (2014), LexisNexis company profi les (2014), Apple.com (2014),
Accenture.com (2014).
c09EffectiveAndEfficientBusinessFunctions.indd Page 301 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
302 Chapter 9 Effective and Efficient Business Functions
Questions
1. What pressured or motivated Ducati to implement new digital
technology?
2. What costs could Ducati cut? What costs could it not cut? For example,
could Ducati cut its research and development (R&D) budget? Explain
your answers.
3. Why did Ducati need to improve communications with dealers?
4. Explain the capabilities and benefi ts of the DCS.
5. Why was it important to implement a change management program?
6. What other factors contributed to the success of DCS? Explain their
contributions.
7. Visit the Apple iPad store at apple.com/ipad and search for “ducati.”
Review the Ducati Communication System app. Explain how the DCS
app gives the future Ducati owner a richer experience.
The three major organizational levels are modeled as a pyramid in Figure 9.5.
Starting at the base of the pyramid the levels are operational, managerial or admin-
istrative, and strategic. The timeframe transitions from in the moment to long term,
and the perspective changes from daily to a few years.
The organizational levels correspond to the three major types of managers:
operational, tactical, and strategic managers. To be fully effective, operational, tac-
tical, and strategic goals and plans must be aligned. That is, they must be consistent,
mutually supportive, and focused on achieving the enterprise’s mission.
9.1 Solving Business Challenges at All Management Levels
Figure 9.5 Three organizational levels, their concerns, and strategic and tactical
questions, planning, and control.
MANAGEMENT LEVELS Strategic planning is a top management activity that sets priorities, focuses energy
and human and technology resources, strengthens operations, and ensures that
employees and business partners work toward common goals. Strategic plans are
Mission is a set of outcomes
an enterprise wants to
achieve.
Strategic plan is a document
used to communicate the
company‘s goals and the
actions needed to achieve
them.
Strategic level
How do we do it?
How do we generate
revenues & profits to sustain
ourselves and build our
brand?
How well do we do it?
How can we be more
efficient?
Market,
Customer,
Products,
& Services
Business Model
& Organization
Policies, Processes,
& Technology
Managerial or
administrative
level
Operational
level
What do we do? What is our
direction?
What markets & customers
should we be targeting and
how do we prepare for them?
c09EffectiveAndEfficientBusinessFunctions.indd Page 302 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.1 Solving Business Challenges at All Management Levels 303
BUSINESS FUNCTIONS
VS. CROSS-
FUNCTIONAL BUSINESS
PROCESSES
Originally, information systems were designed to support the accounting function.
Systems for other functions were rolled out later. The consequences of this frag-
mented roll-out approach were data silos that supported various business functions,
but that could not support cross-functional business processes. For example, taking
customers’ orders for contact lenses is a relatively easy process, but the order fulfill-
ment process to move products from those orders to the customers includes checking
credit and collecting payment, picking shipping departments to pack the product,
printing the mailing label, preparing for shipping, and notifying customers that their
orders are on the way. Work flows and data flows between departments that are not
coordinated result in delays, errors, poor customer service, and higher costs.
Departments or functions interact by passing data from one to the other. In the
process, files are generated to record the details of such activity.
Data requirements of the operational-level units are extensive and relatively
routine because they have fixed sources of input and tasks follow standard operat-
ing procedures (SOPs). SOPs are easily automated or supported by functional area
information systems.
SOPs are an integral part of a quality control system because they provide indi-
viduals with information to perform jobs properly. A key benefit of SOPs is that
they minimize variation and promote quality through consistent implementation of
a process or procedure within the organization, even if there are temporary or per-
manent personnel changes. SOPs are written, for example, for handling purchase
orders, order fulfillment, customer complaints, recruitment and hiring, emergency
response, and disaster recovery. Data that are lost or compromised have financial
implications. As such, it is critical that businesses have SOPs to ensure that data are
secure and accurate, and that their integrity is maintained. Tech Note 9.1 gives an
outline of SOPs to secure transaction data.
Standard operating
procedures (SOPs) are a
set of written instructions on
how to perform a function
or activity. SOPs provide
the framework for complex
processes to be managed
more effectively.
visionary and future-oriented. Data from external sources—the economy, markets,
competitors, and business trends—are essential to their SWOT (strengths, weak-
nesses, opportunities, and threats) analysis, planning, and decisions. As the environ-
ment changes, strategic plans are reexamined and adjusted.
At the tactical level, middle-level managers design business processes, proce-
dures, and policies to implement strategic plans.
Operational-level managers and supervisors work most closely with the work-
force and customers and play a more interpersonal role than any of the other levels
of management. They depend on detailed data in real time or near real time to do
their jobs, get work done, and close the deal. They need to track inventory levels,
sales activity, marketing campaigns, production; meet or expedite delivery sched-
ules; and resolve disruptions. The Ducati dealers and their DCS and iPad apps are
examples of the work and data requirements. Decision making is mostly immedi-
ate or short-term because decisions are made to close the deal or control ongoing
activities and operations. Feedback and control are vital to identify deviations from
goals as soon as possible in order to take corrective action. Data captured or created
within the company are most important at this level.
TECH NOTE 9.1 Standard Operating Procedures
Data security: Data must be protected from malicious or unintentional corruption,
unauthorized modifi cation, theft, or natural causes such as fl oods.
Data accuracy: Data validation is used to detect and correct data entry errors, such
as address data and customer names.
c09EffectiveAndEfficientBusinessFunctions.indd Page 303 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
304 Chapter 9 Effective and Efficient Business Functions
Data integrity: Data integrity with real time systems involves the ACID test, which
is short for atomicity, consistency, isolation, and durability:
• Atomicity: If all steps in a transaction are not completed, then the entire
transaction is canceled.
• Consistency: Only operations that meet data validity standards are
allowed. For instance, systems that record checking accounts only allow
unique check numbers for each transaction. Any operation that repeated
a check number would fail to ensure that the data in the database are
correct and accurate. Network failures can also cause data consistency
problems.
• Isolation: Transactions must be isolated from each other. For example,
bank deposits must be isolated from a concurrent transaction involving a
withdrawal from the same account. Only when the withdrawal transaction
is successfully completed will the new account balance be reported.
• Durability: Backups by themselves do not provide durability. A system
crash or other failure must not cause any loss of data in the database.
Durability is achieved through separate transaction logs that can be used
to re-create all transactions from a known checkpoint. Other ways include
database mirrors that replicate the database on another server.
BASIC FUNCTIONAL
AREA SYSTEMS
The basic functional area information systems and examples of their apps are the
following.
• Manufacturing and production: materials purchasing, quality control, sched-
uling, shipping, receiving. For example, to produce small appliances, a manu-
facturer needs to order materials and parts, pay for labor and electricity,
create shipment orders, and bill customers.
• Accounting: accounts receivable, accounts payable, general ledger, budget-
ing. Accounting systems keep account balances up to date, disburse funds,
and post statements.
• Finance: cash management, asset management, credit management, finan-
cial statement reporting to comply with federal and industry-specific regula-
tions and government agencies.
• IT: cloud computing services, service-level agreement (SLA) management,
software license management, user accounts management, information and
network security.
• Sales and marketing: pricing, social media promotions, market research,
demand forecasts, sales campaign management, order tracking, and online
and mobile order processing and sales (see Figure 9.6).
• HR: payroll, recruitment and hiring, succession planning, employee benefits,
training, compensation, performance appraisal, compliance with federal and
state employment regulations.
In online transaction processing (OLTP), events or transactions are processed
as soon as they occur. Data are accessed directly from the database, and reports can
be generated automatically (Figure 9.7). IT at Work 9.1 describes a real time sales
and reporting system.
These functions are supported by TPSs that monitor, collect, store, process,
and distribute data for all financial and nonfinancial transactions, such as hiring and
managing business contracts.
c09EffectiveAndEfficientBusinessFunctions.indd Page 304 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.1 Solving Business Challenges at All Management Levels 305
Figure 9.6 A billboard in
New York City’s Times Square
advertises the services of
SquareUp, a credit card
reader system for Apple and
Android mobile devices.
Figure 9.7 Information fl ows
triggered by a transaction or
event.
First Choice Ski holds a 14 percent market share of the online
UK ski vacation industry. TUI Travel, its parent company, is
an international leisure travel group, which operates in 180
countries and serves more than 30 million customers. In the
highly competitive tour operator industry, profit margins are
tight. Being lean and responsive is essential to maintaining
profitability. By using Yahoo! Web Analytics and real time
reporting, First Choice Ski was able to monitor and quickly
respond to the behaviors of visitors on its travel website.
Figure 9.8 is an example of a Web analytics interface.
First Choice Ski Tracks Customers’ Behavior
At First Choice Ski, customers spend a lot of time researching
and selecting their vacations. Simon Rigglesworth, e-commerce
manager, explained: “We see users return multiple times
from multiple sources such as paid search, e-mail and even
social networking as they try to find the vacation that suits
them the best. Capturing as much information as possible
allows us to identify the best way to complete the sale and
optimize for it.”
IT at Work 9 . 1
Tracking Customer Behavior
©
R
ic
ha
rd
L
ev
in
e/
A
la
m
y
INPUTS
Transaction
Manager
TPS
PROGRAMS
• • •
Update
database
& produce
TPS
reports
Detail Reports,
Documents, Other
Outputs
Exception
Reports
PROCESSES OUTPUTS
Operational
Database
with Master
Transaction Files
Hard Drive
Internal and
External
Data
Entry
Downloading
and Uploading
Queries
and Answers
User
EVENTS
DETAILS
Exceptions
c09EffectiveAndEfficientBusinessFunctions.indd Page 305 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
306 Chapter 9 Effective and Efficient Business Functions
After experimenting with fee-based analytics packages,
First Choice Ski selected Yahoo! Web Analytics (YWA), which
is free. Web analyst Penelope Bellegarde used the Search
Phrases Report in YWA to leverage factors driving visitors to
First Choice Ski. She said: “If we notice a specific destination
is driving a lot of visits to the site, then it is very likely we will
promote that destination on the homepage.”
The Internal Campaign Report helps First Choice Ski
monitor and manage its many travel promotions. For exam-
ple, Bellegarde monitors the number of clicks and number of
sales generated by each campaign, and when a low ratio of
sales to clicks is noticed, the company adjusts the campaign
accordingly.
Performance Improvements
Using these different datasets and tools from YWA, TUI
redesigned and changed the content of its First Choice Ski
homepage. Afterward the bounce rate (transfer out) from
the homepage decreased 18 percent, and the exit rate
decreased 13 percent. Most important, the number of sales
generated from the homepage increased 266 percent. “We
are now generating quantifiable, actionable, data-driven
processes for prioritizing and reviewing web site develop-
ments,” says Rigglesworth.
Sources: Compiled from firstchoice-ski.co.uk and Yahoo.com.
Questions
1. How does the ski travel site’s quick response to visitors’
clickstream behavior relate to its profit margin?
2. Consider this measurement principle: You cannot man-
age what you cannot measure. Explain how the case
illustrates this principle.
3. Does Web analytics impact barriers to entry and rivalry
among incumbents in this industry?
Questions
1. Explain the core concerns and time horizons of each level of management.
2. Defi ne what a standard operating procedure (SOP) is and give an example.
3. Explain each component of the ACID test.
4. Explain the differences between batch and online processing.
5. Describe the fl ow of information in transaction processing.
Day-to-day operations are connected by data and processes that they share.
Decisions made in sales departments, for example, cause ripple effects in other func-
tional departments—accounting, finance, IT, manufacturing/production, and HR.
9.2 Manufacturing, Production, and Transportation
Management Systems
Figure 9.8 Example of a
Web analytics interface. ©
N
A
N
/A
la
m
y
c09EffectiveAndEfficientBusinessFunctions.indd Page 306 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.2 Manufacturing, Production, and Transportation Management Systems 307
Likewise, financial decisions, such as stricter credit requirements, impact sales and
production. Ideally, functional systems enable:
• Transparency: being able to access current data to learn what is needed in
order to make informed decisions without delay.
• Quick response: being able to respond appropriately to changes in condi-
tions, demand, or new opportunities.
MANUFACTURING AND
PRODUCTION SYSTEMS
The production and operations management (POM) function is responsible for
processes that transform inputs into value-added outputs, as shown in Figure 9.9.
These inputs include human resources, such as workers, staff, and managers; facili-
ties and processes, such as buildings and equipment; they also include materials, IT,
and information. Outputs are the goods and services a company produces.
POM is responsible for decisions and activities, including product design and
delivery problems. The design and management of operations strongly influence
material costs, inventory availability, and quality control. For these reasons, POM is a
function management resorts to in order to improve performance and the bottom line.
Figure 9.9 Production
operations management
(POM) systems process and
transform inputs into outputs.
TRANSPORTATION
MANAGEMENT
SYSTEMS
Transportation management systems (TMSs) are relied on to handle transporta-
tion planning, which includes shipping consolidation, load and trip planning, route
planning, fleet and driver planning, and carrier selection. TMSs also support vehicle
management and accounting transactions.
Four trend factors contributing to the growth of TMS include:
1. Outdated transportation systems need to be upgraded or replaced. Many sys-
tems were installed over 10 years ago—before tablet computers and mobile
technologies had become widespread in business. Similar to most legacy (old)
systems, they are infl exible, diffi cult to integrate with other newer systems, and
expensive to maintain.
2. Growth of intermodal transport. Intermodal transportation refers to the use of
two or more transport modes, such as container ship, air, truck, and rail, to move
products from source to destination. See Figure 9.10 for examples. Many more
companies are shipping via intermodals and their older TMSs cannot support or
deal with intermodal movement, according to Dwight Klappich, a research vice
president for Gartner.
Data Data DataAction Action
Environment
• Customers
• Government regulations
• Competitors
• Technology
• Suppliers
• Economy
• Capital
• Materials
• Equipment
• Facilities
• Supplies
• Labor
• Knowledge
• Time
• Energy
Inputs
• Storage
goods
• Storage
• Alterations
• Transportation
• Inspection
Transformation
Process
goods
• Facilitating
goods
• Services
Outputs
Monitoring and
control
• Storage
c09EffectiveAndEfficientBusinessFunctions.indd Page 307 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
308 Chapter 9 Effective and Efficient Business Functions
When brick-and-mortar manufacturers began selling online, for example,
they learned that their existing TMSs were inadequate for handling the new line
of business. Shippers that expand globally face similar challenges when they try
to manage multiple rail, truck, and ocean shipments. Thus, there is a growing
need for more robust TMSs to handle multidimensional shipping arrangements.
3. TMS vendors add capabilities. The basic functions performed by a TMS include
gathering data on a load to be transported and matching those data to a histori-
cal routing guide. Then the TMS is used to manage the communication process
with the various carriers. New feature-rich TMSs are able to access information
services to help the shipper identify optimal routes given all current conditions.
For example, the latest TMSs can interact directly with market-data benchmark-
ing services. An automated, real time market monitoring function saves shippers
time and errors, and cuts costs signifi cantly.
4. TMSs handle big data. Transportation tends to generate a high volume of trans-
actional data. Managing the data is not easy. TMS vendors are developing sys-
tems that make valuable use of the big data that are collected and stored. By
drilling down into specifi c regions or focusing on particular market trends, for
example, shippers can use their big data to make better decisions.
IT at Work 9.2 describes a cloud-based software-as-a-service (SaaS) TMS.
Figure 9.10 Examples of intermodal transportation ports. Container ships from
around the world are unloaded in the Brooklyn, New York (left), and Bayonne,
New Jersey (right), shipyards. Containers are tracked as they are loaded onto
trucks or rail and transported across the country.
Agistix introduced Total Visibility, a new cloud-based SaaS
transportation management system (TMS). Using the cloud,
shippers have access from any location at any time. The leased
nature of the SaaS makes it affordable to more shippers.
Total Visibility provides shippers with real time visibility
to eliminate blind spots. Visibility is achieved by capturing
shipment estimates, so clients can better forecast spend (costs)
and meet compliance reporting requirements. Real time data
IT at Work 9 . 2
Total Visibility, a SaaS Transportation System
©
R
an
d
y
D
uc
ha
in
e/
A
la
m
y
©
R
ob
er
t
Q
ui
nl
an
/A
la
m
y
c09EffectiveAndEfficientBusinessFunctions.indd Page 308 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.2 Manufacturing, Production, and Transportation Management Systems 309
allow customers to know what is happening and to ana-
lyze big data to ensure their supply chain is functioning as
designed.
Total Visibility aggregates and standardizes a company’s
shipping activities and provides shippers with a comprehensive
view into every shipment they have paid for anywhere in the
world. The key benefits of Total Visibility for shippers are
real time visibility to all shipments in transit across all carri-
ers, all service levels, all modes, international and domestic,
inbound and outbound.
LOGISTICS
MANAGEMENT
Logistics management deals with the coordination of several complex processes,
namely ordering, purchasing or procurement, inbound logistics, and outbound
logistics activities. Logistics management systems:
• Optimize transportation operations.
• Coordinate with all suppliers.
• Integrate supply chain technologies.
• Synchronize inbound and outbound flows of materials or goods.
• Manage distribution or transport networks.
These systems enable real time monitoring and tracking of supply chain ship-
ments, schedules, and orders. You will read about supply chain management in
more detail in Chapter 10.
Inbound logistics refers
to receiving.
Outbound logistics refers
to shipping.
Inventory control systems
are stock control or inventory
management systems.
Safety stock is extra inventory
used as a buffer to reduce
the risk of stockout. Also
called buffer stock.
Stockout: inventory shortage.
INVENTORY CONTROL
SYSTEMS
Inventory control systems are important because they minimize the total cost
of inventory while maintaining optimal inventory levels. Inventory levels are
maintained by reordering the quantity needed at the right times in order to meet
demand. POM departments keep safety stock as a hedge against stockouts. Safety
stock is needed in case of unexpected events, such as spikes in demand or longer
delivery times.
Managing inventory is important to profit margins because of numerous costs
associated with inventory, in addition to the cost of the inventory. Inventory control
systems minimize the following three cost categories:
1. Inventory holding costs: warehousing costs (see Figure 9.11), security costs, in-
surance, losses due to theft or obsolescence, and inventory fi nancing costs based
on the interest rate
2. Ordering and shipping costs: employees’ time spent ordering, receiving, or pro-
cessing deliveries; and shipping fees
3. Cost of shortages: production delays and missed sales revenues because of
stockouts
To minimize the sum of these three costs, the POM department has to decide
when to order and how much to order. One inventory model that is used to answer
both questions is the economic order quantity (EOQ) model. The EOQ model
takes all costs into consideration.
Just-in-Time Inventory Management Systems
Just-in-time (JIT) and lean manufacturing are two widely used methods or mod-
els to minimize waste and deal with the complexity of inventory management.
Minimizing inventory costs remains a major objective of supply chain management.
JIT inventory management attempts to minimize holding costs by not taking
possession of inventory until it is needed in the production process. With JIT, costs
associated with carrying large inventories at any given point in time are eliminated.
However, the trade-off is higher ordering costs because of more frequent orders.
Figure 9.11 Inventory
holding and managing costs
can signifi cantly increase cost
of goods sold (CGS).
©
H
un
ts
to
ck
, I
nc
/
A
la
m
y
c09EffectiveAndEfficientBusinessFunctions.indd Page 309 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
310 Chapter 9 Effective and Efficient Business Functions
Because of the higher risk of stockouts, JIT requires accurate and timely monitoring
of materials’ usage in production.
Everything in the JIT chain is interdependent, so coordination and good rela-
tionships with suppliers are critical for JIT to work well. Any delay can be very
costly to all companies linked in the chain. Delays can be caused by labor strikes,
interrupted supply lines, bad weather, market demand fluctuations, stockouts, lack
of communication upstream and downstream in the supply chain, and unforeseen
production interruptions. In addition inventory or material quality is critical. Poor
quality causes delays, for example, fixing products or scrapping what cannot be
fixed and waiting for delivery of the reorder.
JIT was developed by Toyota because of high real estate costs in Tokyo, Japan,
that made warehousing expensive. It is used extensively in the auto manufacturing
industry. For example, if parts and subassemblies arrive at a workstation exactly
when needed, holding inventory is not required. There are no delays in produc-
tion, and there are no idle production facilities or underutilized workers, provided
that parts and subassemblies arrive on schedule and in usable condition. Many JIT
systems need to be supported by software. JIT vendors include HP, IBM, CA, and
Steven Engineering.
Despite potential cost-saving benefits, JIT is likely to fail in companies that have:
• Uncooperative supply chain partners, vendors, workers, or management.
• Custom or nonrepetitive production.
Lean Manufacturing Systems
In a lean manufacturing system, suppliers deliver small lots on a daily or frequent
basis, and production machines are not necessarily run at full capacity. One objec-
tive of lean manufacturing is to eliminate waste of any kind; that is, to eliminate
anything that does not add value to the final product. Holding inventory that is not
needed very soon is seen as waste, which adds cost but not value. A second objec-
tive of lean manufacturing is to empower workers so that production decisions can
be made by those who are closest to the production processes.
Oracle, Siemens, and other vendors offer demand-driven lean manufacturing
systems. Like any IS, JIT needs to be justified with a cost–benefit analysis. And
all JIT success factors apply to lean manufacturing. For example, JIT requires that
inventory arrive on schedule and be the right quality. For companies subject to bad
weather or labor strikes, lean manufacturing may not be suitable.
Quality Control Systems
Manufacturing quality control (QC) systems can be stand-alone systems or part of
an enterprisewide total quality management (TQM) effort. QC systems provide
data about the quality of incoming materials and parts, as well as the quality of in-
process semifinished and finished products. These systems record the results of all
inspections and compare actual results to expected results.
QC data may be collected by sensors or RFID (radio frequency identification)
systems and interpreted in real time, or they can be stored in a database for future
analysis. Reports on the percentage of defects or percentage of rework needed can
keep managers informed of performance among departments. KIA Motors intro-
duced an intelligent QC system to analyze customer complaints, so it could more
quickly investigate and make corrections.
Other POM Technologies
Many other areas of POM are improved by information systems and tools. Production
planning optimization tools, product routing and tracking systems, order manage-
ment, factory layout planning and design, and other tasks can be supported by POM
c09EffectiveAndEfficientBusinessFunctions.indd Page 310 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.2 Manufacturing, Production, and Transportation Management Systems 311
subsystems. For example, a Web-based system at Office Depot matches employee
scheduling with store traffic patterns to increase customer satisfaction and reduce
costs. Schurman Fine Papers, a manufacturer/retailer of greeting cards and specialty
products, uses special warehouse management software to improve demand fore-
casting and inventory processes. Its two warehouses efficiently distribute products
to over 30,000 retail stores.
COMPUTER-
INTEGRATED
MANUFACTURING AND
MANUFACTURING
EXECUTION SYSTEMS
Computer-integrated manufacturing (CIM) systems control day-to-day shop floor
activities. In the early 1980s, companies invested greatly in CIM solutions even
though they were complex, difficult to implement, and costly to maintain. They had
required the integration of many products and vendors.
Prior to CIM, production managers were given many pieces of informa-
tion such as time, attendance, receiving reports, inspection reports, and so on to
figure out how to accomplish production tasks. The information was frequently
late, rarely current or reliable, voluminous, and extremely difficult to assimilate.
CIM helps production managers better use information to execute manufacturing
plans.
Manufacturing execution systems (MESs) manage operations on the shop
floors of factories. Some MESs schedule a few critical machines, while others man-
age all operations on the shop floor. Functions of MES programs include: compiling
a bill of materials, resource management and scheduling, preparing and dispatching
production orders, preparing work-in-progress (WIP) reports, and tracking produc-
tion lots. For instance, an MES can schedule and track each step of the production
phase of a particular job, and then print out the bill of materials for the operator
and the production steps to complete at each phase. It repeats this process for each
operator and each step until a particular job is complete.
CIM and MES are very similar concepts, but there are differences. MES typi-
cally refers to a broader infrastructure than CIM. MES is based much more on stan-
dard reusable application software, instead of custom-designed software programs
on a contract-by-contract basis. MES tries to eliminate the time and information
gap of early years on the shop floor by providing the plant with information in real
time. Corporate business functions are given timely plant information to support
business planning decisions. For the most part, the term CIM is more commonly
used, and will be used in the rest of this section.
Today’s CIM systems provide scheduling and real time production monitoring
and reporting. CIM data-driven automation affects all systems or subsystems within
the manufacturing environment: design and development, production, marketing
and sales, and field support and service. CIM systems can perform production
monitoring, scheduling and planning, statistical process monitoring, quality analy-
sis, personnel monitoring, order status reporting, and production lot tracking. The
manufacturer BAE has implemented CIM.
MESs are generally installed on-premises, but cloud-based solutions are becom-
ing available. MES is a subset of enterprise resource planning (ERP) systems, which
you will read about in Chapter 10.
BAE Systems uses CIM in Its Combat Aircraft Facility
BAE Systems is a global company headquartered in London, England, engaged in
the development, delivery, and support of advanced defense, security, and aero-
space systems. BAE is among the world’s largest military contractors.
In September 2010 BAE opened a titanium-machining facility to manufacture
components for the F-35 Lightning II combat aircraft. It took 10 months to com-
plete the facility, during which time engineers at BAE considered a number of ways
to ensure that it would be able to accommodate the high throughput of titanium
military aircraft parts cost-effectively. According to Jon Warburton, BAE’s F-35
program manager, after conducting a thorough examination of numerous potential
c09EffectiveAndEfficientBusinessFunctions.indd Page 311 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
312 Chapter 9 Effective and Efficient Business Functions
manufacturing solutions, the BAE team finally decided to deploy a highly auto-
mated CIM system (Wilson, 2011). The CIM system ensures that titanium parts for
the aircraft can be manufactured on a JIT basis. To do so, it coordinates the orders
received at the plant, as well as the movement of raw materials and tooling, and
optimizes the use of the machine tools.
A key element of the CIM strategy was the deployment of two flexible manu-
facturing systems (FMSs) that can accommodate the manufacture of different parts
at different volumes. When an order for a part is received, the data relating to it are
passed to the FMSs, which schedule the manufacture of a part in the most expedient
way by examining the current workload across each of eight machine tools. Each
FMS can store up to 1,000 cutting tools in a racking system ready to be loaded into
the machine tools. A series of twin robot systems deliver the stored cutting tools
into each machine, as well as replenishing any worn tools. The biggest challenge
faced by the team in the development of the facility was to ensure that the FMS
and the machine tools communicated effectively with one another and with BAE’s
CIM system.
Reasons Why Companies Invest in CIM
The benefits of CIM are as follows: (1) It simplifies manufacturing technologies
and techniques, (2) automates as many of the manufacturing processes as pos-
sible, and (3) integrates and coordinates all aspects of design, manufacturing,
and related functions. CIM is comprehensive and flexible, which is especially
important in the redesign or elimination of business processes. Without CIM, it
may become necessary to make large investments to change existing ISs to fit new
processes.
Questions
1. What is the function of POM in an organization?
2. What trends are contributing to the growing use of TMS?
3. Defi ne logistics management.
4. What are the three categories of inventory costs?
5. What are the objectives of JIT?
6. Explain the difference between EOQ and JIT inventory models.
7. What is the goal of lean manufacturing?
8. What is CIM?
Sales and marketing information systems can expand the capacity to create new
products, services, channels, and market opportunities that lead to new revenue
streams. IT at Work 9.3 describes such an example. In general, sales and marketing
systems support advertising, market research, intelligence gathering, getting prod-
ucts and services to customers, and responding to customers’ needs. Many of these
systems are depicted in Figure 9.12.
Chapters 7, 8, and 10 covered or will discuss sales and marketing systems and
strategies, including ecommerce and customer relationship management (CRM).
This chapter, specifically this section, focuses on data-driven marketing and the
capabilities of sales and marketing ISs.
9.3 Sales and Marketing Systems
c09EffectiveAndEfficientBusinessFunctions.indd Page 312 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.3 Sales and Marketing Systems 313
Figure 9.12 Sales and marketing systems and subsystems.
Market Intelligence
Systems
Target Marketing
Systems
Customer Support
Systems
Sales Systems
Dealer Systems
Delivery
Systems
• Customer Profiling
and Segmentation
• Market Tracking
• Competitor
Surveillance
• New Product
Development
• Decision Support, BI Predictive Analysis
• Trend Monitoring
• Cross-Selling
• ADS for Pricing
• Marketing and Sales
Support and Services
• Value-Added
Partnerships
• Dealers’
Communications
• Business Management
Support Functions
• Database Marketing
• Telemarketing
• Niche/Regional
Marketing and
Microsegmentation
• Customer Profitability
Analysis
• Internet Marketing • Communications
with the Field
• Sales Process/
Account Management
• Selling Aids/Sales
Force Support
• Selling Aids/Point
of Purchase
• Prospecting
• Wireless Sales Force
Automation
• Internet Marketing
• Customer
Communications
• Customer Satisfaction
• Service and Support
• Training/User
Education
• Usage Enhancement
• Customer Portals
• Social Networking
• EDI
• Demand Forecasting
• Inventory
Management
• Order Entry and
Fulfillment
• Invoicing
• Sourcing
• Time-to-Market
Reduction
• RFID
Channel Systems
Manufacturing R&D/Design
Distribution Accounting/Finance
The Selling
Company
Google Customer Surveys is a service publishers can use to
generate revenues from their online content. The service is
an alternative to having a paywall for online news content.
For example, when users visit the websites of partners like
the New York Daily News and Texas Tribune, they find
several articles partially blocked. To continue reading the
full article, they have to answer a question or microsurvey
provided by Google.
Adweek
Adweek’s editors, reporters, and designers spend a lot of
time analyzing how digital technology transforms businesses
and the people they cover. They needed to monetize their
digital assets to keep the brand profitable. To that end,
Adweek partnered with Google on a new Web-based rev-
enue play. By answering a single marketing question per day,
readers receive full access to Adweek.com and reporting,
analysis, and video.
Market Research
One or two market research multiple-choice questions are
asked, for instance, ‘Which types of candy do you usually
buy for your household?” Possible answers: none, chocolate,
hard candies, gummies, toffees. Advertisers pay Google to
IT at Work 9 . 3
Google Customer Surveys
c09EffectiveAndEfficientBusinessFunctions.indd Page 313 11/10/14 1:17 PM f-w-204a /208/WB01490/9781118897782/ch09/text_s
314 Chapter 9 Effective and Efficient Business Functions
host the surveys, and the sites receive 5 cents per response
from Google. To minimize the possibility that people select
untruthful answers leading to poor-quality data, Google
makes the questions as engaging as possible. And if users
start to just answer the first question on each page, or answer
too quickly, the program notices that behavior and forces
readers to answer new questions.
DATA-DRIVEN
MARKETING
Data-driven, fact-based decision making increasingly relies on data that are hot—
impacting the business or potential customer right now, or in real time. One use
of hot data is push-through pay-per-click (PPC) marketing, which refers to online
advertising that “appears” on the screens of consumers’ devices based on their loca-
tion, behavior, interests, or demographic information. Unlike pull-through ads that
appear based on the user’s keyword searches, push-through ads use data about the
person to determine whether the ad should appear. This capability creates oppor-
tunities for highly targeted advertising programs. For example, Facebook members
self-report data about their location, age, interests, and so on. Based on these data,
advertisers can request that their ad be pushed to Facebook members who fit a
specific profile based on demographic, geographic, or behavioral factors.
MARKETING
MANAGEMENT
The following are some representative examples of how marketing management is
being accomplished.
Pricing of Products or Services
Sales volumes as well as profits are determined by the prices of products or services.
Pricing is a difficult decision, particularly during economic recessions. Prices can be
changed frequently, as you read in IT at Work 9.1. Flash sales engage fans or cus-
tomers and trigger quick sales. Flash sales work by offering customers an incredible
deal for a very short time. This sales method lends itself perfectly to the immediacy
of social media.
Salesperson Productivity
The performance of salespeople is collected in the sales and marketing TPS and
used to compare performance along several dimensions, such as time, product,
region, and even the time of day. Actual current sales can be compared to histori-
cal data and to expectations. Multidimensional spreadsheet software facilitates this
type of analysis.
SALES AND
DISTRIBUTION
CHANNELS
Marketers need to determine the optimal ways to distribute their products and
services through a combination of electronic, mobile, and physical channels. For
example, integrating a PPC advertising campaign with other online and offline
advertising initiatives generally provides the best overall results.
Here are representative topics relating to sales and distribution channels:
• In Macy’s stores and many other retailers, customers can check current sale
prices on digital screens with barcode readers.
• Customers use Exxon Mobil Speedpass to fill their tanks by waving a token,
embedded with an RFID device, at a gas-pump sensor. Then the RFID
starts an authorization process, and the purchase is charged to the debit or
credit card linked to the account.
• Home Depot and many supermarkets installed self-check-out machines.
Self-service kiosks cut labor costs for retailers, and can reduce customers’
check-out times, as shown in Figure 9.13.
c09EffectiveAndEfficientBusinessFunctions.indd Page 314 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.4 Accounting, Finance, and Regulatory Systems 315
Sales productivity can be boosted by Web-based call centers. When a customer
calls a sales rep, the rep can look at the customer’s history of purchases, demograph-
ics, services available where the customer lives, and more. This information enables
reps to provide better customer service.
Sales automation software is especially helpful to small businesses, enabling
them to rapidly increase sales and growth. One leading software is Salesforce.com,
which is a CRM application that is offered as a software as a service (SaaS). You
will read about Salesforce.com in detail in the CRM section of Chapter 10.
Profitability Analysis
In deciding on advertising and other marketing efforts, managers need to know the
profit contribution or profit margin (profit margin sale price minus cost of good)
of certain products and services. Profitability metrics for products and services can
be derived from the cost accounting system. For example, profit performance analy-
sis software available from IBM, Oracle, SAS, and Microstrategy is designed to
help managers assess and improve the profit performance of their line of business,
products, distribution channels, sales regions, and other dimensions critical to man-
aging the enterprise. Several airlines, for example, use automated decision systems
to set prices based on profitability.
Marketing activities conclude the primary activities of the value chain. Next we
look at the functional systems that are support activities, also called secondary activi-
ties, in the value chain: accounting, finance, and human resources management.
Questions
1. Explain push-through marketing and pull-through marketing.
2. List two sales and distribution channels.
3. Describe profi tability analysis.
Accounting and finance departments control and manage cash flows, assets,
liabilities, and net income (profit). Financial accounting is a specialized branch
of accounting that keeps track of a company’s financial transactions and prepares
financial statements, such as balance sheets and income statements. Investors, regu-
lators, and others rely on the integrity and accuracy of external financial statements.
Accounting must comply with generally accepted accounting principles (GAAP)
and the Financial Accounting Standards Board (FASB).
Corporations whose stock is publicly traded must also comply with the report-
ing requirements of the Securities and Exchange Commission (SEC), a regulatory
agency of the U.S. government. Using standardized guidelines, the transactions are
recorded, summarized, and presented in a financial report or financial statement
such as an income statement or a balance sheet. However, the objective of financial
accounting is not simply to report the value of a company. Rather, its purpose is
to provide sufficient and accurate information for others to assess the value of a
company for investment or other purposes.
9.4 Accounting, Finance, and Regulatory Systems
Income statement summa-
rizes a company’s revenue
and expenses for one quarter
of a fiscal year or the entire
fiscal year. Also known as
a P&L (profit and los) or
earnings statement.
FASB develops accounting
standards and principles.
FINANCIAL
DISCLOSURE:
REPORTING AND
COMPLIANCE
As part of an organization’s compliance obligations, the accounting function
must attest (verify) that there are no material weaknesses in internal controls.
A weakness in an internal control is a major cause of fraud, which is also known
as white collar crime. The prevention, detection, and investigation of financial
fraud are needed to reduce the risk of publicly reporting inaccurate information.
Figure 9.13 Self-check-out
kiosks reduce labor costs.
©
M
ar
m
ad
uk
e
St
. J
oh
n/
A
la
m
y
c09EffectiveAndEfficientBusinessFunctions.indd Page 315 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
316 Chapter 9 Effective and Efficient Business Functions
TABLE 9.2 Three of the Worst Accounting Scandals of All Time
Company and
Fraudsters Damages How They Did It Penalties
Bernie Madoff
Investment Securities
LLC (2008)
Bernie Madoff, his
accountant David
Friehling, and CFO
Frank DiPascalli
Tricked investors out of
$64.8 billion through the
largest Ponzi scheme in
history.
Investors were paid
returns out of their own
money or money from
other investors—rather
than from profi ts.
150 years in prison for
Madoff $170 billion
restitution. Prison time for
Friehling and DiPascalli.
Lehman Brothers (2008)
Lehman executives and
the company’s auditors,
Ernst & Young
Hid over $50 billion in
loans disguised as sales.
Allegedly sold toxic assets
to Cayman Island banks
with the understanding
that they would be bought
back eventually. Created
the impression Lehman
had $50 billion more in
cash and $50 billion less
in toxic assets than it
actually had.
Forced into the largest
bankruptcy in U.S.
history.
Enron (2001)
CEO Jeffrey Skilling and
former CEO Ken Lay
Shareholders lost $74
billion, thousands of
employees and investors
lost their retirement
accounts, and many
employees lost their jobs.
Kept huge debts off its
balance sheets.
Lay died before serving
time; Skilling received
24 years in prison. The
company fi led for bank-
ruptcy. Arthur Andersen
was found guilty of
fudging Enron’s accounts.
High-profile examples of financial misrepresentations are Bernard L. Madoff
Investment Securities (2008), Lehman Brothers (2008), Enron (2001), and many
related to the subprime mortgage crisis. Table 9.2 describes three of the worst
accounting fraud cases of all time. The FBI investigates white collar crime and
reports on the subject at its website FBI.gov.
Accounting Software Packages
Accounting software is a foundational technology for many companies, and as a
business grows, powerful, effective accounting solutions are critical. Most account-
ing software packages offer the same basic features necessary for managing finances:
accounts receivable (A/R), accounts payable (A/P), general ledger, billing and
invoicing, purchase and sales orders, and reporting. In addition to basic functional-
ity, the top accounting solutions offer additional features to give users more power,
flexibility, and customization. Often accounting solutions are closely integrated
with enterprise systems, such as ERP systems that include an extensive accounting
module.
Many providers offer cloud-based solutions. SaaS accounting software solu-
tions include the features of traditional systems, with the added benefit of anytime,
anywhere accessibility and updating.
Financial misrepresentation
occurs when a company has
intentionally deceived one or
more other parties.
c09EffectiveAndEfficientBusinessFunctions.indd Page 316 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
Financial Disclosure
The SEC’s financial disclosure system is central to its mission of protecting investors
and maintaining fair, orderly, and efficient markets. Since 1934 the SEC has required
financial disclosure in forms and documents. In 1984 the SEC began collecting elec-
tronic documents to help investors obtain information, but those documents made
it difficult to search for and find specific data items. To eliminate that difficulty and
improve how investors find and use information, the SEC sought a new disclosure sys-
tem that required data disclosure, whereby data items are tagged to make them easily
searchable. The reporting (disclosure) system was based on electronic data tagging,
or eXtensible Business Reporting Language (XBRL). Beginning in 2012, the SEC
mandated new interactive data reporting requirements as described in IT at Work 9.4.
XBRL Tagging
XBRL is a language for the electronic communication of business data. Each item,
such as cash or depreciation expense, is tagged with information about various attri-
butes, such as calendar year, audited/unaudited status, currency, and so on. XBRL-
tagged data can be read by any software that includes an XBRL processor, which
makes them easy to transfer among computers. Creating XBRL documents does not
require XML computer programming. Software is available to tag data, submit tagged
data to various recipients, and receive and analyze tagged data from other sources.
Figure 9.14 shows how XBRL documents are created. XBRL helps companies:
Figure 9.14 Overview of the
creation of XBRL documents. Financial institutions
Investors
Public
Regulators
Analysts
Sources: ERP Databases
Information Generation
Financial Data
USAA GAAP Taxonomy
Standards
Company Extension Taxonomy
XBRL Documents
Distribution,
Consumption
Output
Validate
and Publish
Files
9.4 Accounting, Finance, and Regulatory Systems 317
c09EffectiveAndEfficientBusinessFunctions.indd Page 317 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
318 Chapter 9 Effective and Efficient Business Functions
• Generate cleaner data, including written explanations and supporting notes.
• Produce more accurate data with fewer errors that require follow-up by
regulators.
• Transmit data more quickly to regulators and meet deadlines.
• Increase the number of cases and amount of information that staffers can handle.
The SEC requires data reporting using XBRL tags, and those
reports require XBRL software.
In March 2012 the SEC adopted the U.S. GAAP Financial
Reporting Taxonomy, which is based on XBRL. Public com-
panies, called filers, registered with the SEC must submit
their financial reports as tagged interactive data files (FASB.org,
2012). Interactive data make it easier for investors to analyze
and compare the financial performance of public compa-
nies. Prior to XBRL, reports were noninteractive. Investors
who wanted specific data had to manually search lengthy
corporate annual reports or mutual fund documents. As
more companies use interactive data, sophisticated analysis
tools used by financial professionals are now available to
average investors.
Interactive data increase the efficiency of reporting
processes, including the ability to consolidate financial data
from different operating systems. Banks also submit their call
reports to the Federal Deposit Insurance Corporation (FDIC)
in XBRL format.
IT at Work 9 . 4
XBRL Reporting Compliance
FRAUD PREVENTION
AND DETECTION
Fraud is a crime with severe financial consequences, as you observed in Table 9.2.
Fighting fraud is an ethical duty—and essential to public trust and the integrity of a
company’s brand. Insider fraud is a term referring to a variety of criminal behaviors
perpetrated by an organization’s employees or contractors. Other terms for this
crime are internal, employment, or occupational fraud.
Why Fraud Occurs
Fraud occurs because internal controls to prevent insider fraud—no matter how
strong—will fail on occasion. Fraud risk management is a system of policies and
procedures to prevent and detect illegal acts committed by managers, employees,
customers, or business partners against a company’s interests. Although each cor-
poration establishes its own specific procedures, fraud risk management involves
assessing a company’s exposure to fraud; implementing defenses to prevent and
detect fraud; defining procedures to investigate, prosecute, and recover losses from
fraud. Analyzing why and how fraud could occur is as important as detecting and
stopping it. This analysis is used to identify necessary corporate policies to deter
insider fraud and fraud detection systems when prevention fails.
Fraud Risk Factors
Factors that increase a company’s exposure to fraud are illustrated in Figure 9.15.
Information systems are implemented to harden it against these factors. Companies
make themselves targets because of the interaction of these four factors:
1. A high level of trust in employees without suffi cient oversight to verify that they
are not stealing from the company
2. Relying on informal processes of control
c09EffectiveAndEfficientBusinessFunctions.indd Page 318 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.4 Accounting, Finance, and Regulatory Systems 319
3. A mindset (belief) that internal controls and fraud prevention systems are too
expensive to implement
4. Assigning a wide range of duties for each employee, giving them opportunities
to commit fraud
When a small manufacturer was the victim of theft of intellectual property, the
computer network logs identified the computer that had been used to commit the
alleged crime. But there was no way to connect that computer to one specific indi-
vidual. A manager’s conviction that he knew who had perpetrated the crime was
not sufficient evidence. The lesson learned was that the internal control—separation
of duties—is not only important to fraud prevention, but also to fraud prosecution
and recovery of losses. At the company, employees had shared computer accounts,
so they were not able to link the fraud to the person who committed it. Designing
effective fraud response and litigation-readiness strategies (post-incident strategies)
is crucial to be able to:
• recover financial losses.
• punish perpetrators through lawsuits, criminal charges, and/or forfeited gains.
• stop fraudsters from victimizing other organizations.
History has shown that if the punishment for committing fraud is not severe,
the fraudster’s next employer will be the next victim, as described in IT at Work 9.5.
Trying to keep fraud hidden can mean either doing nothing or simply firing the
employee. These approaches to dealing with fraud are not sustainable because they
erode the effectiveness of fraud prevention measures and produce moral hazard—
that is, they take the risk out of insider fraud.
One of the most effective fraud prevention techniques is the perception of
detection and punishment. If a company shows its employees that it can find out
everything that every employee does and will prosecute to the fullest extent anyone
who commits fraud, then the feeling that “I can get away with it” drops drastically
(Johnson et al., 2011). The Catch-22 is that companies may have limited resources
that hinder a proper fraud diagnosis or forensic accounting investigation, even
though they cannot afford unrecoverable losses either.
Figure 9.15 Factors that
make companies targets
for fraud.
A dental practice with $4 million in annual revenues had fired
its bookkeeper after a tax audit revealed to the owners that
she had been stealing over $100,000 per year for at least
four years. The bookkeeper was responsible for all account-
ing duties and financial reporting for tax purposes. Her work
was not inspected closely by external auditors or the owners.
IT at Work 9 . 5
Serial Fraudster
Fraud
target
Informal
processes
Too much
trust
Cost
mindset
Range of
duties
c09EffectiveAndEfficientBusinessFunctions.indd Page 319 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
320 Chapter 9 Effective and Efficient Business Functions
Financial Meltdowns Triggered by Fraud
In the early 2000s, the U.S. business economy was significantly impacted by fraud
scandals that involved senior executives at a number of major corporations.
Lawmakers believed that the scope of the crimes destroyed the public’s confidence
in the country’s financial systems and markets. A number of laws were passed that
heightened the legal responsibilities of corporate management to actively guard
against fraud by employees, established stricter management and reporting require-
ments, and introduced severe penalties for failure to comply. As a result, fraud
management became a necessary functional process. These frauds played a role in
the SEC’s rule for XBRL data reporting.
Internal Controls
In companies with lax accounting systems, it is too easy for employees to misdirect
purchase orders and payments, bribe a supplier, or manipulate accounting data.
When senior managers are involved in a fraud, preventing fraud is extremely
tough. Consider Bernie Madoff, who committed a record-setting fraud scheme for
many years even after Sarbanes-Oxley was passed in 2002 to help prevent financial
fraud.
In a much smaller but still serious fraud case involving a New York–based
nonprofit, a volunteer was responsible for counting cash receipts at the annual fun-
draiser. The volunteer had performed this task for 30 years. One year, an accoun-
tant was assigned to assist the volunteer with the count. The volunteer offered the
accountant a “cut” of the cash in exchange for her silence about the theft.
Strong internal controls, which depend on IT for their effectiveness, consist of
the following:
• Segregation of duties tops the list of best practices in control procedures.
When handling a company’s assets, the work of managers and employees
needs to be subject to approval or authorization. For example, any attempt
to issue a check to a vendor not in the database of approved vendors will be
prevented by the accounting information system.
• Job rotation. More than one person should be familiar with each transaction
cycle in the business wherever possible. Rotation of jobs helps prevent over-
reliance on a single individual—and is a way to expose fraudulent activities.
No internal control systems, for example, controls that would
prevent checks being written to bogus vendors or employ-
ees, were implemented.
The classic red flags, or fraud indicators—lavish vaca-
tions, jewelry, and cars that she could not afford—were evi-
dent, but ignored by the owners/managers. The bookkeeper
was a “serial fraudster,” having defrauded at least two prior
employers: a religious organization and a nonprofit where
she had worked as a volunteer.
The defrauded medical practice decided to keep the
incident quiet, so it did not take legal action against the
bookkeeper. That turned out to be a mistake because the
bookkeeper used that situation to her advantage. She filed
a wrongful termination lawsuit. For several reasons, includ-
ing not being able to collect evidence (lax internal controls
enabled the bookkeeper to destroy evidence), the practice
settled the lawsuit by paying her over $5,000. In effect, the
fraudster had turned to extortion, knowing that the prac-
tice was unprepared to fight back. Inarguably, she must be
defrauding her current employer.
Questions
1. How was the fraud detected?
2. How long had it been going on?
3. What were the red flags that suggested the bookkeeper
was living beyond her means?
4. What mistakes were made in the handling of the fraud?
5. In your opinion, did the dental practice have an ethical
responsibility to prosecute the fraudster?
c09EffectiveAndEfficientBusinessFunctions.indd Page 320 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.4 Accounting, Finance, and Regulatory Systems 321
• Oversight. Management—whether a single owner or a team of individuals—
must monitor what is actually happening in the business. Auditing informa-
tion systems are part of a strong oversight function. Unannounced periodic
walk-throughs of a process or review of how things are really being done can
reveal existing or potential problem areas.
• Safeguarding of assets is essential to a fraud prevention program. Access to
networks, financial systems, and databases must be controlled with strong
passwords and other security measures. Similarly, bank checks, petty cash
funds, and company credit cards need to be locked up when not in use.
• IT policies. Understand your information system. Heavy reliance on IT
staff can open up opportunities for fraud. Establish a computer use policy
and educate employees on the importance of securing information. Strictly
enforce the use of separate logins and keep passwords confidential.
AUDITING
INFORMATION
SYSTEMS
Fraud can be easy to commit and hard to detect. Just ask any auditor. The problem
is worse in government and nonprofit entities that have inadequate accounting and
internal control systems. The problem is so bad at the federal level that auditors
have been unable to express an opinion on the fairness of the consolidated finan-
cial statements of the United States. For example, space agency NASA had been
unable to explain $565 billion in year-end adjustments to its books. It could be bad
accounting, fraud, waste, or abuse. Without adequate records, no one really knows.
This amount is astounding, especially when one considers that the combined cost
of fraud at Enron and WorldCom was less than $100 billion in shareholder equity.
Because the physical possession of stolen property is no longer required and it is
just as easy to program a computer to misdirect $100,000 as it is $1,000, the size and
number of frauds have increased tremendously. See IT at Work 9.6, which describes
a real case, but one that occurs nonetheless throughout all types of organizations.
Chris was a compulsive gambler, and she hid it well. Her
problem began innocently at work when one day a casino
website popped up on her computer as she surfed the
Internet during lunch. She placed a few bets using the free
credits offered by the site to entice first-time players. She
won, and that gave her a thrilling feeling, she would later
explain to fraud investigators.
Two years later, as the payroll manager of a medium-
sized manufacturing firm, Chris had defrauded her employer
of over $750,000. Why did she do it? To pay off her gam-
bling losses that were costing her an average of $7,000 a
week. How did she do it? She took advantage of the lack of
controls in her company’s payroll and accounting information
systems and controls.
Chris’s Employment History and Deception
Chris had worked at the company for a decade. Her perfor-
mance reviews described her as hardworking, reliable, and
loyal, but did not mention she felt underpaid. Chris was bit-
ter, thinking her employer did not treat her fairly. When her
gambling began to spiral out of control, she turned to fraud.
“As far as I was concerned, they owed me,” she told the
forensic accountants.
The company’s HR manager and comptroller were
supposed to review Chris’s work. But, the HR manager
focused on providing her with the correct data for employ-
ees’ wages and benefits. The comptroller appeared not to
have exercised control over payroll processing, which Chris
knew.
Chris created two phony employees on the company’s
hourly payroll system as a new and separate cost center. As
she processed and received the records sent to and from an
external payroll provider (EPP) without effective oversight,
she was able to control the scheme without detection. The
phantom employees’ checks were drawn up manually by EPP,
sent to Chris, and deposited into an account she maintained
IT at Work 9 . 6
Lax Accounting Controls Invite Fraud
c09EffectiveAndEfficientBusinessFunctions.indd Page 321 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
322 Chapter 9 Effective and Efficient Business Functions
in a bank near her home. Near year-end, she also had EPP
make adjustments to the payroll register to eliminate the
amounts paid to the phony employees. When she went on
vacation, she deactivated the two phony names from the
payroll.
Fraud Scheme Based on Lack of Oversight
Chris started paying herself for unauthorized overtime. This
plan proved to be a great success—she paid herself for 1,500
hours overtime over two years as opposed to the actual
50 she did work. Chris falsified records and increased the
size of her theft until the HR manager finally noticed. When
confronted with the evidence, she confessed that she had
gambled away the money and could not repay it.
Questions
1. What role did trust play in Chris’s ability to commit fraud
for so long (i.e., the employer’s trust in Chris)?
2. What role did weak accounting ISs play in her ability to
commit fraud?
3. In your opinion, if Chris knew that strong accounting ISs
were in place would that have deterred her from trying
to steal from her employer?
FINANCIAL PLANNING
AND BUDGETING
The management of financial assets is a major task in financial planning and bud-
geting. Financial planning, like any other functional planning, is tied to the overall
organizational planning and to other functional areas. It is divided into short-,
medium-, and long-term horizons, much like activities planning.
Knowing the availability and cost of money is a key ingredient for successful
financial planning. Especially important is projecting cash flows, which tells organi-
zations what funds they need and when, and how they will acquire them. In today’s
tough economic conditions with tight credit and limited availability of funds, this
function has become critical to most companies’ survival.
Inaccurate cash flow projection is the #1 reason why many small businesses go
bankrupt. The inability to access credit led to the bankruptcy of investment bank
Lehman Brothers in September 2008.
Budgeting
The best-known part of financial planning is the annual budget, which allocates the
financial resources of an organization among participants, activities, and projects.
The budget is the financial expression of the enterprise’s plans. Management allo-
cates resources in the way that best supports the mission. IT enables the introduc-
tion of financial logic and efficiency into the budgeting process. Several software
packages, many of which are Web-based, are available to support budget prepara-
tion and control.
Capital budgeting is the process of analyzing and selecting investments with the
highest ROI for the company. The process may include comparing alternative invest-
ments; for example, evaluating private cloud vs. public cloud computing options.
The major benefits of using budgeting software are that it can reduce the time
and effort involved in the budget process, explore and analyze the implications of
organizational and environmental changes, facilitate the integration of corporate
strategic objectives with operational plans, make planning an ongoing continuous
process, and automatically monitor exceptions for patterns and trends.
Forecasting
As you read, a major reason organizations fail is their inability to forecast and/or
secure sufficient cash flow. Underestimated expenses, overspending, financial
mismanagement, and fraud can lead to disaster. Good planning is necessary, but
not sufficient, and must be supplemented by skillful control. Control activities in
organizations take many forms, including control and auditing of the information
systems themselves. Information systems play an extremely important role in sup-
porting organizational control, as we show throughout the text. Specific forms of
financial control are discussed in the next section.
c09EffectiveAndEfficientBusinessFunctions.indd Page 322 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.5 Human Resource Systems, Compliance, and Ethics 323
Financial Ratio Analysis
A major task of the accounting/finance department is to watch the financial health
of the company by monitoring and assessing a set of financial ratios. These ratios
are also used by external parties when they decide whether to invest in an organiza-
tion, extend credit, or buy it.
The collection of data for ratio analysis is done by the TPS, and computation of
the ratios completed through financial analysis models. Interpretation of ratios and
the ability to forecast their future behavior require expertise, which is supported by
DSSs (decision support systems).
Profitability Analysis and Cost Control
Companies are concerned with the profitability of individual products or ser-
vices, product lines, divisions, or the financial health of the entire organization.
Profitability analysis DSS software allows accurate computation of profitability and
allocation of overhead costs. One way to control cost is by properly estimating it.
This is done by using special software. For example, Oracle Hyperion Profitability
and Cost Management software is a performance management app that provides
insights into costs and profitability. This app helps managers evaluate business
performance by discovering the drivers of cost and profitability and improving
resource alignment. Sophisticated business rules are stored in one place, enabling
analyses and strategies to be shared easily across an enterprise.
Questions
1. What is eXtensible Business Reporting Language (XBRL)?
2. Why does the SEC mandate data disclosure, whereby data items are
tagged to make them easily searchable?
3. What is insider fraud? What are some other terms for insider fraud?
4. What is fraud risk management?
5. What four factors increase the risk of fraud?
6. Explain how accounting ISs can help deter fraud.
7. Defi ne capital budgeting.
8. What is the purpose of auditing?
Companies cannot simply hire a great workforce. They have to find, recruit, moti-
vate, and train employees to succeed in their workplace. Retaining high-performance
people requires monitoring how people feel about the workplace, their compensa-
tion, value to the company, and chances for advancement—and maintaining work-
place health and safety.
HR is a field that deals with employment policies, procedures, communications,
and compliance requirements. Effective HR compliance programs are a necessity
for all organizations in today’s legal environment. HR needs to monitor workplace
and employment practices to ensure compliance with the Fair Labor Standards Act
(FLSA), Occupational Health & Safety Agencies (OSHA), and the antidiscrimina-
tion and sexual harassment laws. Seven other employment laws to protect against
discrimination are listed in Table 9.3.
9.5 Human Resource Systems, Compliance, and Ethics
c09EffectiveAndEfficientBusinessFunctions.indd Page 323 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
324 Chapter 9 Effective and Efficient Business Functions
TABLE 9.3 HR Monitors Compliance with Antidiscrimination Employment Laws
Title VII of the Civil Rights Prohibits discrimination on the basis of race,
Act of 1964 color, religion, national origin, and sex. It also
prohibits sex discrimination on the basis of
pregnancy and sexual harassment.
Civil Rights Act of 1966 Prohibits discrimination based on race or
ethnic origin.
Equal Pay Act of 1963 Prohibits employers from paying different
wages to men and women who perform
essentially the same work under similar
working conditions.
Bankruptcy Act Prohibits discrimination against anyone who
has declared bankruptcy.
Americans with Disabilities Act Prohibits discrimination against persons with
disabilities.
Equal Employment Opportunity Act Prohibits discrimination against minorities
based on poor credit ratings.
Age Discrimination in Employment Act Prohibits discrimination against individuals
(ADEA) who are age 40 or above.
Compliance Is Good Business
While carrying out day-to-day operations or trying to
hit targets, managers may lose sight of the big picture.
A narrow focus can lead to serious compliance and
regulatory violations, which can do permanent damage
to the brand and expose managers to criminal charges.
Crossing the line is a crime.
According to the U.S. Department of Justice (DOJ)
Federal Prosecution of Corporations (1999):
Corporations are “legal persons,” capable of suing
and being sued, and capable of committing crimes.
Under the doctrine of respondeat superior, a corpo-
ration may be held criminally liable for the illegal
acts of its employees, directors, officers, and agents.
In all cases involving wrongdoing by corporate
agents, prosecutors should consider the corporation,
as well as the responsible individuals, as potential
criminal targets.
Source: justice.gov.
CAREER INSIGHT 9 . 1
HR INFORMATION
SYSTEMS
Effective human resource information systems (HRISs) reduce the workload of
the HR department. PeopleSoft Human Capital Management, which is one of the
market-leading HRISs, provides a global foundation for HR data and improved
business processes.
c09EffectiveAndEfficientBusinessFunctions.indd Page 324 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
9.5 Human Resource Systems, Compliance, and Ethics 325
HRISs have been moved to intranets and clouds—wherein HR apps are leased
in SaaS arrangements. Using intranets, HR apps have shifted many routine tasks to
employees who log in to manage their benefits, deductions, direct deposits, health
care, and the like. When employees manage their own HR services, HR profes-
sionals can focus on legal and compliance responsibilities, employee development,
talent management, hiring, and succession planning.
Benefits of SaaS for HR
Three real-world examples illustrate the benefits of tying SaaS to global HR trans-
formation efforts:
• A global medical device manufacturer needed to create an independent HR
system as it divested from its parent company. Cloud computing was at the
core of its new global HR delivery model, which reduced the demand on
internal business and IT resources. The company was able to establish fully
independent HR operations within 10 months.
• A national nonprofit foundation with a fast-growing employee population
wanted to improve the effectiveness of HR operations. The organization
selected a cloud-based solution, which dramatically improved time to value
without overstretching internal IT resources. Because little front-end invest-
ment was required, the foundation hit its budget target.
• A global entertainment company needed a learning management system that
could deliver content varying from instructor-based training to 30-second
video how-to snippets. It chose to deploy a new learning management system
in the cloud. With this approach, it quickly got the new system up and running.
Figure 9.16 illustrates how IT facilitates the work of the HR department. The
figure summarizes the role HR plays in acquiring and developing talented people
in organizations.
Recruitment
Recruitment is the process of finding potential employees with the skills and talent
needed by the company, testing them, and deciding which ones to hire. Most com-
panies are flooded with applicants, but might still have difficulty finding the right
people. LinkedIn is a primary social media site for recruitment and headhunters.
Figure 9.16 HR management
activities.
Assessing
Measure performance,
evaluate, assess impact
Recruiting
Attract, select,
match, advertise
Developing Human
Resources
Train, create teams;
improve skills
Deploying
Assign the right people
to jobs, schedule
Retaining
Retain people,
motivate, compensate,
engage, and satisfy
Planning
Labor needs, skills,
sources, strategy
Planning
Labor needs, skills,
sources, strategy
c09EffectiveAndEfficientBusinessFunctions.indd Page 325 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
326 Chapter 9 Effective and Efficient Business Functions
MANAGEMENT
AND EMPLOYEE
DEVELOPMENT
HR PLANNING,
CONTROL, AND
MANAGEMENT
Once recruited, employees become part of the corporate HR talent pool, which
needs to be maintained and developed. Several activities supported by IT include
the following.
Performance Evaluation
Employees are evaluated periodically by their immediate supervisors. Peers or sub-
ordinates may also evaluate others. Evaluations are usually recorded on paper or
electronic forms. Using such information manually is a tedious and error-prone job.
Once digitized, evaluations can be used to support many decisions, ranging from
rewards to transfers to layoffs. For example, Cisco Systems is known for developing
an IT-based human capital strategy. Many universities evaluate professors online.
The evaluation form appears on the screen, and the students fill it in. Results can
be tabulated in minutes. Corporate managers can analyze employees’ performances
with the help of intelligent systems, which provide systematic interpretation of per-
formance over time. Several vendors provide software for performance evaluation,
such as HalogenSoftware.com and Capterra.com.
Training and Human Resources Development
Employee training and retraining are mportant activities of the human resources
department. Major issues are planning of classes and tailoring specific training
programs to meet the needs of the organization and employees. Sophisticated
HR departments build a career development plan for each employee. IT can sup-
port the planning, monitoring, and control of these activities by using workflow
applications.
In some industries, labor negotiation is an important aspect of HR planning and it
may be facilitated by IT. For most companies, administering employee benefits is
also a significant part of the human resources function. Here are several examples
of how IT can help.
Personnel Planning and HR Strategies
The HR department forecasts requirements for people and skills. In some geo-
graphical areas and for overseas assignments, it may be difficult to find particular
types of employees. In such cases, the HR department plans how to locate sufficient
human resources or develop them from within.
Benefits Administration
Employees’ contributions to their organizations are rewarded by salary/wage,
bonuses, and other benefits. Benefits include those for health and dental care as
well as contributions for pensions. Managing the benefits system can be a com-
plex task, due to its many components and the tendency of organizations to allow
employees to choose and trade off benefits. In large companies, using computers
for self-benefits selection can save a tremendous amount of labor and time for
HR staff.
Providing flexibility in selecting benefits is viewed as a competitive advantage
in large organizations. It can be successfully implemented when supported by
computers. Some companies have automated benefits enrollments. Employees can
self-register for specific benefits using the corporate portal or voice technology.
Employees self-select desired benefits from a menu. Payroll pay cards are now in
c09EffectiveAndEfficientBusinessFunctions.indd Page 326 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
Key Terms 327
use in numerous companies, such as Payless Shoes, which has 30,000 employees
in 5,000 stores. The system specifies the value of each benefit and the available
benefits balance of each employee. Some companies use intelligent agents to assist
employees and monitor their actions.
Employee Relationship Management
In their effort to better manage employees, companies are developing human capi-
tal management, facilitated by the Web, to streamline the HR process. These Web
applications are more commonly referred to as employee relationship management.
For example, self-services such as tracking personal information and online training
are very popular in ERM. Improved relationships with employees result in better
retention and higher productivity.
Ethical Challenges and Considerations
HRIS apps raise ethical and legal challenges. For example, training activities that
are part of HRM may involve ethical issues in recruiting and selecting employees
and in evaluating performance. Likewise, TPS data processing and storage deal
with private information about people, their performance, and so forth. Care
should be taken to protect this information and the privacy of employees and
customers.
The federal law related to workplace substance abuse, the Drug-Free Workplace
Act of 1990, requires employers with federal government contracts or grants to
ensure a drug-free workplace by documenting and certifying that they have taken
a number of steps. Dealing with alcoholism and drugs at work entails legal risks
because employees have sued for invasion of privacy, wrongful discharge, defama-
tion, and illegal searches. Employment laws make securing HR information neces-
sary for the protection of employees and the organization.
Questions
1. What are the key HR functions?
2. What are the benefi ts of moving HRISs to intranets or the cloud?
3. Why have companies implemented SaaS HR?
4. What concerns have deterred companies from implementing SaaS HR?
5. How can companies reduce the cost of recruiting qualifi ed employees?
6. Describe IT support for HR planning and control.
7. What are ethical issues related to HRM apps?
Key Terms
auditing
capital budgeting
computer-integrated
manufacturing (CIM)
economic order quantity
(EOQ)
eXtensible Business
Reporting Language
(XBRL)
Financial Accounting
Standards Board
(FASB)
fi nancial
misrepresentation
fraud risk management
inbound logistics
income statement
insider fraud
inventory control systems
just-in-time (JIT)
manufacturing quality
control (QC) systems
mission
moral hazard
online transaction
processing (OLTP)
outbound logistics
red fl ag
safety stock
standard operating
procedures (SOPs)
strategic plan
total quality management
(TQM)
transparency
c09EffectiveAndEfficientBusinessFunctions.indd Page 327 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
328 Chapter 9 Effective and Efficient Business Functions
Assuring Your Learning
1. Discuss the need for sharing data among functional
areas.
2. How does waste increase costs? Give three
examples.
3. What is the value of lean manufacturing?
4. What is the objective of EOQ?
5. What are the risks of JIT?
6. Explain the value of being able to respond to hot data.
7. Push-through ads use data about a person to deter-
mine whether the ad should appear. What market-
ing opportunities does this capability create?
8. Explain why the SEC requires that fi lers use XBRL.
9. How can internal controls help to prevent fraud?
10. How do companies allow themselves to become
targets for insider fraud?
11. What are the benefi ts of prosecuting an employee
who has committed fraud against the company?
12. Why might a company not want to prosecute a
fraudster?
13. Explain moral hazard. Give a fraud-related
example.
14. Fraudsters typically spend the money they steal
on luxury items and vacations. Explain why these
items are red fl ags of fraud.
15. What are three examples of strong internal
controls?
16. Discuss how IT facilitates the capital budgeting
process.
17. Discuss the role IT plays in auditing.
18. Explain the role and benefi ts of SaaS in HR man-
agement.
19. How does digital technology improve the recruit-
ment process?
DISCUSS: Critical Thinking Questions
1. Visit the Oracle website at www.oracle.com.
a. Search for “Peoplesoft.”
b. Select Human Capital Management and review
the HR applications. Describe three benefi ts of
PeopleSoft Human Capital Management.
c. Return to the Peoplesoft site. Select Financial
Management. Describe how PeopleSoft Financial
Management reduces costs.
2. Search for a video or demo that explains EOQ.
Explain the formula.
3. Finding a job on the Internet is challenging; there are
almost too many places to look. Visit two recruiting
sites, for example, careerbuilder.com and LinkedIn.com.
What benefi ts do these sites provide to you as a job
seeker?
4. Examine the capabilities of two fi nancial software
packages: Prepare a table that clearly compares and
contrasts their capabilities.
5. Review Salesforce.com. What functional support
does the software provide?
EXPLORE: Online and Interactive Exercises
6. Research and analyze a major corporate fraud.
a. Identify the company and explain when and
how the fraud occurred, who was involved, and
damages.
b. How was the fraud detected?
c. Describe any red fl ags associated with the fraud.
d. Visit SAS.com and search “SAS fraud manage-
ment.” Explain how SAS fraud management
could have helped prevent the fraud.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
c09EffectiveAndEfficientBusinessFunctions.indd Page 328 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
CASE 9.2 Business Case 329
CASE 9.2
Business Case: HSBC Combats Fraud in Split-second Decisions
With billions of dollars, corporate reputations, customer
loyalty, and criminal penalties for noncompliance at stake,
fi nancial fi rms must outsmart fraudsters. Detecting and pre-
venting fraudulent transactions across many lines of business
(checking, savings, credit cards, loans, etc.) and online chan-
nels require comprehensive real time data analytics to assess
and score transactions. That is, each transaction has to be
analyzed within a split second to calculate the probability
that it is fraudulent or legitimate.
A big part of a bank’s relationship with customers is
giving them confi dence that they are protected against fraud,
and balancing that protection with their need to have access
to your services.
HSCB Overview
HSBC is a commercial bank known by many as the “world’s
local bank.” HSBC is a United Kingdom–based company
that provides a wide range of banking and related fi nancial
services. The bank reported a pre-tax profi t of $6.8 billion
in the fi rst quarter of 2014 (1Q 2014). It has 6,300 offi ces in
75 countries and over 54 million customers.
Fighting Fraudulent Transactions
HSBC was able to reduce the incidence of fraud across tens
of millions of debit and credit card accounts. The bank imple-
mented the latest Fraud Management software from SAS. The
software includes an application programming interface (API)
and a real time transaction scoring system based on advanced
data analytics. Using the Fraud Management app, HSBC has
reduced its losses from fraudulent transactions worldwide and
its exposure to increasingly aggressive threats. The antifraud
solution is live in the United States, Europe, and Asia, where it
protects 100 percent of credit card transactions in real time.
Scenario
Consider this scenario. A credit card transaction request
comes in for the purchase of $6,000 in home appliances. The
bank has a moment to decide to approve the transaction, or
reject it as potentially fraudulent. Two outcomes are possible:
• Legitimate purchase rejected: When a legitimate pur-
chase is rejected, the customer might pay with another
card. The bank loses the fee income from the purchase
and the interest fee. Risk of account churn increases.
• Fraudulent purchase accepted: When a fraudulent pur-
chase is accepted, a legitimate customer becomes a victim
of a crime. The bank incurs the $6,000 loss, the cost of the
fraud investigation, potential regulatory scrutiny, and bad
publicity. Chances of recovering any losses are almost zero.
With trillions of dollars in assets, HSBC Holdings plc is a prime
target for fraud. Fighting all forms of fraud—unauthorized
use of cards for payment and online transactions, and even
customer fraud—has risen to the top of the corporate
agenda. Fraud losses are operating costs that damage
the bottom line.
As required by regulations, HSBC has implemented poli-
cies to segregate duties, create dual controls, and establish
strong audit trails to detect anomalies. In addition, the bank
has antifraud technology, which includes SAS Fraud Manage-
ment, to monitor and score the millions of daily transactions.
It is the cornerstone of these efforts.
Fraud Management
In 2007 HSBC’s fi rst SAS implementation went live in the
United States, which was their largest portfolio with 30 million
cards issued there. All transactions were scored in real time.
Detection rates on debit ATM transactions have been very
effective. HSBC has updated its Fraud Management solution
multiple times as newer technology and threats emerged.
Of course, fi nancial fraud morphs to avoid new detec-
tion methods so antifraud models have a very short shelf
life. Once HSBC closes up one loophole, thieves devise new
threats to exploit other potential vulnerabilities. To counter-
act threats, fraud-monitoring algorithms and scoring models
require constant refreshing.
Sources: BusinessWire (2011), SAS.com (2014), Reuters (2014), YouTube
video “HSBC Relies on SAS for Comprehensive Fraud Detection.”
Questions
1. Analyze the reasons to invest millions of dollars to detect
and prevent fraudulent transactions. In your evaluation,
do a cost–benefi t analysis to show why the investment
cost is worthwhile.
2. Review the two outcomes of the fraud scenario. Assess
the business implications of each of the following two
goals. Explain why these goals are confl icting.
a. To minimize rejecting legitimate purchases by autho-
rized customers
b. To minimize the risk of making customers victims of
fraud
3. The Fraud Management solution is based on a scoring
model. For example, assume the scores range from 1 to
10, with 10 being the highest probability that the transac-
tion is fraudulent. What cutoff score would you use to
decide to approve a purchase? What cutoff score would
you use to decide not to approve a purchase? If those
cutoff scores are not the same, how do you suggest
those falling between scores be treated?
4. Why are approval decisions made in a split second? Would
customers tolerate a brief delay in the approval process if
it reduced their risk of identity theft? Explain your answer.
5. Research ATM or other banking transaction fraud. How
has a fi nancial fi rm been defrauded or harmed?
c09EffectiveAndEfficientBusinessFunctions.indd Page 329 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
330 Chapter 9 Effective and Efficient Business Functions
Video Case: United Rentals Optimizes Its Workforce
with Human Capital Management
Visit Oracle.com and search “United Rentals Optimizes
Workforce.” Click on the video link to “United Rentals
Optimizes Its Workforce with Oracle HCM.” Watch the video.
Describe the key benefi ts of its HR software. Visit Forbes.com
and search for the article “10 Trends Driving the Mandate for
Modern HCM” posted on February 7, 2014.
Questions
1. Typically, the importance of the HR function is over-
looked, or at least overshadowed by accounting and
fi nance, which manage cash and other fi nancial assets.
In your opinion, is HCM software as important as
accounting software? Explain your answer.
2. Briefl y describe three of the key trends driving HCM and
how they relate to the HR software benefi ts at United
Rentals.
CASE 9.3
Accenture.com. “Ducati Motor Holding S.p.A: SAP Dealer
Communication System.” 2014.
Apple.com. “Ducati.” 2014.
BusinessWire. “SAS Fraud Management Speeds Real time
Processing, Boosts Detection and Prevention.” June 15, 2011.
Ducati Motor Holding S.p.A. 2014. http://www.ducatiusa.com/
index.do
fasb.org. “US GAAP Financial Reporting Taxonomy.” 2012.
Johnson, P., L. Volonino, & I. Redpath. “Fraud Response
and Litigation-Readiness Strategies for Small and Medium
Businesses: A Handbook on How to Prepare for Litigation,
Prosecution & Loss Recovery in Response to Insider Fraud.”
IFP.org, November 2011.
Justice.com, 2014.
Oracle.com. 2014.
Reuters. “HSBC Holdings plc Company Profi le.” 2014. http://
www.reuters.com
Salesforce.com. 2014.
SAP.com. 2014.
SAS.com. “Reduce Losses from Fraudulent Transactions.”
http://www.sas.com
sec.gov. 2014
Wilson, D. “Manufacturing Technology: Hard Work.” The Engi-
neer 33, April 25, 2011.
xbrl.sec.gov. 2014.
References
c09EffectiveAndEfficientBusinessFunctions.indd Page 330 11/8/14 9:54 AM f-w-204a /208/WB01490/9781118897782/ch09/text_s
Chapter Snapshot
Many enterprises in business for over 25 years have
mission-critical information systems that run on main-
frame computers and software implemented in the
1980s or 1990s. These legacy systems run core business
processes that may handle tens of millions of transac-
tions. Disadvantages of a legacy core are that they are
1. Explain the potential executive, managerial, and
operational support of enterprise systems, their success
factors, and reasons for failure.
2. Identify the leading enterprise social platforms and their
capabilities.
3. Describe the functions of enterprise resource planning
(ERP) systems, implementation risks, and how ERP
investments are justified.
4. Explain the planning and forecasting, sourcing and
purchasing, and distribution support provided by supply
chain management (SCM) systems.
5. Describe customer relationship management (CRM)
systems and their role in customer acquisition, retention,
and customer lifetime value.
Learning Outcomes
331
Chapter Snapshot
Case 10.1 Opening Case: Strategic Technology
Trend—3D Printing
10.1 Enterprise Systems
10.2 Enterprise Social Platforms
10.3 Enterprise Resource Planning Systems
10.4 Supply Chain Management Systems
10.5 Customer Relationship Management
Systems
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 10.2 Business Case: Avon’s Failed SAP
Implementation: Enterprise System Gone Wrong
Case 10.3 Video Case: Procter & Gamble:
Creating Conversations in the Cloud with 4.8 Billion
Consumers
References
Strategic Technology
and Enterprise
Systems10
Chapter
c10StrategicTechnologyAndEnterpriseSystems.indd Page 331 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
difficult and expensive to maintain, update, and interface
securely with leading-edge business apps. When compa-
nies decide to update, they invest in enterprise systems.
Enterprise systems—ERP, SCM, and CSM—are inte-
grated by their connection to central data repositories
that enable them to synch and share the latest data, as
illustrated in Figure 10.1.
In Chapter 10, you will learn the benefits, limitations,
and implementation risks of cross-functional enterprise
systems and business apps that support business strat-
egy, managers, and employees—and relationships with
suppliers and customers.
332
CASE 10.1 OPENING CASE
Strategic Technology Trend—3D Printing
According to global investment
management firm Goldman Sachs:
3D printing is 1 of 8 technologies that
are going to creatively destroy how we
do business.
IT research firm Gartner predicted:
3D printing of nonliving medical devices
such as prosthetic limbs, combined with
fast population growth and insufficient
health care in emerging markets, is likely
to cause an explosion in demand for the
technology.
Global research firm McKinsey
forecasted:
3D printing is 1 of 12 disruptive
technologies that could deliver major
economic impact to the global economy
by 2025.
Figure 10.2 Strong forecasts
for 3D printing made
by leading research and
investment management
fi rms—Goldman Sachs,
Gartner, and McKinsey.
Figure 10.1 Integration
of enterprise systems is
achieved via access to
shared data.
3D PRINTING, ADDITIVE
MANUFACTURING
With 3D printing, computer-created digital models are used to create real-world
objects. 3D printing, which is also called additive manufacturing, has produced toys,
jewelry, food, spare parts, and more.
©
v
ae
en
m
a/
iS
to
ck
p
ho
to
c10StrategicTechnologyAndEnterpriseSystems.indd Page 332 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
CASE 10.1 Opening Case 333
For several decades, 3D printing has been used by manufacturers to reduce
research and development (R&D) costs. 3D printing builds products layer by layer,
a process that has less overhead costs and allows for more complex designs. Using
this technology, engineers rapidly created a physical prototype of a new design.
The prototype was used to test the quality of the design and to check for defects.
Until recently, 3D printers were expensive. Prices dropped significantly from more
than $100,000 to models that cost a few hundred dollars, as shown in Figure 10.3.
Figure 10.4 shows Urbee, the first 3D-printed car. Not only is Urbee designed to
be highly energy-efficient, the manufacturing processes to build it are clean and
energy-efficient.
TABLE 10.1 Overview of 3D Printing
What is 3D printing? 3D printing, also known as additive
How does it work? manufacturing, builds objects layer by layer.
Traditional manufacturing typically uses a
subtractive process, whereby materials are cut,
ground, or molded to create an object.
What enterprise systems are The potential for 3D printing to revolutionize
impacted by 3D printing? ERP (enterprise resource planning) and SCM
(supply chain management) means business
and IT professionals must develop a framework
for evaluating its impact.
Where is 3D print technology 3D technology is being used by consumer-
used? product designers, automotive manufacturing
engineers, and dental labs for building proto-
types, replacement parts, and customized
products on demand. Retailers and manufacturers
are evaluating applications of 3D printing.
What factors are limiting 3D printing has not yet reached the point
widespread use? where its cost, speed, and scalability can
compete with traditional manufacturing.
Figure 10.3 3D printers
displayed at the Robot and
Makers Milano Show. ©
St
ef
an
o
Ti
nt
i/
Sh
ut
te
rs
to
ck
c10StrategicTechnologyAndEnterpriseSystems.indd Page 333 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
334 Chapter 10 Strategic Technology and Enterprise Systems
Figure 10.4 Urbee is the
world’s fi rst 3D-printed car.
The entire car body was
3D-printed using Stratasys
printers. Urbee is designed
to be highly energy-effi cient,
including manufacturing
processes.
CREATIVE
DESTRUCTION: 3D
PRINTING’S IMPACT ON
MANUFACTURING AND
RETAIL
Compared to traditional manufacturing and prototyping methods, 3D printing offers
high levels of customization, reduced costs for complex designs, and lower overhead
costs for short-run parts and products. A creative destroyer is how Goldman Sachs
describes 3D printing technology because its ability to build cheaper, better, and
more customizable products will, to some extent, destroy traditional manufactur-
ing methods. Capabilities of 3D printing hardware are expanding and costs have
dropped dramatically. They will be able to build larger components with greater
precision or resolution at higher speeds and lower costs. Forecasts indicate that 3D
printing is becoming a viable alternative to traditional manufacturing processes in a
growing number of applications.
According to McKinsey, 3D printing will have an impact on consumer sectors
that place a premium on highly customizable products, for example, footwear, toys,
and jewelry. McKinsey estimates that by 2025 sales of 3D-printed products in these
three industries alone may reach $550 billion per year.
The following examples show the potential of 3D printing.
Hardware Stores
When customers shop for replacement parts, the store could use a 3D printer with
all the pattern specifications to print onsite and on-demand. Hardware stores could
slash their inventory and store sizes, and improve customer service.
Defense
Troops in the field and their equipment require regular maintenance. Having a 3D
printer at small supply post in the field rather than at a larger base far away alters the
ability to complete maintenance and repair, and provide a supply chain in combat.
Health Care
Hospitals use expensive equipment, such as magnetic resonance imaging (MRI)
scanners. Downtime spent waiting for onsite repair is expensive. A technician
who was guided remotely by the manufacturer could diagnose and fix the problem
immediately by 3D-printing the MRI scanner replacement part onsite.
Hip surgery done with a 3D-printed titanium implant and bone stem cell
graft has been conducted in the U.K. The hip part was designed using the patient’s
CT scan, thereby matching the patient’s exact specifications and measurements.
Even more radical is the potential for complex and controversial 3D bioprinting
Creative destroyer is a
term coined by Joseph
Schumpeter in 1942 to warn
that innovation can disrupt
industries in capitalistic soci-
eties; and force established
companies and business
models to either adapt or
fail.
Supply chain starts with the
acquisition of raw materials
or the procurement (purchase)
of products and proceeds
through manufacture,
transport, and delivery—and
the disposal or recycling of
products.
3D bioprinting is the medical
application of 3D printing
to produce living tissue and
organs.
©
P
ie
ro
C
ru
ci
at
ti/
A
la
m
y
c10StrategicTechnologyAndEnterpriseSystems.indd Page 334 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
CASE 10.1 Opening Case 335
of human tissue and organs. Scientists are already 3D-printing tiny strips of organ
tissue. Although printing whole human organs for surgical transplants is still years
away, the technology is rapidly developing. The ethical arguments and challenges of
bioprinting will be discussed in Chapter 14.
Dental Work
Stratasys Ltd., a leader in 3D printing and additive manufacturing solutions, intro-
duced the highest-precision wax 3D printers available to the dental industry in mid-
2014. The Stratasys CrownWorx and FrameWorx 3D Printers allow dental labs to
create wax molds for crowns, bridges, and denture frameworks.
Reproduction of Vintage Car Components
In 1969 Ferrari introduced one of its most masterful race cars—the 312P, shown in
Figure 10.5. But parts for that vintage car do not exist. To rebuild an engine, a spe-
cial aluminum alloy was poured into a cast, which was created by 3D printing. The
new engine block and engine rebuild were completed in record time. 3D printing
is by far the most efficient method for reproducing components that are no longer
available. Often, it is the only way to reproduce certain components quickly and at
reasonable cost.
Aerospace Manufacturing
GE is using additive manufacturing to make fuel nozzles for its next-generation
Leap engines that will power the new Boeing 737 and Airbus A320 jets. The fuel
nozzles will be 25 percent lighter and 5 times more durable. Since there are 20 nozzles
in each engine, the weight savings for each aircraft are significant.
Industrial Design
Large industrial group Siemens explains that 3D printing allows its designers to
imagine shapes that would be impossible to create through older techniques. The use
of additive manufacturing has radically speeded up prototyping of Siemens’s gas tur-
bine blades, from 20 weeks to 48 hours. Additive manufacturing has also cut the cost
of tooling and materials. For example, a piece can have all of its holes incorporated
into it with precision because it is built up from powder rather than being expen-
sively drilled afterward. Siemens hopes to cut the cost of some parts by 30 percent.
Figure 10.5 Parts to rebuild
the Ferrari 312P have
vanished, so the engine was
rebuilt using 3D printing to
create the engine’s cast form. ©
B
G
M
ot
or
sp
or
ts
/A
la
m
y
c10StrategicTechnologyAndEnterpriseSystems.indd Page 335 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
336 Chapter 10 Strategic Technology and Enterprise Systems
Manufacturing On-Demand
The ability to manufacture replacement parts on-demand using 3D printers is
expected to transform after-market services and restructure industries. Smaller
facilities with 3D printers onsite could replace large regional warehouses. The
supply of service parts might even be outsourced: Small fabricators located, for
example, at airports, hospitals, or major manufacturing venues could make these
parts for much of the equipment used onsite, with data supplied directly by the
manufacturers.
Makeup 3D Printer
Harvard Business School graduate Grace Choi unveiled her Mink makeup 3D
printer at the 2014 TechCrunch Disrupt conference. With Mink, users create lip-
stick, blush, eyeshadow, and other makeup in any color and print it. The printer
uses the same substrates found in factory-made makeup, which means the printed
cosmetics are the same quality as those sold by retailers. At its 2015 debut, the
Mink 3D printer cost $200, making it affordable for the target 13 to 21 age demo-
graphic. How this will impact the multibillion dollar makeup industry remains to
be seen.
3D PRINTING WITHIN
AN ERP SYSTEM
The process of creating a product in traditional manufacturing is widely different
from 3D printing. Most parts are built by removing layers of material (cutting,
drilling, sanding, etc.), which results in the part’s final form. But with 3D printing,
layers of materials are added to each other by applying heat or chemicals to create
a finished product.
Manufacturers using 3D printing will need software in their ERP system that
understands and manages the 3D process. Figure 10.6 presents a simplified view of
the key role of ERP. For example, in order to combine specific materials or alloys,
the 3D printing process may involve heat or chemical reactions in order to create
something new. It will be more important than ever to maintain records of chemical
components that each stock-keeping unit (SKU) or part is made of. Since the
Figure 10.6 ERP systems act as the hub for managing inventory, order
management, HR, manufacturing, and other enterprise systems. Any change to
these systems impacts ERM.
stock-keeping unit (SKU) is
a code number, typically a
machine-readable bar code,
assigned to a single item of
inventory.
©
d
es
ig
nd
ep
ot
_l
td
/S
hu
tt
er
st
oc
k
c10StrategicTechnologyAndEnterpriseSystems.indd Page 336 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.1 Enterprise Systems 337
inventory of spare parts is much lower, the need for raw materials increases. ERP
systems will need accurate forecasting models to determine how much raw materi-
als to hold and the availability of 3D printers.
Just like any new technology that gains traction in business, 3D printers will
impact more parts of the business. This technology will transform industries—some
in unexpected ways.
Sources: Compiled from Fine (2014), Bourne (2014), goldmansachs.com (2014), Gartner.com (2014),
The Engineer (2014), Cole (2014), and Cohen et al. (2014).
Questions
1. What do the leading research and investment fi rms forecast for 3D
printing?
2. Why is 3D printing more appropriately called additive manufacturing?
3. Is 3D printing better suited for high or low volumes of production?
Explain your answer.
4. In what situations is 3D printing most valuable?
5. How would you benefi t from 3D printing?
6. How can 3D printing make some types of traditional manufacturing
obsolete?
7. Do you consider 3D printing an important technology? Explain.
Enterprise systems refer to a category of information systems that run an enterprise’s
operations and integrate core business processes. Enterprise systems link the enter-
prise with suppliers, business partners, and customers. Primary enterprise systems are:
• Enterprise resource planning (ERP)
• Supply chain management (SCM)
• Customer relationship management (CRM)
The major enterprise systems are described in Table 10.2. Companies imple-
ment most or all of these systems.
For maximum benefit, these systems are integrated to share data. For
example, the integration of ERP and SCM improves inventory management and
supply chain performance; and by integrating CRM and KM, companies can
capitalize on their data by calculating customer lifetime value (CLV). Another
advantage of enterprise systems is that processes can be automated for consis-
tency and efficiency.
10.1 Enterprise Systems
Core business processes
include accounting, finance,
sales, marketing, human
resources, inventory,
productions, and
manufacturing.
Customer lifetime value
(CLV) is a formula for
estimating the dollar value,
or worth, of a long-term
relationship with a customer.
A Value-added reseller (VAR)
customizes or adds features
to a vendor’s software or
equipment and resells the
enhanced product.
IMPLEMENTATION
CHALLENGES OF
ENTERPRISE SYSTEMS
Implementing an enterprise system is complex, time-consuming, and typically
requires the help of a consulting firm, vendor, or value-added reseller (VAR).
Integrating legacy systems with cloud-based applications is complex, as described
in Tech Note 10.1. Much of the complexity is due to getting new apps or system
modules to interface with existing or legacy systems that are several generations
older.
Interface means to connect
to and exchange data with
apps and systems.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 337 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
338 Chapter 10 Strategic Technology and Enterprise Systems
TECH NOTE 10.1 Data Transfers to Mainframes
Enterprise systems require data transfers—often to mainframes. Designing enterprise-
level systems involves a variety of components that had been implemented on
mainframes, midrange computers, networks, or cloud environments. In most large
enterprises, mainframes are the workhorse systems that run the majority of business
transactions. In contrast, customer interfaces through customer service; ERP, CRM,
and SCM apps; websites; and B2B interactions are usually on distributed systems or
in the cloud. Many times seemingly well-planned projects fail and require extensive
reworking because integration issues had not been properly planned.
Some enterprises choose to avoid the challenges of integration by creating a
new system that replaces the full functionality of the old one. This option is the most
costly, diffi cult, and risky. An advantage is that this option offers a longer-term solu-
tion that is agile to respond to changing business needs. Despite that potential pay-
off, complete replacement requires a large up-front investment for development,
poses diffi culties in duplicating behavior of the legacy system, and increases the risk
of complete software project failure.
TABLE 10.2 Enterprise Systems and Their Functions
Name Abbreviation Description
Enterprise ERP ERP is the software infrastructure that
resource integrates an enterprise’s internal appli-
planning cations, supports its external business
processes, and links to its external business
partners.
ERP systems are commercial software
packages that integrate business processes,
including supply chains, manufacturing,
fi nancial, human resources, budgeting,
sales, and customer service.
Supply chain SCM SCM software supports the steps in the
management supply chain—procurement, sourcing,
manufacturing, storage, inventory
control, scheduling, order fulfi llment, and
distribution.
SCM improves decision making,
forecasting, optimization, and analysis.
Customer CRM CRM systems help create a total view of
relationship customers to maximize share-of-wallet
management and profi tability. CRM is also a business
strategy to segment and manage
customers to optimize customer lifetime
value (CLV).
Enterprise systems are
cross-functional and
interorganizational systems
that support the business
strategy.
Legacy systems are older
information systems that
have been maintained over
several decades because
they fulfill critical needs.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 338 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.1 Enterprise Systems 339
WHY COMPANIES
INVEST IN ENTERPRISE
SYSTEMS
Companies tend to migrate to an enterprise solution when they need to consolidate
their disparate systems, such as when limitations caused by their existing legacy
systems interfere with performance or the ability to compete. IT at Work 10.1 is
an example. Here are major reasons why companies replace parts of their legacy
systems or supplement them with enterprise systems. It is important to realize that
many companies do not have the resources to replace all their legacy systems.
• High maintenance costs. Maintaining and upgrading legacy systems are
some of the most difficult challenges facing CIOs (chief information offi-
cers) and IT departments.
• Inflexibility. Legacy architectures were not designed for flexibility. These
huge systems cannot be easily redesigned to share data with newer systems,
unlike modern architectures.
• Integration obstacles. Legacy systems execute business processes that are
hardwired by rigid, predefined process flows. Their hardwiring makes inte-
gration with other systems such as CRM and Web-based applications dif-
ficult and sometimes impossible.
• Lack of staff. IT departments find it increasingly difficult to hire staff who
are qualified to work on mainframes and applications written in languages
no longer used by the latest technologies.
• Cloud. The cloud has lowered up-front costs. Cloud-based enterprise sys-
tems can be a good fit for companies facing upgrades to their legacy ERP
and other enterprise systems.
Organic Valley Family of Farms is the largest U.S. coopera-
tive (co-op) of organic farmers and one of the nation’s lead-
ing organic brands. The co-op represents over 1,300 family
farms in 34 states and Canada. Its mission is to keep small
and mid-sized farmers farming. Organic Valley produces
over 200 organic foods, including organic milk, soy, cheese,
butter, eggs, produce, juice, and meats, which are sold in
supermarkets, natural foods stores, and food co-ops, and as
ingredients for other organic food manufacturers nationwide.
One of the biggest challenges for Organic Valley had been
managing growth in the face of increasing competition from
larger companies.
Need to Consolidate Disparate Systems
Organic Valley needed to consolidate its disparate systems
into one enterprise solution to improve operating efficien-
cies and maintain the high quality of its line of perishable
food products. The company had been doing planning
using spreadsheets; separately, it completed its financials,
order management, and inventory on an enterprise system
designed for discrete manufacturing. As operations expanded,
it needed to make a major leap in business systems.
Organic Valley also needed a solution with enough
flexibility and versatility to manage the company’s dairy,
produce, meat, and egg lines of business, all of which have
different and unique requirements.
Use of a Consultant and Vendor
Organic Valley hired a consultant during the selection
process to help identify the most important functions and
features, such as shelf-life management and expiration date
management. Based on these requirements, three possible
vendors were identified. Organic Valley and its consultant
agreed that the solutions offered by the vendor Infor best
fit its business.
Doing Business Better
The company now has one integrated system to support all
business processes across all of its lines of business. With the
Infor enterprise solution, Organic Valley is much more agile
on the technical side, and this has given it the ability to sup-
port rapid business growth. The company projects savings of
$2 million per year through improved supply chain planning
and other operational efficiencies.
IT at Work 1 0 . 1
Organic Valley Does Business Better with Enterprise System
c10StrategicTechnologyAndEnterpriseSystems.indd Page 339 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
340 Chapter 10 Strategic Technology and Enterprise Systems
Questions
1. Why did Organic Valley need an enterprise system?
2. What factors contributed to the successful implementa-
tion and outcomes? Explain their importance.
3. Enterprise systems are expensive. What factor helped
justify the investment?
4. Using spreadsheets for planning is rather common. Why
do you think companies use stand-alone spreadsheets
for planning?
IMPLEMENTATION BEST
PRACTICES
Implementing best practices involves changes in the management of processes,
people, and existing systems. Three required changes are as follows:
1. Redesign of business processes. Processes need to be simplifi ed and redesigned
so that they can be automated, either totally or partially. Tasks that are no longer
necessary are removed from the processes.
2. Changes in how people perform their jobs. Jobs and how they are performed
will change to accommodate the new processes. Enterprise systems require re-
training users whose productivity will drop initially as they adjust to a new way
of doing their jobs.
3. Integration of many types of information systems. Integrating information sys-
tems is necessary so that data can fl ow seamlessly among departments and busi-
ness partners. Automated data fl ows are essential to productivity improvements.
A best practice is to examine the inefficiencies in existing processes to find ways to
improve on or significantly simplify the process. For example, manual document-
intensive processes such as order entry and billing create major headaches for
workers. These processes require users to manually review documents for approval,
enter data from those documents into a back-office system, and then make deci-
sions. Automated order entry systems track customer orders from the time of initial
order placement through the completion of those orders, and perform backorder
processing, analysis, invoicing, and billing.
Common ways to overcome implementation complexity are to lease or license
from vendors. The trend toward ERP SaaS (software as a service) continues to
increase. In fact, the term ERP commonly refers to commercially available software
systems.
ENTERPRISE SYSTEMS
INSIGHTS
Here are three other insights related to enterprise systems to better understand the
current state of enterprise systems and their potential.
1. One of the IT department’s most important roles is to provide and support ap-
plications that enable workers to access, use, and understand data. These appli-
cations need to be tightly aligned with well-defi ned and well-designed business
processes—a standard that few enterprises are able to achieve.
2. Customer loyalty helps drive profi ts, but only for customers who are profi table
to the company. Many companies do not know how to recognize or encourage
the kind of customer loyalty that is worth having. Using data about buying be-
haviors (e.g., amount spent per month; purchase of high-margin products; return
activity; and demands for customer service) helps a company identify its loyal
customers and which ones are profi table.
3. Companies worldwide spend billions of dollars in the design and implementa-
tion of enterprise systems. Huge investments are made in ERP systems from
vendors such as SAP, Oracle JD Edwards, Sage ERP, EVO~ERP, Infor, and
NetSuite to create an integrated global supply chain. Interorganizational ISs
play a major role in improving communication and integration among fi rms in a
global supply chain.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 340 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.2 Enterprise Social Platforms 341
Questions
1. Explain the purpose of an enterprise system.
2. Describe three types of enterprise systems.
3. What is customer lifetime value (CLV)?
4. What is a value-added reseller (VAR)?
5. What are two challenges of legacy systems?
6. Why do companies migrate to enterprise systems?
7. Explain the challenges of enterprise system implementation.
8. Explain the three types of changes needed when an enterprise system
is implemented.
Social media has rewired the way we connect with people, information, breaking
news, work, entertainment, and things. Enterprise social refers to private (company-
owned) social media, software, platforms, or apps specially designed for use by busi-
ness leaders and employees to fulfill the strategic mission. As of 2014, enterprise
social technology had made it easier for employees to connect and collaborate with
others, stay informed, build relationships, and share documents and data.
10.2 Enterprise Social Platforms
GROWTH OF
ENTERPRISE SOCIAL
INVESTMENTS AND
MARKETS
In 2011 Forrester conducted its first-ever evaluation of enterprise social platform
vendors. According to the report The Forrester Wave: Enterprise Social Platforms,
Q3 2011 (Koplowitz, 2011), there was a noticeable change in IT investments.
Specifically, 25 percent had planned to invest in enterprise systems, while 37 per-
cent had planned investments in enterprise social platforms and collaboration tools.
There were three main reasons for greater interest in enterprise social:
1. Knowledge management: To capture and reuse knowledge within the enterprise
2. Collaboration: Maintain human connections across a disparate workforce
3. Employee pressure: Pressure from workers to use the social technologies they
preferred to use
The trend is toward more informal communication methods in organizations.
Companies seek to integrate and embed social into primary enterprise solutions to
support business-critical decisions and more social workflows as an alternative to
existing communication channels.
Vendors in the enterprise social market have been responding to growing
demand. In 2012 Microsoft acquired the four-year-old company Yammer for
$1.2 billion. The Yammer deal put Microsoft further into the market of developing
social media services specifically for enterprises, an area in which companies such as
Oracle, Salesforce, and IBM have actively invested. Microsoft’s General Manager
Jared Spataro told the audience at the SharePoint Conference that “Microsoft is all
in on Yammer and SharePoint.” Yammer is the social collaboration tool of choice
for SharePoint going forward (Ryan, 2014). Employees can interact socially while
doing work at the same time. Figure 10.7 shows the landing page for Yammer.
SHAREPOINT SharePoint was initially released by Microsoft in 2001, and by 2015, 75 percent of
Fortune 500 firms were using it. SharePoint is difficult to define because it is not
a single software program, but rather a platform for multiple kinds of programs
and apps. The platform is a back-end system that links employees’ computers and
mobile devices to make it easy to communicate and to synchronize their efforts. At
Yammer is a social network
geared toward enterprises.
Employees collaborate
across departments, locations,
and business apps.
SharePoint is a collaborative
and social platform from
Microsoft.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 341 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
342 Chapter 10 Strategic Technology and Enterprise Systems
companies that have their SharePoint on-premises, they are now considered legacy
systems. SharePoint in the Microsoft Cloud is the later version. Microsoft continues
to enhance the Office 365 version of SharePoint and Yammer at a much faster pace
than SharePoint 2013 on-premises.
SharePoint has the following social capabilities.
Intranet and Extranet
Intranets are the internal-facing sites everyone in a company logs into to find news,
announcements, scheduled tasks, and access to files and data. Dashboards are cus-
tomized by department and role to control access. SharePoint also provides tools
for setting up employee social network platforms and company wikis. SharePoint
can be used to set up a secure, access-controlled extranet site to share with external
partners in the supply chain, contractors, and so on.
Documents
SharePoint provides a shared space to store documents, so they are not siloed on
any one person’s hard drive or device. Documents stored on SharePoint can be
accessed by anyone in the company—unless the administrator has limited access.
SharePoint enables coworkers to work simultaneously on a single document, save
previous versions, and track updates.
Collaboration and Business Intelligence
The platform makes it easy for users to stay up-to-date and to coordinate their
efforts on projects from any desktop or mobile device; and to discover patterns and
insights in enterprise data.
Yammer
Yammer is “Facebook for business.” The platform has features similar to Facebook
likes, newsfeeds, threaded conversation, and direct messaging. This private social
channel helps employees, partners, and customers communicate; exchange infor-
mation; and collaborate across departments, locations, and business apps.
Smart companies connect their employees’ desire to contribute and interact
with peers with their own need to get timely feedback from the trenches. Red
Robin, discussed in IT at Work 10.2, learned the benefits of Yammer for entry-level
employees. Six recommendations for realizing business value from enterprise social
networking are listed in Table 10.3.
Figure 10.7 Yammer
enterprise social network
website. Over 400,000
companies worldwide have
integrated enterprise social
into the way people already
work.
Microsoft Cloud provides
a hybrid infrastructure and
capabilities to manage
enterprise apps and data.
©
N
et
Ph
ot
os
/A
la
m
y
c10StrategicTechnologyAndEnterpriseSystems.indd Page 342 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.2 Enterprise Social Platforms 343
At the first ever YamJam Conference in 2012, Yammer’s CEO and founder
introduced the new platform Enterprise Graph—calling it an enhanced way for
business to be more social. Enterprise Graph tries to show how users are related
to one another. It enables developers and customers to seamlessly connect people,
conversations, and data across all their business services. With Enterprise Graph,
Yammer solves the social network sprawl problem, which is when businesses end
up interacting with multiple social networks inside their own company. The objec-
tive is to develop a standard that brings everything together and works off the same
database.
Office Graph and Oslo App
Microsoft’s newer project, code-named Oslo, builds on the concept of the Enterprise
Graph. One of the significant features of Yammer is how it maps the relationships
between people and information by simply recording likes, posts, replies, shares,
and uploads. Microsoft applied these capabilities to Office with Office Graph. Office
Graph uses signals from e-mail, social conversations, documents, sites, instant mes-
sages, meetings, and more to map the relationships between people and concepts.
By tapping into Office Graph, Oslo provides a natural way for users to navigate,
discover, and search people, information, and knowledge across the enterprise.
TABLE 10.3 Recommendations to Realize Business Value from Enterprise Social
1. Make sure management is listening. Leaders and decision makers need to monitor
social chatter to keep informed and respond promptly.
2. Provide visible feedback and rewards. Employee participation is largely driven by the
desire to be recognized by peers and managers.
3. Brand the social network. Employees want to feel the company is behind the initiative.
At Red Robin, for example, renaming Yammer to Yummer connected employees to
the brand.
4. Identify and leverage change agents. Start with those employees most eager to
participate, especially Millennials who are looking for recognition and purpose.
5. Introduce competitions and games. Experience shows that people are more likely to
engage when they are having fun.
6. Make the rules of engagement simple. Do not overengineer or control the social
network. Make it easy to enroll and participate.
Red Robin Gourmet Burgers, Inc. is a casual dining restaurant
chain serving an innovative selection of high-quality gour-
met burgers in a family-friendly atmosphere. In Q1 2014,
revenues were $340.5 million, representing an increase of
11.1 percent over Q1 2013. Revenue at comparable restaurants
had increased only 5.4 percent. The restaurant’s operating
profit, as a percent of restaurant revenue, increased to
22.4 percent in 2014 from 21.5 percent in 2013.
IT at Work 1 0 . 2
Red Robin Transforms Its Business with Yammer
c10StrategicTechnologyAndEnterpriseSystems.indd Page 343 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
344 Chapter 10 Strategic Technology and Enterprise Systems
FRONT-LINE STAFF
KNOW CUSTOMERS
BEST
In retail and restaurants, front-line employees understand the customer experience
far better than managers in remote corporate offices. Yet companies often do not
pay close attention to their front-line staff. Corporate culture is part of the reason,
but a lot has to do with the absence of a channel for employees to be heard. With
over 20,000 employees working in 355 restaurants in 42 states, Red Robin’s new
management team decided to give front-line employees a voice. In 2010 the com-
pany invested in enterprise social networking, in part, to reduce the high cost of
employee turnover that is common in the restaurant business.
ENGAGING EMPLOYEES
WITH YAMMER
Newly hired Senior VP of Business Transformation and CIO Chris Laping believed
that the company’s workers—87 percent are Millennials—were searching for mean-
ing. So engaging these workers in a meaningful way would create the atmosphere
that strengthened employee loyalty.
Laping selected Yammer as the private social channel for employees, partners,
and customers. The free version of Yammer was initially rolled out as a social
experiment, to see if employees would engage. A few employees were invited
to join Yammer. After they were urged to invite colleagues, membership spread
quickly. Eventually, two Yammer networks emerged at Red Robin: namely
Yummer, a network for restaurant managers, regional managers, and corporate
office members to exchange information and answer questions from field staff, and
Yummversity, a network for training employees. Yummer gave a voice to the silent
front-line workers at Red Robin. Prior to Yammer, these employees would pass
information up the company management chain, but they rarely received feedback
on the information or what was done in response to it.
Better Burgers Through Yummer and Yummversity
In 2012 Red Robin introduced a new menu item, the Tavern Double burger. It did
not receive customer feedback via Facebook, as expected. However, restaurant
servers and regional managers posted what they heard from customers on Yummer.
Managers at headquarters monitor Yummer so they immediately knew the burger
recipe needed to be adjusted.
They were able to respond with an updated menu within four weeks at much
lower cost. Prior to Yammer, this feedback loop took 6 to 12 months, and involved
running expensive focus groups and surveys, hiring outside consultants, scheduling
review sessions, and generating reports.
Millennials were born
between the early 1980s
and the early 2000s.
MINING EMPLOYEES’
IDEAS
“Blueprint Project” was a CEO-led initiative to uncover the best employee idea to
cut expenses and not negatively impact customer experience. A $1,000 prize was
announced and thousands of employees contributed ideas. The winning entry was
submitted by a Seattle location manager who proposed replacing disposable kid
beverage cups with reusable ones. According to Laping, this minor change was “a
six figure savings for the organization.”
Sources: Compiled from Red Robin website (2014) and Lavenda (2014).
Questions
1. Why are employees a source of valuable information? In your opinion,
why are employees an untapped resource at many companies?
2. How does Yammer capture BI from employees?
3. Explain Yummer and Yummversity. Why would employees want to use
them?
c10StrategicTechnologyAndEnterpriseSystems.indd Page 344 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.2 Enterprise Social Platforms 345
4. What is the expected benefi t of naming the enterprise social platform,
as Red Robin had done?
5. How did Red Robin motivate its employees to contribute to the
enterprise social net?
6. How did the restaurant reduce employee turnover?
ORACLE’S SOCIAL
NETWORK
Oracle’s social enterprise network connects processes, professionals, and enterprise
apps in one place. Users can update CRM leads, communicate in real time, and
search for key experts on the network. The social net also makes sharing files and
information easy with sales teams and company members. Employees can work on
documents together in real time, while having the option to access them anytime.
Conversations and CRM data on the network can be accessed through Microsoft
Outlook and mobile devices.
JIVE Jive’s enterprise social platform provides tools for communication, sharing, and
content creation to make social media monitoring and engagement easier. The
platform features activity streams that keep employees updated and a text editor
for users to create, review, and edit documents as a team.
Jive also has an enterprise search engine that offers social graph analytics and
insight into make searching easier. Users can search across their customer network
and SharePoint as well. Employees can also create blogs and custom attention
streams to track specific people, projects, or groups.
CHATTER Chatter is an add-on to Saleforce.com, a CRM tool. As with all other enterprise
social platforms, Chatter offers companies their own private network while pushing
updates and news in real time to user feeds. The software offers smart search, which
places items an employee frequently uses higher in the search list.
Like many enterprises, if someone was trying to solve a problem or get feed-
back on a presentation, he or she would send out a global e-mail. Some people
would reply to everyone, some would just reply to the sender, the e-mail thread
gets jumbled—and quickly becomes a mess. With Chatter, the problem-solving pro-
cess becomes a conversation rather than a series of disjointed e-mails. People can
interact and spark new ideas. There is no confusion over which is the latest version
of a document. Other employees can be brought into the conversation using the @
function. The whole process is just a much smarter way of working.
Chatter customer groups let users work with external customers, vendors, and part-
ners, with the option of limiting what they can see and access. Private groups can also
be set up when employees need to work on sensitive projects with certain colleagues.
Business processes can be approved from within a Chatter feed along with
vacation requests or hiring decisions.
The features of enterprise social will continue to evolve and disrupt existing
applications and the future of work.
Questions
1. What are the basic functions of an enterprise social platform?
2. What are the capabilities of SharePoint?
3. In what ways can enterprises realize value from Yammer or other enter-
prise social?
4. How do Offi ce Graph and Enterprise Graph support collaboration?
5. How does Chatter enable workers to solve problems?
c10StrategicTechnologyAndEnterpriseSystems.indd Page 345 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
346 Chapter 10 Strategic Technology and Enterprise Systems
10.3 Enterprise Resource Planning Systems
BRIEF HISTORY
OF ERP
ERP originated in the 1990s as a means to integrate accounting, finance, HR, mar-
keting, and other critical business functions. ERPs were devised to help managers
run a business. Ideally, each business function would access a centralized database
instead of data silos. In many cases, the ERP was bought, installed, and configured
by a vendor who supplied the entire suite of applications, or modules, for manu-
facturing, distribution, retail, and service organizations. Early ERPs ran on client–
server architectures and custom-designed apps that accessed the shared database
servers.
Then, like most modern business software, ERP systems migrated to a Web-
based architecture. Users accessed the ERP via a Web browser from within the
company or accessed it externally via the Internet using a secured encrypted virtual
private network (VPN).
ERP Today
ERP is now a mature technology, whose core components have not changed
much. What has changed are the way ERPs are deployed—on-premises, in the
cloud, or as a managed service—and users’ expectations. The latest ERP solutions
are designed with a focus on social collaboration, deployment flexibility, faster
response, and accessibility from mobile devices. They have touch-enabled user
interfaces designed to work with all touch-screen devices. New apps and mobile
add-ons enable:
• sales associates to process orders, take payments, and collect signatures with
an iPad app.
• field technicians to provide customer service from anywhere.
• marketing to manage every aspect of ongoing customer relationships using
a smartphone app.
• production to access to the real time information needed to reduce stock-
outs and excess inventory.
• customers to access, pay, and view invoices online.
The worldwide ERP software market grew almost 4 percent in 2013 and 2.2
percent in 2012 (Cole, 2014). SAP remained the ERP market leader, with ERP
sales of $6.1 billion in 2013. Next in the market are Oracle with sales of $3.1 billion;
Sage with $1.5 billion in sales; Infor with $1.5 billion; and Microsoft with $1.2 billion.
TECHNOLOGY
PERSPECTIVE
From a technology perspective, ERP is the software infrastructure that links an
enterprise’s internal applications and supports its external business processes.
Departments stay informed about what is ongoing in other departments that impact
its operations or performance. Knowing about problem situations and being able
to work around them saves time and expense, and preserves good customer rela-
tions. For example, using ERP, a manufacturer shares the database of parts, prod-
ucts, production capacities, schedules, backorders, and trouble spots. Responding
quickly and correctly to materials shortages, spikes in customer demand, or other
contingencies means that small initial problems are solved instead of allowing them
to be amplified down the line. Another example of the value of ERP is described
in IT at Work 10.3.
In Figure 10.8, you see how an ERP fits into an enterprise’s IT infrastructure.
The core ERP functions are integrated with other systems or modules, such as
SCM and CRM. An enterprise application integration (EAI) layer enables the
ERP to interface with legacy apps. EAI is middleware that connects and acts as a
go-between for applications and their business processes.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 346 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.3 Enterprise Resource Planning Systems 347
Acquisition
ERPs are not built in-house or built using proprietary software because the costs
and time to do so would be staggering. Typically, ERP systems are acquired by pur-
chasing or leasing in a SaaS arrangement. (You will read about IS acquisition and
contracts in Chapter 11.) All ERPs must be customized to the company’s specifica-
tions. Here are two examples:
• Boers & Co Fine Metalworking in the Netherlands has been manufacturing
fine mechanical parts, high-precision assembly, and sheet metal products for
over 100 years. The company implemented Epicor ERP to access real time
data for everything from the shop floor to finance. All business operations
from the front office through production, receiving and shipping, to order
entry and cash receipts are handled by the ERP.
• Peters Ice Cream in Australia had been under the ownership of food giant
Nestlé and was working under its ERP. That ERP was not tailored for the
specific needs of an ice cream company and did not interface well with
Peters’s legacy systems. Peters’s network of freezers extends throughout
Australia, and to get the ice cream flavors where they were needed when they
are needed, it was essential that information on stock levels and deliveries
be accurate and in real time. Peters selected Infor’s M3 QuickStep for Food
and Beverage ERP solution because 70 percent of the necessary business
processes were already preconfigured within it. With preconfigured business
processes, Peters was able to implement its new ERP system in 8 months.
Figure 10.8 Overview of the complexity of ERP and its interfaces with other
enterprise systems (U.S. Army Business Transformation Knowledge Center, 2009).
Human
Resources
Authoritative
Data Source
Core ERP
Bolt-ons
ERP in the Enterprise
Supply Chain
Management
Product Life-Cycle
Management
External
Business
Partners
Business
Intelligence
Legacy
Application
Legacy
Application
Legacy
Application
Finance
Operations
E
nt
er
pr
is
e
A
pp
lic
at
io
n
In
te
gr
at
io
n
B
2B
G
at
ew
ay
ERP Consultant: One of the Best Jobs in America
CNNMoney and PayScale publish a “Best Jobs in
America” listing of the top 100 careers with big growth,
great pay, and satisfying work (CNNMoney, 2013).
ERP consultant was ranked #30, with a median pay of
$103,000 and top income of $172,000. It was projected
that ERP consultants would experience 10-year job
growth of 22 percent and over 700,000 total jobs.
What do ERP consultants do all day? They advise
companies on which systems best meet their current
and future business needs, help with vendor selection
and implementation of the system, and support the
ERP and users after it has been installed.
CAREER INSIGHT 1 0 . 1
c10StrategicTechnologyAndEnterpriseSystems.indd Page 347 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
348 Chapter 10 Strategic Technology and Enterprise Systems
A large European public-sector agency processes 200 mil-
lion payments every year. Its finance and HR systems were a
complex combination of 50 legacy systems that had evolved
over time without a plan. Technical support for the outdated
legacy systems was no longer available, and the few remain-
ing internal developers were near retirement. The agency
had to replace this legacy architecture with an ERP system
that could process the hundreds of millions of payments and
support more than 70,000 users.
In the first phase of the ERP implementation project,
the scope and budget of the ERP were approved, vendor
proposals were evaluated, and a contract with the selected
vendor was negotiated. These activities took almost a year
to complete. Then a roll-out strategy was developed wherein
the legacy systems were replaced by ERP modules and new
data stores. Replacing legacy systems with ERP requires
migrating databases and applications. The roll-out strategy
was planned to minimize risk by ensuring that the agency
met its strict legal requirements of having one leading
accounting system at all times.
Implementing the ERP system across the agency took
2.5 years, and was delivered on time and budget, and at the
desired quality level. Extensive planning, executive support,
experienced consultants, and ERP-informed vendor selection
were key success factors.
IT at Work 1 0 . 3
Agency Replaced 50 Legacy Systems with an ERP
MANUFACTURING ERP
SYSTEMS AND LEAN
PRINCIPLES
Manufacturers know that their success depends on lower costs, shorter cycle times,
and maximum production throughput. A key factor in lowering costs is inventory
management—such as minimizing inventory errors and maintaining the optimal
inventory level. An optimal level has enough inventory to keep production running
while minimizing inventory-on-hand to control holding costs. ERP demand fore-
casting modules help manufacturers avoid material shortages, manage production,
and coordinate distribution channels, which improves on-time delivery. Engineers,
production floor workers, and those in the purchasing, finance, and delivery depart-
ments can access and share plans, production status, quality control, inventory, and
other data in real time.
TECH NOTE 10.2 ERP and Vendor Selection
The website top10erp.org/ provides comparisons of top ERP vendors’ products and
their monthly costs.
To simplify and reduce the cost of the ERP software selection process, an annual
event called the ERP Vendor Shootout (erpshootout.com) is held and geared to-
ward ERP selection teams and decision makers for companies with manufacturing,
distribution, or project-oriented requirements.
Four Rules for Selecting an ERP
ERPs are complex, but they are becoming more user-friendly. Other options are
hosted ERP solutions, such as ERP Software-as-a-Service (SaaS), and cloud-based
ERP. Still, ERPs are expensive, time-consuming implementations that require a lot
of planning. Four rules to consider when selecting an ERP solution or software
package are:
c10StrategicTechnologyAndEnterpriseSystems.indd Page 348 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.3 Enterprise Resource Planning Systems 349
1. Select an ERP solution that targets the company’s requirements. ERP packages
are tailored for organizations based on their size and industry. Midmarket solu-
tions have more sophisticated capabilities than packages for small businesses;
large enterprise packages are the most complex. It is important to choose an
ERP that can support critical functions of the organization, such as accounting
or inventory management.
2. Evaluate potential ERP vendors’ strengths and weaknesses. Check how many
customers each vendor has, its fi nancial health (you do not want to select a ven-
dor on the brink of bankruptcy), and whether it has experience in the specifi c
industry, and how the ERP can scale as the company grows.
3. Meet with each vendor and get a hands-on demo of its ERP solutions. Demos
allow employees to experience the usability of each ERP module and how well
the ERP would support business processes.
4. Calculate the ERP’s total cost of ownership (TCO). The cost of the ERP or
the monthly SaaS fee is only the beginning of the calculation. The TCO also
includes implementation, customization, management services, training, addi-
tional hardware and networks, additional bandwidth for a Web-based product,
and IT staff.
ERP IMPLEMENTATIONS
MAY NOT BE INITIALLY
SUCCESSFUL
Managers and other decision makers tend to think that if an enterprise system
works for leading companies, it will work for them, too. But that is not true. In fact,
as you read in Table 10.3, several of the best companies have suffered devastating
consequences that led to multimillion dollar losses, bankruptcy, or lawsuits. Most
often, the ERP is eventually fixed and remains in use, which gives the false impres-
sion that the ERP was successful from the start.
The success of an ERP depends on organizational and technological factors
that occur prior to, during, and after its implementation. Knowing what to do and
what not to do are important. Both the successes and failures teach valuable lessons,
too, as you will learn in this section.
Be aware that reading vendor white papers and viewing webcasts or demos may
give you a biased view of the benefits of ERP software. You need to conduct your
own research to learn the full story behind an enterprise system implementation.
Problems may be skipped over or ignored. While blogs and YouTube posts may be
good sources of objective data, many vendors have blogs and YouTube videos that
are designed to appear neutral, when in fact they are not.
ERP Disasters and Failures
ERP implementations are complex—and risky. Planning, deploying, or fine-
tuning these complex business software systems for your company is such a large
undertaking that such projects fail more than 50 to 70 percent of the time. Those
are not encouraging statistics. ERP failures have made it impossible to ship
products and, at the extreme, have led to bankruptcy. Many ERP projects have
ended up in litigation, the headlines, and out-of-court settlements. Dell canceled
an ERP system after spending two years and $200 million on its implementation.
Hershey Food Corp. filed highly publicized lawsuits against its ERP vendors for
a failed implementation. Table 10.4 describes recent ERP failures that have led
to lawsuits against vendors or consulting firms. Of course, lawsuits do not result
in a working ERP.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 349 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
350 Chapter 10 Strategic Technology and Enterprise Systems
TABLE 10.4 ERP Failures, Lawsuits, and Damages
Companies Filing
the Lawsuit and
Companies Sued
Description of ERP Disasters,
Charges, and Outcomes
Distributor ScanSource
fi led a lawsuit in 2013
against Avanade, the
joint venture between
Accenture and Microsoft,
for “bait-and-switch”
tactics.
A half-million lines of custom code were not
enough to produce a viable Microsoft Dynamics
AX ERP system for point-of-sale and RFID prod-
ucts distributor ScanSource, according to a lawsuit
ScanSource has fi led against Avanade. AX is one of
four ERP products sold under the Dynamics brand,
and is aimed at larger companies.
The lawsuit alleges:
• The project was supposed to cost $17 million
and take 11 months, but the cost estimate grew to
$66 million and it had failed to go live after 3 years.
• Avanade misrepresented the skills of its consul-
tants in order to win the contract; then sent in a
continually changing cast of consultants without
the expertise to do the job or familiarity with AX.
ScanSource terminated the contact with Avanade in
September 2012 and hired another company to fi x
the problems at an additional cost of $58 to
$72 million.
Dillard’s, Inc. fi led a suit
against JDA Software
Group.
Dillard’s alleged that i2 failed to meet obligations
regarding two software-license agreements for
which the department store had paid $8 million.
In June 2010 JDA Software Group Inc. reported
that its i2 Technologies unit lost the case and was
ordered to pay $246 million in damages.
FoxMeyer Drugs was a
$5 billion company and
the nation’s fourth larg-
est distributor of phar-
maceuticals before the
ERP failure.
FoxMeyer sued SAP,
the ERP vendor, and
Andersen Consulting,
its SAP integrator, for
$500 million each in
1998.
FoxMeyer’s ERP could not process the transactions
needed to supply its customers with their orders.
FoxMeyer had been processing 425,000 invoice
lines per day on its legacy software. The company’s
ERP was limited to 10,000 invoice lines per day.
This quickly decreased order processing capability,
sent the company into bankruptcy protection, and
ultimately shut down the business.
Implementation was troubled almost from the start.
Despite warnings from Woltz Consulting, during
the early stages of the project, that a schedule for
the entire implementation to be completed in
18 months was totally unrealistic, FoxMeyer went
ahead with the vendor’s planned implementation.
ERP Success Factors
What factors increase the likelihood of ERP success and minimize the risk of prob-
lems? Many managers assume that success or failure depends on the software and,
furthermore, that a failure is the fault of the software that is purchased or licensed.
In reality, 95 percent of a project’s success or failure lies in the hands of the com-
pany implementing the software, not the software vendor.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 350 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.3 Enterprise Resource Planning Systems 351
The results of a survey to identify what ERP experts had found to be most impor-
tant to successful ERP projects are shown in Figure 10.9. ERP experts were given the
following six options and asked to select only one of them as “most important”:
1. Strong program management: 6 percent
2. Executive support and buy-in: 19 percent
3. Organizational change management and training :13 percent
4. Realistic expectations: 8 percent
5. Focus on business processes: 5 percent
6. Interaction of all fi ve factors: 49 percent
Nearly half of the experts indicated that the failure of any one of the five factors
significantly increases the risk of ERP failure.
The following recommendations explain why ERP success depends on several
key factors being met:
1. Focus on business processes and requirements. Too often, companies get caught
up in technical capabilities or platforms on which the ERP runs. But compared
to business processes, none of this really matters. What matters is how managers
want business operations to run and what the key business requirements are.
Once management and IT have defi ned them, they can intelligently choose the
software, modules, and vendor that fi t their unique business needs.
2. Focus on achieving a measurable ROI. Developing a business case to get ap-
proval from upper management or the board of directors is essential, but not suf-
fi cient. Establish key performance measures, set baselines and targets for those
measures, and then track performance after going live. The performance results
are proof of how well the ERP meets the expectations that had been listed in the
business case.
3. Use a strong project management approach and secure commitment of
resources. An ERP project depends on how it is managed. Responsibility for
the management of the ERP implementation project cannot be transferred
to vendors or consulting fi rms. Because of the business disruption and cost
involved, ERP projects require the full-time attention and support of high-
profi le champions on the key functions for a long period of time, from 6 to
Figure 10.9 Experts identify
the combination of factors
needed for ERP success.
Survey responses to the question:
What is most important to successful ERP projects?
50%
40%
30%
20%
10%
0%
St
ro
ng
p
ro
gr
am
m
an
ag
em
en
t
Ex
ec
ut
ive
su
pp
or
t
&
bu
y-i
n
Or
ga
niz
at
ion
al
ch
an
ge
m
an
ag
em
en
t &
tr
ain
ing
Re
ali
sti
c e
xp
ec
ta
tio
ns
Fo
cu
s o
n
bu
sin
es
s
pr
oc
es
se
s
Al
l 5
fa
cto
rs
c10StrategicTechnologyAndEnterpriseSystems.indd Page 351 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
352 Chapter 10 Strategic Technology and Enterprise Systems
12 months on average. It is also known that ERP projects cannot be managed
by people who can be spared. They must be managed by people who are in-
dispensable personnel. Without powerful champions and an adequate budget
(discussed next), expect the ERP to fail. Project management will be covered
in Chapter 13.
4. Obtain strong and continuing commitment from senior executives. Any proj-
ect without support from top management will fail. No matter how well run a
project is, there will be problems such as confl icting business needs or business
disruptions that can only be resolved by someone with the power and authority
to cut through the politics and personal agendas.
5. Take suffi cient time to plan and prepare up-front. An ERP vendor’s motive is
to close the deal as fast as possible. The company needs to make sure it correctly
defi nes its needs and what it can afford to achieve in order to intelligently evalu-
ate and select the best vendor. Do not be rushed into a decision. Too often, com-
panies jump right into a project without validating the vendor’s understanding
of business requirements or their project plan. The principle of “measure twice,
cut once” applies to vendor selection. The more time the company spends ensur-
ing these things are done right at the start, the lower the risk of failure and the
less time spent fi xing problems later. Filing a lawsuit against a vendor (see
Table 10.4) is not a fi x. Lawsuits are both expensive and risky, and contribute
nothing to the company’s performance.
6. Provide thorough training and change management. Another key principle
to understand is that when you design an ERP, you redesign the organization.
ERP systems involve dramatic change for workers. ERPs lose value if people
do not understand how to use them effectively. Investing in training, change
management, and job design are crucial to the outcome of any large-scale IT
project.
Questions
1. What are three ways ERP can be deployed?
2. Briefl y describe the latest ERP features and add-ons.
3. Describe ERP from a technology perspective.
4. Explain manufacturing ERP systems and lean principles.
5. List and briefl y describe three ERP implementation success factors.
6. Describe causes or factors that contribute to ERP failure.
The journey that a product travels, as shown in Figure 10.10, starting with raw
material suppliers and then to manufacturers or assemblers, distributors and retail
shelves, and ultimately to customers, is its supply chain. The supply chain is like a
pipeline composed of multiple suppliers, distributors, manufacturers, retailers, and
logistics providers.
Supply chains vary significantly depending on the type, complexity, and per-
ishability of the product. For example, in a simplified sense, the food supply chain
begins with the livestock or farm, moves to the manufacturer, then through the dis-
tribution centers and wholesalers to the retailer and final customer. In IT at Work
10.4, you read about the benefits of tracking food along the supply chain.
10.4 Supply Chain Management Systems
Supply chain starts with the
acquisition of raw materials
or the procurement (purchase)
of products and proceeds
through manufacture,
transport, and delivery—and
the disposal or recycling of
products.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 352 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.4 Supply Chain Management Systems 353
Figure 10.10 Model of the supply chain.
The Food and Drug Administration (FDA) posts Recalls,
Market Withdrawals, & Safety Alerts on its website FDA.gov.
Almost every day, a recall or alert is posted for human or pet
food, drugs, and life-saving devices. A few food contamina-
tion alerts posted by the FDA were: listeria in shelled walnuts
from California Grown and hummus dips from Trader Joe’s,
and salmonella in Dragonfly’s crushed chili powder and Owl
Canyon’s eggs—both are potentially fatal. When food con-
taminations are detected, being able to trace those foods
to their sources or track them to retailers or end-consumers
takes on a sense of urgency.
Track and Trace to Identify the Scope Accurately
and with Confidence
Track-and-trace technologies follow food products “from
farm to fork” throughout their supply chain, primarily using
barcodes and radio frequency identification (RFID). Without
the capability to identify the scope of the contamination
and contain it, the food recall is much more extensive than
necessary as a safety precaution. For example, when E. coli–
tainted spinach was discovered in 2007, using the bar code
on a bag of bad spinach, investigators traced its origin to
California’s Salinas Valley. But then they had to do an intense
and expensive search for the specific grower in that valley.
Because of the uncertainty during the investigation, all spin-
ach products were pulled from grocery stores, distribution
and processing plants, and restaurants and then destroyed.
One growers’ organization estimates that the recall cost the
spinach industry $74 million. It would have been much faster
to track the contaminated leaves to the grower if spinach
bags and containers had carried RFID tags with complete
histories of the contents’ origins.
Value of Tracking Capability in the Supply Chain
With tracking information, companies can streamline the dis-
tribution chain and lower spoilage and contamination rates.
Reducing the rates of spoilage and contamination is impor-
tant for reasons related to safety and costs. Consumer prod-
uct and retail industries lose about $40 billion annually, or
3.5 percent of their sales, due to supply chain inefficiencies.
Questions
1. Visit the FDA’s website and select “recalls.” What do you
learn?
2. Select three food recalls. How could those products be
tracked and traced?
3. Consider a food that is an ingredient, such as chili pep-
per, and perishable food, such as beef patties. Which
would be more difficult to track and trace? Explain.
4. What costs are reduced during a contaminated food
recall if the food has RFID tags?
IT at Work 1 0 . 4
Got Contaminated Food? How Do You Know?
Supply chain management (SCM) is the efficient management of the
flows of material, data, and payments along the companies in the sup-
ply chain, from suppliers to consumers. SCM systems are configured to
achieve the following business goals:
• To reduce uncertainty and variability in order to improve the
accuracy of forecasting.
• To increase control over processes in order to achieve optimal
inventory levels, cycle time, and customer service.
An example of these goals is discussed in IT at Work 10.5.
©
a
rk
a3
8/
Sh
ut
te
rs
to
ck
c10StrategicTechnologyAndEnterpriseSystems.indd Page 353 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
354 Chapter 10 Strategic Technology and Enterprise Systems
Munitions Supply Chain Management
The Joint Munitions Command (JMC) is a major part of
the U.S. Army Materiel Command (AMC). Munitions are
the weaponry hardware, vehicles, and equipment and their
ammunition. JMC supports U.S. warfighters by managing the
munitions supply chain to get the right munitions at the right
place at the right time. JMC manufactures, procures, stores,
and transports tanks, weaponry, howitzers, and other muni-
tions (see Figure 10.11) as well as bullets, artillery shells, and
other ammunition to locations worldwide.
Supply Chain Challenges
JMC provides bombs and bullets to America’s fighting
forces—all services, all types of conventional ammunition
from 500-pound bombs to rifle rounds. JMC manages plants
that produce more than 1.6 billion rounds of ammunition
annually and the depots that store the nation’s ammunition
for training and combat.
Clearly, managing the munitions supply chain is extremely
complex and critical. Like other supply chains, it depends on
good relationships among suppliers in the network, the quality
of supplier information, and communication channels.
JMC Improves Battle Readiness at
Reduced Cost
JMC’s project began with a focus on efficiency, but has
resulted in increased warfighting readiness at reduced cost.
After transforming operations, integrating its supply chain,
and improving data management, JMC is now better able to
rapidly supply U.S. forces with the highest-quality munitions
when they need them and to cut transportation costs up to
50 percent—a significant savings per year. These improve-
ments were made possible as a result of greater asset
visibility (tracking and monitoring), better forecasting and
decision-making capabilities, communication, and collabora-
tion along the supply chain.
Sources: Compiled from Schwerin (2012), Accenture (2010), and jmc.
army.mil (2012).
Questions
1. Explain the role of the munitions supply chain.
2. Discuss how JMC ensures that soldiers receive the highest-
quality ammunition, on time, and where needed.
3. Why would improvements in munitions supply chain
management also improve warfighting readiness?
4. What factors impact the ability to manage the munitions
supply chain?
5. For the JMC, where does the munitions supply chain start
and where does it end?
6. Is munitions supply chain management unique, and if so,
why? Or, is it similar to the management of any supply
chains? Explain your position.
IT at Work 1 0 . 5
Managing the U.S. Munitions Supply Chain
Figure 10.11 JMC manages the supply chain of materials used in war (tanks, howitzers,
weaponry) and ammunition (bullets, artillery shells).
Ph
ot
o
b
y
Jo
sh
H
am
ilt
on
/D
V
ID
S
M
ed
ia
(a)
Ph
ot
o
b
y
Sp
c.
L
at
oy
a
W
ig
g
in
s/
D
V
ID
S
M
ed
ia
(b)
c10StrategicTechnologyAndEnterpriseSystems.indd Page 354 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.4 Supply Chain Management Systems 355
MANAGING THE FLOW
OF MATERIALS, DATA,
AND MONEY
Supply chains involve the flow of materials, data, and money. Descriptions of these
three main flows are as follows:
1. Material or product fl ow: This is the movement of materials and goods from a
supplier to its consumer. For example, Ford supplies dealerships that, in turn,
sell to end-users. Products that are returned make up what is called the reverse
supply chain because goods are moving in the reverse direction.
2. Information fl ow: This is the movement of detailed data among members of the
supply chain, for example, order information, customer information, order ful-
fi llment, delivery status, and proof-of-delivery confi rmation. Most information
fl ows are done electronically, although paper invoices or receipts are still com-
mon for noncommercial customers.
3. Financial fl ow: This is the transfer of payments and fi nancial arrangements, for
example, billing payment schedules, credit terms, and payment via electronic
funds transfer (EFT). EFT provides for electronic payments and collections.
It is safe, secure, effi cient, and less expensive than paper check payments and
collections.
Supply chain links are managed. Think of the chain in terms of its links because
the entire chain is not managed as a single unit. A company can only manage the
links it actually touches. That is, a company will manage only partners who are one-
back and one-up because that is the extent of what a company can manage.
Order fulfillment is the
set of complex processes
involved in providing cus-
tomers with what they have
ordered on time and all
related customer services.
Back-office operations
support the fulfillment of
orders.
ORDER FULFILLMENT
AND LOGISTICS
Order fulfillment depends on the type of product/service and purchase method
(online, in-store, catalog, etc.). For example, a customer who has ordered a new
appliance via the Sears.com wesite needs to receive it as scheduled, with assembly
and operating instructions, and warranty and return information. The customer can
receive a paper manual with the product or download the instructions from Sears’
website.
Order fulfillment is a part of back-office operations, such as accounting,
inventory management, and shipping, and is closely related to front-office opera-
tions or customer-facing activities. The key aspects of order fulfillment are the
delivery of materials or products at the right time, to the right place, and at the
right cost.
Logistics entails all the processes and information needed to move products
from origin to destination efficiently. The order fulfillment process is part of logistics.
STEPS IN THE ORDER
FULFILLMENT PROCESS
The order fulfillment process starts when an order is received, and includes the fol-
lowing nine activities that are supported by SCM software or are automated:
Step 1: Make sure the customer will pay. Depending on the payment method and
prior arrangements with the customer, verify that the customer can and will pay,
and agrees to the payment terms. This activity is done by the finance department
for B2B sales or an external company, such as PayPal or a credit card issuer such
as Visa for B2C sales. Any holdup in payment may cause a shipment to be delayed,
resulting in a loss of goodwill or a customer. In B2C, the customers usually pay by
credit card, but with major credit card data theft at Target and other retailers, the
buyer may be using a stolen card.
Step 2: Check in-stock availability and reorder as necessary. As soon as an order is
received, the stock is checked to determine the availability of the product or materi-
als. If there is not enough stock, the ordering system places an order, typically auto-
matically using EDI (electronic data interchange). To perform these operations, the
ordering system needs to interface with the inventory system.
Front-office operations such
as sales and advertising that
are visible to customers.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 355 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
356 Chapter 10 Strategic Technology and Enterprise Systems
Step 3: Arrange shipments. When the product is available, shipment to the cus-
tomer is arranged (otherwise, go to Step 5). Products can be digital or physical. If
the item is physical and available, packaging and shipment arrangements are made.
Both the packaging/shipping department and internal shippers or outside transport-
ers may be involved. Digital items are usually available because their “inventory” is
not depleted. However, a digital product, such as software, may be under revision,
and thus unavailable for delivery at certain times. In either case, information needs
to flow among several partners.
Step 4: Insurance. The contents of a shipment may need to be insured. Both the
finance department and an insurance company could be involved, and again, infor-
mation needs to be exchanged with the customer and insurance agent.
Step 5: Replenishment. Customized orders will always trigger a need for some
manufacturing or assembly operation. Similarly, if standard items are out of stock,
they need to be produced or procured. Production is done in-house or outsourced.
Step 6: In-house production. In-house production needs to be planned and actual
production needs to be scheduled. Production planning involves people, materials,
components, machines, financial resources, and possibly suppliers and subcontrac-
tors. In the case of assembly and/or manufacturing, several plant services may be
needed, including collaboration with business partners. Production facilities may
be located in a different country than the company’s headquarters or retailers. This
may further complicate the flow of information.
Step 7: Use suppliers. A manufacturer may opt to buy products or subassemblies
from suppliers. Similarly, if the seller is a retailer, such as in the case of Amazon.
com or Walmart.com, the retailer must purchase products from its manufacturers.
In this case, appropriate receiving and quality assurance of incoming materials and
products must take place.
Once production (Step 6) or purchasing from suppliers (Step 7) is completed,
shipments to the customers (Step 3) are arranged.
Step 8: Contacts with customers. Sales representatives keep in contact with cus-
tomers, especially in B2B, starting with the notification of orders received and end-
ing with notification of a shipment or change in delivery date. These contacts are
frequently generated automatically.
Step 9: Returns. In some cases, customers want to exchange or return items. The
movement of returns from customers back to vendors is reverse logistics. Such
returns can be a major problem, especially when they occur in large volumes.
INNOVATIONS DRIVING
SUPPLY CHAIN
STRATEGIC PRIORITIES
Supply chain executives are leveraging digital technologies and business innova-
tions to manage the increasing complexity of today’s global supply chains. In the
past, companies tackled supply chain challenges primarily by focusing on internal
cost reduction and improved operational efficiency. But traditional approaches are
less effective as supply chains become longer and more interconnected, and there
are higher stakeholder expectations and more sources of risk. Companies are exam-
ining their approach to supply chain improvement.
Recently, MHI and Deloitte Consulting released their first joint research report,
“Innovations That Drive Supply Chains—The 2014 MHI Annual Industry Report.”
More than 450 respondents from large and small companies across a wide range of
sectors participated in the survey. Key study findings are:
• The top two strategic priorities of executives are supply chain analytics and
multichannel fulfillment.
• The two major barriers preventing innovation in the supply chain are a tal-
ent shortage and a continuing focus on cost reduction.
MHI is an international
trade association that has
influenced materials handling
and logistics within the
supply chain industry.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 356 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.4 Supply Chain Management Systems 357
• Sustainability, mobility/machine-to-machine (M2) technology and 3D print-
ing are emerging innovations that are not yet top-of-mind for executives,
but may soon be.
Supply Chain Analytics
As global supply chains become more complex and expansive, companies want to
leverage analytics that produce insights to improve customer service and reduce
costs and risk.
The speed of business is outpacing the level of insight into the supply chain,
regardless of industry. Algorithms and SCM models based on past demand, supply, and
business cycles are inadequate to effectively manage the supply chain. Companies
need updated models to predict the future.
Multichannel Fulfillment
Today’s consumers are demanding. They expect 24/7 shopping and then to have
their purchases delivered quickly, the next day or even the same day. Although
most retailers are good at the front-end handling orders through their multiple
channels, they tend to struggle to adapt their back-end order fulfillment processes.
Retailers plan to make significant investments to build their multichannel fulfill-
ment capabilities.
Talent Shortage Remains the Biggest Barrier to Innovation
Companies need supply chain talent with the appropriate skills, experience, and
mindset to harness the value of supply chain innovations. The right kind of supply
chain talent is extremely difficult to find.
Cost Reduction Chokes Off Essential Investments in Innovation
Cost reduction is still the number one priority for many supply chain executives,
according to the MHI and Deloitte survey. More than 70 percent of respondents
across industries asserted that controlling costs is a top priority for their companies
and their customers.
Sustainability
The focus on cost-cutting in the supply chain is squeezing out innovations in sus-
tainability, even though executives believe these investments are important. More
than 60 percent of respondents indicated that significant capability gaps exist in
their companies and clients that may prevent them from effectively implementing
sustainability programs.
Mobility and M2M Technology
Mobility and M2M technologies can improve responsiveness and customer service
by providing supply chain workers with the information they need—whenever and
wherever they need it.
3D Printing
Additive manufacturing could revolutionize production processes and have
far-reaching future implications for product supply chains. But supply chain
executives in the MHI and Deloitte study did not see immediate potential for the
innovation.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 357 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
358 Chapter 10 Strategic Technology and Enterprise Systems
Questions
1. What is a supply chain?
2. List four functions carried out by companies in a supply chain.
3. List and describe the three main fl ows being managed in a supply chain.
4. Describe SCM.
5. What are steps in the order fulfi llment?
6. Explain logistics.
7. What are the top two strategic priorities of SCM executives?
8. What are the two major barriers preventing innovation in the supply
chain?
9. What are the top innovative digital technologies impacting SCM?
Like ERP and SCM systems, CRM is a widely used and mature technology that can
be deployed on-premises or on-demand as a service, or SaaS. The fierce competition
among the big four CRM vendors—Salesforce.com, SAP, Oracle, and Microsoft—
motivates innovation. Numerous successful CRM implementations have helped
transform the business, increased profit, and strengthened customer loyalty. CRM
can provide managers with a 360-degree view of the customer relationship, enable
real time responses, and improve sales productivity and predictability. However,
CRM technology cannot transform or improve anything on its own.
As Figure 10.12 shows, CRM and data are necessary, but insufficient. Business
performance improvement actually depends to a greater extent on people and
processes. The Avon business case at the end of this chapter is a high-profile
example of a $125 million enterprise system failure because people and processes
were ignored. Changes in people’s behavior, their commitment, attitude toward the
mandatory change as well as process improvements make the difference between
better bottom lines or a hundred million dollar write-off, as in the case of Avon.
Buying the most suitable CRM is like buying a Ferrari or Porsche. You will not win
any races or become a better driver simply because you bought the sports car. Your
effort and changes in how you drive determine your wins.
10.5 Customer Relationship Management Systems
Figure 10.12 Four CRM
critical success factors and
their importance.
Data
15%
CRM
technology
20%
People
40%
Process
change
25%
c10StrategicTechnologyAndEnterpriseSystems.indd Page 358 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.5 Customer Relationship Management Systems 359
HOW ARE CRM APPS
DIFFERENT FROM
ERP? WHY ARE THEY
DIFFERENT?
ERP and CRM have to interface and share data. They are similar from a technology
perspective—sold in modules, offered on site or in the cloud, and must share data.
ERPs often requires tight business rules and user practices—that those in account-
ing, finance, and HR tend to be accustomed to by their professions. For example,
they must comply with generally accepted accounting principles (GAAP), the SEC,
labor laws, or legal requirements. But sales and marketing are the primary users of
CRM—and they tend not to be accustomed to inflexible rules of conduct. They are
accustomed to creativity and closing the deal, for instance. If the CRM does not
support them their way, they can reject it—and cause total system failure.
Why Does CRM Matter?
CRM systems play the major role in customer experience (CX), and good CX helps
to retain customers. However, not all customers are worth retaining. Customers can
be unprofitable. Imagine having 20,000 customers. How would you determine the
CLV of each customer and continue to recompute their value? The point is that
data analytics, sophisticated predictive analytics, and BI are needed to determine
CLV; then business rules need to specify how to treat or manage customers based
on their value score.
Intelligently managing relationships with customers can increase revenues and
net profits significantly. Similar to managing inventory and supplier relationships,
effective CRM is data-driven, complex, and continuously changing. The growth of
mobile sales channels and social networking makes recognizing customers across
multiple touchpoints complex. In addition, many companies have customer data
in multiple, disparate systems that are not integrated—until they implement CRM
systems.
TECHNOLOGY
PERSPECTIVE
From a technology perspective, CRM refers to the methodologies and software
tools to leverage customer data in order to achieve the following:
• Identify the appropriate CX for customers.
• Predict and prevent attrition (loss) of a customer, unless he or she is not
worth retaining.
• Acquire new customers who are most likely to become profitable.
• Up-sell (sell more profitable products/services) or cross-sell (sell additional
products/services) to unprofitable customers to move them to a profit
position.
• Reduce inefficiencies that waste advertising dollars.
CUSTOMER
ACQUISITION AND
RETENTION
CRM technologies help marketing managers run effective campaigns, promo-
tions, commercials, and advertisements to attract new customers, or to increase
sales to existing customers, or to do both. Attracting and acquiring new customers
are expensive activities: for example, it costs banks roughly $100 to acquire a new
customer. Newly acquired customers are unprofitable until they have purchased
enough products or services to exceed the cost to acquire and service them.
Therefore, retaining customers that generate revenues in excess of the costs (e.g.,
customer service, returns, promotional items, and the like) is critical. The purpose
of loyalty or frequent purchase programs offered by online retailers, coffee shops,
airlines, supermarkets, credit card issuers, casinos, and other companies is to track
customers for CRM purposes and build customer loyalty to improve financial
performance. Loyalty programs rely on data warehouses and data analytics to
recognize and reward customers who repeatedly use services or products. The
1-800-Flowers loyalty program is described in IT at Work 10.6.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 359 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
360 Chapter 10 Strategic Technology and Enterprise Systems
1-800-Flowers.com is an Internet pioneer. Online sales are
a major marketing channel in addition to telephone and fax
orders. Competition is very strong in this industry. The com-
pany’s success was based on operational efficiency, conve-
nience (24/7 accessibility), and reliability. However, all major
competitors provide the same features today. To maintain
its competitive edge, the company transformed itself into a
customer-centric organization, caring for more than 15 million
customers.
The company decided to cultivate brand loyalty through
customer relationships based on detailed knowledge of cus-
tomers. How is this accomplished? SAS software spans the
entire decision-support process for managing customer rela-
tionships. Collecting data at all customer touchpoints, the
company turns those data into knowledge for understand-
ing and anticipating customer behavior, meeting customer
needs, building more profitable customer relationships, and
gaining a holistic view of a customer’s lifetime value. Using
SAS Enterprise Miner, 1-800-Flowers.com sifts through
purchasing data to discover trends, explain outcomes, and
predict results so that the company can increase response
rates and identify profitable customers. In addition to selling
and campaign management, the ultimate goal is to make
sure that when a customer wants to buy, he or she continues
to buy from 1-800-Flowers.com and cannot be captured by
a competitor’s marketing. Their objective is not just about
getting customers to buy more. It is about making sure that
when they decide to purchase a gift online or by phone, they
do not even think of going to the competition.
Data mining software helps the company identify the
many different types of customers and how each would like
to be treated. Customer retention has increased by over
15 percent since this approach was adopted.
Questions
1. Why is being number one in operation efficiency not
enough to keep 1-800-FLOWERS.COM at the top of its
industry?
2. What is the role of data mining?
3. How is the one-to-one relationship achieved in such
systems?
IT at Work 1 0 . 6
1-800-Flowers.com Uses Data Mining for CRM
CRM FOR A
COMPETITIVE EDGE
According to management guru Peter Drucker, “Those companies who know
their customers, understand their needs, and communicate intelligently with them
will always have a competitive advantage over those that don’t” (Drucker, 1969).
For most types of companies, marketing effectiveness depends on how well they
know their customers: specifically, knowing what their customers want, how best
to contact them, and what types of offers they are likely to respond to positively.
According to the loyalty effect, a 5 percent reduction in customer attrition can
improve profits by as much as 20 percent. Customer-centric business strategies
strive to provide products and services that customers want to buy. One of the best
examples is the Apple iPhone and iPod—devices that customers were willing to
camp out on sidewalks to buy to guarantee getting one on the day of their release.
In contrast, companies with product-centric strategies need to create demand for
their products, which is more expensive and may fail.
COMMON CRM
MISTAKES: HOW TO
AVOID THEM
According to Gartner, the CRM market reached $24 billion in 2014 after several
years of strong growth. Given that level of investment, companies obviously want
to get as much value as possible out of their systems. It is unfortunate, then, that
so many of them make mistakes in selecting and implementing CRM software.
The editor of Enterprise Apps Today, Ann All (2014), described common CRM
mistakes and how to avoid them. Five of these CRM mistakes are explained in
Table 10.5.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 360 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
10.5 Customer Relationship Management Systems 361
Example of a Failure
Citizen National Bank’s experience is an example of a failure that then replaced
its CRM vendors and became a success. The lessons learned, at a cost of $500,000,
were:
• Be absolutely clear on how the CRM application will add value to the sales
process.
• Determine if and why salespeople are avoiding CRM.
• Provide incentives for the sales team to adopt CRM.
• Find ways to simplify the use of the CRM application.
• Adjust the CRM system as business needs change.
TABLE 10.5 CRM Mistakes and Avoiding Them
CRM Mistakes How to Avoid The Mistakes
Putting IT department in The hands-on business users need to champion
charge of the CRM project and lead the project initiative, with IT playing a
instead of the business users supporting role.
Explanation: CRM is a software project whose
success relies on users’ input, which helps
ensure they actually will use it. Unlike other
apps, salespeople do not have to use CRM. If
the system is underused, companies will see
only limited improvements.
Not getting the CRM CRM implementations need buy-in from the
requirements right by not users and other business stakeholders, who can
involving key business spread enthusiasm. Frequent communication
stakeholders from the outset about the project is important to engaging
them in a meaningful way.
Making mobile CRM strategy Consider mobility a priority in the CRM
an afterthought project from the outset. Putting an existing
CRM on mobile devices is a bad plan.
Taking wrong approach to Make sure the interface is intuitive enough
CRM training that most users will not need hands-on training.
When people sit in a classroom for an hour,
they will only retain 5 minutes of what they
hear. A learning program during lunch that
focuses on one or two lessons is a much more
effective adoption strategy.
Underestimating users’ Users will not tolerate poorly designed
resistance to change systems. Frustrating users is a fast track to
failure, or at a minimum, suboptimal results.
JUSTIFYING CRM One of the biggest problems in CRM implementation is the difficulty of defining
and measuring success. In addition, many companies say that when it comes to
determining value, intangible benefits are more significant than tangible cost savings.
c10StrategicTechnologyAndEnterpriseSystems.indd Page 361 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
362 Chapter 10 Strategic Technology and Enterprise Systems
Yet companies often fail to establish quantitative or even qualitative measures in
order to judge these intangible benefits.
A formal business plan must be in place before the CRM project begins—one
that quantifies the expected costs, tangible financial benefits, and intangible stra-
tegic benefits, as well as the risks. The plan should include an assessment of the
following:
• Tangible net benefits. The plan must include a clear and precise cost–
benefit analysis that lists all the planned project costs and tangible benefits.
This portion of the plan should also contain a strategy for assessing key
financial metrics, such as ROI, net present value (NPV), or other justifica-
tion methods.
• Intangible benefits. The plan should detail the expected intangible benefits,
and it should list the measured successes and shortfalls. Often, an improve-
ment in customer satisfaction is the primary goal of the CRM solution, but
in many cases this key value is not measured.
• Risk assessment. The risk assessment is a list of all of the potential pitfalls
related to the people, processes, and technology that are involved in the
CRM project. Having such a list helps to lessen the probability that prob-
lems will occur. And, if they do happen, a company may find that, by hav-
ing listed and considered the problems in advance, the problems are more
manageable than they would have been otherwise.
Tangible and Intangible Benefits
Benefits typically include increases in staff productivity (e.g., more deals closed),
cost avoidance, revenues, and margin increases, as well as reductions in inventory
costs (e.g., due to the elimination of errors). Other benefits include increased cus-
tomer satisfaction, loyalty, and retention.
Questions
1. Explain the four critical success factors for CRM.
2. Why does CRM matter?
3. Discuss how CRM impacts customer acquisition and retention.
4. According to Peter Drucker, what does marketing effectiveness
depend on?
5. Give three reasons why CRM fails.
6. How can CRM be justifi ed?
Key Terms
3D bioprinting
3D printing (additive
manufacturing)
back-offi ce operations
core business processes
creative destroyer
customer lifetime value
(CLV)
customer relationship
management (CRM)
enterprise application
integration (EAI)
enterprise resource
planning (ERP)
enterprise systems
front-offi ce operations
interface
legacy systems
logistics
Microsoft Cloud
millennials
MHI
order fulfi llment
reverse supply chain
SharePoint
social network sprawl
stock keeping unit
(SKU)
supply chain
supply chain management
(SCM)
value-added reseller
(VAR)
Yammer
c10StrategicTechnologyAndEnterpriseSystems.indd Page 362 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
Assuring Your Learning 363
Assuring Your Learning
1. Consider the following scenario: In the 1990s, hard
disk drive (HDD) makers were among the fi rst
industries to move production to lower-cost coun-
tries. Beginning in Singapore, these companies
shifted manufacturing operations to China and
Thailand, in search of ever-lower labor costs. Since
then, Thailand has become the second-largest maker
of hard drives and a major supplier of parts to the
industry worldwide. With the catastrophic Thai fl oods
in the fall of 2011, the industry faced shortages of
over 30 million drives per quarter. Some executives
at HDD companies were forced to explain a glaring
oversight: Why had they had relied so heavily on
a supplier in a country located in a high-fl ood risk
area?
Also consider that: By the end of the 1990s, most
supply chains had become lean by minimizing their
inventories and reducing waste, and could schedule
deliveries across the globe with incredible precision.
Supply chain speed and fl exibility were impressive.
Products that should take months to procure and
manufacture were promised within days of customer
requests.
a. What supply chain management lessons can be
learned from the experiences of HDD makers?
b. What are the risks of highly effi cient and lean
supply chains?
c. Could one catastrophic supply chain event wipe
out years of profi ts or market share? Explain
your answer.
d. In your opinion, when do cost savings outweigh
the risks?
e. In your opinion, when are cost savings out-
weighed by the risks?
DISCUSS: Critical Thinking Questions
1. According to “New Study on Collaborative Execution
Finds Supply Chain Collaboration Can Improve
Operational Metrics by 50 Percent or More”
(Bloomberg, 2012),
By a ratio of nearly two to one, supply chain pro-
fessionals agreed that one of the biggest barriers
to successful collaboration is a slow issue resolu-
tion process. This was identifi ed as a systemic
problem related to quality of information fl ow, in
terms of both the granularity (level of detail) and
timeliness of data shared.
And 92 percent of respondents agreed that
rapid problem resolution was part of good col-
laboration. True collaboration can be defi ned in
terms of speed, both in problem solving and in
organizational learning. More than half of the
responses indicated that speed of response in
truly collaborative relationships was twice as fast
or faster, with learning curve improvements more
than 50 percent greater than in non-collaborative
trading partner relationships.
a. Discuss why supply chain partners may not be
able to resolve issues quickly. Consider informa-
tion fl ows in your discussion.
b. What impacts might slow problem (issue) resolu-
tion have on the supply chain?
c. Based on your answer to (a), discuss which enter-
prise systems could speed up problem resolution.
d. What is meant by learning curve improvements?
2. In your opinion, what might limit the growth of
3D printing?
3. Distinguish between ERP and SCM software. In
what ways do they complement each other? Why
should they be integrated?
4. State the business value of enterprise systems and
how they can be used to manage the supply chain
more effectively.
5. What problems are encountered in implementing
ERP systems?
6. Find examples of how two of the following organiza-
tions improve their supply chains: manufacturing,
hospitals, retailing, education, construction, agribusi-
ness, and shipping. Discuss the benefi ts to the
organizations.
7. It is claimed that supply chains are essentially “a
series of linked suppliers and customers; every cus-
tomer is in turn a supplier to the next downstream
organization, until the ultimate end-user.” Explain
this statement. Use a diagram.
8. Discuss why it is diffi cult to justify CRM.
9. A supply chain is much more powerful in the Inter-
net marketplace. Discuss how Internet technologies
can be used to manage the supply chain.
Questions for Discussion & Review
c10StrategicTechnologyAndEnterpriseSystems.indd Page 363 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
364 Chapter 10 Strategic Technology and Enterprise Systems
Visit each of the following enterprise vendor websites.
Write a brief report on the latest features of their enter-
prise systems, platforms, apps, or solutions.
1. SharePoint
2. Yammer
3. Oracle
4. Salesforce.com
5. SAP
EXPLORE: Online and Interactive Exercises
1. Select an enterprise system vendor. Search and
read a case study of one of the vendor’s customers.
Summarize the case and identify the benefi ts of the
implementation.
2. Assess the costs and benefi ts of a cloud CRM. A large
food-processing company would like to determine
the cost–benefi t of installing a CRM app in a private
cloud. Create a report that contains these analyses:
a. Calculate the tangible costs and benefi ts in a
spreadsheet using the data provided.
b. List two intangible benefi ts of moving to the cloud.
c. Estimate the value of those two benefi ts and
include them in your spreadsheet prepared for
Question 1.
d. List two risks associated with the CRM app if it
were moved to a public cloud.
DATA
Tangible Costs
• CRM in private cloud: $35 per user per month
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
• Technical support and maintenance: $250 per month
• Total number of users: 100 (90 salespeople and
10 supervisors)
• Training of 90 salespeople for fi ve days: productivity
loss $200 per day per person
• Training of fi ve supervisors: productivity loss
$300 per day per person
• Additional hardware, networks, and bandwidth:
$15,000 per month
Tangible Benefits
• Increase in average sales revenues $6,000 per
month per salesperson
• Increase in sales revenues from an improvement in
customer retention $5,000 per month
• Gross profi t from sales revenues 20 percent
Business Case: Avon’s Failed SAP Implementation:
Enterprise System Gone Wrong
Avon is one of the world’s leading direct-selling companies. It
uses independent sales representatives (reps) who, in effect,
run its cosmetic business as entrepreneurs selling directly to
customers. The career is attractive during slow economic times
and presents an opportunity for those who need fl exibility.
Avon’s success depends on retaining independent sales
reps, recruiting new ones, and increasing the size and fre-
quency of orders received from their sales representatives. In
2009 Avon CEO Andrea Jung launched the company’s most
massive recruiting campaign. Avon doubled its investment in
recruiting advertising and doubled the number of countries in
which recruiting ads were run.
Legacy Order Management System
Avon’s selling process is based on a series of campaigns
that last 2 to 4 weeks. Sales reps solicit orders from cus-
tomers, and compile them into larger orders placed with
Avon. Order fulfi llment takes place at an Avon distribution
center, which ships orders to sales reps who then distribute
the products to customers and collect payment. The order
management system was based on legacy systems and
a cumbersome interface, and was so outdated that sales
reps could not guarantee product availability for
their customers.
CASE 10.2
c10StrategicTechnologyAndEnterpriseSystems.indd Page 364 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
CASE 10.3 Video Case 365
Big Bang Approach Was the Wrong Approach
Avon tried to correct its IT challenges using a big bang
approach—lots of changes in too short a time. In 2010 Avon
launched its Service Model Transformation (SMT) program
based on SAP. SMT was intended to improve the way reps
interacted with the company, including orders, product re-
turns, and order fulfi llment. The SMT and big bang approach
failed. Three years and $125 million later, Avon ended the
SMT program.
CEO McCoy admitted that a big bang approach to the
roll-out was too disruptive to the nature of Avon’s business.
The nature of direct selling where our 6 million representatives
are independent entrepreneurs is one of personal relation-
ships, and motivating change with incentives. Change needed
to be introduced slowly and thoughtfully—and not abruptly.
Why Was SMT Halted?
Avon’s new management order system was piloted in Canada
and later rolled out globally. From the outset, the system seri-
ously disrupted operations in Canada. Sales reps complained
the system did not work as promised. They could not log
on, orders were not always accepted when submitted, and
inventory that was needed to fulfi ll orders was not regularly
reserved. As many as 16,000 Canadian sales reps quit. The
departure of large numbers of Canadian sales representa-
tives, in turn, disrupted Avon’s ability to do business—and
attract new representatives.
Other factors contributed to the failure. The order man-
agement system did not interface well with other systems,
such as IBM’s WebSphere. And Avon put the system into pro-
duction before the platform was ready. At the end of 2013, in
a fi nancial report, Avon indicated that the cost of the project,
$125 million, would be taken as a write-down.
SAP’s Public Comment
In response to the massive failure, SAP released this public
comment—as damage control:
Traditional enterprise business is failing to offer the easy
user experience that modern software customers need.
SAP has done a lot of work in 2013 on the user experi-
ence aspects of software including the introduction of
Fiori and Screen personas. They have also put together a
Design and Co-innovation center. (Kepes, 2013).
SAP points out the crucial importance of the user experience
in enterprise success—and that it had invested in apps and
interfaces to help ensure success.
Sources: Compiled from Avon Annual Reports, Kepes (2013), Saran
(2013), Henschen (2013a, 2013b) and Fitzgerald (2013).
Questions
1. How did the older order fulfi llment system harm an Avon
rep’s sales and relationships with her customers?
2. Why do you think the big bang approach was risky at
Avon?
3. How would the age of the sales reps impact success or
failure?
4. What was Avon trying to accomplish with the Service
Model Transformation (SMT)?
5. Why do you think so many sales reps left Avon instead of
waiting for it to correct the problems?
6. This case demonstrates the relationship between
different functional areas in a company. What do you
think should have been done to avoid the problems that
happened in the pilot study?
Video Case: Procter & Gamble: Creating Conversations in the Cloud
with 4.8 Billion Consumers
The decline of traditional marketing channels forced changes
in CRM transformation at Procter & Gamble (P&G). P&G’s
cloud environment allows for all consumer data to be in one
location for fresh, relevant relationships with 4.8 billion con-
sumers as they transition from one product to the next over
the course of their lifetimes.
Visit Teradata.com and search for the video entitled
“Procter & Gamble: Creating Conversations in the Cloud
with 4.8 Billion Consumers.” Watch the video (time: 5:14).
Questions
1. How does P&G maintain an ongoing dialogue with a
customer?
2. What were P&G’s data challenges?
3. What is 1, Consumer Place? Where is it?
4. In your opinion, how does P&G try to maximize customer
lifetime value (CLV)?
CASE 10.3
c10StrategicTechnologyAndEnterpriseSystems.indd Page 365 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
366 Chapter 10 Strategic Technology and Enterprise Systems
Accenture. “Joint Munitions Command Calls on Accenture
for Integrated Logistics and High Performance Guidance.”
accenture.com, 2010.
All, A. “8 Common CRM Mistakes, and How to Avoid Them.”
Enterprise Apps Today, February 20, 2014.
Bloomberg. “New Study on Collaborative Execution Finds
Supply Chain Collaboration Can Improve Operational
Metrics by 50 Percent or More.” March 27, 2012. http://www.
bloomberg.com
Bourne, A. “What Does 3D Printing Mean for ERP?” Manu-
facturing.net, January 29, 2014.
Cohen, D., M. Sargeant, & K. Somers. “3-D Printing Takes
Shape.” McKinsey Quarterly, January 2014. www.mckinsey.
com
CNNMoney. “Best Jobs in America.” CNN.com, November 12,
2013.
Cole, B. “Gartner Report Finds Slow Growth in Global ERP
Market.” SearchManufacturingERP.com, May 16, 2014.
Drucker, P.F. The Age of Discontinuity. New York: Harper &
Row. 1969.
Fine, R. “What Role Does 3D Printing Play in an ERP-Managed
Manufacturing Process?” Toolbox.com, May 21, 2014.
Fitzgerald, D. “Avon to Halt Rollout of New Order Manage-
ment System.” The Wall Street Journal, December 11, 2013.
Gartner.com. “Gartner Says Uses of 3D Printing Will Ignite
Major Debate on Ethics and Regulation.” January 29, 2014.
Gartner.com.
goldmansachs.com. “The Search for Creative Destruction.”
March 24, 2014. goldmansachs.com.
Henschen, D. “Avon Pulls Plug on $125 million SAP Project.”
InformationWeek, December 12, 2013a.
Henschen, D. “Inside Avon’s Failed Order-Management Proj-
ect.” InformationWeek, December 16, 2013b.
Kepes, B. “UPDATED—Avon’s Failed SAP Implementation
a Perfect Example of the Enterprise IT Revolution.” Forbes,
December 17, 2013.
Koplowitz, R. “The Forrester Wave: Enterprise Social Plat-
forms, Q3 2011.” August 24, 2011.
Lavenda, D. “How Red Robin Transformed Its Business with
Yammer.” Fast Company, February 6, 2014.
MHI and Deloitte. “Innovations That Drive Supply Chains—
The 2014 MHI Annual Industry Report.” 2014. https://www.
mhi.org/publications/report
Ryan, B. “Integrating Yammer with SharePoint 2013: Navigat-
ing the Options.” CMS Wire, May 22, 2014.
Schwerin, C. “Army Gears Up for Next Network Integration
Evaluation.” U.S. Army, army.mil, April 2, 2012.
Saran, C. “Avon Drops SAP Big Bang Transformation.”
ComputerWeekly,com, December 13, 2013.
The Engineer. “Patient Receives 3D Printed Titanium Hip.”
May 19, 2014.
U.S. Army Business Transformation Knowledge Center, 2009
army.mil/armyBTKC.
References
c10StrategicTechnologyAndEnterpriseSystems.indd Page 366 11/8/14 1:41 PM f-w-204a /208/WB01490/9781118897782/ch10/text_s
Chapter Snapshot
Analytics has historically been done by statisticians,
programmers, and data scientists (the “big guys”) who
rarely interacted directly with the business. However, this
experts-only approach has changed because of easier-to-use
data visualization, dashboard, and mashup technologies.
Data analytics are being pushed out into the business by
advances that make it possible for most employees to use
analytics themselves. Vendors of enterprise-level analytics
are also upgrading their visualization and reporting
platforms that are designed for use by the big guys.
1. Describe how data visualization applications and interac-
tive reports support learning and business functions.
2. Explain how data mashup applications streamline the
process of integrating diverse data sources and
information feeds to support data needs that cannot
be anticipated.
3. Describe how companies optimize operations with the
help of dashboards. Explain how enterprise dashboards
are built and how they leverage real time data and
people’s natural ability to think visually.
4. Assess the business applications and benefits of
geospatial data and geographic information systems.
Learning Outcomes
367
Chapter Snapshot
Case 11.1 Opening Case: Safeway and PepsiCo
Apply Data Visualization to Supply Chain
11.1 Data Visualization and Learning
11.2 Enterprise Data Mashups
11.3 Digital Dashboards
11.4 Geospatial Data and Geographic
Information Systems
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 11.2 Visualization Case: Are You Ready
for Football?
Case 11.3 Video Case: The Beauty of
Data Visualization—Data Detective
References
Data Visualization
and Geographic
Information Systems11
Chapter
c11DataVisualizationAndGeographicInformationSystems.indd Page 367 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
Several tools discussed in this chapter enable
you to be self-sufficient. Drag-and-drop, automation,
“show me” wizards, and easy-to-use dashboards enable
you to develop your own interactive data visualization
(viz), apps, and dashboards. Reducing dependency on
IT staff has a long history. For example, at one time,
managers did not analyze data with spreadsheets, but
now Excel expertise is expected. Vendors offer aca-
demic alliances to enable universities to teach their
software in MBA and undergraduate business courses.
Tableau Desktop, QlikView, TIBCO Spotfire, and
IBM’s SPSS Analytic Catalyst enable business users to
conduct the kind of advanced analysis that could only
Gained 10 or more
Change in population
density for counties
(people per square mile)
5 to 10
2 to 5
1 to 2
Minor change
–1 to –2
–2 to –5
–5 to –10
Lost 10 or more
Figure 11.1 U.S. Census Bureau map shows changes in population density for
counties using the colors green (gain) and purple (loss) to represent direction
of change and color intensity to represent magnitude of change. Source: www.
census.gov/
368
have been used by expert users of statistical software a
few years ago.
In Chapter 3, you read about big data analytics,
data mining, and business intelligence (BI). Chapter
11 expands on these topics with the latest in data viz,
visual discovery, dashboards, mashups, and geographic
information systems (GISs). Companies are incorpo-
rating geospatial data and GISs into their CRM, SCM,
BI, and other enterprise apps. GM, Verizon, Walmart,
Starbucks, and Nike use GISs to view their businesses
spatially. Maps can tell a more compelling story than
words or numbers, as shown in Figure 11.1, by effective
use of visual cues.
c11DataVisualizationAndGeographicInformationSystems.indd Page 368 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
Figure 11.2 Deloitte
Consulting partnered with
PepsiCo and Safeway to help
analyze huge amounts of
point-of-sale (POS) data at its
state-of-the-art visualization
center called HIVE.
369
CASE 11.1 OPENING CASE
Safeway and PepsiCo Apply Data Visualization to Supply Chain
PepsiCo worked with major
customers to improve demand
forecasts in order to minimize
inventory on-hand.
Deloitte Consulting partnered with
PepsiCo and Safeway to help them
visually analyze POS data at the
Deloitte Analytics HIVE, short for
Highly Immersive Visual
Environment.
PepsiCo and Safeway
The goal of Safeway’s Data
Visibility program is to improve
supply chain visibility with key
vendors, such as PepsiCo.
TABLE 11.1 Opening Case Overview
Companies • Safeway, Inc., a $44.2 billion grocery chain incorpo-
rated in Pleasanton, CA.
• PepsiCo, a major food and beverage company head-
quartered in Purchase, NY, with 274,000 employees
and 2013 revenue of $66.4 billion.
Locations and • Safeway is a food and drug retailer in North America
Industries with 1,335 stores in California, Hawaii, Oregon,
Washington, and the Mid-Atlantic region.
• PepsiCo is a food and beverage manufacturer whose
products are marketed in more than 200 countries
and territories.
Deloitte HIVE is a physical environment where people can
Consulting’s examine the latest analytics approaches themselves
HIVE using their own data.
Business challenges Inventory management is crucial to retail operations—
and a challenge throughout the supply chain.
SUPPLY CHAIN
VISIBILITY
In an effort to improve supply chain visibility, Safeway implemented data-sharing
programs with PepsiCo and other key vendors (Figure 11.1 and Table 11.1).
Benefits of improved visibility are increased sales and millions of dollars in reduced
costs along the entire supply chain.
Supply chain visibility is
the awareness and sharing
of POS data and data about
product orders, inventory
levels, demand forecasts,
transportation, and logistics
by trading partners from raw
material to delivery to end
customer.
c11DataVisualizationAndGeographicInformationSystems.indd Page 369 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
370 Chapter 11 Data Visualization and Geographic Information Systems
In 2012, Clay Broussard, Director of Customer Supply Chain & Logistics at
PepsiCo, contacted Safeway’s Kirsten Curtis, Director of Demand Planning & BI.
Clay explained (Curtis, 2013):
Safeway’s Data Visibility program is very forward thinking. Paired with
PepsiCo’s 360¤ Retail execution program, our teams are equipped to improve an
already lean supply chain. But if we really want to take it to the next level, we
need a different way to view the data. Deloitte Consulting has offered to part-
ner with us to provide an effective way to interpret massive amounts of data at
its state-of-the-art visualization center called the HIVE . . . are you interested?
Kirsten was interested because she believed a data visualization strategy was vital
to Safeway’s success.
EXCEL-BASED
ANALYTICS
In the past, when Safeway wanted answers about stockouts, managers used spread-
sheets to gather and compile inventory data and see how stocksouts trended across
the company. With spreadsheets, managers could discover general trends over time,
but they could not identify trends across a specific brand or universal product code
(UPC). Trends about each brand required more data than could be represented in
rows and columns of a spreadsheet. Spreadsheet limitations ultimately led the com-
pany to try data visualization. In August 2012, representatives from Safeway and
PepsiCo came to Deloitte’s HIVE for a day-long design session to analyze many
terabytes of data.
HIVE
Deloitte hosts meetings with business leaders who want to understand business
analytics better. These sessions are tailored to address their business challenges. At
the HIVE, executives get help with analytics tools using their own data.
The HIVE gathers together a wide range of the latest analytics technologies from
all over the world. In a very short amount of time, executives can learn what might
otherwise have taken months of meetings, demonstrations, and business pitches.
Data Visualization Process at the Hive
PepsiCo and Safeway participants collaborated to understand how to reduce the
“number of days of supply” from their supply chain while maintaining service levels.
This project would save PepsiCo and Safeway millions of dollars each year. During
their session, data visualizations were built to explore questions about stockouts.
The data included brands, UPC barcodes, costs, districts, store numbers, out-of-
stock scans, and out-of-stock reason codes. After Safeway and PepsiCo decided on
the visualization technique that best represented their supply chain, they needed to
design three processes to operationalize it. The three processes to be designed were:
1. How to feed the huge datasets into the visualization software
2. The best ways to display the data visually
3. How to gather feedback
Within 40 days, Pepsico and Safeway implemented their initial data visualization
with dashboards and drill-down capabilities, then spent another 20 days refining it.
What They Learned From Data Visualization and Dashboards
Safeway identified the stores experiencing the most stockouts and their root causes.
For example, it learned a disproportionate number of stockouts were occurring at a
c11DataVisualizationAndGeographicInformationSystems.indd Page 370 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.1 Data Visualization and Learning 371
store on Catalina Island. The store is in a resort area where the tourist traffic causes
uneven demand. Safeway adjusted its supply chain strategy to address uneven
demand patterns.
Safeway also discovered that they were sending multiple and conflicting fore-
casts to their vendors from various departments. Safeway changed the way the
company creates and communicates forecasts with its suppliers.
Two significant operational improvements at Safeway from discoveries made
through data visualization are:
1. Improved forecast accuracy by 35 percent.
2. Reduced on-hand warehouse inventory, which cut inventory carrying costs
significantly.
PepsiCo is also benefitting because now it has incredible near real time access to the
movement of every PepsiCo item, at every Safeway store, every day.
Sources: Compiled from Deloitte CIO Journal (2013), Curtis (2013), and Sommer and Lovelock (2013).
Questions
1. What is a potential benefi t of supply chain visibility?
2. What was the limitation of Excel-based data analytics at Safeway?
3. What is Deloitte’s HIVE?
4. What steps did Safeway and PepsiCo undertake to arrive at their data
visualization solution?
5. What did Safeway learn from its data visualization dashboards?
6. What were the two operational improvements at Safeway?
Visuals are the single best way our brain processes information. We rely on visual
cues to grasp and process huge amounts of information. Data visualization har-
nesses the power of analytics and adds a visual display to capitalize on how our
brains work. Interactive displays, charts with drill-down capability, and geospatial
data analysis are a few examples of the many ways to work with data. Data visual-
ization software can be extremely powerful and complex, such as Deloitte’s HIVE
platform. At the other continuum are tools with simple, point-and-click interfaces
that do not require any particular coding knowledge or significant training. Most
non-data-scientist-friendly tools have interactive elements and can pull data from
Google Docs, Excel spreadsheets, Access databases, and other sources that most
business people work with already.
In the first section of this chapter, the focus is on the technologies that fall into
the data analytics category, as shown in Figure 11.3. Later sections discuss informa-
tion delivery and data integration. Vendor packages usually offer tools in more than
11.1 Data Visualization and Learning
Information Delivery Data IntegrationData Analytics
• Data visualization
• Data discovery
• Geospatial & GIS
• Dashboards
• Interactive reports
• Data mashups
• GISFigure 11.3 Tools and
technologies in this chapter
fall into three related
categories.
Geospatial data identify
the geographic location and
characteristics of natural or
constructed features and
boundaries on the earth,
typically represented by
points, lines, or polygons.
c11DataVisualizationAndGeographicInformationSystems.indd Page 371 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
372 Chapter 11 Data Visualization and Geographic Information Systems
one category. In general, reporting tools show what has already happened in a busi-
ness. Analytical tools show what might or could happen in the future.
LEARNING, EXPLORING,
AND DISCOVERY
When companies, political parties, sports teams, or fund-raising agencies invest
in campaigns, promotions, special events, or other projects, they want to learn
something from them. Learning is the basis for continuous improvement, such as
improved earnings as you read in the opening case. Visualization is also used as a
data explorer or for data discovery—discovering hidden relationships. Like Safeway
and PepsiCo, companies across industries are discovering new relationships and
learning how to improve performance using data visualization. Enterprise visualiza-
tion apps for Androids, Apple iPads, and Blackberry Playbooks are replacing static
business reports with real time data, analytics, and interactive reporting tools.
Visuals
Examples of visualizations are dials, charts, graphs, timelines, geospatial maps
(refer to Figure 11.1), and heat maps. The tricolor heat map in Figure 11.4 instantly
alerts the viewer to critical areas most in need of attention. Visual displays make
it easier for individuals to understand data and identify patterns that offer answers
to business questions like “Which product lines have the highest and lowest profit
margins in each region?” Interactivity and drill-down capabilities are standard
features. In Figure 11.5 are two other types of heat maps, both based on the same
dataset and created with Tableau Desktop. Notice how visual display depends on
what you want to learn or convey.
As you read in Chapter 3 and Figure 3.1, human expertise is an essential
component of data visualization. A common mistake is to invest in the analytics
foundation—tools, quality data, data integration, touch screens—but overlook the
most crucial component—namely, users’ ability to interpret the visual reports and
analyses correctly.
Figure 11.4 This heat map uses three colors to convey information at a glance.
The heat map is like a spreadsheet whose cells are formatted with colors instead
of numbers. (Moody’s.)
RISKSCountry
code
NA–1
NA–2
SA–1
SA–2
SA–3
SA–4
SA–5
AA–1
AA–2
AP–1
AP–2
Capital/Financial Inflation Economic/Social Government
DATA DISCOVERY
MARKET SEPARATES
FROM THE BI MARKET
According to Gartner’s research, in 2014 the data analytics market split into two
segments: the traditional BI market and the new data discovery market. Data
discovery software had been viewed as a supplement to traditional BI platforms.
Now it is a stand-alone alternative to BI. This split occurred because today’s data
c11DataVisualizationAndGeographicInformationSystems.indd Page 372 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.1 Data Visualization and Learning 373
Figure 11.5 These heat maps represent the same dataset using red and green
and color intensity to show the profi tability of three product categories and their
subcategories. In (a), data labels show detailed profi t, while in (b) the area of
each segment is used to make comparisons.
Region
Product Cate… Product Sub-Category
Bookcases
Chairs & Chairmats
Office Furnishings
Tables
Appliances
Binders and Binder Accessories
Envelopes
Labels
Paper
Pens & Art Supplies
Rubber Bands
Scissors, Rulers and Trimmers
Storage & Organization
Computer Peripherals
Copiers and Fax
Office Machines
Telephones and Communication
Furniture
Office
Supplies
Technology
Central
73
37,920
26,293
–19,777
22,950
73,951
10,825
2,429
11,047
2,781
–174
–1,765
–68
11,971
513
38,876
79,393
–676
44,409
30,941
–16,990
31,276
92,273
11,222
3,740
10,433
518
178
–1,953
–2,018
37,280
35,997
61,377
84,860
–22,417
34,026
25,121
26,172
26,986
69,530
19,182
3,479
10,997
1,397
156
–2,903
11,836
30,475
63,598
129,060
78,985
–10,151
33,583
14,523
–50,677
16,812
71,420
7,482
4,041
13,510
2,856
–238
–1,179
–7,233
14,808
67,254
47,277
73,715
East South West
(a)
Technology
Telephones and
Communication
Technology
Copiers and Fax
Furniture
Chairs & Chairmats
Furniture
Office Furnishings
Technology
Computer
Peripherals
Office Supplies
Appliances
Office
Supplies
Paper
Office Supplies
Envelopes
Furniture
Tables
Technology
Office Machines
Office Supplies
Binders and Binder
Accessories
(b)
c11DataVisualizationAndGeographicInformationSystems.indd Page 373 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
374 Chapter 11 Data Visualization and Geographic Information Systems
discovery technologies provide greater data exploration and ease of use to help
users find answers to “why” and “what if” questions through self-service analytic
apps. The split is another example of pushing analytics onto the computers of busi-
ness workers. IT at Work 11.1 describes the trend at eBay.
At eBay, the trend is toward everyone doing their own data
discovery. David Stone, Senior Manager Analytics Platform
at eBay, described the importance of offering data analytics
tools to members of the eBay team. Stone explained that
when limited to Excel and its million-row limit, it caused them:
“to look at the top three categories instead of the top
40,000 categories and there’s so much less data. At
eBay that’s important because there is more action out
in the long tail accumulated than there is in the top three
categories.” (Groenfeldt, 2013)
Using data discovery software, employees can dig deep into
items in the top 40,000 categories because they no longer
face row limits. Employees can interact and visualize data
and can do data discovery on their own to better manage
performance.
Questions
1. In what way is data discovery more critical to online retail-
ers than to retailers with physical stores?
2. How did Excel limit eBay’s data analysis?
3. Discuss the impacts of self-service data discovery on
eBay.
4. Why do you think eBay employees were willing to do
their own data visualizations?
IT at Work 1 1 . 1
Do-Your-Own Data Discovery at eBay
Analytics/Visualization Vendors Responding to Demand
Smaller data visualization vendors are competing head-on with BI megavendors
Oracle and SAP BusinessObjects. Vendors QlikView, Birst, Tableau, and TIBCO
Spotfire are adding enterprise features with each new release. SAS made one of the
boldest moves of any vendor with its plans to replace its current enterprise BI plat-
form with Visual Analytics, a new data discovery environment. SAS is also adding
dashboard development to traditional reporting in the same user-friendly platform.
These vendors continue to focus on business users of all levels and back-
grounds. For example, Jeff Strauss, the BI architect at Allstate Insurance Company,
explained that Allstate invested in Tableau data discovery tools so users throughout
the organization could do their own analysis rather than rely on the IT department.
Tableau had built a fan club with easy-to-access dashboards.
Data Discovery Offers Speed and Flexibility
Data discovery is expected to take on a greater role in corporate decision making.
Companies are investing in the latest data discovery solutions largely because of
their speed and flexibility. Experts and nonexperts can collect data quickly from
disparate sources and then explore the dataset with easy-to-use interactive visu-
alizations and search interfaces. Drill-down paths are not predefined, which gives
users more flexibility in how they view detailed data.
A powerful feature of data discovery systems is their ability to integrate data
from multiple data stores and identify data types and roles. See Tech Note 11.1.
While data are being loaded into the program, the software automatically extracts
and organizes them by data type. Software may also extract and organize terms
from unstructured content, such as texts, e-mail, and PDFs and create tag clouds.
Figure 11.6 is an example. Tag clouds give users a quick way to size up a situation
and start to make discoveries.
c11DataVisualizationAndGeographicInformationSystems.indd Page 374 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.1 Data Visualization and Learning 375
Figure 11.6 Tag clouds
represent the relative
frequency of words and
terms by their sizes.
TECH NOTE 11.1 Understanding Data Types and Roles
Data types and roles are fundamental components that affect how visualizations
behave. Each fi eld in any data source has an associated data type. For example, a
fi eld that contains customer names has a string (text) data type, and a fi eld that con-
tains price information usually has a numeric data type. To visualize data QlikView,
Tableau—or in any analytics or BI tool, for that matter—you need to understand
dimensions and measures.
• Dimensions. Dimensions contain discrete or categorical data, such as a region
(e.g., Northeast, Southwest), product category, product subcategory, prod-
uct name, supplier, size, date, and zip code. Dimensions often become labels
in the data visualization.
• Measures. A measure is a calculation based on numeric data, such as profit,
margin, quantity sold, speed, and miles. The calculation always returns one
single value that summarizes all relevant records. The calculation is called
an aggregation. As in spreadsheets, there are several aggregation functions:
Sum(), Count(), Average (), Min(), Max(), and so on. Typically, KPIs are
measures—revenue, number of orders, quantity, and cost. A measure is
always based on an aggregation.
REAL-WORLD
EXAMPLES OF DATA
VISUALIZATION
The ultimate goal of data analytics is to drive profits, and often that depends on
learning how to manage assets, such as inventory, or engage customers in a smarter
way. Collecting data is relatively easy. Making sense of that data is not. Here are
examples of how companies and/or entire industries are using data visualization and
interactivity to improve decision speed and performance often with mobile displays.
Quick Detection and Decisions in Stock Markets
Wall Street firms, traders, wealth managers, risk analysts, and regulators rely on
their ability to process and capitalize on market anomalies in real time. Because
of the demanding pace of their decisions, capital markets professionals use visu-
alization for risk analysis, pre-trade and post-trade checks, compliance monitor-
ing, fraud detection, client profitability analysis, research and sales, and portfolio
©
E
q
ui
no
x
Im
ag
er
y/
A
la
m
y
c11DataVisualizationAndGeographicInformationSystems.indd Page 375 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
376 Chapter 11 Data Visualization and Geographic Information Systems
performance. Vendor Aqumin provides real time visual interpretation solutions
for the financial services industry. Aqumin’s OptionVision enables traders, risk
managers, and market participants to spot opportunities, risk, and market changes.
AlphaVision for Excel enables visual interpretation capabilities directly within the
Microsoft Excel platform, and AlphaVision for Bloomberg is developed for profes-
sional portfolio managers, traders, and risk analysts and is connected directly to the
Bloomberg Terminal to leverage data provided by Bloomberg.
The Chicago Board Options Exchange (CBOE), Gain Capital, JP Morgan,
hedge funds, and other asset management firms not only need data visualization but
their executives and investors expect the quality and excitement of visuals to make
sense of dry financial data.
Improving the HR Function
ADP Corporation is one of the largest payroll service providers in the world, with
data on 33 million workers. In 2014, payroll processing company ADP rolled out
data visualizations with predictive analytics to improve its human resource (HR)
function. After organizing the information and funneling it through an analysis
program, the HR department found that ADP would soon face a serious retirement
problem. To mitigate its foreseeable future talent gaps, ADP constructed new train-
ing programs to prepare the next generation of workers.
Prompt Disaster Response by the Insurance Industry
The effectiveness of an insurer’s response to a devastating hurricane or other
catastrophic event depends on its ability to combine large amounts of data to fully
understand the impact. Leading insurers are using Web-based data visualization and
analysis technologies to better manage their responses to major disasters. In the days
and weeks after a disaster, insurers face analysis and reporting bottlenecks. Analysts
capable of creating maps and reports work frantically to respond to requests for
information. Because new data continue being generated even after the event, the
data have a short life span and reports need to be regenerated and redistributed.
For example, when an earthquake occurs, workers throughout an insurance
company access a Web-based (cloud) data app to visualize and analyze the impact.
Users quickly determine which properties were subject to specific shake intensities
and can visually build analyses on their own, rather than waiting for a report.
LEADING AND LATEST
DATA VISUALIZATION
TOOLS
IBM SPSS Analytic Catalyst has made sophisticated analytics accessible. Analytic
Catalyst enables business users to conduct the kind of advanced analysis that had
been designed for experts in statistical software. The software fast tracks analytics by
identifying key drivers, selecting an appropriate model, testing it, and then explain-
ing the results in plain English. See the YouTube video titled “IBM SPSS Analytic
Catalyst” for an overview. The tool condenses the analytic process into three steps:
data upload, selection of the target variable (the dependent variable or outcome
variable), and data exploration. Once the data are uploaded, the system selects tar-
get variables and automatically correlates and associates the data. Based on charac-
teristics of the data, Analytic Catalyst chooses the appropriate method and returns
summary data rather than statistical data. On the initial screen, it communicates so-
called top insights in plain text and presents visuals, such as a decision tree in a churn
analysis. Once the user has absorbed the top-level information, he or she can drill
down into top key drivers. This enables users to see interactivity between attributes.
Tableau is one of the easier data discovery tools to implement, requiring just
basic database information to connect it to the target data sources. With a new in-
memory database engine such tools are developing the power to perform big data
analytics. Despite data viz advancement, data integration between data sources can
still be very challenging.
c11DataVisualizationAndGeographicInformationSystems.indd Page 376 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.2 Enterprise Data Mashups 377
Roambi Analytics is a leading mobile reporting and data visualization app
designed for iPads and iPhones. The app can take data from most sources, includ-
ing Box, Google Docs, spreadsheets, BI systems, databases, and Salesforce.com,
and transform them into interactive data visualizations. Roambi has a worldwide
customer base of Global 500 companies and small and medium businesses across
industries, including: telecommunications, biotechnology, pharmaceuticals, consumer
technology, and packaged goods.
Questions
1. How does data visualization contribute to learning?
2. How do heat maps and tag clouds convey information?
3. Why are data visualization and discovery usage increasing?
4. Give two examples of data visualization for performance management.
Enterprise mashups combine business data and applications from multiple sources—
typically a mix of internal data and applications with externally sourced data, SaaS
(software as a service) and Web content—to create an integrated experience.
Mashups, in general, became popular because of social and mobile technology.
Although most early mashups were consumer focused, the ability of enterprise mash-
ups to quickly and easily consolidate on a single webpage or mobile device screen
data and functionality that is normally spread across several applications offers real
business opportunities for companies of all shapes and sizes around the world.
Enterprises use mashups as quick, cost-effective solutions to a range of issues.
Because mashups use preexisting technology, they do not require a huge investment
and can be developed in hours rather than days or weeks.
11.2 Enterprise Data Mashups
MASHUP
ARCHITECTURE
Technically, a mashup is a technique for building applications that combine data
from multiple sources to create an integrated experience. As techniques for creating
mashups became easier, companies started using them to build enterprise mashups
that supported their business models. Tech-savvy managers realize that they can
use mashup apps with their existing data and external services to provide new and
interesting views on the data.
Figure 11.7 shows the general architecture of an enterprise mashup app. Data from
operational data stores, business systems, external data (economic data, suppliers;
Enterprise
mashup app
Enterprise mashup
External
data
Data
Data
Business
systems
News
feeds
Figure 11.7 Architecture
of enterprise mashup
application.
c11DataVisualizationAndGeographicInformationSystems.indd Page 377 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
378 Chapter 11 Data Visualization and Geographic Information Systems
information, competitors’ activities), and real time news feeds are integrated to
generate an enterprise mashup.
TECH NOTE 11.2 Adaptive Discovery Dashboard Software
Software vendor Adaptive Insights offers Adaptive Discovery, next-generation dash-
board software. The software is widely used by businesses, nonprofi ts, government,
and universities. Several users are Coca-Cola, Siemens, Bridgestone, Nikon, AAA,
Toyota, and NBC News.
Users can create dashboards, drill down to understand root causes, and perform
what-if scenarios without any programming expertise. In 2014, it was the only cloud-
based data visualization and dashboard software designed for use by executives,
line-of-business managers, and fi nance without relying on IT.
One of the features of Adaptive Discovery is Visual Designer for Dashboards.
With minimal training in Visual Designer, business users can:
• Use drag and drop to create and edit personalized dashboards
• Leverage predefined chart formats
• Create private dashboards or share them with others
The vendor offers free 30-day trials and demos from AdaptiveInsights.com.
ENTERPRISE DATA
MASHUPS
Enterprise data mashups are combinations of data from various business systems
and external sources, often in real time, without necessarily relying on a middle step
of ETL (extract, transform, and load) from a data warehouse. While combining dis-
parate data sources is common for a data mashup, even if there is only a single data
source, a mashup can be made by combining data in a way that is not anticipated.
End users and analysts who rely on dashboards and drill-down capabilities benefit
from greater access to data, but the mashups remain behind the scene and invisible.
Interactive dashboards and drillable reports can be rapidly built based on mashed-
up data. Tech Note 11.2 discusses dashboard software. Heat maps and tree maps
can be created as data visualizations in mashups.
For organizations, mashup apps decrease IT implementation costs over tradi-
tional, custom software development (discussed in Chapter 12) and significantly
simplify business workflows—both increase the ROI (return on investment) of
mashup implementations.
WHY BUSINESS USERS
NEED DATA MASHUP
TECHNOLOGY
Business users have a hard enough time identifying their current data needs. It is
not realistic to expect them also to consider all the new sources of data that might
be made available to them and the analyses they might do if they had access to
that data. With traditional BI and data warehousing systems, data sources have
to be identified and some understanding of data requirements and data models is
needed.
Realizing that there will always be data needs that cannot be anticipated,
the question is whether IT should be in the middle of supporting those requests?
Providing business users with self-service enables them to meet their needs more
quickly. They also have the opportunity to explore and experiment.
c11DataVisualizationAndGeographicInformationSystems.indd Page 378 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.2 Enterprise Data Mashups 379
Enterprise mashups improve operational efficiency, optimize the sales pipeline,
enhance customer satisfaction, and drive profitability. Within government, mashups
have positively impacted strategic areas such as citizen engagement and satisfac-
tion, financial transparency, project oversight, regulatory compliance, and legislated
reporting. A summary of enterprise mashup benefits is given in Table 11.2.
TABLE 11.2 Enterprise Mashups Benefi ts
Summary of benefi ts of mashup technology to an enterprise:
• Dramatically reduces time and effort needed to combine disparate data sources.
• Users can define their own data mashups by combining fields from different
data sources that were not previously modeled.
• Users can import external data sources, e.g., spreadsheets and competitor
data, to create new dashboards.
• Enables the building of complex queries by nonexperts with a drag-and-drop
query building tool.
• Enables agile BI because new data sources can be added to a BI system
quickly via direct links to operational data sources, bypassing the need to load
them to a data warehouse.
• Provides a mechanism to easily customize and share knowledge throughout
the company.
ENTERPRISE MASHUP
TECHNOLOGY
Mashup technology leverages investments in both BI tools and interactive tech-
nologies. BI systems are very good at filtering and aggregating huge data volumes
into information. With mashup technology, for example, users can filter down the
data based on their needs so that only the information needed is provided by the
available data services. Tech Note 11.3 describes mashup self-service.
TECH NOTE 11.3 Mashup Self-Service
Many BI systems are designed by the IT department and based on infl exible data
sources. The result is a bottleneck of end-user change requests as business needs and
data sources change. The solution is self-service mashup capabilities.
Using data mashup apps, nontechnical users can easily and quickly access, inte-
grate, and display BI data from a variety of operational data sources, including those
that are not integrated into the existing data warehouse, without having to under-
stand the intricacies of the underlying data infrastructures or schemas.
In an enterprise environment, mashups can be used to solve a wide variety of busi-
ness problems and day-to-day situations. Examples of these types of mashups are:
1. Customer. A customer data mashup that provides a quick view of customer data
for a sales person in preparation for a customer site visit. Data can be pulled
from internal data stores and Web sources, such as contact information, links to
related websites, recent customer orders, lists of critical situations, and more.
c11DataVisualizationAndGeographicInformationSystems.indd Page 379 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
380 Chapter 11 Data Visualization and Geographic Information Systems
2. Logistics. A logistics mashup that displays inventory for a group of department
stores based on specifi c criteria. For example, you can mash current storm infor-
mation onto a map of store locations and then wire the map to inventory data to
show which stores located in the path of storms are low on generators.
3. Human resource. An HR mashup that provides a quick glance at employee data
such as profi les, salary, ratings, benefi ts status, and activities. Data can be fi ltered
to show custom views, for example, products whose average quarterly sales are
lower than last quarter.
Enterprise Mashup Vendors
Several vendors offer mashup capabilities, but not all of them offer enterprise-grade
mashup software. Vendors offering enterprise mashups are Magic Software and
JackBe with Presto. Point-and-click dashboard building is a common feature. These
mashup technologies provide visually rich and secure enterprise apps created from
live data. They provide the flexibility to combine data from any enterprise app and
the cloud regardless of its location. Users can build apps and dashboards that can
be displayed on the Web and mobile devices.
Questions
1. Sketch or describe the architecture of an enterprise mashup application.
2. What is an enterprise data mashup?
3. What are the functions and uses of enterprise mashups?
4. Explain why business workers may need data mashup technology.
5. What are three benefi ts of mashup technology to the organization?
Dashboards are a style of reporting that depicts KPIs, operational or strategic
information with intuitive and interactive displays. Table 11.3 lists typical met-
rics displayed on dashboards by function. An executive dashboard displays a
company’s performance metrics, which are automatically updated in real time
(every 15 minutes) based on custom programming and connectivity with exist-
ing business systems. Dashboards improve the information synthesis process
by bringing in multiple, disparate data feeds and sources, extracting features of
interest, and manipulating the data so the information is in a more accessible
format. Users no longer need to log into multiple applications to see how the
business is performing.
Components of dashboards are:
• Design. The visualization techniques and descriptive captions to convey
information so that they are correctly understood. Infographics are widely
used because they convey information in interesting and informative designs.
• Performance metrics. KPIs and other real time content displayed on the dash-
board. All dashboard data should reflect the current value of each metric.
• API. APIs (application programming interfaces) connect disparate data
sources and feeds to display on the dashboard. The alternative is for users
or IT to manually enter data to the dashboard. Dashboards created in this
manner tend to fail because of the risk of incomplete, outdated, or wrong
data, which users learn not to trust.
• Access. Preferred access is via a secure Web browser from a mobile device.
11.3 Digital Dashboards
c11DataVisualizationAndGeographicInformationSystems.indd Page 380 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.3 Digital Dashboards 381
TABLE 11.3 Metrics Displayed on Dashboards by Function
DASHBOARDS METRICS
Financial • Net income
performance • Cash balance, actual vs. expected
• Profi t, current month projection
• Changes in A/R and A/P
E-commerce • Daily website visitors by traffi c source
• Trend of mobile vs. tablet traffi c
• Location where visitors are located
• Top referring websites
• Top keywords referring traffi c
• Revenue per website visitor
Revenue • Sales per day per channel
• How revenue is trending
• Days with strongest sales, weakest sales
• Products selling the best, worst
Sales team • Sales by lead source; which leads are most and least
effective
• Number of leads and proposals per salesperson
• Proposal close percentage,
• Salesperson closing percentages
• Where in the conversion funnel customers are being
lost. Conversion funnels are paths that prospective
customers take before they become paying clients
Advertising • Number of leads generated by advertising; which
advertising is most and least effective
• Cost per lead, by advertising source
• Advertising expense, as a percent of sales
• Which advertising sources directly lead to sales
Order fulfi llment • Number of products manufactured, reworked
• On-time completion percent
• Changes in inventory levels
• Percent of on-time delivery per week, month
DASHBOARDS ARE
REAL TIME
Dashboards are often mistakenly thought of as reports consisting of various gauges,
charts, and dials, but the purpose of business dashboards is much more specific and
directed. The purpose of dashboards is to give users a clear view of the current state
of KPIs, real time alerts, and other metrics about operations. Dashboard design is a
critical factor because business users need to be able to understand the significance
of the dashboard information at a glance and have the capability to drill down to
one or more levels of detail. Having real time, or near real time, data is essential
to keep users aware of any meaningful changes in the metrics as they occur and to
provide information for making decisions in real time. Users can take corrective
actions promptly.
c11DataVisualizationAndGeographicInformationSystems.indd Page 381 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
382 Chapter 11 Data Visualization and Geographic Information Systems
By looking at the dashboard in Figure 11.8, you notice how color-coded dis-
plays can quickly inform the user of the status of KPIs.
Figure 11.8 Dashboards are designed to meet the information needs
of their users.
Region Name
ANZ
2
23
6
22
28
8
10
18
18
2
12
8
9
11
5
2
Canada
Asia Pacific HQ
Central and Southern Europ
Eastern Europe
France
Germany
Greater China
India
Japan
33.33%
36.36%
Drop Column Fields Here
Subsid Total Ev Goal Evide Evidence perce
35 125.00%
90.00%
61.11%
16.67%
27.78%
33.33 1000
Asia Pacific HQ
36.36 1000
Canada
125 1000
Central and Southern E
90 1000 61.11 1000 27.78 1000
33.33 1000
Asia Pacific HQ
36.36 1000
Canada
90 1000
France
61.11 1000
Germany
125 1000
Central and
Southern Europe
Gauge
Figure 11.9 Dashboards
pull data from disparate
data sources and feeds,
manipulate the data, and
then display the metrics.
HOW OPERATIONAL
AND STRATEGIC
DASHBOARDS WORK
Dashboards are custom programmed to automatically and securely pull, analyze,
and display data from enterprise systems, cloud apps, data feeds, and external sources
(Figure 11.9). They work by connecting to business systems, such as accounting
©
M
ed
ia
M
at
es
O
y/
iS
to
ck
p
ho
to
c11DataVisualizationAndGeographicInformationSystems.indd Page 382 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.3 Digital Dashboards 383
software, ERP, CRM, SCM, e-mail systems, website analytics programs, and project
management software via APIs. IT at Work 11.2 describes dashboards in action at
Hartford Hospital. Tech Note 11.4 lists vendors that offer free trials of dashboard
software.
TECH NOTE 11.4 Free Trial Dashboards
A few vendors that offer free trials to build your own dashboards are:
• Dundas.com
• GrowThink.com
• MicroStrategy.com
• SAP Crystal Dashboard Design
• Sisense.com
BENEFITS The interrelated benefits of business dashboards are:
1. Visibility. Blind spots are minimized or eliminated. Threats and opportunities
are detected as soon as possible.
2. Continuous improvement. A famous warning from Peter Drucker was “if you
can’t measure it, you can’t improve it.” Executive dashboards are custom de-
signed to display the user’s critical metrics and measures.
3. Single sign on. Managers can spend a lot of time logging into various business
systems and running reports. Single-sign-on dashboards save time and effort.
4. Deviations from what was budgeted or planned. Any metrics, such as those list-
ed in Table 11.3, can be programmed to display deviations from targets, such as
comparisons of actual and planned or budgeted.
5. Accountability. When employees know their performance is tracked in near
real time and can see their results, they tend to be motivated to improve their
performance.
Health-care providers at Hartford Hospital, a 700-bed teach-
ing hospital in Connecticut, were challenged by the short-
age of real time data in usable form, according to Michael
Lindberg M.D., chairman of the Department of Medicine
(Baldwin, 2011). Hartford Hospital implemented dashboard
technology from CareFx.
Dr. Lindberg uses the dashboard to track data in three
key areas that impact the hospital’s performance:
1. Patient data. Data on patients’ length of stay and per-
centage of early morning discharges.
2. Bed availability. Data on types of beds open, percentage
of beds not available for patients such as those being
cleaned, or beds in a room with a patient in isolation.
3. Remission rate. Data about patients who return to the
hospital within 30 days of their discharge date.
The dashboard data helps Dr. Lindberg fulfill Joint
Commission requirements for ongoing physician evalua-
tions. He can identify trends and compare current to past
performance. According to Dr. Lindberg, “We need to have
a handle on what physicians are doing. Having a database to
IT at Work 1 1 . 2
Dashboards in Action at Hartford Hospital
c11DataVisualizationAndGeographicInformationSystems.indd Page 383 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
384 Chapter 11 Data Visualization and Geographic Information Systems
drill down to the individual physician goes a long way toward
satisfying those requirements.” Purely financial data are not
yet available on the CareFx dashboard, but Lindberg plans
to add indicators such as cost per hospitalization broken
down by physician and department to identify doctors who
are outliers for test ordering.
Questions
1. What KPIs are displayed on Dr. Lindberg’s dashboard?
2. What KPIs will be added to the dashboard?
Questions
1. Describe business dashboards and their functions.
2. Why do you think dashboards must be in real time and customized for
the executive or manager?
3. How do business dashboards differ from other types of visual reports?
4. Explain the components of dashboards.
5. What are benefi ts of dashboards?
A geographic information system (GIS) captures, manages, analyzes, and displays
multidimensional geographic data, also called geospatial data. GIS can connect to
location-tracking devices and apps. GIS software can link geospatial data—where
things or people are and where they are going—with descriptive data—what things
are like or what customers are doing. GIS’s ability to track customers’ movement
and behavior in real space enables new strategies for marketing, retail, and entre-
preneurship. Their ability to track products along the supply chain also offers
opportunities in logistics and order fulfillment.
Collecting home and work addresses only paints a static picture of consumers’
locations. Their movements over time are not tracked. Data that are organized by
zip code only cannot reveal customers’ habits. By integrating geographic informa-
tion systems, businesses can more effectively solve problems like organizing sales
territories, pinpointing optimal locations, finding customers, managing campaigns,
and delivering services. Geospatial data can also map competitors’ actions.
11.4 Geospatial Data and Geographic Information Systems
GEOCODING In many cases, locations are already in existing data stores, but not in a format suit-
able for analytics. A simple process called geocoding can convert postal addresses
to geospatial data that can then be measured and analyzed. By tapping into this
resource, decision makers can use the geographic or spatial context to detect and
respond to opportunities.
Case in Point: GM
General Motors (GM) spends a staggering $2 billion a year on marketing. In the
past, it shotgunned its ads at the general public. Now, it maps out which types of
households will buy new cars, more accurately determines locations where people
buy certain models, and channels its ads specifically to those areas. As a result, GM
spends less money to generate higher sales.
GM managers use ESRI’s ArcGIS software to view local demographics, loca-
tion characteristics, regional differences, and the competitive brand environment to
determine how a given dealership should be performing compared to actual results.
The GIS makes it possible for GM to isolate demand, target its marketing efforts to
local preferences, and position its dealerships to improve sales. With the intelligence
provided by the GIS, GM has increased sales despite cutting the advertising budget.
c11DataVisualizationAndGeographicInformationSystems.indd Page 384 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
11.4 Geospatial Data and Geographic Information Systems 385
Figure 11.10 GIS can create maps with multiple layers of data.
GIS IS NOT A MAP On a map, if you looked at retail store #50, you would see the name of the store and
a point denoting where it is located. However, if you view a GIS map on your tab-
let, you can click on retail store #50 and see its location, name, weekly or monthly
revenue, product categories, a photo of the storefront, and a virtual tour.
Unlike a flat map, a GIS-generated map has many layers of information for
many ways of thinking about a geographic space. Figure 11.10 shows an example.
By hovering over a state, such as Texas, another layer of data about sales and finan-
cial data appears.
INFRASTRUCTURE AND
LOCATION-AWARE
COLLECTION OF
GEOSPATIAL DATA
The infrastructure needed to collect geospatial data continues to expand. Cellular
and Internet service providers, sensors, Google Earth, GPS, and RFID systems
know the location of each connected user or object. Foursquare, Google Maps, and
other mobile apps rely on GPS locations. With the Shopkick app, Macy’s can track
a shopper’s every move within one of its stores and send the shopper notifications
about deals and items of interest. iBeacon is a feature available in iOS 7 devices that
uses a low-power Bluetooth transmission to broadcast a user’s location. iBeacon
allows Apple, or app developers leveraging Apple technology, to track users inside
buildings where satellite transmissions may not reach.
Like Macy’s, businesses can motivate customers to download a location-
tracking app. Using GIS can help businesses target their customer markets more
effectively and dynamically by engaging with them in real time.
INTEGRATING GIS
INTO BUSINESS
APPLICATIONS
GIS tools have made significant contributions to decision making in finance,
accounting, marketing, and BI. Business applications include:
• Analysts can pinpoint the average income in areas where the highest per-
forming stores are established.
c11DataVisualizationAndGeographicInformationSystems.indd Page 385 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
386 Chapter 11 Data Visualization and Geographic Information Systems
• Retailers can learn how store sales are impacted by population or the prox-
imity to competitors’ stores.
• A retail chain with plans to open a hundred new stores can use GIS to iden-
tify relevant demographics, proximity to highways, public transportation,
and competitors’ stores to select the best location options.
• Food and consumer products companies can chart locations of complaint
calls, enabling product traceability in the event of a crisis or recall.
• Sales reps might better target their customer visits by analyzing the geogra-
phy of sales targets.
With current GIS, geospatial, and geocoding technologies and platforms, GISs can
be easily incorporated and managed within data analytics and visualization software.
With the GIS moving into the cloud, developers of enterprise applications
based on SAP, Microsoft Office, SharePoint, MicroStrategy, IBM Cognos, and
Microsoft Dynamics CRM are using it to create a wide range of mobile applications.
Key Terms
analytical tools
data discovery
enterprise data mashup
geocoding
geographic information
system (GIS)
geospatial data
reporting tools
supply chain visibility
Assuring Your Learning
1. How people use, access, and discover data in business
is being actively disrupted by tablets, which had been
designed for consumers. Users have higher expecta-
tions for data displays and capabilities. Boring, static
graphs and pie charts are unacceptable. Discuss
how performance management—the monitoring of
KPIs, for example—may be improved by providing
managers with data visualizations. Now consider the
opposite. In your opinion, would lack of data visual-
ization hurt the ability to manage performance?
2. Lots of data are available to retailers to make good
decisions—loyalty programs, Web analytics, and
point-of-sale data. However, there is a big gap
between having data and being able to leverage
them for real time decision making. How can enter-
prise mashups close this gap?
3. Visit SAS.com and search for Visual Data Discovery.
a. Review the screenshots, features, and benefi ts.
b. In your opinion, what are the two most impor-
tant benefi ts of this data discovery tool?
c. Would you recommend this tool? Explain your
answer.
4. Explain how executive dashboards can lead to
better business insights. What are the limitations of
dashboards?
DISCUSS: Critical Thinking Questions
5. Periscopic (http://periscopic.com/) is a socially
conscious data visualization fi rm that specializes in
using IT to help companies and organizations facili-
tate information transparency and public awareness.
From endangered species, to politics, to social jus-
tice, it is the goal of Periscopic to engage the public
and deliver a message of responsibility and action.
Its philosophy and tagline are “do good with data.”
a. Visit http://periscopic.com/ and explore its re-
cent work.
b. Discuss how data are used to do good.
c. How effective is Periscopic’s approach to public
awareness and social justice?
6. Visit spotfi re.tibco.com and click Demos.
a. Select and watch one of the featured demos.
b. Describe the data visualizations features in the
demo.
c. Explain the benefi ts of the application or
analytics.
EXPLORE: Online and Interactive Exercises
c11DataVisualizationAndGeographicInformationSystems.indd Page 386 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
CASE 11.3 Video Case 387
7. Visit the Analysis Factory at www.analysisfactory.com.
a. Click Gallery and then select Custom Solutions.
b. View one demo, such as Performance Trends,
Fusion Charts, Manufacturing Performance, and
Sales Map Dashboard.
c. Create a table listing all of the customer solu-
tions for which you tried the demo in the fi rst
column. In the second column, list the depart-
ments or functions each customer solution
supports. In the third column, list the types of
visualizations used in each solution.
d. In the team report, discuss how dashboards can
impact the quality of business decisions.
8. Visit www.TableauSoftware.com. Click Learning
and Visual Gallery from the drop-down menu.
a. Review three interactive visualizations and
dashboards. How do they convey information at
a glance?
b. Click Free Trial. Download the Tableau Public
and create your own data visualization. Print or
publish it on a website or blog.
9. Visit www.itdashboard.gov/data_feeds. Use this tool
to design your own snapshots of IT dashboard data.
Follow the steps to create, save, and publish your IT
dashboard.
10. Visit microstrategy.com.
a. Click Training and Events and select Webcasts
from the drop-down menu.
b. Select the On-Demand tab. Then select and
watch a webcast about dashboards or data
discovery.
c. Write a report describing what you learned.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
CASE 11.2
Visualization Case: Are You Ready for Football?
Nothing inspires passionate comments among sports fans
like preseason predictions. Brett McMurphy’s data visualiza-
tion looks at how teams ranked in different polls.
Visit www.tableausoftware.com and search using “ready
for football.” You will see the Preseason Polls & Returning
Starters visualization. (a) Interact with the Preseason Polls &
Returning Starters visualization. (b) Select various fi lters and
observe the changes. (c) Download the workbook by clicking
the Download button at the lower right corner of the display.
View and interact with two other sports-related visualizations,
for example, CBS Sports Defensive Matchup Tracker, Fantasy
Closers, and Premier League Points Leaders. Download each.
Click the Business and Real Estate Gallery. View and interact
with two data visualizations in the gallery. Download each.
Questions
1. Which visualization was the easiest to understand at a
glance? Explain.
2. Which visualization was the most diffi cult or complicated
to understand easily? Explain.
3. What are the benefi ts and potential drawbacks of interac-
tive visualizations?
CASE 11.3
Video Case: The Beauty of Data Visualization
TED stands for technology, entertainment, and design. Visit
TED.com and search “data visualization.” Select “David
McCandless: The beauty of data visualization.” The video and
transcript are available. In his TED talk, The Beauty of Data
Visualization, David McCandless says that data visualization
gives us a second language—the language of the eye.
Questions
1. Explain what he means by language of the eye.
2. What are examples of language of the mind?
3. What happens when language of the eye and language
of the mind combine?
4. What did David McCandless say about information design?
c11DataVisualizationAndGeographicInformationSystems.indd Page 387 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
388 Chapter 11 Data Visualization and Geographic Information Systems
Baldwin, G. “Dashboards in Action.” Health Data Management.
October 20, 2011.
Curtis, K. “Deloitte Hosts PepsiCo and Safeway at the HIVE
(Highly Immersive Visual Environment).” GMAOnline.Org.
2013. gmaonline.org
Deloitte CIO Journal. “Data Visualization Helps Safeway
Keep Shelves Stocked.” The Wall Street Journal. December 3,
2013.
Groenfeldt, T., “A Tableau Solution To Those Excel Blues.”
Forbes. February 22, 2013. forbes.com/sites/tomgroenfeldt
Henschen, D. “Data Visualization for the Masses?” Informa-
tionWeek, March 26, 2012.
Sommer, D. & J. D. Lovelock. “Market Trends: The Collision
of Data Discovery and Business Intelligence Will Cause
Destruction.” Gartner Inc., April 16, 2013.
References
c11DataVisualizationAndGeographicInformationSystems.indd Page 388 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch11/text_s
Chapter Snapshot
As you have read throughout this book, what a company
can do depends on what its IT infrastructure and infor-
mation systems can do. IT strategy shapes the direction
of IT investments over the next one to five years to
maximize business value and shareholder wealth. Like all
strategies, IT strategy defines priorities, a road map, bud-
get, and investment plan—and must align with and sup-
port the business strategy. Deciding on a strategy entails
IT Strategy and
Balanced Scorecard12
Chapter
1. Describe the steps in the IT strategic planning process,
how to evaluate the IT strategy, and the role of IT
steering committees.
2. Explain the value of aligning the IT and business
strategies and how this alignment can be achieved.
3. Describe the balanced scorecard methodology, its four
performance metrics, and its function as a road map
for strategy execution and making strategy a continual
process.
4. Describe how sourcing strategies can improve perfor-
mance and the risk and challenges of sourcing and off-
shore relationships. Explain the IT vendor selection and
management processes and how to improve successful
relationships through the use of contracts and service
level agreements.
Learning Outcomes
389
Managing Business Relationships, Projects,
and Codes of EthicsPart 4
Chapter Snapshot
Case 12.1 Opening Case: Intel’s IT Strategic
Planning Process
12.1 IT Strategy and Strategic Planning Process
12.2 Aligning IT with Business Strategy
12.3 Balanced Scorecard
12.4 IT Sourcing and Cloud Strategy
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 12.2 Business Case: AstraZeneca Terminates
$1.4B Outsourcing Contract with IBM
Case 12.3 Data Analysis: Third-Party versus
Company-Owned Offshoring
References
c12ITStrategyAndBalancedScorecard.indd Page 389 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
making decisions about a future that can only be guessed
at. According to Roger L. Martin’s article in Harvard
Business Review: “True strategy is about placing bets and
making hard choices. The objective is not to eliminate
risk but to increase the odds of success” (Martin, 2014).
Strategy making is uncomfortable because it is about
taking risks and facing the unknown.
In the mid-2010s, this process takes into consid-
eration social, mobile, analytics, cloud, software as a
service (SaaS), and methods to measure how well the IT
plan is working. IT strategic plans include an operating
plan for acquiring or providing new technology and ser-
vices. The operating plan defines how to execute the IT
strategic plan; for example, deciding on in-house devel-
opment or sourcing options such as managed services,
cloud computing, or SaaS. Strategies are measured and
evaluated continuously and revised annually during the
strategic planning process. Balanced scorecard is a meth-
odology for evaluating performance based on financial
and nonfinancial metrics.
CASE 12.1 OPENING CASE
Intel’s IT Strategic Planning Process
390
INTEL’S IT
ENVIRONMENT
Intel operates in 65 countries with almost 100,000 employees in 168 sites, and has
59 IT sites with 6,300 IT employees. In 2013, 94 percent of all new services were
deployed to the cloud. IT provides 14,000 Ultrabook touch devices and 43,200
mobile handheld devices.
IT STRATEGIC
PLANNING PROCESS
Intel designed its strategic planning process to closely align IT investments and
solutions to strategic planning at the corporate level. Close IT–business alignment
is achieved by bringing together a variety of perspectives from senior management,
IT, and business groups in the planning stage—steps 1 through 4 in Figure 12.1. To
minimize time demands, the strategic planning team engages subject matter experts
at critical points instead of involving them at every step of the process.
The planning, decision-making, measuring, and evaluation activities flow natu-
rally from one step to the next. The business and IT strategic plans are evaluated
and adjusted annually to keep pace with rapid changes in the industry. Performance
is measured and evaluated using the balanced scorecard methodology to ensure that
limited resources are invested to achieve the highest possible ROI. Characteristics
of the planning process are summarized in Table 12.1.
BALANCED
SCORECARD
The balanced scorecard translates mission and vision statements into a compre-
hensive set of objectives and performance measures that can be quantified and
appraised. Objectives are the building blocks of strategy. Objectives set out what
the business is trying to achieve. They are action-oriented statements, for instance,
achieve a ROI of at least 10 percent in 201x, that define the continuous improve-
ment activities that must be done to be successful. Objectives have the following
“SMART” criteria:
• Specific: Define what is to be achieved.
• Measurable: Are stated in measurable terms.
• Achievable: Are realistic given available resources and conditions.
• Relevant: Are relevant to the people who are responsible for achieving them.
• Time frame: Include a time dimension.
Strategic planning is the
process of formulating the
direction of a business in
terms of how it intends to
achieve its mission, goals,
and objectives.
IT–business alignment means
how closely an organization’s
IT strategy is interwoven
with and driving its overall
business strategy.
Balanced scorecard is a
methodology—and a tool—
for measuring performance
using financial and non-
financial metrics.
c12ITStrategyAndBalancedScorecard.indd Page 390 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
CASE 12.1 Opening Case 391
Strategic
directional
statements
Strategic
plan
gic
egic
2. Technology & Business Outlook. A team of
senior management, IT, and business unit
representatives develop the two-to-five-year
business outlook & technology outlook.
3. Current State Assessment & Gap Analysis.
Analysis of the current state of IT, enterprise
systems, & processes, which are compared with
results of step 2 to identify gaps and necessary
adjustments to IT investment plans.
4. Strategic Imperatives, Strategies, & Budget for
Next Year. Develop next year’s priorities, road
map, budget, & investment plan. Annual budget
approved.
5. Governance Decisions & IT Road Map. The
budget guides the governance process, including
supplier selection and sourcing.
6. Balanced Scorecard Reviews.
Performance is measured monthly.
1. Enterprise Vision. Senior management &
leaders develop & communicate the enterprise’s
two-to-five-year strategic vision & mission and
identify the direction & focus for upcoming year.
Figure 12.1 Model of Intel’s
six-step IT strategic planning
process. Planning phase:
steps 1 to 4. Decision-making
phase: step 5. Measuring and
evaluation phase: step 6.
TABLE 12.1 Characteristics of Intel’s Corporate and IT Strategic Planning Process
Integrated Intel IT activities are synchronized with the company’s strategic direc-
tion. By tightly linking Intel IT to the corporate planning process, the IT
function has strengthened its credibility throughout Intel and earned the
position of a trusted partner.
Holistic The strategic planning process aligns IT investments with Intel’s busi-
ness direction and consolidates expertise and ideas from across Intel IT.
Sustainable As new strategies are implemented, a common practice is to “look up”
every two or three years and ask, “What’s next?” Instead of replacing the
plan every two to three years, Intel uses a different approach. To keep
pace with changes in the environment, the team looks at the plan every
year to determine if anything shifted in its environment. If a shift has
occurred and affected its business, the IT plan is updated as needed.
c12ITStrategyAndBalancedScorecard.indd Page 391 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
392 Chapter 12 IT Strategy and Balanced Scorecard
Companies use balanced scorecards to:
• Clarify or update a business strategy
• Link strategic objectives to long-term targets and annual budgets
• Integrate strategic objectives into resource allocation processes
• Increase companywide understanding of the corporate vision and strategy
Balanced scorecard is discussed in greater detail in Section 12.4.
CHARACTERISTICS
OF THE STRATEGIC
PLANNING PROCESS
Characteristics of the planning process are summarized in Table 12.1. Intel’s strategic
planning approach has improved Intel’s agility. It provides a clear and credible
direction for the enterprise and supports consistent decision making at all levels of
the business.
An effective strategic planning process is critical to an enterprise’s long-term
success and health. The plan supports consistent decision making at all levels of the
business. Each enterprise must adapt its strategic planning process and approach to
fit is own culture and leadership style.
Sources: Compiled from Haydamack (2008), Haydamack & Johnson (2008), and Krishnapura et al (2014) .
Questions
1. What are the three phases in the IT strategic planning process? Describe
the steps in each phase.
2. Intel formulates a two-to-fi ve-year strategic plan. Given this time frame,
why is the plan reviewed and evaluated every year?
3. Given the frequency of the planning process, what is done to minimize
demands on people’s time?
4. How is Intel’s IT strategic plan measured and evaluated?
5. What makes the process sustainable?
6. How does the IT strategy support the short-term (one-year) business
strategy?
7. In your opinion, how does Intel’s IT strategic planning process impact
the company’s survival?
Long-term business planning starts with a clear understanding of the factors that
create significant value and that work together with other factors to drive future
revenue and profit at or above their current rates. These factors are value drivers.
12.1 IT Strategy and the Strategic Planning Process
VALUE DRIVERS In order to create business value, you must identify value drivers and then link them
to daily activities. For example, it is not enough to identify cost as a key value drive.
Cost is almost always a value driver, but for this factor to be useful, you need to drill
down to the activities that impact cost. The general types of business value drivers
are explained in Table 12.2.
Drivers can have a limited life span. Their value can diminish due to chances in
the economy or industry, at which time they are replaced with relevant ones.
Value drivers are considered in the strategic planning process and the balanced
scorecard methodology.
Value drivers enhance the
value of a product or service
to consumers, creating value
for the company. Advanced
IT, reliability, and brand
reputation are examples.
c12ITStrategyAndBalancedScorecard.indd Page 392 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.1 IT Strategy and the Strategic Planning Process 393
TABLE 12.2 Three General Types of Business Value Drivers
Type of Business
Value Drivers Defi nitions Examples
Operational
Shorter-term factors
Factors that impact cash
fl ow and the cash gen-
eration ability through
increased effi ciency or
growth.
Cost of raw materials, cost
of providing service, cost
per mile, sales volume,
sales revenue
Financial
Medium-term factors
Factors that minimize the
cost of capital incurred by
the company to fi nance
operations
Debt level, working capi-
tal, capital expenditures,
day’s receivables, bad debt
expense
Sustainability
Long-term factors
Survival factors; factors
that enable a business to
continue functioning con-
sistently and optimally for
a long time
Government regulations,
industry standards, federal
and state environmental
laws, privacy and security
regulations
IT STRATEGY IT strategy directs investments in social, mobile, analytics, cloud, and other digital
technology resources. It focuses on the value drivers in core process areas in order
to make targeted improvements.
IT strategic planning is a systematic process for determining what a business
should become and how it can best achieve that goal, as you read in Opening
Case 12.1. It evaluates the full potential of a business often using SWOT analysis
(strengths, weaknesses, opportunities, and threats) and then decides how to allocate
resources to develop critical capabilities. In practice, competing agendas, tight bud-
gets, poor interdepartmental communication, and politics can turn strategic plan-
ning discussions into bar room brawls—if they are not well managed.
Reactive Approach to IT Investments Will Fail
Few companies today could realize their full potential business value without
updated IT infrastructures and services. Yet many companies still struggle to
make the right IT decisions and investments in order to leverage relatively new IT
trends—cloud computing and SaaS, big data, analytics, social, and mobile. Making
IT investments on the basis of an immediate need or threat—rather than accord-
ing to IT strategy—might be necessary at times, but reactive approaches result in
incompatible, redundant, expensive to maintain, or failed systems. These IT invest-
ments tend to be patches that rarely align with the business strategy.
Two of the biggest risks and concerns of top management are (1) failing to align
IT to real business needs and, as a result, (2) failing to deliver value to the business.
Since IT has a dramatic effect on business performance and competitiveness, the
failure to manage IT effectively seriously impacts the business.
IT Strategies Support the Business Strategy
The four objectives of IT strategic plans are to:
1. Improve management’s understanding of IT opportunities and limitations
2. Assess current performance
3. Identify capacity and human resource requirements
4. Clarify the level of investment required
c12ITStrategyAndBalancedScorecard.indd Page 393 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
394 Chapter 12 IT Strategy and Balanced Scorecard
Various functions in the organization—such as manufacturing, R&D (research
and development), and IT—are most successful when their strategies are forward
looking. Forward looking means that they do SWOT analysis to create their future
rather than react to challenges or crises. Additionally, IT implementations that
require new infrastructure or the merging of disparate information systems can take
years. Long lead times and lack of expertise have prompted companies to explore
a variety of IT strategies.
IT Deployment Strategies: In-House and Sourcing
IT strategy guides investment decisions and decisions on how ISs will be developed,
acquired, and/or implemented. IT strategies fall into two broad categories:
1. In-house development, in which systems are developed or other IT work is done
in-house, possibly with the help of consulting companies or vendors. Typically, ITs
that provide competitive advantages or that contain proprietary or confi dential
data are developed and maintained by the organization’s own in-house IT function.
2. Sourcing, in which systems are developed or IT work is done by a third party or
vendor. There are many versions of sourcing, which had been called outsourcing.
Work or development can be sourced to consulting companies or vendors that
are within the same country, which is referred to as onshore sourcing. Or the
work can be sourced offshore to other countries. Sourcing that is done offshore
is also called offshoring. Other options are to lease or to purchase ITs as services.
Cloud computing and SaaS have expanded sourcing options signifi cantly. Tech
Note 12.1 discusses a sourcing challenge and solution.
TECH NOTE 12.1 Managing Sourcing Arrangements and SLA
Sourcing creates its own set of challenges. Companies that have multiple outsourcers
face the challenge of managing all of these relationships. As companies increase
outsourcing activities, a gap is created in their organizational structures, manage-
ment methods, and software tools. At that point, companies turn for help to an
outsource relationship management (ORM) company. ORMs provide automated
tools to monitor and manage the outsourcing relationships. ORMs monitor and
manage service level agreements (SLAs). The SLA must be managed because it
serves as both the blueprint and warranty for the outsourced arrangement.
This example shows the importance of managing SLAs. A U.S. transportation
company needed to make cuts immediately to its IT operating budget to reverse cost
overruns. The company had a long-standing outsourcing agreement with a top-tier ser-
vice provider, but it had not implemented effective SLAs to control costs. As a result,
it had outsourced 750 terabytes of data at an annual cost of more than $20,000 per
terabyte, an overinvestment that contributed to runaway IT outsourcing expenditures
of $225 million a year. A companywide budget shortfall forced the IT division to cut
$36 million from its 2012 budget—without harming quality of service. The chief infor-
mation offi cer (CIO) had to re-examine its data and infrastructure needs and take a
more informed, proactive role in managing the relationship with its service provider.
In the mid-2010s, the critical question is no longer whether cloud computing
will be a fundamental deployment model for enterprise systems, such as ERP and
c12ITStrategyAndBalancedScorecard.indd Page 394 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.1 IT Strategy and the Strategic Planning Process 395
SCM. Rather, the question is how companies can profit from the capabilities that
cloud computing offers.
Organizations use combinations of these IT strategies—in-house, onshore, or
domestic sourcing, offshoring, cloud computing, and SaaS.
IT and Business Strategy Disconnects
According to a survey of business leaders by PwC Advisory, 87 percent of business
leaders believe that IT is critical to their companies’ strategic success, but not all of
them work with IT to achieve that success. Less than 50 percent of business leaders
reported that the IT function was very involved in the strategic planning process.
When the IT strategy was not aligned with the business strategies, there was a
higher risk that the IT project would be abandoned before completion. About
75 percent of companies abandoned at least one IT project and 30 percent aban-
doned more than 10 percent of IT projects for this reason. There are several pos-
sible reasons why a high percentage of IT projects are abandoned—the business
strategy changed, technology changed, the project was not going to be completed
on time or budget, the project sponsors responsible did not work well together, or
the IT strategy was changed to cloud or SaaS.
The fundamental principle to be learned is that when enterprise strategies
change, the IT strategies need to change with them. Both strategies are dynamic—
to adapt to opportunities and threats.
Governance
Business and IT strategies depend on shared IT ownership and shared IT gover-
nance among all senior managers. When an IT or any type of failure causes harm
to customers, business partners, employees, or the environment, then regulatory
agencies will hold the chief executive officer (CEO) accountable—and the public
will too. A high-profile example is BP CEO Tony Hayward, who was held account-
able to Congress for “The Role of BP in the Deepwater Horizon Explosion and Oil
Spill,” the rig explosion that killed 11 workers and caused the subsea oil gusher that
released 60,000 barrels per day into the Gulf of Mexico. Hayward’s attempts to
claim ignorance of the risks and use the SODDI defense (“some other dude did it”)
does not get him or any CEOs off the hook. A company can outsource the work, but
not the responsibility for it.
Because of the interrelationship between IT and business strategies, IT and
other business managers share responsibility in developing IT strategic plans.
Therefore, a governance structure needs to be in place that crosses organiza-
tional lines and makes senior management responsible for the success of key IT
initiatives.
IT STRATEGIC
PLANNING PROCESS
CIOs undertake IT strategic planning on a yearly, quarterly, or monthly basis. A
good IT planning process helps ensure that IT aligns, and stays aligned, within an
organization’s business strategy. Because organizational goals change over time, it
is not sufficient to develop a long-term IT strategy and not reexamine the strategy
on a regular basis. For this reason, IT planning is an ongoing process. The IT plan-
ning process results in a formal IT strategy or a reassessment each year or each
quarter of the existing portfolio of IT resources.
Recall that the focus of IT strategy is on how IT creates business value.
Typically, annual planning cycles are established to identify potentially beneficial
IT services, to perform cost–benefit analyses, and to subject the list of potential
projects to resource allocation analysis. Often the entire process is conducted by an
IT steering committee.
c12ITStrategyAndBalancedScorecard.indd Page 395 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
396 Chapter 12 IT Strategy and Balanced Scorecard
IT Steering Committees
The steering committee is a team of managers and staff representing various busi-
ness units that establish IT priorities and ensure the IT department is meeting the
needs of the enterprise. The steering committee’s major tasks are:
• Set the direction. In linking the corporate strategy with the IT strategy,
planning is the key activity.
• Allocate scarce resources. The committee approves the allocation of
resources for and within the information systems organization. This includes
outsourcing policy.
• Make staffing decisions. Key IT personnel decisions involve a consultation-
and-approval process made by the committee, including outsourcing decisions.
• Communicate and provide feedback. Information regarding IT activities
should flow freely.
• Set and evaluate performance metrics. The committee should establish per-
formance measures for the IT department and see that they are met. This
includes the initiation of SLAs.
The success of steering committees largely depends on the establishment of
IT governance, formally established statements that direct the policies regarding IT
alignment with organizational goals and allocation of resources.
Figure 12.2 shows the IT strategic planning process. The planning process
begins with the creation of a strategic business plan. The long-range IT plan, some-
times referred to as the strategic IT plan, is then based on the strategic business
plan. The IT strategic plan starts with the IT vision and strategy, which defines the
future concept of what IT should do to achieve the goals, objectives, and strategic
position of the firm and how this will be achieved. The overall direction, require-
ments, and sourcing—either outsourcing or insourcing—of resources, such as
infrastructure, application services, data services, security services, IT governance,
Strategic Business Plan
Overall direction of the organization
• Goals
• Objectives
• Strategic position
IT vision and strategies
Overall directions for:
• Resource requirements
and sourcing
• Budget
• Activities
• Time frames
IT Strategic
(Long-Range) Plan
General project plans
• Resource determination
• Project portfolio
IT Medium-Term
Plan
Current year project plans
• Detailed budget
• Specific schedule of activities
IT Tactical
PlanFigure 12.2 IT strategic
planning process.
c12ITStrategyAndBalancedScorecard.indd Page 396 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.2 Aligning IT with Business Strategy 397
and management architecture; budget; activities; and time frames are set for three
to five years into the future. The planning process continues by addressing lower
level activities with a shorter time frame.
The next level down is a medium-term IT plan, which identifies general project
plans in terms of the specific requirements and sourcing of resources as well as
the project portfolio. The project portfolio lists major resource projects, including
infrastructure, application services, data services, and security services, that are
consistent with the long-range plan. Some companies may define their portfolio
in terms of applications. The applications portfolio is a list of major, approved
information system projects that are also consistent with the long-range plan.
Expectations for sourcing of resources in the project or applications portfolio
should be driven by the business strategy. Since some of these projects will take
more than a year to complete and others will not start in the current year, this plan
extends over several years.
The third level is a tactical plan, which details budgets and schedules for
current-year projects and activities. In reality, because of the rapid pace of change
in technology and the environment, short-term plans may include major items not
anticipated in the other plans.
The planning process just described is currently practiced by many organiza-
tions. Specifics of the IT planning process, of course, vary among organizations.
For example, not all organizations have a high-level IT steering committee. Project
priorities may be determined by the IT director, by his or her superior, by company
politics, or even on a first-come, first-served basis.
The deliverables from the IT planning process should include the following: an
evaluation of the strategic goals and directions of the organization and how IT is
aligned; a new or revised IT vision and assessment of the state of the IT division;
a statement of the strategies, objectives, and policies for the IT division; and the
overall direction, requirements, and sourcing of resources.
Questions
1. What are value drivers?
2. What are the three categories of value drivers?
3. Why do reactive approaches to IT investments fail?
4. What is onshore sourcing?
5. What is the goal of IT–business alignment?
6. Why is IT strategic planning revisited on a regular basis?
7. What are the functions of a steering committee?
8. Describe the IT strategic planning process.
Today, all roads lead to digital. From business strategy to execution, digital tech-
nology has become the foundation for everything enterprises do. Naturally, IT
strategy needs to keep pace with business strategy.
Alignment is a complex management activity, and its complexity increases as
the pace of global competition and technological change increases. IT–business
alignment can be improved by focusing on the following activities:
1. Commitment to IT planning by senior management. Senior management com-
mitment to IT planning is essential to success. See IT at Work 12.1.
12.2 Aligning IT with Business Strategy
c12ITStrategyAndBalancedScorecard.indd Page 397 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
398 Chapter 12 IT Strategy and Balanced Scorecard
2. CIO is a member of senior management. The key to achieving IT-business
alignment is for the CIO to attain strategic infl uence. Rather than being narrow
technologists, CIOs must be both business and technology savvy. The skill set of
CIOs is outlined in Table 12.3.
3. Understanding IT and corporate planning. A prerequisite for effective IT–
business alignment for the CIO is to understand business planning and for the
CEO and business planners to understand their company’s IT planning.
4. Shared culture and good communication. The CIO must understand and buy
into the corporate culture so that IS planning does not occur in isolation. Fre-
quent, open, and effective communication is essential to ensure a shared culture
and keep everyone aware of planning activities and business dynamics.
5. Multilevel links. Links between business and IT plans should be made at the
strategic, tactical, and operational levels.
PwC’s 5th annual Digital IQ global survey included 1,108
respondents from 12 countries across a variety of industries.
Respondents were divided evenly between IT and business
leaders. More than 75 percent of respondents work in cor-
porations with revenues of $1 billion (Curran, DeGarmo, &
Sviokla, 2013).
Strength of CIO & C-Suite Relationship
Influences Performance
Companies were categorized based on the strength of the
relationship between the CIO and other C-suite members—
the CEO, CFO (chief financial officer), CMO (chief marketing
officer), CRO (chief risk officer), and CISO (chief information
security officer) and business unit leaders as follows:
• Strong collaborators. The CIO has a strong relation-
ship across all relationship pairs with C-suite members.
Strong collaborators had scores of at least 4.5 out of 5.
Companies with collaborative C-suites link business
strategy and IT.
• Less collaborative. Companies with scores of 4.5 or less
across CIO and C-suite relationships.
Top performers are defined as those in the top quartile
(25 percent) of revenue growth and innovation and with
annual growth of at least 5 percent.
What Was Learned from the Global Survey
According to the survey, compared to less collaborative
companies, strong collaborators:
• Achieve better results. They are four times more likely
to be top performers than those with less collaborative
teams. IT initiatives are more likely to be on time, on
budget, and within project scope.
• Adapt quickly. They adapt quickly to market changes to
maintain an advantage over competitors.
• Think together. IT and business leaders share the same
understanding of the corporate strategy and the costs
needed to implement the strategic road map. They view
their CEO as a champion of IT and understand IT risks
that may impact the business.
• Act together. They have explicit processes in place
to link the IT road map to the corporate strategy. They
invest more aggressively in social, mobile, cloud, and
analytics and map IT to strategic initiatives like new prod-
uct and service development and market share growth.
• More aligned on strategy. In a majority of strong collabo-
rators (82 percent), the CEO is a champion of IT and actively
involves IT in the strategic and operational plans, compared
with 54 percent for less collaborative companies.
In addition, strong relationships support more frequent
and frank conversations about problems and collaborative
problem solving. Too many IT projects fail because founda-
tional issues are not dealt with candidly and fast enough. The
Digital IQ study clearly shows that strong executive leadership
and collaboration are crucial to building lasting value from IT.
IT at Work 1 2 . 1
PwC’s 5th Annual Digital IQ Survey
c12ITStrategyAndBalancedScorecard.indd Page 398 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.2 Aligning IT with Business Strategy 399
A Perfect IT/Business Alignment Case Study
The Commonwealth Bank of Australia (CBA) launched its Kaching mobile, social,
and NFC payments apps in October 2011. (Kaching is pronounced ka-ching—the
sound of a cash register long ago.) The mobile/social banking apps were criticized
by many who claimed that customers would not be interested in mobile payments
and banking services; that Facebook and social networks were not good platforms
for banking and users would not like the bulky case that added NFC capabilities
to the iPhone. They were wrong. By mid-2013, the Kaching app, iPhone NFC case,
and Facebook app had been downloaded more than 1 million times across the
Android and iOS platforms. The apps had handled over AU$9 billion in transac-
tions (Duckett, 2013).
Kaching is an excellent example of what happens when the CIO has the man-
date to drive business change through the use of the latest digital technology. With
the success of Kaching, CBA’s CIO Michael Harte had not just supported business
activities, he had introduced a profitable new line of business (LeMay, 2013). What
is also remarkable is that CBA was considered an old, traditional, slow-moving
company. By leading with mobile, social, NFC technology, it has become an innova-
tive financial institution.
TABLE 12.3 Skill Set of the CIO
Skills of CIOs needed to improve IT–business alignment and governance
include:
• Political savvy. Effectively understand managers, workers, and their
priorities and use that knowledge to infl uence others to support organi-
zational objectives.
• Infl uence, leadership, and power. Inspire a shared vision and infl uence
subordinates and superiors.
• Relationship management. Build and maintain working relationships with
co-workers and those external to the organization. Negotiate problem
solutions without alienating those impacted. Understand others and get
their cooperation in nonauthority relationships.
• Resourcefulness. Think strategically and make good decisions under pres-
sure. Can set up complex work systems and engage in fl exible problem
resolution.
• Strategic planning. Capable of developing long-term objectives and strat-
egies and translating vision into realistic business strategies.
• Doing what it takes. Persevering in the face of obstacles.
• Leading employees. Delegating work to employees effectively; broaden-
ing employee opportunities; and interacting fairly with employees.
Questions
1. How can IT–business alignment be improved?
2. How does strong collaboration among the CIO and other chief-level
offi cers infl uence performance?
3. What skills are important to a CIO’s success?
4. How did the CIO of CBA contribute to the bank’s competitiveness?
c12ITStrategyAndBalancedScorecard.indd Page 399 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
400 Chapter 12 IT Strategy and Balanced Scorecard
The balanced scorecard (BSC) is a strategic measurement and management
methodology—and a tool. Robert Kaplan and David Norton introduced it in
their 1992 Harvard Business Review (HBR) article, “The Balanced Scorecard—
Measures that Drive Performance.” The BSC methodology is widely used in all
industry sectors for strategic planning and for evaluating how well objectives are
being achieved. HBR editors consider the BSC as one of the most influential man-
agement ideas of the past 75 years.
The BSC method is “balanced” because it does not rely solely on traditional
financial measures. Instead, it balances financial measures with three forward-
looking nonfinancial measures, as shown in Figure 12.3.
12.3 Balanced Scorecard
Figure 12.3 Balanced
Scorecard (BSC) uses
four metrics to measure
performance—one fi nancial
metric and three nonfi nancial
metrics.
Financial
Business
Processes
Innovation,
Learning,
& Growth
Customer Strategy
PRIOR TO BALANCED
SCORECARD CONCEPT
Prior to the BSC concept, the typical business objective could be summed up simply
as to make a profit. Performance metrics were based on:
• P&L (profit and loss) reports: revenue, expenses, net profit
• Cash flow statements: enough cash to pay its current liabilities
• Balance sheets that reflected the overall status of finances at a certain date
These financial metrics are lagging indicators because they quantify past per-
formance. As such, they represent historical information and are not ideal tools for
managing day-to-day operations and planning.
What was novel about BSC in the 1990s was that it measured a company’s
performance using a multidimensional approach of leading indicators as well as
lagging indicators.
HOW IS THE BALANCED
SCORECARD APPLIED?
BSC can be used to translate strategic plans and mission statements into a set
of objectives and performance metrics that can be quantified and measured. For
example, answers to these questions are used to define value drivers.
1. Financial. To succeed fi nancially, how should we appear to our investors and
shareholders?
2. Customer. To achieve our vision, how should we provide value to our customers?
3. Business processes. To satisfy our shareholders and customers, what business
processes must we focus on and excel at?
4. Innovation, learning, and growth. To achieve our vision, how will we sustain our
ability to innovate, learn, change, and improve?
Table 12.4 lists examples of measurement criteria.
Lagging indicators confirm
what has happened. They
evaluate outcomes and
achievements.
Leading indicators predict
future events to identify
opportunities.
c12ITStrategyAndBalancedScorecard.indd Page 400 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.3 Balanced Scorecard 401
Application of BSC
BSC converts senior management’s priorities into visible, actionable objectives by
identifying ways to measure progress against agreed-upon targets.
Assume that a low-cost airline bases its profitability on the following inter-
related factors: lower costs, increased revenue, percent of flights departing and
arriving on time, competitive pricing, maximum fly time or minimal time jets are
on the ground, and the ability of the ground crew to learn to do their jobs faster.
Objectives, measures, and targets are diagrammed and detailed in Figure 12.4.
Using the results of the BSC methodology, management teams have an agreed-
upon set of objectives and measures that are used to identify and set targets and
the actions to achieve them that are appropriate for the company’s business model.
Consider JetBlue and Southwest Airlines—both compete to a large extent on
price. Yet JetBlue allows one free checked bag while Southwest allows two free
checked bags. Now consider the value drivers—time the jet sits on the ground
and on-time arrivals. The time it takes to board passengers impacts the ability to
take off, which in turn impacts on-ground time and arrival time. Since JetBlue has
assigned seats, the terminal crew can control boarding starting at the back of the
plane to minimize bottlenecks in the aisle. In contrast, Southwest has open seat-
ing, which typically occurs from the front of the jet and can clog the aisle. Now
the differing free-baggage policies make sense because the more baggage brought
on board, the longer boarding tends to take. By allowing two free checked bags,
Southwest attempts to reduce carry-on bags in order to offset the extra time needed
for the open-seating boarding process.
By measuring how well targets for on-ground times and arrival times are
achieved, both airlines can determine if their actions are optimal or need to be
TABLE 12.4 Examples of Balanced Scorecard (BSC) Measurement Criteria
Metric or
Indicator Examples of Measurement Criteria
Financial • Revenue and revenue growth rates
• Earnings and cash fl ow
• Asset utilization
Customer • Market share
• Customer acquisition, retention, loyalty
• Customer relationships, satisfaction, likes,
recommendations, loyalty
• Brand image, reputation
• Price–value relationship
Business • Cycle times, defect rate
processes • Production throughput, productivity rates
• Cost per process
• Cost per transaction
Innovation, • Employee skills, morale, turnover, capacity for change
learning and • IT capabilities
growth • Employee motivation
• R&D
• Percentage of revenue from new products/services
c12ITStrategyAndBalancedScorecard.indd Page 401 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
402 Chapter 12 IT Strategy and Balanced Scorecard
revised. Based on these examples, it is easier to understand the processes involved
in the BSC methodology, which start with the business vision and strategy. The
general steps include:
1. Identify performance metrics (as in Table 12.4) that link vision and strategy to
results—fi nancial performance, operations, innovation, employee performance.
2. Select meaningful objectives (Figure 12.4).
3. Select effective measures and targets (Figure 12.4).
4. Determine the actions needed to achieve the targets (Figure 12.4).
5. Implement necessary tracking, analytics, communication, and reporting systems,
including sensors, data visualization, mashups, and dashboards via social and
mobile channels.
6. Collect, analyze, and compare performance data with targets.
7. Revise actions to improve performance gaps and take advantage of new
opportunities.
BSC is used to clarify and update the strategy, align the IT strategy with the
business strategy, and link strategic objectives to long-term goals and annual
budgets.
Net Profit
Rapid
ground
turnaround
time
Time on-ground
On-time departure
ratio
55 minutes
85%
Synchronize ground
crew activities
Ensure flight crew
availability
Low competitive
prices
Reduce costs Increase revenue
Low competitive
prices
Low competitive
prices
Percent of flights
arriving on time
Financial
Customer
Business
processes
Learning &
growth
Train employees to
board passengers
quickly
Synchronized and
efficient ground crew
Minimize turnaround
time on the ground
Objectives Measurements Targets
Action to achieve
targets
Figure 12.4 Overview of
a low-cost airline’s BSC
objectives, measures, targets,
and actions to achieve
targets.
c12ITStrategyAndBalancedScorecard.indd Page 402 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.4 IT Sourcing and Cloud Strategy 403
Questions
1. How did the BSC approach differ from previous measurement
approaches?
2. How does the BSC approach “balance” performance measurements?
3. What are the four BSC metrics?
4. Give an example of each BSC metric.
5. How does BSC align IT strategy with business strategy?
When legacy systems could no longer provide the functionality needed to solve the
businesses’ problems, companies migrated to the cloud or SaaS to connect core
systems and apps. At most companies today, one or more types of outsourcing
arrangements are part of their IT strategy. Cloud computing, SaaS, and other types
of “as services” were discussed in prior chapters. They are discussed in this chapter
as examples of IT outsourcing strategies.
12.4 IT Sourcing and Cloud Strategy
CLOUD STRATEGY
AND SERVICES
As you have read, in its simplest form, cloud computing is a way for companies to
procure technology as a service (XaaS), including infrastructure (IaaS), applications
(AaaS), platforms (PaaS), and business processes, via the Internet. IT resources no
longer depend on capital investments and IT developers to own that resource. IT
capabilities can be sourced, scaled on, and delivered on demand without physical
location, labor, or capital restrictions. As a result, an enterprise’s cloud strategy
plays a role in its strategy and business growth.
Integrating Cloud With On-Premises Systems
While the concept of cloud is simple, an enterprise’s cloud strategy tends to be
quite complex. Cloud is being adopted across more of the enterprise, but mostly
in addition to on-premises systems—not as full replacements for them. Hybrid
solutions create integration challenges. Cloud services—also referred to as edge
services—have to integrate back to core internal systems. That is, edge services
have to connect and share data with enterprise systems such as order and inventory
management, ERP, CRM, SCM, legacy financial, and HR systems and on mobile
and social platforms.
Tactical Adoption Versus Coordinated Cloud Strategy
Deploying cloud services incrementally results in apps and services that are patched
together to create end-to-end business processes. This is a short-sighted tactical
adoption approach. While this approach may have been sufficient in the recent
past, cloud services are increasingly more sophisticated and numerous. Tactical
approaches will cause difficult integration problems—as occurred with adoption of
ERP, mobile, social, and big data systems. Cloud adoption needs to occur according
to a coordinated strategy. Given the ever-changing cloud services, it will be tough to
know how to design a sustainable cloud strategy. For example, a new class of cloud
offerings is being built around business outcomes instead of as point solutions. In
effect, this would be business outcomes as a service.
Determining cloud strategies and lease agreements that best support busi-
ness needs may require hiring cloud consultants, such as Accenture, Booz Allen,
Deloitte, Gartner, HP, IBM, or others.
Cloud strategy is short for
cloud computing IT strategy.
Edge service is a term that
refers to a cloud service.
c12ITStrategyAndBalancedScorecard.indd Page 403 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
404 Chapter 12 IT Strategy and Balanced Scorecard
Cloud Strategy Challenges
From the outset, the top challenges about migrating to the cloud revolved around
cybersecurity, privacy, data availability, and the accessibility of the service. The
newer challenges relate to cloud strategy, including integration of cloud with on-
premises resources, extensibility, and reliability of the cloud service. Extensibility
is the ability to get data into and out of the cloud service. These cloud service chal-
lenges need to be addressed before deciding on sourcing solutions.
Cloud Case Examples
Social network LinkedIn has three enterprise lines of business: talent, marketing,
and sales solutions. When LinkedIn migrated to cloud services to support sales
and CRM, it began by using noncustomized, out-of-the-box capabilities (Main &
Peto, 2013). As the company grew rapidly, the standard cloud services could no
longer support the lines of business. Business processes increasingly needed to be
integrated with ERP and proprietary systems to generate sales leads. LinkedIn
switched to a cloud-based integration platform that is able to connect its lead gen-
eration, financial, and CRM systems and its proprietary apps and data warehouse.
Integrating cloud and on-premises systems gives salespeople a single view of the
data they need to do their jobs.
Nestlé Nespresso S. A. transitioned from a traditional coffee shop to an online
distributor in the single-serving coffee machine category. Faced with growing global
demand, Nespresso needed to replace its complex ERP. By deploying a cloud inte-
gration platform, Nespresso has integrated its ERP, warehouse management systems,
and ordering tool. Nespresso now leverages its cloud and traditional IT solutions.
Since its 1998 IPO, eBay has gone from an online experiment
in consumer-to-consumer e-commerce to a Fortune 500 enter-
prise. It supports almost 100 million individual buyers and sellers
and small businesses. Exploding demand for eBay’s services
created enviable but staggering challenges. By 2004, eBay’s
annual revenues had exceeded $3 billion. At that time, its
accounts payable (AP) function was no longer able to support
the growing workload. In addition, eBay’s acquisition of several
companies with incompatible AP processes added to integra-
tion challenges. eBay’s solution was to outsource. In early 2005,
eBay migrated its AP operations to Genpact, a global leader in
business process and IT management.
The Solution Had Challenges
The migration was far from perfect at first and hard lessons
learned early helped achieve impressive results eventually.
Six lessons that eBay learned are the following:
1. Manage change by securing the commitment of senior
leaders in an overt fashion and by recognizing subtle
cultural differences that can undermine initial transition
efforts.
2. Assess organizational readiness for a transition from a
mental and technical standpoint and set realistic expec-
tations and manage them actively.
3. Anticipate risks and formulate a plan for mitigating
them, beginning with a strategy for dealing with “loss-
of-control” threats, both real and imagined.
4. Build project management infrastructure that recog-
nizes the “process of transition” needs to be managed as
carefully as processes being transitioned. Mapping how
the AP process should look posttransition and how it will
be managed end to end and by whom is important.
5. Create a governance mechanism that can discreetly
collect feedback from the transition project manager and
provide formal executive oversight and guidance. Form
an executive steering committee that includes two senior
managers from each organization and representation
from all business units impacted by the outsourcing.
IT at Work 1 2 . 2
eBay’s Outsourcing Lessons Learned
c12ITStrategyAndBalancedScorecard.indd Page 404 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.4 IT Sourcing and Cloud Strategy 405
6. Properly define how success will be measured, both
qualitatively and quantitatively. Identifying the right
benchmarks for success and vigilantly measuring efforts
against them over time are critical. eBay continued to
outsource—transitioning its global vendor/supplier main-
tenance and general ledger activities.
Sources: Compiled from Spears (2010) and Genpact (2014).
Questions
1. Why is the ability to process AP a critical success factor
for eBay?
2. Why do you think eBay selected outsourcing at its IT
strategy instead of in-house development?
3. What outsourcing challenges did eBay face? In your
opinion, what were the reasons for these challenges?
FACTORS DRIVING
SOURCING AS AN IT
STRATEGY
Enterprises choose outsourcing for several reasons:
• To generate revenue
• To increase efficiency
• To be agile enough to respond to changes in the marketplace
• To focus on core competency
• To cut operational costs
• Because offshoring has become a more accepted IT strategy
• Because cloud computing and SaaS have proven to be effective IT strategies
• To move IT investment from a capital expenditure to a recurring opera-
tional expenditure
• To differentiate from competitors—while reducing the burden on the IT
organization
IT at Work 12.2 describes eBay’s IT sourcing and cloud strategy.
RISK CONCERNS AND
HIDDEN COSTS
As companies find their business strategy is increasingly tied to IT solutions, the
concerns about outsourcing risks increase. Risks associated with outsourcing are:
• Shirking. The vendor deliberately underperforms while claiming full payment,
for example, billing for more hours than were worked and/or providing
excellent staff at first and later replacing them with less qualified ones.
• Poaching. The vendor develops a strategic application for a client and then
uses it for other clients.
• Opportunistic repricing. When a client enters into a long-term contract with
a vendor, the vendor changes financial terms at some point or overcharges
for unanticipated enhancements and contract extensions.
Other risks are possible breach of contract by the vendor or its inability to
deliver, vendor lock-in, loss of control over data, and loss of employee morale.
Depending on what is outsourced and to whom, an organization might end
up spending 10 percent above the budgeted amount to set up the relationship and
manage it over time. The budgeted amount may increase anywhere from 15 to
65 percent when outsourcing is sent offshore and the costs of travel and cultural
differences are added in.
OFFSHORING Offshoring of software development has become a common practice due to global
markets, lower costs, and increased access to skilled labor. About one-third of
Fortune 500 companies outsource software development to software companies in
India. It is not only the cost and the technical capabilities that matter. Several other
factors to consider are the business and political climates in the selected country,
the quality of the infrastructure, and risks such as IT competency, human capital,
the economy, the legal environment, and cultural differences.
c12ITStrategyAndBalancedScorecard.indd Page 405 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
406 Chapter 12 IT Strategy and Balanced Scorecard
Duke University’s Center for International Business Education and Research
studied actual offshoring results. According to their study, Fortune 500 companies
reduced costs by offshoring—63 percent of the companies achieved over 30 per-
cent annual savings and 14 percent of them achieved savings over 50 percent. The
respondents were overwhelmingly satisfied with their offshore operations. Three-
quarters (72 percent) said their offshore implementations met or exceeded their
expected cost savings. Almost one-third of the respondents (31 percent) achieved
their service level goals within the first 5 months of their contracts while 75 percent
did so within 12 months. The study concluded that “offshoring delivers faster results
than average domestic improvement efforts.” Even though these are very general
results, offshoring success stories ease the fears about the risks of offshoring.
Based on case studies, the types of work that are not readily offshored include
the following:
• Work that has not been routinized.
• Work that if offshored would result in the client company losing too much
control over critical operations.
• Situations in which offshoring would place the client company at too great
a risk to its data security, data privacy, or intellectual property and propri-
etary information.
• Business activities that rely on an uncommon combination of specific applica-
tion domain knowledge and IT knowledge in order to do the work properly.
OUTSOURCING LIFE
CYCLE
The International Association of Outsourcing Professionals (IAOP) has defined
nine critical stages in the outsourcing life cycle that managers need to understand
prior to outsourcing (IAOP, 2009):
1. Strategy. Outsourcing is a strategic decision that is typically developed at senior
levels within a business. It may be part of a larger strategy to move the company
to a leveraged business model and to focus on core competencies. Or it may be
to save net costs or due to a lack of internal resources. Outsourcing may act as a
key differentiator that will give a business a competitive advantage over its com-
petitors. Too few businesses consider taking legal counsel at this stage, but they
should. For example, diffi culties about licensing, intellectual property rights, or a
preexisting contractual or leasing arrangement require legal expertise.
2. Reassessment. This stage is not given enough consideration: Organizations
should look again at their business processes, IT capabilities, internal supply, or
other problems to see if they could be reengineered to meet the requirements so
that outsourcing is not needed.
3. Selection. This stage involves identifying and defi ning the work to be outsourced
as well as the selection of the vendors using RFI (request for information) or
RFP (request for proposal) processes. The best value outsourcer is selected.
4. Negotiation. In this phase, contracts, schedules, and agreements are negotiated
by someone experienced in these issues. Then the fi nal contract is reviewed
extensively before signing. This negotiation process must involve adequate re-
sources and senior executives from both sides—the key issues in a long-term
relationship, such as outsourcing, are too important not to justify executive
engagement from the supplier and customer.
5. Implementation. This phase involves the start-up activities of planning the tran-
sition and the implementation of the outsourced agreement as well as establish-
ing the detailed budget and administrative functions needed for its management
and formal launching of the program.
6. Oversight management. This phase encompasses all ongoing activities required
to manage the program and achieve the contracted results. Specifi cally, this
includes providing a liaison between the customers and the supplier, performance
Strategy sets the overall
direction by defining what
the business desires to be,
within a specified timeframe,
and the path to get there.
c12ITStrategyAndBalancedScorecard.indd Page 406 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
12.4 IT Sourcing and Cloud Strategy 407
monitoring, contract administration, vendor/partnership management, delivery
integration, and vendor transition. Inevitably stresses will develop in a contract,
and it is important for both sides to take an adult approach to contract interpreta-
tion. Remember that these are long-term relationships that need to fl ex with time.
7. Build completion. This phase covers all completion activities of the build phase,
including any development program and then acceptance, and the introduction
of new services.
8. Change. All complex outsourcing contracts will be subject to change and
alteration. These are run as either minor changes to the outsourcing contract or
major changes, which might involve a retendering process. Your contract will—
or should—have built into it a contract change procedure to deal with changes
that are in the broad scope of the original procurement.
9. Exit. All outsourcing relationships end because the contract has expired, by
mutual agreement, or because the outsourcing relationship has failed. The
terms of the contract become very important at this time.
IT VENDOR
RELATIONSHIPS
The starting point in building a positive and strong vendor relationship is vendor
selection. If a company makes a bad selection or enters into a vaguely worded
service contract, most likely the software, app, or implementation will fail and the
vendor will not be able to resolve the problems fast enough, if at all. Failures are
usually followed by lawsuits.
Vendor Research and Selection
To minimize interpersonal or technical conflicts with IT vendors, businesses need
to thoroughly research the vendor. It is very important to ask questions about the
services and products the vendor will provide and get as many specifics as possible.
Also take the time to verify the vendor’s claims about its products and check all
references to make sure that the vendor has a proven track record of success. When
selecting a vendor, two criteria to assess first are experience and stability:
• Experience with very similar systems of similar size, scope, and require-
ments. Experience with the ITs that are needed, integrating those ITs into
the existing infrastructure and the customer’s industry.
• Financial and qualified personnel stability. A vendor’s reputation impacts its
stability.
Of course, for innovative IT implementations, vendors will not have experience
and one major failure—and the lawsuit that follows—can create instability. If those
criteria are not met, there is no reason to further consider the vendor.
Research by McKinsey indicates that a majority of technology executives want
to have stronger relationships with their IT suppliers, but they often act in ways that
undermine that goal. In fact, many corporate customers lose out on the potential
benefit of close relationships by an overemphasis on costs instead of value. Ideally,
a customer/vendor relationship is a mutually beneficial partnership, and both sides
are best served by treating it as such.
Vendors often buy hardware or software from other vendors. In order to avoid
problems with the primary IT vendor, check secondary suppliers as well. Ask the
primary vendor how they will deliver on their promises if the secondary vendors go
out of business or otherwise end their relationship.
Do A Trial Run
Vendors may offer the option to test their products or services in a pilot study or a
small portion of the business to verify that it fits the company’s needs. If the vendor
relationship adds value on a small scale, then the system can be rolled out on a larger
scale. If the vendor cannot meet the requirements, then the company avoids a failure.
c12ITStrategyAndBalancedScorecard.indd Page 407 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
408 Chapter 12 IT Strategy and Balanced Scorecard
CONTRACTS: GET
EVERYTHING IN
WRITING
SLAs are designed to protect the service provider, not the customer, unless the
customer takes an informed and active role in the provisions and parameters.
By making both parties aware of their responsibilities and when they may be
held liable for failing to live up to those responsibilities, a strong SLA can help pre-
vent many of the disruptions and dangers that can come with sourcing or migrating
to the cloud. The provisions and parameters of the contract are the only protections
a company has when terms are not met or the arrangement is terminated. No con-
tract should be signed without a thorough legal review.
There is no template SLA and each cloud solution vendor is unique. Certainly, if
a vendor’s SLA is light on details, that alone may be an indicator that the vendor is
light on accountability. Additionally, if a sourcing or cloud vendor refuses to improve
its SLAs or negotiate vital points, then that vendor should not be considered.
Questions
1. What contributes to the complexity of a cloud strategy?
2. How does tactical adoption of cloud services differ from a coordinated
cloud strategy?
3. What are the major reasons for sourcing?
4. What types of work are not readily outsourced offshore?
5. When selecting a vendor, what two criteria need to be assessed?
6. What is the risk of an overemphasis on cost when selecting or dealing
with an IT vendor?
7. What needs to be done before signing a contract with an IT vendor?
Key Terms
applications portfolio
balanced scorecard
business strategy
edge service
extensibility
in-house development
IT–business alignment
IT strategic planning
IT strategy
lagging indicators
leading indicators
offshoring
onshore sourcing
operating plan
project portfolio
sourcing
strategic planning
strategy
tactical adoption approach
value driver
vision statement
Assuring Your Learning
1. What are three value drivers for a major retail store,
such as Macy’s or Sears? Do any of them have a
limited life span? Explain.
2. What directs investments in social, mobile, analytics,
cloud, and other digital technology resources?
3. What are the four objectives of IT strategic plans?
4. What might be some reasons why companies use
sourcing instead of in-house development?
5. In your opinion, what are the benefi ts of onshore
sourcing?
6. What are the benefi ts and disadvantages of offshoring
work/jobs to other countries, for example, to China
or India?
7. Describe the IT strategic planning process.
8. If there are confl icting priorities and disagreements
among members of the IT steering committee, how
might they be resolved?
9. Review IT at Work 12.1. Why do you think strong
collaborators achieved better results?
10. Why is the balanced scorecard methodology
“balanced”?
11. Why are fi nancial metrics lagging indicators?
12. Why has tactical adoption of IT become a risky
approach compared to a coordinated cloud
strategy?
13. Why is an SLA a legal document?
14. Who do SLAs typically protect? Explain why.
DISCUSS: Critical Thinking Questions
c12ITStrategyAndBalancedScorecard.indd Page 408 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
CASE 12.2 Business Case 409
1. Visit Accenture.com and search for “outsourcing.”
Describe the IT outsourcing services offered by Accen-
ture. Do the same for Deloitte at deloitte.com, Ernst &
Young at ey.com, KPMG at kpmg.com, or Pricewater-
houseCoopers at pwc.com. Create a table that compares
the outsourcing services of two of these consulting fi rms.
2. Visit the Government Technology website at govtech.
com. Search for “managing successful vendor relation-
ships.” Prepare a list of recommendations based on
what you learn.
3. Visit the IBM website and search for “balanced
scorecard.” Identify and describe its balanced
scorecard software product.
4. Search for a YouTube video featuring Harvard
Business School’s Robert Kaplan and the balanced
scorecard. List three lessons learned from Kaplan,
the title of the video, and its URL.
EXPLORE: Online and Interactive Exercises
1. Vinay Gupta, President and CEO of Janeeva, which
sells software to help companies manage outsourcing
relationships, gave this advice (Bloomberg Business-
week, 2013):
“I would strongly encourage business owners
to visit the vendor’s facilities. There are a lot of
fl y-by-night operators, so you want to make sure
you have touched and seen the facility before you
hand them your business—I would do at least a
30-day free pilot with the provider. You want to
see if it is a good fi t and fi nd out who you will be
interacting with on a day-to-day basis.”
Not all companies follow this advice.
a. Discuss why companies would take these
precautions when setting up an outsourcing
relationship.
b. Discuss why companies would not take these
precautions when setting up an outsourcing
relationship.
2. Research legal websites discussing SLAs. Compile
a list of recommendations, including what to do and
what to avoid.
3. In 2007, AstraZeneca entered a 10-year outsourcing
agreement with IBM. By 2011, AstraZeneca decided
to exit the arrangement, resulting in a tough court
case with IBM. Research the failed outsourcing
agreement between AstraZeneca and IBM. Explain
the reasons for the failure. How did AstraZeneca
change its subsequent outsourcing arrangements?
4. Netfl ix streams videos on TVs, personal computers,
and smartphones using cloud services from Amazon
Web Services (AWS). Its model is a direct challenge
to traditional content distributors, which are limited
by physical distribution and network broadcasting. In
contrast, Netfl ix capitalizes on low cost and virtually
unlimited cloud capacity to deliver content on demand
almost anywhere. In 2011, Netfl ix’s subscriber base
surpassed that of Comcast, the largest cable provider
in terms of subscribers, to become one of the largest
video content distributors in the nation. Research
Netfl ix to learn more about its use of the cloud to
create business value. Explain its cloud strategy. Then
research another company in the media and entertain-
ment space—for example, HBO or Apple. Compare
the cloud strategies of the competitor to Netfl ix.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
CASE 12.2
Business Case: AstraZeneca Terminates $1.4B Outsourcing
Contract with IBM
AstraZeneca is one of the world’s leading biopharmaceutical
companies. The company focuses on the discovery, develop-
ment, and commercialization of prescription medicines for six
health care areas. AstraZeneca has also been one of the most
prolifi c users of information technology in the pharma world.
In July 2007, AstraZeneca signed a $1.4 billion, seven-
year global strategic outsourcing agreement with IBM. The
extensive SLA included 90 clauses and 32 schedules govern-
ing the provision of IT infrastructure services to 60 countries.
Yet it was still imprecise about the exit obligations on IBM if
the contract was terminated.
On April 8, 2011, AstraZeneca terminated the SLA. In the
legal battle, the court sided with AstraZeneca.
Here are the details and timeline.
c12ITStrategyAndBalancedScorecard.indd Page 409 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
410 Chapter 12 IT Strategy and Balanced Scorecard
2007
AstraZeneca depends on its IT capabilities as much as it de-
pends on its R&D—both are crucial. In 2007, AstraZeneca had
signed a seven-year global outsourcing agreement with IBM.
The contract includes server hosting and storage for scien-
tifi c, network and communications, commercial, and supply
chain operations.
Richard Williams, CIO of AstraZeneca, said the outsourc-
ing deal enabled the company a consistent infrastructure
across all its global sites. The consistent infrastructure enabled
it to roll out new technologies, reporting systems, and apps
more quickly and effi ciently.
2011
By 2011, AstraZeneca decided to exit the arrangement
with IBM, resulting in a tough court case with IBM. One
reason why the AstraZeneca–IBM deal failed was the use
of outcome-based specifi cations. These specifi cations in
the contract were commonly used to encourage innovation
among vendors. In fact, in 2007, the contract was considered
a ground-breaking model, but that model failed because
AstraZeneca’s business was changing very rapidly and the
contract was not designed for that pace. Although very
popular in the 2000s, like other IT trends from that decade,
companies would do things much differently now.
Problems with Large Outsource Contracts
Very large and long-term IT outsourcing contracts are diffi cult
to change because of the way the vendor accrues profi t from
the deal. With huge outsource deals, vendors make major
investment in the fi rst two years as the service is set up and
customized. Then the vendor expects to make its profi t mar-
gin in the last two or three years, which is why large deals are
fi ve or more years.
2012
After the failure of its IT outsourcing contract with IBM,
AstraZeneca has taken on a new strategy for working with
IT vendors that stresses rapid action on technical problems
under a cooperative structure.
New Outsourcing Model
AstraZeneca created a new IT outsourcing model to replace
the services provided by IBM. Now the company uses multiple
contracts with Computacenter, HCL, AT&T, and Wipro.
Contracts cover the standard provisions of IT service deals,
namely SLAs and pricing, and also a cooperation policy. That
policy includes 13 principles that specify the terms of col-
laboration. One principle is “fi x fi rst, pay later.” That means
when an urgent IT problem occurs, vendors and AstraZeneca
cooperate to fi x it fast without asking questions about cost.
Previously, a vendor might have examined the contracts to
confi rm its responsibilities and, to protect profi t margins,
delay the fi x. In return for fast solutions, AstraZeneca agreed
to faster payment to the vendor. In the event of a contract
confl ict, both parties can appeal to an independent arbiter
who oversees the cooperation policy.
Lesson Learned
This IT and legal case illustrates the importance of consid-
ering thoroughly what will happen when an outsourcing
relationship comes to an end. This is often overlooked in the
dash to close the deal and will be an expensive oversight.
Sources: Compiled from Barton (2011), Boyle (2010), Clark (2013),
Lomas (2007), and Pagnamenta (2007).
Questions
1. What mistakes did AstraZeneca make?
2. What mistakes did IBM make?
3. Why are outsourcing contracts for fi ve or more years?
4. Why do you think two major corporations could make
such mistakes?
5. Do you think the 2007 SLA was doomed to fail? Explain
your answer.
6. What provisions in the 2001 SLAs protect AstraZeneca
and the vendors?
7. Why would parties prefer to use an arbitrator instead of
fi ling a lawsuit in court?
CASE 12.3
Data Analysis: Third-Party versus Company-Owned Offshoring
Major companies, such as Citigroup, had wholly owned
offshore service centers. Those types of company-owned
offshore centers are called captive models. Captive offshoring
models reduce the risk of offshoring. A recent study from the
Everest Research Institute estimated the costs of third-party
offshoring and captive offshoring. The estimates are below.
Create a spreadsheet that totals the average cost of each
model for each cost item. For example, average the annual
salary based on the range for third parties and also the
captives. Then calculate the total cost of ownership (TCO) of
each model. The difference is the cost of risk.
Full-time equivalents (FTEs) are used to standardize labor
costs since workers may be part time or full ime. For example,
two part-time workers equal 1 FTE. The estimates are given in
terms of FTEs so the conversion is already done.
Question
1. Based on your results, how much does the captive off-
shoring model allow for risk? The answer is the difference
between the TCOs of the two models.
c12ITStrategyAndBalancedScorecard.indd Page 410 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
References 411
Barton, P. “Exit Management: IBM v AstraZeneca.” FieldFisher.
com, December 14, 2011.
Bloomberg Businessweek. “Outsourcing Advice from the Pros.”
September 2, 2013. images.businessweek.com/ss/09/02/0213_
outsourcing/10.htm
Boyle, C. “AstraZeneca to Axe 8,000 Jobs in Global Cull.”
Times Online, January 28, 2010.
Clark, L. “AstraZeneca Opts for Co-operation After IBM Falls
Out.” ComputerWeekly.com, March 11, 2013.
Curran, C., T. DeGarmo, & J. Sviokla. “PwC’s 5th Annual
Digital IQ Survey Digital Conversations and the C-suite.”
PricewaterhouseCoopers LLP, 2013.
Duckett, C. “Mobile Banking Is Kaching for CBA as App
Handled over AU$9 Billion.” ZDNet.com, August 14, 2013.
Genpact. “Sourcing—Procurement.” 2014. genpact.com/home/
solutions/procurement-supply-chain/sourcing-procurement
Haydamack, C. D. “Strategic Planning Processes for Informa-
tion Technology.” BPTrends.com, September 2008.
Haydamack, C. & S. Johnson. “Aligning IT with Business Goals
through Strategic Planning.” Intel White Paper, December 2008.
Insights. “Balanced Scorecard.” Bain & Company Guide.
May 8, 2013.
International Association of Outsourcing Professionas (IAOP).
“The Outsourcing Life-Cycle—9 Stages.” outsourcingprofes-
sional.org, 2009.
Kaplan, R. S. & D. P. Norton, “Mastering the Management
System.” Harvard Business Review 86, no. 1, January 2008.
Krishnapura, S., S Achuthan, B. Barnard, L. Vipul, R. Nallapa,
S. Rungta, and T. Tang. “Intel’s Data Center Strategy for
Business Transformation.” Intel White Paper. January 2014.
LeMay, R. “CommBank’s Kaching App: A Perfect IT/Business
Alignment Case Study.” Delimiter.com, August 16, 2013.
Lomas, N. “AstraZeneca Signs IBM Outsourcing Deal.” ZDNet
UK, July 18, 2007.
Main, A. & J. Peto. “Cloud Orchestration.” Tech Trends 2014.
Deloitte University Press (http://dupress.com/). 2013.
Martin, R. L. “The Big Lie of Strategic Planning.” Harvard
Business Review, January–February 2014.
Pagnamenta, R. “AstraZeneca to Outsource Manufacturing.”
Times Online, September 17, 2007.
Spears, J. “Six Keys to a Successful BPO Transition.” Genpact
White Paper. 2010.
References
Third-Party
Offshoring Model
Captive
Offshoring Model
Offi ce space: annual rental cost per
square foot (assume 10,000 square
feet of offi ce space)
$11 to $13 $14 to $16
Base salary costs of workers (assume
1,000 FTEs)
$7,770 to $8,200 $9,500 to $10,300
General management staff for every
1,000 FTEs
12 to 14 16 to 18
General management salary $55,000 to $65,000 $70,000 to $90,000
Travel and housing costs per FTE $280 to $320 $900 to $1,060
c12ITStrategyAndBalancedScorecard.indd Page 411 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch12/text_s
412
Chapter Snapshot
When most companies develop or build new products,
services, markets, enterprise systems, or apps, they use
a project management approach. Project management is
a structured methodology to plan, manage, and control
the completion of a project throughout its life cycle. The
Project Management Body of Knowledge (PMBOK)
Guide outlines five project management process groups,
shown in Figure 13.1. Each process moves the project
from idea to implementation in such a way as to help
ensure its successful completion. The life cycle starts
with an idea or concept and project plan. If the project
is approved, then the project team proceeds to perform
Project Management
and SDLC13
Chapter
1. Explain the importance of the project management life
cycle, project portfolio management (PPM), and the use
of the triple constraint to minimize scope creep and
other project management fatal mistakes.
2. Identify the components of a project business case,
statement of work (SOW), work breakdown structure
(WBS), milestone schedule, Gantt chart, and project
baseline.
3. Apply project monitoring and control processes to man-
age the triple constraint and critical path and to identify
the conditions when an ongoing project should be ter-
minated. Explain the legal need to document project
changes and the business value of a project postmortem.
4. Describe the system development lifecycle (SDLC)
processes, feasibility analyses, and their impact on the
acceptance and success of IT implementations.
Chapter Snapshot
Case 13.1 Opening Case: Keeping Your Project
on Track, Knowing When It Is Doomed, and DIA
Baggage System Failure
13.1 Project Management Concepts
13.2 Project Planning, Execution, and Budget
13.3 Project Monitoring, Control, and Closing
13.4 System Development Life Cycle
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 13.2 Business Case: Steve Jobs’ Shared
Vision Project Management Style
Case 13.3 Demo Case: Mavenlink Project
Management and Planning Software
References
Learning Outcomes
c13ProjectManagementAndSDLC.indd Page 412 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
413
CASE 13.1 OPENING CASE
Keeping Your Project on Track, Knowing When It Is Doomed,
and DIA Baggage System Failure
the tasks and deliver the project. As part of closing the project, participants do a
postmortem to document lessons learned in order to improve their next projects.
Projects are risky. Project management and an appropriate system develop-
ment process help to get the IT project delivered on time, within budget, and
according to specifications. To minimize risk of failure, the project is rigorously
planned, evaluated, and monitored. Weekly status meetings, communication, and
reporting are critical to find out about potential problems as far in advance as
possible and fix them to avert a crisis. Project management is gaining in importance
for all types of projects because of technology complexity, tighter budgets, tougher
competition, and shorter time-to-delivery requirements. In short, companies cannot
afford project failures or delays.
A majority of IT projects fail on at least one measure of success, wasting billions of
dollars each year. Projects can suffer one or more of the following outcomes:
• Over budget
• Delivered late
• Rolled out with fewer features or functions than planned
• Terminated before completion
• Completed, but a failure
Except in extreme cases, the evaluation of success or failure is subjective
because time and cost to complete the project are estimates. For example, exceeding
the planned budget or schedule can be judged to be within an acceptable range—or
Initiating
concept or idea
Executing
Monitoring &
controlling
Closing &
postmortem
Planning
Figure 13.1 Overview of the
project process architecture
and project management
life cycle. All projects, IT or
otherwise, move through
fi ve phases in the project
management life cycle.
Postmortem is a method
for evaluating project
performance, identifying
lessons learned, and making
recommendations for future
projects.
A project is a well-planned
sequential series of tasks
to achieve a result. Projects
have a defined beginning
and end, a scope,
resources, and a budget.
Projects are approved
before they are funded and
allocated resources.
c13ProjectManagementAndSDLC.indd Page 413 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
414 Chapter 13 Project Management and SDLC
not. Everyone should realize that complex projects experience some successes and
some failures.
Reducing failure rates depends on what is arguably the most important IT com-
petency area: project management. Too often the final stage—the postmortem—is
skipped to save time and effort. However, it is during the postmortem that people
learn what contributed to success or what did not. Not learning from past projects
and repeating avoidable mistakes have consistently been major hurdles to improv-
ing IT project management.
KEEPING PROJECTS
ON TRACK
Over a period of two months, a Fortune 500 company learned that six of its major
projects were in trouble. In each case, it seemed as though the project failed over-
night without warning. The CIO felt blindsided and executive management wanted
to know who and what was to blame. The company’s project management office
(PMO) was asked to explain.
During the investigation, the PMO learned that the project staff felt strong
but subtle pressure to keep problems to themselves. The six failing projects had
executive sponsors who were politically powerful and known to attack people who
delivered bad news. So, rather than report their project was in trouble, staff worked
harder, hoping to recover from missed deadlines, but deadlines were still missed.
Here are three lessons learned to keep projects on track.
Set Realistic and Detailed Project Plans With Adequate
Time and Resources
Projects are subject to unanticipated and uncontrollable events, so they need to
have slack time built into the schedule and budget. However, project teams can be
pressured to cut project costs. In response, they might reduce the time and budget
allocated to training, testing, and change management. These cuts result in poor
quality and low user acceptance.
Encourage Timely Feedback and Be Willing to Listen
All projects encounter difficulties. Make sure employees know they will not be
punished for raising concerns, even if other project members deny problems exist.
Fear blocks the flow of useful information.
Manage Risk with Regular Project Status Reviews
For the most part, no one likes formal project reviews, but they are necessary to
identify and address current and potential problems.
RED FLAGS OF DOOM Here is a list of red flags that indicate IT project problems. These red flags relate to
bad planning—and do not depend on feedback from team members.
Project Has Launched Without Senior Buy-In
Failure is guaranteed without the support and buy-in of senior management. This
situation can happen if a strong personality in the company has a terrific idea and
begins to plan meetings and allocate resources without waiting for senior manage-
ment buy-in. No one else on the team knows the project has not been approved or
budgeted. Many of these projects proceed until the point where real money must
be spent; then they collapse completely.
c13ProjectManagementAndSDLC.indd Page 414 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
CASE 13.1 Opening Case 415
No Detailed Project Plan Exists
Any project with an estimated duration longer than two or three weeks needs a
detailed rational project plan.
Meetings Are Scheduled Ignoring Team Members’ Availability
Meetings that conflict with important standing meetings means that vital team
members will be absent, undercutting their effectiveness. People are generally more
productive and more likely to show up earlier in the day. It is better to schedule
meetings before lunch, if possible.
Users Have Had Little or No Early Involvement
Large and complex projects benefit from the advice and insight of users who are famil-
iar with how processes are done and why they are done that way. The more involve-
ment you have from users, the greater your chance of success. If your project covers
multiple departments, make sure to have a user representative from each department.
No Detailed Testing Plan Exists
Testing is essential to project success. Unit testing tests one facet of the system; inte-
grated testing tests all components and the user interface.
No Training Budget
When faced with a budget overrun, the training budget is often sacrificed. Relying on
users and help desk staff to figure out the new system for themselves means the proj-
ect is in for failure. Be ready to delay the project if appropriate training is not given.
BAGGAGE HANDLING
SYSTEM PROJECT
AT DENVER
INTERNATIONAL
AIRPORT
A classic case used to illustrate a project disaster is the baggage-handling system
project (Figure 13.2) for the new Denver International Airport (DIA). The project
was to create the most advanced automated handling of baggage, integrating all
three concourses into a single system. The terms “most advanced, automated, and
integrated” clearly indicate that the system was going to be extremely complex,
risky, and subject to delays. An unrealistic schedule was planned and approved
even though any delay would also force the delay of the opening of the DIA. In fact,
the newly completed DIA remained idle for 16 months while engineers dealt with
the complexities of the baggage system. The delay added $560 million to the cost of
DIA. Cost to maintain the empty airport and interest charges on construction loans
cost the city of Denver $1.1 million per day throughout the delay.
Project Scaled Down; Scrapped a Decade Later
The project was scaled down from the original plan. Only baggage handling on out-
bound flights for one concourse was automated. Baggage to/from other concourses
Figure 13.2 The city of
Denver wanted its Denver
International Airport to have
a competitive advantage with
the world’s most high-tech
baggage-handling system.
The system was a failure. ©
V
is
io
ns
o
f A
m
er
ic
a/
Sh
ut
te
rs
to
ck
c13ProjectManagementAndSDLC.indd Page 415 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
416 Chapter 13 Project Management and SDLC
were handled using a manual tug-and-trolley system that was quickly built when
key players finally acknowledged that the automated system would never meet its
goals. Ten years later, in August 2005, the automated system was scrapped because
it still did not work correctly and its maintenance costs were $1 million per month.
Project Management Mistakes
DIA’s baggage-handling system was a critical component in the city of Denver’s
plan to construct a new state-of-the-art airport that would position Denver as an air
transportation hub. By automating baggage handling, aircraft turnaround time was
to be cut to as little as 30 minutes. Faster turnaround meant airlines could minimize
on-ground time, which would be DIA’s competitive advantage.
Below is the timeline of the major events and project management mistakes:
• November 1989: DIA construction work starts.
• Ignored experts. In 1990, the City of Denver hired Breier Neidle Patrone
Associates to do a feasibility analysis of building an integrated baggage
system. Reports advised that complexity made the project unfeasible.
Experts from Munich airport advised that the much simpler Munich system
had taken two full years to build and that it had run 24/7 for six months prior
to opening to allow bugs to be ironed out.
• Summer 1991: DIA project management team asked for bids for the auto-
mated baggage-handling system.
• Underestimated complexity. Fall 1991: Of the 16 companies included in the
bidding process, only 3 responded. None could complete the project in time
for the October 1993 opening. All three bids were rejected and the urgent
search for a company that would meet the deadline continued.
• Poor planning and impossible expectations. In April 1992, DIA went to
contract with BAE Systems to complete the project in time for the October
1993 opening—ignoring expert evidence that the timeline was impossible to
achieve.
• Lack of due diligence. Contract terms between DIA and BAE and project
specifications were hammered out in only three meetings. The rush to con-
tract ignored the feasibility analysis. The pressure to move quickly drove
them to skip critical due-diligence steps.
• Excluded key stakeholders. BAE and the airport project management team
excluded key stakeholders—the airlines that had contracted with DIA—
during the negotiations. Excluding stakeholders from discussions in which
key project decisions are made is always a losing strategy.
• Scope creep. 1992–1993: Numerous changes in the scope of the project are
made. For instance, Continental Airlines requested ski equipment handling
facilities be added to its concourse.
• Ignored interface design. The baggage-handling system had to interface
with the airport. That is, because the design of the building was started
before the baggage system design was known, the designers of the physical
building only made general allowances for where they thought the baggage
system would go. The allowance of spaces in which the baggage system
would operate represented the interface between the design of DIA and
the baggage system. To make effective decisions about how to design DIA,
the DIA designers should have worked with experts in designing the bag-
gage system. DIA had sharp corners that required turns that baggage carts
c13ProjectManagementAndSDLC.indd Page 416 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.1 Project Management Concepts 417
cannot navigate. To keep carts from falling off the rails, the speed of the
system was cut from 60 cars per minute to 30 cars. This change eliminated
DIA’s competitive advantage of fast turnaround time for jets.
These and many other mistakes too numerous to mention doomed the DIA
baggage-handling project. This case represents practically every possible project
management mistake. From the outset, the decision to proceed with a single inte-
grated system at DIA knowing that the deadline could not be met and the irrational
decisions that followed made by people who lacked the necessary project manage-
ment and engineering expertise contributed to project failure.
Sources: Calleam Consulting (2008), Grimes (2013), Nelson (2005), and Perkins (2014).
Questions
1. In what ways can a project fail?
2. Why is the evaluation of a project’s success or failure somewhat
subjective?
3. What are the benefi ts of a project postmortem? Why would a project
not have a postmortem?
4. Assume you are a member of a project team working on a project with
a six-month timeline. The materials your team needs to complete their
fi rst set of tasks will arrive three days later than their promised delivery
date. The delay has a 10 percent chance of delaying completion of
the project. You know that no one will tell the project manager of the
delayed delivery because it is the fi rst month of the project so it does
not seem important enough to report. Would you inform the project
manager of the delay? Explain your decision. Now assume you did not
report the delay and such delays happened in each month afterward.
What would you do and when? In your opinion, should the entire team
present these problems? Explain your decisions.
5. What are three best practices to keep projects on track?
6. What are red fl ags indicating the project is likely to be a failure?
7. Referring to your answers in Questions 5 and 6, which of those best
practices and red fl ags were ignored in the DIA automated luggage-
handling project?
8. Referring to your answer in Question 7, why do you think each best
practice and red fl ag were ignored?
9. In your opinion, who are the ones responsible for the failure?
Enterprises face the challenge of deciding which investments to make and how
to allocate scarce resources to competing projects. Typically a senior manager
composes a business case that identifies an opportunity, problem, or need and the
desired business outcomes of the project. Since not all projects are viable and not
all viable projects can be funded, the business cases are reviewed. In the review
process, projects compete for approval and funding.
13.1 Project Management Concepts
PROJECT PORTFOLIO
MANAGEMENT
Project analysis methods are used to prioritize proposed projects and allocate the
budget for maximum return. Budgeting decisions apply to all business investments,
such as construction to increase manufacturing capacity, entering new markets,
modernizing retail stores, R&D, and acquiring IT, apps, and enterprise systems.
Business case is a
presentation or document
that outlines the justification
for the start-up and funding
of a project.
c13ProjectManagementAndSDLC.indd Page 417 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
418 Chapter 13 Project Management and SDLC
Investments in IT for marketing or manufacturing innovations compete head-on
with investments needed to comply with new laws and regulations in finance,
accounting, HR, and cybersecurity.
During project analysis, IT projects should be examined holistically—that is,
in combination to identify investment synergies. This approach is known as project
portfolio management (PPM). PPM is a set of business practices to manage projects
as a strategic portfolio. PPM ensures the alignment of programs and projects with
organizational objectives. Executive management needs to review portfolios and
programs, determine why projects are or are not necessary, see where money is
spent, prioritize projects, stage the start of new projects, spread resources appropri-
ately, and then keep tabs on progress.
PPM establishes a path from the concept through successful project comple-
tion. Without the necessary data, management is incapable of making informed
decisions to approve the “right” new projects and to shut down projects with no
hope for success:
• Map proposed projects to organizational strategies
• Assess the value that a proposed project brings to the company
• Assess the complexity of proposed projects
• Prioritize project proposals for project selection
COMPETING IT
INVESTMENT PROJECTS
MAY HAVE SYNERGY
The financial services sector has been compelled by strict international anti-money-
laundering (AML) guidelines that require firms to know your customer (KYC).
Master data management (MDM, Chapter 3) is needed to create a single view of
the customer and AML/KYC analytics are needed for banks to manage rising com-
pliance cost and the risk of noncompliance. To effectively motivate firms to invest
in necessary defenses, regulators impose harsh sanctions when they identify failings
in a firm’s AML/KYC compliance systems. Several high-profile sanctions are a
$1.9 billion fine for HSBC in 2012, Wachovia’s $160 million settlement in 2010,
and a $327 million settlement from Standard Chartered in 2012 (Gupta & Jain,
2014). It is not a surprise that AML and KYC compliance budgets have increased
significantly over the past few years and get priority rankings. However, compliance
projects may align well with other data-intense projects.
For example, AML laws require banks to demonstrate knowledge of where their
customers live, what forms of identification they used to validate their identities,
reconciliation of their demographics across products, validation that they are not on
any government watch list, and understanding of their normal transaction behaviors
in order to detect suspicious activity. Since much of these data are also used for mar-
keting and credit risk analysis, maintaining the data in a common repository makes
sense from business and IT perspectives of cost, consistency, and accuracy.
BASIC CHARACTER-
ISTICS OF PROJECTS
A project is a series of tasks to produce one or more deliverables. Deliverables are
items that you hand off to the client or management for their review and approval
and that must be produced to complete a project or part of a project. Projects have
a defined start date and finish date that determine the project duration, scope,
resources, and budget. Projects differ from operations or business as usual based on
characteristics listed in Table 13.1.
The Triple Constraint
The triple constraint (Figure 13.3) refers to the three attributes that must be man-
aged effectively for successful completion and closure of any project:
1. Scope. The project scope is the defi nition of what the project is supposed to
accomplish—its outcomes or deliverables. Scope is measured in terms of the
project size, goals, and requirements.
c13ProjectManagementAndSDLC.indd Page 418 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.1 Project Management Concepts 419
2. Time. A project is made up of tasks. Each task has a start date and an end date.
The duration of a project extends from the start date of the fi rst task to the fi nish
date of the last task. Time needed to produce the deliverables is naturally related
to the scope and availability of resources allocated to the project.
3. Cost. This is the estimation of the amount of money that will be required to com-
plete the project. Cost itself encompasses various things, such as resources, labor
rates for contractors, risk estimates, and bills of materials, et cetera. All aspects
of the project that have a monetary component are made part of the overall cost
structure. Projects are approved subject to their costs.
These constraints are interrelated so they must be managed together for the
project to be completed on time, within budget, and to specification. The major
take-away from the triple constraint represented as a triangle is that you cannot
change one side without changing the other sides. Ignoring the potential repercus-
sions of adjustments to the scope, time, or cost of a project will lead to issues and
may cause the project to fail.
Scope Creep
During the project, it is almost guaranteed that requests will be made that change
the scope. Scope creep refers to the growth of the project, which might seem
inconsequential—at least to the person who is requesting that change. Scope creep
is the piling up of small changes that by themselves are manageable but in aggre-
gate are significant. It is absolutely imperative that any change to the scope of the
project explicitly include compensating changes in the budget, the deadline, and/
or resources. Consider this scenario. The project scope is to build a new online
accounting application capable of processing at least one thousand expense reports
(in multiple currencies) per day, that has a budget of $200,000, and is expected to
last three months. After the project is started, the scope expands to include pro-
cessing of thousands of sales commissions per day. The project manager needs to
renegotiate the project’s duration and budget for the added functionality, testing,
and user training, making sure that any requested change, no matter how small, is
documented and accompanied by approval.
A standard approach for managing projects provides the following benefits:
• It establishes ground rules and expectations for the project team.
• It provides project managers, functional managers, and the operational staff
with a common language that eases communication and helps ensure that
everyone is on the same page.
• Managers can quickly determine which ones are proceeding smoothly and
which are not when all projects follow the same processes and approaches
and use the same metrics for measuring project performance.
TABLE 13.1 Distinguishing Characteristics of Projects
A project has these characteristics.
• Clearly defi ned scope, deliverables, and results
• An estimated time frame or schedule that is subject to a high degree of
uncertainty
• An estimated budget that is subject to a high degree of uncertainty
• The requirement of extensive interaction among participants
• Tasks that may compete or confl ict with other business activities, which
makes planning and scheduling diffi cult
• Risky but with a high profi t potential or benefi ts
Figure 13.3 Triple constraint.
Scope
TimeCost
c13ProjectManagementAndSDLC.indd Page 419 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
420 Chapter 13 Project Management and SDLC
Not using a best practices project management approach is the biggest IT
project mistake a business can make. Tech Note 13.1 provides good advice on
this topic. Project management helps keep projects on schedule and on budget. A
good project management plan identifies anticipated costs early on to develop a
realistic budget. Using resource conflict solutions, project managers can minimize
the effect of funding a new project on operating capital by optimizing the alloca-
tion of workers. Coordinating tasks and clearly identifying goals or deliverables
within phases reduce inefficiencies in time management that can result in being
over budget.
TECH NOTE 13.1 Seven Deadly Sins of Project Management and IT Project
Management—Two Views
Project Management Mistakes
Michelle Symonds (Symonds, 2014) suggested a set of seven deadly sins of project
management, that is, the common mistakes that companies commit that contribute
to project failure. As an IT project manager, these mistakes refer to project manage-
ment in general rather than to IT project management, and will doom your project
to failure:
1. No project plan. You need a list of deliverables, the tasks and resources
needed to produce each deliverable, time scales, and an estimated budget.
2. No collaboration. If you are not collaborating with your team, you are miss-
ing opportunities to solve problems and build support.
3. No budget tracking. You need to track actual expenses and compare them to
estimated costs throughout the project.
4. No risk management process. You need to monitor and keep risks under
control. Maintain a risk log to record all the potential risks as well as what
you are doing about them.
5. No stakeholder management. You need to identify each group of stakehold-
ers relating to your project and put a plan in place for communicating and
managing each group.
6. No fi le organization system. IT project managers have to handle a lot of
information. From project documents to copies of e-mails, from contracts
to invoices, a well-defi ned and workable fi le organization system is critical if
you want to be able to fi nd these things again.
7. No change management process. IT projects change. When the scope, bud-
get, or requirements of the project change, you need to have a framework
to ensure you can cope with these changes. Even minor changes can affect
multiple areas of the project.
IT Project Management Mistakes
The Center for Project Management helps IT organizations implement effective proj-
ect management. Over 20 years ago, the fi rm came up with seven most common IT
project management mistakes that cause the project to fail and that are still being made:
1. Failing to stick to a project process architecture (see Figure 13.1)
2. Treating half-baked ideas as projects
3. Missing or ineffective leadership
c13ProjectManagementAndSDLC.indd Page 420 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.2 Project Planning, Execution, and Budget 421
Questions
1. What is a deliverable?
2. What is the purpose of PPM?
3. What distinguishes a project from operations?
4. What are the triple constraints?
5. How can scope creep contribute to project failure?
The progression of key documents and decisions through the project management
life cycle is outlined in Figure 13.4. Projects start with an idea that is explained in a
business case. If the business case is accepted, a statement of work (SOW) is pre-
pared. The SOW is written as a definitive statement, which means that it defines the
project plan but does not offer any options or alternatives in the scope. The project
plan in the SOW is reviewed; a go or no-go decision is made; if a go decision is
made, the project is initiated.
13.2 Project Planning, Execution, and Budget
Figure 13.4 Project
management key stages and
activities.
Business case
& SOW
Project initiation &
risk management
planning
Project execution,
tracking & control
Project closure
& lessons
learned
Project plan review
using PPM; then
go/no-go decision
PROJECT BUSINESS
CASE
The project manager, senior executive, or sponsor prepares a convincing business
case for consideration. Here is an example of the components of a business case.
4. Employing underskilled project managers
5. Inadequately tracking the project’s tasks, milestones, and resource usage
6. Failing to fi x problems as soon as they are detected
7. Failing to engage in PPM
c13ProjectManagementAndSDLC.indd Page 421 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
422 Chapter 13 Project Management and SDLC
Business Case Template
Project Overview Statement
Executive Summary
Project Name:
Department:
Date:
Author(s):
Project Manager(s):
Executive Sponsor(s):
Describe the pertinent facts of the project in a clear and concise way.
Project Overview
Describe what is involved in executing the project.
Business Issue/Opportunity
Clearly identify the opportunity, need, or problem facing the company and
why the project is necessary. Discuss the drivers that have triggered the project
proposal and link them to the business need.
Project Business Goal
Describe expected benefi ts and how the project fi ts within the company’s
business strategy and contributes toward its goals and objectives.
Primary Project Objectives
List and describe the objectives of the project.
1. Objective 1
2. Objective 2 . . .
3. Objective n . . .
Project Benefi ts and Cost–Benefi t Analysis
Describe the key benefi ts from implementing this project.
1. Benefi t 1
2. Benefi t 2 . . .
3. Benefi t n . . .
Based on the costs established for each option, describe how those costs are
weighed against the benefi ts. Conduct the cost–benefi t analysis for each option
taking into account costs, benefi ts, and risks.
PRIMARY PROJECT DELIVERABLES
Milestone 1
1. Deliverable: Description of the deliverable
2. Deliverable: Description of the deliverable
3. . . .
PROJECT BUSINESS CASE
c13ProjectManagementAndSDLC.indd Page 422 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.2 Project Planning, Execution, and Budget 423
Milestone 2
1. Deliverable: Description of the deliverable
2. Deliverable: Description of the deliverable
3. . . .
Milestone n
1. Deliverable: Description of the deliverable
2. Deliverable: Description of the deliverable
3. . . .
Project Interdependencies and Inputs
Explain other projects in process or planned that have a relationship to this
proposed project. List inputs that other projects may have to this project
development.
• [input]
• [input]
• [input]
Project Assumptions and Constraints
List and describe all underlying technical, environmental, and resource
availability assumptions upon which the project and benefi ts are based. List
and describe constraints that can come from external or internal factors.
Project Risks
Describe known risks that apply to this project.
PROJECT KEY PERFORMANCE INDICATORS
Project Critical Success Factors or KPIs
List and describe KPIs or critical success factors that apply to this project.
PROJECT DURATION ESTIMATES AND DELIVERABLES
Project Milestone Date Estimate Confi dence Level
Project Start Date [High/Medium/Low]
Milestone 1 [High/Medium/Low]
Milestone 2 [High/Medium/Low]
Milestone n [High/Medium/Low]
Project Completion Date [High/Medium/Low]
APPROVALS
Prepared by ______________________________________
Project Manager
c13ProjectManagementAndSDLC.indd Page 423 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
424 Chapter 13 Project Management and SDLC
Approved by ______________________________________
Project Sponsor
______________________________________
Executive Sponsor
______________________________________
Client Sponsor
STATEMENT OF WORK An outline of a SOW is shown in Table 13.2. The SOW is a legal contract used
to document the agreement between parties after the business terms have been
TABLE 13.2 Template for a Statement of Work
Date [Insert date]
Client [Insert client’s name]
Job Name [Insert project name]
Requested by [Insert client sponsor’s name]
From [Insert project manager’s name]
Summary and A high-level description of the project and
Objectives objectives
Project Scope Description of the project scope, deliverables, and
the process for how it will be performed
Schedule and Work List of tasks in sequential order, resources allocated
Breakdown Structure to each task, and schedule
(WBS)
Cost or Pricing Description of the cost (pricing) for all types of
resources—labor costs, materials, equipment,
overhead expenses; discussion of payment terms,
including a payment schedule and if payments are
based on a milestone/deliverable or a schedule, if
appropriate
Key Assumptions A crucial part of an SOW—any assumptions made
when scoping and estimating the project need to be
documented
Acceptance
The client named below verifi es that the terms of this statement of work are
acceptable. The parties hereto are each acting with proper authority of their
respective companies.
________________________________ ________________________________
Company name Company name
________________________________ ________________________________
Full name Full name
________________________________ ________________________________
Title Title
________________________________ ________________________________
Signature Signature
________________________________ ________________________________
Date Date
c13ProjectManagementAndSDLC.indd Page 424 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.2 Project Planning, Execution, and Budget 425
accepted and a go decision is made. The go/no-go decision is a formal decision made
by the project manager, sponsor, and appropriate executives and stakeholders.
WORK BREAKDOWN
STRUCTURE
After the project objectives and scope have been defined, the next step is to iden-
tify all work or activities that need to be performed, the schedule of work, and
who will perform the work. This is done by creating a work breakdown structure
(WBS) as shown in Figure 13.5. Figure 13.6 shows a screen shot of a WBS (left
side) developed using Microsoft Project. Project resources are managed according
to the WBS.
Milestones
The WBS breaks a project down into the tasks or activities that must be performed,
and in what order, to produce the deliverables at each milestone. Project milestones
are very important scheduling and status devices because they enable the project
manager to measure progress as the project proceeds through its planned life cycle.
Lack of milestones has been a contributing factor in many project failures. Each
milestone typically represents a deliverable (100 percent complete), but it may also
signify the percent complete, such as 50 percent complete.
Milestone Example
Assume you are the project manager of a project for a client who wants to post a
creative project on Kickstarter.com to raise funds using crowdfunding. You visit
Kickstarter.com and do requirements analysis. You determine that you need to
produce five deliverables: (1) a video, (2) a set of photos and illustrations, (3) a
script that explains why the creative project deserves funding, (4) a set of pledge
categories and rewards to backers, and (5) the final site with all deliverables
uploaded to Kickstarter.com and tested. Each deliverable represents a milestone
1.2 Implementation
1.2.1 Develop the
Architecture
1.2.2 Develop
Site
1.2.2.1 Develop
Product Database
1.2.2.2 Develop
Web Site
1.2.2.3 Test the
Site
1.3 Monitoring and
Control
1.3.1 Perform Risk
Management
1.3.2 Perform
Quality Assurance
1.3.3 Perform Issue
Management
1.4 Deployment
1.4.1 Perform
Deployment
1.1.1 Develop
Requirements
1.1.2 Research
Hosting Options
1.1.3 Design Site
User Interface
1.1 Planning
1.0
Develop Mobile Commerce Site
Figure 13.5 One segment
of the WBS for a mobile
commerce site project.
Milestones are used to
manage the project work
effort, monitor results, and
report meaningful status to
project stakeholders.
Crowdfunding is raising
funds for a project from the
public, or crowd, via the
Web.
c13ProjectManagementAndSDLC.indd Page 425 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
426 Chapter 13 Project Management and SDLC
in your project plan. You then rely on your milestone schedule to verify that
the project is on track or to warn of the need for corrective action. Milestones
should be natural, important control points in the project and easy for everyone
to recognize.
Cost Estimations
While costs are not part of the WBS, the projects’ estimated cost can be calculated
from the WBS. Each task or activity has a start date and duration, which determines
its finish date. For example, if a task starts on Monday, November 2, and takes eight
work days (excluding weekend days) to complete, the finish date is Wednesday,
November 11. Assume the resources—people, equipment, and materials—needed
to complete the task and their costs are known. Project management software com-
putes the cost of the project based on labor time (duration) of each task in the WBS
and the cost of labor or other resource.
Responsibility Matrix
A responsibility matrix shows who has primary responsibility and who has support
responsibility for the activities listed in the WBS. Table 13.3 is an example of a
responsibility matrix.
Gantt Chart
A Gantt chart is a bar chart that shows the timeline of the project schedule, as
shown on the right side of Figure 13.6. On a Gantt chart, the start and finish dates
of all tasks and milestones appear as bars whose length represent its duration. Gantt
charts are multipurpose visualization tools that are used for planning, scheduling,
and at-a-glance status reports.
Figure 13.6 Microsoft Project screen shot of WBS (left side) and Gantt chart
(right side).
Responsibility matrix lets
everyone know who is
responsible for completion
of tasks.
Gantt chart is a horizontal
bar chart that graphically
displays the project schedule.
c13ProjectManagementAndSDLC.indd Page 426 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.2 Project Planning, Execution, and Budget 427
Project Baseline
When the project plan is finalized and accepted, the accepted plan becomes the
baseline, or master plan. The baseline is used for monitoring and controlling. Any
change to the baseline is a deviation, or variance, to the plan—and it needs to be
documented. Using project management software, you can save the WBS as the
baseline. From then on, deviations will automatically be documented as variances
from the baseline, as shown in Figure 13.7.
TABLE 13.3 Sample Format for a Responsibility Matrix Showing Who
Has Primary and Support Responsibility for WBS Tasks
WBS ID Activity Anna Bart Beth Chas Don
1.1 Storyboard video S P
1.2 Recruit volunteers to act
in video S P
1.3 Record video segments P S
2.1 Select fi ve photographs
and images P S
2.2 Crop and edit photos S P
P primary responsibility, S support responsibility
Figure 13.7 Work and cost variances from the agreed-upon project baseline are
documented by project management software.
Work
Scheduled: 680 hrs
Baseline: 528 hrs
Variance: 152 hrs
Scheduled:
Baseline:
Variance:
Tasks not yet started:
Tasks in progress:
Tasks completed:
Total tasks:
$14,104.00
$10,624.00
$3,480.00
7
9
0
16
Work resources:
Overallocated work resources:
Material resources:
Total resources:
4
4
0
8
Remaining:
Actual:
$11,751.60
$2,352.40
Remaining: 581.2 hrs
Actual: 98.8 hrs
Percent complete: 15%
Costs
Task Status Resource status
Baseline is a specification
of the project plan that has
been formally reviewed and
agreed upon. It should be
changed only through a
formal change control
process.
c13ProjectManagementAndSDLC.indd Page 427 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
428 Chapter 13 Project Management and SDLC
Questions
1. What identifi es an opportunity, problem, or need and the desired
business outcomes of the project?
2. What is the approach that examines projects holistically and manages
them as a strategic portfolio?
3. What are the items that you hand off to the client or management for
their review and approval?
4. What are the three attributes that must be managed effectively for
successful completion and closure of any project?
5. What is the term for the piling up of small changes that by themselves
are manageable but in aggregate are signifi cant?
6. If the business case is accepted, what document is prepared?
7. What events are used to manage the project work effort, monitor
results, and report a meaningful status to project stakeholders?
8. What is the longest path of tasks through a project?
9. What shows who has primary responsibility and who has support
responsibility for the tasks listed in the WBS?
10. What is the type of bar chart that shows the timeline of the project
schedule?
11. When the project plan is fi nalized and agreed to, what is any change to
the baseline?
Monitoring and control processes are intended to occur continuously while the
project work is being executed. These processes, described in Figure 13.8, depend
on the baseline, milestones, responsibility matrix, and other elements from the plan-
ning stage. They keep the project team informed of project status and help them
cope with challenges they encounter. Except for short, simple projects, there are
going to be risks and changes that need to be kept under control and documented.
Monitoring depends on prompt and candid feedback from the project team, as
you read in the opening case. In-person visits, reports, and records are also monitor-
ing methods. Project control depends on systems and decision rules for managing
variances between the project’s scope, cost, schedule, and quality and the realities
of project implementation.
13.3 Project Monitoring, Control, and Closing
INTEGRATED CHANGE
CONTROL
Changes tend to have a trickle-down effect because of task dependencies and shared
resources. For example, consider the following three activities from Table 13.3:
1.1 Storyboard a video.
1.2 Recruit volunteers to act in the video.
1.3 Record video segments.
Activity 1.3 is dependent on the completion of activities 1.1 and 1.2. Video record-
ing cannot start until after the video has been storyboarded and actors are available.
Integrated change control processes help to manage the disruption result-
ing from requested changes and corrective actions across the project life cycle.
Integrated change control processes are always documented and saved in the event
of project failure or lawsuits related to the failure. These documents are needed to
defend decisions—what did and did not happen, such as:
c13ProjectManagementAndSDLC.indd Page 428 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.3 Project Monitoring, Control, and Closing 429
• Approved change requests
• Rejected change requests
• Updates to the project plan
• Updates to the scope
• Approved corrective and preventive actions
• Approved defect repair
• Validated defect repair
Figure 13.8 Project controls.
Managing and negotiating
changes in response
to scope creep
Scope Control
Recommending corrective
actions
Monitoring project
deliverables to verify that
quality standards and
specifications are not
being compromised
Quality Control
Managing factors that can
cause changes to the cost
baseline
Cost Control
Managing factors that can
cause time delays or
schedule changes
Schedule Control
CRITICAL PATH All projects have a critical path that extends the length of the project. Project manage-
ment software shows the critical path on the Gantt chart, as in Figure 13.9. Each task
or activity on the critical path is called a critical task or activity. Critical tasks must
finish on schedule because delays will delay the project unless something is done to
compensate. While it may seem that adding new people to a project is an obvious solu-
tion, in fact, it may initially slow it down. If any noncritical tasks get delayed enough,
they could go critical, so both critical and noncritical paths need to be monitored.
Critical path is the longest
path of tasks through a
project, as shown on a Gantt
chart. A delay of any task on
the critical path will delay the
project.
Figure 13.9 The critical path is shown as red bars. The critical path consists of
the tasks from project start to fi nish that must be completed on time in order for
the project to fi nish on time.
WHEN TO KILL A
PROJECT THAT IS
OUT OF CONTROL
Project control is also used to identify when to declare the ongoing project a failure
and kill it. Here is a common scenario:
The project is behind schedule. The scope changes almost daily. There were too
few milestones identified during the planning stage to be able to monitor prog-
ress. Resources were overallocated. Because of the lack of regularly scheduled
meetings, the project manager has no information on what the team members
c13ProjectManagementAndSDLC.indd Page 429 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
430 Chapter 13 Project Management and SDLC
are working on at any given time. The team members are not communicating
because they know that the project is on its deathbed and are afraid to say so.
Many people in the company also know that the project is in trouble, except
for senior management.
Sometimes, the only right way to fix a project is to cancel it. If a project suffers
from one or more of conditions listed in the scenario, it has reached a point where
its feasibility must be critically reexamined. It is very difficult to kill any project
when millions of dollars have been spent to date—even when it is clearly the right
decision. IT at Work 13.1 describes a real-world case.
The money already spent on the project, or sunk costs, should not be con-
sidered in the decision. The only relevant cost, from a financial point of view, is
whether the total value from continuing is greater than the total cost of doing so.
U.S. Secretary of Commerce Carlos M. Gutierrez issued the
following official statement explaining (in an obscure way)
why the Census Bureau was scrapping its $600 million proj-
ect. The project plan was to develop a system for collecting
census data using 500,000 handheld devices. The Census
Bureau had contracted to use handheld devices from Harris
Corp., but mismanagement, cost overruns, and poor plan-
ning caused the project to fail.
According to a U.S. Census Press Release:
Multiple internal and external reviews have identified
continuing Census challenges across a number of
areas, including adequate planning over key systems
requirements, key technology requirements, speci-
fication of operational control system characteristics
and functions and regional center technology infra-
structure. . . . Gutierrez said that the Census Bureau
will need an additional $2.2 to $3.0 billion in funding
over the next five years to meet the replan needs. . . .
The lifecycle cost for the Reengineered 2010 Census
was estimated at $11.8 billion in the FY 2009 Budget
Request, including $1.8 billion for the American
Community Survey which replaced the long-form. The
new estimated lifecycle cost for the 2010 Census is
$13.7 to $14.5 billion.
In summary, the Census Bureau had planned to issue more
than 500,000 handhelds to temporary employees to collect
personal data on Americans who do not return census forms
in the mail. The handhelds were being developed under
a $600 million contract awarded to Harris Corp. in 2006.
Stumbling over this multibillion-dollar plan for a high-tech
census, the government reverted to counting the nation’s 300
million people the old-fashioned way: with paper and pencil.
Poor management—not poor technology—caused the gov-
ernment to spend an additional $3 billion for the next census.
Was the Failure a Surprise?
Senator Susan Collins, ranking member of the Committee
on Homeland Security and Governmental Affairs, was not
surprised by the failure. “This committee is unfortunately no
stranger to tales of federal projects and contracts that have
gone awry, often at a heavy cost in taxpayer funds,” she said.
Collins listed the usual failure reasons:
• poorly defined initial requirements and
• inability or unwillingness of management to control
“requirements creep” and cost overruns.
Something larger than poor project management was at
work. It was the failure of top management in the Bureau to
assess and mitigate the risks inherent in such a major proj-
ect. “It should be noted that the problems with this contract
seemed apparent to everyone except the Census Bureau,”
said Senator Tom Coburn (D-Oklahoma).
Analysis of the Handheld Project Failure
The 2010 census was to have been the first true high-tech
count in the nation’s history. The Census Bureau had awarded
a contract to purchase 500,000 of the computers, plus the
computer operating system, at a cost of more than $600 mil-
lion. The contract ballooned to $1.3 billion, even though the
Bureau scaled back its purchase to only 151,000 handheld
computers. The higher expenditure was due to cost overruns
IT at Work 1 3 . 1
U.S Census Project Out of Control
c13ProjectManagementAndSDLC.indd Page 430 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.3 Project Monitoring, Control, and Closing 431
and new features ordered by the Census Bureau on the com-
puters and the operating system. Gutierrez blamed many of
the problems on “a lack of effective communication with one
of our key contractors.”
Census officials were being blamed for doing a poor
job of spelling out technical requirements to the contrac-
tor, Harris. In addition, the handhelds proved too complex
for some temporary workers who tried to use them in a test
in North Carolina, and the devices were not initially pro-
grammed to transmit the large amounts of data necessary.
Harris spokesman Marc Raimondi said the cost of the
contract increased as the project requirements increased:
“The increased funding is required to cover additional sites,
equipment, software and functions added by the bureau to
the program.”
Representative Alan Mollohan, chairman of the appro-
priations subcommittee, said the Census Bureau and Harris
“contributed to today’s crisis.” The Census Bureau’s failure
to address problems with the computers early on has “turned
the crisis into the emergency that we now face.”
Sources: Compiled from Holmes (2008) and U.S. Census (census.
gov, 2008).
Questions
1. What went wrong?
2. What should have been done that was not done?
3. Where any problems unforeseeable?
4. Consider the statement: “hope is not a plan.” Does the
statement apply to this project failure? Explain why or why
not.
5. What are the similarities between the U.S .Census project
failure and the DIA automated baggage-handling project
failure?
PROJECT CLOSING AND
POSTMORTEM
Closing out a project does not benefit the completed project (which is the first to be
cut when costs overrun); rather, it benefits the enterprise and people who worked
on the project. They gain a better understanding of what did and did not work. These
lessons learned guide future projects.
Postproject reviews, or postmortems, identify the reasons the project was suc-
cessful or not, strengths and weaknesses of the project plan, how problems were
detected and resolved, and how the project was successful in spite of them.
IT Project Management Jobs
Project management is a high-level skill and a demand-
ing career choice. The most successful upper-level proj-
ect managers typically have an MBA or other business
degree and financial background to plan and manage
the project budget.
A sample job description for an IT project manager
is as follows:
Responsible for the coordination and completion of
projects within the information technology depart-
ment. Oversees all aspects of projects and project
budgets. Sets deadlines, assigns responsibilities,
and monitors and summarizes progress of project.
Builds and maintains working relationships with
team members, vendors, and other departments
involved in the projects. Prepares reports for upper
management regarding status of project. Requires a
bachelor’s degree, two to four years of experience,
and knowledge of project management software.
MBA is preferred. Leads and directs the work of
others. A wide degree of creativity and latitude is
expected. Typically reports to a senior manager or
head of a unit/department.
CAREER INSIGHT 1 3 . 1
c13ProjectManagementAndSDLC.indd Page 431 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
432 Chapter 13 Project Management and SDLC
Questions
1. What processes help to ensure that the impacts resulting from requested
changes and corrective actions are managed across the project life
cycle?
2. What is the length of a project?
3. Assuming no changes are made, what happens when a task on the criti-
cal path is delayed?
4. What costs should not be considered when deciding whether to kill a
project?
5. When are lessons learned from a completed project identifi ed?
The system development life cycle (SDLC) is the traditional system development
method for large IT projects, such as IT infrastructure or an enterprise system. The
SDLC is a structured framework that consists of a sequential set of processes, as
shown in Figure 13.10. Starting with an initial idea, the SDLC processes are require-
ments analysis, systems analysis and design, development and testing, implementa-
tion, and maintenance. Each process consists of well-defined tasks that depend on
the scope of the project. The processes are iterative, which means that they are
revised when new information or conditions make a revision the smart thing to do.
Iteration does not mean that system development should be subject to infinite revi-
sions or scope creep.
IS design is highly susceptible to scope creep for many reasons. Intended users
ask for additional features. People who were not intended users ask to be included.
Technology changed from the time the business case was written and system devel-
opment began. The actions of a competitor, supplier, or regulatory agency triggered
additional requests for functionality. Because scope creep is expensive, project
managers impose controls on changes requested by users. These controls help to
prevent runaway projects—system development projects that are so far over budget
and past deadline that they must be abandoned, typically with large monetary loss.
13.4 System Development Life Cycle
Figure 13.10 System
development life cycle.
SDLC STEPS In general, an SDLC methodology follows the following steps.
Requirements Analysis
Deficiencies in the existing system are identified and used to specify functional
and data requirements of the new system. Requirements analysis is critical to the
success of the project. System development practitioners agree that the more time
invested in analyzing the current system, business problem, or opportunity and
©
a
rk
a3
8/
Sh
ut
te
rs
to
ck
c13ProjectManagementAndSDLC.indd Page 432 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
13.4 System Development Life Cycle 433
understanding problems that are likely to occur during development, the greater
the probability that the IS will be a success.
System Analysis and Feasibility Studies
The proposed system is designed. Plans are laid out concerning the physical con-
struction, hardware, software, media, dashboards, operating systems, program-
ming, connectivity, and security issues. The feasibility of the design is tested. The
feasibility study determines the probability of success of the proposed project and
provides a rough assessment of the project‘s technical, economic, organizational,
and behavioral feasibility. The feasibility study is critically important to the system
development process because, done properly, the study can prevent companies
from making expensive mistakes, such as creating systems that will not work, that
will not work efficiently, or that people cannot or will not use. The Census Bureau
case in IT at Work 13.1 is an example. The various feasibility analyses also give the
stakeholders an opportunity to decide what metrics to use to measure how a pro-
posed system meets their objectives.
• Technical feasibility. Technical feasibility determines if the required tech-
nology, IT infrastructure, data structures, analytics, and resources can be
developed and/or acquired to solve the business problem. Technical feasibil-
ity also determines if the organization‘s existing technology can be used to
achieve the project’s performance objectives.
• Economic feasibility. Economic feasibility determines if the project is an
acceptable financial risk and if the company can afford the expense and time
needed to complete the project. Economic feasibility addresses two primary
questions: Do the benefits outweigh the costs of the project? Can the project
be completed as scheduled?
Management can assess economic feasibility by using cost–benefit analysis
and financial techniques such as time value of money, return on investment
(ROI), net present value (NPV), and breakeven analysis. Return on invest-
ment is the ratio of the net income attributable to a project divided by the aver-
age cost of resources invested in the project. NPV is the net amount by which
project benefits exceed project costs, after allowing for the cost of capital and
the time value of money. Breakeven analysis calculates the point at which the
cumulative cash flow from a project equals the investment made in the project.
Calculating economic feasibility in IT projects is rarely straightforward.
Part of the difficulty is that some benefits are intangible. For a proposed
system that involves big data, real time analytics, or 3D printing, there may
be no previous evidence of what sort of financial payback can be expected.
• Legal and organizational feasibility. Are there legal, regulatory, or environ-
mental reasons why the project cannot or should not be implemented? This
analysis looks at the company’s policies and politics, including impacts on
power distribution and business relationships.
• Behavioral feasibility. Behavioral feasibility considers human issues. All
system development projects introduce change, and people generally resist
change. Overt resistance from employees may take the form of sabotaging
the new system (e.g., entering data incorrectly) or deriding the new system
to anyone who will listen. Covert resistance typically occurs when employ-
ees simply do their jobs using their old methods.
Behavioral feasibility is concerned with assessing the skills and the
training needed to use the new IS. In some organizations, a proposed system
may require mathematical or linguistic skills beyond what the workforce
currently possesses. In others, a workforce may simply need to improve
their skills. Behavioral feasibility is as much about “can they use it” as it is
about “will they use it.”
c13ProjectManagementAndSDLC.indd Page 433 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
434 Chapter 13 Project Management and SDLC
After the feasibility analysis, a go/no-go decision is reached. The project spon-
sor and project manager sign off on the decision. If it is a no-go decision, the project
is put on the shelf until conditions are more favorable, or the project is discarded. If
the decision is “go,” then the system development project proceeds.
SYSTEM DEVELOPMENT
AND TESTING
System developers utilize the design specifications to acquire the software needed
for the system to meet its functional objectives and solve the business problem.
Sourcing, as discussed in Chapter 12, and in-house coding are options.
Testing verifies that apps, interfaces, data transfers, and so on, work correctly
under all possible conditions. Testing requires a lot of time, effort, and expense to
do properly. However, the costs and consequences of improper testing, which could
possibly lead to a system that does not meet its objectives, are enormous. The risk
of costly lawsuits needs to be considered.
IMPLEMENTATION Implementation, or deployment, is the process of converting from the old system to
the new system. Four conversion strategies are parallel, direct cut over, pilot, and
phased.
In a parallel conversion, the old system and the new system operate simultane-
ously for a period of time. That is, both systems process the same data at the same
time, and the outputs are compared. This type of conversion is the most expensive
but least risky.
In a direct conversion, the old system is cut off and the new system is turned on
at a certain point in time. This type of conversion is the least expensive, but it is the
most risky if the new system does not work as planned.
A pilot conversion introduces the new system in one location to test it out. After
the new system works properly, it is rolled out.
A phased conversion introduces components of the new system, such as indi-
vidual modules, in stages. Each module is assessed, and, when it works properly,
other modules are introduced until the entire new system is operational.
MAINTENANCE Once the new system’s operations are stabilized, audits are performed during oper-
ation to assess the system’s capabilities and determine if it is being used correctly.
Maintenance must be kept up rigorously at all times. Users of the system should be
kept up to date concerning the latest modifications and procedures.
Questions
1. What are the stages of the SDLC?
2. Why is information system design highly susceptible to scope creep?
3. What can be done to prevent runaway projects?
4. Explain the feasibility tests and their importance.
5. What are four conversion methods?
Key Terms
baseline
business case
critical path
critical task
crowdfunding
deliverable
Gantt chart
go/no-go decision
integrated change control
milestone
postmortem
project
project management
project portfolio
management (PPM)
prototyping
responsibility matrix
scope creep
statement of work (SOW)
sunk cost
system development life
cycle (SDLC)
triple constraint
variance
work breakdown structure
(WBS)
c13ProjectManagementAndSDLC.indd Page 434 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
Assuring Your Learning 435
Assuring Your Learning
1. Business cases take a long time to research and
write. As a result, they are also time consuming to
review. Explain why business cases require so much
effort and detail.
2. What risks might the use of project portfolio man-
agement (PPM) minimize? Do you think PPM can
guarantee honest and unbiased project approvals or
not? Explain your position.
3. Do you think that projects that are needed to
comply with regulations, such as the international
anti-money-laundering (AML) laws that require
fi rms to know your customer (KYC), should
undergo the same approval requirements as
discretionary projects, such as in manufacturing or
marketing? Explain your reasons.
4. Why should each deliverable be made a milestone?
5. Why is the critical path an important monitoring tool?
6. How does diagramming the triple constraint as a
triangle clearly demonstrate how time, scope, and
cost are interrelated?
7. Refer to the Center for Project Management’s list
of seven IT project management mistakes. Select
two of these mistakes and explain how they
contribute to project failure.
8. Why should the go/no-go decision be made more
than once in a project’s life cycle?
9. If a project is started without a documented base-
line, what risks might the project and project team
face?
10. Explain how control activities are, in effect, risk
management activities.
11. Why is it tough to ignore sunk costs when
evaluating a failing project?
12. Why are IT projects so susceptible to scope creep?
13. What leads to a runaway project?
14. What feasibilities are needed prior to IT project
approval?
15. Explain the stages of the SDLC.
DISCUSS: Critical Thinking Questions
1. ProjectLibre is the open-source replacement of
Microsoft Project. Visit the ProjectLibre website at
ProjectLibre.org.
a. Download the free software.
b. Assume you are the project manager on a project
of your choice that you are able to manage. Several
project examples are delivering a tailgate party
for 50 people, remodeling a kitchen, creating a
YouTube video for advertising a new product,
or implementing a new cloud accounting
information system.
c. Use the software to plan a project of your choice.
Create a WBS and Gantt chart.
2. Research and compare the current top three open-
source project management tools. What are their
limitations?
3. Research the three project management vendors’
software packages and fi nd a review of each one.
Write a report that compares the features of the
packages, including prices, and that summarizes the
reviews.
EXPLORE: Online and Interactive Exercises
1. You are the project manager and need to compose
a SOW for clients who want you to develop a
Kickstarter.com site for their project, as discussed
in the chapter.
a. Start off by composing a SOW using a standard
SOW template that you found and downloaded
from the Internet.
b. Use www.tomsplanner.com or other free Gantt
chart software to create a Gantt chart for your
project.
c. Assume that after your clients review your SOW
and Gantt chart, they request that you discount
the price 20 percent. Based on the triple con-
straints, how would you respond?
2. Explore project management software on vendors’
websites. Select a single project management pack-
age, download the demo, and try it. Make a list of the
important features of the package. Be sure to investi-
gate its cloud and collaboration features. Report your
fi ndings.
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
c13ProjectManagementAndSDLC.indd Page 435 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
436 Chapter 13 Project Management and SDLC
3. Managing a project with Microsoft Project is often
the approach to IT project management, but many
users prefer to use Microsoft Excel instead. The main
reasons are that MS Project is too expensive, wastes
too much time to set up and keep updated, and is
tough to use. The debate between Excel and Project
has valid arguments for either approach. Research
the reviews of Excel and MS Project as project
management tools. When is each software appropriate
for use?
CASE 13.2
Business Case: Steve Jobs’ Shared Vision Project Management Style
Steve Jobs (1955–2011) co-founded Apple Inc. and reinvented
the PC, music players, phones, tablets, and digital publish-
ing (Figure 13.11). He is regarded as technology industry’s
most notable luminary. He continuously managed remark-
ably innovative projects—extremely successful ones as well
as many failures. Although widely recognized as a marketing
and technology guru, Jobs was largely successful because of
his project-based approach for managing his business and pro-
ducing new products. His approach to executing projects ulti-
mately changed the business world. Jobs’ shared vision project
management style offers lessons to help managers focus and
motivate their team to get projects completed on schedule.
Shared Vision and Accountability
A signifi cant part of what made Jobs successful was his per-
sistent push to keep projects moving while communicating
with his team to ensure they were working toward the shared
vision. He stressed accountability and did not let anyone slide
on that principle. He got to know everyone on the team and
actively inspired them.
Guy Kawasaki, Apple’s chief evangelist and liaison to the
Mac developer community, said Jobs appreciated great work.
He was well known for giving employees feedback—publicly
telling them if they were great or lousy. His bluntness infuriated
some people but also motivated them to either do their best
or leave.
Communication
Structure, understanding, and inspiration depend on the
one irreplaceable management skill: communication. Part of
what made Jobs so successful was his constant push to keep
projects moving while communicating with his team to ensure
they were working toward a shared vision. He held regular
meetings to avoid wasting time with long e-mail chains and
having to address the same concerns multiple times.
Do Not Just Listen—Understand
There is a big difference between listening and understand-
ing. Jobs made sure he understood everyone on his team
and that they understood him. This is done by making people
demonstrate that they understand and not simply asking
them if they understand. When everyone confi rms they are on
the same page, they will keep moving forward.
Sources: Darton Group (2012), Isaacson (2012), and Kimbrell (2014).
Questions
1. Steve Jobs shows the importance of people skills. Explain
Jobs’ way of motivating people. For example, did he try
to get everyone to like him? Did he try to get everyone to
get along with each other?
2. Why did Jobs’ approach to project management work so
well for him?
3. What lessons can project managers learn from Jobs?
4. Research Steve Jobs’ management style from reputable
sources. What did you learn about how people reacted to
Jobs’ style?
5. Create a checklist of effective project management
practices.
Figure 13.11 Steve Jobs, CEO and founder of Apple
Computers and Pixar boss, was one of the greatest
project managers.
©
E
d
St
oc
k/
iS
to
ck
p
ho
to
c13ProjectManagementAndSDLC.indd Page 436 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
References 437
CASE 13.3
Demo Case: Mavenlink Project Management and Planning Software
Project management software and apps continue to be
improved with advanced features and integration with other
technology. The decision on which project management
software to use depends on the company’s needs, size of
business, and industry. Cloud-based or online project man-
agement applications are popular choices. Mavenlink is a
vendor that provides easy-to-follow video tutorials through
their online resources. With Mavenlink, you can track project
timelines, collaborate on tasks, manage team activities, and
integrate with Google Apps, QuickBooks, and Salesforce
from a single workplace environment.
Visit Mavenlink’s website at Mavenlink.com. Scroll to the
bottom of the landing page and click TUTORIALS. A YouTube
video will launch. Watch the video. Also search for the
Mavenlink: Online Project Management on YouTube, which
was posted by a client, CloudBase3.com.
Questions
1. What features support project planning?
2. What features support project monitoring and control?
3. How is change management supported?
4. What did CloudBase3 identify as shortcomings or cons of
Mavenlink?
Calleam Consulting Ltd. “Case Study—Denver International
Airport Baggage Handling System—An Illustration of Inef-
fectual Decision Making.” www.Calleam.com. 2008.
Darton Group. “Steve Jobs and Lessons for Project Managers.”
DartonGroup.com, January 2, 2012.
Grimes, R. A. “11 Signs Your IT Project Is Doomed.”
Computerworld.com, May 6, 2013.
Gupta, S. & A. Jain. “AML and KYC Analytics—The Risk
of Non-Compliance and the Cost of Compliance.” Everest
Group Research, 2014. genpact.com/docs/resource-/-aml-and-
kyc-analytics—the-risk-of-non-compliance-and-the-cost-of-
compliance
Holmes, A. “Census Program to Use Handheld Computers
Said to Be in ‘Serious Trouble.’” GovernmentExecutive.com,
January 2, 2008.
Isaacson, W. Steve Jobs. New York: Simon & Schuster, September
2012.
Kimbrell, G. “Four Project Management Lessons You Can
Learn from Software Engineers.” Forbes, January 31, 2014.
Krigsman, M. “Who’s Accountable for IT failure?” ZDNet,
April 16, 2012.
Nelson, R. R. “Project Retrospectives: Evaluating Project
Success, Failure, and Everything in Between.” MIS Quarterly
Executive 4, no. 3, September 2005.
Perkins, B. “Bart Perkins: How to Keep Projects on Track.”
Computerworld.com, April 21, 2014.
Stackpole, B. “Why Project Management in IT Is More Impor-
tant Than Ever.” State Tech Magazine, September 25, 2013.
Symonds, M. “The Seven Deadly Sins of Project Management.”
The Project Management Hut, January 17, 2014.
U.S. Census, 2008. census.gov
References
c13ProjectManagementAndSDLC.indd Page 437 11/10/14 11:12 AM f-w-204a /208/WB01490/9781118897782/ch13/text_s
438
Chapter Snapshot
Several of today’s toughest ethical and social challenges
did not even exist at the start of this decade. The latest
social, mobile, cloud, and information management tech-
nologies are powerful forces. While businesses, govern-
ments, and users greatly benefit from their use, they may
have harmful effects—not all of which are obvious yet.
For example, what is the effect of people spending their
personal and professional lives in a state of continuous
disruption or partial (distracted) attention?
Are you prepared to deal effectively with ethical
challenges and corporate responsibilities that social,
mobile, big data, and analytics technology create in busi-
ness? Anecdotal research suggests that individuals often
do not even recognize when ethical issues are present. If
people cannot recognize them, then it is hard to imagine
how they could act responsibly.
This chapter intends to make you aware of ethi-
cal risks, legal responsibilities, what we trade off, and
Ethical Risks and
Responsibilities
of IT Innovations14
Chapter
1. Analyze the privacy paradox and the effects of IT
innovations on civil rights, privacy, piracy, copyright
infringement, and other social risks.
2. Distinguish and debate the complex issues of respon-
sible conduct and irresponsible conduct, such as social
media discrimination.
3. Describe the impacts of constant connectivity and
distractions on quality of life, business, safety, and
interpersonal relationships.
4. Describe the disruptive technology trends for the next
three years.
Chapter Snapshot
Case 14.1 Opening Case: Google Glass and
Risk, Privacy, and Piracy Challenges
14.1 Privacy Paradox, Privacy, and Civil Rights
14.2 Responsible Conduct
14.3 Technology Addictions and the Emerging
Trend of Focus Management
14.4 Six Technology Trends Transforming
Business
Key Terms
Assuring Your Learning
• Discuss: Critical Thinking Questions
• Explore: Online and Interactive Exercises
• Analyze & Decide: Apply IT Concepts
to Business Decisions
Case 14.2 Business Case: Apple’s CarPlay
Gets Intelligent
Case 14.3 Video Case: Vehicle-to-Vehicle
Technology to Prevent Collisions
References
Learning Outcomes
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 438 11/10/14 11:14 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
439
CASE 14.1 OPENING CASE
Google Glass and Risk, Privacy, and Piracy Challenges
unresolvable controversies. These issues are examined
within the context of civil rights, employment laws,
regulations, research findings, and case examples. Of
course, even those guidelines cannot provide easy
answers to social discrimination, the demise of privacy,
distractions, piracy and theft of intellectual property,
and what the latest digital devices are doing to quality
of life. There are no easy fixes, clear-cut judgments,
answers, or solutions. As managers, you need to be able
to recognize ethical issues and tip the balance toward
better responsible conduct.
In October 2013, California Highway Patrol (CHP) officer Keith Odle pulled
over Cecilia Abadie for speeding along Interstate 15 in San Diego. Odle noticed
that Abadie, a software developer, was wearing Google Glass (see Figure 14.1).
He ticketed her for speeding and for being in violation of the distracted-driving
law. California Vehicle Code Section 27602 bans people from driving while video
screens are operating in the front of the vehicle, except for mapping displays such
as GPS and other built-in screens. Abadie was one of the explorers who were pilot
testing Google Glass, which was then not yet on the market.
While the case against Abadie was the first known instance of a Glass-related
ticket, it will not be the last. At least seven states—Delaware, Illinois, Missouri, New
Jersey, New York, West Virginia, and Wyoming—are considering laws prohibiting
driving while using Google Glass. As stated on the CNET website (www.cnet.com),
Abadie’s alleged violation “does pose a thorny legal question that police, judges
and drivers will have to face as these wearable devices become more prevalent”
(Whitney, 2013).
Figure 14.1 Diverse views
and arguments about the
consequences of wearing
Google Glass.
If Glass distracts drivers
and causes traffic
accidents, then Google
has a responsibility to
address this issue.
A Glass wearer in a movie
theater was detained by a
U.S. Immigration and
Homeland Security
Investigations unit, which
targets piracy.
The DriveSafe app detects
when drivers are falling
asleep and wakes them
up—making driving safer.
Technology is inherently
neutral. Misuse by users
creates social risk so users
bear the responsibility.
Violation of distracted
driving traffic codes
Glass violates the right to
be left alone. The facial
recognition app, NameTag,
allows Glass wearers
to scan faces of strangers
against known face
databases.
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 439 11/10/14 11:14 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
440 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
DISTRACTED DRIVERS
VERSUS INFORMED
DRIVERS
Wearing computer-in-eyewear could be a distracted-driving violation according to
the traffic code, but police must prove that the eyewear was on. The CHP officer had
seen the light from Abadie’s Glass screen. However, her defense attorney claimed
that the Glass activated when she looked up at the officer during the stop but was not
on when she was driving. The California judge dismissed her ticket saying that the
CHP officer failed to prove the Glass was in operation when the driver was stopped.
One side argues that driving with a wearable computer is as risky as texting or
watching TV while driving. The opposing side claims that the advantages of Glass
outweigh any risks. They cite the DriveSafe app that detects when drivers are fall-
ing asleep and wakes them up—making driving safer. At present, traffic laws aim to
eliminate distracted driving.
PRODUCT LIABILITY,
RISK, AND
RESPONSIBILITY
CONTROVERSY
This case triggered many debates over the responsibility and business risk of digital
technology products hitting the market. Here are several debated issues:
• Google Glass may redefine the boundaries of companies’ product liability.
Certainly, individuals have the responsibility to drive safely at all times. Does
Google also bear responsibility for potential harm caused by Glass users?
• The United Nations (U.N.) Guiding Principles on Business and Human Rights
was unanimously endorsed by the Human Rights Council in 2011. It states
that companies must “avoid causing or contributing to adverse human rights
impacts through their own activities, and address such impacts when they
occur.” Glass constitutes Google’s “own activities;” therefore, according to
the U.N., if Glass distracts drivers and causes traffic accidents, then Google
has a responsibility to address this issue. The possible legal and ethical ques-
tion is whether or not technology companies are obligated to inform users
that there may be social risks (risks to others) from using their products in
plain language—similar to warnings of side effects of medications.
• Do technology companies bear any responsibility for the social risks of how
consumers or buyers use their products? Lawmakers are worried about what
drivers will do with the Internet at their eyeballs.
• A common argument is that technology is inherently neutral. Misuse by users
creates social risk so users bear the responsibility. Opponents argue that tech-
nology companies must manage the social risks that they contribute to or cause.
Driving violations are only one example of the effects of Glass on the legal system.
Additionally, Glass is only one example of intersection of new devices and ethical,
legal, and social responsibility. Like other new digital technologies, the device is
influencing a wide range of legal issues, including copyright infringement, privacy,
and piracy. The legal system is reactive and slower moving that IT—and may not
be prepared for upcoming challenges.
COPYRIGHT, PIRACY,
AND PRIVACY
INFRINGEMENT
Since it is worn instead of held, Glass can record events less obtrusively than smart-
phones do. Wearers who want to take photos simply wink with their right eye.
Google Glass also can be outfitted to prescription lenses, which introduces another
issue since then the Glass is needed for correct vision.
Example 1: Piracy and Theft of Intellectual Property
In January 2014, a man in Columbus, Ohio, who was wearing prescription Google
Glass was pulled out of an AMC theater about an hour into watching the movie
Jack Ryan: Shadow Recruit. He was detained by agents from the U.S. Immigration
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 440 11/10/14 11:14 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
CASE 14.1 Opening Case 441
and Customs Enforcement’s Homeland Security Investigations unit, which targets
piracy. After the interrogation, the agents hooked the Glass up to a computer and
saw that all it was storing were personal family photos. Why and how did agents
show up so quickly? AMC issued the following statement to address why it called
the agency (Taylor, 2014):
[M]ovie theft is something we take very seriously, and our theater managers
contact the Motion Picture Association of America anytime it’s suspected. . . .
At AMC Easton 30 last weekend, a guest was questioned for possible movie
theft after he was identified wearing a recording device during a film. The
presence of this recording device prompted an investigation by the MPAA,
which was on site. The MPAA then contacted Homeland Security, which
oversees movie theft. The investigation determined the guest was not record-
ing content.
An AMC representative explained that wearing a device that was capable of
recording video, which could then be used to pirate movies, was not allowed at
movies. Certainly the motion picture industry has the right to protect its products
against piracy via wearable devices that can record movies in stealth. Do owners of
wearables have comparable rights? Which of these conflicting rights should over-
ride the other? Now consider a similar example.
Example 2: Privacy Invasions
Privacy invasions by people wearing Google Glass who take photos or shoot video
instantaneously are another violation. Some entertainment and dining places,
including a restaurant in Seattle, have banned people who wear the devices. In some
states, wearers who give Glass the command to record could potentially violate
wiretapping laws. Should people who are out relaxing and enjoying themselves be
subject to being recorded without their consent or knowledge? Whose rights should
override in these cases?
PURPOSE OF GOOGLE
GLASS CONFLICTS
WITH PRIVACY OF
OTHERS
In Google’s view, the whole purpose of Glass is to have it on all the time. That is
the Glass business model. The more the devices are worn, the more profitable they
are. Google’s response to privacy and piracy violations is that Glass is designed with
explicit signals, such as the screen lighting up, to alert others when someone is tak-
ing a picture or recording video. In your opinion, is a lit screen sufficient protection?
The devices make it harder for nonwearers to remain anonymous. A facial recog-
nition app, NameTag, allows Glass wearers to scan faces of strangers against known
databases of faces. Google officially bans facial recognition apps on Google Glass.
Does that ban have any meaning? Will people figure out how to get around it?
This opening case introduces current ethical challenges and competing rights
decisions. Your answers to questions within the case may change once you start to
wear technology—or suffer because of others who do.
Sources: Compiled from Bader (2014), Perry (2014), Davis (2014), Dobuzinskis (2013), and Taylor (2014).
Questions
1. Answer the questions within the case. Explain the basis for your answers
and opinions.
2. An estimated 500 million people are expected to be wearing a Web-
connected watch, camera, eyepiece, or other device by 2018. Consider
how your answers to the questions within the case are different when
answered from the perspective of half a billion wearers instead of just a
few thousand. How have your answers and opinions changed?
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 441 11/10/14 11:14 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
442 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
3. Imagine you had a Google Glass app that monitors your surroundings
and tells you when you are about to crash into something. In your
opinion, should use of Glass and that app while driving be legal or
illegal? Explain your reasoning.
4. Glass wearers who become accustomed to capturing their lives with
wearable devices could end up violating privacy, copyright, or piracy
laws without realizing it. Research each of these laws and give a
description of each.
5. Use what you learned in Question #4 to give three examples of how
such a violation could occur. Why might these violations be practically
impossible to prevent or prove?
6. Do you think that Glass and similar wearables should be illegal? Explain
your answer.
7. Do you agree with the U.N.’s position on corporate responsibility?
Explain your answer.
8. Visit the SearchEngineWatch.com site. Search for “6 Funny Google
Project Glass Parody Videos.” Watch the original video named “Project
Glass: One day…” Imagine how human interaction might change if a
majority of people spent the day wearing Glass. Describe how you see
interaction changing.
We do not live in a world without consequences and boundaries. Yet many people
act as though they do, as the privacy paradox points out.
14.1 Privacy Paradox, Privacy, and Civil Rights
PRIVACY AND THE NEW
PRIVACY PARADOX
Privacy is the right to self-determine what information about you is made acces-
sible, to whom, when, and for what use or purpose. Privacy means we have freedom
of choice and control over our personal information, including what we do not want
shared with or used by others. Unauthorized disclosure of personal information is
normally considered a breach of privacy, although what is unauthorized and what is
personal information are matters of dispute, particularly when it is online.
While privacy is still the social norm, a person’s privacy is based to a large
extent on what choices that person has made. The amount of shared personal
information is a decision that individuals make over their lifetime. This is a critical
concept because online content can persist for an entire lifetime. Private content
that uninhibited teenagers with bad judgment posted or sent cannot be made to dis-
appear when they apply for jobs requiring security clearance or intense background
checks—or run for public office.
Users of social sites often claim that they are concerned about their privacy.
At the same time, they disclose their highly personal lives, even content that is
incriminating or illegal, in their profiles or posts. The privacy paradox refers to this
phenomenon where social users are concerned about privacy but their behav-
iors contradict these concerns to an extreme degree. Facebook membership has
increased despite Facebook founder Mark Zuckerberg’s frequent changes to default
privacy settings to allow everyone to see and search for names, gender, city, and
other information. Zuckerberg’s position is that people “have really gotten com-
fortable not only sharing more information and different kinds, but more openly
and with more people. That social norm is just something that has evolved over
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 442 11/10/14 11:14 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.1 Privacy Paradox, Privacy, and Civil Rights 443
time” (Cavoukian, 2012). It is well known that Zuckerberg has a multibillion-dollar
commercial interest in the elimination of online privacy, so trusting Facebook’s
privacy policies exemplifies the privacy paradox.
A 2013 Pew study found that 50 percent of Internet users were worried
about the information available about them online, compared to 30 percent in
2009 (Rainie, Kiesler, Kang, & Madden, 2013). The results mean that 50 percent
of Internet users are not worried about their online privacy. Following the news
that the U.S. National Security Agency was collecting the telephone and Internet
metadata of its citizens, a Washington Post–ABC poll found that only 40 percent of
U.S. respondents said that it was more important to protect citizens’ privacy even
if it limited the ability of the government to investigate terrorist threats (Cohen &
Balz, 2013).
The Global Cyber Security Capacity Centre and Oxford Internet Institute
have together released a draft working paper examining the attitudes of younger
people toward privacy online. The 2014 report, A New Privacy Paradox: Young
People and Privacy on Social Network Sites, shows that, contrary to conventional
wisdom, people under age 35 are actually more likely to have taken action to pro-
tect their privacy than older people (Blank, Bolsover, and Dubois, 2014). However,
according to the report, the new privacy paradox is that social sites have become
so embedded in the social lives of users that they must disclose information about
themselves even though these sites do not provide adequate privacy controls. The
consequences of the privacy paradox are far reaching.
SOCIAL RECRUITMENT The use of social media is so pervasive in today’s workplace that it is even having an
impact on the enforcement of federal laws that protect civil rights. Jonathan Segal,
speaking on behalf of the Society for Human Resource Management (SHRM),
explained that employers use social media for multiple reasons: to engage employ-
ees, to share knowledge among employees, and for recruitment and hiring of new
employees (EEOC, 2014). The SHRM surveyed its members for several years and
found that 77 percent of the surveyed companies had used social sites to recruit
candidates in 2013, more than double the 34 percent rate in 2008.
Social Tools for Recruiting and Background Checks
In order to cast a wide net for potential candidates, social media are used in social
recruitment. However, improper use of information scraped from these sites may
be discriminatory and illegal. The problem starts with members who post age, race,
gender, and ethnicity information—or enable it to be learned from content on their
sites. To the extent that employers conduct a social media background check on job
candidates, these are three best practices:
1. Have either a third party or a designated person within the company who does
not make hiring decisions do the background check.
2. Use only publicly available information. Do not friend someone to get access to
private information.
3. Do not request username or passwords for social media accounts.
By mid-2014, four states had enacted laws prohibiting employers from request-
ing passwords and usernames from applicants/employees. Other states have such
laws pending, and there are several proposals before Congress to do the same on a
federal level.
Social Recruiting and Discrimination
Recruiters see LinkedIn as the world’s largest resume database. Depending on how
job candidates control their privacy and how much they reveal through check-ins
Social recruitment refers
to use of social media to
find, screen, and select job
candidates. Often it involves
searching information the
job candidate did not want
considered or that is illegal
to use in the hiring process.
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 443 12/11/14 2:06 PM f-392 /208/WB01490/9781118897782/ch14/text_s
444 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
and posts (Figure 14.2), recruiters learn a great deal of information that should
not be used in their decision to interview, recommend, or hire someone. In a 2009
study conducted for CareerBuilder, more than half of employers reported that the
biggest factor influencing their decision not to hire an applicant was the presence of
provocative photos on the candidate’s social media profile, an issue more likely to
affect women than men (CareerBuilder.com, 2009).
Protected Classes and Information
According to the Equal Employment Opportunity Commission (EEOC), dis-
criminatory practices are prohibited. Title VII of the Civil Rights Act of 1964, the
Age Discrimination in Employment Act of 1967 (ADEA), the Americans with
Disabilities Act of 1990 (ADA), and Genetic Information Nondiscrimination
Act of 2008 (GINA) make it illegal to discriminate in any aspect of employment,
including recruitment, hiring, and firing. GINA, the latest of these laws, was passed
when results from the Human Genome Project started raising ethical dilemmas.
Protected classes is a term used in these laws to describe characteristics that cannot
be targeted for discrimination and harassment. Protected classes include age, dis-
ability, gender, religion, genetic information, race, national origin, and pregnancy.
If information about protected classes is used to weed out candidates, it can
lead to corporate social media discrimination. Discrimination is not always black
and white because it is prejudicial treatment (Figure 14.3) that may be tough to
prove. Although job applicants might not know whether or not their social media
profiles had been screened, they have several ways of finding out. For instance, an
applicant might be tipped off after receiving a suspicious friend request or by talk-
ing with current employees and hiring managers who disclose the information—
either purposely or accidentally—during the interview.
Figure 14.2 Members expose too much information about themselves through
social posts and check-ins. Employers and recruiters use social content. Laws
forbid use of some types of that information in hiring practices, but what can
prevent their use?
(a) (b)
©
S
cr
ee
ns
ho
t/
A
la
m
y
©
R
ic
ha
rd
L
ev
in
e/
A
la
m
y
EEOC (Equal Employment
Opportunity Commission)
enforces federal laws
prohibiting discrimination in
employment.
Protected classes are
characteristics identified by
law that cannot be used in
the hiring process.
Discrimination is biased
or prejudicial treatment
in recruitment, hiring, or
employment based on
certain characteristics, such
as age, gender, and genetic
information, and is illegal in
the United States.
Figure 14.3 Discrimination
is the result of prejudicial
treatment based on
protected information rather
than a person’s qualifi cations. ©
Iv
el
in
R
ad
ko
v/
A
la
m
y
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 444 11/10/14 11:14 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.1 Privacy Paradox, Privacy, and Civil Rights 445
Enterprises that have not implemented formal processes for the use of social
media in recruiting and selection may put themselves at risk of legal complaints
because of inconsistent practices.
LEGAL NOTE: CIVIL
RIGHTS
Civil rights are protected by federal law. If a person’s civil rights are interfered with
by another, the person can seek legal action for the injury. Examples of civil rights
are freedom of speech, press, and assembly; the right to vote; and the right to equal-
ity in public places. Discrimination occurs when the civil rights of an individual are
denied or interfered with because of their membership in a particular group or class.
Various jurisdictions have enacted statutes to prevent discrimination based on a
person’s race, sex, religion, age, previous condition of servitude, physical limitation,
national origin, and in some instances sexual orientation.
COMPETING LEGAL
CONCERNS
Two competing legal concerns are discrimination and negligent hiring.
• Discrimination. Most employers have stringent employment policies that
prevent their recruiters and hiring managers from learning potentially dis-
criminatory information about candidates. Visiting a person’s social media
sites, however, clearly creates the opportunity to view large amounts of
information going against these nondiscriminatory practices.
• Negligent hiring. Employers must consider the potential risk of a negligent
hiring or negligent retention lawsuit related to social networking profile
information. It is possible that if a workplace violence incident occurred and
the attacker’s public social networking profile contained information that
could have predicted that behavior, the employer may be held liable for neg-
ligence in not using readily available information during the hiring decision.
Examples and a discussion of these issues follow.
Discrimination via Social Media Scenario
Imagine that an employer reviews a candidate’s activity on social media platforms
and discovers the following information about her:
1. The candidate checks in via Foursquare at Woodsman Gym once or twice a day
usually around 7 a.m., noon, or 6 p.m.
2. Her Facebook album is fi lled with party photos, like the one in Figure 14.4, show-
ing what might be excessive drinking.
3. Her resume suggests that she is in her early 30s, but her social profi le about high
school indicates that her real age is late 40s.
Figure 14.4 In 2011, the
Federal Trade Commission
(FTC) ruled that companies
that research how you
spend your personal time,
hobbies, and so on, do not
violate your privacy. Party
photos might not show
illegal behavior but when
posted on a social network
could infl uence a potential
employer’s evaluation of
a job applicant as well as
disclose information about
race, gender, age, and other
protected characteristics. ©
B
ub
b
le
s
Ph
ot
ol
ib
ra
ry
/A
la
m
y
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 445 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
446 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
4. Her posts describe her religious beliefs and customs, family’s serious medical con-
ditions, fi nancial stress, and desire to spend as much time as possible snowboarding.
5. She makes fun of and posts insulting cartoons of people who follow a dress code
at work.
Like many other job seekers, this candidate is posting, tweeting, and blogging
information she would not want a recruiter or prospective employer to know about.
If she is rejected because of her age, religion, or genetic condition, the company has
committed social media discrimination and is very likely in violation of other laws.
Reducing the Risk of Negligent Hiring
In the past, employment law attorneys dealt with this risk by advising companies to
avoid using social media in their hiring and recruitment process to avoid legal risk.
However, that proposal is not realistic. By opting out of social media, recruiting
firms lose a productive way to find candidates, which could cost them millions of
dollars. Additionally, background checks must be conducted. Almost all employers
do some form of background screening in order to avoid the risk of negligent hiring.
Negligent hiring is a claim made by an injured party against an employer who knew
or should have known about an employee’s background that indicates a dangerous
or untrustworthy character. Employers have a legal obligation to make the best
effort to protect their employees and customers when they hire. Steps companies can
take to balance the competing risks of negligent hiring and social discrimination are:
1. Ask candidates to sign a disclosure statement. Let candidates themselves dis-
close information found on social media. Explain to them the reason for the
disclosure statement.
2. Create a standard process and document it. A consistent and well-documented
process is needed to ensure and show compliance if there is an EEOC employ-
ment investigation.
3. Avoid coercive practices. Make sure recruiters do not pressure applicants to dis-
close protected information via social media by requiring them to disclose pass-
words or relax privacy settings for purposes of review by the employer.
4. Training. This may sound like a no-brainer, but training and repeated reminders
are important to emphasize that management intends to be in compliance with
laws and regulations related to social recruiting.
FINANCIAL
ORGANIZATIONS MUST
COMPLY WITH SOCIAL
MEDIA GUIDELINES
In 2013, the Federal Financial Institutions Examination Council (FFIEC) released
new guidelines titled Social Media: Consumer Compliance Risk Management
Guidance to help financial institutions effectively manage the current risks caused
by the use of social media (Ciccatelli, 2014). The activities of financial institutions
are regulated by consumer protection and compliance laws. These institutions must
take steps to protect their reputations and their clients—very similar to the steps
that HR departments must take to comply with EEOC guidelines. Key social media
guidelines for financial institutions are listed in Table 14.1.
Companies expose themselves to harsh sanctions by federal agencies when they
violate the privacy policies that their customers rely upon. Unlike social discrimina-
tion, these cases are rather easy to detect and prosecute. For example, the Federal
Trade Commission (FTC) charged SnapChat for, in effect, deceiving its customers
with its bogus disappearing messages services. The FTC scrutinizes business prac-
tices to regulate “unfair and deceptive trade practices.” The FTC has been focused
on curtailing deceptive practices, even if unintentional, by businesses engaged in
online commerce. While businesses should always ensure that their online adver-
tisements are truthfully conveyed, a business with a social media presence should
take particular note of the FTC’s recent efforts concerning online privacy, security,
and advertising. IT at Work 14.1 describes such a case.
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 446 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.1 Privacy Paradox, Privacy, and Civil Rights 447
TABLE 14.1 Key Social Media Guidelines for Financial Institutions
Guidelines Descriptions
Institute policies to
comply with advertising,
communications, and other
consumer protection laws
Perform a social media risk assessment and
then implement social policies to prevent issues
like spam. For example, staff should know how
to react when a customer posts confi dential
information like a bank number on their social
profi les.
Use monitoring tools Financial institutions have added social
channels that can expose their brand to
additional feedback. Using social monitoring
tools, they can identify issues that may cause
a negative reaction and respond quickly. The
use of social monitoring tools also helps banks
refute inaccurate statements, protecting their
brand reputation.
Train employees Whether or not employees represent your
brand on social media, their public social
comments may be seen to refl ect the fi nancial
institution. The best way to reduce risk is to
train employees on how to use social networks
professionally.
FTC Chairwoman Edith Ramirez stated, “If a company
markets privacy and security as key selling points in pitching
its service to consumers, it is critical that it keep those prom-
ises” (Fitzpatrick & Kibel, 2014).
SnapChat Fined for Violating Its Own Privacy
Policies and Misleading Users
The FTC charged SnapChat with violating its promises of
“disappearing messages.” According to the FTC’s complaint:
1. SnapChat’s mobile app allows consumers to send and
receive photo and video messages known as snaps.
SnapChat falsely marketed its app as a service for send-
ing disappearing photo and video messages. Before
sending a snap, the sender has to designate a period of
time that the recipient will be allowed to view the snap.
2. Despite SnapChat’s claims, the FTC contended that sev-
eral methods exist by which a recipient can use tools out-
side of the app to save both photo and video messages,
allowing the recipient to access and view the photos or
videos indefinitely. For example, when a person receives
a video message, the app stores the video file in a loca-
tion outside of the app’s sandbox. Sandbox is the app’s
private storage area on the device that other apps cannot
access.
3. Until October 2013, a recipient could connect his or her
mobile device to a computer and use simple file brows-
ing tools to locate and save the video file. Although
this method for saving video files was widely publicized
as early as December 2012, the FTC contended that
SnapChat did not mitigate this flaw until October 2013.
4. SnapChat misrepresented its data collection practices by
transmitting geolocation data from users of its Android
app despite its privacy policy saying that it did not track
or access these data.
5. SnapChat collected contact data from users’ address
books without notice or consent and continued to do so
IT at Work 1 4 . 1
SnapChat Lied About Disappearing Messages and Privacy
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 447 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
448 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
without notifying users or obtaining their consent until
Apple modified its operating system to provide notice
with the introduction of iOS 6.
6. SnapChat’s failure to secure its “Find Friends” feature
resulted in a security breach that enabled attackers to
compile a database of 4.6 million SnapChat usernames
and phone numbers.
Settlement
SnapChat settled FTC charges alleging false promises of dis-
appearing messages and failure to protect consumer data.
Under the terms of its agreement with the FTC, SnapChat
is prohibited from misrepresenting the extent to which it
maintains the privacy, security, or confidentiality of users’
data. SnapChat must implement a comprehensive privacy
program that will be monitored by an independent privacy
professional for the next 20 years.
Questions
1. Which SnapChat claims of privacy protection were false?
2. Assume users relied on SnapChat’s state privacy policies
and claims about how the app worked. What potential
risks did SnapChat users face?
3. If you had used the SnapChat app to send disappear-
ing messages, what would you do when you learned of
SnapChat’s false claims?
4. Do you think the consequences SnapChat faced as part
of its settlement with the FT are harsh enough to deter
false claims? Explain.
Questions
1. Describe privacy.
2. What is the phenomenon where social users are concerned about privacy
but their behaviors contradict these concerns?
3. What is the use of social media to fi nd, screen, and select job candidates?
4. Rejecting a job candidate because of concerns about the person’s health
from information on his or her Facebook page is an example of what?
5. Age, disability, gender, religion, and race are examples of what?
6. Why are the legal concepts of discrimination and negligent hiring
competing demands on a business?
Any discussion about responsible conduct related to data and digital devices raises
more questions than answers. Does the availability of data justify their use? Can
shoppers keep their buying habits private? Can people keep their entertainment,
online gaming, and other legal activities confidential? Do media have the right to
publish or post highly private text messages of politicians and celebrities? Questions
about data access, collection, mining, tracking, monitoring, privacy, and profiling
are examples of IT capabilities that have ethical considerations. Here are cases of
the power of information and analytics taken too far. Another widely cited case is
Target’s use of data analytics as discussed in IT at Work 14.2.
14.2 Responsible Conduct
An angry man went into a Target store near Minneapolis
insisting on talking to a manager: He handed a Target pro-
motion that had been mailed to his daughter to the manager
saying: “My daughter got this in the mail. She’s still in high
school, and you’re sending her coupons for baby clothes and
cribs? Are you trying to encourage her to get pregnant?”
The confused manager had no idea what was going on. The
mailer had been sent by Target and addressed to the man’s
IT at Work 1 4 . 2
Target’s Big Data Analytics Too Invasive
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 448 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.2 Responsible Conduct 449
daughter, and it contained specials for maternity clothing
and nursery furniture. A few days later he called the father to
apologize again. Instead, the father apologized to the man-
ager, explaining that he has since learned that his daughter
was pregnant.
Big Data Analytics Too Invasive
How did Target know? By recognizing that there are some
brief periods in a person’s life when old routines change sig-
nificantly and new buying habits suddenly appear.
Using big data, models of buying habits, predictive
analytics, and her purchase history, Target had figured out
(with about 87 percent probability) that she was pregnant.
Target informed her family before she did. A lesson that
Target discovered fairly quickly is that knowing about preg-
nancies in advance creeps out people and can be a public
relations disaster (Duhigg, 2012). While Target assures
compliance with all privacy laws, not breaking the law does
not mean it is in the company’s best interest to invade cus-
tomers’ privacy.
How Does Target Make Such Accurate Predictions?
Target assigns all customers a guest ID number that is
linked to their credit card, name, e-mail address, and social
media profile. The guest IDs become a bucket to store
everything they have bought as well as demographic data.
The demographic data linked to the guest ID include age,
marital status, number of kids, address, how long it takes
to drive to the store, estimated salary, whether the person
moved recently, other credit cards, and visited websites.
Using its own predictive models, Target identifies custom-
ers who are pregnant.
Why Does Target Invest in Predictive Analytics?
Target’s strategy is to capture a greater share of spending
on baby items by being first to reach and promote to pro-
spective parents. Waiting for public birth records is too late
because by then parents are bombarded with offers and
incentives from competing companies. Not everyone appre-
ciates Target’s strategy.
Questions
1. Is Target’s data mining and predictive analytics a success,
a failure, or both? Explain your answer.
2. How does Target create profiles of customers?
3. Is Target’s “pregnancy predictor” a long-term competi-
tive advantage? Explain.
4. How can this predictor upset families who receive the
promotions?
5. How does Target make such accurate predictions?
6. Why does Target invest in predictive analytics?
CASES OF
IRRESPONSIBLE
CONDUCT
As new sets of data are collected about our lives, those data will contain a new set
of predictions about us waiting to be mined. The question will be how much control
we have over that process.
1. Predicting People’s Behavior
Predicting people’s behavior is big business—and increasingly feasible because of
the volume of accessible information. For example, credit card companies can scru-
tinize your purchases to detect if your life is about to change—so they know what
you are most interested in buying.
Canadian Tire, for instance, enabled its credit card business to create psycho-
logical profiles of its cardholders that were built using alarmingly precise correla-
tions. Through data analytics, Canadian Tire found that cardholders who purchased
carbon monoxide detectors, premium birdseed, and felt pads for the bottoms of
their chair legs rarely missed a payment. On the other hand, those who bought
cheap motor oil and visited a Montreal pool bar called “Sharx” were a higher risk
(Ciarelli, 2010).
Depending on how intrusive, companies may face backlash from customers or
be subject to investigations and fines. An example is Google’s Street View Wi-Fi
scandal—dubbed Wi-Spy.
2. Mobile Apps and Risky Behaviors
According to app security analytics firm Appthority’s App Reputation Report
(2014), 93 percent of the top 200 free apps for iOS and Androids exhibited at least
one risky behavior. However, so did 89 percent of the top 200 paid apps. Just about
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 449 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
450 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
every app requires that you click “yes” on the user agreement, which gives your
consent to use your data. Types of risky behaviors are:
1. Location tracking
2. Accessing the device’s address book or contact list
3. Identifying user or phone unique identifi er (UDID)
4. Recording in-app purchases
5. Sharing data with ad networks and analytics companies
Mobile apps, such as Twitter, Foursquare, and Instagram, routinely gather informa-
tion from personal address books and other places on your phone. Apple admits
that any app that gathers a user’s information without its permission is in violation.
However, Apple and Android can only monitor apps available through the Apple
Store and Google Play. There are countless third-party apps that are unregulated.
If a user has an app that allows a company to access data on his or her phone and
that phone is linked to the company’s network, then privacy violations will happen.
3. Google: Google’s Street View Wi-Spy Snooping Scandal
Google’s Street View cars (Figure 14.5) drove along U.S. streets—and later in
Europe, Canada, Mexico, and everywhere else—collecting a stream of images to
feed into Google Maps. Google’s engineers realized the cars could be used for
wardriving—driving around sniffing out and mapping the physical location of the
world’s Wi-Fi routers. Wardriving is also a hacking technique, an invasion of pri-
vacy, and an information security risk.
Creating a database of Wi-Fi hotspot locations would make Google Maps more
useful on mobile devices. Mobiles without GPS chips could use the database to
approximate their physical location, and GPS-enabled devices could use the system
to speed up their location-monitoring systems. When Google was building its system,
a few start-ups already had created their own Wi-Fi mapping databases. However,
Google was not only recording the location of people’s Wi-Fi routers. When a Street
View car encountered an open Wi-Fi network—a non-password-protected router—
it recorded all the digital traffic traveling across that router. That is, when the car was
within range of someone’s open router, Google captured personal data, including
login names and passwords, the full text of e-mails, Internet histories, people’s medi-
cal conditions, online dating searches, streaming movies, and all other traffic.
According to the FCC (Federal Communications Commission) report, French
investigators reviewed the data Google collected and found “an exchange of emails
between a married woman and man, both seeking an extra-marital relationship”
and “Web addresses that revealed the sexual preferences of consumers at specific
residences.” In the United States, Street View cars collected 200 gigabytes of pri-
vate data between 2008 and 2010. The sniffing stopped only when regulators discov-
ered the practice. Google denied any wrongdoing.
The FCC posted the following on its website: “Google’s behavior also raises
important concerns. Whether intentional or not, collecting information sent over
Wi-Fi networks clearly infringes on consumer privacy.”
The FCC determined that Google’s actions were not technically illegal because
snooping on unencrypted wireless data is not prohibited by the Wiretap Act. Given
that Google manages so much of our personal data, this privacy invasion is an
example of irresponsible conduct.
The story did not end with the FCC’s decision. In May 2012, the FCC’s investiga-
tion into Google’s mapping project was itself being investigated. The renewed atten-
tion followed release of a mostly unredacted version of the FCC’s findings in the case.
The unredacted findings appear to contradict Google’s claim that it inadvertently
intercepted “payload data,” or the content of individuals’ Internet communications,
in the process of gathering information from Wi-Fi networks across the globe for the
Street View project. The document shows that, during preparations for the Street
Figure 14.5 Google vehicle
with camera attached to
photograph images used in
Street View maps.
©
J
am
ie
P
ha
m
/A
la
m
y
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 450 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.2 Responsible Conduct 451
View effort, a Google engineer shared e-mails with colleagues at the firm revealing
that he designed software for the project that was capable of collecting payload data.
The new revelations have prompted Consumer Watchdog, a Washington-based advo-
cacy group, to call for a hearing by the Senate Judiciary Subcommittee on Privacy,
Technology and the Law.
4. Are FTC Fines for Privacy Violation Facebook’s
Business Model?
Facebook agreed to a settlement with the FTC in 2011 over charges that it deceived
users about privacy. The eight-count complaint accused Facebook of changing
privacy practices without notifying users, sharing users’ information without their
consent, and claiming to check the security of third-party applications when in fact
it did not, among other charges. As part of the settlement, Facebook promises to
stop making “deceptive privacy claims” and get users’ permission before changing
the way it shares their information. The social media company must also submit to
privacy audits for 20 years. Zuckerberg wrote a blog post repeating his dedication to
privacy while admitting that “we’ve made a bunch of mistakes.” Privacy advocates
do not believe that Facebook’s privacy violations were anything but well-calculated
decisions to test how far they could go before being charged by the FTC. In the
Daily Beast, Dan Ryan composed what Mark Zuckerberg might have said if he
dared to be brutally honest (Ryan, 2011):
The truth is, we have no interest in protecting your privacy, and if you still
believe that we do, then you are stupider than we thought, and believe me,
we already thought you were pretty stupid. Think about it. The only way
our business works is if we can track what you do and sell that information
to advertisers.
Knowing that privacy is unprotected on Facebook, does that shift any or all respon-
sibility to users?
These cases highlight contentious ethical issues and possibly irresponsible data-
driven business practices. There rarely are easy answers to these dilemmas.
Competing Responsibilities
Most major retailers, from supermarket and drug store chains to major investment
banks, rely on predictive analytics to understand consumers’ shopping habits and
their personal habits to market more efficiently. There are competing interests and
trade-offs at work when the issue is privacy. There is also no clear-cut framework
for deciding what is ethical and what is not. The personal privacy–public security
debate is a prime example. Typically, privacy invasion is considered unethical.
An ethically conscious corporate attitude sounds politically correct, but managers
also have a responsibility to stakeholders. Monitoring may be (or seem to be) the
responsible thing to do, and with intense competition marketers naturally want to
use every tool or technique to gain an edge or nullify a risk.
Globalization, the Internet, and connectivity have the power to undermine
moral responsibility because it becomes relatively easy to ignore harm. Despite the
challenges and lack of clear answers, ethics is important because relying on the law
alone to safeguard civil rights and society is insufficient. The law has its limits in
large part because it changes so slowly.
THREE-DIMENSIONAL
(3D) PRINTING AND
BIOPRINTING—
ADDITIVE
MANUFACTURING
DILEMMAS
Another trendy technology that has sparked ethical and other debates is the 3D
printer and 3D bioprinting. Actual and planned applications include pizzas and
heart valves (Martin, 2014). Prototype pizzeria 3D printers use cartridges filled with
foodlike powder. In 2014, surgeons used a 3D printed model of a baby’s skull in an
intricate surgery to correct a serious birth defect. Bioprinting of aortic valves and
3D bioprinting technology have been used by researchers at Cornell University to
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 451 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
452 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
fabricate living heart valves that possess the same anatomical architecture as the
original valve. In 2013, a two-year-old child in the United States received a wind-
pipe built with her own stem cells. 3D technology may seem like a win–win with
no dark side or ethics challenges. Unfortunately, that is not true. Tech Note 14.1
describes the technology involved in the 3D printing process.
TECH NOTE 14.1 3D Printing Process
3D printing works by depositing tiny layers of material to create any shape. Bio-
printing produces 3D biological objects or parts that are highly precise in shape and
mechanical complexity. Using computer-assisted design (CAD) and/or computer-
assisted manufacturing (CAM) blueprints, the bioprinter deposits ultrathin layers of
living cells upon each other, following a precise geometric pattern that matches the
heart valve dimensions, building the part vertically as the layers accumulate. Over
hours the fi nal tissue construct is completed.
3D Printing Dilemmas and Debated Issues
1. Despite benefi ts, the medical application of 3D printing to produce living tis-
sue and organs, or 3D bioprinting, is expected to spark major ethical debates,
according to Gartner (2014). 3D-bioprinted human organs may be subject to
confl icting religious, political, moral, and fi nancial interests. The 3D printing of
nonliving medical devices, such as prosthetic limbs, is expected to be in high de-
mand because of longer life spans and insuffi cient levels of health care in various
countries. A major hurdle is determining who is legally responsible for ensuring
the quality of the resulting organs and devices? Without medical malpractice
insurance covering these new applications, they cannot proceed.
2. According to a study by sustainable design strategist and Berkeley mechanical
engineering expert Jeremy Faludi, 3D printers can exert impacts on the environ-
ment worse than those of standard manufacturing (Martin, 2014). The carbon
footprint depends on what is being made and type of printer used to make it. 3D
printers use a lot more energy than conventional milling machines. 3D printers
can use 100 times more electricity to produce a part than would have been used
to produce the same part by nonadditive manufacturing.
3. Gartner (2014) predicts that, by 2018, at least seven of the world’s top multichan-
nel retailers will be using 3D printing technology to manufacture custom stock
orders. The technology will create new business models and major challenges to
intellectual property (IP)—causing an estimated loss of at least $100 billion per
year in IP globally. The risks resulting from the ability to 3D print weapons are
obvious.
Questions
1. By avoiding illegal conduct, do companies also act responsibly? Explain
your answer.
2. What types of companies can benefi t from predicting people’s behavior?
3. When is predicting people’s behavior a violation of privacy? Give an
example.
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 452 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.3 Technology Addictions and the Emerging Trend of Focus Management 453
4. When is predicting people’s behavior not a violation of privacy? Give an
example.
5. What are the ethical challenges attached to 3D printing and 3D
bioprinting?
6. Research the current debate about 3D printing and bioprinting.
Many people live and work in a state of continuous partial attention as they move
through their day—loosely connected to friends and family through various apps on
mobile and wearable devices.
Consider what you use to stay informed and how often you glance at them. You
might not have noticed the gradual increase in the amount of data and information
that you receive or check routinely until one day they seem to overwhelm your time.
How many more things do you check today compared to a year ago? How long can
you go without checking your devices without experiencing anxiety? When do you
put down your mobiles and concentrate on one thing at a time? Your answers may
indicate digital or connectivity overload and your tolerance for distractions.
The time between a new device or app going from must have to cannot function
without is rather short. This situation is not limited to only digital natives. Studies
show that adults are just as distracted as teenagers, which can also be confirmed
with a casual glance at offices, airports, cafes, and so on.
14.3 Technology Addictions and the Emerging Trend
of Focus Management
DIGITAL DISTRACTIONS
AND LOSS OF FOCUS
People do not need to be reminded how their lives are being taken over by tweets,
texts, e-mail, social media, and annoying electronic static. Business users are more
likely to suffer from too much data, rather than from data scarcity. This condition,
known as cognitive overload, interferes with our ability to focus and be productive.
Maggie Jackson (2008) suggested: “We’re really facing the limit of human ability to
cope with stimuli in our environment.”
How big is this problem and how much does it cost? Some researchers estimate
that distraction costs hundreds of billions of dollars a year in lost productivity.
Gloria Mark, a professor of informatics at the University of California, Irvine, says
a worker distracted by a Web search that goes rogue or a new text or tweet can take
about 25 minutes to return to the task at hand and get focused again (Dumaine,
2014). Digital distraction and lack of focus in the workplace is getting the atten-
tion of senior management. When Inc. called the CEOs of technology companies
Instagram, Box, and Zumba, they confirmed that the lack of focus on the job is a
big concern for them.
FOCUS
MANAGEMENT—THE
ANTIDISTRACTION
MOVEMENT
Senior management at Google, SAP, Instagram, Box, and Zumba are experiment-
ing with new ways to diminish cognitive overload in order to help their employees
stay focused. For example, at Google, employees take courses that help to sharpen
their attention skills. The founders of Zumba and Box have developed their own
methods to carve out focus time, such as putting aside large blocks of time to think
undisturbed.
The Importance of Being Able to Focus
Nobel Prize–winning neuroscientist Eric Kandel wrote in his book In Search of
Memory that only by intensely concentrating can a person link new ideas and
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 453 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
454 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
facts “…meaningfully and systematically with knowledge already well-established
in memory” (Kandel, 2006). He explained the importance of mental discipline to
successful performance. If your mind is free of distraction, your mind is better able
to absorb data, interactions, and trends and synthesize the new information with
what you already know. As a result, you are more likely to come up with innovative
ideas. If you are multitasking or are trying to function with only partial attention,
your ability to synthesize information may be compromised.
Researchers at the Communication Between Humans and Interactive Media
Lab at Stanford University studied digital distraction and focus. In 2009, research-
ers gave the same three cognitive tests to two different groups of test subjects:
1. Media (high) multitaskers. Forty-nine subjects who spent a lot of time searching
the Internet, gaming online, watching TV, and hanging out on social media sites.
2. Low multitaskers. Fifty-two subjects who spent less time online and multitasked
signifi cantly less often.
In 2009, many believed that the Internet sharpened cognitive skills. Gaming
required fast thinking and good motor skills. In contrast to widely held assumptions,
the subjects who were heavy online users scored poorly on the cognitive test. One
explanation for their poor performance was that they had attention deficits—less
control over their attention. Because of their inability to concentrate for long, they
were not able to distinguish important information from trivia. One of the research-
ers, Clifford Nass, whose findings are published in the Proceedings of the National
Academy of Sciences, said “They’re suckers for irrelevancy. Everything distracts
them” (Ophir, Nass, & Wagner, 2009). The researchers continue to study whether
chronic media multitaskers are born with an inability to concentrate or are damag-
ing their cognitive control by willingly taking in so much at once. Science also shows
that the best strategy to improve focus is to practice doing it.
Michael Merzenich, a neuroscientist, gave a biological explanation of the
impacts of multitasking on focus ability. He explained that the more you focus, the
more your brain releases a chemical called noradrenaline, which helps you concen-
trate on the task at hand. While these researchers believe that the minds of multi-
taskers are not working as well as they could, there are those who disagree (Ophir,
Nass, & Wagner, 2009).
Questions
1. What are several potential causes of cognitive overload?
2. What are the consequences of constant distractions?
3. When a person is distracted, how long does it take to return to the task
at hand and get focused again?
4. Why are senior managers interested in focus management?
5. What is the difference between the performance of high and low multi-
taskers on cognitive tests?
6. How can multitaskers improve their ability to focus?
Accenture’s Technology Vision 2014 is an analysis of key IT trends that are expected
to disrupt businesses. It is updated yearly to help organizations set their IT strategy
and investment priorities. According to Vision 2014, becoming a truly digital busi-
ness is crucial to how enterprises innovate and differentiate from competitors. A
comparison of the disruptive technologies in 2013 and 2014 are listed in Table 14.2.
14.4 Six Technology Trends Transforming Business
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 454 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
14.4 Six Technology Trends Transforming Business 455
Technology Vision 2014 explores the six IT trends that hold the most potential to
transform businesses over the next three years. The days of innovative, technology-
focused start-ups being the only market disruptors may be coming to an end. Large
enterprises are starting to take advantage of their size, skills, and scale to transform
into truly digital businesses.
TABLE 14.2 Comparison of Technology Trends, 2013 and 2014
2013 2014
Beyond the cloud Digital-physical blur
Seamless collaboration From workforce to crowdsource
Design for analytics Data supply chain
Data velocity Harnessing hyperscale
Software-defi ned networking Business of applications
Active defense Architecting resilience
TREND 1 DIGITAL-
PHYSICAL BLUR:
EXTENDING
INTELLIGENCE TO
THE EDGE
The convergence of several technologies is blurring the digital and physical worlds.
These converging technologies are:
• The explosion of connected M2M (machine-to-machine) devices and IoT
(Internet of Things)
• Greater bandwidth
• Advanced robotics, including expanding human–robot collaboration in
industries beyond manufacturing
• Increased use of real time analytics
The physical–digital blur signifies a new layer of connected intelligence that
augments employees, automates processes, and integrates machines into our lives.
Controlling the physical world with sensors and digital devices depends on band-
width and the ability to analyze data in real time.
Smartphones transform users’ digitally augmented versions of themselves—
able to create and share information in real time. Wearable devices and autono-
mous drones are changing the ways in which we experience the world. Intelligent
interfaces are emerging that allow decisions to be made on the edge—where digital
and physical worlds meet, which could be on your wrist, in your hand, or in your
field of vision.
As the line between digital technology and the real world continues to blur,
traditional companies are leveraging and enhancing their physical assets to create
better user experiences.
TREND 2 FROM
WORKFORCE TO
CROWDSOURCE:
THE RISE OF THE
BORDERLESS
ENTERPRISE
With cloud, social, and collaboration technologies, organizations can access and
leverage talent and resource pools located anywhere and everywhere; in effect, an
enterprise where ideas are solicited from a crowd of experts, that is, crowdsourced,
similar to Kickstarter’s crowdfunding concept.
In addition to crowdfunding, companies are using Kickstarter to provide mar-
ket insight and assess product viability for a lot less than what traditional methods
cost. By determining what people will actually pay for, the process influences and
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 455 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
456 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
validates products and pricing strategies and sometimes leads to initial consumption
and to product advocates. Accenture has developed initial models that show that
crowdsourcing can lead to higher profits for producers.
Wikipedia relies on crowdsourcing for its content. Harnessing talent
and resources to support strategic business goals will always be a challenge.
Crowdsourcing can give every business access to an agile workforce that is not only
better suited to solving some of the problems that organizations struggle with today
but in many cases will do it for free. For example, GE currently uses crowdsourcing
services to solve its most complex problems.
TREND 3 DATA SUPPLY
CHAIN: PUTTING
INFORMATION INTO
CIRCULATION
Because of legacy systems and data silos that limit the value that organizations get
out of their data, enterprise data are often underutilized. Accenture recommends
that companies start treating data like a supply chain. Data need to flow easily
through the entire organization—and eventually throughout the data systems of
their business partners.
Achieving seamless data flows and treating data like an asset require data
storage, IT infrastructure, big data platforms, and APIs. Walgreens, for example,
opened its prescription API to third-party developers in order to make it easier for
customers to refill their prescriptions.
Only one in five companies integrates its data across the enterprise. To truly
unlock the potential of big data, companies have to treat it more like a supply chain,
enabling its flow through the organization and supplier ecosystem. One way to do
this, as Google has shown with Google maps data, is opening up the applications
programming interface. The result—800,000 websites use Google Maps data.
TREND 4 HARNESSING
HYPERSCALE:
HARDWARE IS CRITICAL
AGAIN
For many years, software has been the focus of managers’ attention, with hardware
being largely ignored. With enormous demands for processing power, hardware
matters more than ever in transforming enterprises into digital businesses.
Every industry is being impacted by hyperscale computing systems—the super-
sized, scalable, and resilient data centers pioneered by data-dependent and social
media companies.
Traditional consumer goods company Unilever, tire manufacturer Pirelli, and the
NBA have data processing requirements similar to technology giants Amazon and
Google. All of them are faced with data challenges that hyperscale computing can
help to solve, specifically huge amounts of data that need to be processed at speed—
in real time. Unilever, Pirelli, and the NBA are using the sap.com platform SAP
HANA to perform real time analytics on huge datasets for competitive advantage.
Ford, GM, and Toyota build vehicles that are embedded with hundreds of sensors,
telematics, and real time connectivity. Data collection every day, hour, or second
depends on hyperscale systems that can store and analyze these data at speed. High-
performance companies are increasingly recognizing that hyperscale systems are a
vital part of becoming a digital business.
Hardware is a hotbed of innovation as companies optimize their power con-
sumption, processors, solid-state memory, and infrastructure architectures to
increase data center efficiency, scale upward, and drive down costs.
TREND 5 BUSINESS OF
APPLICATIONS: THERE’S
AN APP FOR THAT!
Enterprises are following consumers by rapidly adopting apps to create better oper-
ational agility. Accenture says that 54 percent of the highest performing IT teams
have already deployed enterprise app stores. This makes life simpler for employees
and accelerates business growth.
TREND 6
ARCHITECTING
RESILIENCE: BUILT TO
BE FAILURE PROOF
Business runs on networks and digital technology. Technology failures are busi-
ness failures. That is why companies such as Netflix use automated testing tools
to attack their systems to make sure they are resilient. For example, Netflix built
resiliency into its IT architecture by following two design principles: isolation and
redundancy. Isolation means that a failure in one component cannot bring down
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 456 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
Assuring Your Learning 457
the entire edifice, while redundancy means that every component is backed up by
an alternative in case it fails.
IT must adopt a new mindset to ensure that systems are dynamic, accessible,
and continuous—designed not just to specification but also for resilience under
failure and attack.
NEXT WAVE OF
DISRUPTION WILL BE
MORE DISRUPTIVE
High-performing business leaders now accept that their organizations’ future suc-
cess is tied to their ability to keep pace with technology. Accenture reports that
its clients tell them that technology is more important than ever to their business
success. Some sense that we are on the verge of a new technology revolution that
will be more disruptive than previous ones. The flexibility of new technologies
and architectures will naturally change how IT makes it easier for organizations to
innovate.
Questions
1. What technologies are blurring the boundary between the physical and
digital worlds?
2. What are the benefi ts of crowdsourcing?
3. Referring to trend 3, how should companies treat their data?
4. What is hyperscale?
5. What do business apps improve?
6. Why is resilience necessary?
Key Terms
breach of privacy
civil right
cognitive overload
corporate social media
discrimination
discrimination
hyperscale
isolation
negligent hiring
open Wi-Fi network
privacy
privacy paradox
protected class
redundancy
social recruitment
wardriving
Assuring Your Learning
1. Why will companies and recruiters continue to engage
in social recruiting?
2. Visit two or more social media sites and review infor-
mation that people have posted about themselves—
or their friends have posted about them. What types
of protected class information did you fi nd? Give
examples.
3. When organizations source their hiring to recruiting
fi rms, how might that increase or decrease the risk of
social media discrimination?
4. Consider Max Drucker’s statement about employers
being in a “tough spot.” Explain the two risks that
employers face.
5. How has IT changed the way you communicate in
the last two years?
6. What changes do you predict in the way we commu-
nicate with each other in future?
7. Many questions were asked in the fi rst two sections
of this chapter—about the privacy paradox, privacy,
and civil rights and responsible conduct. Answer
those questions.
8. In your opinion, how does multitasking impact your
performance?
DISCUSS: Critical Thinking Questions
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 457 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
458 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
1. Social media discrimination is now a serious consid-
eration for employers. Managers can evaluate vendor
options such as LinkedIn Recruiter to limit liability
and to remove protected information from profi les.
Venture-funded startup BranchOut offers a similar
tool for Facebook recruiting called RecruiterConnect.
a. Research recruiting service providers and
vendors. Select two of them.
b. Review the website of each service or vendor.
c. Describe the features they provide to defend
against negligent hiring.
d. Do each of them protect against social
discrimination? Explain your answer and give
examples.
EXPLORE: Online and Interactive Exercises
1. Refer to the discrimination scenarios in this chapter.
For each scenario, explain whether or not it should
be used in the hiring decision.
2. In your opinion, what is the meaning of responsible
conduct with respect to the use of social media for
screening purposes?
3. Do you agree with the FTC’s 2011 rule that states
that searches by hiring companies into how you
spend your personal time, hobbies, and the like do
not violate your privacy?
4. Clerks at 7-Eleven stores enter data regarding cus-
tomers’ gender, approximate age, and so on, into a
computer system. However, names are not keyed in.
These data are then aggregated and analyzed to im-
prove corporate decision making. Customers are not
informed about this, nor are they asked for permis-
sion. What problems do you see with this practice?
5. Discuss whether cognitive overload is a problem in
your work or education. Based on your experience,
what personal and organizational solutions can you
recommend for this problem?
6. Assume that you read about a new nonalcoholic
drink discovery called “Don’t-forget-a-thing.” This
remarkable drink, being marketed to students for
$9.99 plus shipping and handling, would give the
ANALYZE & DECIDE: Apply IT Concepts to Business Decisions
perfect recall of what he or she had read in the text-
book in preparation for the exam. How would you
verify the truth and accuracy of this drink—or any
new drink or drug treatment—before ordering it or
ingesting it? Identify fi ve sources of trusted health,
medical, or drug information.
7. The State of California maintains a database of
people who allegedly abuse children. (The database
also includes names of the alleged victims.) The list
is made available to dozens of public agencies, and it
is considered in cases of child adoption and employ-
ment decisions. Because so many people have access
to the list, its content is easily disclosed to outsiders.
An alleged abuser and her child, whose case was
dropped but whose names had remained on the list,
sued the State of California for invasion of privacy.
Debate the issues involved. Specifi cally:
a. Who should make the decision or what criteria
should guide the decision about what names
should be included and what the criteria
should be?
b. What is the potential damage to the abusers
(if any)?
c. Should the State of California abolish the list?
Why or why not?
Business Case: Apple’s CarPlay Gets Intelligent
At the 2014 Geneva International Motor Show, Apple unveiled
CarPlay, an integration that ties Apple’s mobile operating
system (iOS) into automobiles.
CarPlay is Apple’s iPhone in-car integration system. It lets
drivers perform voice-enabled and touch-screen control of
things, like making and answering calls, text messaging, and
playing music, and also anticipates their needs by plotting
driving routes based on their schedule and normal routine.
Originally named “iOS in the Car,” the service supports third-
party music apps like Spotify and iHeartRadio and will be
available in cars made by, for example, Ferrari, Mercedes, and
Volvo.
An interesting part of the announcement were details
about CarPlay’s artifi cial intelligence (AI) capabilities. The
CASE 14.2
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 458 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
References 459
software can scan through a user’s data, such as calendar or
e-mails, to try to pull up relevant destinations and driving
directions. With that, Apple has made its biggest push into
predictive services.
Apple already has the personal assistant Siri since the
iPhone 4S release, but so far, the service has not had an
emphasis on technology based on the user’s context. CarPlay
supports the iPhone 5, iPhone 5S, and iPhone 5C running
iOS 7, which may also help drive new customers to the Apple
ecosystem and push users with older iPhone models to
upgrade.
Questions
1. Using privacy concepts from this chapter, identify the
ways in which CarPlay can violate a user’s privacy.
2. Consider the privacy paradox. How does that principle
predict users’ reactions to CarPlay? That is, do you
expect users to be willing adopters of this AI
technology?
3. Getting a customer hooked on the CarPlay technology
means that the company is positioned to expand on it
out of the vehicle, especially in the areas of wearables
and home appliances. How might the integration of data
from your car, smartphone, wearables, and home appli-
ances impact your privacy?
4. What are your concerns about CarPlay’s predictive
analytics capabilities?
5. Do people who decide to use CarPlay also have a reason-
able expectation of privacy? Explain.
Video Case: Vehicle-to-Vehicle Technology to Prevent Collisions
In Ann Arbor, Michigan, the U.S. Department of Transporta-
tion (DOT), the University of Michigan Transportation Research
Institute, and the Michigan Department of Transportation did
a pilot test of 3,000 cars, trucks, and buses equipped with
vehicle-to-vehicle (V2V) communications. Based on the success
of the pilot project, in 2014 the DOT announced that it would
take steps to enable V2V communications to prevent colli-
sions. V2V technology is the next generation of auto safety
improvements—after seatbelts and airbags. By helping drivers
avoid crashes, V2V communication will play a key role in the
U.S. remaining the leader in the global automotive industry.
The technology informs drivers of changing road condi-
tions and potential dangers in order to prevent accidents.
These wireless systems are networked with traffi c manage-
ment systems. For example, if an agency learns that brakes
have been applied several times in the same spot, a road crew
could be dispatched to treat the pavement. Additionally, if a
crash is detected, drivers can be diverted to alternate routes.
Visit YouTube and search Michigan Department of Trans-
portation for the video, dated September 17, 2012. The video
is also posted on StateTechMagazine.com where you can
search the same title.
Questions
1. How much do crashes cost society?
2. What can help decrease crashes?
3. What types and percent of crashes can connected vehicle
technology prevent?
4. What are other benefi ts of connected vehicle technology?
5. What are some of the benefi ts of a traffi c management
system?
CASE 14.3
Accenture. Technology Vision 2014: Every Business is a Digital
Business. January 27, 2014. accenture.com/us-en/technology/
technology-labs/Pages/insight-technology-vision-2014.aspx
Appthority. App Reputation Report. Summer 2014. appthority.
com/resources/app-reputation-report
Bader, C. “The Risks and Responsibilities of Tech Innovation.”
MIT Sloan Management Review, June 10, 2014.
Blank, G., G. Bolsover, and E.Dubois, “A New Privacy Para-
dox: Young People and Privacy on Social Network Sites.”
Oxford Internet Institute. May 9, 2014. oxfordmartin.ox.ac.
uk/downloads/A%20New%20Privacy%20Paradox%20
April%202014
CareerBuilder.com. “Forty-Five Percent of Employers Use
Social Networking Sites to Research Job Candidates, Career-
Builder Survey Finds.” August 19, 2009.
Cavoukian, A. “Privacy is a Social Norm.” The Globe and Mail,
August 23, 2012.
Ciarelli, N. “How Visa Predicts Divorce.” The Daily Beast,
April 6, 2010.
Ciccatelli, A. “SEC Issues New Social Media Guidance for
Financial Advisors.” Inside Counsel, April 3, 2014.
Cohen, J. & Balz, D. “Poll: Privacy Concerns Rise after NSA
Leaks.” The Washington Post, July 23, 2013.
Davis, W. N. “Google Glass is already causing legal experts to
see problems.” ABA Journal Law News. April 1, 2014.
Dobuzinskis, A. “California Woman Ticketed for Driving with
Google Glass.” Reuters, October 31, 2013.
Duhigg, C. “How Companies Learn Your Secrets.” The New York
Times. February 16, 2012. nytimes.com/2012/02/19/magazine/
shopping-habits.html?pagewanted 1&_r 2&hp&
References
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 459 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
460 Chapter 14 Ethical Risks and Responsibilities of IT Innovations
Dumaine, B. “The Kings of Concentration.” Inc. Magazine,
May 2014.
Equal Employment Opportunity Commission. “Social Media
Is Part of Today’s Workplace But Its Use May Raise Employ-
ment Discrimination Concerns.” Press release, EEOC.gov,
March 12, 2014.
Fitzpatrick, A. & G. Kibel “Technology, Digital Media and
Privacy Alert.” Inside Counsel, June 17, 2014. insidecounsel.
com/2014/06/17/technology-digital-media-and-privacy-alert
Gartner. “Gartner Says Uses of 3D Printing Will Ignite Major
Debate on Ethics and Regulation.” Press release, January 29,
2014. http://www.gartner.com/newsroom/id/2658315
Jackson, M. The Erosion of Attention and the Coming Dark
Age. Amherst, NY: Prometheus Books 2008,
Kandel, E.R. In Search of Memory. New York, NY: W. W.
Norton & Company, 2006.
Martin, G. “So 3-D Printers May Be Nifty and Trendy, But
Environmentally Friendly? Not Necessarily.” California
Magazine of UC Berkeley, March 11, 2014.
Ophir, E., Nass, C. and Wagner, A. “Cognitive control in media
multitaskers.” Proceedings of the National Academy of
Sciences. Vol. 106, No. 37. September 15, 2009.
Perry, T. “Woman wearing Google Glass found not guilty of
distracted driving.” LA Times. January 16, 2014.
Rainie, L., S. Kiesler, R. Kang, & H. Madden. “Anonymity,
Privacy, and Security Online.” PEWInternet.org, 2013.
Ryan, D. “The Truth About Facebook Privacy—If Zuckerberg
Got Real.” The Daily Beast, November 30, 2011.
Taylor, J. “Feds Interrogate Man Wearing Google Glass in
Movie Theater.” BetaBeat.com, January 21, 2014.
Whitney, L. “Google Glass Wearer Challenges Distracted
Driving Charge.” CNET.com, December 4, 2013.
c14EthicalRisksAndResponsibilitiesOfITInnovations.indd Page 460 11/10/14 11:15 AM f-w-204a /208/WB01490/9781118897782/ch14/text_s
2D tag A barcode-like image used to identify a merchant or payee.
3D bioprinting Medical application of 3D printing to produce living
tissue and organs.
3D printing Also known as additive manufacturing, builds objects
layer-by-layer to create real-world objects.
5G Fifth generation mobile communications network.
Acceptable use policy (AUP) Explains what management has
decided are acceptable and unacceptable activities, and the conse-
quences of noncompliance.
Access control Limiting access to certain documents or data.
Active data warehouse Real-time data warehousing and analytics.
Ad hoc report An unplanned report that is generated to a mobile
device or computer on demand as needed.
Additive manufacturing See 3D printing.
Advanced persistent threat (APT) Stealth network attack in which
an unauthorized person gains access to a network and remains
undetected for a long time.
Aggregation A calculation, such as Sum, Average, or Count.
Agility The ability to respond quickly and appropriately.
Analytical tools Software or apps for data analysis.
Anonymous A loose association of hacktivists.
Application controls Safeguards that are intended to protect specific
applications.
Application programming interface (API) A gateway to facilitate the
transfer of data from one website app to another.
Applications portfolio List of major, approved IS projects that are
also consistent with the long-range plan.
Assets Things of value that need to be protected.
Asynchronous Javascript and XML A group of technologies and
programming languages that make it possible for webpages to
respond to users’ actions without requiring the entire page to reload.
Attack vectors Vulnerabilities that exist in networks, operating sys-
tems, apps, databases, mobile devices, and cloud environments.
Audit Procedure of generating, recording, and reviewing a chrono-
logical record of system events to determine their accuracy.
Augmented reality A technology that superimposes a computer-
generated image onto an image of the real world to provide infor-
mation or entertainment.
Avatar An icon, figure, or visual representation of a person in com-
puter games, simulations, virtual worlds, or online discussion forums.
Backdoors Type of malware that enables access to a network without
logging in.
Backlinks External links that point back to a site.
Back-office operations Activities that support the fulfillment of
orders.
Bandwidth A network’s capacity or throughput.
Barcode A machine-readable code consisting of numbers and a pat-
tern of thick and thin lines that can be scanned to identify the object
on which the code appears.
Baseline Specification of the project plan that has been formally
reviewed and agreed upon. It should be changed only through a
formal change control process.
Big data Datasets whose size and speed are beyond the ability of typi-
cal database software tools to capture, store, manage, and analyze.
Biometric control Automated method of verifying the identity of a
person, based on physical or behavioral characteristics.
Black hat SEO Search engine optimization tactics that try to trick a
search engine into thinking a website has high-quality content, when
in fact it does not.
BlackPOS Malware designed to be installed on POS devices in order
to record data from credit and debit cards swiped through the
infected device.
Blog Online journals where people regularly post personal or profes-
sional content in a variety of digital formats including text, photo-
graphs, video, and music.
Blogging platform A software application used to create, edit and add
features to a blog. WordPress and Blogger are two of the most
popular blogging platforms.
Blogosphere A network enabling bloggers to comment on, and link
to other blogs in their posts, in effect maintaining a dialogue or
conversation with other bloggers.
Botnet A network of hijacked computers that are controlled remotely,
typically to launch spam or spyware.
Breach of privacy Unauthorized disclosure of personal information.
Bring your own apps (BYOA) Employees use their own apps instead
of using apps provided by the company.
Broadband Refers to wide bandwidth technologies that create fast,
high-volume connections to the Internet and World Wide Web.
Business case Presentation or document that outlines the justification
for the start-up and funding of a project.
Business intelligence (BI) Category of applications for gathering,
storing, analyzing, and providing access to data to help enterprise
users make better decisions.
Business process management (BPM) Methods, tools, and technol-
ogy to support and continuously improve business processes.
Business process reengineering (BPR) Eliminating the unnecessary
non-value-added processes, then simplifying and automating the
remaining processes to significantly reduce cycle time, labor, and
costs.
Business processes Series of steps by which organizations coordinate
and organize tasks to get work done.
Business record Documentation of a business event, action, decision,
or transaction.
Business-driven development approach A development approach
that starts with business strategy and work backwards to identify
data sources and data that needs to be acquired and analyzed.
Business-to-business (B2B) Markets in which the buyers, sellers, and
transactions involve only organizations, not individual consumers.
Business-to-business (B2B) commerce Selling products and services
to other businesses.
BYOD Bring your own device is a growing trend in which employees
use their own devices for business purposes.
Capital budgeting The process of analyzing and selecting investments
with the highest ROI.
Cascading style sheets (CSS) A language used to enhance the appear-
ance of webpages written in a markup language.
Change data capture (CDC) CDC processes capture the changes
made at data sources and then apply those changes throughout
enterprise data stores to keep data synchronized.
Glossary
G-1
BMGlossary.indd Page G-1 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
G-2 Glossary
Critical infrastructure Systems and assets, whether physical or virtual,
so vital to the United States that the incapacity or destruction of
such systems and assets would have a debilitating impact on secu-
rity, national economic security, national public health or safety, or
any combination of those matters.
Critical path Longest path of tasks through a project, as shown on a
Gantt chart. A delay of any task on the critical path will delay the
project.
Critical success factors (CSFS) Those things that must go right for a
company to achieve its mission.
Critical task Task or activity on the critical path.
Cross-functional business process Involves two or more functions, for
example, order fulfillment and product development.
Cross-sell To sell additional complimentary products or services.
Crowdfunding Raising funds for a project from the public, or crowd,
via the web.
Crowdsourcing A model of problem solving and idea generation that
marshals the collective talents of a large group of people.
Customer experience (CX) Building the digital infrastructure that
allows customers to do whatever they want to do, through whatever
channel they choose to do it.
Customer lifetime value (CLV) Formula for estimating the dollar
value, or worth, of a long-term relationship with a customer.
Customer-centric Business models strive to create the best solution
or experience for the customer. In contrast, product-centric models
are internally focused on creating the best product.
Cycle time Time required to complete a given process.
Dashboards Data visualizations that display the current status of key
performance indicators (KPIs) in easy-to-understand formats.
Data Data are the raw material from which information is produced;
and the quality, reliability, and integrity of the data must be main-
tained for the information to be useful.
Data analytics Refers to the use of software and statistics to find
meaningful insight in the data, or better understand the data.
Data center A location storing a large number of network servers
used for the storage, processing, management, distribution, and
archiving of data, systems, web traffic, services, and enterprise
applications. Data center also refers to the building or facility that
houses the servers and equipment.
Data disclosure Reporting system where data items are tagged to
make them easily searchable.
Data discovery Data exploration and discovery of hidden relation-
ships.
Data entity Anything real or abstract about which a company wants
to collect and store data.
Data governance Control of enterprise data through formal poli-
cies and procedures to help insure that data can be trusted and is
accessible.
Data mart Is a lower-cost, scaled-down version of a data warehouse
that can be implemented in a much shorter time. Data marts serve
a specific department or function, such as finance, marketing, or
operations.
Data mining Is a specific analytic technique that enables users to
analyze data from various dimensions or angles, categorize it, and
find correlations or patterns among fields in the data warehouse.
Data science Managing and analyzing massive sets of data for pur-
poses such as target marketing, trend analysis, and the creation of
individually tailored products and services.
Data silo Stand-alone data stores available for a specific function or
department, but not accessible by other ISs.
Data tampering A common means of attack that is overshadowed by
other types of attacks. It refers to an attack during which someone
Channel conflict Competition between a manufacturer’s distribution
partners that sell through different channels. Channel conflict can
occur at the wholesale, retail, or internal sales department level.
Circuit switching A telecom network that transmits voice or data via
a dedicated channel (connection).
Click-through rates (CTR) The percentage of people who click on a
hyperlinked area of a SERP or webpage.
Climate change mitigation Any action to limit the magnitude of long-
term climate change.
Cloud computing A general term that refers to a style of computing in
which IT services are delivered on-demand and accessible via the
Internet. Common examples are Dropbox, Gmail, and Google Drive.
Cloud computing stack Cloud Computing is often described as a stack
consisting of a broad range of services built on top of one another,
for example SaaS, PaaS, and IaaS.
Cloud storage service Remote network storage that makes it easy to
access your documents from any of the devices you work on.
Cloud strategy Short for cloud computing IT strategy.
COBIT (Control Objectives for Information and Related
Technology) IT governance framework which many companies
use as their IT governance guide.
Cognitive overload Condition when business users suffer from too
much data that interferes with their ability to focus and be productive.
Collaborative filtering Makes recommendations based on a user’s
similarities to other people.
Collection analysis module Creates utility indexes that aid in provid-
ing search results.
Command and control (C&C) channel The way in which botnets are
controlled remotely or used to carry out malicious activities.
Commodities Basic things that companies need to function.
Competitive advantage A difference between a company and its
competitors that matters to customers.
Competitive forces model Model developed by Michael Porter, also
called the five-forces model, to identify competitive strategies.
Computer-integrated manufacturing (CIM) Computer-integrated
systems that control day-to-day shop floor activities.
Consumerization of information technology (COIT) Trend where
more and more users bring their personal mobile devices and
their own mobile apps to work and connect them to the corporate
network.
Content-based filtering Recommends products based on the product
features of items the customer has interacted with in the past.
Contract hackers Hackers available for hire or complete hack attacks
that can be bought.
Core business processes Accounting, finance, sales, marketing,
human resources, inventory, production, and manufacturing.
Corporate procurement or purchasing The buying of products and
services by an organization for its operational and functional needs.
Corporate social media discrimination Illegal use of information
about protected classes to select or weed out candidates.
Crawler control module A software program that controls a number
of “spiders” responsible for scanning or crawling information on the
web.
Crawler search engines Rely on sophisticated computer programs
called “spiders,” “crawlers,” or “bots” that surf the Internet, locat-
ing webpages, links, and other content that are then stored in the
SE’s page repository.
Creative destruction A term coined by the economist Joseph
Schumpeter in 1942 to warn that innovation can disrupt industries
in capitalistic societies and force established companies and busi-
ness models to either adapt or fail.
Credentials Log-in information, such as username, password, or PIN.
BMGlossary.indd Page G-2 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Glossary G-3
E-commerce Process of buying, selling, transferring, or exchanging
products or services or information via the public Internet or pri-
vate corporate networks.
Economic order quantity (EOQ) An inventory model that is used to
answer both questions of when to order and how much to order,
the EOQ model takes all costs into consideration.
EEOC (Equal Employment Opportunity Commission) Enforces
federal laws prohibiting discrimination in employment.
Electronic fund transfer (EFT) A transfer of funds from one bank
account to another over a computerized network.
Electronic records management (ERM) A system that consists of
hardware and software that manage and archive electronic docu-
ments and image paper documents; then index and store them
according to company policy.
Electronic wallet (e-wallet) A software application that can store
encrypted information about a user’s credit cards, bank accounts,
and other information necessary to complete electronic transac-
tions, eliminating the need to re-enter the information during the
transaction.
Enterprise 2.0 The use of social media tools for collaboration on
company intranets to increase productivity.
Enterprise application integration (EAI) Middleware that connects and
acts as a go-between for applications and their business processes.
Enterprise architecture (EA) The way IT systems and processes are
structured. EA is an ongoing process of creating, maintaining, and
leveraging IT. It helps to solve two critical challenges: where an
organization is going and how it will get there.
Enterprise data mashup Combination of data from various business
systems and external sources, often in real-time, without necessarily
relying on a middle step of ETL (extract, transform, and load) from
a data warehouse.
Enterprise data warehouse (EDW) A data warehouse that pulls
together data from disparate sources and databases across an entire
enterprise.
Enterprise graph Platform that shows how users are related to one
another. It enables developers and customers to seamlessly connect
people, conversations, and data across all their business services.
Enterprise IT architecture Guides the evolution and expansion of
information systems, digital technology, and business processes.
Enterprise mashups Combining data from internal business sources
(e.g., sales records, customer information, etc.) and/or information
from external sources for enhanced usefulness and productivity.
Enterprise risk management (ERM) Risk-based approach to manag-
ing an enterprise that integrates internal control, the Sarbanes–
Oxley Act mandates, and strategic planning. ERM is intended to be
part of routine planning processes rather than a separate initiative.
Enterprise search tools Used by employees to search for and retrieve
information related to their work in a manner that complies with
the organization’s information-sharing and access control policies.
Enterprise social Private (company-owned) social media, software,
platforms, or apps specially designed for use by business leaders and
employees to fulfill the strategic mission.
Enterprise systems Cross-functional and inter-organizational systems
that support the business strategy.
E-procurement The re-engineered procurement process using e-busi-
ness technologies and strategies to control costs and simplify pur-
chasing processes.
E-sourcing Procurement methods such as auctions, RFQ processing,
private exchanges, and secondary activities such as trading partner
collaboration, contract negotiation, and supplier selection.
Executive information system (EIS) An information system specifi-
cally designed to support senior management.
Exploit Tool or technique that takes advantage of a vulnerability.
enters false or fraudulent data into a computer, or changes or
deletes existing data.
Data visualization (data viz) Tools that make it easier to understand
data at a glance by displaying data in summarized formats, such as
dashboards and maps, and by enabling drilldown to the detailed
data.
Data warehouse Systems that integrate data from databases across
an entire enterprise are called enterprise data warehouses (EDW).
Database A repository or data store that is organized for efficient
access, search, retrieval, and update.
Database management system (DBMS) Software used to manage the
additions, updates, and deletions of data as transactions occur; and
support data queries and reporting. They are OLTP systems.
Decision model A model that quantifies the relationship between
variables, which reduces uncertainty.
Decision support system (DSS) Interactive applications that support
decision making.
Declarative languages A programming language that simplifies data
access by requiring that users only specify what data they want to
access without defining how that is to be achieved.
Deliverables The outputs or tangible things that are produced by a
business process. Common deliverables are products, services,
actions, plans, or decisions, such as approval or denial of a credit
application. Deliverables are milestones, produced in order to
achieve specific objectives.
Demand management Knowing or predicting what to buy, when, and
how much.
Digital business models How a business generates revenue or profit
from digital products or services.
Digital dependents The emerging generation of young people who
are growing up in a world of broadband connections, constant con-
nectivity, and related technology and who become uncomfortable
if they do not have access to it.
Digital immigrants Typically a member of an older age cohort that may
be increasingly comfortable with technology but much less likely to
incorporate mobile technology into their shopping behavior.
Digital natives The first generation to have grown up surrounded by
digital devices (i.e., computers, smartphones, digital cameras, and
video recorders, etc.) and Internet connectivity.
Direct conversion Type of conversion in which the old system is cut
off and the new system is turned on at a certain point in time.
Direct procurement Purchasing materials to produce finished goods.
Dirty data Data of such poor quality that they cannot be trusted or
relied upon for decisions.
Discussion groups A forum to ask questions and solicit input from
other members of the group.
Disruptive innovation New technologies offering the capability of
transforming traditional business practices, creating new value
networks, and spawning new markets.
Distributed database system A database system that allows apps on
computers and mobiles to access data from both local and remote
databases.
Distributed Denial of Service (DDoS) attack Attack that bombards
a network or website with so much traffic that it crashes and
becomes vulnerable to other threats.
Document object model (DOM) A programming API for docu-
ments. Programmers use it to manipulate (e.g., build, add, modify,
delete, etc.) HTML documents.
Do-not-carry rules Security rules based on the assumption that
devices will inevitably be compromised.
Dwell time The amount of time a user stays on a webpage before
returning to the search engine results page.
BMGlossary.indd Page G-3 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
G-4 Glossary
Hacktivist Short for hacker-activist or someone who does hacking for
a cause. Hacking, regardless of motive, is a crime.
Hadoop Hadoop is a data processing platform that distributes com-
puting problems across a number of servers so it is capable of
processing big data.
Hashtags Descriptive keywords designated by the # sign attached to
Twitter messages to make it easier for other users to find them.
Horizontal exchanges Sites where many buyers and sellers that use
the same products or services conduct business transactions.
Hybrid recommendation engines Develop recommendations based
on some combination of content-based filtering, collaboration fil-
tering, knowledge-based and demographic systems.
Hybrid search engines Combine the results of a directory created by
humans with results from a crawler search engine, with the goal of
providing both accuracy and broad coverage of the Internet.
Hyperscale Computing systems that are the supersized, scalable, and
resilient data centers pioneered by data-dependent and social media
companies.
Hypertext markup language (HTML) The predominant language for
webpages, used along with CSS, to describe how things will appear
on a webpage.
Implementation Process of converting from the old system to the new
system.
Inbound logistics Receiving of inventory, parts or products from sup-
pliers or other sources.
Inbound marketing An approach to marketing that emphasizes SEO,
content marketing, and social media strategies to attract customers.
Often viewed as an alternative to traditional marketing strategies
based on advertising and personal selling.
Income statement Summarizes a company’s revenue and expenses
for one quarter of a fiscal year or the entire fiscal year. Also known
as P&L (profit and loss) or earnings statement.
Indexer module Creates look-up tables by extracting words from
webpages and recording the URL where they were found.
Indirect procurement Organizations purchasing products for daily
operational needs.
Industry structure Determines the range of profitability of the aver-
age competitor and can be very difficult to change.
Informal processes Processes that are typically undocumented, have
inputs that may not yet been identified, and are knowledge-intensive.
Information Data that have been processed, organized, or put into
context so that it has meaning and value to the person receiving it.
Information and communications technology (ICT) IT industry sector.
Information governance The control of enterprise data through for-
mal policies and procedures. A goal of data governance is to pro-
vide employees and business partners with high quality data they
trust and can access easily on demand.
Information overload Inability of a manager or decision maker to
process or analyze data because of an overwhelming volume of
data.
Informational search Using search engines to conduct research on a
topic or product.
Insider fraud A variety of criminal behaviors perpetrated by an orga-
nization’s employees or contractors.
In-store tracking Use of mobile technology to track a customer’s
movement through a retail store for a better understanding of
individual consumer preferences as well as creating optimal store
layout.
Integrated change control Processes that help to manage the disrup-
tion resulting from requested changes and corrective actions across
the project lifecycle.
Interface To connect to and exchange data with apps and systems.
Extendable markup language (XML) A set of rules and guidelines
for describing data that can be used by other programming lan-
guages. It makes it possible for data to be shared across the web.
Extensibility Ability to get data into and out of the cloud service.
Extensible Business Reporting Language (XBRL) A language for
electronic communication of business data. Each item, such as cash
or depreciation expense, is tagged with information about various
attributes, such as calendar year, audited/unaudited status, cur-
rency, and so on.
Extract, transform, load (ETL) Technology involved in preparing raw
data for analytics that includes three procedures: data extracted
from designated databases; data transformed by standardizing
formats, cleaning the data, integrating them; and data loaded into
a data warehouse.
FASB Develops U.S. accounting standards and principles.
Fault tolerance Means that no single failure results in any loss of
service.
Financial misrepresentation Situation in which a company has inten-
tionally deceived one or more other parties.
Five-forces model Model developed by Michael Porter, also called
the competitive forces model, to identify competitive strategies.
Flexible manufacturing systems (FMS) Systems that can accommo-
date the manufacture of different parts at different volumes. FMS
systems schedule the manufacture of a part in the most expedient
way by examining the current workload across each of eight
machine tools.
Folksonomy A system of classifying and organizing online content into
categories by the use of user-generated metadata such as keywords.
Formal processes Processes that are documented and have well-
established steps.
Fraud risk management A system of policies and procedures to pre-
vent and detect illegal acts committed by managers, employees,
customers, or business partners against the company’s interests.
Front-office operations Activities, such as sales and advertising that
are visible to customers.
Gantt chart Horizontal bar chart that graphically displays the project
schedule.
General controls Controls established to protect the system regard-
less of the specific application.
Geocoding Process that can convert postal addresses to geospatial
data that can then be measured and analyzed.
Geographic information system (GIS) Captures, manages, analyzes,
and displays multi-dimensional geographic data.
Geospatial data Identifies the geographic location and characteristics
of natural or constructed features and boundaries on the earth,
typically represented by points, lines, or polygons.
Ghost pages Webpages that are optimized to attract many people but
contain a redirect command so that users are sent instead to another
page to increase traffic on that page.
Giant global graph Illustration of the connections between people
and/or documents and pages online.
Go/No-Go decision Formal decision made by the project manager,
sponsor, and appropriate executives and stakeholders.
Goal seeking Model that starts with the desired outcome (goal) and
a set of variables that impact that outcome, which are used to cal-
culate how that outcome could be achieved and whether it’s feasible
to achieve that desired outcome.
Groundswell The spontaneous effort of people using online tools to
obtain information, support, ideas, products, and bargaining power
from each other.
Group dynamics Group processes that emerge as the members work
together.
BMGlossary.indd Page G-4 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Glossary G-5
Lean manufacturing system A system used to minimize waste and
deal with the complexity of inventory management, where suppliers
deliver small lots on a daily or frequent basis, and production
machines are not necessarily run at full capacity.
Legacy systems Older information systems that have been main-
tained over several decades because they fulfill critical needs.
Link farms Websites built solely for the purpose of linking back to a
promotional page.
Link spamming Generating backlinks for the primary purpose of
search engine optimization, not to add value for the user.
Logistics Entails all the processes and information needed to move
products from origin to destination efficiently.
Lulzsec Hacktivist group that is a spin-off of Anonymous.
Machine-to-machine (M2M) technology Enables sensor-embedded
products to share reliable real-time data via radio signals.
Manufacturing execution systems (MES) Manage operations on the
shop floors of factories.
Manufacturing quality control (QC) systems Systems that provide
data about the quality of incoming materials and parts, as well as
the quality of in-process, semifinished, and finished products.
Market share Percentage of total sales in a market captured by a
brand, product, or company.
Mashup A web app that pulls data from various sources and displays
that on another page to create new functionality.
Master data Data about the entities of importance to an enterprise,
such as customers, products, accounts, and other business-critical
data information that are needed for operations and business
transactions.
Master data management (MDM) Synchronizes all business critical
data from disparate systems into a master file, which provides a
trusted data source.
Master file MDM links and synchronizes all critical data from those
disparate systems into one file, called a master file, that provides a
common point of reference.
Maverick buying Corporate purchasing outside the established
approved procurement system.
Metadata Data that describe and provide information about other
data.
Meta-search engines Compile search response listings by combining
results from several other search engines.
MHI An international trade association that has represented the
material handling, logistics and supply chain industry.
Microblog A blog that consists of frequent but very brief posts con-
taining text, pictures or videos. Twitter is perhaps the most well-
known example of a microblog.
Micropayments Transactions involving relatively small sums of money.
Microsoft cloud Provides a hybrid infrastructure and capabilities to
manage enterprise apps and data.
Milestone Used to manage the project work effort, monitor results,
and report meaningful status to project stakeholders.
Millennials Generation born between early 1980s to the early 2000s.
Mission Set of outcomes an enterprise wants to achieve.
Mobile biometrics Security defenses, such as voice and fingerprint
biometrics, for mobile devices.
Mobile browser A web browser that is optimized to display web
content effectively on a small mobile device such as a smart phone.
Mobile check-in strategy The use of mobile apps to enhance shop-
ping behavior at retail outlets with discounts, coupons, descriptive
videos, etc.
Mobile commerce or m-commerce The buying or selling of goods and
services using a wireless, handheld device such as a cell phone or
tablet (slate) computer.
Internal control environment Work atmosphere that a company sets
for its employees.
Internal threats Threats from employees. They are a major challenge
largely due to the many ways an employee can carry out malicious
activity.
Internet of Things (IoT) Refers to a set of capabilities enabled when
physical things are connected to the Internet via sensors.
Internet protocol (IP) The basic technology that makes global com-
munication over the web possible.
Intrusion detection system (IDS) Defense tool used to monitor net-
work traffic (packets) and provide alerts when there is suspicious
traffic, or to quarantine suspicious traffic.
Intrusion prevention systems (IPS) Defense system designed to take
immediate action—such as blocking specific IP addresses—when-
ever a traffic-flow anomaly is detected.
Inventory control systems Stock control or inventory management
systems.
IP address Every device that communicates with a network must
have a unique identifying IP address. An IP address is comparable
to a telephone number or home address.
Ipv4 The Internet protocol for over three decades, now reaching the
limits of its design and running out of IP addresses.
Isolation Means that a failure in one component can’t bring down the
entire system.
IT consumerization The migration of consumer technology into
enterprise IT environments.
IT governance Supervision, monitoring, and control of the organiza-
tion’s IT assets.
IT strategy Shapes the direction of IT investments over the next one
to five years to maximize business value and shareholder wealth.
IT–business alignment Complex management activity of aligning IT
strategy with business strategy.
Javascript An object-oriented language used to create apps and
functionality on websites. Examples of Javascript apps include pop-
up windows, validation of webform inputs, and images that change
when a cursor passes over them.
Just-in-time (JIT) One of the two widely used models to minimize
waste and deal with the complexity of inventory management. JIT
inventory management attempts to minimize holding costs by not
taking possession of inventory until it is needed in the production
process.
Key performance indicators (KPIs) Business metrics used to evaluate
performance in terms of critical success factors, or strategic and
operational goals.
Keyword In the context of web search or SEO, a word or phrase that
describes the content on a webpage. Search engines use keywords
to match webpages with user search queries.
Keyword conversion rates The likelihood that using a particular
keyword to optimize a page will result in converting a website visi-
tor into a buyer.
Knowledge Information that has been processed, organized, and put
into context to be meaningful, and to convey understanding, expe-
rience, accumulated learning, and expertise as they apply to a cur-
rent problem or activity.
Lagging indicators Confirm what has already happened. They evalu-
ate outcomes and achievements.
Latency Elapsed time (or delay) between when data is created and
when it is available for a query or report.
Latency-sensitive apps Apps that depend on quick no-delay transmis-
sion, such as voice and video.
Leading indicators Indicators that help predict future events to iden-
tify opportunities.
BMGlossary.indd Page G-5 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
G-6 Glossary
Onshore sourcing Work or development that can be sourced to con-
sulting companies or vendors that are within the same country.
Open Graph Facebook’s new initiative to connect all the different
relationships that exist on the Internet by linking websites to
Facebook.
Open source An application programming interface (API) that any-
one can use, usually for free.
Open Wi-Fi network Non-password-protected router.
Operating margin A measure of the percent of a company’s revenue
left over after paying for its variable costs, such as wages and raw
materials. An increasing margin means the company is earning
more per dollar of sales.
Operating plan Plan that defines how to execute the IT strategic plan.
Operational level Level on which managers and supervisors work
most closely with the workforce and customers and play a more
interpersonal role than any of the other levels of management.
Order fulfillment Set of complex processes involved in providing
customers with what they have ordered on time and all related
customer services.
Order fulfillment process The process of moving products from
orders to the customers that includes credit check and payment
collection, picking and shipping departments to pack the product,
print the mailing label, and prepare for shipping, and notifying
customers that their orders are on the way.
Organic search listings Search results that are heavily influenced by
website content and design features.
Outbound logistics Shipping activities.
Outsource relationship management (ORM) company Company that
provides automated tools to monitor and manage the outsourcing
relationships.
Packet A block of data or file that is transmitted over a network to
their destination.
Packet switching Transfers data or voice in packets.
Page repository A data structure that stores and manages informa-
tion from a large number of webpages, providing a fast and effi-
cient means for accessing and analyzing the information at a later
time.
PageRank A Google website evaluation algorithm that counts back-
links, based on the assumption that people are more likely to link
to high-quality websites than poor-quality sites.
Paid search listings A form of advertising purchased from search
engine companies in which advertisers pay search engines based on
how many people click on their ads.
Parallel conversion Conversion strategy in which the old system and
the new system operate simultaneously for a period of time. That
is, both systems process the same data at the same time, and the
outputs are compared.
Patches Software programs to fix a vulnerability in a system or app.
Payload Refers to the actions that occur after a system has been
infected. The payload carries out the purpose of the malware.
Payment card industry data security standard (PCI DSS) A data
transmission security standard based on encryption that was created
by Visa, Mastercard, American Express, and Discover to improve
customers’ trust in e-commerce
Pay-per-click (PPC) A form of payment based on how many viewers
clink on a link to a marketer’s page.
Petabyte A unit of measurement for digital data storage. A petabyte
is equal to one million gigabytes.
Phishing Deceptive method of stealing confidential information by
pretending to be a legitimate organization, such as PayPal, a bank,
a credit card company, or other trusted source.
Planners Lab Software designed to build DSSs.
Mobile display strategy Use by retailers of QR codes and Short
Message Service (SMS) technology to encourage store customers
to view short videos featuring selected merchandise.
Mobile e-commerce The use of wireless handheld devices to order
and/or pay for goods and services from online vendors.
Mobile location-based marketing A marketing strategy that uses
information from a mobile device’s GPS or customer’s mobile
check-in on a social network to determine the content of marketing
communications they receive on the device (e.g., advertisements,
coupons, special offers).
Mobile marketing A variety of activities used by organizations to
engage, communicate, and interact over Wi-Fi and telecommunica-
tions networks with consumers using wireless, handheld devices.
Mobile payment The use of systems that make transactions from
smartphones and other mobile devices convenient, safe, and secure.
Mobile retailing The use of mobile technology to promote, enhance,
and add to value to the in-store shopping experience.
Mobile visual search engine A search engine that uses an image
instead of a text-based query to search for information on the web.
Moral hazard A situation that takes the risk (and the deterrent) out
of committing fraud.
MRO supplies Items purchased for maintenance, repair, and opera-
tions, such as office supplies, and not resold to generate revenue.
Navigational search Using a search engine to locate particular web-
sites or webpages.
Near field communication (NFC) Enables two devices within close
proximity to establish a communication channel and transfer data
through radio waves. NFC are location-aware technologies that are
more secure than other wireless technologies like Bluetooth and Wi-Fi.
Near-field communication (NFC) technology General description
covering technologies that communicate within a limited distance.
Negligent hiring Claim made by an injured party against an employer
who knew or should have known about an employee’s background
that indicates a dangerous or untrustworthy character.
Net neutrality A principle holding that Internet Service Providers
(ISPs) and their regulators should treat all Internet traffic the same
way.
Network effect From the field of economics, the network effect
explains how the perceived value of a product or service is affected
by the number of people using the product or service.
Newsgroups Online communities similar in many ways to online bul-
letin boards, where members exchange messages on various topics.
NOSQL A heterogeneous group of database systems that is capable
of processing large web applications.
Objectives Building blocks of strategy, these are action-oriented
statements that define the continuous improvement activities that
must be done to be successful. Objectives set out what the business
is trying to achieve.
Occupational fraud Deliberate misuse of the assets of one’s employer
for personal gain.
Office graph Uses signals from email, social conversations, docu-
ments, sites, instant messages, meetings, and more to map the
relationships between the people and concepts.
Offshoring Sourcing that is done off-shore.
Omni-channel retailing The effort by retailers to fully integrate both
traditional and emerging methods to influence consumers.
Online analytical processing (OLAP) systems Systems for analysis of
complex data, typically stored in a data warehouse or data mart.
Online transaction processing (OLTP) Events or transactions are
processed as soon as they occur.
Online transaction processing (OLTP) systems Volatile systems that
are designed to process and store transaction data.
BMGlossary.indd Page G-6 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Glossary G-7
Redundancy Every component is backed up by an alternative in case
it fails.
Relational database A standard database model that had been used
by most enterprises. Relational databases store data in tables
consisting of columns and rows, similar to the format of a spread-
sheet.
Relational database management system (RDBMS) System that
provides access to data using a declarative language—SQL or struc-
tured query language.
Remote administration trojan (RAT) Create an unprotected back-
door into a system through which a hacker can remotely control
that system.
Remote wipe capability A feature of a smart device wherein it can be
instructed remotely to delete the contents.
Replicate How a virus or other malware makes copies of itself.
Resource description framework (RDF) A language used to repre-
sent information about resources on the Internet.
Responsibility matrix A document that lets everyone know who is
responsible for completion of tasks.
Responsiveness Means that IT capacity can be easily scaled up or
down as needed, which essentially requires cloud computing.
Retrieval/ranking module Determines the order in which pages are
listed in a search engine results page.
Retweet Forwarding a Twitter message to everyone in a user’s net-
work.
Reverse supply chain Type of supply chain where products that are
returned make up the supply chain; goods are moving in the reverse
direction.
Rich snippets Rich, attractive listings produced on search engine
result pages by websites optimized with metadata for semantic
technology.
Risk Probability of a threat exploiting a vulnerability.
Rogue app monitoring Type of defense to detect and destroy mali-
cious apps in the wild.
Rootkit A type of malware that installs itself on a network.
Router A device that transmit data packets from their source to their
destination based on IP addresses, and links computers to the
Internet, so users can share the connection.
RSS aggregator Enables users to pull content from a number of
sources into a single location making it easier to follow news stories
and blog posts from multiple sites.
RSS reader Allows users to aggregate regularly changing data, such
as blog entries, news stories, audio, and video.
Safety stock Extra inventory that are used as a buffer to reduce the
risk of stockout.
Scalability A system that can increase (or decrease) in size to handle
data growth or the load of an increasing number of concurrent
users.
Scalable Adjustable to meet changes in business needs.
Scope creep Refers to the growth of the project, which might seem
inconsequential—at least to the person who is requesting that
change. Scope creep is the piling up of small changes that by them-
selves are manageable, but in aggregate are significant.
Search engine An application for locating webpages or other content
(e.g., documents, media files) on a computer network. Popular
web-based search engines include Google, Bing, and Yahoo.
Search engine marketing (SEM) A collection of online marketing
strategies and tactics that promote brands by increasing their visibil-
ity in SERPs through optimization and advertising.
Search engine optimization (SEO) A collection of strategies and
techniques designed to increase the number of visitors to a website
as a result of the website’s rank on search engine results pages.
Plug-ins Buttons or features on non-Facebook sites that interact with
Facebook in some way.
Postmortem Method for evaluating project performance, identifying
lessons learned, and making recommendations for future projects.
Primary activities Business activities directly involved in the produc-
tion of goods and services.
Privacy Right to self-determine what information about you is made
accessible, to whom, when, and for what use or purpose.
Privacy paradox Refers to a phenomenon where social users claim to
be concerned about privacy, but their behaviors contradict these
concerns to an extreme degree.
Private cloud A single-tenant environment with stronger security and
control for regulated industries and critical data. A private cloud
resides within an enterprise’s own network and firewall.
Private social networking service The use of social technology to cre-
ate a community restricted to members selected by the SNS’ owner.
Private SNSs allow a greater degree of control over the network.
Process Series of steps by which organizations coordinate and orga-
nize tasks to get work done.
Production and operations management (POM) Function that is
responsible for processes that transform inputs into value-added
outputs.
Project Well-planned sequential series of tasks to achieve a result.
Projects have a defined beginning and end; a scope, resources, and
a budget. Projects are approved before they are funded and allo-
cated resources.
Project management Structured methodology to plan, manage, and
control the completion of a project throughout its lifecycle.
Project portfolio Portfolio that lists major resource projects, includ-
ing infrastructure, application services, data services, and security
services that are consistent with the long-range plan.
Project portfolio management (PPM) Set of business practices to
manage projects as a strategic portfolio.
Propagate How a virus spreads to other networks or devices.
Protected class Characteristics identified by law that cannot be used
in the hiring process.
Public cloud A shared cloud architecture run over a public network,
such as the Internet. It allows multiple clients to access the same
virtualized services and utilize the same pool of servers across a
public network.
Quality score An ad rating determined by factors related to the user’s
experience.
Quick response (QR) codes A machine-readable code typically used
to store a link to a URL or web address that can be read by a mobile
device.
Radio frequency identification (RFID) Method of identifying unique
items using radio waves. Typically, a hand-held reader communi-
cates with a tag, which holds digital information in a chip.
Real time search tool Help to pinpoint current trends by monitoring
web searches, news stories, videos views, and blog posts about a
particular topic.
Really simple syndication (RSS) Allows users to subscribe to multiple
sources (e.g., blogs) and have the content displayed in a single
application, called an RSS Reader or RSS Aggregator, enabling
readers to personalize how they want their news organized and
displayed.
Real-time processing Processessing of data or transactions as they
occur.
Recommendation engines Proactively identify products that have a
high probability of being something the consumer might want to buy.
Red flag Fraud indicators—lavish vacations, jewelry, and cars that
somebody could not afford.
BMGlossary.indd Page G-7 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
G-8 Glossary
job candidate did not want considered or that is illegal to use in the
hiring process.
Social web The new technologies, often called Web 2.0, that dramati-
cally increase the ability of people to interact with businesses and each
other, sharing and finding information, and forming relationships.
Social, mobile, and cloud (SOMOCLO) Leading digital technologies.
Software-as-a service (SaaS) A widely used model in which software
is leased and available on demand instead of being owned or
licensed from the vendor.
Sourcing Refers to an IT deployment strategy in which systems are
developed or IT work is done by a third-party or vendor.
SPARQL Protocol and RDF Query Language Query languages used
to write programs that can retrieve and manipulate data stored in
RDF format.
Spiders Also known as web bots or simply “bots,” spiders are small
computer programs designed to perform automated, repetitive
tasks over the Internet. They are used by search engines for scan-
ning webpages and returning information to be stored in a page
repository.
Spot sourcing The purchase of indirect materials in one industry as-
needed, using an exchange.
Standard operating procedures (SOP) Set of well-defined, written
instructions for how to perform a function or activity. SOPs provide
the framework for complex processes to be managed more effec-
tively.
Statement of work (SOW) Defines the project plan, but does not
offer any options or alternatives in the scope.
Stock keeping unit (SKU) A code number, typically a machine-
readable bar code, assigned to a single item of inventory.
Stockout Inventory shortage.
Strategic plan Document used to communicate the company’s goals
and the actions needed to achieve their goals.
Strategic planning A top management activity that sets priorities,
focuses energy and human and technology resources, strengthens
operations, and ensures that employees and business partners work
toward common goals.
Strategy Defines the plan for how a business will achieve its mission,
goals, and objectives.
Structured data Highly organized data easily included in a relational
database that can be readily searched.
Structured decisions Decisions that have a well-defined method for
solving and the data needed to reach a decision.
Structured query language (SQL) Standardized language for access-
ing databases.
Sunk cost Refers to the money already spent on the project.
Supply chain All businesses involved in the production and distribu-
tion of a product or service.
Supply chain management (SCM) The efficient management of the
flows of material, data, and payments along the companies in the
supply chain, from suppliers to consumers.
Supply chain visibility Awareness and sharing of POS data and data
about product orders, inventory levels, demand forecasts, transpor-
tation, and logistics by trading partners from raw material to deliv-
ery to the end customer.
Support activities Activities that support primary activities.
Switch A device that transmit data packets and acts as a controller,
enabling networked devices to talk to each other efficiently.
SWOT analysis Analysis of an enterprise’s strengths, weaknesses,
opportunities, and threats.
Synchronous communication Dialogue or conversation that takes
place in real-time, without the long delays between exchanges that
occur, for instance, in email or discussion board conversations.
Search engine results page (SERP) The list of links and other descrip-
tive information about webpages returned by a search engine in
response to a search query.
Sell-side marketplace Organizations selling their products or services
to other organizations from their own private e-marketplace or
from a third-party site.
Semantic search engines Use natural language processing, contextual
cues, synonyms, word variations, concept matching, specialized
queries, and other strategies to create search results that are supe-
rior to those created by simple keyword-matching algorithms.
Semantic web An extension of the World Wide Web that utilizes a
variety of conventions and technologies and languages developed
by the W3C that allow machines to understand the meaning of web
content.
Sentiment analysis Analysis of comments and social media posts to
understand consumers’ attitudes or feelings.
Service pack Patches released by Microsoft to update and fix vulner-
abilities in its operating systems.
Shadow pages Webpages that are optimized to attract lots of people
but contain a redirect command so that users are sent instead to
another page to increase traffic on that page.
Sharepoint Collaborative and social platform from Microsoft.
Sharing sites Websites that make it easy for users to upload and share
digital content like photos, videos or music.
Short code A short five- or six-character number used for product
promotions or other interactions with customers.
Short message service (SMS) A technology used to send and receive
text messages on mobile devices via a telecommunications network.
Showrooming Using mobile search engine for locating product
reviews and price comparisons while shopping in brick-and-mortar
stores.
SMS database strategy Compiling and tracking short message service
(SMS) codes to encourage customers to opt-in to receiving coupons
and other offers via text message.
Social bookmarking An app for tagging or labeling online content for
later retrieval.
Social commerce Taking advantage of social media to promote sales
through both online and retail channels.
Social engineering Also known as human hacking—tricking users
into revealing their credentials and then using them to gain access
to networks or accounts. From an IT security perspective, social
engineering is a hacker’s clever use of deception or manipulation
of people’s tendencies to trust, to try to be helpful, or to be curious.
Social graph A visual representation of the relationships and connec-
tions between individuals and groups.
Social media A collection of web applications, based on Web 2.0
technology and culture, that allows people to connect and collabo-
rate with others by creating and sharing digital content.
Social media optimization Effective use of strategies designed to
enhance a company’s standing on various social media sites such as
Facebook and Twitter.
Social monitoring services Allow users to track conversations taking
place on the web, particularly on other social media sites.
Social network analysis (SNA) Mapping and measuring of relation-
ships and flows between people, groups, organizations, computers,
or other information or knowledge processing entities.
Social network sprawl Refers to a problem when businesses end up
interacting with multiple social networks inside their own company.
Social networking service (SNS) An online platform or website that
allows subscribers to interact and form communities or networks
based on real-life relationships, shared interests, activities, and so on.
Social recruitment Refers to use of social media to find, screen, and
select job candidates. Often it involves searching information the
BMGlossary.indd Page G-8 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Glossary G-9
Vertical search engines Focus on webpages related to a particular
topic and help to drill down by crawling pages that other search
engines are likely to ignore.
Virtual communities Offer several ways for members to interact, col-
laborate, and trade with no regard for geographical or political
boundaries.
Virtual machine (VM) A software-created computer or operating
system.
Virtualization A technique that creates multiple operating systems
that run on a single physical machine.
Voice biometrics Authentication method based on a user’s voice-
print.
Voice over IP (VOIP) Network that carries voice calls by converting
voice (analog signals) to digital signals that are sent as packets.
Volatility A characteristic of databases that refers to the process by
which databases are constantly in use or being updated.
Vulnerability A weakness that threatens the confidentiality, integrity,
or availability (CIA) of an asset.
Wardriving Refers to driving around sniffing out and mapping the
physical location of the world’s Wi-Fi routers. Wardriving is also a
hacking technique, an invasion of privacy, and an information
security risk.
Wearable technology Digital technology embedded in clothing or
other things that are worn.
Web 2.0 A term used to describe a phase of World Wide Web evolu-
tion characterized by dynamic webpages, social media, mashup
applications, broadband connectivity, and user-generated content.
Web directories Created by human editors and typically organized
by categories, these were once the dominant method for finding
web content.
Web ontology language (OWL) The W3C language used to catego-
rize and accurately identify the nature of things found on the
Internet.
What-if analysis Refers to changing assumptions or data in the model
to see the impacts of those changes on the outcome.
Wide area network (WAN) Type of mobile network distributed over
a large area, such as an office park
Widget A web app that pulls data from various sources and displays
it on another page to create new functionality.
Wiki A collaborative app that allows multiple people to create and
edit online content.
Work breakdown structure (WBS) List of tasks in a project shown in
sequential order, resources allocated to each task, and schedule.
World Wide Web A network of documents on the Internet, called
webpages, constructed with HTML markup language that supports
links to other documents and media (e.g., graphics, video, audio,
etc.).
Xmlhttprequest A Javascript object that serves as an API used by
programs to retrieve data or resources from an URL without
requiring a page load. It plays an important role in providing pro-
grammers with the ability to create dynamic and interactive web-
pages and applications.
Yammer Social network geared towards enterprises. Employees col-
laborate across departments, locations and business apps.
Zero-day attacks Malware so new their signatures are not yet known.
Zombie An infected computer that can be commanded to monitor
and steal personal or financial data and act as spyware.
Systematic sourcing The trading of materials that are direct inputs to
manufacturing, usually in large quantities, in an environment of a
long-term B2B relationship.
Tactical adoption approach Deploying cloud services incrementally
results in apps and services that are patched together to create end-
to-end business processes. This is a short-sighted approach.
Tactical level Level on which middle-level managers design business
processes, procedures, and policies to implement strategic plans.
Tags Identifiers that describe various aspects of a webpage.
Terms of service (TOS) agreement A formal listing of the policies,
liability limits, fees, and user rights and responsibilities associated
with using a particular service. Users are typically required to
acknowledge they have read, understand and agree to the terms of
the TOS before they are allowed to use the service.
Text mining A specific analytic technique that involves interpreting
words and concepts in context.
Threat Something or someone that can damage, disrupt, or destroy
an asset.
Time-to-exploitation Elapsed time between when a vulnerability is
discovered and when it is exploited.
Total quality management (TQM) A quality control system.
Touchpoint Any action or interaction with a customer, such as email,
text, direct mail, phone call, social media message, and so on.
Traffic shaping Ability to prioritize and throttle network traffic.
Transaction processing system (TPS) A system designed to process
specific types of data input from ongoing transactions.
Transactional search Using a search engine to determine where to
purchase a product or service.
Transparency Being able to access current data to learn what is
needed in order to make informed decisions without delay.
Triple constraint Three attributes–time, scope, and cost–that must be
managed effectively for successful completion and closure of any
project.
Tweet A brief 140-character message or post broadcast on Twitter, a
microblogging service.
Twittersphere The universe of people who use Twitter, a microblog-
ging service.
Uniform resource identifiers (URI) One of the features that allow
data to be used by multiple applications.
Unstructured data Information that is not organized in a systematic
or predefined way and more likely to contain inaccuracies or errors.
Unstructured decisions Decisions that depend on human intelligence,
knowledge, and/or experience—as well as data and models to solve
them.
Up-sell To sell more expensive models or features
Usenet The initial platform for online communities making it possible
for users to exchange messages on various topics in public newsgroups.
Value added reseller (VAR) Customizes or adds features to a ven-
dor’s software or equipment and resells the enhanced product.
Value driver Any activity that enhances the value of a product or
service to consumers, thereby creating value for the company.
Advanced IT, reliability, and brand reputation are examples.
Variants Modified versions of an existing malware.
Vector Specific method that malware uses to propagate, or spread,
to other machines or devices.
Vertical exchanges Sites where many buyers and sellers conduct busi-
ness transactions that serve only one industry along the entire supply
chain.
BMGlossary.indd Page G-9 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
BMGlossary.indd Page G-10 11/12/14 2:02 PM f-w-204a /208/WB01490/9781118897782/bmmatter
1-800-Flowers, 360
A
AAA, 39, 284, 378
AACSB (Association to Advance Collegiate
Schools of Business), 136–137
Accelerating Medicines Partnership, 89
Accenture, 301, 403, 454, 456, 457
Adaptive Insights, 378
Adobe, 142, 145
ADP Corporation, 376
Adsa, 128
Adweek, 313
Afl ac, 267
Afl ac Cancer Center and Blood Disorders Service
of Children’s Healthcare of Atlanta, 267
Agistix, 308–309
Airbus, 335
Alcatel-Lucent, 136
Ally Bank, 273–275
Amazon:
IT advancements at, 271–272
recommendation engines used by, 182, 209, 213
use of digital business model by, 12
Amazon Web Services (AWS), 64
AMC (U.S. Army Materiel Command), 354
American Apparel, 242
American Express:
electronic records management at, 105
on Facebook, 229
indirect procurement at, 279
American Marketing Association, 256
Andersen Consulting, 350
Anonymous (hacktivist group), 150
Apple:
bargaining power of, 22
business strategy of, 25–26
and CarPlay, 458–459
and customer relationship management, 360
data center of, 54
data collection by, 450
digital technology released by, 13
and Ducati, 301
geospatial data tracking by, 385
near-fi eld communication technology used by, 119
recommendation engines used by, 213
and Siri, 166
in textbook market, 294
Appthority, 449
Aqumin, 376
Argo Corporation, 96
Arthur Andersen, 170
Association to Advance Collegiate Schools of
Business (AACSB), 136–137
AT&T:
extranets used by, 130
NFC used by, 27
AutoTrader, 16
Avanade, 350
Avon, 358, 364–365
B
BAE Systems, 311–312, 416
Banamex, 289
Bank of America, 222–223
Bernie Madoff Investment Securities LLC, 316
Bitcoin, 197
Bitly, 9
Blogger Platform, 247
Bloomberg, 376
Boeing Co.:
and leap engines, 335
smartphone built by, 146–147
Boers & Co Fine Metalworking, 347
Bolsa de Comercio de Santiago, 51
Booz Allen, 403
Box, 257, 453
BP, 395
Breier Neidle Patrone Associates, 416
Bridgestone, 378
Burger King, 3, 4
C
California Grown, 353
California Highway Patrol (CHP), 439
California Pizza Kitchen, 52
Canadian Tire, 449
Capital One, 92
CareerBuilder, 444
CareFX, 383–384
CarMax, 101–102
Caterpillar, Inc., 128
Center for International Business Education and
Research (Duke University), 406
Center for Project Management, 420
Central Intelligence Agency (CIA):
cyberattacks toward, 150
data published by, 20
Centre for Therapeutic Target Validation
(CTTV), 89
Chegg.com, 293–294
Chicago Board Options Exchange (CBOE), 376
Cisco Systems, 113, 261, 326
Citibank, 223–224
Citizen National Bank, 361
CLG (Corporate Leaders Group on Climate
Change), 131
Climate Group, 133
Cloud Standards Customer Council, 57
CNN, 213
Coca-Cola:
data management at, 71–75
data visualization used by, 378
mobile commerce by, 279
Combined Systems, Inc., 150
Comcast, 260–261
Common Short Code Association (CSCA), 290
Commonwealth Bank of Australia (CBA), 399
Communication Between Humans and Interactive
Media Lab, 454
Consumer Watchdog, 451
Cornell University, 451–452
Corporate Leaders Group on Climate Change
(CLG), 131
CourseSmart, 294
Cowen’s Group, 143
CSCA (Common Short Code Association), 290
CTTV (Centre for Therapeutic Target Validation), 89
Cupid Media, 145
D
D33Ds Company (hacker group), 155
DARPA (Defense Advanced Research Projects
Agency), 97–98
The Data Warehouse Institute (TDWI), 99, 100
Defense Advanced Research Projects Agency
(DARPA), 97–98
Delange, 27
Delicious.com, 256
Dell, 17, 46, 269
Dell Boomi, 46
Dell Computer, 277
Deloitte Consulting:
and data visualization, 369–371
and FinCEN, 108
on supply chains, 356, 357
Diigo, 256–257
Dillard’s Inc., 350
Dogpile.com, 187
DOJ (U.S. Department of Justice), 324
Dow Chemical, 25
Dragonfl y, 353
Dropbox, 257
Ducati, 299–302
Duke University, 406
E
eBay:
data breach at, 145
data discovery with, 374
move to cloud technology by, 10
outsourcing by, 404–405
as sell-side marketplace, 277
EBI (European Bioinformatics Institute), 89
EEOC (Equal Employment Opportunity
Commission), 444
Employease.com, 279
Enron, 316
Epicor, 347
Epinions, 236
Equal Employment Opportunity Commission
(EEOC), 444
ESPN, 283
European Bioinformatics Institute (EBI), 89
Evernote:
brainstorming on, 129
data breach at, 145
EVO-ERP, 340
ExactTarget, 31
Exxon Mobil, 314
F
Facebook:
Ally Bank on, 274
American Express on, 229
and APIs, 229
business use of, 222
Citibank on, 223
and cybersecurity, 164
data-driven marketing through, 314
data science at, 9
domination of social networking by, 239–241
Organization Index
O-1
BMOIndx.indd Page O-1 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
O-2 Organization Index
Facebook (Continued)
Hadoop used by, 95
how to get un-friended on, 233
and plug-ins, 229
plug-ins for, 230
privacy violations by, 451
recommendation engines used by, 213
social graphs on, 236
as social networking service, 231
use of digital business model by, 11
as virtual community, 238–239
FASB (Financial Accounting Standards Board), 315
Fashioning Change, 213
Fast Company, 213
FCC, see Federal Communications Commission
FDA (Food and Drug Administration), 353
Federal Communications Commission (FCC):
on net neutrality, 117
and Wi-Fi snooping, 450
Federal Financial Institutions Examination Council
(FFIEC), 446
Federal Trade Commission (FTC):
on cybersecurity regulations, 157
and Facebook privacy-violation fi nes, 451
fi nes for data breaches from, 170
and privacy, 445
and social media guidelines, 446
Ferrari, 335
FFIEC (Federal Financial Institutions Examination
Council), 446
Financial Accounting Standards Board (FASB), 315
Financial Crimes Enforcement Network
(FinCEN), 108
FinCEN (Financial Crimes Enforcement
Network), 108
First Choice Ski, 305–306
First Wind, 95
Flickr, 231
Food and Drug Administration (FDA), 353
Food Network, 283
Ford Motor Company:
collaboration technology at, 127
global trends at, 137
and hyperscale computing, 456
Forrester, 41, 341
Foursquare, 267, 285, 385, 450
FoxMeyer Drugs, 350
Frost and Sullivan, 192
FTC, see Federal Trade Commission
G
Gain Capital, 376
Gartner:
as cloud consultant, 403
on competitive advantage, 20
on costs of Target data breach, 143
on CRM market, 360
on data analytics market, 372
on enterprise architecture, 43
on 3D printing technology, 332, 452
General Electric (GE):
crowdsourcing used by, 456
data analytics at, 94
General Motors (GM), 273
data visualization by, 384
geospatial data used by, 368
and hyperscale computing, 456
Genpact, 404
Glassdorr data, 8–9
GlaxoSmithKline, 89
Global Cyber Security Capacity Centre, 443
Global Payments, Inc., 141
GM, see General Motors
Gmail, 190
Goldman Sachs, 332, 334
Goodreads, 213
Google:
as crawler search engine, 187
and customer surveys, 313
and data storage, 190–191
digital technology released by, 13
ethical issues faced by, 440, 450–451
focus management at, 453
quality scores determined by, 203–204
search features of, 195
semantic search features of, 208, 209
social networking by, 241
H
Harris Corp., 430, 431
Hartford Hospital, 383–384
Healthcare Information and Management Systems
Society (HIMSS), 68
Hershey Food Corp., 349
Hertz, 108
HIMSS (Healthcare Information and Management
Systems Society), 68
Home Depot, 314
HP, 403
HSBC, 418
I
I2O (Information Innovation Offi ce), 97
IAOP (International Association of Outsourcing
Professionals), 406–407
IBM, 285, 376, 403
DMBSs offered by, 79
Second Life used by, 242
and social media services, 341
SPSS Analytic Catalyst of, 368
IEA (International Energy Agency),
131–132
IKEA, 285
Infi nity Insurance, 96–97
Infor, 340, 347
Information Innovation Offi ce (I2O), 97
Information Security Forum, 156
InnoCentive, 25
Instagram, 450, 453
Intel, 390–392
Intel Security, 34–37
International Association of Outsourcing
Professionals (IAOP), 406–407
International Energy Agency (IEA), 131–132
IT Governance Institute, 157
J
JDA Software Group, 350
JD Edwards, 340
JetBlue, 401
Jive, 345
Joint Munitions Command (JMC), 354
JPMorgan Chase, 142, 376
K
Kickstarter, 425, 455
L
Lehman Brothers, 316
Liberty Wines, 61
Linden Research, 242
LinkedIn, 443–444
cloud services at, 404
data science at, 9
lax security at, 177–178
as professional networking site, 239
recommendation engines used by, 213
Living Social, 145
Looksmart.com, 187
L’Oreal, 242
LulzSec, 150
M
McAfee, 34
McCain Foods, 2–6
McDonald’s, 96
McKinsey, 332, 334, 407
McKinsey Global Institute (MGI), 87
Macy’s, 265–268, 314, 385
Magic Software, 380
Mercedes-Benz, 243
Merita Bank, 289
MGI (McKinsey Global Institute), 87
MHI, 356, 357
Michaels Stores, 145
Microsoft:
bargaining power of, 22
as CRM vendor, 358
digital technology released by, 13
DMBSs offered by, 79, 80
and enterprise resource planning, 346
recommendation engines used by, 213
security vulnerabilities at, 154–155
service packs offered by, 164
and Yammer/SharePoint, 341–343
MicroStrategy, 101, 386
Mobatech, 283
N
National Aeronautics and Space Administration
(NASA):
carbon monitoring by, 135
on greenhouse gases, 131–132
National Basketball Association (NBA), 12, 456
National Climatic Data Center, 54
National Highway Traffi c Safety Administration
(NHTSA), 136
National Institute of Standards and Technology
(NIST), 56
National Security Agency, see U.S. National
Security Agency (NSA)
NBA (National Basketball Association), 12, 456
NBC News:
data visualization used by, 378
recommendation engines used by, 213
NBC Universal, 285
Nestlé Nespresso S. A., 404
Netfl ix:
recommendation engines used by, 182, 210, 213
and resilience, 456
NIH (U.S. National Institutes of Health), 89
Nike, Inc.:
geospatial data used by, 368
search technology at, 182–186
Nikon, 378
NIST (National Institute of Standards and
Technology), 56
NSA, see U.S. National Security Agency
O
Offi ce Depot, 311
1-800-Flowers, 360
BMOIndx.indd Page O-2 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Organization Index O-3
Oracle:
BPM software by, 19
as CRM vendor, 358
and data visualization, 374
DMBSs offered by, 79
and enterprise resource planning, 340, 346
and social media services, 341
social network of, 345
Overstock.com, 277
Owl Canyon, 353
Oxford Internet Institute, 443
Oxford University, 89
P
P. F. Chang’s China Bistro, 31
Pandora, 213
PayScale, 347
Pei Wei Asian Diner, 31
PepsiCo, 369–372
Peters Ice Cream, 347
Pink Floyd, 122
Pirelli, 456
Presto, 380
Pricewaterhouse Coopers, 149
Procter & Gamble (P&G), 127–128
Programmable Web, 250
Q
Quicken Loans, Inc., 99
R
Rackspace, 64
Red Robin Gourmet Burgers, Inc., 342–344
Reuters, 213
RichRelevance, 217
Roambi, 377
Rolling Stone, 213
Royal Bank of Scotland, 289
S
Safeway, 369–372
Sage, 340, 346
Salesforce.com:
Chatter add-on, 345
as CRM vendor, 358
as SaaS vendor, 64
sales automation software by, 315
and social media services, 341
Samsung, 119, 213
SAP:
and Avon, 365
as CRM vendor, 358
and data visualization, 374, 386
and enterprise resource planning, 340, 350
SAS, 374
ScanSource, 350
Schurman Fine Papers, 311
SEC, see U.S. Securities and Exchange Commission
Second Life, 242–243
Selinko, 27
Senate Banking Committee, 168
SHRM (Society for Human Resource
Management), 443
Siemens:
data visualization used by, 378
3D printing at, 335
Siri, Inc., 166
Smart Grid Consumer Collaborative (SGCC), 123
SnapChat, 446–448
Society for Human Resource Management
(SHRM), 443
Sony, 111–113
Southwest Airlines, 401
Spotify, 121–122
Standard Chartered, 418
Stanford University, 454
Starbucks, 287, 368
Starwood Hotels, 242
Stitch Fix, 213
Stratasys Ltd., 335
Surgery Center of Baltimore, 105
SwellPath, 184–185
T
Target, 266, 270
big data analytics by, 448–449
data breach at, 142–145
Target Discovery Institute, 89
Technorati.com, 245, 247
Teradata, 32, 79
Ticketmaster Spain, 119
Time Inc., 213
Tin Eye, 197
Total Produce, 119–120
Toyota, 310
data visualization used by, 378
and hyperscale computing, 456
TradeCard, 275
Trader Joe’s, 353
Travelocity, 92
Tripadvisor, 213
TUI Travel, 305
Tumblr, 247, 250
Twitter:
Ally Bank on, 274
and cybersecurity, 164
data collection by, 450
mashups with, 252
as microblogging SNS, 248–250
as online community, 236
use of digital business model by, 11
Zappos on, 260
U
Uber, 55
Ubisoft, 145
Unilever:
database used by, 128
and hyperscale computing, 456
social platform of, 64
United Airlines, Inc., 259–260
United Nations:
on climate change, 131
Guiding Principles on Business and Human
Rights, 440
U.S. Army Materiel Command (AMC), 354
U.S. Census Bureau, 430–432
U.S. Chamber of Commerce, 151
U.S. Department of Justice (DOJ), 324
U.S. Department of State, 156
U.S. Department of Transportation, 459
U.S. Immigration and Customs Enforcement,
440–441
U.S. military, use of data mining by, 97–98
U.S. National Institutes of Health (NIH), 89
U.S. National Security Agency (NSA), 54, 190, 443
U.S. Securities and Exchange Commission (SEC):
fi nes for data breaches from, 170
and Bernie Madoff, 166, 168
University of Cincinnati, 105
University of Michigan, 459
V
Vanderbilt University Medical Center (VUMC),
67–68
VenueGen.com, 255
Verizon, 368
VUMC (Vanderbilt University Medical Center),
67–68
W
Wachovia, 418
Walgreens, 456
Walmart:
bargaining power of, 22
data and text mining used by, 96
geospatial data used by, 368
and Procter & Gamble, 127–128
Warner Music, 120
Wellcome Trust Sanger Institute, 89
WhatsApp, 55
Wikipedia, 257
and crowdsourcing, 456
as online community, 236
The Wild Feathers, 120
Wine.com, 217–218
WordPress, 247
World Wide Web Consortium (W3C), 205
Y
Yahoo.com:
attacked by Android malware, 164
as hybrid search engine, 187
Yellow Pages, 286
YouTube:
Ally Bank on, 274
and Comcast, 260–261
as online community, 236
recommendation engines used by, 213
as sharing site, 231, 232
upload rates of, 134
usage of, 190
Z
Zappos, 260
Zepp Labs, 15
Zipcar, 14
Zumba, 453
BMOIndx.indd Page O-3 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
BMOIndx.indd Page O-4 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
A
Aken, Scott, 150
All, Ann, 360
Ashton, Kevin, 7
B
Barnett, Charles J., 51
Bellegarde, Penelope, 306
Berners-Lee, Tim, 205, 226
Bernoff, Josh, 234, 235, 245
Bezos, Jeffrey, 12, 271
Bippert, Doug, 75
Birol, Faith, 131
Broussard, Clay, 370
Brown, Christian, 210
C
Carroll, Dave, 259–260
Cerf, Vinton, 119
Choi, Grace, 336
Clapper, James, 152
Coburn, Tom, 430
Collins, Susan, 430
Connelly, Sheryl, 137
Curtis, Kirsten, 370
D
Davenport, Thomas, 9
Dolan, Vince, 120
Drucker, Peter, 360
E
Eliason, Frank, 261
F
Faludi, Jeremy, 452
Fortin, Cam, 217
G
Goldman, Jonathan, 9
Gretzky, Wayne, 25, 26
Grossman, Jeremiah, 178
Gutierrez, Carlos M., 430, 431
H
Hammerbacher, Jeff, 9
Harte, Michael, 399
Hayward, Tony, 395
Heathfi eld, Susan, 239
Hoffman, Reid, 9
Hsieh, Tony, 260
I
Ingham, Francis, 177
Iñigo de la Serna, 124
J
Jackson, Maggie, 453
Jobs, Steve, 25, 26, 209
Johnson, Shawn, 186
Jung, Andrea, 364
K
Kandel, Eric, 453–454
Kaplan, Robert, 400
Kazanjy, Pete, 87
Kroes, Neelie, 114
L
Laping, Chris, 344
Li, Charlene, 234, 235, 245
Lieberthal, Kenneth G., 151
Lim, Jenn, 260
Lindberg, Michael, 383–384
Loveland, Gary, 149
M
McClennon, Mark, 64
McConnell, Mike, 150
McCoy, Sheri, 365
Madoff, Bernard, 166–168, 320
Madrigal, Alexis, 210
Mark, Gloria, 453
Martin, Roger L., 390
Mason, Hilary, 9
May-Treanor, Misty, 185–186
Merzenich, Michael, 454
Mitnick, Kevin, 161
Mollohan, Alan, 431
N
Nass, Clifford, 454
Noble, Robert, 88
Norton, David, 400
O
Obama, Barack, 248, 255
Oksanen, M., 97
Olander, Stefan, 186
Ollman, Gunter, 179
Owyang, Jeremiah, 249
P
Palomäki, P., 97
Patil, D. J., 9
Porter, Michael, 21, 23
R
Raimondi, Marc, 431
Reardon, Martine, 267
Rigglesworth, Simon, 305, 306
Rogers, Mike, 150–151
Romney, Mitt, 248
Ryan, Dan, 451
S
Schumpeter, Joseph, 334
Schwanhausser, Mark, 223
Sezer, Esat, 73, 74
Silei, Christiano, 301
Solis, Brian, 249
Spataro, Jared, 341
Steinhafel, Greg, 143, 144
Stone, David, 374
Sumlin, Carrie, 274
Symonds, Michelle, 420
T
Thornton, Janet, 89
Tomlinson, Ray, 118
V
Vallance, Patrick, 89
W
Warburton, Jon, 311–312
Wheeler, Tom, 117
Y
Yogurtcu, Tendu, 87
Z
Zuckerberg, Mark, 229, 239–241, 442–443, 451
Name Index
N-1
BMNIndx.indd Page N-1 13/11/14 11:51 AM f-391 /208/WB01490/9781118897782/bmmatter
BMNIndx.indd Page N-2 13/11/14 11:51 AM f-391 /208/WB01490/9781118897782/bmmatter
2D tags, 288
3D bioprinting, 334–335
3D printing, 332–337
ethical concerns with, 451–452
and supply chain, 357
3G networks, 118, 119
4G networks, 114, 118, 119
5G networks, 114
802.11 standard, 125–126
2013 U.S. State of Cybercrime Survey, 149
2014 Global State of Information Security
Survey, 149
A
AaaS (applications as a service), 403
Abadie, Cecilia, 439–440
Acceptable use policies (AUPs), 158–159
Access, to data, 77
Access control:
in cybersecurity, 153
with dashboards, 381
in enterprise search, 192
in IT security management, 172
Accountability, as recordkeeping principle, 104
Accounting, as business process, 17
Accounting cycle fraud, 167
Accounting principles (COBIT), 157
Accounting software packages, 316
Accounting systems, 304, 315–323
Accounts payable (AP) function, 404–405
Accuracy, data, 303
ACID test, 304
Active data warehouses (ADWs), 91–92
ADA (Americans with Disabilities Act), 324, 444
Adaptive Discovery software, 378
Additive manufacturing, 332
ADEA (Age Discrimination in Employment Act),
324, 444
Ad hoc reports, 51
Administrative controls, in IT security
management, 172
Advanced persistent threat (APT), 149, 161–162
Advanced scouting systems, 12
Advanced search, 195
Advance Research Projects Agency network
(ARPAnet), 118–119
Advertising dashboards, 381
ADWs (active data warehouses), 91–92
Aerospace industry, 335
Afghanistan, 97–98
Age Discrimination in Employment Act (ADEA),
324, 444
Aggregation, data, 375
Agility, 19, 62–65
Agriculture, 14
Airbus A320 aircraft, 335
Airline industry:
balanced scorecard in, 401–402
use of data warehouses by, 93
AJAX (asynchronous JavaScript and XML), 228
Alliance strategy, 23
AlphaVision, 376
Amazon Mechanical Turk, 25
American Idol, 290
Americans with Disabilities Act (ADA), 324, 444
Amsterdam, Netherlands, 27
Analytics:
and business intelligence, 101–102
CarMax’s use of, 101–102
in Google Maps API, 139
preparing data for, 90–92
supply chain, 357
tracking customers with, 306
Analytical data, 85
Android, 450
botnets on, 164
launch of, 13
mobile games on, 282
security apps on, 165
Angry Birds, 282
Anomaly detections, 169
Anti-money-laundering (AML)
guidelines, 418
Antivirus (AV) software, 161, 163
AP (accounts payable) function, 404–405
APIs, see Application program interfaces
API value chain, 122
Apps:
cybersecurity of, 163–166
latency-sensitive, 117
malicious, 165
malware on, 164
for mobile entertainment, 283
mobile games as, 282
Apple Store, 450
Application architecture, 44
Application controls, 171
Application program interfaces (APIs):
for dashboards, 380
and Facebook, 229
and mashups, 251
as networks, 121–123
and Web development, 227
Applications as a service (AaaS), 403
Applications portfolios, 397
App Reputation Report, 449
APT (advanced persistent threat), 149, 161–162
Arab Spring, 150, 248
ARPAnet (Advance Research Projects Agency
network), 118–119
“As a service” (XaaS) models, 62, 65, 403
Assets:
in cyber risk management, 152
safeguarding of, 321
Assurance of Learning Requirements, 136–137
Asynchronous JavaScript and XML (AJAX), 228
Atomicity, 304
Attack surface, 149
Attack vectors:
created by mobile devices, apps, and clouds,
165–166
in cyber risk management, 154
Auctions, in e-commerce, 277
Audits:
as control activity, 322
of control systems, 173
in cybersecurity, 153
Augmented reality (AR):
in mobile commerce, 285
in retail strategies, 268
AUPs (acceptable use policies), 158–159
Authentication, 153, 172
Authorization, control access, 172
Automated APIs, 121
Automobile industry:
potential for digital development in, 14
3D printing in, 335
and vehicle-to-vehicle communications, 459
Availability:
in cyber risk management, 154
as recordkeeping principle, 104
Avatars, 242
AV (antivirus) software, 161, 163
Awareness, in IT security management, 170
AWS (Amazon Web Services), 64
B
B2B, see Business to business
B2C (business to consumer), 271–277
Backdoors, 160
Backlinks, 199, 200
Back-offi ce operations, 355
Backstage Pass Program, 266
Balanced scorecard (BSC), 400–403
defi ned, 390
uses of, 392
Bandwidth:
broad, 227
for data networks, 114
defi ned, 118
Banking (banking sector):
international, 275
mobile, 288–290
multi-currency, 275
online, 272–275
and social networking, 222–224
use of data warehouses by, 93
Bankruptcy Act, 324
Bank Secrecy Act IT Modernization
program, 108
Bank Transfer Day, 222
Barcodes, 265
Bargaining power, 22
Barriers to content, 201
Barriers to entry, 22
Baseline, 427
Batch processing, 50
Behavioral feasibility, 433
Benefi ts administration, 326–327
Best of the Web, 187
BI, see Business intelligence
BIA (business impact analysis), 174
Big bang approach, 365
Big data:
Coca-Cola’s approach to, 74–75
defi ned, 2
in digital business, 8
and genomics, 88–89
handled by transportation management
systems, 308
as a service, 65
Big data analytics:
data management, 86–89, 93–96
invasiveness of, 448–449
Bill payments, mobile, 288
Bing, 187, 208
Biometric controls, 172
Subject Index
S-1
BMSIndx.indd Page S-1 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
S-2 Subject Index
CIA triad, 153
CIM (computer-integrated manufacturing),
311–312
CIO (chief information offi cer), 394, 398–399
Ciphertext, 153
Circuit switching, 116
Cisco Visual Networking Index (VNI), 123
CISO (chief information security offi cer), 398
Civil rights, 445
Civil Rights Act of 1964, 324
Civil Rights Act of 1966, 324
Clear text, 153
Click-and-mortar organizations, 276
Click-through rates (CTRs), 194
for paid search advertising, 204
in quality scores, 203–204
and ranking factors, 199
and relevance scores, 200
Climate change, 130–133
Climate change mitigation, 135
Cloaked pages, 202
Cloning, 290
Cloud computing:
accounting software as, 316
and brainstorming, 129
and business intelligence, 101
cybersecurity of, 149, 163–166
in digital business, 6–7
and enterprise systems, 339
for human resource information systems, 325
in information management, 56–59
as IT infrastructures, 53
in transportation management systems, 308–309
vulnerability of, 163–164
Cloud computing stack, 62–63
Cloud infrastructure, 58–59
Cloud services:
in information management, 62–65
selection of, 56–58
strategy for, 403
Cloud storage service, 257
Cloud strategy, 403–404
Cloud technology:
carbon footprint of, 135
in social-mobile-cloud model, 9–10
Cluetrain Manifesto, 234
Clustered search, 208
CLV, see Customer lifetime value
CMO (chief marketing offi cer), 398
CNNMoney, 347
COBIT (Control Objectives for Information and
Related Technology), 157
CoCA (cost of customer acquisition), 204
Cognitive overload, 453
Cognitive skills, Internet’s effect on, 454
COIT (consumerization of information
technology), 164
Cold start, and recommendation engines, 211–212
Collaboration:
and business intelligence, 342–343
as business network function, 115
and enterprise social platforms, 341
for networks, 127–130
virtual, 127–128
Yammer and, 342–343
Collaborative fi ltering, 210–211
Collection analysis module (crawler search
engines), 188
Command and control (C&C) channel, 164
Commodities, 20
Common values, as element of social media, 233
Communication:
as business network function, 115
IT steering committee and, 396
Business intelligence (BI):
and collaboration, 342–343
and data management, 99–102
defi ned, 76
Business models:
defi ned, 6
for online retailing, 276
and Web development, 227
Business networks, 115–116
Business objects, 374
Business planning, online, 276
Business processes:
characteristics of, 18
components of, 17
cost of ineffi cient, 41
defi ned, 15
and enterprise resource planning, 351
redesign of, 340
Business process management (BPM), 15–19
Business process measures
(balanced scorecard), 401
Business process reengineering (BPR), 18
Business records, 102, 103
Business strategy:
and business intelligence, 100–101
and IT strategy, 395, 397–399
and outsourcing, 406
Business to business (B2B):
defi ned, 3
e-commerce, 277–279
McCain Foods as, 3
Business to consumer (B2C), 271–277
Business value, of data and text mining, 96–97
Business value drivers, 393
BYOA (bring your own apps), 164
BYOD (bring your own device), 148–149
C
CAD (computer-assisted design), 452
California, 136
CAM (computer-assisted manufacturing), 452
Capital budgeting, 322
Carbon cycle, 132
Carbon emissions, 131, 133–135
Carbon footprints, 135–136
CarPlay, 458–459
Cascade hybid recommendation engines, 212
Cascading style sheets (CSS), 228
Casinos, 13
Categorizing:
as element of social media, 233
in text mining, 98
CBA (Commonwealth Bank of Australia), 399
CBOE (Chicago Board Options Exchange), 376
C & C (command and control) channel, 164
CDC (change data capture), 90
Centralized databases:
architecture of, 80
at Coca-Cola, 72
CEO (chief executive offi cer), 395, 398
CFO (chief fi nancial offi cer), 398
Change data capture (CDC), 90
Channel confl ict, 275–276
Channel hopping, 269
Chatter, 345
Chief executive offi cer (CEO), 395, 398
Chief fi nancial offi cer (CFO), 398
Chief information offi cer (CIO), 394, 398–399
Chief information security offi cer (CISO), 398
Chief marketing offi cer (CMO), 398
Chief risk offi cer (CRO), 398
Chief technology offi cers (CTOs), 29
CHP (California Highway Patrol), 439
Biometrics:
in cybersecurity, 153
mobile, 166
voice, 166
Bioprinting, 451–452
Biotechnology, 88–89
Birst, 374
Black Book model, 75
Black hat SEO tactics, 201–202
BlackPOS, 142–144
Black smartphone, 146–147
Blogs:
as online community, 236
social networking, 245–250
as Web 2.0 applications, 231
Bloggers, 245–246
Blogosphere, 245
Bluetooth technology:
defi ned, 125
and GPS, 120
Boeing 737 aircraft, 335
Bots, 187
Bot herders, 162
Botnet(s):
on android phones, 164
in cybersecurity, 153, 162
Bot network, 153
Bounce rate, 199, 200
BPM (business process management), 15–19
BPR (business process reengineering), 18
Brainstorming apps, 129
Brand advocates, 252
Branded search queries, 185
Breach of privacy, 442
Breakeven analysis, 433
Bribery, 167
Bring your own apps (BYOA), 164
Bring your own device (BYOD), 148–149,
164–165
Broadband:
fi xed-line, 118
at home, 226
mobile, 118
and Web development, 227
Browse feature (of Spotify), 121
BSC, see Balanced scorecard
Budgeting, 322
Buffer stock, 309
Build-outs, 124–125
Business, digital, see Digital business
Business analytics, 96
Business architecture, 44
Business case, 417, 421, 422
Business continuity:
electronic record management systems for, 104
with virtualization, 61
Business continuity plan, 173
Business-driven development approach, 100
Business functions, 297–327
accounting and fi nance systems, 315–323
computer-integrated manufacturing, 311–312
at Ducati, 299–302
ethical issues with, 327
human resource systems, 323–327
inventory control systems, 309–310
logistics management, 309
manufacturing and production systems, 307
manufacturing execution systems, 311
POM technologies, 310–311
quality control systems, 310
sales and marketing systems, 312–315
solving challenges with, 302–306
transportation management systems, 307–309
Business impact analysis (BIA), 174
BMSIndx.indd Page S-2 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Subject Index S-3
at McCain Foods, 5
monitoring services reporting to, 253
Data:
accuracy of, 303
consistency of, 78
disclosure of, 317
fl ow of, 47–49
from functional systems, 298
geospatial, 368
human analysis of, 88
in information systems, 47
integrated, 108
integrity of, 304
ownership of, 83–84
point-of-sale, 369
quality of, 40, 50, 80, 100
security of, 303
selection of appropriate, 100
sparsity of, 212
supply chains and fl ow of, 355
unstructured, 8, 192
use of, 46
validity of information from, 88
virtualization of, 56
volatility of, 75, 78
Data aggregation, 375
Data analytics:
defi ned, 2
at Financial Crimes Enforcement
Network, 108
McCain Foods’ use of, 4–5
Data architecture, 44
Data as a service (DaaS), 64
Database(s):
data warehouses vs., 90
defi ned, 75
in information systems, 47
Database management systems
(DBMSs), 75–86
Data centers:
cloud computing vs., 58
at Google, 190
in information management, 53–56
Data chaos, 55
Data disclosure, 317
Data discovery, 372, 374
Data-driven marketing, 314
Data entity, 85
Data errors, 86
Data governance:
defi ned, 36
in health-care industry, 67–68
in information management, 45–47
at Intel Security, 34–37
weak or nonexistent, 46
Data latency, 77
Data life cycle, 84–85
Data management, 70–105
big data analytics, 86–89, 93–96
and business intelligence, 99–102
at Coca-Cola, 71–75
data and text mining, 96–99
database management systems, 75–86
data warehouses, 89–93
with electronic records management, 102–105
in health-care industry, 67–68
Data marts:
data warehouses vs., 90
defi ned, 76
Data mining:
for customer relationship management, 360
data management, 96–98
defi ned, 97
Data networks, 113–121
Cost leadership strategy, 23
Cost of customer acquisition (CoCA), 204
Covert resistance, 433
Crawlers, 187
Crawler control module, 188
Crawler search engines, 187–189
Creative destroyer, 334
Credit, as type of crowdfunding, 237
Credit cards:
cybersecurity for, 157–158
mobile payments with, 287
Credit card industry, 93
Critical infrastructure, 147–148
Critical path, 429
Critical success factors (CSFs), 24
Critical tasks, 429
CRM (customer relationship management), 338,
358–362
CRO (chief risk offi cer), 398
Cross-functional business processes, 17, 303
Cross-selling, 35
Crowdfunding, 237–238
defi ned, 425
and milestones, 425, 426
Crowdsourcing, 237, 455–456
CrownWorx 3D printer, 335
CSFs (critical success factors), 24
CSS (cascading style sheets), 228
C-suite, 398
CTOs (chief technology offi cers), 29
CTRs, see Click-through rates
Culture:
as element of social media, 233
and IT strategy, 398
Customers:
acquisition and retention of, 359–360
bargaining power of, 22
and supply chain, 356
Customer-centric business model, 34, 360
Customer complaints, 259–261
Customer data mashups, 379
Customer experience (CX), 6, 359
Customer lifetime value (CLV):
and customer relationship management, 359
defi ned, 337
Customer lock-in strategy, 23
Customer loyalty, 340
Customer measures (balanced scorecard), 401
Customer orientation strategy, 23
Customer relationship management (CRM), 338,
358–362
CX (customer experience), 6, 359
Cyberattacks, on Google, 190
Cyber risk management, 152–163
Cybersecurity, 141–174
BlackPOS malware, 142–144
cyber risk management in, 152–163
cyberthreats, 144–152
fraud defense in, 166–169
and internal control, 169–174
for mobiles, apps, and clouds, 163–166
objectives of, 151
Cyberthreats:
in cybersecurity, 144–152
defi ned, 144
Cycle time, 16
D
DaaS (data as a service), 64
Daily Beast, 451
Damage control, 170
Dashboards, 380–384
on casino fl oors, 13
and IT strategy, 398
synchronous, 255
on the Web, 229–231
Communication technologies, 127–130
Community(-ies):
as element of social media, 233
online, 235–236
for social networking, 235–244
virtual, 235, 238–239
Competitive advantage:
customer relationship management as, 360
in digital business, 19–25
in mobile commerce, 280–282
Competitive forces model, 21–24
Compliance:
and accounting functions, 315–316
electronic record management systems for,
104–105
enhanced, with information management, 42
in HR systems, 324
in IT security management, 170
as recordkeeping principle, 104
with XBRL tagging, 318
Compound hybid recommendation engines, 212
Computer-assisted design (CAD), 452
Computer-assisted manufacturing (CAM), 452
Computer-integrated manufacturing (CIM),
311–312
Computer systems failures, 160
Concept search, 208
Confi dentiality:
and cyber risk management, 154
and information theft, 150
Confl ict of interest, 167
Connected Generation, 223
Connectedness:
of mobile networks, 127
of society, 136, 137
Connections, as element of social media, 233
Consistency, of data, 78, 304
Consumerization of information technology
(COIT), 164
Contaminated food, 353
Content, 234, 257
Content-based fi ltering, 209–210
Content control, 232
Content creators, 225
Contracts:
and data warehouses, 92
with vendors, 408
Contract hackers, 155
Control Objectives for Information and Related
Technology (COBIT), 157
Conversation(s):
as element of social media, 233
markets as, 234
tools for, 255–256
Core business processes, 337
Corporate governance, 168–169
Corporate procurement, 278
Corporate purchasing, 278
Corporate social media discrimination, 444
Corporation(s):
attacked by advanced persistent threats, 161–162
legal rights of, 324
Correction (IT security management), 170
Costs:
and innovation, 357
project, 419
sunk, 430
Cost–benefi t analysis, 173–174
Cost–benefi t principle, 157
Cost control, 323
Cost estimations, 426
BMSIndx.indd Page S-3 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
S-4 Subject Index
Employment fraud, 318
Empowered price sensitivity, 269
Encryption, 153
Energy:
required by virtual machines, 61
usage of, by Google, 190–191
and wind power, 95
Enforcement procedures (cybersecurity), 159
Engine parts, 3D printing for creating, 335
Enterprise 2.0, 255
Enterprise application integration (EAI), 346
Enterprise apps, 456
Enterprise architecture (EA):
design of, 40
for information management, 42–45
Enterprise clouds, 58
Enterprise data, 85
Enterprise data management, 71–74
Enterprise data mashups, 377–380
Enterprise data warehouses (EDWs), 74, 89–93
Enterprise Graph, 343
Enterprise mashups, 251
Enterprise resource planning (ERP), 338, 346–352
customer relationship management vs., 359
initial failures with, 349–350
selection of, 348–349
success factors with, 350–352
Enterprise risk management (ERM):
and cloud strategy, 403, 404
for IT governance, 157
Enterprise search, 191–192
Enterprise social (term), 341
Enterprise social platforms, 341–345
Enterprise systems, 331–362
customer relationship management systems,
358–362
defi ned, 338
enterprise resource planning systems, 346–352
implementation of, 337–341
social platforms for, 341–345
supply chain management systems, 352–358
for 3D printing, 332–337
Enterprise technology, trends in, 25–27
Entry barriers strategy, 23
Environmental hazards, 160
EOQ (economic order quantity) model, 309
E-procurement, 278
Equal Employment Opportunity Act, 324
Equal Pay Act of 1963, 324
Equipment independence, of social media, 234
Equity, as type of crowdfunding, 237
E-records, 103
ERM, see Electronic records management;
Enterprise risk management
ERP, see Enterprise resource planning
ERP Vendor Shootout, 348
Error correction, 82–83
E-sourcing, 277–278
E-textbook readers, 293
Ethical issue(s), 438–454
with business functions, 327
focus management, 453–454
of Google Glass, 439–442
with networks, 136–137
privacy as, 244, 442–444
and responsible conduct, 448–453
in search engine optimization, 201–202
and social media guidelines, 446–448
social recruitment, 443–446
ETL (extract, transform, and load), 90
Eventual consistency, 78
Exabyte (EB), 123
Exception reports, 50–51
Exchanges, 278–279
Direct conversion, 434
Directories, mobile, 286
Direct procurement, 278
Direct-to-consumer (DTC) sales, 182
Dirty data:
costs of, 81–83
at Intel Security, 34–37
Disaster recovery, 104
Disclosure statements, 446
Disconnect anxiety, 136
Discrimination:
and civil rights, 445
corporate social media, 444
defi ned, 444
and hiring practices, 445
Discussion groups, 256
Disposition, as recordkeeping principle, 104
Disruptive innovation, 293
Distracted driving, 136
Distraction, digital, 453–454
Distributed database systems, 80–81
Distributed denial-of-service (DDoS), 147, 148
Document object model (DOM), 228
Donations, as type of crowdfunding, 237
Do-not-carry rules, 150–151
Download rates, 119
Driving, while distracted, 136
Drug development, 88–89
Drug-Free Workplace Act of 1990, 327
DTC (direct-to-consumer) sales, 182
Ducati Communication System, 301
Dump Memory Grabber, 142
Durability, of data, 304
Dwell time, 199–201
E
E. coli, 353
EA, see Enterprise architecture
EAI (enterprise application integration), 346
Early Web, social Web vs., 226
EB (exabyte), 123
E-books, 272
E-commerce, 271–279
business to business, 277–279
business to consumer, 271–277
issues in, 275–276
by Nike, 184
in omni-channel retailing, 269–270
recommendation engines used by, 209
use of data warehouses by, 93
E-commerce dashboards, 381
Economic feasibility, 433
Economic order quantity (EOQ) model, 309
Edge services, 403
EDWs (enterprise data warehouses), 74, 89–93
EFT (electronic funds transfer), 275, 355
EHRs (electronic health records), 67–68
EIS (executive information system), 40
Electronic data interchange (EDI), 128
Electronic funds transfer (EFT), 275, 355
Electronic health records (EHRs), 67–68
Electronic records, 103
Electronic records management (ERM), 102–105
Electronic wallet (e-wallet), 271
E-mail:
development of, 225
malware delivered by, 160
origin of, 118
Embedded objects, 14
Embezzlement, 167
Employees, mining, for ideas, 344
Employee development, 326
Employee relationship management, 327
Data roles, 375
Data science, 8–9
“Data Scientist: The Sexiest Job of the 21st
Century” (Davenport and Patil), 9
Data silos, 38–39
Data storage, at Google, 190–191
Data supply chain, 456
Data tampering, 161
Data transfer capacity, 119
Data types, 375
Data visualization, 367–386
defi ned, 2
digital dashboards, 380–384
enterprise data mashups, 377–380
geographic information systems, 384–386
in Google Maps API, 139
and learning, 371–377
at McCain Foods, 5
at Safeway and PepsiCo, 369–371
Data warehouses:
at Coca-Cola, 72
data management, 89–93
defi ned, 75–76
and volatility, 53
DB2, 79
DBMSs (database management systems), 75–86
DDoS (distributed denial-of-service), 147, 148
DSSs (decision-support systems), 48–49, 51–53
Decision models, Coca-Cola’s use of, 75
Decision processes, 128–129
Decision-support systems (DDSs), 48–49, 51–53
Declarative languages, 76
Deepwater Horizon explosion and oil spill, 395
Defense-in-depth model, 147, 158–160
Defense sector:
supply chains in, 354
3D printing in, 334
use of data warehouses by, 93
Defense strategy, for IT security management,
170–171
Deliverables, 17, 418
Demand management, 279
Demographic systems, 211
Dental work, and 3D printing, 335
Denver International Airport (DIA), 415–417
Desktop technology, operating systems for, 121
Detection, 170
Deterrence, 170
Development, of employees, 326
DIA (Denver International Airport), 415–417
Diavel, 300
Differentiation strategy, 23
Digital business, 1–29
businesses as, 6–15
business process management for, 15–19
competitive advantages in, 19–25
defi ned, 6
digital technologies for, 6–9, 13–15
enterprise technology trends for, 25–27
IT expertise in, 27–29
McCain Foods as, 2–6
models for, 11–13
social-mobile-cloud model for, 9–11
Digital business model, 6
Digital dashboards, 380–384
Digital dependents, 269
Digital distraction, 453–454
Digital immigrants, 269
Digital IQ global survey, 398
Digital music service, 121–122
Digital natives, 269
Digital–physical blur, 455
Digital technologies, 6–9, 13–15
Dimensions (of data), 375
BMSIndx.indd Page S-4 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Subject Index S-5
Executive information system (EIS), 40
Exploit (term), 153, 154
Exploration (text mining), 98
Exposure, 153
Extendable markup language (XML), 206, 228
Extensibility, 404
EXtensible Business Reporting Language (XBRL),
298, 317–318
External transactions, 49
Extract, transform, and load (ETL), 90
Extranets:
as collaboration technology, 129
and SharePoint, 342
F
Faceted search, 208
Facial recognition, 441
Fault tolerance:
in cybersecurity, 153
of DBMSs, 80
Feasibility studies, 433–434
Federal Prosecution of Corporations, 324
Feedback, 414
Filetype, in searches, 195
Filtering, data, 77
Finance, as business process, 17
Finance systems, 304, 315–323
Financial disclosure, 317
Financial measures (balanced scorecard), 401
Financial meltdowns, 320
Financial misrepresentation, 316
Financial performance dashboards, 381
Financial ratio analysis, 323
Financial sector, 286–291
and anti-money-laundering guidelines, 418
data governance in, 45
data warehouses used by, 93
social media use by, 26, 447
supply chains in, 355
Financial value drivers, 393
Firewalls, 153
5G networks, 114
Five-forces model, 21–24
Fixed-line broadband, 118
Flexibility, 19
Flexible manufacturing systems
(FMSs), 312
Focused search, 195
Focus management, 453–454
Folksonomy, 256
Food industry:
and contamination, 353
data governance in, 45
Food Safety Modernization Act (FSMA), 6
Forecasting, 92, 322
Formal processes, 18
The Forrester Wave: Enterprise Social Platforms,
Q3 2011, 341
4G networks, 114, 118, 119
FrameWorx 3D printer, 335
Fraud:
accounting cycle, 167
and cybersecurity, 166–169
defi ned, 166
fi nancial meltdowns triggered by, 320
internal, 168–169, 318
occupational, 166
prevention and detection of, 318–320
senior management fi nancial reporting, 167
Fraud risk management, 318
Front-offi ce operations, 355
Frozen food industry, 4
FSMA (Food Safety Modernization Act), 6
Greenhouse gases (GHGs), 131–133
Groundswell, 234, 235
Group dynamics, 128
Group work, 128–129
Growth strategy, 23
H
Hackers:
contract, 155
and cybercrime, 147
data stolen by, 144, 145
Hacking:
by hacktivists, 150
as industry, 155
and user satisfaction, 201
Hactivist(s):
and cybersecurity, 150
defi ned, 148
visibility of, 149
Hadoop, 87, 94–95
Hadoop File Systems (HDFS), 95
Hardware, cybersecurity, 159–160
Hardware stores, 3D printing for, 334
Hardware virtualization, 60
Harvard Business Review (HBR), 88, 400
Hashtags, 250
Hashtag activism, 248
Hashtag journalists, 248
HDFS (Hadoop File Systems), 95
Health care:
data analytics in, 94
data errors in, 86
data governance in, 45, 67–68
data management in, 67–68
electronic records management in, 105
issues with information in, 38–39
potential for digital development in, 14
regulations on social media use by, 26
3D printing in, 334–335
use of data warehouses by, 93
wireless technology used in, 123
Health information exchange (HIE), 68
Health records executive committee, 68
Heat maps, 372–373
Hedge funds, 376
HIE (health information exchange), 68
High Leverage Network (HLN), 136
Hiring, negligent, 445–447
HIVE, 369–371
HLN (High Leverage Network), 136
Holistic business strategy, 390
Horizontal exchanges, 278, 279
Hosted services, 63
Hotel industry, use of mobile
commerce by, 284
HR, see Human resources
HRISs (human resource information systems),
324–325
HR mashups, 380
HR systems, 304, 323–327
HTML (hypertext markup language), 206
Human error, as unintentional threat, 160
Human resource information systems (HRISs),
324–325
Human resources (HR):
as business process, 17
and data visualization, 376
as support activity, 24
Human resource (HR) systems, 304, 323–327
Hybrid recommendation engines, 212–213
Hybrid search engines, 187
Hyperscale computer systems, 456
Hypertext markup language (HTML), 206, 228
Fulfi llment:
multichannel, 357
order, 355–356
Full-text similarity search, 207
Functions, business, see Business functions
Functional exchanges, 279
G
G , 241
GAAP (generally accepted accounting
principles), 315
Gambling, online, 156, 283, 321–322
Games, mobile, 282
Gantt charts, 426
“Garbage in, garbage out” (GIGO), 81
Gb (gigabyte), 71
Gen C, 223
General controls, in IT security management,
171–172
Generally accepted accounting principles
(GAAP), 315
Generally accepted recordkeeping principles, 104
Genetic Information Nondiscrimination Act of
2008 (GINA), 444
Genomics, 88–89
Geocoding, 384
Geographic information systems (GISs), 368,
384–386
Geospatial data, 368, 371
GetGlue.com, 267
GHGs (greenhouse gases), 131–133
Ghost pages, 202
Ghost text, 202
Giant Global Graph, 236
Gigabyte (Gb), 71
GIGO (“garbage in, garbage out”), 81
GINA (Genetic Information Nondiscrimination
Act of 2008), 444
GISs (geographic information systems), 368,
384–386
Global e-Sustainability Initiative (GeSI), 133
Global mean temperature (GMT), 131
Global warming, 132–135
GMT (global mean temperature), 131
Goal seeking analysis, 52
Go/no-go decision, 425, 434
Google Alerts, 197, 254
Google Analytics, 198
Google Customer Surveys, 313–314
Google Docs, 64
Google Earth, 190
Google Glass, 13, 439–442
Google Maps:
as big data, 456
ethical concerns with, 450
and GPS, 385
mashups with, 252
as travel app, 283–284
Google Maps API, 122, 139, 227
Google Play, 165, 450
Google , 241
Google Hangout, 255
Google Trends, 197
Google Wallet, 267, 287
Governance, 395. See also Data governance
Government(s):
attacks on, by advanced persistent threats,
161–162
attacks on, by hacktivists, 150
and cybersecurity, 157
do-not-carry rules for, 150–151
use of data warehouses by, 93
GPS technologies, 120
BMSIndx.indd Page S-5 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
S-6 Subject Index
Isis Mobile Wallet, 27
Isolation, 304, 456–457
IT-business alignment, 390
IT careers, 28–29
IT consumerization, 19
IT department, 340
IT governance, 157
IT industry:
proposed changes in, 134–137
role of, in global warming, 132–133
IT infrastructure, 53
IT project managers, 29
IT steering committees, 396–397
IT strategic planning, 393
IT strategy, 389–408
balanced scorecard, 400–403
and balanced scorecard, 400–403
and business strategy, 395, 397–399
categories of, 394
and governance, 395
at Intel, 390–392
for IT sourcing, 403–408
and strategic planning process, 392–397
IT systems, 304
IT vendors, 405–408
iWatch, 13, 119
J
JackBe, 380
Japan:
mobile banking in, 289
QR codes in, 281
JavaScript, 206
Java technology, 184
JIT (just-in-time) inventory management systems,
309–310
Job growth, IT, 28
Job markets, online, 275
Job rotation, 320
Just-in-time (JIT) inventory management systems,
309–310
K
Kaching app, 399
Key performance indicators (KPIs), 423
on dashboards, 380
as measures, 375
selection of appropriate, 100–101
types of, 41
used at McCain Foods, 5
Keywords:
Nike’s use of, 184–185
and relevance scores, 200
in web searches, 182
Keyword conversion rates, 198, 204
Keyword tricks, 202
Kindle e-readers, 272
Kinect for Windows, 13
Klout, 254
KM (knowledge management), 341
Knowledge:
in information systems, 47
sharing, in social networking, 255–257
Knowledge-based systems, 211
Knowledge management (KM), 341
Knowledge workers, 192
Know your customer (KYC), 418
KPIs, see Key performance indicators
KPMG Data Loss Barometer, 148
KYC (know your customer), 418
Insurance industry:
data visualization in, 376
use of data warehouses by, 93
Intangible benefi ts (customer relationship
management), 362
Integrated business strategy, 390
Integrated change control, 428–429
Integrated data, 108
Integrated testing, 415
Integrity:
in cyber risk management, 154
of data, 77, 304
as recordkeeping principle, 104
Intellectual property (IP):
fi nding, on Web, 197
and 3D printing, 452
Intelligence, of mobile networks, 127
Intelligent analysis, 169
Intentional threats, 160
Interface(s):
defi ned, 337
with legacy systems, 332
user-friendly, 40
Intermodal transport, 307–308
Internal Campaign Report, 306
Internal control(s):
and cybersecurity, 169–174
and fraud, 320–321
Internal fraud, 168–169, 318
Internal threats, 156
Internal transactions, 49
International banking, 275
Internet:
and cognitive skills, 454
origin of, 118–119
Internet banks, 273–275
Internet of Things (IoT), 7–8
Internet Protocol (IP), 110–111
Internet services, 190
Intranets:
as collaboration technology, 129
and SharePoint, 342
Intrusion detection systems (IDSs):
in cybersecurity, 153
as IT defense, 163
Intrusion prevention systems (IPSs), 163
Intuit Financial Services, 222
Inventory control systems, 309–310
Inventory costs, 128
Inventory holding costs, 309
Investment industry, use of data
warehouses by, 93
IOS 5, and voice biometrics, 166
IoT (Internet of things), 7–8
IP (Internet Protocol), 110–111
iPad:
competitors of, 272
on corporate networks, 165
at Ducati, 301
launch of, 13
IP addresses, networks’ use of,
110–111
iPhones:
and CarPlay, 458–459
digital payments by, 27
mobile games on, 282
sports apps on, 283
IPO (input-processing-output) model, 48
IPSs (intrusion prevention systems), 163
IP Version 4 (IPv4), 110–111
IP Version 6 (IPv6), 111–113
IR (information retrieval) services, 187
IRT (incident response team), 159
ISs, see Information systems
I
IaaS, see Infrastructure as a service
iBeacon, 385
IBM Cognos, 386
ICT (information and communications
technology), 113, 132–137
Ideas, mining employees for, 344
Identity theft, 169
ILoveYou worm, 161
iMindmap Online, 129
Immediate consistency, 78
Implementation:
of enterprise resource planning, 349–350
of enterprise systems, 337–341
of new system, 434
and outsourcing, 406
Inbound logistics, 24, 309
Inbound marketing, 200, 201
Inc., 453
Incident response communication plans, 159
Incident response team (IRT), 159
Income statements, 315
Indexer module (crawler search engines), 188
Indirect procurement, 278
Industrial design, 3D printing for, 335
Industry structure, 19
Infl uence patterns, 269
Informal processes, 18
Information:
defi ned, 47
fl ow of, 305
in mobile commerce, 280–282
sharing of, between retailers and suppliers,
127–128
supply chains and fl ow of, 355
Informational search, 193
Information and communications technology
(ICT), 113, 132–137
Information management, 33–65
cloud computing in, 56–59
cloud services in, 62–65
data centers in, 53–56
data governance in, 45–47
defi ned, 37
enterprise architecture for, 42–45
information systems in, 47–53
at Intel Security, 34–37
purpose and benefi ts of, 37–42
virtualization in, 59–62
Information overload, 100
Information-protection models, 149
Information retrieval (IR) services, 187
Information sources, monitoring, 159
Information systems (ISs):
as business process, 17
context of, 53
in information management, 47–53
integration of, 340
Infrastructure as a service (IaaS),
63, 64, 403
In-house development, 394
In-house production, 356
Initial Web, 206
Innovation, 357
Innovation measures (balanced scorecard), 401
“Innovations That Drive Supply Chains,”
356–357
Innovation strategy, 23
Input-processing-output (IPO) model, 48
In Search of Memory (Kandel), 453–454
Insider fraud, 318
In-store tracking, 281
Insurance, and supply chain, 356
BMSIndx.indd Page S-6 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Subject Index S-7
L
Lagging indicators, 400
LANs (local area networks), 126
Latency, 77
Latency-sensitive apps, 117
Leading indicators, 400
Lean manufacturing systems, 310, 348
Learning, and data visualization, 371–377
Legacy systems, 331–332, 338, 364
Legal feasibility, 433
Legality principle (COBIT), 157
Licenses, software and cloud-computing, 58
LifeLog app, 15
Line (app), 55
Link farms, 202
Link spamming, 202
Listeria, 353
Local area networks (LANs), 126
Location-based marketing, 285
Logistics:
defi ned, 355
of e-commerce, 276
inbound, 24, 309
outbound, 24, 309
Logistics management, as business function, 309
Logistics mashups, 380
Long-range IT plan, 396
Long-Term Evolution (LTE), 119
Looking Further with Ford—2014 Trends, 137
Lost business, due to dirty data, 82
Loyalty, customer, 340
Loyalty effect, 360
LTE (Long-Term Evolution), 119
M
M2M, see Machine-to-machine technology;
Mobile-to-mobile communications
M2M (mobile to mobile) communications, 114
M2M (machine-to-machine) technology, 7, 357
M3 QuickStep, 347
Machine-to-machine (M2M) technology, 7, 357
Maintenance, system, 434
Make-A-Wish Foundation, 268
Malicious apps, 165
Malware:
defi ned, 142
types of, 160–161
and user satisfaction, 201
Management development, 326
Management information systems (MISs), 47–51
Managers, and web technology, 229
Manufacturing:
additive, 332
as business function, 304, 307
and dirty data, 84
Manufacturing execution systems (MESs), 311
Manufacturing on-demand, 336
Manufacturing quality control (QC) systems, 310
MapReduce, 94–95
Markets, as conversations, 234
Marketing:
with blogs and microblogs, 248
as business process, 17
data-driven, 314
data needs of, 85
inbound, 200, 201
location-based, 285
mobile, 280
outbound, 201
potential for digital development in, 14
as primary activity, 24
used by Internet banks, 274
wireless marketing, 284–286
Mobile devices:
and car crashes, 136
cybersecurity of, 163–166
entertainment on, 283
Facebook accessed from, 240
hackers’ use of, 150–151
search engines on, 194–195
services on, 10
trend towards use of, 26
used in retail shops, 196
Mobile directories, 286
Mobile display strategy, 266–267
Mobile e-commerce, 279. See also Mobile
commerce (m-commerce)
Mobile entertainment, 283
Mobile games, 282
Mobile infrastructure, 124
Mobile location-based marketing, 285
Mobile marketing, 280
Mobile payment, 267
Mobile payment systems, 286–288
Mobile Phone Biometric Security Analysis and
Forecasts 2011-2015, 165
Mobile phone card reader, 287–288
Mobile retailing, 280
Mobile search, 194–195
Mobile technology:
carbon footprint of, 135
as disruptive innovation, 293
operating systems for, 121
in social-mobile-cloud model, 9–10
trends in, 123
Mobile-to-mobile (M2M) communications, 114
Mobile traffi c, drivers of, 115
Mobile visual search engine, 282
Mobility:
as business network function, 115
in customer relationship management, 361
as a service, 65
and supply chain, 357
Model(s). See also specifi c models
for digital business, 11–13
social-mobile-cloud, 9–11
Modeling (text mining), 98
Money laundering, 156
Monitoring programs, in mobile commerce, 281
Monitoring services, for social networking, 252–254
Moral hazard, 319
MRO supplies, 279
MTV Movie Awards, 290
Multichannel fulfi llment, 357
Multi-currency banking, 275
Multistrada, 300
Multitasking, 137, 454
Munitions, 354
My AutoTrader, 16
MySQL, 79
N
NameTag, 441
Natural language search, 208
Navigational search, 193
Near-fi eld communication (NFC) technology,
26–27
business uses of, 119–120
and Google Wallet, 267
and Kaching app, 399
mobile payments with, 287
Negligent hiring, 445–447
Net neutrality, 117–118
search engine, 193–194
on social networks, 10
supported by data warehouses, 92
wireless, 284–286
Marketing management, 314–315
Marketing planning, online, 276
Market research, 313–314
Market share, 86
Mashups:
enterprise, 251
enterprise data, 377–380
for social networking, 250–251
used by businesses, 252
as Web 2.0 applications, 231
of wireless technologies, 120
Mass social media, 230–231
Master data:
in database management systems, 85
and data governance, 46
at Intel Security, 36
Master data management (MDM):
at Coca-Cola, 74
in database management systems, 85
and data governance, 46
at Intel Security, 36
Master fi le, 36
Master reference fi les, 85
Maverick buying, 279
MayDay support system, 12
MDM, see Master data management
Measures (of data), 375
Medium-range IT plan, 397
Meetings:
and project success, 415
tools for, 255–256
Memory, for virtual machines, 61
Mental discipline, 454
MESs (manufacturing execution systems), 311
Metadata, 205
Meta-search engines, 187
Microblogs, 247–249
Micro moments, 137
Micropayments, 288
Microsoft Cloud, 342
Microsoft Dynamics AX ERP, 350
Microsoft Dynamics CRM, 386
Microsoft Excel, 376
Microsoft Offi ce, 386
Microsoft Outlook, 345
Microsoft Project, 425, 426
Microsoft Sidebar, vulnerabilities of, 154–155
MicroStrategy Cloud, 101
Milestones, 425, 426
Millennials, 344
Mink makeup 3D printer, 336
MISs (management information systems), 47–51
Misappropriation, 167
Mission, 302
Mixed hybrid recommendation engines, 212
Mobile banking, 288–290
Mobile bill payments, 288
Mobile biometrics, 166
Mobile broadband, 118
Mobile browsers, 281
Mobile check-in strategy, 267
Mobile commerce (m-commerce), 279–291
defi ned, 279
fi nancial services, 286–291
information in, 280–282
at Macy’s, 265–268
mobile entertainment, 283
in omni-channel retailing, 269–270
social networking, 284
travel services, 283–284
BMSIndx.indd Page S-7 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
S-8 Subject Index
Piracy, 441
Plaintext, 153
Plans:
tactical, 397
Planners Lab, 52
Planning:
for enterprise resource planning, 352
Platform:
blogging, 247
Web as, 226–227
Platform as a service (PaaS), 63, 64, 149, 403
Plug-ins, 229
PMBOK (Project Management Body of
Knowledge), 412
Poaching, 405
Point-of-sale (POS) data, 369
Point-of-sale (POS) payment terminals:
data collected by, 74
security breaches at, 142–144
POM (production and operation management),
307, 310–311
Ponemon 2013 Cost of Data Breach Study, 142
Popularity, as ranking factor, 199
POS payment terminals, see Point-of-sale payment
terminals
PostgreSQL, 79
Postmortem, 413, 431
Power usage effectiveness (PUE), 191
PPC (pay-per-click) advertising, 194, 203–204, 314
PPM (project portfolio management), 418
Practical Guide to Cloud Service Level
Agreements, 57
Predictive analytics, 449, 451
Preprocessing, in text mining, 98
Prevention, in IT security management, 170
Pricing:
of products and services, 314
supported by data warehouses, 92
Primary activities, 24
Privacy:
breach of, 442
defi ned, 442
on Facebook, 240
and social media, 244
Privacy invasions, 441
Privacy paradox, 442, 443
Private clouds, 58
Private exchanges, 278–279
Private social networking services, 243
Processes, business, see Business processes
Processing:
batch, 50
and data quality, 50
online transaction, 50
real time, 50
Products, pricing, 314
Product development time, 128
Production, as business process, 17, 304, 307
Production and operation management (POM),
307, 310–311
Productivity:
increased with digital technology, 6
of salespeople, 314–315
Product liability, 440
Professional networking sites, 239
Profi les, as element of social media, 233
Profi ling, data, 77
Profi tability analysis, 315, 323
Profi t margin, 21
Programming technologies, 227
Project(s), 412–414
defi ned, 413
failure of, 413–414
runaway, 432
Operating systems, 121
Operations, 17, 24
Operational effectiveness strategy, 23
Operational level, of business, 303
Operational value drivers, 393
Operation Aurora, 162, 179
Opportunistic repricing, 405
Opportunities (in SWOT analysis), 20
OptionVision, 376
Oracle Hyperion Profi tability and Cost
Management software, 323
Orbiting Carbon Observatory-2 (OCO-2), 132, 135
Order fulfi llment, 355–356
at Avon, 364
as cross-functional business process, 303
in e-commerce, 276
Order fulfi llment dashboards, 381
Ordering costs, 309
Order-to-cash process, 16
Organic search listings, 193
Organizational feasibility, 433
Organized crime, 155, 156
Oslo (app), 343
Outbound logistics, 24, 309
Outbound marketing, 201
Outsource relationship management (ORM)
companies, 394
Outsourcing, 406–407
Oversight, as business function, 321
Overspecialization, in recommendation
engines, 212
Overt resistance, 433
Ownership, of data, 83–84
P
PaaS, see Platform as a service
Packets, 110, 117
Packet switching, 116, 118–119
PageRank algorithm, 199
Page repository:
for crawler search engines, 188
for web directories, 187
Page titles, 200
Paid search listings, 193–194
Paid search strategies, 203–205
Panda (Google update), 201
Parallel conversion, 434
Passwords, 155
Patches, 164
Payload, of malware, 160
Payment Card Industry Data Security Standard
(PCI DSS), 157–158
Payment companies, 287
Pay-per-click (PPC) advertising, 194, 203–204, 314
Payroll services, 376
Pb (petabyte), 71, 189
Penguin (Google update), 201
Performance evaluations, 326
Performance metrics, 396
Periodic reports, 50
Personally identifi able information (PII), 157
Personnel planning, 326
Petabyte (Pb), 71, 189
Phased conversion, 434
Phishing, 156
and advanced persistent threats, 161
in mobile banking, 290
spear, 162
Phrases, on websites, 200
Physical controls, 171–172
Physical–digital blur, 455
PII (personally identifi able information), 157
Pilot conversion, 434
Net present value (NPV), 433
Net semi-neutrality, 117
NetSuite, 340
Network(s), 110–137
APIs, 121–123
and climate change, 130–133
collaboration and communication technologies
for, 127–130
data, 113–121
ethical issues with, 136–137
at Sony, 111–113
and sustainability, 133–136
wireless, 123–127
Network effect, 241
Networking standards, Wi-Fi, 125–126
Network speeds, 114
Network virtualization, 60
New England Journal of Medicine, 51
Newsfeed feature (Facebook), 240
Newsgroups, 235
New users, and recommendation engines, 211–212
New York State, 136
Nexus 7 (data mining system), 97–98
NFC technology, see Near-fi eld communication
technology
NHTSA (National Highway Traffi c Safety
Administration), 136
Niche strategy, 23
Nonlinear infl uence patterns, 269
Nonlinear search patterns, 269
Nonstandardized data formats, 39
NoSQL (not only SQL) systems, 79–80
Notifi cation procedures, for cybersecurity, 159
Not only SQL (NoSQL) systems, 79–80
NPV (net present value), 433
O
Objectives:
of business strategy, 390
defi ned, 15
Occupational fraud, 166, 318
OCO-2 (Orbiting Carbon Observatory-2), 132, 135
Odle, Keith, 439
Offi ce Graph, 343
Offshoring, 394, 405–406
OLAP (online analytics-processing) systems, 79
OLTP, see Online transaction processing
Omni-channel retailing, 269–270
On-demand computing, 63
On-demand manufacturing, 3D printing for, 336
On demand reports, 51
Online analytics-processing (OLAP) systems, 79
Online banking, 272–275
Online business planning, 276
Online comments, monitoring of, 223
Online communities, 235–236
Online gambling, 156, 283, 321–322
Online job markets, 275
Online marketing planning, 276
Online retailing:
issues in, 275–276
viability and risk of, 276
Online transaction processing (OLTP), 50, 79, 304
Onpage factors, 199, 200
Onshore sourcing, 394
Ontology-based search, 208
Open Directory Project, 187
Open Graph initiative, 241
Open source APIs, 227
Open Wi-Fi networks, 450
Operating management corruption, 167
Operating margin, 87
Operating plan, 390
BMSIndx.indd Page S-8 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Subject Index S-9
Project baseline, 427
Project management, 412–434
and basic characteristics of projects, 418–419
defi ned, 412
at Denver International Airport, 415–417
and enterprise resource planning, 351–352
failure in, 413–415
project closing, 431
and project life cycle, 421–428
project monitoring, 428–431
project planning, 421–428
and scope creep, 419
seven deadly sins of, 420–421
and system development life cycle, 432–434
Project Management Body of Knowledge
(PMBOK), 412
Project milestones, 425, 426
Project plans, 414
Project portfolios, 397
Project portfolio management (PPM), 418
Project scope, 418
Project teams, 414
Protected classes, 444
Protection, as recordkeeping principle, 104
Protocols, network, 118
Public clouds, 58
Public exchanges, 278–279
PUE (power usage effectiveness), 191
Pull-through ads, 314
Push-through ads, 314
Q
QC (quality control) systems, 310
QlikView, 368, 374, 375
QR codes, see Quick response codes
Quality control (QC) systems, 310
Quality of service (QoS), 116–117
Quality score, 203–204
Query(-ies):
in database management systems, 77, 78
and semantic search engine, 207
Query interface (crawler search engines), 188
Quick response (QR) codes:
in mobile commerce, 281–282
mobile payments with, 287, 288
retail strategies using, 266
R
Radio frequency identifi cation (RFID), 26–27
and food contamination, 353
and geospatial data, 385
as payment method, 314
in quality control, 310
Ramirez, Edith, 447
Ranking factors, 199–200
RATS (remote-access trojans), 160
R & D, see Research and development
RDBMSs (relational management systems), 76
RDF (resource description framework), 206
Reading level, 201
Realistic download rates, 119
Really simple syndication (RSS), 231, 251
Real time processing, 50
Real time search, 197
Real time systems, 2
Real time updating, 234
Recommendation engines, 193, 209–214, 217–218
Recommender systems, 209
Records, business, 102, 103
Recordkeeping, 104
Recovery, in IT security management, 171
Risk assessment:
for control systems, 173–174
and customer relationship management, 362
Risk factors, for fraud, 318–319
Risk management, 153
Rivalry, among fi rms, 22
Roambi Analytics, 377
RoAS (return on advertising spend), 204
Rogue apps, 165
Rogue app monitoring, 166
ROI, see Return on investment
Rootkit, 160
Routers:
in business networks, 115
unprotected, 450
Royalities, as crowdfunding, 237
RSS (really simple syndication), 231, 251
RSS aggregator, 251
RSS reader, 251
RSS technology, 251–252
Runaway projects, 432
S
SaaS, see Software as a service
Safety stock, 309
Sales:
as primary activity, 24
supported by data warehouses, 92
Sales and distribution channels, 314
Sales and marketing systems, 304, 312–315
Salesperson productivity, 314–315
Sales team dashboards, 381
Salmonella, 353
Santander, Spain, 124
SAP HANA, 456
Sarbanes-Oxley Act (SOX), 157, 170
SAS Enterprise Miner, 360
Satisfries, 4
Scalability, of DBMSs, 80
Schiphol Airport (Amsterdam, Netherlands), 27
SCM, see Supply chain management
Scope, project, 418
Scope creep, 416, 419
SDLC (system development life cycle), 432–434
Search:
as business network function, 115
informational, 193
navigational, 193
transactional, 193
Search engines:
as business, 182
crawler, 187–189
hybrid, 187
meta-, 187
mobile visual, 282
search technology, 186–191
semantic, 187
vertical, 197–198
Search engine marketing (SEM), 193–194
Search engine optimization (SEO):
by Nike, Inc., 184–185
in search engine marketing, 194
as search technology, 198–202
Search engine results page (SERP), 182, 188
Search history, 195
Search patterns, 269
Search technology, 182–205
business uses of, 191–198
at Nike, Inc., 182–186
paid search strategies, 203–205
search engine optimization, 198–202
search engines, 186–191
Search tools button, 195
Recruitment:
at Avon, 364
as HR activity, 325
on professional networking sites, 239
Red fl ags, 320
Reduce stage (of MapReduce), 94
Redundancy, 457
Reference results, 207
Regulations:
on “as a service” models, 65
for information management, 38
on use of social media, 26
Related search, 207
Relational databases, 76
Relational management systems
(RDBMSs), 76
Relationships. See also Customer relationship
management
as business network function, 115
with employees, 327
Relevance, as ranking factor, 200
Remote-access trojans (RATS), 160
Remote wipe capability, 166
Replenishment, and supply chain, 356
Reporting tools, 372
Repricing, opportunistic, 405
Reputation, as ranking factor, 199
Request for information (RFI), 406
Request for proposal (RFP), 406
Research and development (R&D):
on lowering carbon emissions, 135
and 3D printing technology, 333
Resilience, 456–457
Resistance, overt vs. covert, 433
Resource allocation, 396
Resource description framework (RDF), 206
Respondeat superior doctrine, 324
Responsibility matrix, 426, 427
Responsible conduct, 448–453
Responsiveness, 19
Retail banks:
dirty data at, 83–84
distrust of, 222–223
Retailers:
sharing information with suppliers, 127–128
use of data warehouses by, 93
use of mobile devices in, 196
Retailing:
mobile, 280
online, see E-commerce
Retailing technology, 14, 268–271
Retention, of records, 104
Retrieval/ranking module
(crawler search engines), 188
Return on advertising spend (RoAS), 204
Return on investment (ROI), 433
balanced scorecard and, 390
and enterprise resource planning, 351
Returns, and supply chain, 356
Retweet, 250
Revenue dashboards, 381
Revenue models, 276
Reverse supply chains, 355
Review sites, 199
Rewards, as crowdfunding, 237
RFI (request for information), 406
RFID, see Radio frequency identifi cation
RFP (request for proposal), 406
Rich snippets, 208
Risk(s):
in cyber risk management, 154
in cybersecurity, 153
with outsourcing, 405
and project management, 414
BMSIndx.indd Page S-9 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
S-10 Subject Index
Social Web, 206, 225–235
SODDI defense, 395
Software:
for business process management, 18–19
for cybersecurity, 159–160
Software as a service (SaaS), 377
accounting software as, 316
and cloud computing, 58
in cloud computing stack, 62–64
as cloud service, 149
and enterprise resource planning, 340
in HR systems, 325
in international banking, 275
SOPs (standard operating procedures),
18, 303–304
Sourcing, 394, 404–405
crowdsourcing, 237, 455–456
e-sourcing, 277–278
IT, 403–408
onshore, 394
outsourcing, 406–407
spot, 278
systematic, 278
SOW (statement of work), 421, 424–425
SOX (Sarbanes-Oxley Act), 157, 170
Spam, 162, 201
SPARQL protocol and RDF query language
(SPARQL), 206
Sparsity, data, 212
Spear phishing, 162
Spiders, 187, 189
SportVU, 12
Spot sourcing, 278
SPSS Analytic Catalyst, 368, 376
Spyware:
botnets as, 162
time-to-exploitation of, 164
SQL (structured query language), 76
SQL Server, 79
SquareUp, 305
Staffi ng, and IT steering committee, 396
Standard 15: Management of Curricula
(AACSB), 137
Standard operating procedures (SOPs),
18, 303–304
Statement of work (SOW), 421, 424–425
Steering committees, IT, 396–397
Stock-keeping units (SKUs), 336–337
Stock markets, 375–376
Stockouts, 309, 370–371
Storage virtualization, 60
Storm worm, 162
Strategic (SWOT) analysis, 20, 393, 394
Strategic IT plan, 396
Strategic plans, 302–303
Strategic planning, 21
as business challenge, 302–303
by CIO, 399
defi ned, 390
Strategic planning process, 392–397
Strategy(-ies):
for competitive advantage, 23
defi ned, 21
Street View, 450–451
Strengths (in SWOT analysis), 20
Structured data, 192
Structured decisions, 52
Structured query language (SQL), 76
Subscription monitoring services, 252–253
Sunk costs, 430
Superleggera Superbike, 299
Suppliers, 356
bargaining power of, 22
sharing information with retailers, 127–128
Site speed, 201
Site traffi c, 199
SKUs (stock-keeping units), 336–337
SLAs, see Service level agreements
SMART 2020 Report, 133, 134
Smartband, 15
Smart city, 124
SMART criteria, 390
Smart grids, 123
Smartphones, 165, 455
SmartSantander, 124
SmartStands, 119–120
Smash and Grab (phishing campaign), 142
Smishing, 290
SMS database strategy, 267
SMSs, see Short message services
SMT (Service Model Transformation) program, 365
SNA (social network analysis), 236
SNSs (social networking services), 221, 231,
238–239
Social bookmarking, 231
Social bookmarking search, 197
Social bookmarking tools, 256
Social commerce, 269
Social engineering:
and cybersecurity, 148
by Bernie Madoff, 167–168
for malware, 161
Social graphs, 236–237
Social media:
benefi ts of, 232
changing buyer behavior with, 133
and communication on the Web, 229–231
cybersecurity and monitoring of, 159
defi ned, 226
elements of, 232–234
mass, 230–231
and negligent hiring, 444–446
privacy concerns of, 244
and ranking factors, 199
sentiment analysis on, 97
used by Internet banks, 274
Social Media: Consumer Compliance Risk
Management Guidance, 446
Social media optimization, 194
Social mention, 253–254
Social metrics, 253–254
SocialMiner, 261
Social-mobile-cloud model, 9–11
Social monitoring services, 252
Social networks:
marketing on, 10
vulnerability of, 163–164
Social network analysis (SNA), 236
Social networking, 221–257
and banking, 222–224
blogs and microblogs, 245–250
dominated by Facebook, 239–241
knowledge sharing in, 255–257
mashups for, 250–251
and mobile commerce, 284
monitoring services for, 252–254
RSS technology for, 251–252
services and communities for, 235–244
on Web 2.0, 225–235
Social networking services (SNSs), 221, 231,
238–239, 243
Social network sprawl, 343
Social outreach, 223
Social platforms, enterprise, 341–345
Social recruitment, 443–444
Social technology:
carbon footprint of, 135
in social-mobile-cloud model, 9–10
Secondary activities, 315
Section 302 (SOX), 170
Section 805 (SOX), 170
Security. See also Cybersecurity
in centralized databases, 80
of data, 77, 303
in enterprise search, 192
in mobile banking, 290
in mobile commerce, 280
Security procedures, 159
Segregation of duties, 320
Sell-side marketplaces, 277
SEM (search engine marketing), 193–194
Semantically annotated results, 207
Semantic annotations, 207
Semantic search engines, 187
Semantic technology, 205–209
Semantic Web, 205, 236
Senior management:
commitment to IT planning by, 397–398
and enterprise resource planning, 352
project success and buy-in from, 414
support of, for cybersecurity, 158
Senior management fi nancial reporting fraud, 167
Sensors:
data from, 93–95
in quality control, 310
in smart city, 124
Sentiment analysis, 97
SEO, see Search engine optimization
Separation of duties, 319
SERP (search engine results page), 182, 188
Service(s). See also Cloud services; Short message
services (SMSs); Social networking services;
Software as a service (SaaS)
applications as a service, 403
cloud storage, 257
data as a service, 64
digital music, 121–122
edge, 403
fi nancial, 286–291
hosted, 63
information retrieval, 187
infrastructure as a service, 63, 64, 403
Internet, 190
payroll, 376
platform as a service, 63, 64, 403
pricing of, 314
as primary activity, 24
social monitoring, 252
for social networking, 235–244
subscription monitoring, 252–253
technology as a service, 403
travel, 283–284
Service level agreements (SLAs), 56–57, 65, 394, 408
Service Model Transformation (SMT) program, 365
Service packs, 164
Shadow pages, 202
SharePoint, 341–342, 386
Sharing sites, 231
Shipments, and supply chain, 356
Shipping costs, 309
Shirking, 405
Shopkick app, 267, 285, 385
Shortages, costs of, 309
Short codes, 290
Short message services (SMSs):
mobile payments with, 287
retail strategies using, 266
short codes in, 290
Showrooming, 195, 265
Signatures, of malware, 161
Simplicity, of mobile networks, 127
Siri, 13
BMSIndx.indd Page S-10 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
Subject Index S-11
Supplier lock-in strategy, 23
Supply chain(s):
in defense sector, 354
defi ned, 4, 334
and fl ow of materials/data/money, 355
and order fulfi llment/logistics, 355–356
reverse, 355
Supply chain management (SCM), 4, 338, 352–358
Supply chain visibility, 369–370
Support activities, 24, 315
Surgical applications, of 3D printing, 334–335
Sustainability, 137
and climate change, 130, 131
and networks, 133–136
of supply chains, 357
Sustainable business strategy, 390
Sustainable value drivers, 393
Switches, 115, 116
Switching costs strategy, 23
SWOT (strategic) analysis, 20, 393, 394
Synchronous communication, 255
Syntactic annotations, 207
System analysis, 433
Systematic sourcing, 278
System development life cycle (SDLC), 432–434
T
Tableau Desktop, 368, 372, 374, 375
Tactical adoption approach, 403
Tactical level, of business, 303
Tactical plans, 397
Tags:
as element of social media, 233
as Web 2.0 applications, 231
with XBRL, 317–318
Tag clouds, 375
Talent shortage, 357
Tangam’s Yield Management Solution (TYM), 13
Tangible net benefi ts (customer relationship
management), 362
Tasks:
critical, 429
project, 419
Tb (terabyte), 71
TCO (total cost of ownership), 136, 349
TCP/IP (transmission control protocol/Internet
protocol), 118, 119
TDWI (The Data Warehouse Institute), 99, 100
Technical architecture, 44
Technical feasibility, 433
Technology(-ies). See also Mobile technology;
Search technology
bio-, 88–89
as business sector, 87
cloud, 9–10, 135
and customer relationship management, 359
desktop, 121
enterprise, 25–27
enterprise mashup, 379
and enterprise resource planning, 346
for food manufacturers, 4
machine-to-machine, 7, 357
retailing, 14, 268–271
social, 9–10, 135
trends in, 454–457
wearable, 9, 11, 15
Technology silos, 191
Technology Vision 2013 report, 11
Technology Vision 2014 report, 454–455
TELEform software, 105
Terabyte (Tb), 71
Teradata Database, 79
Terms of service (TOS) agreements, 241, 244
Twitpic, 249
Twitterfeed, 249
Twitterholic, 249
Twitter Search, 197, 254
Twittersphere, 249
2D tags, 288
TYM (Tangam’s Yield Management Solution), 13
U
UGC (user-generated content), 232
Unifi ed Data Center (UDC), 56
Uniform resource identifi ers (URIs), 206
Unintentional threats, 160
Unit testing, 415
Universal product codes (UPCs), 370
Unstructured data, 8, 192
Unstructured decisions, 52
UPCs (universal product codes), 370
Up-selling, 35
Urbee, 33, 334
URIs (uniform resource identifi ers), 206
Usenet, 235
User-generated content (UGC), 232
User identifi cation, 172
User input, and project success, 415
User satisfaction, 200, 201
Us Weekly, 213
V
V2V (vehicle-to-vehicle) communications, 459
Validation, of public self, 137
Value-added networks (VANs), 128
Value-added resellers (VARs), 337
Value chain, 24, 122
Value drivers, 392–393
VANs (value-added networks), 128
VARs (value-added resellers), 337
Variance, from baseline, 427
Variants, of malware, 161
Variety, in data analytics, 87
Vectors, 160
Vehicle-to-vehicle (V2V) communications, 459
Velocity, in data analytics, 87
Vendors, IT, 405–408
Veracity, in data analytics, 87
Vertical exchanges, 278
Vertical search engines, 197–198
Videos, on mobile devices, 283
Virtual collaboration, 127–128
Virtual communities, 235, 238–239
Virtualization:
of data, 56
in information management, 59–62
Virtualization layer, 60
Virtual machines (VMs), 59–62
Virtual private networks (VPNs):
as collaboration technology, 129–130
and enterprise resource planning, 346
Viruses, 160
Vishing, 290
Visibility, of cybercriminals, 149
Vision statement, 390
Visual Designer for Dashboards, 378
Visualization, data, see Data visualization
Viz tools, 2
VMs (virtual machines), 59–62
Voice biometrics, 166
Voice over IP (VoIP) networks, 115
Volatility:
of data, 75, 78
of databases, 53, 90
Terrorism, 156
Testing:
integrated, 415
system, 434
unit, 415
Text, amount of, on websites, 200
Textbooks, 293–294
Texting and driving, 136
Text mining:
data management, 96–99
defi ned, 97
Theoretical download rates, 119
Threat(s):
in cyber risk management, 154
and cybersecurity, 153
intentional, 160
of new competitors, 22
of substitution of product/service, 22
in SWOT analysis, 20
unintentional, 160
3D bioprinting, 334–335
3D printing, 332–337
ethical issues with, 451–452
and supply chain, 357
3G networks, 118, 119
TIBCO Spotfi re, 368, 374
Timeline app (Facebook), 240
Time strategy, 23
Time-to-exploitation, 164
Titanium implants, 334
Title VII of Civil Rights Act of 1964, 324
TMSs (transportation management systems),
307–309
TOS (terms of service) agreements, 241, 244
Total cost of ownership (TCO), 136, 349
Total quality management (TQM), 310
Total Visibility TMS, 308–309
Touchpoints, 34, 270
TPSs (transaction processing systems), 47–50
TQM (total quality management), 310
Trade secrets, theft of, 150
Traffi c:
mobile, 123
Web, 199
Traffi c shaping, 117
Training:
in customer relationship management, 361
of employees, 326
and enterprise resource planning, 352
and project success, 415
Transactions, external vs. internal, 49
Transactional data, 85
Transactional search, 193
Transaction processing systems (TPSs), 47–50
Transmission control protocol/Internet protocol
(TCP/IP), 118, 119
Transparency:
in business functions, 307
as recordkeeping principle, 104
Transport, intermodal, 307–308
Transportation Business Center (TBC), 128
Transportation costs, 128
Transportation management systems (TMSs),
307–309
Travel services, 283–284
Trending topics, 248
Trial runs (with vendors), 407
Triple constraint, 418–419
Trojans, 160
Trustworthiness, of mobile networks, 127
Tunigo app, 121
Turkey, 145
Tweets, 248
Tweetdeck, 249
BMSIndx.indd Page S-11 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
S-12 Subject Index
evolution of, 206
invention of, 226
Worms, 160
WWANs (wireless wide area networks), 126
X
XaaS (“as a service”) models, 62, 65, 403
XBRL (eXtensible Business Reporting Language),
298, 317–318
XBRL tagging, 317–318
XML (extendable markup language), 206, 228
XMLHttpRequest, 228
Y
Yahoo! Web Analytics (YWA), 306
YamJam Conference, 343
Yammer, 127, 341–343
Yummer, 344
Yummversity, 344
YWA (Yahoo! Web Analytics), 306
Z
Zero-day exploits, 161
Zombies, computers as, 162
Web search industry, 189, 195–197
Website satisfaction surveys, 201
Web technologies, staying informed about, 229
Weighted hybrid recommendation engines, 212
What-if analysis, 52
White-hat SEO tactics, 201
Wide area networks (WANs), 126
Widgets, 231
Wi-Fi:
defi ned, 125
mashups with, 120
networking standards for, 125–126
Wi-Fi mapping, 450
Wikis, 231, 257
WiMAX, 119, 126
Wind power, 95
Wireless marketing, 284–286
Wireless networks, 123–127
at home, 226
packet switching on, 116
Wireless technologies, mashups of, 120
Wireless wide area networks (WWANs), 126
Wiretap Act, 450
Wi-Spy, 449
Work breakdown structure (WBS), 425
World Factbook (CIA), 20
Worldwide Malware Signature Counter, 161
World Wide Web (WWW):
communication on, 229–231
Volume, in data analytics, 87
VPNs, see Virtual private networks
Vulnerability:
cloud computing as, 163
in cyber risk management, 154
in cybersecurity, 153
fi xed with patches, 164
of Windows Sidebar and Gadgets, 154–155
W
WANs (wide area networks), 126
Wardriving, 450
WayBackMachine, 226
WBS (work breakdown structure), 425
Weaknesses (in SWOT analysis), 20
Wearable technology:
development of, 15
and social-mobile-cloud model, 9, 11
Web, see World Wide Web (WWW)
Web 2.0, 225–235
Web 3.0, 205–209
Web-based threats, 156
Web bots, 187
Web directories, 187
and ranking factors, 199
and relevance scores, 200
WebLogic Server Process Edition, 19
Web ontology language (OWL), 206
BMSIndx.indd Page S-12 11/14/14 2:01 PM f-w-204a /208/WB01490/9781118897782/bmmatter
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.
http://www.wiley.com/go/eula
Cover
Title Page
Copyright Page
BRIEF CONTENTS
CONTENTS
Part 1 Digital Technology Trends Transforming How Business Is Done
1 Doing Business in Digital Times
Case 1.1, Opening Case: McCain Foods’s Success Factors: Dashboards, Innovation, and Ethics
1.1 Every Business Is a Digital Business
1.2 Business Process Management and Improvement
1.3 The Power of Competitive Advantage
1.4 Enterprise Technology Trends
1.5 How Your IT Expertise Adds Value to Your Performance and Career
Case 1.2, Business Case: Restaurant Creates Opportunities to Engage Customers
Case 1.3, Video Case: What Is the Value of Knowing More and Doing More?
2 Data Governance and IT Architecture Support Long-Term Performance
Case 2.1, Opening Case: Detoxing Dirty Data with Data Governance at Intel Security
2.1 Information Management
2.2 Enterprise Architecture and Data Governance
2.3 Information Systems: The Basics
2.4 Data Centers, Cloud Computing, and Virtualization
2.5 Cloud Services Add Agility
Case 2.2, Business Case: Data Chaos Creates Risk
Case 2.3, Video Case: Cloud Computing: Three Case Studies
3 Data Management, Big Data Analytics, and Records Management
Case 3.1, Opening Case: Coca-Cola Manages at the Point That Makes a Difference
3.1 Database Management Systems
3.2 Data Warehouse and Big Data Analytics
3.3 Data and Text Mining
3.4 Business Intelligence
3.5 Electronic Records Management
Case 3.2, Business Case: Financial Intelligence Fights Fraud
Case 3.3, Video Case: Hertz Finds Gold in Integrated Data
4 Networks for Efficient Operations and Sustainability
Case 4.1, Opening Case: Sony Builds an IPv6 Network to Fortify Competitive Edge
4.1 Data Networks, IP Addresses, and APIs
4.2 Wireless Networks and Mobile Infrastructure
4.3 Collaboration and Communication Technologies
4.4 Sustainability and Ethical Issues
Case 4.2, Business Case: Google Maps API for Business
Case 4.3, Video Case: Fresh Direct Connects for Success
5 Cybersecurity and Risk Management
Case 5.1, Opening Case: BlackPOS Malware Steals Target’s Customer Data
5.1 The Face and Future of Cyberthreats
5.2 Cyber Risk Management
5.3 Mobile, App, and Cloud Security
5.4 Defending Against Fraud
5.5 Compliance and Internal Control
Case 5.2, Business Case: Lax Security at LinkedIn Exposed
Case 5.3, Video Case: Botnets, Malware Security, and Capturing Cybercriminals
Part 2 Winning, Engaging, and Retaining Consumers with Technology
6 Attracting Buyers with Search, Semantic, and Recommendation Technology
Case 6.1, Opening Case: Nike Golf Drives Web Traffic with Search Engine Optimization
6.1 Using Search Technology for Business Success
6.2 Organic Search and Search Engine Optimization
6.3 Pay-Per-Click and Paid Search Strategies
6.4 A Search for Meaning—Semantic Technology
6.5 Recommendation Engines
Case 6.2, Business Case: Recommending Wine to Online Customers
Case 6.3, Video Case: Power Searching with Google
7 Social Networking, Engagement, and Social Metrics
Case 7.1, Opening Case: The Connected Generation Influences Banking Strategy
7.1 Web 2.0—The Social Web
7.2 Social Networking Services and Communities
7.3 Engaging Consumers with Blogs and Microblogs
7.4 Mashups, Social Metrics, and Monitoring Tools
7.5 Knowledge Sharing in the Social Workplace
Case 7.2, Business Case: Social Customer Service
Case 7.3, Video Case: Viral Marketing: Will It Blend?
8 Retail, E-commerce, and Mobile Commerce Technology
Case 8.1, Opening Case: Macy’s Races Ahead with Mobile Retail Strategies
8.1 Retailing Technology
8.2 Business to Consumer (B2C) E-commerce
8.3 Business to Business (B2B) E-commerce and E-procurement
8.4 Mobile Commerce
8.5 Mobile Transactions and Financial Services
Case 8.2, Business Case: Chegg’s Mobile Strategy
Case 8.3, Video Case: Searching with Pictures Using MVS
Part 3 Optimizing Performance with Enterprise Systems and Analytics
9 Effective and Efficient Business Functions
Case 9.1, Opening Case: Ducati Redesigns Its Operations
9.1 Solving Business Challenges at All Management Levels
9.2 Manufacturing, Production, and Transportation Management Systems
9.3 Sales and Marketing Systems
9.4 Accounting, Finance, and Regulatory Systems
9.5 Human Resources Systems, Compliance, and Ethics
Case 9.2, Business Case: HSBC Combats Fraud in Split-second Decisions
Case 9.3, Video Case: United Rentals Optimizes Its Workforce with Human Capital Management
10 Strategic Technology and Enterprise Systems
Case 10.1, Opening Case: Strategic Technology Trend—3D Printing
10.1 Enterprise Systems
10.2 Enterprise Social Platforms
10.3 Enterprise Resource Planning Systems
10.4 Supply Chain Management Systems
10.5 Customer Relationship Management Systems
Case 10.2, Business Case: Avon’s Failed SAP Implementation: Enterprise System Gone Wrong
Case 10.3, Video Case: Procter & Gamble: Creating Conversations in the Cloud with 4.8 Billion Consumers
11 Data Visualization and Geographic Information Systems
Case 11.1, Opening Case: Safeway and PepsiCo Apply Data Visualization to Supply Chain
11.1 Data Visualization and Learning
11.2 Enterprise Data Mashups
11.3 Digital Dashboards
11.4 Geospatial Data and Geographic Information Systems
Case 11.2, Visualization Case: Are You Ready for Football?
Case 11.3, Video Case: The Beauty of Data Visualization
Part 4 Managing Business Relationships, Projects, and Codes of Ethics
12 IT Strategy and Balanced Scorecard
Case 12.1, Opening Case: Intel’s IT Strategic Planning Process
12.1 IT Strategy and the Strategic Planning Process
12.2 Aligning IT with Business Strategy
12.3 Balanced Scorecard
12.4 IT Sourcing and Cloud Strategy
Case 12.2, Business Case: AstraZeneca Terminates $1.4B Outsourcing Contract with IBM
Case 12.3, Data Analysis: Third-Party versus Company-Owned Offshoring
13 Project Management and SDLC
Case 13.1, Opening Case: Keeping Your Project on Track, Knowing When It Is Doomed, and DIA Baggage System Failure
13.1 Project Management Concepts
13.2 Project Planning, Execution, and Budget
13.3 Project Monitoring, Control, and Closing
13.4 System Development Life Cycle
Case 13.2, Business Case: Steve Jobs’ Shared Vision Project Management Style
Case 13.3, Demo Case: Mavenlink Project Management and Planning Software
14 Ethical Risks and Responsibilities of IT Innovations
Case 14.1, Opening Case: Google Glass and Risk, Privacy, and Piracy Challenges
14.1 Privacy Paradox, Privacy, and Civil Rights
14.2 Responsible Conduct
14.3 Technology Addictions and the Emerging Trend of Focus Management
14.4 Six Technology Trends Transforming Business
Case 14.2, Business Case: Apple’s CarPlay Gets Intelligent
Case 14.3, Video Case: Vehicle-to-Vehicle Technology to Prevent Collisions
Glossary
Organizational Index
Name Index
Subject Index
EULA
2015-04-30T21:45:09+0000
Preflight Ticket Signature