copyright ©2011 by cengage learning. all rights reserved 1 chapter 17 managing information designed...

33
Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Upload: belinda-austin

Post on 28-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

1

Chapter 17Managing Information

Designed & Prepared byB-books, Ltd.

MGMT3

Chuck Williams

Page 2: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

2

Moore’s Law

Source: “Moore’s Law: Overviews,” © Intel Corporation, available online at http://www.intel.com/technology/mooreslaw/index.htm [accessed 10 September 2008]. Reprinted with permission of Intel Corporation.

Page 3: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

3

Why Information Matters

After reading these sections, you should be able to:

1. explain the strategic importance of information.

2. describe the characteristics of useful information (i.e., its value and costs).

Page 4: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

4

Data versus Information

• Raw data = facts + figures

• Information = useful data that influences choices

Page 5: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

5

Biz Flix: The Good Shepherd

Take Two Video

Click

Beyond the Book

Which parts of this scene show data?

Which parts of this scene show information?

Page 6: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

6

Strategic Importance of Information

First-MoverAdvantage

Sustaining aCompetitiveAdvantage

11

Page 7: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

7

First-Mover Advantage

First-Mover Advantage

The strategic advantage that companies earn by being the first to use new information technology to substantially lower costs or to make a product or service different from that of competitors

1.11.1

Page 8: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

8

Fast Facts on First Movers

First movers earn a 30% market share.

Later movers earn a 19% share.

Of market leaders, a whopping 70% were first movers.

ON AVERAGE:

Page 9: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

9

Sustaining a Competitive Advantage

CompetitiveDisadvantage

CompetitiveDisadvantage

CompetitiveParity

CompetitiveParity

SustainedCompetitiveAdvantage

SustainedCompetitiveAdvantage

TemporaryCompetitiveAdvantage

TemporaryCompetitiveAdvantage

Is it difficultfor another firmto create or buy

the IT?

Is it difficultfor another firmto create or buy

the IT?

NO YES

Does the informationtechnology (IT)

createvalue?

Does the informationtechnology (IT)

createvalue?

NO YES

Is the IT differentacross

competing firms?

Is the IT differentacross

competing firms?

NO YES

1.21.2

Page 10: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

10

• Accurate

• Complete

• Relevant

• Timely

Characteristics of Useful Information

22

© R

icha

rd N

aude

/Ala

my

Page 11: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

11

Costs of Useful Information

• Acquisition• Processing• Storage• Retrieval• Communication Costs

22

Page 12: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

12

Getting and Sharing Information

After reading these sections, you should be able to:

3. explain the basics of capturing, processing, and protecting information.

4. describe how companies can access and shareinformation and knowledge.

Page 13: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

13

Capturing Information

ElectronicElectronicElectronicElectronic

ManualManualManualManual

Bar CodesBar Codes

Radio FrequencyIdentification Tags

Radio FrequencyIdentification Tags

Electronic ScannersElectronic Scanners

Optical Character Recognition

Optical Character Recognition3.13.1

© iS

tock

phot

o.co

m

Page 14: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

14

10 Uses for RFID

• tracking computer equipment• security access for employees• EZpass on toll roads• instant credit card payments• cell phone SIM cards• shipping labels• preventing shrinkage• tracking files• collecting data on meeting participants• customer loyalty cards (instead of a stamp)

Source: “10 Business Uses for RFID,” Inc., available online at http://technology.inc.com/multimedia/slideshows/content/10-business-uses-for-rfid.html/

Page 15: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

15

Beyond the Book

RFID in ActionWhile RFID technology has not yet gained traction in all areas of U.S. retail, it has proven beneficial in managing size complexities and out-of-stocks on certain items. American Apparel has achieved 94 percent stock accuracy when using RFID and has saved about 168 man-hours per month. At Nine West, sales clerks can use a handheld device to check whether a certain size of an item is in stock before going back to pick it up, which improves the conversion rate.

Source: C. T. Corcoran, “RFID: Will Fizzle Turn to Sizzle?”, Women’s Wear Daily, 19 August 2009. 11.

Page 16: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

16

Processing Information: Data Mining

SupervisedData Mining

SupervisedData Mining

Data Warehouse

Data Warehouse

UnsupervisedData Mining

UnsupervisedData Mining

DataClusters

DataClusters

SequencePatterns

SequencePatterns

PredictivePatterns

PredictivePatterns

AffinityPatterns

AffinityPatterns

3.23.2

Page 17: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

17

Beyond the Book

SEC Uses Data MiningWith the recent insider trading scandal of Galleon Management founder Raj Rajaratnam, the Securities and Exchange Commission is finding success with new techniques. Informants and wire-taps were used extensively in the Galleon case. It is also using the Center for Enterprise Modernization to comb through the large quantities of tips it gets and create new digital tools to use in data analysis. The agency has used data-mining from the Financial Industry Regulatory Authority (FINRA) extensively to look for suspicious activities in trade records. The SEC is also looking increasingly toward cooperation and information sharing with other agencies such as the U.S. Attorney’s office.

Source: R. Farzad and T. Francis, “The SEC: To Catch a Cheat”, Business Week, 2 November 2009. 25.

Page 18: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

18

Beyond the Book

Data Mining and HRMAn emerging trend is using data mining in human resource management. Data miners can track the digital footprints of workers, and use these records to measure behaviors and productivity. They can create profiles of employees who are most likely to leave, and compare them to current employees. Currently only about 1% or 2% of large corporations are estimated to be using these methods. Tech companies like IBM, Microsoft, and Oracle have been at the forefront.

Source: S. Baker, “How Much Is That Worker Worth?”, Business Week, 23 & 30 March 2009. 46-48.

Page 19: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

19

Unsupervised Data Mining

DataClusters

DataClusters

SequencePatterns

SequencePatterns

PredictivePatterns

PredictivePatterns

AffinityPatterns

AffinityPatterns

Three or more database elementsoccur together

Three or more database elementsoccur together

One of the elements precedes the other

One of the elements precedes the other

Helps identify database elementsthat are different

Helps identify database elementsthat are different

Two or more database elementsoccur together significantly

Two or more database elementsoccur together significantly

3.23.2

Page 20: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

20

Protecting Information

Authentication

Authorization

Two-factor authentication

Firewalls

Antivirus software

Data encryption

Virtual private networks

Secure Sockets Layer (SSL) encryption3.33.3

Page 21: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

21

Beyond the BookHigher EducationLagging in Privacy Matters

While chief privacy officers have become common in the corporate world, few colleges have instituted these positions despite the amount of sensitive information they manage. Many institutions claim that existing information-technology security officers are sufficient. But while IT security officers may be sufficient to protect data that has already been collected, some argue that they aren’t always prepared to ask or answer the question of whether that data should have been collected and stored at all.

Source: L. Guernsey, “A Wealth of Data, and Nobody in Charge,” The Chronicle of Higher Education 55, no. 13 (21 November 2009). A1.

Page 22: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

22

Accessing and SharingInformation and Knowledge

Internal Accessand

Information Sharing

Internal Accessand

Information Sharing

External Accessand

Information Sharing

External Accessand

Information Sharing

Sharing ofKnowledge and

Expertise

Sharing ofKnowledge and

Expertise44

Page 23: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

23

Executive Information System (EIS)

• Uses internal and external data

• Used to monitor and analyze organizational performance

• Must provide accurate, complete, relevant, andtimely information to managers

4.14.1

Page 24: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

24

Characteristics of Best-Selling EIS

• Few commands to learn• Important views saved• 3-D charts• Geographic dimensions

Identification ofProblems and Exceptions

Identification ofProblems and Exceptions

Ease of UseEase of Use

Analysis of InformationAnalysis of Information

• Compare to standards• Trigger exceptions• Drill down• Detect & alert newspaper• Detect & alert robots

• Sales tracking• Easy-to-understand displays• Time periods

4.14.1

Page 25: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

25

Intranets

• Private company networks

• Allow employees to access, share, and publish information

• A firewall permits only authorized internalaccess

4.14.1

Page 26: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

26

Why Companies Use Intranets

• Let employees find information

• Enable collaboration and information sharing

• Automate business processes

• Reduce costs

• Provide secure, remote access to company data via the web

• Provide online training

4.14.1

Page 27: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

27

Corporate PortalsCorporate Portals

A hybrid of executive information systemsand intranets that allows managers andemployees to use a Web browser to gainaccess to customized company information and to complete specialized transactions.

4.14.1

Page 28: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

28

External Access and Sharing

Electronic Data InterchangeElectronic Data Interchange

ExtranetsExtranets

Web ServicesWeb Services

InternetInternet

4.24.2

Page 29: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

29

Benefits of External Access

and Sharing

Increased productivityIncreased productivity

Reduced data entry errorsReduced data entry errors

Improved customer serviceImproved customer service

Faster communicationsFaster communications

Reduced costsReduced costs

4.24.2

Page 30: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

30

Electronic Data Interchange (EDI)

ElectronicData

Interchange

ElectronicData

Interchange

When two companies convert their purchase and ordering informationto a standardized format to enablethe direct electronic transmission of that information from one company’s computer system to the other company’s computer system.

When two companies convert their purchase and ordering informationto a standardized format to enablethe direct electronic transmission of that information from one company’s computer system to the other company’s computer system.

4.24.2

Page 31: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

31

Web Services

Web ServicesWeb Services

Using standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company.

Using standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company.

4.24.2

Page 32: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

32

Extranet

ExtranetExtranet

Networks that allow companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system.

Networks that allow companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system.

4.24.2

Page 33: Copyright ©2011 by Cengage Learning. All rights reserved 1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT3 Chuck Williams

Copyright ©2011 by Cengage Learning. All rights reserved

33

Sharing Knowledge and Expertise

DecisionSupport System

DecisionSupport System

Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios.

Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios.

Expert SystemExpert System

An information system that contains the specialized knowledge and decision rules used by experts and experienced decision makers so that nonexperts can draw on this knowledge base to make decisions.

An information system that contains the specialized knowledge and decision rules used by experts and experienced decision makers so that nonexperts can draw on this knowledge base to make decisions.

4.34.3