Showing posts with label Business and IT Interface CP1005. Show all posts
Showing posts with label Business and IT Interface CP1005. Show all posts

Friday, November 18, 2011

CP1005 Revision

CRM - Customer Relationship Management is about how better too manage your customers to improve your business service.

CRM system can be integrated with other software packages such as MYOB or other business applications that are widely used.

Business Intelligence is about looking at numbers and data.

Digital Dashboard is when an execuetive or manager within a business can see everything he has to know about the business in order ot make a good decision about how best to plan for the future. 

ERP - Was originally implemented of warhousing and supplies. Where it moved into a business wide solution.

Globalisation is about realising that traditional forms of business are simply not good enough to last in a global environment. Challeges with globalisation include, cultural, political and geo-economic.

The internet has had huge impact on business including the travel industry, entertainment, financial services. For example the entertainment industry has been hugely effected in terms of music piracy where people are no longer paying for their songs.

The internet also brings with it Intellectual Property concerns where business iamges are stolen or copyrights are breached.

CULTURAL IMPLICATIONS include; Languages, Religions, Customs, Social Attitudes and Political philosophies.


Questions a company asks when going global include from an IT perspective - Which country should the server be located for our customers.

What legal ramifications might occur by having websites targeted at a specific country. Such as laws and competitive behaviours.

Political - Trade Agreements.

Governance and Compliance

Is a fast-growing key area for global busines - Governanace is a method of control of government for management or control. Compliance is the act of conforming or yielding to.

Global information issues include - Security. Phyical security as well as network security. Whether to keep locks on doors, who's allowed into the server rooms etc.

primary challenges an organisatoin faces today include - Innovation, Social, Social networks and virtual worlds .

Social responsibility implies implies that the entity has a responsibility to society. Xstrata gives back to the community through sponsoring local events etc. (Corporate Responsibility)

Latencies - How long it takes for something to be done once information is put into the system. The delay. The key is to shorten the latencies so that the time frame for the customers, suppliers and others is faster and better positioned.

The bullwhip effect is where due to forecasting the demand gets greater for customers because of the need for the product. One small decision can magnify to flucuations build upstream to the supply chain.

Social networking so called passive candidates people who are happy and productive working for companies.

Boomerangs are customers that leave a business at one stage to look at a different career or a better paying job. But come back down the track to the original employer for work. less training required. You know how they work and act.

Virtual Worlds - Second Life - Companies, banks and customers.

Well the Virtual Workforce is employees who can work out from home by connecting into their companies network. Benefits, keeps cars off the road, boosts work productivity, slashes real estate costs.

Disaster Continuity Planning is the plan that an organisation puts inplace to determine the plan should a disaster occur with IT infrustruce.

Web Service - Is an event that detects any opportunities and alerts those who can act on the information.

Service - Is more like software products than coding projects. They are reusable and are going to have an impact on productivity.

Service Orientated Architecture - Business > Service > Implemenation - Allows SOAs to plug in new services or upgrade existing services in a granular fashion.

Virtualisation - Is the framework of dividing the resources of a computer into multiple environments that can be execute on the one system / hardware device.

Statistical Analysis - Performs functions as informaiton correlations. Forecast - Predictions made on the basis of time informaiton. Time-series informaiton - time stamped informaiton collected at a particular time.

Benefits of BI - Single point of access to information.

Quantifiable benefits - Four main categories: Quantifiable benefits, indirectly quantifiable, unpredictable events, intangible benefits.

ETHICS

The principles and standards that guide our behavior.

Competitive Strategy - Cost - There can only be one low cost producer -and the firm usually establishes the selling price in the market.

Quality - Is divided into two categories: Product Quality and process quality.


OM - Operations Management - Adding value to your business by changing the way your operations area conducts business.

Competitive OM Strategy - Cost, Quality, Delivery, Flexibility and Service.

Monday, October 24, 2011

Virtual Worlds - It's a whole new world

Two primary types of virtual that must be considered when looking at the 21st century world:
  1. Virtual worlds.
  2. Virtual workforces.
 Virtual Worlds, Virtual Workforces, Virtual Organisations.


Virtual Workforce

Letting employees work from outside the office:
  • Keeps cars off the road.
  • Fosters long service. 
Virtual Commerce

Mobile Commerce - The ability to purchase goods and services through a wireless Internet-enabled device.

Telematics - Blending computers and wireless telecommunications technologies.

Electronic tagging - A technique for identifying and tracking assets and individuals via technologies such as radio frequency identification and smart cards.

New technology is making massive changes.

Social networking who's who

Three types of social networking an organisation can implement:
  1. Passive search.
  2. Boomerang.
  3. Marketing networks. 
Passive search your looking for the candidate. People who are happy and productive working for other companies.

Hiring people as a result of connections through LinkedIn.

Boomerangs

Use network to lure back some former employees, or so-called boomerangs.

Boomerangs cost less to train than new hires and they tend to hit the ground running.

Marketing Networks

Forums dedicated to a specific topic. Star rating etc.

Energy Saving in IT

Energy Saving
  • Throughput computing.
    Virtualisation.
  • Smart cooling.
  • Alternative energy source. 
  • Liquid cooling (biology).
  • Government involvement.
e-waste - Old computer requipment.

Friday, October 21, 2011

Governing and Compliance

What it means for a company to go global and how IT facilitates that.

  • Goverance is a method or system of government for management control.
  • Compliance is the act of conforming, acquiescing, or yielding.
Strategic Alignment - About making all areas of the business align with the same strategy.

Risk Management - Identifying the risks, new market (what would be the risks), making sure that if a problem occurs the risk is as minimal as possible (consequences). Doing things to minimise identified risks.

Performance Measures - KPIs.

 Enterprise Architecture - Is about scale. In IT were thinking about it from a global point of view.

A few issues; networks, regulatory issues, technology and country-orientated issues.

Global Information Issues - Business must have the appropriate levels of authentication, access control, and encryption in place, to ensure: the security of information.

Physical Security - Is the IT security integrated with the computer security and industrial security.

De-Perimeterisation occurs when an organization moves employees outside it's firewall to grow and change the way corporations expand.

Transporter Data Flow - It may violate a countries policies on the internet if you send encrypted messages into a country that doesn't allow it... they may block it.

Innovation Finding New

Innovation is the introduction of new equipment or methods.

Find your relevant area, look around (what's not there).

Monday, October 10, 2011

Software Development Strategy

Software that is built correctly can transform as the organisation and its business transforms.

Developing Software:

As organizations reliance on software grows, so do the business-related consequences of the software being used. 

System Development Life Cycle (SDLC)

The overal process for developing information systems from planning and analysis through implementation and maintenance.

1 - Planning, 2 - Analysis, 3 - Design, 4 - Development, 5 - Testing, 6 - Implementation, 7 - Maintenance. 


Software Development Methodologies

Waterfall Methodology - Each phase is distinct, sequentially from planning through implementation and maintenance. Rarely going back, concept is start from the beginning build everything until it's all finished and then moving no.

Agile - Customer satisfaction through early and continuous delivery of components developed by an iterative process. Projects sets a minimum number of requirements.

RAD - Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.

Prototypes - A smaller-scale representation of working model of the users' requirements or a proposed design for an information system.

Monday, October 3, 2011

Enterprise Resource Planning (ERP)

Summary - Integration, about creating a single system that will enable an enterprise to operate through a single IT system.
ERP are powerful systems
- Is a logical solution to incompatible applications.
- ERP addresses global information sharing and reporting.
- Avoides the pain and expense of fixing legacy systems.
Content management system is actually a government legislated system for large enterprises such as JCU.  Helps out with reporting.
ERP is about consistency.
Digital Dashboard - Being able to see everything in one place and understand easily what the current enterprise state is.
ERP systems collect data from across a whole organisation.
Before ERP everyone stored things seperately and it was always a matter of asking someone for the physical, ERP is a single source.
Core - Traditional components are included in almost all ERPs as standard; accounting and finance, production and materials, human resources.
Extended - Extra components that meet the organisational demand; Business intelligence, CRM, Supply Chain Management, e-Business.
Accounting and Finance Management - Manages accounting data and financial processes within the enterprise with functions such as ledgers, accountsf payable, budgeting, asse managememt, etc.
Production and materials management - job cost accounting, quality control.
Human resources ERP component - tracks employee information, benefits, compensation, performance assessment, legal requirements, etc.
ERP - Business intelligence (BI), crm, scm, e-Business.
SCM, ERP and CRM are the backbone of enterprise.
Balanced scoreboard - Enables organisations to clarify their vision and strategy and translate them into action.

Tuesday, September 20, 2011

Using Analytical CRM to drive Business

Develop a personal customer profile - when a website knows enough about a person's like and dislikes that it can fashion offers that are moe likely to appeal to that person (personalisation)

Data Mart - More specific view, a focus i.e. just the residential customers. Where as a Data Warehouse stores all the data as a whole.

These systems quickly aggregate, analyse, analyse,  and disseminate customer information throughout an organisation.

Analytical CRM information examples: Give customers more of what they want, value their time, Over-deliver, Contact frequently, Follow up.

Have a look at this video from Career Builder.




Current trends include: 
  • Supplier Relationship Management (SRM).
  • Partner Relationship Management (PRM).
  • Employee Relationship Management (ERM).
The Ugly side of CRM:

Business 2.0 ranked you, the customer, as the number one person who mattered cost. The internet has given you a much louder, powerful and more visible voice.

Business Intelligence (BI)

Using information technology to lead to good business decisions.

Parallels between the challenges in business and challenges of war.
  • Collecting information, Discerning patterns and meaning in the information, Responding to the resultant information.
Data Rich, Information Poor

Business face a data explosion as digital images, email inboxes, and broadband connections dude by 2010 (21% of the world connected by 2010) The amount of data generated doubles ever year.

BI enables business users to receive data for analysis that is: Reliable, Consistent, Understandable & Easily Manipulated. 

BI can answer tough customer questions. I.e. Why are sales below target? -> Because we sold less in the Western region. Why did we sell les in the west? -> Because sales of product X dropped.

Bi's Operation Value - The key is to shorten latencies. The time frame for opportunistic influences on customers, suppliers, and others is faster, more interactive, and better positioned. 

Data Mining Tools - Use a variety of techniques to find patterns and relationships in large volumes of information. Classification, Estimation, Affinity grouping, Clustering.

Data Mining - cluster analysis, assocation detection, statistical analysis.


Monday, September 19, 2011

CRM and Business Intelligence


CRM is about attracting and maintaining customer relationships.

Operational CRM the basics of how to use CRM to manage business. Analytical is looking at future trends and what can be changed to improve CRM.

Example - Persons history into purchasing.

Customer Relation Management (CRM) - Involves managing all aspects of a customer's relationship with an organisation to increase customer loyalty and retention and an organsiation's profitability.

Many organisations, such as Charles Schwab, have obtained great success through implementing a CRM system.

Bigger businesses have a CRM. Different departments can update sections of the CRM; like accounting look at the costs, inventory management, customer services department makes the return calls.

CRM is a strategy, a strategy and business goal that an organisation must embrace fully to be effective.

CRM enables the ability to; identify the customer, design individual market campaigns, treat each customer individually, customer buying behaving.

Identifying behaviours - Like people buying snacks at lunch time along with their chips and fries. etc.

Business Benefits of CRM: Providing better customer service, discovering new customers, increasing customer revenues, cross-selling more effectively.

Organisations can find most valuable customers through RFM: Recency, Frequency & Monetary Value. How recent was the customer's purchase? How often does the customer come? Home much a customer spends on each purchase?

Evolutions of CRM: Reporting, Predicting & Analysis.

Operation CRM is the front office (i.e. ordering a pizza and they know your name) and Analytical is where they analyse your trends as a customer (business analyst)

CRM metrics: sales, service & marketing. Tracking and monitoring performance is a best practice for many companies.

Sales Metrics: Prospective customers, sales calls, proposals given, retained customers, recurring revenue.

Service Metrics: Cases closed same day, number of service calls, tie to resolution, number of service requests by type.

Monday, September 12, 2011

CP 1005 - Lecture Seven - Networks, Telecommunications

Wireless networking is a mobile workforce.

Companies worldwide are going wireless to increase productivity.

The terms mobile and wireless are often used synonymously, but actually denote two different technologies:
  • Mobile means the technology can travel with the user, but it is not necessarily in real-time.
  • Wireless gives users a live (Internet) connection via satellite or radio transmitters. Wimax is a type of wireless technology that enables the user to be connect to a wireless network, www.wimax.com
Business Drivers for Wireless Technology; Universal access to information and applications, The automation of business processes, User convenience, timeliness and ability to conduct business 24/7, 365 days a year.
  • People delayed in airports no longer have to feel cut off from the world to their office. Through wireless tools and wireless solutions, such as a BalckBerry or iPhone device can access their information anytime, anywhere.
Step to take for deploying mobile strategies

Compliance in the mobile enterprise, Staying flexible and embracing change.

Mobile telephones (or cell phones) work by using radio waves to to communicate with radio antennas (or towers) placed with adjacent geographic areas called cells.

Each tower on a mobile network is considered a Cell.

Satellite - A big microwave repeated in the sky; it contains one or more transponders that listen to a particular portion of the electromagnetic spectrum.

Location Based Services (LBS) - Are wireless mobile content services which provide location-specific information to mobile users moving from one location to location. 

Global Position Services (GPS) - Is a "constellation" of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location. Currently 33 according to Wikipedia.

Geographic Information Services (GIS) - Is designed to work with information that can be shown on a map.

Wireless Fidelity (Wi-Fi) - A means of linking computers using infrared or radio signals.

WiMax is a telecommunications technology aimed at providing data over long distances in a variety of ways, from point-to-point links to full mobile cellular types of access.

Radio Frequency Identification (RFID) - Contains a mirochip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag. Active powered and passive tags in the forms of chips that store information.

Tagged products - RFID Reader - Network - Server - Supplier Data, Customer Data.

Mobile Workforce trends - Mobile TV, Location-based services, mobile advertising, enterprise mobility, wireless security moves to the forefront.

Friday, September 9, 2011

CP 1005 - Lecture Six - Networks, Telecommunications & Mobile Technology

The future of Mobile Media Communications - MOCOM 2020 - MOCOM2020.com


If I were an IT Administrator in a business what would be the case I could make on mobile technology to help market.
Competitive Advantages include; Voice over internet Protocol (VOIP), Networking businesses, Securing business networks, increasing the speed of business processes (aspect).

Networking Businesses - Internet based products and services to handle many aspects of customer and supplier interactions.

Customers have come to expect seamless retailing between online and in-store.

VPN - Virtual Private Network - Provide secure access to an organisation's network.

Value-added network (VAN) - A private network provided by a third party, for exchanging information through a high capacity connection.

Bandwidth - The difference between the highest and the lowest frequencies that can be transmitted on a single medium.

Broadband - Refers to the speed of a connection that are greater than 200 bps.

Securing Business Networks 

Organizations have to be concerned about: Proper identification of users and authorization network access. The control of access, and the protection of data integrity.

More important than the sharing of technology resources through the sharing of data.

Either a LAN or WAN permits users on a network to get data (provided they are authorized).

Characteristics of Data

Consistency, Accuracy, Timeliness, Uniqueness & Completeness. (Like Print Journalism)

Sunday, September 4, 2011

CP1005 - Lecture Five - Enterprise Architectures

Information architecture - identifies where and how important information, such as customer records, is maintained and secured.

Backup and Recovery


Backup - An exact copy of a system's information.
Recovery - The ability to get a system up and running including the data in the event of a system crash or failure.
Fault tolerance - A computer system designed that in the event a component fails a backup component or can immediately take over with no loss of service.

Business Continuity Planning (BCP)

Is a plan for how an organisation will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption.

Web Service - Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services.

The two primary parts of web services are:

Event - Detect threats and opportunities and alert those who can act on the information.
Service - More like software products than they are coding projects.

Open Source - Refers to any program whose source code is made available for use or modification as users or other developers see fit.

ARCHITECTURE TRENDS

These reflect how an organisation today must continually watch new architecture trends to ensure they can keep up with new and disruptive technologies.

Three architecture trends that are quickly becoming requirements for all businesses includeing:

Service orientated architecture, visualization, grid computing.

Service Orientaed Architecture (SOA) - is a business drive IT architectural approach that supports integrating a business as linked, repeatable tasks or services.

Service

SOA can be a business task, such as checking a potential customer's credit rating only when opening a new account. Services are "like" software products.

eXtensible Markup Language (XML) - A markup language for documents containing structured information.

Loose Coupling

This is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components.

Loose coupling is way of ensuring that the technical details are decoupled from the service.

Virtualisation is a framework dividing the resources of a computer into multiple execution environments. It is a way of increasing physical resources to maximize the investment in hardware.

Virtualisation reduces hardware infrastructure and increases the utilization of software. Consolidates (and often reduces) power and cooling requirements.

Additional benefits - Rapid application deployment, dynamic load balancing, streamlined disaster recovery.

Grid computing is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality service.The benefits to a business include, allowing widely dispersed departments and businesses to create virtual organisations. Providing instantaneous access to massive computing and data resources.

CP1005 - Lecture Four - Ethics and Information Systems

Ethics - the principles and standards that guide our behaviour toward other people.

 Ethical issues affected by technology advances
– Intellectual property
– Copyright
– Fair use doctrine
– Pirated software
– Counterfeit software'

Privacy is a major issue and right to privacy is the law.

Privacy: The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Confidentiality: The assurance that messages and information are available only to those who are authorized to view them.

Information has no Ethics - Acting ethicially and legally are not always the same.

Ethical Computer Use Policy

Ethical computer us policy: Contains general principles to guide computer user behaviour.

Information Privacy Policy - The unethical use of information typically occurs "unintentionally" when it is used for new purposes.

AUP - Acceptable Use Policy - A user must agree to before provided access to a network or the internet.

Email Privacy Policies, Internet Use Policy (Describes Available Internet Services, Purpose and Restriction of Internet Access, Complements ethical computer use policy, describes user responsibilities, states user responsibilities, states ramification for violations)

Anti-Spam Policy - Unsolicited email.

Ethics in the Workplace

Workplace monitoring is a concern for many employees. Organizations can be held financially responsible for their employees' actions.

Monitoring Technologies

The tracking of people's actions by such measures as number of keystrokes, error rate, and number of transactions processed.

INFORMATION SECURITY

Information Security is the protection of information from accidental or intentional misuse by persons inside or outside an organization. Protecting intellectual assets costs money; about 15% of the IT budget in Asian Pacific Companies.

There are Five Steps to Creating an INFORMATION SECURITY PLAN

  1. Develop the information security policies.
  2. Communicate the information security policies. 
  3. Identify critical information assets and risks. 
  4. Test and reevaluate risks.
  5. Obtain stakeholder support.
After people, technology is the next defence line.

There are three primary information technology security areas:

1. Authentication and authorisation.
2. Prevention and resistance.
3. Detection and response.

Something the User Knows, Such as a User ID and Password. FACT over 50% of help-desk calls are password related.


Types of Hackers

White-hat Hackers, Black-hat Hackers, Hactivist, Script kiddies or script bunnies, Cracker, Cyber terrorist.

Detecting and Responding

By far the most effective form of protection is virus protection and firewall protection.

Virus Software written with malicious intent to cause annoyance or damage may include; Worm, Denial-of-service attack, Trojan-horse virus, backdoor program or polymorphic virus and worm.

Thursday, September 1, 2011

CP1005 - Lecture Three - e-Business

Disruptive Technology

Distruptive technology is a way of doing something that dones not initially meet the needs of existing customers.

Digital Darwinism implies that organizations which cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

Sustaining Technology produces an imporved product that customers are eager to buy.

Sustaining technologies tend to provide use with a better, faster and cheaper product in an established market.

The Internet - Business Disruption

One of the biggest forces changing business is the internet. Organisations need to be able to transform as markets and technologies change.

Focusing on the unexpected allows an organization to capitalize on the opportunity for new business.

There is predicted to be more than 3 billion Internet users by 2010. The current internet usage in 2008 was a world total of 1, 463, 632, 361. Which is the equivalent of 21.90% a growth of 305.5% between 2000 - 2008.

Evolution of the Web

Fundamentals about the internet - Remember the internet was developed first by the US department of deference to communicate back and fourth from each base with information to their scientists.

Gradually the internet moved from a military and scientific pipeline into a communication tool for everyone. (Internet / Protocol)

WWW a global hypertext system that uses the Internet as it's transport system. Important acronyms and terms include HTTP, URL, HTML and Client/Server.

The internet's impact on information as allowed easy compilation of information on subjects, increased richness, increased reach and improved content.

The internet has made it easy and possible to perform business in ways not previously possible.

It has also brought about the Ethical issue of (Digital-Divide) which is when those with access to technology have great advantages over those without access to technology.

Web 2.0 is a set of economic, social and technology trends that collectively allow people to interact with the web rather than only being able to read a static page. (Blogging, Wikis, Syndication, Napster, Bittorent, Flickr)

API - Application Programming Interface is a set of routines, protocols and tools for building software applications.

Mashup Editor - WSYIWYGs (What you See is What You Get) for mashups.

A website where people with common interests engage; MySpace, Facebook, Linkedin.

E-Business Basics

e-Commerce - The process of buying and selling goods and services over the internet.
e-Business - The process of conducting business online. Not only buying and selling but also serving customers via the web in collaboration with business partners.

Business Models 


B2B - Where business communicate to another business that needs their business services.
B2C - WHere an e-Shop a version of a retail store e-Mall conducts business aimed at the consumer.
C2B - Tripadvisor is an e-mall that uses the C2B business modell. The demand for C2B e-business will increase over the next few years.
C2C - e-Auction, Forward Auction, Reverse Auction.

Organisational Strategies for e-Business include; Marketing / Sales, Financial Services, Procurement, Customer Service and Intermediearies.

Generating Revenue - Banner Ads, Blogs, RSS, Podcasting, SEO and Spamdexing.

Measuring your success can be done through Cookies, Click throughs, Banner Ads, bounce rate. Website metrics can be provided through Web Analyics (tracking) the exact pattern of a consumer's navigation through your website.

Mobile Commerce is the ability to purchase goods and services through a wireless internet - enabled device.


Wednesday, August 31, 2011

CP1005 - Lecture Two - Strategic Decision Making

Decision Making

Reasons for the growth of decision-making information systems: People must:
Analyse large amounts of information, make decisions quickly, Apply sophisticated analysis techniques.

Types of Decion Systems - As you move up the 'business pyramid' users move from requiring transactional information to analytical information.

Transaction Processing Systems (TPS) - Basic business system that serves the operation level.
Online transaction processing (OLTP) - Capturing of transaction and event information using technology.

Online analytical processing (OLAP) - Manipulation of information to create business intelligence in support of strategic decision making.

Decision Support Systems model information to managers and business professionals during the decision-making process. There are three quantitative models; Sensitivity analysis, What-if analysis & Goal-Seeking Analysis.

EIS - A specialised DSS that support senior level executives within the organisation.

Most EISs offering the following capabilities; Consolidation, Drill-downs and SLide-and-dice.

Artificial Intelligence (AI)

Various commercial applications of artificial intelligence. It simulates human intelligence such as the ability to reason and learn.

Expert Systems computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Neutral Network attempts to emulate the way the human brain works. Genetic Algorithm is an AI system that mimics the evolutionary, survival of the fittest process. Intelligent agent is a special-purposed knowledge based information system that carries out a specific task on behalf of its users.

Data Mining is the ability to sift instantly through information to uncover patterns and relationships. Data-mining systems include many forms of AI such as neural networks.

Business Process Modelling

Business Process is a standardised set of activities that accomplish a specific task such as processing a customer's order. Business Process Modelling or mapping the activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks and activities in a structured sequence. Business process model a graphical description of a process, showing the sequence of tasks.


CP1005 - Lecture One

Information Technology's Impact on Business Operations

Information Technology has had an impact on many areas within a business that may include the way Accounting is ran, finance, Human Resources (HR), Sales, Marketing, Operation Management and the Management of Information Systems.

What is IT about - It's the field that's concerned with the managing and processing of information.

MIS - The business function and academic discipline covering the application of people, technologies and procedures.

Technology Basics

When talking about Data it is information and business intelligence - RAW facts that descrube the characteristic of an event.
Information - Data converted into a meningful and useful context - Rows of data in an excel spreadsheet with columns showing what the data represents.
Business Intelligence - Applications and technologies that are used to gather provide access to and analyses data.


To have a successful IT resourced business it involved the following - Information + People + IT = Business Success.

Some Roles you may encounter in IT - Chief Information Officer, Chief Technology Officer, Chief Knowledge Officer and Chief Privacy Officer.

Ways of managing how successful an IT process is include: 


KPI - Key Performance Indicators.
Metrics - Are detailed measures that feed KPIs.

Performance Metrics fall into an area that's covered by two parts within the business. Requires input from both IT and Business Professionals.

IT Metrics focus on technology and include; throughput, transaction speed, system availability, information accuracy, web traffic and response time.

Effectiveness can focus on the organizations goals and strategies -  Usability, Customer Satisfaction, Conversion rates and Financial.

Business Strategy - To survive and thrive and thrive an organization must create a competitive advantage.

There are two kinds of advantages - Competitive Advantage and First-Mover Advantage. The Competitive - a product or service that an organisation’s customers place a greater value on than similar offerings from a competitor. First-Mover Advantage - occurs when an organisation can significantly impact its market share by being first to market with a competitive advantage.

Porter's Five Forces Model allows us to determine the relative attractiveness of an industry through; Buyer Power, Supplier Power, Threat of Substitute Products or Services, Threat of new entrants and Rivalary among existing Competitors.

Buyer Power - High when buyers have many choices to buy from. Low with loyalty programs etc.
Supplier Power - High when one supplier has concentrated power over an industry. Buyers have few choices of whom to buy from.
Threat of Substitue Products - High when there are many alternatives to a product or a service.
Threat of new Entrants - High when it is easy for new competitors to enter a market. Low with significant entry barriers.
Rivalary among existing competitors - High when competition is fierce in a market and low when competition is more complacent.


Sports Tracker