Transcript Chapter 17

Chapter 17
Managing Information
MGMT
Chuck Williams
Designed & Prepared by
B-books, Ltd.
1
Moore’s Law
2
Why Information Matters
After reading these sections,
you should be able to:
1. explain the strategic importance of
information.
2. describe the characteristics of useful
information (i.e., its value and costs).
3
Data versus Information
• Raw data = facts + figures
• Information = useful data
that influences choices
4
Strategic Importance of
Information
First-Mover
Advantage
Sustaining a
Competitive
Advantage
1
5
First-Mover Advantage
First-Mover Advantage
The strategic advantage that
companies earn by being the first to
use new information technology to
lower costs or to differentiate a product.
1.1
6
Cable versus DSL
Cable companies
have invested $90
billion over the last
decade to create a
first-mover
advantage in
delivering highspeed Internet.
7
Fast Facts on First Movers
ON AVERAGE:
First movers earn a 30% market
share.
Later movers earn a 19% share.
Of market leaders, a whopping 70%
were first movers.
8
Sustaining a Competitive
Advantage
NO
Does the information
technology (IT)
create
YES
value?
Competitive
Disadvantage
NO
Is the IT different
across
competing
YES
firms?
Competitive
Parity
NO
1.2
Is it difficult
for another firm
to create or buy
the IT?
Temporary
Competitive
Advantage
YES
Sustained
Competitive
Advantage
9
Characteristics of Useful Information
•
•
•
•
•
•
•
Accurate
Verifiable
Timely
Organized
Accessible
Relevant
Complete
2
10
Costs of Useful Information
•
•
•
•
•
Acquisition
Processing
Storage
Retrieval
Communication Costs
2
11
Getting and Sharing
Information
After reading these sections,
you should be able to:
3. explain the basics of capturing, processing,
and protecting information.
4. describe how companies can access and share
information and knowledge.
12
Capturing Information
Manual
Bar Codes
Electronic
Radio Frequency
Identification Tags
Electronic Scanners
3.1
Optical Character
Recognition
13
Processing Information: Data Mining
Supervised
Data Mining
Data
Warehouse
Unsupervised
Data Mining
Affinity
Patterns
Sequence
Patterns
Predictive
Patterns
Data
Clusters
3.2
14
Unsupervised Data Mining
Affinity
Patterns
Two or more database elements
occur together significantly
Sequence
Patterns
One of the elements
precedes the other
Predictive
Patterns
Helps identify database elements
that are different
Data
Clusters
Three or more database elements
occur together
3.2
15
Protecting Information
 Authentication
 Authorization
 Two-factor authentication
 Firewalls
 Antivirus software
 Data encryption
 Virtual private networks
 Secure Sockets Layer (SSL) encryption
3.3
16
Protecting Information

Firewall - Security system consisting of hardware
and/or software that prevents unauthorized intrusion
17
Protecting Information
• What is a biometric device?
 Authenticates person’s
identity using personal
characteristic

Fingerprint, hand geometry, voice,
signature, and iris
18
Next
Protecting Information
• What is encryption?




Safeguards against information theft
Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
Encryption key (formula) often uses more than one method
To read the data, the recipient must decrypt, or decipher, the data
19
Next
Next
Tips for Protecting Data
Beyond the Book
• Rule #1: Understand the real value
of data (not just the value of the
disk it’s on) and treat it accordingly.
• Encrypt data.
• Track data that you send to
someone else.
• Use a coding system to label the
value of a disk or a memory stick.
Source: B. Worthen, “Workers Losing Computer Data May Lack Awareness of its Value,” The Wall
Street Journal, 27 November 2007, B3.
20
Accessing and Sharing
Information and Knowledge
Internal Access
and
Information Sharing
External Access
and
Information Sharing
4
Sharing of
Knowledge and
Expertise
21
Executive Information System (EIS)
• Uses internal and external data
• Used to monitor and analyze
organizational performance
• Must provide accurate,
complete, relevant, and
timely information to
managers
4.1
22
Intranets
• Private company networks
• Allow employees to
access, share, and
publish information
• A firewall permits
only authorized internal
access
4.1
23
Why Companies Use Intranets
• Inexpensive
• Increase efficiencies and reduce costs
• Intuitive and easy to use
• Work across all computer systems
• Can be built on top of existing network
• Work with software programs that convert to HTML
• Software is available at no cost or is less expensive
4.1
24
Corporate Portals
Corporate Portals
A hybrid of executive information systems
and intranets that allow managers and
employees to use a Web browser to gain
access to customized company information
and to complete specialized transactions.
4.1
25
External Access and Sharing
Electronic Data Interchange
Extranets
Web Services
Internet
4.2
26
Benefits of External Access
and Sharing
Reduced costs
Increased productivity
Reduced data entry errors
Improved customer service
Faster communications
4.2
27
Electronic Data Interchange (EDI)
Electronic
Data
Interchange
When two companies convert their
purchase and ordering information
to a standardized format to enable
the direct electronic transmission of that
information from one computer system
to the other.
4.2
28
Extranet
Extranet
Allows companies to exchange
information and conduct transactions
with outsiders by providing them direct,
Web-based access to authorized parts
of a company’s intranet or information
system.
4.2
29
Web Services
Web Services
Using standardized protocols to describe
data from one company in such a way
that those data can automatically be
read, understood, transcribed, and
processed by different computer
systems in another company.
4.2
30
Sharing Knowledge and Expertise
Decision
Support
System
Helps managers to understand specific
kinds of problems and potential
solutions, and to analyze the impact of
different decision options using “what if”
scenarios.
Expert
System
An information system that contains the
specialized knowledge and decision
rules used by experts so that nonexperts
can draw on this knowledge base to
make decisions.
4.3
31
Sharing Knowledge and Expertise
• What is an expert system?
Captures and stores knowledge of human
experts and then imitates human
reasoning and decision making
Consists of two components
knowledge base—
combined subject
knowledge and
experiences of
human experts
inference rules—set
of logical judgments
applied to the
knowledge base
32
Sharing Knowledge and Expertise
• What is an example of an expert system?
Step 1.
A user selects his
or her gender
Step 2.
Select the
location on the
body where the
problem is
being
experienced
Step 3. Select
the type of pain.
Step 5. Review
the possible
diagnosis.
Step 4. Select other
information about the
problem.
33