Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Introduction to information systems - Fifteenth ed
Nội dung xem thử
Mô tả chi tiết
This page intentionally left blank
INTRODUCTION TO
INFORMATION
SYSTEMS
obr76779_fm_i-xxxiii.indd Page i 9/25/09 8:45:02 PM s-206 /Users/s-206/Desktop/Tempwork/September/25:09:09/MHBR112:204:Oberain
This page intentionally left blank
INTRODUCTION TO
INFORMATION
SYSTEMS
Fifteenth Edition
James A. O’Brien
College of Business Administration
Northern Arizona University
George M. Marakas
KU School of Business
University of Kansas
obr76779_fm_i-xxxiii.indd Page iii 10/9/09 7:19:23 AM s-206 /Volumes/204/MHBR112/obr76779/0073376779/obr76779_pagefiles
INTRODUCTION TO INFORMATION SYSTEMS
Published by McGraw-Hill/Irwin, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue
of the Americas, New York, NY, 10020. Copyright © 2010, 2008, 2007, 2005, 2003, 2001, 2000, 1997,
1994, 1991, 1988, 1985, 1982, 1978, 1975 by The McGraw-Hill Companies, Inc. All rights reserved.
No part of this publication may be reproduced or distributed in any form or by any means, or stored in
a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc.,
including, but not limited to, in any network or other electronic storage or transmission, or broadcast
for distance learning.
Some ancillaries, including electronic and print components, may not be available to customers
outside the United States.
This book is printed on acid-free paper.
1 2 3 4 5 6 7 8 9 0 DOW/DOW 0 9
ISBN 978–0-07–337677-6
MHID 0–07-337677–9
Vice president and editor-in-chief: Brent Gordon
Publisher: Paul Ducham
Director of development: Ann Torbert
Development editor II: Trina Hauger
Vice president and director of marketing: Robin J. Zwettler
Marketing manager: Natalie Zook
Vice president of editing, design and production: SeshaBolisetty
Senior project manager: Bruce Gin
Lead production supervisor: Carol A.Bielski
Senior designer: Mary Kazak Sander
Senior photo research coordinator: LoriKramer
Media project manager: Joyce J. Chappetto
Cover design: Mary Sanders
Interior design: Mary Sanders
Typeface: 10/12 Janson
Compositor: Aptara®, Inc.
Printer: R. R. Donnelley
Library of Congress Cataloging-in-Publication Data
O’Brien, James A., 1936–2007
Introduction to information systems / James A. O’Brien, George M. Marakas.—Fifteenth ed.
p. cm.
Includes index.
ISBN-13: 978–0-07–337677-6 (alk. paper)
ISBN-10: 0–07-337677–9 (alk. paper)
1. Business—Data processing. 2. Management—Data processing.
3. Management information systems. 4. Electronic commerce.
I. Marakas, George M. II. Title.
HF5548.2.O23 2010
658.4’038—dc22
2009036062
www.mhhe.com
obr76779_fm_i-xxxiii.indd Page iv 10/2/09 1:31:00 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/00 HARISH_BACKUP/OCTOBER_2009/02...
To your love, happiness, and success.
The world of information systems presents new
and exciting challenges each and every day. Creating a
textbook to capture this world is a formidable task, to be
sure. This, the 15th edition of Introduction to Information
Systems , represents the best we have to offer. We take
pride in delivering this new edition to you and we thank
all of you for your loyalty to the book and the input you
provided that was instrumental in its development. Your
continued support fi lls us with joy and a sense of both
accomplishment and contribution.
We are also pleased and excited to welcome a new
member to our writing family. Miguel Aguirre-Urreta
has joined us in the creation of the materials contained
herein. His work and effort on the Real World Cases and
blue boxes will be apparent as we bring you new cases
in every chapter of the book. Please join us in welcoming
Miguel to our family.
On behalf of Jim, Miguel, and myself, please accept
our sincere appreciation for your support and loyalty. As
always, we hope you enjoy and benefi t from this book.
obr76779_fm_i-xxxiii.indd Page v 9/25/09 8:45:03 PM s-206 /Users/s-206/Desktop/Tempwork/September/25:09:09/MHBR112:204:Oberain
A b o u t t h e A u t h o r s
ames A. O’Brien was an adjunct professor of Computer Information Systems in
the College of Business Administration at Northern Arizona University. He
completed his undergraduate studies at the University of Hawaii and Gonzaga
University and earned an MS and PhD in Business Administration from the
University of Oregon. He has been professor and coordinator of the CIS area at
Northern Arizona University, professor of Finance and Management Information
Systems and chairman of the Department of Management at Eastern Washington
University, and a visiting professor at the University of Alberta, the University of
Hawaii, and Central Washington University.
Dr. O’Brien’s business experience includes working in the Marketing Management Program of the IBM Corporation, as well as serving as a fi nancial analyst for
the General Electric Company. He is a graduate of General Electric’s Financial
Management Program. He also has served as an information systems consultant to
several banks and computer services fi rms.
Jim’s research interests lie in developing and testing basic conceptual frameworks
used in information systems development and management. He has written eight
books, including several that have been published in multiple editions, as well as in
Chinese, Dutch, French, Japanese, and Spanish translations. He has also contributed
to the fi eld of information systems through the publication of many articles in business and academic journals, as well as through his participation in academic and
industry associations in the fi eld of information systems.
eorge M. Marakas is a professor of Information Systems at the School of
Business at the University of Kansas. His teaching expertise includes Systems Analysis and Design, Technology-Assisted Decision Making, Electronic Commerce, Management of IS Resources, Behavioral IS Research
Methods, and Data Visualization and Decision Support. In addition, George is
an active researcher in the area of Systems Analysis Methods, Data Mining and
Visualization, Creativity Enhancement, Conceptual Data Modeling, and Computer
Self-Effi cacy.
George received his PhD in Information Systems from Florida International
University in Miami and his MBA from Colorado State University. Prior to his position at the University of Kansas, he was a member of the faculties at the University
of Maryland, Indiana University, and Helsinki School of Economics. Preceding his
academic career, he enjoyed a highly successful career in the banking and real estate
industries. His corporate experience includes senior management positions with
Continental Illinois National Bank and the Federal Deposit Insurance Corporation. In addition, George served as president and CEO for CMC Group Inc., a major RTC management contractor in Miami, Florida, for three years. Throughout
his academic career, George has distinguished himself both through his research
and in the classroom. He has received numerous national teaching awards, and his
research has appeared in the top journals in his fi eld. In addition to this text, he is
J
G
vi
obr76779_fm_i-xxxiii.indd Page vi 10/2/09 1:22:31 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/00 HARISH_BACKUP/OCTOBER_2009/02...
About the Authors ● vii
the author of three best-selling textbooks on information systems: Decision Support
Systems for the 21st Century, Systems Analysis and Design: An Active Approach, and Data
Warehousing, Mining, and Visualization: Core Concepts.
Beyond his academic endeavors, George is also an active consultant and has
served as an advisor to a number of organizations, including the Central Intelligence Agency, Brown & Williamson, the Department of the Treasury, the Department of Defense, Xavier University, Citibank Asia-Pacifi c, Nokia Corporation,
Professional Records Storage Inc., and United Information Systems. His consulting
activities are concentrated primarily on electronic commerce strategy, the design
and deployment of global IT strategy, workfl ow reengineering, e-business strategy,
and ERP and CASE tool integration.
George is also an active member of a number of professional IS organizations
and an avid golfer, second-degree Black Belt in Tae Kwon Do, a PADI master scuba
diver trainer and IDC staff instructor, and a member of Pi Kappa Alpha fraternity.
obr76779_fm_i-xxxiii.indd Page vii 9/25/09 8:45:04 PM s-206 /Users/s-206/Desktop/Tempwork/September/25:09:09/MHBR112:204:Oberain
The O’Brien and
Marakas Approach
The first thing you probably noticed about this new edition is the new, loose-leaf format. The 15th edition was produced this way in order to deliver a couple of important
benefits for instructors and students.
• Lower cost to students—the loose-leaf format allows us to substantially lower the
price that your campus bookstore pays for each copy, which should translate to a
substantially lower price for each student.
• Less frequent course prep for faculty—We expect that, by providing students with this
cost-competitive alternative to a used book, we won’t need to revise the book as frequently. So instructors will get additional semesters out of their prep with this edition.
• Improved portability—Students and instructors need only carry the chapter required for today’s lecture, leaving the rest in a three ring binder.
If for any reason you need a bound book for your class, simply contact your
McGraw-Hill representative. They will arrange to have bound copies of Introduction
to Information Systems, 15th edition produced for your adoption.
A Business and Managerial Perspective
The Fifteenth Edition is designed for business students who are or who will soon become
business professionals in the fast-changing business world of today. The goal of this text
is to help business students learn how to use and manage information technologies to
revitalize business processes, improve business decision making, and gain competitive advantage. Thus, it places a major emphasis on up-to-date coverage of the essential role of
Internet technologies in providing a platform for business, commerce, and collaboration
processes among all business stakeholders in today’s networked enterprises and global
markets. This is the business and managerial perspective that this text brings to the study
of information systems. Of course, as in all O’Brien texts, this edition:
• Loads the text with Real World Cases, in-depth examples (Blue Boxes) , and
opportunities to learn about real people and companies in the business world
(Real World Activities, Case Study Questions, Discussion Questions, and
Analysis Exercises) .
• Organizes the text around a simple Five-Area Information Systems Framework
that emphasizes the IS knowledge a business professional needs to know.
• Places a major emphasis on the strategic role of information technology in
providing business professionals with tools and resources for managing business
operations, supporting decision making, enabling enterprise collaboration, and
gaining competitive advantage.
Modular Structure of the Text
The text is organized into
modules that reflect the
five major areas of the
framework for information systems knowledge.
Each chapter is then organized into two or more
distinct sections to provide
the best possible conceptual organization of the
text and each chapter. This
organization increases instructor flexibility in assigning course material because it structures the text into modular levels (i.e., modules,
chapters, and sections) while reducing the number of chapters that need to be covered.
viii
MODULE V
Management
Challenges
Chapters 11, 12
MODULE II
Information
Technologies
Chapters 3, 4, 5, 6
MODULE IV
Development
Processes
Chapter 10
MODULE III
Business
Applications
Chapters 7, 8, 9
MODULE I
Foundation
Concepts
Chapters 1, 2
obr76779_fm_i-xxxiii.indd Page viii 10/8/09 7:05:30 PM user-f501 /Users/user-f501/Desktop/MHBR112:O'BREN:204
Management
Challenges
Business
Applications
Information
Technologies
Foundation
Concepts
Development
Processes
Information
Systems
An Information
Systems Framework
ix
Information
Technologies
Includes major concepts, developments, and managerial issues involved in computer hardware,
software, telecommunications networks, data resource management
technologies, and other technologies (Chapters 3, 4, 5, and 6).
Management Challenges
The challenges of business/IT technologies
and strategies, including security and ethical challenges and global IT management
(Chapters 11 and 12).
Foundation Concepts
Fundamental business information systems
concepts, including trends, components,
and roles of information systems (Chapter 1)
and competitive advantage concepts and
applications (Chapter 2). Selective coverage
of relevant behavioral, managerial, and
technical concepts.
Development Processes
Developing and implementing business/IT
strategies and systems using several strategic
planning and application development
approaches (Chapter 10).
Business Applications
How businesses use the Internet and other
information technologies to support
their business processes, e-business and
e-commerce initiatives, and business
decision making (Chapters 7, 8, and 9).
obr76779_fm_i-xxxiii.indd Page ix 9/25/09 8:45:06 PM s-206 /Users/s-206/Desktop/Tempwork/September/25:09:09/MHBR112:204:Oberain
Real World Examples
x
measured in minutes.” Merged and acquired infrastructure
“has to be available right away,” says Ryan Osborn of AFCOM,
a data center industry group.
Observers agree that the key to M&A success from a
data center perspective is to focus on virtualization, documentation, and logistics. Osborn says these three areas will
help companies get ahead of the game and turn a time of
crisis into one of opportunity. “You won’t spend your time
just moving infrastructure from one data center to another.
You can actually do a technology refresh, get newer equipment and come out ahead,” he says.
For John Musilli, data center operations manager at Intel
in Santa Clara, California, the most critical piece is knowing
about basic logistics. “I don’t always have to know what a
server does, but I do have to know how to keep it alive,” he
says. “It’s getting something moved from Point A to Point B
and it doesn’t matter whether the logistics deals with putting
servers on a truck or transferring data over a line.”
Musilli has been through a handful of acquisitions in his
eight years at Intel, and he says that he has it down to a science. “As part of the acquiring company, it’s my job to provide the skeletal environment to accept any company’s assets
that come to us,” he says. As such, he keeps a healthy amount
of generic racking, generic cabling, extra bandwidth on the
network, and generic power. “I go generic because I probably won’t know what servers, how many slots, or what type
of power we’ll need beforehand. With generic, I can configure whatever I need in minutes,” he says.
For instance, he uses a universal busway for power so
that he doesn’t have to be concerned about the particular
electrical needs of the acquired equipment. “We acquired a
company and needed to integrate them in a short period of
time because their building lease was up and they had to get
out of there,” Musilli says. One team was sent ahead of time
and spent a year trying to identify each server on 30–40 racks.
“None of their applications matched our operating systems,”
he says. As time dwindled, Musilli told them to pack up all
the servers and send them to him. “In the end, it took two
man-days to move them intact and get them up and running
in our data center,” he says.
As companies begin to contemplate future mergers or
acquisitions, they must look inward at their own processes
and procedures. “Just as important as technology is documentation of processes—you have to know what people are
doing with the systems,” says EMA’s Mann. He warns that
one of the first obstacles to having a successful merger or
acquisition is the reliance on what he refers to as tribal knowledge. Companies that have data centers where the employees
hold all the knowledge suffer greatly when, after a merger or
acquisition, those people are let go.
“You have to document the knowledge from those people and figure out how to make the processes work with
only a handful of employees,” he says. Mann recommends
When Cogent Communications eyes a company
to acquire, it goes into battle mode. Two miles
north of the Pentagon, across the Potomac in
Washington, Cogent sets up what it calls the War Room,
where it marshals eight top executives to evaluate the target
company. Among those on the due diligence squad are the
IS director and IT infrastructure manager.
Cogent, a midsize Internet service provider, understands
what far too many companies don’t: Its ability to integrate
and, in some cases, adopt an acquired company’s IT systems
and operations can determine whether a merger flourishes
or founders. For one thing, unanticipated IT integration
costs can offset merger savings. Imagine the business lost
when orders vanish, accounts payable go uncollected, and
customer information goes AWOL because the acquiring
company gave short shrift to the IT challenge ahead.
As 2006 came to a close, it broke records for the number
of mergers and acquisitions, but now IT managers have to
step up and make sure their data centers can help make those
deals a reality. “A well-run data center with reduced complexity makes mergers and acquisitions much easier,” says
Andi Mann, senior analyst at Enterprise Management Associates (EMA).
More than 11,700 deals were done. As the dust clears,
experts and IT managers agree that companies will feel the
full impact of this merger and acquisition (M&A) frenzy directly in their data centers. So they advise organizations to
prep now or risk experiencing downtime if they have to
merge mission-critical assets. “Today, the most downtime
companies can afford for critical data center infrastructure is
Cogent Communications, Intel, and
Others: Mergers Go More Smoothly
When Your Data Are Ready
REAL WORLD
CASE 1
Source: McGraw-Hill Companies, Inc./John Flournoy, photographer.
FIGURE 5.1
IT integration and adoption issues can make or
break merger and acquisition activities.
Chapter 5 / Data Resource Management ● 171
obr76779_ch05_169-206.indd Page 171 10/15/09 2:42:48 AM user-f498 /Users/user-f498/Desktop/TEMPWORK/OCTOBER/09:10/MHBR144
Real World Cases
Each chapter provides three Real World Cases—in-depth
examples that illustrate how prominent businesses and
organizations have attempted to implement the theoretical
concepts students have just learned.
obr76779_fm_i-xxxiii.indd Page x 10/21/09 3:50:03 AM user-f498 /Users/user-f498/Desktop
xi
Real Life Lessons
creating a workflow chart that outlines who’s responsible for
each part of the data center. He suggests considering who
handles network management, systems management, application management, and storage. “This will also help you
spot redundancies in skill sets or areas where you are lacking
in the event of a merger,” he says. John Burke, senior analyst
at Nemertes Research in Minneapolis, says that in addition
to knowing who is responsible, IT groups must know which
systems perform which processes.
“You have to have really good information about what
goes on in your data center in terms of systems and how they
interact with each other and how they interface with the
business. You should always know what services you offer
and how much it costs to offer them,” Burke says. As part of
this effort, many organizations employ a configuration management database and asset management tool to help track
elements within the data center. “You need a clear and concise view of the data flow within the data center. If you don’t
know what has to move together, you might disrupt business
during a merger or acquisition,” he says.
Companies must also develop guidelines for governance
to be referenced during a merger. For instance, if two law
firms are merging and have competing clients, then IT
groups must ensure that data are protected and there is sufficient access control. AFCOM’s Osborn says that good documentation helps the discovery process that companies go
through before a merger or acquisition. “If the company you
are acquiring has good documentation and good processes in
place, the acquisition goes much more smoothly,” he says.
“In some cases, you might be able to lower your software
costs if you use a more robust server with fewer processors,
but if the application license doesn’t allow for that, then you
can’t,” Osborn says, and adds: “How much money you’re
going to have to spend to merge technology can weigh heavily
on the decision to acquire a company.” Nemertes’ Burke
suggests that one major step to M&A success is to make sure
your data center has virtualization tools running on both
servers and storage.
Virtualization is important not only for scaling the data
center but also for creating a standardized execution environment. “With a well-virtualized data center, you can hide the
fact that things are moving around multiple servers and storage devices,” Burke says. Rob Laurie, CEO at virtualizationsoftware provider Dunes Technologies in Stamford,
Connecticutt, says that virtualization is useful for companies
that want to test application and infrastructure integration before they put their merged or acquired assets into production.
It’s also helpful for companies that must integrate assets that
can’t be physically moved, he says. He warns, however, that for
virtualization to be most effective, merging companies must
decide on a uniform platform for their virtual environment.
“That way, whatever is virtualized in one company could run
in the other company’s data center without problems,” he says.
If they don’t have the same environment, they must at least
have a compatible data format to gain any benefit.
Intel’s Musilli suggests that IT’s natural attention to detail can sometimes overcomplicate matters. “Mergers and
acquisitions aren’t always as difficult as people make them.
They’re simply about the ability to assimilate any two environments,” he says. M&As create stress for both acquirer
and acquiree, but early involvement by IT can minimize the
trauma. Otherwise, you’ll need to do too much in too little
time. As software engineering guru Frederick Brooks once
said, “You can’t make a baby in a month using nine women.
Plan ahead.”
Source: Adapted from Sandra Gittien, “Mergers Go Smoother with a WellPrepped Data Center,” Computerworld, July 28, 2007, and Eric Chabrow, “IT
Plays Linchpin Role in High-Stake M&As,” InformationWeek, June 26, 2006.
1. Place yourself in the role of a manager at a company
undergoing a merger or acquisition. What would be
the most important things customers would expect
from you while still in that process? What role would
IT play in meeting those expectations? Provide at least
three examples.
2. Focus on what Andi Mann in the case calls “tribal
knowledge.” What do you think he means by that, and
why is it so important to this process? What strategies
would you suggest for companies that are faced with the
extensive presence of this issue in an acquired organization? Develop some specific recommendations.
3. Most of the discussion on the case focused on hardware
and software issues. However, these are essentially enablers for underlying business processes developed by
each of the companies involved. What different alternatives do companies have for merging their business
processes, and what role would IT play in supporting
those activities? Pay particular attention to data management and governance issues.
1. The case extensively discusses the idea of “virtualization” and the role it plays in the merger process. Go
online to research this concept and prepare a report
about what it entails, how it works, what are its
advantages and disadvantages, and other applications
in addition to those noted in the case.
2. Search the Internet for reports of merger and acquisition cases where IT issues played an important role,
either positive or negative. How did different organizations handle IT-related matters in the situations you
found? What was the ultimate outcome of the process?
Prepare a presentation to share your findings with
the class.
CASE STUDY QUESTIONS REAL WORLD ACTIVITIES
172 ● Module II / Information Technologies
obr76779_ch05_169-206.indd Page 172 9/3/09 3:15:06 AM user-f501 /Users/user-f501/Desktop
Use Your Hands
The Real World Activities
section offers possibilities
for hands-on exploration
and learning.
Use Your Brain
Traditional case study questions promote and
provide opportunity for critical thinking and
classroom discussion.
obr76779_fm_i-xxxiii.indd Page xi 9/25/09 8:45:13 PM s-206 /Users/s-206/Desktop/Tempwork/September/25:09:09/MHBR112:204:Oberain
Strategy, Ethics . . .
xii
Chapter Highlights
Section I
Fundamentals of Strategic Advantage
Strategic IT
Competitive Strategy Concepts
Real World Case: IT Leaders: Reinventing IT as a
Strategic Business Partner
Strategic Uses of Information Technology
Building a Customer-Focused Business
The Value Chain and Strategic IS
Section II
Using Information Technology for Strategic
Advantage
Strategic Uses of IT
Reengineering Business Processes
Real World Case: For Companies Both Big and Small:
Running a Business on Smartphones
Becoming an Agile Company
Creating a Virtual Company
Building a Knowledge-Creating Company
Real World Case: Wachovia and Others: Trading
Securities at the Speed of Light
Learning Objectives
1. Identify several basic competitive strategies and
explain how they use information technologies
to confront the competitive forces faced by a
business.
2. Identify several strategic uses of Internet technologies and give examples of how they can help
a business gain competitive advantages.
3. Give examples of how business process reengineering frequently involves the strategic use of
Internet technologies.
4. Identify the business value of using Internet technologies to become an agile competitor or form
a virtual company.
5. Explain how knowledge management systems can
help a business gain strategic advantages.
43
CHAPTER 2
COMPETING WITH
INFORMATION TECHNOLOGY
Module
I
Business
Applications
Information
Technologies
Development
Processes
Management
Challenges
Foundation
Concepts
obr76779_ch02_043-071.indd Page 43 9/8/09 2:11:30 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
44 ● Module I / Foundation Concept
SECTION I Fundamentals of Strategic
Advantage
Technology is no longer an afterthought in forming business strategy, but the actual cause
and driver .
This chapter will show you that it is important to view information systems as
more than a set of technologies that support efficient business operations, workgroup
and enterprise collaboration, or effective business decision making. Information technology can change the way businesses compete. You should also view information
systems strategically, that is, as vital competitive networks, as a means of organizational renewal, and as a necessary investment in technologies; such technologies help
a company adopt strategies and business processes that enable it to reengineer or reinvent itself to survive and succeed in today’s dynamic business environment.
Section I of this chapter introduces fundamental competitive strategy concepts that
underlie the strategic use of information systems. Section II then discusses several major strategic applications of information technology used by many companies today.
Read the Real World Case regarding the competitive advantages of IT. We can
learn a lot about the strategic business uses of information technologies from this case.
See Figure 2.1 .
Competitive
Strategy
Concepts
In Chapter 1, we emphasized that a major role of information systems applications in
business is to provide effective support of a company’s strategies for gaining competitive advantage. This strategic role of information systems involves using information
technology to develop products, services, and capabilities that give a company major
advantages over the competitive forces it faces in the global marketplace.
This role is accomplished through a strategic information architecture: the collecStrategic IT
obr76779_ch02_043-071.indd Page 44 9/8/09 2:11:57 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Chapter 11 / Security and Ethical Challenges ● 455
Ethics, Moral Dilemmas, and Tough
Decisions: The Many Challenges of
Working in IT
and professional, throughout the company, and they have the
technical prowess to manipulate that information. That gives
them both the power and responsibility to monitor and report employees who break company rules. IT professionals
may also uncover evidence that a coworker is, say, embezzling funds, or they could be tempted to peek at private salary
information or personal e-mails. There’s little guidance,
however, on what to do in these uncomfortable situations.
In the case of the porn-viewing executive, Bryan didn’t get
into trouble, but neither did the executive, who came up with
“a pretty outlandish explanation” that the company accepted,
Bryan says. He considered going to the FBI, but the Internet
bubble had just burst, and jobs were hard to come by. “It was a
tough choice,” Bryan says. “But I had a family to feed.”
Perhaps it would ease Bryan’s conscience to know that
he did just what labor attorney Linn Hynds, a senior partner
at Honigman Miller Schwartz and Cohn LLP, would have
advised in his case. “Let the company handle it,” she says.
“Make sure you report violations to the right person in your
company, and show them the evidence. After that, leave it to
the people who are supposed to be making that decision.”
Ideally, corporate policy takes over where the law stops, governing workplace ethics to clear up gray areas and remove
personal judgment from the equation as much as possible.
“If you don’t set out your policy and your guidelines, if
you don’t make sure that people know what they are and
understand them, you’re in no position to hold workers accountable ” says John Reece a former CIO at the Internal
What Bryan found on an executive’s computer
six years ago still weighs heavily on his mind.
He’s particularly troubled that the man he
discovered using a company PC to view pornography of
Asian women and of children was subsequently promoted
and moved to China to run a manufacturing plant. “To this
day, I regret not taking that stuff to the FBI.” It happened
when Bryan, who asked that his last name not be published,
was IT director at the U.S. division of a $500 million multinational corporation based in Germany.
The company’s Internet usage policy, which Bryan
helped develop with input from senior management, prohibited the use of company computers to access pornographic
or adult-content Web sites. One of Bryan’s duties was to use
products from SurfControl PLC to monitor employee Web
surfing and to report any violations to management.
Bryan knew that the executive, who was a level above him in
another department, was popular within both the U.S. division
and the German parent. Yet when the tools turned up dozens of
pornographic Web sites visited by the exec’s computer, Bryan
followed the policy. “That’s what it’s there for. I wasn’t going to
get into trouble for following the policy,” he reasoned.
Bryan’s case is a good example of the ethical dilemmas
that IT workers may encounter on the job. IT employees
have privileged access to digital information, both personal
REAL WORLD
CASE 1
FIGURE 11.1
obr76779_ch11_452-502.indd Page 455 10/15/09 10:56:16 PM s-206 /Users/s-206/Desktop/MHBR112:O'BREN:204/ch11
454 ● Module V / Management Challenges
SECTION I Security, Ethical, and Societal
Challenges of IT
There is no question that the use of information technology in business presents major
security challenges, poses serious ethical questions, and affects society in significant
ways. Therefore, in this section, we explore the threats to businesses and individuals as
a result of many types of computer crime and unethical behavior. In Section II, we will
examine a variety of methods that companies use to manage the security and integrity
of their business systems. Now let’s look at a real-world example.
Read the Real World Case on the next page. We can learn a lot from this case
about the security and ethical issues that result from the pervasive use of IT in organizations and society today. See Figure 11.1 .
The use of information technologies in business has had a major impact on society and
thus raises ethical issues in the areas of crime, privacy, individuality, employment,
health, and working conditions. See Figure 11.2 .
It is important to understand that information technology has had beneficial results, as well as detrimental effects, on society and people in each of these areas. For
example, computerizing a manufacturing process may have the beneficial result of
improving working conditions and producing products of higher quality at lower cost,
but it also has the adverse effect of eliminating people’s jobs. So your job as a manager
or business professional should involve managing your work activities and those of
others to minimize the detrimental effects of business applications of information
technology and optimize their beneficial effects. That would represent an ethically
responsible use of information technology.
Introduction
Business/IT Security,
Ethics, and Society
obr76779_ch11_452-502.indd Page 454 9/8/09 2:13:50 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
you don’t make sure that pe
understand them, you’re in n
countable,” says John Reece
Revenue Service and Time W
guidelines also lets employe
the person they discover br
someone who reports to them
Reece, who is now head of co
Associates LLC. Organizatio
often focus on areas where t
emphasize whatever they ar
Reece was at the IRS, for exa
on protecting the confidentia
At the U.S. Department o
phasize procurement rules, n
dent of the SANS Technolo
Ethics Handbook: Right and W
to the complexity, an organi
skilled workers might be m
worked in IT security at the
in Virginia, it was a rarefied
after PhDs. “I was told pretty
lot of PhDs very unhappy so
wouldn’t need me anymore,”
Of course, that wasn’t w
Northcutt had to read betwe
preted it was: Child pornogra
if the leading mathematician
tures of naked girls, they didn
Northcutt says that he did
and that both events led to pr
The pervasive use of information technology in
organizations and society presents individuals with
new ethical challenges and dilemmas.
FIGURE 11.1
Source: ©Courtesy of Punchstock.
obr76779_ch11_452-502.indd Page 455 10/15/09 10:56:16 PM s-206 /Users/s-206/Desktop/MHBR112:O'BREN:204/ch11
Ethics & Security
Chapter 11 discusses the issues
surrounding these topics and
the challenges IT faces.
Competitive Advantage
Chapter 2 focuses on the use of IT as a way to
surpass your competitor’s performance.
obr76779_fm_i-xxxiii.indd Page xii 10/21/09 3:50:17 AM user-f498 /Users/user-f498/Desktop
. . . and Beyond
xiii
522 ● Module V / Management Challenges
Managing Global IT
Whether they are in Berlin or Bombay, Kuala Lumpur or Kansas, San Francisco or
Seoul, companies around the globe are developing new models to operate competitively
in a digital economy. These models are structured, yet agile; global, yet local; and
they concentrate on maximizing the risk-adjusted return from both knowledge and
technology assets.
International dimensions have become a vital part of managing a business enterprise in the internetworked global economies and markets of today. Whether you become a manager in a large corporation or the owner of a small business, you will be
affected by international business developments and deal in some way with people,
products, or services whose origin is not your home country.
Read the Real World Case on the next page. We can learn a lot about approaches
to successfully develop and roll out worldwide system implementations from this
case. See Figure 12.11 .
Figure 12.12illustrates the major dimensions of the job of managing global information technology that we cover in this section. Notice that all global IT activities must
be adjusted to take into account the cultural, political, and geoeconomic challenges
that exist in the international business community. Developing appropriate business
and IT strategies for the global marketplace should be the first step in global information technology management. Once that is done, end users and IS managers can move
on to developing the portfolio of business applications needed to support business/IT
strategies; the hardware, software, and Internet-based technology platforms to support those applications; the data resource management methods to provide necessary
databases; and finally the systems development projects that will produce the global
information systems required.
The
International
Dimension
Global IT
Management
SECTION II
We seem to have reached a point where virtually every CIO is a global CIO—a
leader whose sphere of influence (and headaches) spans continents. The global CIO’s
most common challenge, according to CIO Executive Council members, is managing global virtual teams. In an ideal world, HR policies across the global IT team
should be consistent, fair, and responsive. Titles and reporting structures (if not
compensation) should be equalized.
The council’s European members, representing Royal Dutch Shell, Galderma,
Olympus, and others, commissioned a globalization playbook that collects and codifies best practices in this and other globalization challenges.
Obtain local HR expertise. Companies must have a local HR person in each
country to deal with local laws. “Hiring, firing, and training obligations must be
managed very differently in each location, and you need someone with local expertise on the laws and processes,” says Michael Pilkington, former CIO of Euroclear, the
Brussels-based provider of domestic and cross-border settlement for bond, equity,
and fund transactions.
Create job grade consistency across regions. Euroclear is moving toward a
job evaluation methodology that organizes job types into vertical categories, such as
managing people/process, product development, business support, and project management. This provides a basis for comparing and managing roles and people across
locations. Grade level is not the same thing as a title; people’s titles are much more
subject to local conventions.
Global Teams: It’s
Still a Small World
(text continues on page 525)
obr76779_ch12_503-542.indd Page 522 9/8/09 2:19:11 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Source: Getty Images.
Consistency across the different business functions,
countries, languages, and processes involved in worldwide implementations is one of the most important
challenges faced by global organizations today.
FIGURE 12.11
obr76779_ch12_503-542.indd Page 523 9/8/09 2:19:27 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Go Global with IT
This text closes with Chapter 12, an in-depth
look at IT across borders.
Since Colorcon Inc. consolidated all of its global offices and seven manufacturing
sites onto one ERP system in 2001, the benefits have been indisputable. The specialty chemicals manufacturer has increased its annual inventory turns by 40 percent,
closes its books each quarter more than 50 percent faster than it once did, and has
improved its production lead times. “It was a significant improvement,” says CIO
Perry Cozzone.
Yet getting to a single, global instance has also been fraught with challenges for
the West Point, Pennsylvania–based company. Those included cleansing and verifying data from legacy systems, standardizing business processes globally, and getting
buy-in from business leaders in locales as disparate as Brazil, Singapore, and the
United Kingdom.
“It was hard work,” says Cozzone, who oversaw the final stages of the system
implementation. Transitioning to a single, global instance of an ERP system is a
heady challenge for large and midsize multinationals alike. For many organizations,
the toughest challenge in moving to one ERP system is change management. “It’s a
real struggle for many companies to have consistency around their business processes” because of differences in regional business requirements, says Rob Karel, an
analyst at Forrester Research Inc.
Still, companies that have achieved a single instance say it’s worth the struggle to
streamline financial reporting and increase the visibility of operations around the
world because doing so allows executives to make decisions faster.
The most common technical challenge that project teams face is verifying the
integrity of legacy data and moving it to the ERP environment. “One of the lessons
learned is that you can never spend enough time on ensuring data quality,” says
Cozzone. Early in Colorcon’s project, when there were questions about the quality
of a set of data, team members and executives didn’t always agree on what needed to
be done. “There was inconsistency about how to measure quality and manage it,”
says Cozzone.
So the project team developed a data-quality dashboard to illustrate to business leaders why compromised data needed to be fixed before being entered into
the new environment. The dashboard demonstrates, for instance, how poorquality customer contact information could lead to an increase in erroneous orders.
The dashboard includes steps that business users can take to correct faulty data,
and it quantifies monthly business improvements achieved by reducing bad data.
They also had to work through minor issues in retiring legacy systems and socalled ghost systems—those used in various business units but unknown to corporate IT.
“We’re not a multibillion-dollar company, but we still had ghost systems,” says
Cozzone. “We made these a high priority and got rid of them quickly.”
Colorcon Inc.:
Benefits and
Challenges of
Global ERPs
obr76779_ch12_503-542.indd Page 529 9/8/09 2:20:17 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Database Pioneer
Rethinks the Best
Way to Organize
Data
Is there a better way to build a data warehouse? For years, relational databases, which
organize data in tables composed of vertical columns and horizontal rows, have
served as the foundation of data warehouses. Now database pioneer Michael Stonebraker is promoting a different way of organizing them, promising much faster
response times. As a scientist at the University of California at Berkeley in the 1970s,
Stonebraker was one of the original architects of the Ingres relational database,
which spawned several commercial variants. A row-based system like Ingres is great
for executing transactions, but a column-oriented system is a more natural fit for
data warehouses, Stonebraker now says.
SQL Server, Sybase, and Teradata all have rows as their central design point. Yet in
data warehousing, faster performance may be gained through a column layout. Stonebraker says all types of queries on “most data warehouses” will run up to 50 times faster
in a column database. The bigger the data warehouse, the greater the performance gain.
Why? Data warehouses frequently store transactional data, and each transaction
has many parts. Columns cut across transactions and store an element of information
that is standard to each transaction, such as customer name, address, or purchase
amount. A row, by comparison, may hold 20–200 different elements of a transaction.
A standard relational database would retrieve all the rows that reflect, say, sales for a
month, load the data into system memory, and then find all sales records and generate an average from them. The ability to focus on just the “sales” column leads to
improved query performance.
There is a second performance benefit in the column approach Because columns
obr76779_ch05_169-206.indd Page 180 9/8/09 2:41:24 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Once upon a time, companies boasted of having offices in Manhattan, Munich, Madrid,
Mumbai, and Manila. Each office managed its set of customers and suppliers, with
a lot of “good advice” coming in from the head office. There was precious little
governance or standardization. Paradoxically, the use of third-party service providers
has catalyzed better governance and standards in captive or shared-services centers
scattered in distant parts of the world.
Boston-based Fidelity, the world’s largest mutual fund company, for example, has
subsidiary offices in most countries, which service local markets; has captive centers
in India to service its global operations; has outsourced to almost half a dozen thirdparty IT service providers; and itself functions as a human resources and benefits
administration provider to companies such as General Motors and Novartis.
There are multiple ways to implement the concept of a worldwide campus. Regardless of the company having globally dispersed teams working on disparate pieces
of work, what binds these offices together is a defined, common architecture and a
shared-enterprise objective.
Such complexity in operations is nothing new; it has been happening in other
industries for decades. In manufacturing, for instance, components may be produced
in China and Taiwan, assembled in Malaysia, and packaged in and shipped from
China. All of these activities may be coordinated from the United States. “The services industry, and business process outsourcing (BPO) in general, is just starting to
catch up with its manufacturing brethren,” says Brian Maloney, recently appointed as
president of the newly formed Unisys Global Industries. Maloney has been CEO of
AT&T Solutions and COO of Perot Systems.
Fidelity and
Unisys: Working
in a Worldwide
Campus
obr76779_ch12_503-542.indd Page 531 9/8/09 2:20:44 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Expand Your Knowledge
Blue boxes in each chapter provide
brief, in-depth examples of how
corporations apply IS concepts and
theories.
Since Colorcon Inc. consolidated all of its global offices and seven manufacturing
sites onto one ERP system in 2001, the benefits have been indisputable. The specialty chemicals manufacturer has increased its annual inventory turns by 40 percent,
closes its books each quarter more than 50 percent faster than it once did, and has
improved its production lead times. “It was a significant improvement,” says CIO
Perry Cozzone.
Yet getting to a single, global instance has also been fraught with challenges for
the West Point, Pennsylvania–based company. Those included cleansing and verifying data from legacy systems, standardizing business processes globally, and getting
buy-in from business leaders in locales as disparate as Brazil, Singapore, and the
United Kingdom.
“It was hard work,” says Cozzone, who oversaw the final stages of the system
implementation. Transitioning to a single, global instance of an ERP system is a
heady challenge for large and midsize multinationals alike. For many organizations,
the toughest challenge in moving to one ERP system is change management. “It’s a
real struggle for many companies to have consistency around their business processes” because of differences in regional business requirements, says Rob Karel, an
analyst at Forrester Research Inc.
Colorcon Inc.:
Benefits and
Challenges of
Global ERPs
obr76779_ch12_503-542.indd Page 529 9/8/09 2:20:17 PM user /Users/user/Desktop/Temp Work/SEPTEMBER_2009/HARISH_BACKUP/08:09:09/MHBR112:O...
Expand Your Horizons
Globe icons indicate examples with
an international focus so that your
knowledge makes you truly worldly.
obr76779_fm_i-xxxiii.indd Page xiii 9/25/09 8:45:27 PM s-206 /Users/s-206/Desktop/Tempwork/September/25:09:09/MHBR112:204:Oberain