Sample Course Outline
Sample Course Outline
Information Systems
Eleventh Edition
Ramesh Behl
International Management Institute
Bhubaneswar & Delhi
James A. O’Brien
College of Business Administration
Northern Arizona University
George M. Marakas
KU School of Business
University of Kansas
Information contained in this work has been obtained by McGraw Hill Education (India), from sources believed to be reliable. However,
neither McGraw Hill Education (India) nor its authors guarantee the accuracy or completeness of any information published herein,
and neither McGraw Hill Education (India) nor its authors shall be responsible for any errors, omissions, or damages arising out
of use of this information. This work is published with the understanding that McGraw Hill Education (India) and its authors are
supplying information but are not attempting to render engineering or other professional services. If such services are required, the
assistance of an appropriate professional should be sought.
Typeset at The Composers, 260, C.A. Apt., Paschim Vihar, New Delhi 110 063 and printed and bound in India at
Dedicated to our families and our friends. You make everything possible.
James A. O’Brien
George M. Marakas
The world of information systems presents new and exciting challenges each and every day.
Creating a textbook to capture this world is a formidable task, to be sure. This, the 11th edition
of Management Information Systems, represents the best we have to offer. We take pride in
delivering this new edition to you, and we thank all of you for your loyalty to the book and the
input you provided was instrumental in its development. Your continued support fills us with joy
and a sense of accomplishment and contribution. Please accept our sincere appreciation for your
support and loyalty. As always, we hope you enjoy and benefit from this book.
Ramesh Behl
James A. O’Brien
George M. Marakas
Ramesh Behl is the Director and Professor at International Management Institute (IMI),
Bhubaneswar and a full Professor at IMI Delhi. Prof. Ramesh Behl is credited with building
and transforming IMI Bhubaneswar to an institution of national importance. Prof. Behl is a
United Nations fellow on Information Systems and International Operations and a SAP
Certified International Consultant.
His teaching expertise includes Business Analytics, Enterprise Systems and Emerging
Technologies. In addition to teaching, Prof. Behl is an active researcher in the area of
eBusiness and Business Analytics. He has also designed and developed a number of software
for various industry applications. Prof. Behl has over thirty-two years of teaching, research
and consulting experience; and has worked with premier institutions like Indian Institute of
Foreign Trade (IIFT), New Delhi, Indian Institute of Management (IIM), Lucknow and
Statesman New Delhi. He has done a number of research and consulting assignments for government and private
organizations in the areas of Information Systems and International Trade. He has authored 22 books, 20 case studies
and number of research papers. He was also the member of Core Group on Electronic Commerce set-up by Ministry of
Commerce, Government of India.
Prof. Ramesh Behl is an international accredited Professor of International Accreditation Organization, USA. He is
on the board of leading Business Schools and Technology Companies. Prof. Behl has conducted corporate trainings and
trained over 8000 mid and senior level executives. He has also conducted training workshops for the faculties and
students of various international universities in Singapore, Indonesia, Thailand, Hong Kong, Australia, China, Germany
and Korea. He has received accolades and significant recognition as a demonstration of his leadership qualities and
innovations such as “Outstanding Academic Award 2010” from SAP Inc.; “Best Professor in Information Technology” as
part of Asia’s Best B-School Awards presented by CMO Asia at Singapore in July, 2011; “Best Professor in Information
Technology Management” as part of 21st Dewang Mehta Business School Awards in October, 2013; “Rashtriya Jewels
Award” and “Shining Achievers Award” in January, 2015.
James A. O’Brien was an adjunct professor of Computer Information Systems in the College
of Business Administration at Northern Arizona University. He completed his undergraduate
studies at the University of Hawaii and Gonzaga University and earned an MS and PhD in
Business Administration from the University of Oregon. He was professor and coordinator of
the CIS area at Northern Arizona University, professor of Finance and Management
Information Systems and chairman of the Department of Management at Eastern Washington
University, and a visiting professor at the University of Alberta, the University of Hawaii, and
Central Washington University.
Dr. O’Brien’s business experience included working in the Marketing Management
Program of the IBM Corporation, as well as serving as a financial analyst for the General
Electric Company. He is a graduate of General Electric’s Financial Management Program.
He also served as an information systems consultant to several banks and computer services firms.
Jim’s research interests were in developing and testing basic conceptual frameworks used in information systems
development and management. He wrote eight books, including several that have been published in multiple editions, as
well as in Chinese, Dutch, French, Japanese, and Spanish translations. He also contributed to the field of information
systems through the publication of many articles in business and academic journals, as well as through his participation
in academic and industry associations in the field of information systems.
Information
Systems
Development
Information
&
Technology
Security
Infrastructure
Challenges
Development Information
& Security Technology
Challenges Infrastructure
Developing and implementing business/ Includes major concepts, developments, and
IT strategies and systems using several managerial issues involved in computer hardware,
strategic planning and application software, telecommunications networks, cloud
development approaches (Chapter 10). computing, data resource management technologies,
The challenges of business/IT data warehousing, data mining, 3D printing and
technologies and strategies, including other technologies (Chapters 7, 8, and 9).
security and ethical challenges and global
IT management (Chapters 11 and 12).
CASE 1
REAL WORLD
eCourier, CableCom, and bryan Cave: delivering value through
business intelligenCe
V isitors to the eCourier Web site are greeted with the words “How happy are you? Take the eCourier happy test to-
day!” Those words and the playful purple Web site represent the company’s customer satisfaction focus. And the
company achieves that happiness through its focus on operational business intelligence.
Business intelligence is moving out of the ivory tower of specialized analysts and is being brought to the front lines.
Real World Cases In the case of eCourier, whose couriers carry 2,000 packages around London each day, operational business intelligence
allows the company to keep real-time tabs on customer satisfaction. “This is a crucial differentiator in London’s
competitive same-day courier market, where clients are far more likely to take their business elsewhere than they are to
Each chapter has minimum Six report a problem to their current courier,” says the company’s chief technology officer and cofounder Jay Bregman.
Real World Cases and number Just one online directory, London Online, shows about 350 listings for courier services.
Before implementing operational business intelligence, eCourier
of case examples that illustrates sought to define IT as a crucial differentiator. Cofounders Tom Allason, FIGURE 1.1
how prominent businesses and eCourier’s CEO, and Bregman ditched the idea of phone dispatchers and
instead gave their couriers GPS-enabled handhelds so that couriers can be
organizations have attempted tracked and orders can be communicated electronically. They also focused
to implement the theoretical on making online booking easy and rewarding, and much was invested in
user-friendly applications: Customers can track online exactly where their
concepts students have just courier is, eliminating the package delivery guesswork.
Today, 95 percent of deliveries are booked online; this means that
learned. eCourier needs a much smaller staff for monitoring, tracking, and placing
orders, which in turn makes the company more scalable. Bregman says
this is notable in a market where many courier companies use telephone
dispatchers and guesswork about package whereabouts. Booking and
tracking automation—although innovative—did not complete the
customer happiness puzzle. Without leading-edge business intelligence, Access to quality information about customers helps
account managers could miss the same issues that plagued other courier companies succeed at delivering value to shareholders.
services—late deliveries, surly couriers, or even an unnoticed ramp-up in Source: © Digital Vision/Alamy.
deliveries. “We’re only one delivery away from someone deciding to use
a different delivery firm,” says Bregman.
So eCourier started to use software from a company called SeeWhy to try to generate customer data more quickly. “What’s
unique about SeeWhy,” says Bregman, “is its ability to report what’s happening with customers instantly.” When a new booking
enters eCourier’s database, the information is duplicated and saved into a repository within SeeWhy. The software then interprets the
data by comparing it with previous information and trends, and if it notices an anomaly, it takes action. If a customer typically places
an eCourier order every Thursday morning between 9:30 and 10:00 and there’s been no contact during that time, eCourier’s CRM
team will receive an alert shortly after 10:00 that includes the client’s history and the number of bookings it typically places in a day.
Bregman says there’s a fair amount of fine-tuning to get the metrics right. For example, the company had to tweak the system to
recognize expected shifts in activity so that it doesn’t send a slew of alerts once the after-Christmas drop in business occurs. Getting
that perfect balance of when to send alerts and how best to optimize the system is an ongoing process, he says.
The SeeWhy software is designed to establish a “normal” client booking pattern from the first use, which is deepened with
each subsequent booking. A sharp drop-off in bookings, an increase in bookings, or a change in dormant account activity generates
an alert that is sent to that client’s account manager; the manager uses the opportunity to problem-solve or, in the case of increased
activity, upsell to overnight or international services. “These capabilities have provided a big payoff,” says Bregman. He also
believes the system saves his company the expense of having to hire people to monitor “who’s happy and who’s not—we’re able
to do a lot more on our customer team with a lot less.”
Other approaches to judging customer dissatisfaction exist. Cablecom, a Swiss telecom company, used SPSS’s statistical
software to mine customer data, primarily from trouble tickets—such as the average duration of a ticket, or how many tickets
had been opened for a customer over a specific time period—to build a model that could flag when a customer was at a high risk
of leaving. “But the model proved to be only about 70 percent accurate,” says Federico Cesconi, director of customer insight and
retention.
So Cesconi used SPSS’s Dimensions survey research software to create an online customer survey, and from that he was able
to determine that customer dissatisfaction usually begins around the ninth month of service, with the bulk of the customer losses
occurring between months 12 and 14. Cesconi then created another survey that he now offers to customers in the seventh
month of service, which includes an area where they can type in specific complaints and problems. “Cablecom calls customers
within 24 hours of completing the survey,” says Cesconi. “The two approaches together provide the best view of customers ready
to bolt, and the best chance at retaining them.”
In 2002, global law firm Bryan Cave faced the million-dollar question: How do you make the most money with your resources
while simultaneously delivering the highest customer value? The problem was pressing. Clients of the firm, which now has 800
lawyers in 15 offices worldwide, were demanding alternatives to the traditional hourly fee structure. They wanted new models,
such as fixed pricing and pricing that was adjusted during a project.
But making money from these new billing strategies required the complicated balance of staffing and pricing.
Projects weighted too heavily with a law partner’s time would be expensive (for the law firm) and not optimized for profit.
Devoting too little of a partner’s time would leave clients feeling undervalued. Optimizing profit and perceived value had to be
achieved by spreading partners’ time throughout a number of cases and balancing the remaining resources needed for a case with
the less-expensive fees of associates and paralegals. “Clients are most likely to stay with you if you deliver just the right mix,” says
Bryan Cave’s CIO John Alber.
The law firm’s traditional method of analyzing collected fees and profit used a spreadsheet that was complicated and took too long.
“Spreadsheets provide a level of detail that can be valuable for analysts,” says Alber, “but the information in a spreadsheet can be
confusing and difficult to work with.” Alber says he decided it was better to build an easy-to-understand interface using business
intelligence tools. Although the company will not release specific figures, both profitability and hours leveraged—the hours worked by
equity partners and all other fee earners at the firm—have increased substantially since the company implemented its first BI tool in
2004, according to Alber.
The tools also allow lawyers to track budgets in real time so that they can make adjustments quickly. The BI tools even provide
a diversity dashboard, which tracks the hourly mix of women and minorities working on the firm’s cases, a feature the company
will license to Redwood Analytics for sale to other law firms. The firm developed this diversity tool to bring transparency to the
diversity reporting process required by many clients. In other words, the tools provide Bryan Cave with a method of customizing
its fees and helping clients better understand what they get for their money.
As an illustration, Alber points to the customized pricing one lawyer gave to his real estate client. “Developers think in terms of
Use Your Brain
square feet,” says Alber, “and this client couldn’t understand why legal fees for a 400,000-square-foot building might be the same
as for a 4,000-square-foot building, though it required the same amount of the lawyer’s time.” So the lawyer used the pricing and Traditional case study questions
staffing modeling tools and historical analysis tools to determine whether it made sense for the law firm to charge clients based on
the size of their projects. promote and provide
He found that while there was risk of underpricing large buildings, the deal volume in small buildings offset that risk for the law opportunity for critical thinking
firm. The result made per-square-foot pricing possible.
“It may be possible that someone with enough willpower or manpower could do that using traditional analysis,” says Alber, and classroom discussion.
“but this lawyer had the information right at his fingertips.” Business intelligence enables “us to be in touch with clients and shift
things around in response to what customers are asking,” says Alber. Adopting new and improved project management, pricing,
and customer service capabilities required planning, appropriate pacing, and user buy-in.
“In today’s environment, you can’t do value innovation without being in touch with the economics of your business, without
really understanding where you make money and where you don’t, and that’s what business intelligence tools do,” says Alber.
“Our goal,” he says, “is to build the best long-term relationships in the world.”
Source: Adapted from Diann Daniel, “Delivering Customer Happiness Through Operational Business Intelligence,” CIO Magazine, December 6, 2007; Diann Daniel,
“How a Global Law Firm Used Business Intelligence to Fix Customer Billing Woes,” CIO Magazine, January 8, 2008; and Mary Weier, “Dear Customer: Please Don’t
Leave,” InformationWeek, June 18, 2007.
Chapter two
SECTION I
by the peripheral devices which are part of modern computer systems. In Section II, we will discuss Computer is a system of
the software and its major types that one needs to run the computer hardware more efficiently. We input, processing, output, FuNdamENTalS OF STraTEgIC advaNTagE
will also be discussing the characteristics and purpose of software with theirLOapplications. storage and control
L earning LO 11-1 Understand the ethical and societal
Read the Real World Case regarding
11-3 Define the concepts components.
management of IT assets. We can learn a different
of cyber security and
lot aboutcryptography
how
dimensions. systems.
O bjectives
different organizations keep track of their IT assets and manage their lifecycle from this case. See
LO 11-2 Discuss the ethical responsibility in LO 11-4 Explain the concept of Blockchain and its STraTEgIC IT
Figure 7.1.
After studying this business & IT including computer crime. impact on business. LO 2-1
Technology is no longer an afterthought in forming business strategy, but the actual cause and driver.
chapter, you should Understand the basic com-
be able to: petitive strategies and how This chapter will show you that it is important to view information systems as more than a set
CASE 1 to use information technol- of technologies that support efficient business operations, workgroup and enterprise collaboration,
REAL WORLDREAL WORLD
ogies to confront the com- or effective business decision making. Information technology can change the way businesses
petitive forces faced by a
compete. You should also view information systems strategically, that is, as vital competitive
astraZeneCa, Unitedhealth, and Others: it asset business.
networks, as a means of organizational renewal, and as a necessary investment in technologies;
ManageMent—dO YOU KnOw what YOU’ve such technologies help a company adopt strategies and business processes that enable it to
CASE 1
using more than 90,000 hardware and software assets ranging
from notebooks to SAP and Oracle enterprise applications and da-
tabases.
t h r i
With software vendors becoming more aggressive on audits as
exas ealth esourCes and ntel
sales of new products are generally weak, and with greater internal
:e , it,
thiCs C
and omplianCe
collaboration requiring a more consistent set of tools to simplify
T he IT staff
processes
company
at Texas
and
realized And
ments: It also has
Health Resources
maintenance,
cal functionality. a few
to meet
it needs
the $31
yearstoago
Inc.billion
deliver
must deliver
more
that
more than techni-
pharmaceuticals
than the business
Microsoft’s Systemsrequire-FIGURE 7.1 Companies are increasingly focusing
Management Server wasthesimply
organization’s
overmatchedethical standards.
for the job of on managing the myriad of platforms,
To thatthe
managing end, its systems
global mustcomplex
enterprise’s help ensure basethat
of ITTexas Health complies
assets. hardware, and software that make up
withSolaws and regulations.
Microsoft recommended the asset management products their IT infrastructures.
Andbythey
offered also have
a French companyto promote the right
called PS’Soft, behaviors
which and prevent
is a subsidiary or
of Source: © Royalty Free/Corbis.
flag undesirable
BDNA ones,provider
Corp., a top says Michael
of IT Alverson, vice president
infrastructure inventoryand anddeputy
CIO at the Arlington-based nonprofit health care system. Consider the
analysis solutions. In the years that AstraZeneca has been steadily getting its IT assets under control, PS’Soft has distinguished
challenge
itself of handling
like few patients’according
other IT vendors, medical records. Even though
to AstraZeneca Global the
IT federal
Asset lead Bernard Warrington.
Health
“In allInsurance
my years,Portability and Accountability
our engagement with PS’Soft was Actonemandates
of the firstthat
and only times we had an IT vendor show such willingness
agencies
to work as keep those
a true records
partner private,
and really caregivers
try to solve still
our need to access
problems them—
with us,” Warrington says. Referring to PS’Soft’s Julian Moreau,
when appropriate.
So the organization’s electronic health records system “gives doctors and
nurses who are caring directly for patients quick access when they use the
right authentication,” Alverson says.
But additional authentication is required to get records for patients who
aren’t under the provider’s immediate care. The system records who gets
access to what, allowing officials to audit and review cases to ensure there’s FIGURE 11.1 The pervasive use of informa-
MIS-11e_07.indd no inappropriate access.
341 tion technology in organiza- 11/22/2018 10:09:09 AM
“The IT staff holds itself to similar ethical standards, too,” Alverson says. tions and society presents
The department has policies that prohibit taking gifts and endorsing vendors, individuals with new ethical
to help guarantee that workers make procurement decisions based only on challenges and dilemmas.
quality and needs. Source: © Punchstock.
And when there’s any question—such as when a vendor proposes a deep discount if Texas Health agrees to be an early
adopter of new technology—IT leaders can turn to the systemwide Business and Ethics Council for guidance.
“If we really want everyone to subscribe to the idea that working at Texas Health is special, then we have to have people
actively believe in doing the right thing,” Alverson says.
Companies are increasingly looking at their ethics policies and articulating specific values that address a range of issues, from
community commitment to environmental sustainability, which employees can use to guide their work. The need to comply with federal
laws and regulations drives some of this, while consumer expectations, employee demands and economic pressures also play a part.
Information technology consultant Dena L. Smith lays out a hypothetical dilemma: Should an IT department hire a more expensive
vendor because the vendor shares its own company’s ethics standards, or should it go with a lower-cost provider that doesn’t?
Companies with established ethical standards that guide how they conduct business frequently confront this kind of question,
Smith says, but it’s a particularly tough question today, given the recession. With IT departments forced to cut budgets and staff,
CIOs will find it difficult to allocate dollars for applications that promote corporate ethics.
MIS-11e_Prelims.indd 12
MIS-11e_11.indd 629 11/20/2018 10:46:55 AM
11/27/2018 1:11:05 PM
... and Beyond
728 Management Information Systems
SECTION II
MaNagINg glOBal IT
ThE INTErNaTIONal dIMENSION
LO 12-4
Whether they are in Berlin or Bombay, Kuala Lumpur or Kansas, San Francisco or Seoul, compa-
Discuss the challenges of
nies around the globe are developing new models to operate competitively in a digital economy. These
managing IT at global level.
models are structured, yet agile; global, yet local; and they concentrate on maximizing the risk-ad-
justed return from both knowledge and technology assets.
International dimensions have become a vital part of managing a business enterprise in the
Go Global with IT inter-networked global economies and markets of today. Whether you become a manager in a
large corporation or the owner of a small business, you will be affected by international business
developments and deal in some way with people, products, or services whose origin is not your
home country.
This text closes with Chapter 12, an in-depth Read the Real World Case 2. We can learn a lot about the challenges facing senior IT executives
who operate in a globalized world. See Figure 12.11.
look at IT across borders.
CASE 2
REAL WORLD
Planning and Developing Business/IT Solutions 583
578 Management Information Systems CadBury, Forrester researCh, a.t. Kearney, and others:
Based on the BizRules engine, the internal IT team has also built a customized underwriting system. it l F n C g
eaders The fact that aCethe ew hallenges in a w
loBalized orld
company has set up a project management office comprising senior officials from all departments of the company, to
design tHinKing
ensure that all projects are completed in time has enabled faster adoption of technology. Now, the company plans to
“Design Thinking”—a
design ethos.
focus on delivering
OneIt isITan project
methodology
innovation
services on
that has
that
thatprovided
theimbues
is powered
mobilethe full spectrum
as part
by a thorough
maximum
of its customer of innovation
benefitsunderstanding,
to the company
self-service
through
W
activities
models.with a human-centered
has been direct theobservation,
Health
him global
ayne Shurts had no experience overseeing IT operations in
emerging markets when Cadbury CEO Todd Stitzer appointed
Claims ofCIO what
Management
the summer of 2009. The geographic parameters of
people want System and need The
(CAPS). in their
project liveswas and what they
conceived like or
to build dislike scalable
a robust, about the webway based particular
integrated products
systemare
Shurts’s thatmade,
responsibilities
will serveatasthe a sweets maker—with a presence every-
packaged, marketed, sold, and supported. where from Pakistan to Palau—multiplied overnight. The former CIO
single application to be used by all third parties.
Design thinking is a lineal descendant of the tradition. Put simply, it is a discipline that uses the designer’s sensibility
The system would be accessed by the entire ecosystem of health insurance domain nationwide comprising payers most of his time globe-trotting from his for North America now spends
and methods to match people’s needs with what is technologically feasible and what a viable business homestrategy can
base in Parsippany, New Jersey, to London headquarters to oper-
convert into (insurance
customer companies),
value and providers (hospitals and clinics), TPA and branch offices.
market opportunity. ations on six continents.
The project
Design thinking has much was to innovative
offer a businessin manyworld respects.
in which It was most a pure
managementSOA based ideas health
and best claims solution;
practicesShurts are itfreely
also was
had to theshift
first
his thinking. The $7.8 billion company has
available successful
to be copied usage andof exploited.
ACORD (international Leaders now insurance
look to data model standard)
innovation as a principal for health
sourceinsurance made claim
of differentiation system
a concerted andineffort
India.toItexpand in the developing world, giving it
competitive provided
advantage; pure ACORD they would XMLdo driven
well to integration
incorporate with thirdthinking
design party system, into allwhichphases facilitated the biggest
real-time
of the process. and most
hospital accessdispersed
to emerging markets business in the
Historically,
provide design
claims hasdecision
been treated withinas a downstream
hours instead ofstep days.initthe alsodevelopment
featured a flexible process—the claim pointbenefit confectionery
where designers,
calculation industry.
engineInbuilt fact, Cadbury’s business in rapidly developing
who haveprimarily
played no earlier role
on actuate engine. in the substantive work of innovation, come along and put a beautiful markets was a major driver in Kraft’s $19.5 billion takeover bid for the FIGURE 12.11 Emerging economies are
wrapper increasingly demanding—and
around the idea. To be sure, this approach has stimulated market 602 candy
British maker.
Management Last year, 60 Systems
Information percent of the company’s growth
The project has been implemented with best of breedgrowth
Planning design inpatterns
and Developing many areas by usingby making
Business/IT spring new
and products
Solutions hibernate
547emerging and
framework. getting—IT executives’
technologies aesthetically attractive andinternational
therefore more desirable to consumers or byasenhancing came from markets.
The solution is compliant with health insurance standards such HIPAA andbrand ACORD. perception
It
“That century, also has inbuilt
means that my world as CIO does not solely revolve around attention.
through smart, evocative advertising and communication strategies. During the latter half of the twentieth Source: © Getty Images.
fraud rules for alerting blacklisted customers and hospitals. The system is completely integrated at the back
big economies of end.America,
North The Europe, Australia and New Zealand,”
Bristow
design became Helicopters:
an increasingly tecHnology- valuable competitive supported
asset in, for example,swot, and
the MucH
consumer More
electronics, automotive, and Redefine Core Business New Business
claims solution is integrated in real-time with sms, e-mail and document management explains engine Shurts. for customer and
Levels of Change
consumer packaged goods industries. But in most others, it remained a late-stage add-on. Initiatives
hospital communication at various stages inofmake
claims “Emerging markets are not afterthoughts to me. They demand—and get—a lot of my attention.” Shurts isn’t alone. In
When Bristow Now, Helicopters
however, Ltd.
rather started
thanlosing asking market
designers shareto the anprocessing.
1990s, executives
already moved to
developed ideaimprove business to
more attractive consumers,
The project hasto reduced the turnaround time industries ranging from consumer
Best Practices goods and agriculture to banking and electronics, multinationals are investing more in the
processes across the
companies areRedhill,
asking England-based
them create ideas company. “We needed
that better meet for tocashless
changeneeds
consumers’ claims
facilities
anddecisions
and
desires. from
maintenance 8 hoursrole
The former to 3 is hours.
tactical, Providing
Middle East, Asia, Eastern Europe, Africa, and South America. Now imagine
Process
developing a single system that manages reinsurance
processes, andimprove
results thelimited
anywhere
in efficiencies
and value of
everywhere the staff,
creation; theimprove
access, it allows
latter the real
interface
is strategic, and between
time information
leads to dramatic sales forand clients,”
analytics
new formsthatsays John the fraudulent claims. It
ofreduces
value. Reengineering
business processes for numerous offices around the world—offices whose staffs speak different languages, are in different time
Cloggie, technical alsodirector
allows at thethe European
executives business
to track unit of Houston-based
per customer wise claims thatBristow helps inGroup up-sellingInc., thewhich provides
portfolio
zones, of
andproducts.
just might beBest
stuckPractices
in their ways as to how they manage their business. It’s a challenge that could overwhelm you if
Source: Adapted from various articles of Tim Brown at http://hbr.org/2008/06/design-thinking/ar/1 Model Improve
helicopter services toThe theclaims
oil andmanagement
gas industry. system also features hospital credential ratings to help take right
triedcost decisions
it all atand
Expand Your Knowledge
you to tackle once instead of breaking it into small pieces.
A key goal of communicates
this reengineering Efficiency
with effort
the customerwas to at cutallseveral
stages million
of the claimsdollars from the
lifecycle operating
as all processesbudget of Bristow
are integrated at the back
“Companies are end
goingandto tap those markets as mature markets stagnate or decline,” says Bob Haas, a partner and vice president
Helicopters. The made company managed
available through the project
e-mail using
and SMS. MindGenius,
The system hasin“mind-mapping”
alsosysteMs
improved employeesoftware from East
productivity Kilbride,
withas A.T. Kearney
it auto Efficiency
who leads
allocates the the consultancy’s strategic IT practice for North America. “And CIOs are gaining more and more
Scotland-based Gael Frito-lay
Ltd. The inc.:enabled Failure it toand success developMent
claims cases to product
respective assessors. conduct a SWOT analysis (an assessment of its strengths,
responsibility for those emerging markets since IT is one of the most globally integrated corporate functions.”
weaknesses, opportunities, and threats), carve to out
focusvarious
on topprocess reengineering tasks, and delegate them to used to
Boxed-items in each chapter provide brief,
Frito-Lay created national sales teams customers such as supermarket chains, but the teams, Extended
appropriate workinggroups. Each
Source: team
Adapted
regionally, from then
found took
Dataquest issue the
nationwide high-level
dated collaboration
January 07, 2010. version of the
difficult. map and
Although createdhad
Frito-Lay its own subcategories,
rich stores of markettasks, research and Single Function Core Processes Supply Chain
Value Chain
and deadlines for its designated work segment. Sinceinbeginning theitsproject in 2004,there says wasCloggie, theway company hasmembers
in-depth examples of how c orporations
other pertinent customer information housed databases at headquarters, no easy for team
managed totofind
cutwhat they needed.
$6 million from itsFrustration
operating budget. rose, performance suffered, and sales team turnover reached 25 percent. Scope of Business Change
So MikeofMarino,
“Mind mapping, course, didn’tFrito-Lay’sdirectly vice president
create our $6 for millioncategory
savings,and but customer
it did allowdevelopment,
us to control the engaged
project while Dallas-based
it was beingNavigator Systems
delivered,” to help.
he says. Blue
“TheNavigator
speed with prisM: which“sHadow”
consultants you canenvisioned ita is
map processes BecoMing
Web-based
and capture enterprise More
knowledge pervasive
knowledge
is a huge portal
return.” that would apply IS concepts and theories.
FIGURE 10.45 The impact and the levels and scope of business change introduced by implementations of information technology.
Source: Adapted from Craig Fellenstein and Ron Wood, Exploring E-Commerce, Global E-Business and E-Societies (Upper Saddle River, NJ: Prentice
Mind combine
mapping tools has beenfor knowledge
around for centuries, management but it and collaboration,
didn’t garner much enabling
attention the team
until to better serve
psychologist Tony the
Buzan
Hall, customer
2000), p. 97.
began towhile promote Businesses
helping reduce
information increasingly
frustration
visualization accept
and the existence
turnover.
techniques in theof a “shadow”
1970s. A mind map IT culture, in which
is a diagram thatend users 728
radially
MIS-11e_12.indd install
arranges uncontrolled rogue 11/15/2018 5:29:33 PM
A business
MIS-11e_10.indd 578 model is a conceptual framework that expresses the underlying economic logic and
development of business/IT
strategies, necessarily
architectures
11:57:41 AM
feel the same way. Several factors contributed to the initial resistance. For starters, there was a fear of the
11/16/2018 11:57:41 AM
and applications.unknown. There were questions like “How stable is this new technology?” and “What do you mean I will be sharing
you truly worldly.
system that prove how a business can deliver value to customers at an appropriate cost and make
money. A business model answers vital questions about the fundamental components of a business, Business Model my resources with other servers?” Potential users thought the new technology might slow them down.
is a
such as: Who are our customers? What do our customers value? How much will it cost to deliver conceptual framework To help users get over their fears, Stefanakis focused on giving people the information they needed, while
that value to our customers? How do we make money in this business? that expresses explaining the advantages of the new technology. Among them: great response time for business applications and
the
underlying economic
A business model specifies what value to offer customers, which customers should receive this logic and systembaked-in that
disaster recovery. If anything does fail, restoration is just a quickly restored image away.
value, which products and services will be supplied, and what the price will be. It also specifies Stefanakis and his staff kept “talking up” the technology and its benefits. “Virtualization came up in every budget,
proves how a business
how the business will organize and operate to have the capability to provide this value and sustain strategy and development meeting we had,” he recalls. “We made sure the information was conveyed to the proper
can deliver value to
any advantage from providing this value to its customers. Figure 10.7 outlines more specific customers at anpeople so that everyone in our department knew that virtualization was coming.”
questions about the components of a business that all business models must answer. Figure 10.8 appropriate cost and STM has been staging production servers in its virtual environment since December 2005. The first virtual machine
make money. was staged in STM’s testing center as a means of quickly recovering a downed production server. Once the first few
lists questions that illustrate the essential components of e-business models.
Technologies
l Being modular in nature, grids are more scalable and robust
l Faster solution to large and complex problems
l Grids can be managed using grid software
l Processing jobs can be executed in parallel processing mode
mathematical methods
who covers
statistical and l Modern
data the
“PanopticonBI
and issue—along
data is the next
platforms
treemaps will
have
with most
continue
greatly
important resource
a drop-down
to grow
enhanced as
menu offering
they
our help
users’
cloud.
that businesses
organizations
ability
of data about customers, suppliers, products and business partners is key to success.
deliver
to
“We
have built.
detailed research.
visualize to
have
meet
quality
MIS-11e_07.indd
the new
saved
transaction
Effective
experience
traditional
credit
store,
significantly
require-
352
markets
cost
management
intervention
observe,
toand
channels. ourFor
Businesses
on
savingsidentify the
customers,”
example,
utilize analytics—
amount
are significant
and
Visualization
we
understand
adds Kumar.
booking a
spend
for online the
every
versus
Further,
reservation over
month
more on real-time basis without any us
environment
thethe
IT. Cloud empowered
deployment has enabled the firm to
and communication. One can easily find out the health of a device in terms of repair/
human 11/22/2018 10:09:10 AM
itments
was an forimportant
that accessibility,
are able to agility and
contributing
manage deeper
thefactor toanalytical
data better us winning insights.
the Euromoney
are succeeding. streamline
These are theprocesses
award,” Internet
says Lee
companies and
costs monitor
about
McGinty,
that
replacement.
projects
90
head
are setting percent
IoT of moreless effectively.
European
is about for the airlinecomputing/smart
empowering than booking the devices to collect data and take decisions. Increase
to understand current
l Portfolio & Index
Enterprise-friendly Strategy
buying at JPMorgan.
and selling models have become more critical to same
successful reservation
deploy- over the telephone. The banking industry has also Attract
new rules for the industry. Amazon outperformed 100 years old Barnes and Noble by the power Best example of such devices includes self-driving cars, whose sensors detect Customer
Newthe objectsLoyalty
in their
scenarios and predict
future. ments.of technology
Source: Adapted from Case Study: and effective
JPMorgan CreditMap,management ofMarch
www.panopticon.com, data. Data is a collection found
2008. of rawsignificant
bankingwill
facts
passage andand
transaction
costmicrowaves,
figures,savings viawhich the Internet. A typical
automatically cooks onlineTopics on Business Intelligence, Busi-
Source: Adapted from July 7, 2015 issue of DqIndia.com: http://www.dqindia.com/how-the-cloud-is-raining-cost-savings-for-a-travel-firm/
the food, etc. Customers
and
Retention
while information is a processed data with some meaning. What businesses do with(payments,
ever balance inquiry, check payment) is
When you consider some of these findings, it becomes easy to see that BI is rapidly
growing needs of data and how one can take advantage of this to get estimated
the mainstay for business decision making in the modern organization. Before long,
becoming
more insights
its
to cost
it willapplications
evolve
bricks-and-mortar
toanywhere
selling-offrom IoT50 percent to 95 percent less than
counterpart. Generally speaking, anytime
ness Analytics and Data Visualization
Data buying behaviours to attract more customers? Business analytics
Visualization is a solution to has
this.both advantages and disadvantages. Cloud-based providers generally
Business Analytics
into a competitive
As with
Data
necessity for many industries.
all concepts
visualization is theinpresentation
business-related
of datatechnologies,
in a pictorialbusiness
Cloud-based
emphasize
intelligence
or graphical format. has
model
you
advantages,
Data evolved
based
Internet
convert
such
identified
from
visualization
version, the
of Things
a business
as cost,
process
transaction
can
speed,costs
or recognized
connect
from a manual
scalability,
digitally
associated
a number
one to of
productivity,
canwith
a software-
be controlled
that process fromhave been covered in detail with appli-
devices to the Internet. Any device that can be
performance and ease
can anywhere.
FIGURE One
9.7 ofHow
of the key challenges
companies of business value
are deriving
Data visualization is
(BA) refers to the skills,
technologies,
Dresner’s original
is a powerful
decision makers
approach
data definition
referredtoto
explorationfocusing
understand
technique
as businessthe data and
analytics.
ontoconcepts
be used and
the hidden
Business patterns
analytics (BA)using
deployment,
methodsmakers
by decision to a more
significant
refersvisual
to the
while
risks.
tools. Data
skills,
they IoT
action-oriented
at all be
levels. It enables
expected
devices
is
downplay reliable
to go down
primarythat
Organizations
visualization
technologies,
Other must
or
are
in
sources
and
hide
going
account
robust
risks.
by the order
the presentation
a pictorial
Internet
Security,
tographical
for
or
of business be connected
these
connectivity.
control
andinclude
value otherwith
and
of several magnitudes.
of data legislative
each other
risks.
attracting new
cation examples.
With passage
issues ofaretime,
among
will require high speed
fromand
more theirmore
e-business
applications.
and e-commerce
number
Internet to capture
of
met. For examples, interests are automatically paid, when the financial instrument meets the
certain deadline.
2. Governance: Blockchain technology can be used to bring transparency in the governance by
sharing all information on public blockchains. Even the company’s governance can become
fully transparent by sharing the digital assets, equity or critical decisions at board level on
694 ManagementBlockchain. Information Systems
3. Warranty or Insurance Claims: Getting claims is always an expensive and time consuming
Banks are also takingthe
exercise. Once thesmart contracts
initiative to remind arecustomers
implemented usingtheir
to update Blockchain,
anti-virus itsoftware
will make andthe process
browser application, so that
their PCsofdoclaim simple any
not support andbackfaster.
doorOnceentries all and
formalities
Spywareare completed
installations. with
They respect
have to verification
also initiated a 24-hour andcustomer response
team where validation,
customers payouts can be
can report anyautomatic.
form of identity The theft
complete
or accountprocess can be managed using QR-code,
discrepancies.
Presently,whichmany mayleading contain
bankscomplete
have appointedinformationagencies about
to carrythe out
product/service.
a 27X7 monitoring of the Internet, activities on the bank’s
... of Tomorrow
Web site and also the profile of the users and nature of their transactions at any given time. In addition, most banks have been
4. Shares/Debentures/Derivatives: Smart contracts can be created to manage all these tradable
partnering with law and enforcement agencies and organizations such as CERT-IN to shutdown spoofed sites quickly.
ICICI,financial
HDFC, Bank instruments.
of India and One mayother
a few again use the
public as well QR-code
as private to banks
store all
have the information
started implementingaboutdual the factor or second
instrument and
factor authentication, keepSSL
128-bit track of itsocket
(secure in a more secured manner
layer) encryption, scrambled through Blockchain.
keyboard, Using smart
adding multiple layers of security which
contracts trading of these financial
helps a user identify a fake Web site and not divulge his credentials. instruments is possible without any hassle.
5. Document/Identity
Axis Bank is in the process of Verification:
implementing Using
second thefactor
Blockchain, the verification
authentication to enhanceofthe online
securityidentity
features of the online
banking will gateway.
be much Besides,
easieralmost
and all banks
faster. Intoday send out
Blockchain the post transaction
online identityalerts
will to becustomers
maintained on intheir mobile and Email id, so
a decen-
that the tralized
customerdistributed
response time is quickwhich
network, and any illegal
will keeptransactions
the data more can be reported
secure andquickly.
incorruptible.
Another key development is that Indian banks have appointed Chief Information Security Officers (CISOs) to manage all the
6. concerns
security Internet of Things
within the bank.(IoT):
The CISO IoT leadsis aa network
team dedicated of smartonly devices,
to securitywhich collects,
and functions store and
separately from ex-the central IT team.
changetolot
According of data. Blockchain
ReadiMinds, more thantechnology
57 percent along of thewith banks smart contracts
still do not have willa help in maintaining
dedicated budget for online security,
choosingthe safe to
instead IoT network
include onlinebysecurity
guarding against
as part hackers.
of their overall IT budget. However, the appointing of CISOs is slated to reverse
this trend going forward.
7. Protection of Intellectual Property: As Blockchain offers the facility of Security archiving andtheEthical
docu-Challenges 681
Though banks have
mentations been
of all the this
kinds, pioneers
will helpin embracing
in protecting the latest of technologies
the intellectual propertyand have
in muchconstantly
easier been
and scaling up their
security procedures, vulnerability to hackers remains. Threats are evolving and becoming more dynamic with the increasing
BlOCkChaIN safe manner. - Smart NEW
ThE contracts can protect the
SECurEd IP or copyright material and eliminating the risk
TEChNOlOgy
number of customer touch points and delivery mechanisms.
of file coping and redistribution.
Hence, phishing can no longer be handled by a technology solution alone. Banks have to put in place the LO right11-4
blend of
Blockchain
8. Social
technology,
is a Media:
policy
new technological
Numbers
guidelines, and user of innovation,
social sitestouse
awareness
which
keep thepaceredefines
personal
with the
the
data ofway we
its users
increasing
transact
withoutand
sophistication their weknowl-
with which fraudsters operate.of
Explain the concept
exchange edge. businessUsing information.
Blockchain, Successful
user is able business transactions
to protect its personal needdatato be or fast,
mayprecise,
share assecureper his/her Blockchain and its impact
and accessible
Source:
will. to all
Adapted from stakeholders
Dataquest, of that
Sept. 30–Oct.14, 2008,transaction.
Vol.XXVI, No.19.Blockchain is a technological solution that
on business.
provides a way to execute such business transactions in a much better manner. It combines the
Case9.of
power
LandQuestions
Study Title Management: Blockchain is a smart secure ledger and land title can be managed
Internet with the security of cryptography to offer much faster, safer way to store and Blockchain is a
in more safer and secured manner using this technology. Numbers of countries have already distributed, tamperproof
verify
1. Howbusiness information.
different financial institutions can protect their systems from phishing and other related security threats?
started the projects to manage land records using Blockchain. digital ledger.
Blockchain technology was originally developed to transact and manage digital currency
2. What are the other security threats these banks have, when they move their systems to online space?
Bitcoin. Blockchain is also being compared with the technology & concept used by Wikipedia.
3. Blockchain
But, Is phishing prevalent
can support only in India?range
a wide Comment.
BloCkChain - ofa application
nEw solution like supplyto chain tracking, digital record
unEMployMEnt in india
4. Majority ofpeer-to-peer
management, phishing threats payments
mentioned etc. A Blockchain
in the case above are is from
a record of transactions
the banking sector. Are theselike in threats prevalent in other
In order
industries
accounting to further digitally strengthen
also?Blockchain is more secured way
ledger. the ofIndian
storing economy,
information Finance andMinister
is designed Arun in Jaitley
such in his budget speech has
a way thatmentioned
it makesthat technologies
impossible to add, like artificial
update intelligence,
or delete informationmachine learning,
without beingBlockchain
detected by technology and the like will
establish
other users of thea block.
countryBlockchain
level program to research new
is a decentralized developments
system, in this field.
where verification Also, for ushering in digital technology,
of information/
the government
transaction happens on of India willoftake
consensus proactive
multiple users.steps towards exploring
Information stored in the Blockchain
Blockchain technology.
is shared
CASE 6
REAL WORLD
Coinlancer
and continuously is one such
reconciled. Theplatform
databasefor the clients as
of Blockchain wellstored
is not as thein freelancers
any singleinlocation,
Blockchain it is technology. Coinlancer has
T
though
sectors.
server based
he used
idea of
the clients
Thewhere
web, idea of
incryptocurrency
multiple
the freelancing
sectors
are distributed.
Wikipediawill
and through
Blockchain
Wikipedia’s
surely leadhas
management
investments.
technology
to make
complete
Fororiginally
was
digital backbone
this a
implementing
turning
access
released
is highly its
point
to the
to public
protected the and
world
in India.
central
policies
in 2009,
centralized
Blockchain technology can be
server,
and various
almost schemes in India,
an entire Cryptography
and its control rests with the owners. Whereas, the digital backbone of Blockchain is totallydigital
decade ago. In has
Coinlancer less adopted
than ten years,such Bitcoin was by
technique able to become an
considering the incredibly
prioritized powerful
needs and
for popular
making servicescurrency.
available through
Today,digitisation.
it is not only Coinlancer
about the “cryptocurrency” anymorewhere – the underlying technology, knowncan as Blockchain, offers a
distributed and its control is not iswith oneany such
single platform big entities,
person or organization. firms, etc.
In Blockchain every enable
node safer, faster and cheaper
much transactions
more flexible solution
of theBlockchain
chain is technology
Thede-facto
digitally.than
empowered
use of Blockchain has
just atransactions
Allupdate
to the
allowed
currency thatare
the records
companies
will surely help to
allows for transactions
completed
independently
thestart developing
country
in aand
generate
to be executed
transparent
the most
applications
more jobs
manner.
thatpopular
take
for
online.
record of peer-to-peer
advantage
freelancing. Job creation is an integral
A new section is added on Block Chain and
becomes the official record.
Cryptography in Chapter 11.
data distribution and offer better versatility and security over existing database systems. Even companies in the healthcare
focus area of the government and acceptance of Blockchain is the first step towards it. To realise the benefits at the
sector have identified the potential role that Blockchain application can play in their facilities, boosting efficiency,
how itindustry
improving Works? level, Coinlancer and its competitors, constantly keep exploring business opportunities to improve their
security, easing transactions, engaging patients and improving other aspects essential to their success.
In business associatesworld
this fast-changing and subsidiaries.
of technology, a massive onrush towards artificial intelligence, automation, as well as
In Blockchain the data is gathered and stored into blocks and then chain those together using
multiple digital transformation initiatives is bringing a big shift to the world of work, with considerable implications for
secured cryptography.
Source:
workforce skills. For example, Alice sells her car to Bill. The transaction is recorded and
Feb 12, 2018: http://www.dqindia.com/blockchain-new-solution-unemployment-india/
shared overManagement
Reports
658 the other
suggest thatcomputers
about half in
Information of the Blockchain
all work
Systems activities network.
globally haveOn thethetechnical
network,potential
the record
to beisautomated by adapting
combined with other transactions
currently demonstrated technologies.into While a block
some and
skills the transaction
are likely to become is time-stamped.
redundant faster Once
thantheyou would have probably
block
thoughtis complete,
and someitnew is also time-stamped.
skills A blockDealing
will rise in demand. will consist of many
with such transactions
transitions arranged
is certainly in a to be a cakewalk for
not going
sequential manner. Thetocompleted block is sent out new
to the network, where itthe
gets appended to the
businesses.
chain.Utilizing
SECTION II
They need
If the other
invest heavily
participants
cutting-edge
in either
of thetonetwork
technology
hiring talents
also sendsincrease
drive productivity,
or up-skilling
their completed
efficiency blocks
workforce.
and spur at innovation
the same time
is the number one business
than the blocks
imperative are chainedaround
for corporations using the the time-stamped
world. As a result, data.
theOnce the blockare
organizations is not
chained, it needs
only seeing an to be
emergence of new job roles,
subject683
secured
MIS-11e_11.indd matter the
using experts
hashaskey. well A
as hash
a set of
is hybrid professionalstechnique
a cryptographic around cyber security,the
to secure mobile appAdevelopment,
block. hash UI/UX, Big Data 11/20/2018 10:46:59 AM
CyBEr SECurITy aNd CrypTOgraphy
function takes some information from the block to create the hash key, which is a unique string of
characters. The hash from one block is added to the data in the next block to link the blocks into
a chain. This linking of blocks using hash key, prevent the information written in previous blocks
INTrOduCTION
from being LO 11-3
modified/added/deleted. Since all participants have the copy of the entire Blockchain,
it is easy for them to detect anyWith tempering.
InternetInaccess
case of any tempering,
proliferating rapidly,theonehashes
mightofthink
the tempered
that the biggest obstacle to e-commerce
Define the concepts of cy-
block will not match with the would hash of its next block.
be bandwidth. Sonot;
But it’s when
the the hashes
number match up
one problem across And
is security. the part of the problem is that the
ber security and different
MIS-11e_11.inddchain,
694 all participants are confident and
Internet wastrust the information.
developed for Since,
interoperability, Blockchain
not establish
impenetrability. trust, 11/20/2018 10:47:00 AM
cryptography systems.
they provide a simple, paperless way to create ownership of money, information and digital
As we saw in Section I, there are many significant threats to the security of information systems in
objects. It also helps in creating a network of trustworthy business partners.
business. That’s why this section is dedicated to exploring the methods that companies can use to
Blockchain is transparent and incorruptible as the network lives in a state of consensus. It is a
manage their security. Business managers and professionals alike are responsible for the security,
kind of self-auditing ecosystem and the network reconciles every transaction in a pre-defined time
quality, and performance of the business information systems in their business units. Like any other
intervals. It is totally a decentralized network, where user-to-user exchange happens. It is an
vital business assets, hardware, software, networks, and data resources need to be protected by a
orchestration of three technologies – the Internet, the Private Key Cryptography and Protocol
variety of security measures to ensure their quality and beneficial use. That’s the business value of
Governing Incentivization.
security management. 576 Management Information Systems
The private key cryptography of Blockchain provides a power ownership that fulfills
Read the Real World Case given below. We can learn a lot about why IT managers are
authentication and trust requirements. Blockchain technology is often described as the backbone
increasingly concerned about securing the user end of their networks, and how they are facing
for a transaction layer for the Internet, the foundation of the Internet of Value. In fact, the idea dESIgN ThINkINg
this challenge.
that cryptographic keys and shared ledgers can incentivize users to secure and formalize digital LO 10-5
Design Thinking is a system development methodology that provides a solution-based approach
Discuss the concept of de-
sign thinking and its impor- to problem solving. It is very useful methodology for solving complex problem that are not clearly
CASE 2
REAL WORLD
tance to a successful system defined and/or unknown. It involves the process of understanding the user needs by re-framing
development effort. the problem which can be understood by human beings, by creating number of ideas in interactive
W yoming m C ,l
ediCal enter os ngeles ounty and aymond Design a C , r
ames Thinking is a J the
:
sessions and by adopting a more practical hands-on approach in creating prototype and testing
AMsame. It is methodology that is again iterative in nature. Design Thinking is methodology that
e -p s g C
MIS-11e_11.indd 681 11/20/2018 10:46:59
methodology that
nd oint eCurity ets ompliCated provides a solution- can be applied not only in system development process, but can also be in creating new businesses
based approach to for our countries and even for the mankind.
U sers say protecting network end points is becoming more difficult as the type of endpoint devices—desktops, problem solving.
lap- Design Thinking tools and methods are borrowed from a variety of disciplines, like computer
tops, smartphones—grows, making security a complex moving target. The problem is compounded by the range of sciences, psychology, ethnography and organization learning and design. Design Thinking
what groups within corporations do on these devices, which translates into different levels of protection for classes of methods allow entrepreneurs and innovators to clearly define their hazy or wicked problems.
users on myriad devices.
Design Thinking is a methodology that describes a human-centered, iterative design process
Design Thinking “Deciding the appropriate device defense becomes the No. 1 job of endpoint security specialists,” says Jennifer
Jabbush, CISO of Carolina Advanced Digital consultancy. Depending on the device and the user’s role, end points need to
be locked down to a greater or lesser degree.
consisting of 5 steps—Empathize, Define, Ideate, Prototype and Test, as depicted in Figure 10.28.
In short, the Design Thinking process is iterative, flexible and focused on collaborative approach
For instance, Wyoming Medical Center in Casper, Wyoming, has four classifications of PCs: “open PCs in hallways for between stakeholders with an objective to bring crazy ideas to reality. Design thinking tackles
A newspecific,
concept to solve complex manager ofproblems
staff use; PCs at nursing stations; PCs in offices; and PCs on wheels that move between patient rooms and handle very
limited applications,” says Rob Pettigrew, technical systems and help desk for the center.
complex problem by:
Empathizing: Understanding the human needs involved.
and bring
With 110innovation.
Pettigrew is deploying Novell ZenWorks to 850 of the center’s 900 PCs in order to make sure each class has the right software. l
applications and 40 major medical software systems, that makes a huge matrix of machine types and restrictions to l Defining: Re-framing and defining the problem in human-centric ways.
contend with, he says.
In addition, physicians in affiliated clinics can access via SSL VPN (a kind of VPN that is accessible over Web browsers), but
l Ideating: Creating many ideas in ideation stage.
they are limited to reaching Web servers in a physician’s portal, which is protected from the hospital data network. Some Citrix l Prototyping: Adopting a hands-on approach in prototyping.
thin clients are also used to protect data from leaving the network but overall the strategy for unmanaged machines is a work
l Testing: Developing a prototype/solution to the problem.
in progress, Pettigrew says. “We’re hoping to get more help desk to deal with the external physicians,” he says.
One concern that can be addressed by endpoint security is data privacy, which is paramount for the Los Angeles County
Department of Health Services in California, says Don Zimmer, information security officer for the department. He supports about Empathize Define Ideate Prototype Test
18,000 desktops and laptops and operates under the restrictions of Health Insurance Portability and Accountability Act (HIPAA)
regulations. “That means disk encryption,” he says.
“If it’s not encrypted and there is a breach, then we have to start calling people,” he says. To avoid violating patients’ privacy
and a loss of public trust, the department encrypts the drives of all the PC end points with software from PointSec.
Equally important is keeping sensitive information off movable media that can plug into USB ports. The department uses
Safend’s USB Port Protector product that either denies access to sensitive documents or requires that they be encrypted and
password-protected before being placed on the removable device.
FIGURE 10.28 Five stages of Design Thinking
Consequently, designers need to know these five stages and need to adopt as per the need of the
project.
1. Empathize. “Empathy” being the first stage of the Design Thinking is very crucial for under-
standing the user problem from his/her perspective. It helps in keeping aside the own assumptions
and false notions about the problem by looking at the problem from the eyes of the user. This
involves doing lot of research about the problem, consulting experts, observing and gathering
facts, engaging and empathizing with people and also immersing yourself in the environment to
gain the first hand experience about the issues. At this stage, a substantial data is collected, which
can be used in the subsequent stages.
2. Define. At this stage, all the information that was collected during the Empathy stage is being
organized and analyzed. The problem statement is being defined at this stage after necessary
analysis and synthesis of information. Define stage helps in identifying the root cause while
Information Systems have become pervasive: Social Media, Mobility, Analytics and Cloud have transformed organizations
and society. One of the greatest challenges that the Professors face in teaching Management Information Systems courses
is how to keep pace in the classroom with what is happening out in the real world. Being relevant to the students and also
at the same time providing the necessary foundation for understanding the breadth, depth and complexity of Information
Systems. The Eleventh Edition of MIS book includes significant changes to the previous edition’s content that updates
and improves its coverage. Some of the key changes for this edition include the following:
1. Content is updated to suit both Management & Engineering level courses.
2. Model course outlines are proposed with chapter-wise mapping.
3. Introduced new pedagogical tools based on AACSB based Assurance of Learning Programme.
4. Each chapter has Learning Objectives that are mapped to the learning pedagogies that each school follows to achieve
course objectives. In this new edition, we have tried supporting assessment-based education, whereby each chapter
will have learning objectives, page-side definitions of important terms and chapter-end questions, quizzes, application
exercises, projects, case studies etc.
5. Latest Indian examples are added in the book across chapters. This will help to relate theory to application.
6. Fourteen new Indian and Asian case studies have been added in the current edition. Each case study has questions
that will reinforce the learning of concepts covered in the chapter and its business application.
7. New MIS applications are added in some of the chapters based on MS-Excel and MS-Access.
8. New applications using visualization tool to support decision making.
9. More detailed business analytics and CRM content based on application tools.
10. New topics on Emerging Technologies/Concepts are added or upgraded. Some of the topics that are added/updated
includes:
a. Information Systems & Ethics
b. Distributed Computing; Cloud Computing and Big Data Applications
c. Communication and Collaboration using Social Media
d. Digital Marketing
e. Business Analytics
f. Visualization Tools and Techniques
g. Social Media Analytics
h. Supply Chain Management and Supplier Relationship Management
i. Customer Relationship Management and ERP
j. Internet of Things (IoT)
k. 3D Printing
l. Blockchain Technologies
m. Artificial Intelligence
n. Cyber Security and Cryptography
o. Design Thinking
p. System Development Models
q. Smart Cities & Smart Governance
11. New business applications and small projects across functional areas of HR, Finance, Sales & Distribution, Logistics
and Manufacturing.
12. New edition has twelve chapters:
a. Chapter 1: Foundations of Information Systems in Business provides an expanded discussion on Trends in IT, Man-
agement information systems trends, IS careers and the Job market outlook.
b. Chapter 2: Competing with Information Technology has added coverage of the Strategic uses of IS/ IT and Knowl-
edge management systems.
c. Chapter 3: e-Business Systems includes new discussions on e-Business systems and Functional business systems
including a new topic on Digital marketing.
d. Chapter 4: Enterprise Business Systems includes a new discussion on the relationship between SCM, CRM, and
ERP with regard to supporting corporate strategy. There is also an expanded discussion of SCM as a top strategic
objective of modern enterprises and a new discussion of the use of digital billboards in targeted marketing.
e. Chapter 5: e-Commerce Systems provides a new section and discussion of Search engine optimization, new data
relating to top Retail web sites and Online sales volume, Digital wallets and increased coverage and discussion of
e-Commerce success factors.
f. Chapter 6: Decision Support Systems & Business Analytics includes an additional discussion with regard to the strate-
gic value of Business intelligence activities in the modern organization. New topics have been included on Data
visualization, Dashboards, Business analytics and Machine learning.
g. Chapter 7: Information Systems Infrastructure provides an expanded history of computing section and updated cov-
erage of the distributed computing. New detailed section on Cloud computing, 3D printing, In-memory com-
puting and Virtualization.
h. Chapter 8: Data Resource Management expands the discussions of Facebook, YouTube, and Strategic data manage-
ment. New topics have been added on Big data, Data warehousing and Data mining.
i. Chapter 9: Telecommunications and Networks updates the discussions of Internet2, the number of Internet users, and
Metropolitan area networks. New topic on Internet of Things is added.
j. Chapter 10: Planning and Developing Business/IT Solutions has added coverage of System implementation chal-
lenges, User resistance, and Logical versus Physical models. It has increased coverage of System development
methodologies, Design thinking, and End-user development including CASE tools.
k. Chapter 11: Security and Ethical Challenges includes a new section on Cyber terrorism, Cryptography and Block-
chain. Additionally, it provides updated coverage of Software piracy’s economic impacts, increased coverage of
HIPAA, and a significant increase in discussion of current state of Cyber law.
l. Chapter 12: Enterprise and Global Management of Information Technology provides expanded in-depth coverage of
COBIT and IT governance structures in organizations, added section on Trends in outsourcing and Off-shoring,
Smart governance, Role of data centres and Workforce agility.
Foundations of Information
Systems in Business
Each chapter contains complete pedagogical support in the form of:
Chapter highlights
Section I Real World Case 2: The New York Times and Boston Scientific:
l Chapter Highlights: Beginning of chapter Foundation Concepts: Information Systems in
Business
Two Different Ways of Innovating with Information
Technology
highlights the detailed list of topics that are The Real World of Information Systems
Real World Case 1: eCourier, Cablecom, and Bryan Cave:
Components of Information Systems
Information System Resources
just
data starve
transmissionsa
and how it relates business
from by controlling
frames. the flow of parts or raw materials essential to the manufacture
about using information technology to better understand and satisfy customer needs. of a terminals.
many
to information product.
system. For example, if we need to have eight telephone numbers for a small business, we could have
If we are to understand information systems and their functions, we first need to be clear on Figure 2.2 also illustrates that businesses
linescan counter the building—one
threats of competitive forces that they
h ow to w F in riends and i nFluenCe B usiness p eople : Frequency Division
face by implementing
eight individual
one or morehowever,
of the five
come into the for each telephone number. Using a digital
the concept of a system. In its simplest form, a system is a set of interrelated components, with a (FDM) is a webasic competitive strategies.
Opening Case Study: Each chapter and
Multiplexing multiplexer, can have one line handle all eight telephone numbers (assuming we have
Q uantiFy
clearly it r
defined boundary, isks working V
and togetheralueto achieve a common set of objectives. Using this multiplexing method in
l Cost Leadershipan
l
Strategy.
eight-channel
Becoming multiplexer).
a low-cost Multiplexers
producer work to increase
of products and the number
services of transmissions possible
in the
definition, it becomes easy to see that virtually everything you can think of is a system, and one which high-speed
system canSchaefer
be made up of other
dosystems
matter. or be part of a bigger system. We will expand on this
channelsindustry or finding
are divided into
section starts with a real world opening case
ways toincreasing
without help suppliers or customers
the number reducedata
of physical their costs or increase the costs
channels.
C IO Tim
conceptWhen
understanding
thinks
laterheinlooked
the next
the focus
words
at thesection,
words IT but
of this
used for
textbook:
insidenow, this definition
Northwestern
So, overinformation
gives
Mutual Life,
systems.
he us
feltathat
good
theyfoundation
multiple
forwrong message
sent exactly the
of slow-speed
channels.
l
competitors.
study.
Differentiation Strategy. Developing ways to differentiate a firm’s products and services
about IT’s role in meeting business goals. the last 18 months, these words are out: IT costs, internal customers, IT leaders,
from TELECOM
those of its competitors orMuNICaTIONS
reduce the differentiationSOfTwarE
advantages of competitors. This
alignment, and IT systems. These words are in: IT investments, external customers, business leaders, integration, service Time levels, Division
and IT assets. In addition, “IT and the business” is now referred to as “our business.” strategy
Multiplexing mayis allow
(TDM) a a firm to focus its products or services to give it an advantage in particular
What Is an Information System? method of multiplexing Telecommunications software is a vital component of all telecommunications networks.
“We came to realize we ourselves were building the wall. We were distinguishing ourselves from the rest of the segments or niches of a market.
which divides the time Telecommunications and network management software may reside in PCs, servers, mainframes,
We begin with a simple definition that we can expand upon later insays
company,” the Schaefer.
chapter. An “WeInformation
were somehowInformation
different.
each
l Systems (IS) Strategy. Finding new ways of doing business. This strategy may involve develop-
Innovation
terminal can use
FIGURE (IS)2.1 can be any organized combination of people, and communications processors like multiplexers and routers. Network servers and other
System We hardware,
had all thissoftware, communications
special knowledge. So this whole Anconcept
Information
ing unique
the high-speed products and services or entering unique markets or market niches. It may also
line into
networks, data resources, and policies and procedures of thatblack box, and
stores, the gaptransforms,
retrieves, in the relationship, System
and we came (IS)
very to can be any computers in a network use these programs to manage network performance. Network
involve
short making
time slots or radical changes to the business processes for producing or distributing prod-
disseminates information in an organization. People rely realize was of our
on modern own doing.”
information As part
systems
organized
to of aof broader
combination
time frames. management programs perform functions such as automatically checking client PCs for input/
people, ucts and services that are so different from the way a business has been conducted that they
hardware,
change of IT strategy and culture, Schaefer
communicate with one another using a variety of physical devices (hardware), information software, alter the fundamental has asked the top 150 output activity,
structure of assigning
an industry. priorities to data communications requests from clients and terminals,
leaders in IT to commit to being business leaders, not IT leaders. and detecting and correcting transmission errors and other network problems.
processing instructions and procedures (software), communications channels (networks), and stored communications
Symbolic, semantics, and a whole lot of fuss? Sure—if IT
data (data resources). Although today’s information systems are typically thought of as having networks, data For example, mainframe-based wide area networks frequently use telecommunications monitors
continued to behave exactly the same way resources, it alwaysand has. At
policies
something to do with computers, we have been using information Northwesternsystems Mutual, since the dawnand
a life insurance of investment company Digitalor teleprocessing
initiatives (TP) atmonitors.
KempegowDa The CICSinternational
(Customer IdentificationairportControltoSystem) for IBM
and procedures that
civilization. Even today we make regular use of information systems that have
$155 nothing
billion into do with mainframes is again typicalCompetitive
example. ServersaDvantage
in local area and other networks frequently rely on
l Case Examples: A number of real-life case
a computer. Consider some of the following examples of information
with more than
systems:
assets,
working very hard to put a real value on IT assets.
IT has stores,
not. ITretrieves,
started by
Although
transforms, and the network operating systems like Novell NetWare or operating systems like UNIX, Linux, or
Built on 4000 acres of land, theWindows
Kempegowda 2008 International Airport (KIA) of Bengaluru
Manyis software
one of the first green field
examples are added in support of all impor-
process is ongoing, Schaefer says the company disseminates now knows it has Microsoft Servers for network management. vendors also offer
l Smoke signals for communication were used as early as recorded history and can account information in an
IT assets worth “somewhere north of $3 billion.” airports IT can talk built on a public-private partnership
telecommunications (PPP).asBangalore
software International
middleware, Airport
which can help Limited
diverse (BIAL),communicate
networks the public-private
with
for the human discovery of fire. The pattern of smoke transmitted valuable information
about service levels in terms that business units care
to organization. about: that operates Kempegowda International Airport, has entered into an agreement with a number of
consortium
tant learning objectives in all the chapters.
others who were too far to see or hear the sender. Causing problems in the underwriting process costs $11,000 an
technology and management consulting companies, in order to set up a state-of-the-art airport.
hour in lost productivity, and problems that keep the field force
one another.
In the initial years, Siemens IT Solutions and Services (SIS) was appointed as the master SI for the BIAL project, and
Being able to quantify the value of IT initiatives from using their client management tools costs $25,000 wasan hour.
entrusted with end-to-end project management of the airport. SIS has equipped BIAL with complete electrical, IT
allows CIOs to show their impact on the bottom line. Schaefer’s goal is to get IT systems to be viewed as a business
and communications systems, airfield lighting, passenger boarding passes, escalators and elevators, baggage handling
Source: © Getty Images. asset, with a value every bit as real as the buildings and land the
system, power supply equipment, building security and automation system. With its airport domain knowledge, SIS
has managed to cater to the passenger forecast and projected cargo.
MIS-11e_01.indd 3
In 2005,11/15/2018
SIS established
5:21:18 PM
an Airport Systems Laboratory (ASL) in Bengaluru with an objective to showcase world-class
MIS-11e_09.indd 514 11/22/2018 11:15:40 AM
airport systems. It offers a unique integration system called Airport Integration Platform (AIP), while providing single
accountability for the wide variety of IT and non-IT systems found in any modern airport. The ASL is also the test bed
for many of SIS’s solutions deployed at KIA—from biometric security systems like 3D face scanners or fingerprint
MIS-11e_02.indd 55
scanners,11/15/2018
a complete baggage handling system to the Airport Operation Center. It also served as a virtual airport, and
5:21:46 PM
is connected to the Siemens Airport Center in Germany.
Review Quiz
ConCept ConneCtions
Match one of the key terms and concepts listed previously with one of the brief examples or definitions that
follow.
LO 2-1TryUnderstand
to find the best
thefit for answers
basic that seem to
competitive fit more than
strategies andone termtooruse
how concept. Defend your
information choices.
technologies to confront the
l Concept Connections: Revisiting key
competitive forces faced by a business.
1. A business must deal with customers, suppliers, competitors, new entrants, and substitutes. concepts in order of learning objectives in a
summary
2. Cost
3. Using
leadership, differentiation of products, and new product innovation are examples.
Information technologies
investments can support
in technology many
to keep competitive
firms strategies - help a business cut costs, differentiate and innovate in
out of an industry.
bulleted-point summary along with the
its products and services, promote growth, develop alliances, lock-in customers and suppliers, create switching costs, raise
4. Making
barriers ittounattractive for a firm’s
entry, and leverage itscustomers
investment orin
suppliers to switch
IT resources. to itsinformation
Thus, competitors.
technology can help a business gain a associated key terms.
5. Strategies
competitive designed
advantageto in
increase the time, money,
its relationships and effort
with customers, needed competitors,
suppliers, for customers or entrants,
new suppliersand
to producers of substitute
change
products.to Refer
a firm’s
tocompetitors.
Figures 2.3 and 2.5 for summaries of the uses of information technology for strategic advantage.
6. Information systems that reengineer business processes or promote business innovation are examples.
Key terms
7. This strategic
Strategic focus recognizes
Information System that
canquality,
be anyrather than
kind of price, has become
information the primary
system (e.g., determinant
TPS, MIS, and DSS) that uses information
in customers choosing a product or service.
technology to help an organization gain a competitive advantage, reduce a competitive disadvantage, or meet other
8. Highlights how strategic information systems can be applied to a firm’s business processes and sup- Competing with Information Technology 87
strategic enterprise objectives.
port activities for competitive advantage.
9. A business finding strategic uses for the computing and telecommunications capabilities it has
developed to run its operations.
Review Quiz
l Review Quiz:
10. Information A detailed
technology helping self-assessment
a business make radical re-
improvements in business processes. Match one of the key terms and concepts listed previously with one of the brief examples or definitions that
follow. Try to find the best fit for answers that seem to fit more than one term or concept. Defend your choices.
viewsolutions
quiz is needs.
provided at the end of each chap-
11. A business can prosper in rapidly changing markets while offering its customers individualized
MIS-11e_02.indd 85 to their 11/15/2018 5:21:51 PM
1. A business must deal with customers, suppliers, competitors, new entrants, and substitutes.
ter13.to practice.
12. A network of business partners formed to take advantage of rapidly changing market opportunities.
Learning organizations that focus on creating, disseminating, and managing Competing
business knowledge. 2. Cost leadership, differentiation of products, and new product innovation are examples.
with Information Technology 89
14. Information systems that manage the creation and dissemination of organizational knowledge. 3. Using investments in technology to keep firms out of an industry.
More significantly,
15. Using Wikipedians
the Internet (as thetovolunteers
and extranets call themselves)
link a company’s corrected
information systemseach error of
to those byits
January 2006. Alexa.com rated4.Wiki-
customers Making it unattractive for a firm’s customers or suppliers to switch to its competitors.
pedia.org as the 17th most visited Web site on the Internet, while Britannica.com came in 2,858th place (Yahoo and Google
and suppliers. 5. Strategies designed to increase the time, money, and effort needed for customers or suppliers to
ranked in the 1st and 2nd places). change to a firm’s competitors.
Wikipedia has already built on its success. In addition to offering foreign language encyclopedias, it also provides a common
6. Information systems that reengineer business processes or promote business innovation are examples.
media archive (commons.wikimedia.org), a multilingual dictionary (www.wiktionary.org), and a news service (www.wikinews.org).
7. This strategic focus recognizes that quality, rather than price, has become the primary determinant
a. How does the Wikimedia Foundation meet the criteria for an agile company?
b. How does the Wikimedia Foundation meet the criteria for a virtual company?
DisCussion Questions in customers choosing a product or service.
l Discussion Questions: Whether assigned
8. Highlights how strategic information systems can be applied to a firm’s business processes and sup-
c. How does the Wikimedia Foundation meet the criteria for a knowledge-creating organization?
as homework or used for classroom-discus-
1. Suppose you are a manager being asked to develop computer-based applications to gain a competitive port activities for competitive advantage.
d. How would you recommend that Encyclopedia Britannica adapt to this new threat?
advantage in an important market for your company. What reservations might you have about doing so? 9. A business finding strategic uses for the computing and telecommunications capabilities it has
business. Management studied the past booking and cancellation data and decided to take up to 47 bookings on any given
analysis of past records indicates that the number of daily bookings varies from 39 to 47, with each value in this rangeand
2. Marketing:
day. author
10. taking
MIS
Strategic
having
The
(ii) the
competitive
Competitive
47 bookings
and consultant
a Marketing
percentage
edge, but the
Intelligence
is a correct decision.
Peter
of nights when the
management
concepts to an application problem using
Keen Alsosays: find
“We(i)have
hotel that
process
the learned
average number
is overbooked.
that it isofnoteffective roomthat
technology
exploits technology.” What does he mean? Do you
bookings per
creates a night after cancellations,
model using MS-Excel or any other simulation tool. Develop the model to simulate a thirty days’ data and hence find whether
tor for demand.
b. Product: Which colleges or universities in your region pose the greatest competitive threat to students with your major?
transForming
c. Price: What is the average Business
the salary For
for entry-level the d
employees your majorFand
in igital uture
geographic region? Is salary your top concern?
l Closing Case Studies: Reinforcing impor- Why or why not?
d. Place: Which areas of the country are currently experiencing the greatest employment growth?
tant concepts with prominent examples from T ransformation is quickly becoming the watchword for enterprises gearing up to meet the demands of the digital
e.economy.
Promotion:
bling employers.
the11/15/2018
business
What
It is no
How
is your
longer
can
to better
marketing
enough
theengage
plan?
to simply
Internetitshelp
Describe
have how
an online
you get noticed?
customers
you planortoa get
presence yourapp;
mobile name and
true qualifications isinabout
transformation front ena-
and using these interactions to guide strategic thinking. However,
of prospective
transformation is not easy, and working with the right outsourcing partner can help to mitigate some of the risks in-
3. Competing against Free
volved. Carey International, a leading provider of chauffeured vehicle and ground transportation management services
discussion questions follow each case study. Wikipedia Faces Down Encyclopedia Britannica
headquartered in Washington, DC, chose NIIT Technologies to be its partner in its transformation. NIIT Technologies went
The record and movie industries are not the only industries to find themselves affected by free access to their products. Encyclo-
beyond the contractual terms to enable Carey to transform into an agile enterprise that has all the necessary tools in
pedia Britannica faces challenges by a nonprofit competitor that provides its services without charge or advertising, Wikipedia.
place for future growth.
org. Wikipedia depends on volunteers to create and edit original content under the condition that contributors provide their work
without
Ovum copyright.
view
Who would work for free? During the creation of the Oxford English Dictionary in the 19th century, the editors solicited word
The Carey–NIIT
articles Technologies
and references fromengagement can beIn
the general public. seen
the as
20thpart of an ongoing
century, AOL.com trend
foundwhereby enterprises
thousands prefertovendors
of volunteers monitor its chat
that can offer vertical specialization,
rooms. Amazon.com coaxed more than flexibility,
100,000andreaders
responsiveness
to post bookin order
reviewsto on
deliver more
its retail customer-facing,
Web site. Outdoing high-profile
them all in thework21st
within timeWikipedia
century, and budgetary constraints.
published It shows how
its one-millionth the emphasis
English language has shifted
article to a more
in March 2006.product-oriented
Wikipedia includes approach
more thanto application
two million
development that focuses on the rapid, iterative development of the IP assets
articles in more than 200 languages, all created and edited by more than one million users. that underpin a digital enterprise. The engagement
is also Can
testament to the
Wikipedia evolution
compete of the business’s
on quality? Wikipediaattitude
provides toward (and
its users involvement
both editing andin) the IT roadmap,
monitoring as well
tools, which as the
allows facttothat
users self-
vendor investments
police. Wikipedia in building
also super-specializations
uses voluntary administrators have
whobegun
block to pay off.
vandals, temporarily protect articles, and manage arbitration pro-
Careywhen
cesses provides a useful
disputes arise.reference point for organizations
A paper published that are considering
by Nature in December working
2005 evaluated with a partner
50 Wikipedia as and
articles theyfound
transition into
an average
being future-ready.
of four It isper
factual errors probably
Wikipediafair article
to describe Carey’s
compared with existing technology
an average of threeinvestments as basic
errors per article andEncyclopedia
in the its IT organization as
Britannica.
immature and lacking exposure to the cutting-edge technology in its segment, as most of its core systems are home-grown and
were last updated nearly a decade ago. However, Carey’s executive team showed maturity in its commitment to driving the
transformation of both its systems and its IT organization, which was the driving force behind the initiative. Carey also insisted on
working with a partner that showed depth of expertise in the travel segment and was amenable to working within extremely
tight time frames under a fixed price arrangement.
Carey executives expressed their appreciation for NIIT Technologies’ proactive approach – from its pre-assessment of existing
systems and IT organization to its flexibility and willingness to take over a project that, as such a massive undertaking with such
MIS-11e_02.indd 88 11/15/2018 5:21:53 PM
tight deadlines, had scared many other vendors away. With its significant experience in the segment, NIIT Technologies was able
to anticipate Carey’s requirements, and it even made several suggestions and amendments that have formed the basis of the next
phase in Carey’s journey to becoming a truly digital and agile enterprise. Carey also made a few suggestions that have helped the
vendor to fine-tune its portfolio of transformational offerings – which is proof of an active and engaged partnership rather than
a simple client-vendor story.
By going above and beyond the contractual terms with Carey, NIIT Technologies has created a strong client reference for its
transformation offerings, and it continues to be Carey’s partner of choice in its future initiatives. Client-centricity is difficult to
convey in marketing messages alone; the feedback from Carey’s executives is much a stronger validation that the right attitude
and approach can help midsize vendors like NIIT Technologies to make further inroads in the potentially lucrative digital
transformation space.
Available to adopting faculty, the Online Learning Center provides one convenient place to access the Instructor’s
Manual, PowerPoint Slides, and Test Bank.
For Instructors
Test Bank
Choose from more than 1,200 true/false, multiple-choice, and fill-in-the-blank questions of varying levels of difficulty.
Complete answers are provided for all test questions. By using the EZ Test Computerized Test Bank, instructors can
design, save, and generate custom tests. EZ Test also enables instructors to edit, add, or delete questions from the test
bank; analyze test results; and organize a database of tests and student results.
PowerPoint Slides
A set of visually stimulating PowerPoint slides accompanies each chapter, providing a lecture outline and key figures and
tables from the text. Slides can be edited to fit the needs of your course.
For Students
Chapter Quiz
Detailed self-assessment review quiz have been provided for practice.
PowePoint Slides
Chapter-wise PowerPoint slides accompanies chapter outlines, key figures, lecture notes.
Glossary
Chapter-wise important key terms are explained.
The Eleventh Edition represents an ongoing effort to improve and adapt this text to meet the needs of students and
instructors. For this revision, we received the guidance of more than 100 reviewers over the course of several months of
review work. We thank all of them for their insight and advice.
Mari W. Buche, Michigan Technological University Richard T. Grenci, John Carroll University
Jane Carey, Arizona State University Bernard Han, Western Michigan University—Kalamazoo
Steve Casarow, Clearwater Christian College David Harris, University of New Mexico—Albuquerque
David Chao, San Francisco State University James He, Fairfield University
Robert Chi, California State University—Long Beach Fred Hughes, Faulkner University
Dale Chisamore, University of Texas at Dallas Lynn Isvik, Upper Iowa University
Michael Cummings, Georgia Institute of Technology A. T. “Tom” Jarmoszko, Central Connecticut State
University
Andy Curran, University of Cincinnati—Clermont
Jeanne Johnson, Culver-Stockton University
Joanna DeFranco-Tommarello, New Jersey Institute of
Technology Surinder Kahai, Binghamton University
Robin L. Dillon-Merrill, Georgetown University Rex Karsten, University of Northern Iowa
Kevin Lee Elder, Ohio University Ranjan B. Kini, Indiana University Northwest
Kurt Engemann, Iona College Ronald Kizior, Loyola University—Chicago
Roger Finnegan, Metropolitan State University Rebecca Berens Koop, University of Dayton
Gary Fisher, Angelo State University Linda Lau, Longwood University
John Lundin, San Jose State University Robert Zwick, Baruch College (CUNY)
Frederick Rodammer, Michigan State University Sahil Raj, Punjab University, Patiala, Punjab
Paula Ruby, Arkansas State University Abhishek Kumar Saxena, Bansal Institute of engineering
and Technology, Lucknow, Uttar Pradesh
Mark B. Schmidt, Mississippi State University
Sanjay Tyagi, Kurukshetra University, Kurukshetra,
Roy Schmidt, Bradley University
Haryana
Ganesan Shankar, Boston University
Amit Deor, Jawaharlal Nehru Government Engineering
Betsy Page Sigman, Georgetown University College, Ghangnoo, Himachal Pradesh
K. David Smith, Cameron University Krishnendu Sarkar, NSHM College of Management &
Marion Smith, Texas Southern University Technology, Behala, Kolkata
Bill Sodeman, Hawaii Pacific University Balakrishnan Unny R, Institute of Management, Nirma
University, Ahmedabad, Gujarat
Toni M. Somers, Wayne State University
Pragya Gupta, K. J. Somaiya College of Engineering,
Richard W. Srch, DeVry University
Mumbai, Maharashtra
Godwin Udo, University of Texas at El Paso
P. Bhanumathi, Aravinda Reddy M N, Ramaiah Institute
Gregory W. Ulferts, University of Detroit Mercy of Management, Bangalore, Karnataka
David A. Vance, Mississippi State University S.Mahalakshmi, B.M.S. Institute of Technology and
Sameer Verma, San Francisco State University Management, Bengaluru, Karnataka
For previous edition, our thanks also go to Robert Lawton of Western Illinois University for his contribution to the
analysis exercises, Richard Perle of Loyola Marymount University for his MBA cases that so many instructors use in
conjunction with this text, and to Miguel Aguirre-Urreta, who provided content for the Real World Cases.
Much credit should go to several individuals who played significant roles in this project. Thus, special thanks go to
the editorial and production team at McGraw-Hill/Irwin: Paul Ducham, editorial director; Trina Hauger, developmental
editor; Natalie Zook, marketing manager; Bruce Gin, project manager; Lori Kramer, photo coordinator; and Matthew
Baldwin, designer. Their ideas and hard work were invaluable contributions to the successful completion of the project.
The contributions of many authors, publishers, and firms in the computer industry that contributed case material, ideas,
illustrations, and photographs used in this text are also thankfully acknowledged.
For this edition, number of individuals contributed at various stages of the manuscript of the book. It is always a challenge
to quantify the contribution of each individual. Some help in the research work, some in creating the content, some does
the critical review, some does the creative work and some give new thought and new ideas. Writing book is a process,
where the author keeps learning from the environment and keeps gathering thoughts and ideas from everyone directly
or indirectly related to the project. Our Faculty colleagues at the Institute always extended the necessary support and
guidance as and when we needed. Staff at the institute for all help they extended. We thank everyone who directly or
indirectly contributed in this endeavour.
Special thanks to the editorial team at McGraw-Hill Education Nikhil Wadhera, Shalini Jha, Sachin Kumar, Shivkant
Singhal and Atul Gupta for their ideas and hardwork to the successful completion of the project.
We cannot complete this without acknowledging the support that our family members have extended. We are thankful
to each member of our family.
AACSB STANDARD
Recognizing the importance and value of AACSB accreditation, the authors of Management Information Systems 11e have
sought to recognize the curricula guidelines detailed in AACSB standards for business accreditation by connecting
Learning Objectives of each chapter with the content of the chapter and also the selected questions in Management
Information Systems or its test bank with the general knowledge and skill guidelines found in the AACSB standards. It is
important to note that the statements contained in Management Information Systems 11e are provided only as a guide for
the users of this text.
The AACSB leaves content coverage and assessment clearly within the realm and control of individual schools, the
mission of the school, and the faculty. The AACSB charges schools with the obligation of doing assessments against their
own content and learning goals. Although Management Information Systems 11e and its teaching package make no claim
of any specific AACSB qualification or evaluation, we have, within Management Information Systems 11e, labeled selected
questions according to the six general knowledge and skills areas. The labels or tags within Management Information
Systems 11e are as indicated. There are, of course, many more within the test bank, the text, and the teaching package,
which might be used as a “standard” for your course. However, the labeled questions are suggested for your consideration.
Glossary 759
Review Quiz Answers 767
Company Index 769
Subject Index 775
Real World Case 5: Phishing: Customers Beware! 693 Real World Case 2: C
adbury, Forrester Research, A.T. Kearney,
Real World Case 6: B
lockchain: New Skill for the Digital and Others: IT Leaders Face New
Age 694 Challenges in a Globalized World 728
Global IT Management 730
Chapter Twelve: Enterprise and Global Cultural, Political, and Geoeconomic Challenges 732
Global Business/IT Strategies 733
Management of Information
Global Business/IT Applications 735
Technology 698 Global IT Platforms 736
SECTION I Managing Information Technology 698 The Internet as a Global IT Platform 738
Global Data Access Issues 739
Business and IT 698
Internet Access Issues 740
Real World Case 1: Reinventing IT at BP 699
Global Systems Development 743
Managing Information Technology 701 Systems Development Strategies 744
Business/IT Planning 702 Workforce Agility 745
Information Technology Architecture 703 Concept Connections 746
Managing the IT Function 704 Review Quiz 748
Organizing IT 705 Discussion Questions 749
Managing Application Development 706 Analysis Exercises 749
Managing IS Operations 706 Real World Case 3: T oyota, Procter & Gamble,
Data Center 707 Hess Corporation, and Others: Retiring CIOs
IT Staff Planning 710 and the Need for Succession Planning 751
The CIO and Other IT Executives 710 Real World Case 4: R
einsurance Group of America and
Technology Management 712 Fonterra: Going for Unified Global
Managing User Services 712 Operations 753
Outsourcing and Offshoring IT and IS 712 Real World Case 5: R
FID Implementation at Abhishek
Outsourcing 713 Industries 755
Offshoring 715
Real World Case 6: S
oftware Technology Parks -- Destination for
Trends in Outsourcing and Offshoring 716
Outsourcing IT Services 756
Failures in IT Management 717
Management Involvement 718
IT Governance 719 Glossary 759
Smart Governance 722
Features of Smart Governance 724 Review Quiz Answers 767
Models of Smart Governance 724
Company Index 769
SECTION II Managing Global IT 728
The International Dimension 728 Subject Index 775
LO6. Identify strategies, policies, and procedures for effective management of information system.
R: Chapter 6 of Textbook C: Indian Distributors Ltd. on Page 336 of Textbook
Exercise 1 & 2 on Pages 331 & 332 of Textbook
IT Applications
Management Information System is a set of data, computing devices (IT Infrastructure) and
management methods that supports decision making.
MIS begins with a focused purpose and addresses the needs of business
LO1. To understand the support of information system in key business functions.
LO2. To understand the types of information systems that are needed to support the various
levels of a business enterprise.
R: Chapter 1 of Textbook C: Sparks Batteries... on Page 52 of Textbook
Exercise 3 on Page 46
R: Chapter 10 of Textbook
C: Role of IT … on Page 621 of Textbook
C: Paypal Going Global… on Page 626 of Textbook
Exercise 2 & 3 on Page 618 & 619 of Textbook
LO6. To understand the role of IS in electronic business and enterprise wide computing.
R: Chapters 3 & 5 of Textbook
C: Cisco Systems… on Page 140 of Textbook
R: Chapter 4 of Textbook
C: Kennametal, Haworth… on Page 165 of Textbook
C: Making of eGurucool.com on Page 249 of Textbook
Exercise 1 on Page 194
LO7. To understand the infrastructure needed for information system.
R: Chapters 7 & 9 of Textbook
C: IT Service Management on Page 418 of Textbook
C: Sapient Undergoes… on Page 536 of Textbook
Exercise 2 on Page 411 of Textbook
LO8. To develop an awareness of critical issues around information systems like data security,
privacy and ethical use of information.
R: Chapter 11 of Textbook C: Texas Health Resources… on Page 631 of Textbook
LO9. To demonstrate managerial problem solving skills using exercises, case scenarios and
project for the Global Information systems.
R: Chapter 12 of Textbook C: Reinventing IT at BP Business…on Page 699 of
Textbook